throbber
(19) United States
`(12) Patent Application Publication (10) Pub. No.: US 2003/0097590 A1
`Syvanne
`(43) Pub. Date:
`May 22, 2003
`
`US 20030097590A1
`
`(54)
`
`PERSONAL FIREWALL WITH LOCATION
`DEPENDENT FUNCTIONALTY
`
`(57)
`
`ABSTRACT
`
`(76)
`
`Inventor: Tuomo Syvanne, Vantaa (FI)
`
`Correspondence Address:
`PILLSBURY WINTHROP, LLP
`P.O. BOX 10500
`MCLEAN, VA 22102 (US)
`
`Appl. No.:
`
`09/988,356
`
`Filed:
`
`Nov. 19, 2001
`
`Publication Classification
`
`Int. Cl. ................................................ G06F 11/30
`U.S. Cl. ............................................ 713/201; 709/223
`
`(21)
`(22)
`
`(51)
`(52)
`
`A computer device is provided with a local Security mecha
`nism, a personal firewall, for protecting the computer device
`from attacks from a foreign network, in addition to or
`instead of a firewall in the internal network which protects
`the computer when connected to a home network. The
`personal firewall is provided with different sets of security
`rules for the home network and foreign networks. The
`personal firewall is arranged to detect its current location,
`i.e. determine to which network it is connected to at each
`particular moment. The personal firewall activates one of the
`given Sets of Security rules according to the detected current
`location of the computer device, i.e. the personal firewall
`automatically uses the Security rules predefined for the
`network to which the computer device is connected at each
`particular moment. Upon detecting a change in the location,
`the personal firewall immediately adapts to use Security
`rules predefined for the new location.
`
`Determine the Current location on the basis of the Currently used IP address
`
`5O1
`
`Select a predetermined network element which should be available
`for Verification from the determined current location
`
`Send to the network element a request to send
`a response with data proving its identity
`5O
`4
`-1
`NO
`
`Response received?
`
`Yes
`Compare the received identity data with identity
`data stored in the
`Computer device in Order to verify the identity of the network element
`
`5O5
`
`
`
`
`
`
`
`
`
`-
`
`
`
`Reject the location determined on
`the basis of the Current IP address;
`uSe a default location
`
`Identity verified?
`Y GS
`Verify the location determined on the basis of the current IP address
`
`
`
`End
`
`Lenovo
`Ex. 1016 - Page 1
`
`

`

`Patent Application Publication May 22, 2003 Sheet 1 of 4
`
`US 2003/0097590 A1
`
`A-4- I -
`sea 2
`saga
`LOCation
`esd Verification
`P s SeWCe
`Paddr 2
`11
`Padd 3
`7
`Private Company
`subnetwork (e.g. R&D)
`(3
`YN
`FireWall 1O
`/
`Private company
`network (home)
`
`9
`
`e
`Al-A -"
`se
`S2 IP addr 4
`
`13
`
`
`
`
`
`
`
`Private company
`network (foreign)
`
`5
`
`
`
`12
`-1
`Public internet
`
`9
`-
`DHCP
`Serve
`
`7
`
`Firewall
`
`e
`
`N
`5O
`
`a
`
`Personal
`se
`firewall
`539a management
`
`2O2
`
`Upper layers
`(e.g. TCP, IP, NetBEU, IPX, applications)
`Personal firewal protection
`Physical and network layers
`
`3.
`
`1
`Personal firewall -- 202
`applications
`
`Fig.
`O
`
`2
`
`2O1
`2OO
`
`
`
`
`
`
`
`Rule bases
`Allowed: http: https;
`SMTP,
`NetBEU, IPX;
`NetBIOS disc-share for
`... predefined services
`others
`
`Denied:
`
`
`
`Fig. 5
`
`N- 3OO
`
`H
`Awk 10
`
`Selection rules
`
`Padd 1
`IP addr 2
`IP addr 3
`Padd 4
`
`Home
`network
`
`Foreign
`Company
`network
`
`-b-
`
`Allowed: http: https, DNS:
`VPN with IPSEC;
`SMTP,
`others
`
`Denied;
`
`Unidentified
`netWOrk
`
`Other
`Paddresses
`
`>A Allowed: http: https:
`owed: httpVlah IPSEC:
`Denied:
`others
`
`3O1
`Foreign
`company
`network
`
`
`
`3O2
`Default
`
`Lenovo
`Ex. 1016 - Page 2
`
`

`

`Patent Application Publication May 22, 2003 Sheet 2 of 4
`
`US 2003/0097590 A1
`
`
`
`
`
`Determine the Current IP address
`
`IP address changed?
`
`Does
`the new IP address belong
`to one of the networks On the
`list?
`Yes
`Select a rule base
`linked to the Paddress
`-
`
`End
`
`
`
`Create a log file
`
`Fig. 4
`
`Select a default rule base
`
`Fig. 9
`
`Determine the Current location
`
`N- 92
`
`93
`-1
`Location in the home network?
`
`
`
`
`
`Send log file to a
`central log server
`
`Store the log file locally, Send the log file
`with other Collected log files to a central log
`server next time the computer device is located
`in Or Connected to the home network
`
`Ed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Lenovo
`Ex. 1016 - Page 3
`
`

`

`Patent Application Publication May 22, 2003 Sheet 3 of 4
`
`US 2003/0097590 A1
`
`
`
`Fig. 5
`
`Determine the current location on the basis of the Currently used IP address
`
`501
`
`Select a predetermined network element which should be available
`for Verification from the determined Current location
`
`Send to the network element a request to send
`a response with data proving its identity
`
`
`
`Response received?
`
`-
`
`5O3
`
`5O6
`
`- 5O3
`
`Fig. 6
`
`Yes y
`Compare the received identity data with identity data stored in the
`Computer device in order to verify the identity of the network element
`5O7 -
`No
`
`
`
`ldentity verified?
`
`Yes
`Verify the location determined on the basis of the current IP address
`
`End
`
`Reject the location determined on
`the basis of the Current IP address;
`use a default location
`
`Receive from a personal firewall a request to send a response with identity data |- 6O1
`
`Send the response with identity data to the personal firewall
`
`- 6O2
`
`Receive a rule updating query from a personal firewall
`
`s 8O1
`
`Fig. S
`
`Send updated rules, if any, to the personal firewall
`
`N- 8O2
`
`Lenovo
`Ex. 1016 - Page 4
`
`

`

`Patent Application Publication May 22, 2003 Sheet 4 of 4
`
`US 2003/0097590 A1
`
`Fig. 7
`
`Measure the updating period
`
`N- 7O1
`
`Updating period expired?
`
`LOCation in the home network?
`
`7O2
`-
`
`7O3
`
`Wait until the Computer device returns to the home network or
`establishes a Connection to it
`
`Send a rule updating query to the Central management
`
`Rule updating received?
`
`7O6
`-
`
`7O4
`
`7O5
`
`Update the rule bases stored in the computer device
`
`7O7
`
`
`
`
`
`
`
`
`
`
`
`Lenovo
`Ex. 1016 - Page 5
`
`

`

`US 2003/0097590 A1
`
`May 22, 2003
`
`PERSONAL FIREWALL WITH LOCATION
`DEPENDENT FUNCTIONALTY
`
`FIELD OF THE INVENTION
`0001. The present invention relates to network security
`and, more particularly, to personal firewalls.
`
`BACKGROUND OF THE INVENTION
`0002 Traditionally, a firewall is considered as a set of
`components forming a gateway between two or more net
`WorkS. Thus, a firewall has been a gateway which operates
`at the same time as a connector and a separator between the
`networks in a Sense that the firewall keeps track of the traffic
`that passes through it from one network to another and
`restricts connections and packets that are defined as
`unwanted by the administrator of the system. Physically a
`firewall is a machine with appropriate Software to do the
`tasks assigned to it. It can be a router, a personal computer
`(PC), or any other device that can be used for Such purposes.
`Although firewalls are mostly used to connect Local Area
`Networks (LANs), i.e. internal networks, to the Internet and
`to protect against attackers or undesired traffic in general,
`they may also be used to Separate and connect different
`Segments of internal network for Security purposes. The
`advantages of having a firewall are numerous. A firewall
`Secures the network and can be used as a tool for monitoring
`the traffic especially from the outside to the inside of the
`network guarded by a firewall. Because all traffic intended
`for the internal network must pass through the firewall, most
`of the network Security actions and policies can be concen
`trated in this particular point. This is of course a cost and
`administrative advantage.
`0003) Nowadays, laptop computers and other portable
`computer devices are widely used. While outside the internal
`network, the laptop cannot make benefit of the protection
`provided by the conventional “gateway-type' firewall.
`Therefore, approaches to improve Security of a client located
`in a foreign network (a public network or an internal
`network of a foreign organisation) have been proposed.
`These approaches are based on protecting the laptop itself by
`means of a local Security mechanism, called a personal
`firewall herein, installed in the laptop (in addition to or
`instead of a firewall in an internal network, which protects
`the computers connected to the internal network). The
`personal firewall may be implemented as Software installed
`in the computer device, or as a separate electronic device
`connected to the computer device.
`0004 European patent application EP 0952 715 dis
`closes a firewall Security device connected to an external
`communication port of a computer device. The incoming
`communications Stream to the computer device from e.g.
`public networks is passed through the firewall Security
`device. The firewall device applies Standard Security mea
`Sures, thereby protecting the computer device.
`0005 There is a particular need for such protection by
`means of a personal firewall if the laptop is allowed to have
`a remote access, e.g. make a VPN (Virtual Private Network)
`connection to company network while being connected to a
`foreign network. In order to improve security of the VPN
`connections, one prior art Solution is to enforce a protection
`level of a laptop, when a VPN tunnel to a company network
`is created. This means for example that, during a VPN
`
`connection, the IP address forwarding is not allowed, or that
`any connection attempts to the laptop are denied.
`0006 Clearly this is not enough, since the laptop must be
`protected as Soon as it is connected to a foreign network, not
`only during a VPN connection. The laptops are often used by
`non-technical people, which increases the risk of Overlook
`ing Security aspects. Laptops contain Sensitive material, Such
`as customer emails. If a laptop is unprotected, when con
`nected to a foreign network, even for a short period of time,
`there is a risk of getting infected by a hostile application.
`Such application can be activated later, when the laptop is
`connected to an internal network and offer inside help for
`attackS.
`0007 Thus, there is a need to protect the laptop by means
`of a personal firewall always when the laptop is connected
`to a foreign network. However, when the laptop is connected
`to a company internal network, Such personal firewall may
`unduly prevent Some essential traffic. For example, the
`personal firewall should allow use of a laptop at home
`(internal) network and access to all Services, Such as disk
`share. In a home network even non-IP protocols are Some
`times used. Therefore, it is not feasible to have a personal
`firewall running at all times, at least not with the same
`configuration, Since the protection needs in an internal
`network are different from those in a foreign network.
`0008 Some of the current solutions allow changing the
`Set of rules used in the personal firewall, that is, they allow
`the user of the laptop to use different rule sets when
`connected to the internal network and when connected to a
`foreign network. However this is a manual operation. Since
`manual action is required, there is a high risk that operation
`is not done. Risk is even higher if the end user does not fully
`understand the need of a firewall.
`
`SUMMARY OF THE INVENTION
`0009. An object of the invention is to improve the Secu
`rity and flexibility of a personal firewall.
`0010. A computer device which can be connected to a
`home network (Such as an internal network of a company or
`other organisation where the user is employed) and to a
`foreign network (Such as a public network or an internal
`network of a foreign organisation) is provided with a local
`Security mechanism, called a personal firewall herein, for
`protecting the computer device from attacks from a foreign
`network, in addition to or instead of a firewall in the internal
`network which protects the computer when connected to the
`internal network. The personal firewall is provided with
`different Sets of Security rules, at least one set of rules for the
`home network and at least one set of rules for foreign
`networks. In its simplest form, the set of rules for the home
`network contains no restrictions for the communication or
`use of service in the home network. The personal firewall is
`arranged to detect its current location, i.e. to determine the
`network to which it is connected at each particular moment.
`The personal firewall activates one of the given Sets of
`Security rules according to the detected current location of
`the computer device, i.e. the personal firewall automatically
`uses the security rules predefined for the network to which
`the computer device is connected at each particular moment.
`Upon detecting a change in the location, the personal
`firewall immediately adapts to use Security rules predefined
`for the new location. A benefit of the invention is that the
`
`Lenovo
`Ex. 1016 - Page 6
`
`

`

`US 2003/0097590 A1
`
`May 22, 2003
`
`protection of a personal firewall is always enabled at the
`correct level, depending on the current location. On the other
`hand, when the computer device is located in the home
`network, a lower level of protection, or no protection at all,
`can be automatically provided by the personal firewall, So
`that the communication and Services are not unduly
`restricted in the home network. Thus, the automated loca
`tion-dependent management of different Sets of rules offers
`optimal protection in different networks, while not unduly
`restricting operation in the home network.
`0.011
`The current location of the computer device is
`preferably determined on the basis of a currently used IP
`address of the computer device. This is based on the
`common practice that a computer device has a different IP
`address, either a fixed address or a dynamic address, in
`different networks. The IP address can thereby be utilized for
`identifying the current network and the location of the
`computer device.
`0012 However, there are situations where the IP address
`fails to indicate current location of the computer device.
`Therefore, in an embodiment of the invention, the current
`location determined on the basis of the current IP address of
`the computer device is verified by carrying out an additional
`location verification procedure with a predetermined net
`work element. In a still further embodiment of the invention,
`availability of Said predetermined network element related
`to the current IP address is checked. The predetermined
`network element is Such that it responses only if the com
`puter device is located in the network in which it is assumed
`to be on the basis of the current IP address. If the predeter
`mined network element responses and identifies itself prop
`erly, the current location determined based on the current IP
`address is considered to be verified. Otherwise the computer
`device determines that the current IP address fails to indicate
`current location of the computer device. The additional
`Verification process makes it even possible to automatically
`create a Secured tunnel, Such as a VPN tunnel to a home
`network even if the computer device uses the same IP
`address in the current location as in the internal (home)
`network. The present invention offers benefits even with
`Stand alone personal firewalls wherein the Security rules can
`be defined locally by the user, although the use of these rules
`is automated and location-dependent. However, more
`advantages are achieved when the basic invention is used
`with a central management of personal firewalls.
`0013. According to an aspect of the invention, security
`rules are defined, updated and distributed centrally by a
`centralized rule-based Server. Especially the updating of the
`rules is challenging, because the rule updates must be
`applied as Soon as possible, and therefore the process of
`updating rules in the personal firewalls must be automated.
`Updating of rules by push method from the centralized rule
`base Server is not a Sufficient option in this case. Use of
`DHCP (Dynamic Host Configuration Protocol), frequent
`travelling and the fact that at times the laptop may not be
`connected to any network makes it next to impossible for the
`centralized management to initiate contacts with the per
`Sonal firewalls in the computer devices, because there is no
`way for the centralized management to know the IP address
`the computer device is using at a given moment. Therefore,
`according to an aspect of the invention, the personal firewall
`is configured to periodically query the availability of
`updated Security rules from the centralized management.
`
`The queries should only be made, while the computer device
`is located in the home network, or optionally, when the
`computer device has a remote access (e.g. VPN connection)
`to the home network while being located in a foreign
`network. In other words, also the updating proceSS is depen
`dent on the current location of the computer device in a
`Similar manner as the Selection of the active rules, and
`Similar methods can be utilized for determining the current
`location.
`0014. According to another aspect of the invention, log
`files containing information of a status and usage of
`resources of the computer device are handled in a central
`ized management location. This enables perSonnel aware of
`Security aspects to Verify whether there have been any
`attacks against the computer device or not. To that end, the
`personal firewall sends the log files to the central manage
`ment, Such as to a centralized log Server, when the computer
`device is located in the home network. However, when the
`computer device is disconnected from the home network,
`the log files are collected and Stored locally in the firewall.
`In order to enable central handling of the log files, the
`personal firewall transferS the collected log files to the
`central log Server when Such is available. This is performed
`automatically, whenever the computer device is located in,
`or optionally, connected to the home network. Again, the
`handling of the log files in the personal firewall is automated
`and location dependent in a way Similar to the Selection of
`active rules, and Similar methods can be used for determin
`ing the current location of the computer device.
`0015 The present invention allows use of a computer
`device in a home (internal) network and access to all
`Services, Such as disc-share, and even use of non-IP proto
`cols, which are often denied in foreign networks.
`BRIEF DESCRIPTION OF THE DRAWINGS
`0016 Preferred embodiments of the invention will now
`be described with reference to the attached drawings, in
`which
`0017 FIG. 1 is a schematic block diagram of an exem
`plary network configuration where the present invention can
`be applied;
`0018 FIG. 2 shows an exemplary protocol stack of a
`computer device containing a personal firewall according to
`the present invention,
`0019 FIG. 3 illustrates exemplary selection rules and a
`Security rule basis, and the association therebetween,
`0020 FIG. 4 is a flow diagram illustrating a location
`dependent rule base Selection according to an embodiment
`of the invention;
`0021 FIGS. 5 and 6 are flow diagrams illustrating the
`location verification procedure according to an embodiment
`of the invention;
`0022 FIGS. 7 and 8 are flow diagrams illustrating the
`rule base updating according to an embodiment of the
`invention; and
`0023 FIG. 9 is a flow diagram illustrating the handling
`of log files according to an embodiment of the invention.
`PREFERRED EMBODIMENTS OF THE
`INVENTION
`0024. The present invention can be applied in personal
`firewalls in any computer device which can be moved and
`
`Lenovo
`Ex. 1016 - Page 7
`
`

`

`US 2003/0097590 A1
`
`May 22, 2003
`
`connected to different networks. Typically Such devices are
`portable computer devices, Such as laptop computers, PDAS,
`communicators, Smart phones, intelligent telecommunica
`tion devices, etc. In the following illustrative embodiments
`of the invention, a laptop computer is used as an example of
`Suitable computer devices.
`0.025
`FIG. 1 shows a schematic block diagram of an
`exemplary network configuration. The configuration is
`shown only to facilitate the understanding and description of
`the present invention. The present invention is not intended
`to be restricted to any particular network configuration.
`Further, in order to improve clarity, only network elements
`which are somehow involved with the present invention are
`shown in FIG. 1.
`0026. As illustrated in FIG. 1, private local networks 10
`and 13 are coupled to a public network, Such as the Internet
`12 via firewalls 5 and 7, respectively. Naturally, the coupling
`between the private networks and the public Internet 12 may
`include also routers and Internet service providers (ISPs not
`shown in FIG. 1). As is well known in the art, private
`networkS 10 and 13 may be, for example, company net
`works, Such as local area networks (LANS) which connect
`users and resources, Such as workStations, Servers, printers
`and the like of the company. A private internal network may
`also consist of Several Sub-networks Separated by internal
`firewalls. In the exemplary network configuration shown in
`FIG. 1, the private company sub-network 11 is connected
`via a firewall 6 to the private local network 10. Such a
`Sub-network 11 may be, for example, a dedicated network
`for a specific department of the organisation, such as the
`research and development (R&D) department which must
`have a restrictive acceSS and higher protection level com
`pared with other part of the company network. Sub-net
`Works of the company, Such as the local networks of
`organisation headquarters and branch offices may be inter
`connected by Secure connections, Such as Virtual private
`network (VPN).
`0.027 AS already described above, the firewalls 5, 6 and
`7 are gateways which operate at the same time as connectors
`and Separators between the networks in a Sense that the
`firewall keeps track of the traffic that passes through it from
`one network to another and restricts connections and packets
`that are defined as unwanted by the administrator of the
`System. Physically a firewall is a machine with appropriate
`Software to perform the task assigned to it. It can be a router,
`a personal computer (PC), or whatever that can be used for
`Such purposes.
`0028. However, the firewalls between the networks, or
`the implementations thereof, are not relevant to the present
`invention.
`0029. The present invention relates to protecting of the
`computer device, e.g. laptop itself, by means of a local
`Security mechanism, called a personal firewall herein,
`installed on the laptop in addition to or instead of a firewall
`in a private network. The personal firewall may be imple
`mented as Software installed and run in the computer device,
`which is a preferred embodiment, or as a separate electronic
`device connected to the computer device. In FIG. 1, the
`laptops 1, 2, 3 and 4 illustrate laptops provided with a
`personal firewall.
`0030 FIG. 2 illustrates the basic principle of a personal
`firewall installed in a laptop. Physical and network layers
`
`200 refer to all protocols and physical connections required
`for transferring protocol data units (PDUs) of the upper
`layers. The upper layerS 200 include applications and any
`transmission protocols employed, Such as Internet protocol
`(IP) transmission control protocol (TCP), NetPEUI, IPX,
`etc. Basically the personal firewall protection layer 201
`operates in a manner analogue to a firewall between net
`WorkS. More particularly, the personal firewall protection
`layer 201 operates at the same time as a connector and a
`Separator between the underlying layerS and the upper layer
`in a Sense that the personal firewall keeps track of the traffic
`that passes through it from underlying layers to the upper
`layers, and Vice versa, and restricts connections and packets
`that are defined as unwanted according to the Security rules
`used. The personal firewall protection layer 201 is imple
`mented or controlled by a personal firewall application 203
`run in the laptop. In a preferred embodiment of the inven
`tion, the personal firewall application 203 carries out the
`location detection and the location-dependent functions
`described below, Such as the selection of the active rule base
`according to the current location of the laptop. However, it
`should be appreciated that the present invention is not
`intended to be restricted to any specific practical implemen
`tation of the personal firewall.
`0031. In accordance with the principles of the present
`invention, the personal firewall has different sets of rules for
`the home network (such as the private company network 10)
`and foreign network, Such as the public Internet 12, or the
`foreign private network 13, or a network of another depart
`ment of the company. It is not relevant to the present
`invention what kind of Security rules are applied, but Some
`examples are given in FIG. 3. For example, a rule base 301
`for the foreign company network may list as allowed con
`nections of protocols: hypertext transfer protocol (http),
`Secured http (Https), domain name Service (DNS), single
`message transfer protocol (SMTP) and a VPN connection
`with IPsec. In the preferred embodiment of the invention
`these rules are exclusive, in other words, other protocols and
`connections are denied and blocked by the personal firewall.
`For a default network, which may be the public Internet 12,
`the rule base 302 is similar to the rule base 301, except that
`the SMTP protocol is no longer allowed. For the home
`network 10, a rule base 300 is defined. The allowed proto
`cols include, in addition to the http, https and the SMTP, also
`other transmission protocols, such as NetBEUI and IPX. The
`rule base 300 also allows a disc-share for predefined servers
`using NetBIOS. Other protocols and connections are denied.
`It is also possible that the rule base 300 allows all protocols
`and connections in the home network. Since the home
`network is protected by a company firewall, the use of a
`personal firewall in the home network may be regarded as
`unnecessary. However, the company firewall gives protec
`tion only against attacks from the outside of the home
`network, and the use of a personal firewall protection may
`be necessary for protecting against attacks from within the
`home network.
`0032. The different rule bases could be activated manu
`ally by a user. However, according to the basic principle of
`the present invention, the personal firewall automatically
`Selects and activates the proper rule base according to the
`current location of the laptop.
`0033 FIG. 4 is a flow diagram illustrating the selection
`of the rule base according to one embodiment of the present
`
`Lenovo
`Ex. 1016 - Page 8
`
`

`

`US 2003/0097590 A1
`
`May 22, 2003
`
`invention. The Simplest way to determine the current loca
`tion of the laptop is to do it on the basis of the currently used
`IP address only. This is possible in the cases where the laptop
`has a different IP address, either a fixed or a dynamic
`address, in different networks. AS is well known in the art,
`a part of the IP address identifies the network, and can thus
`be used for detecting the current network of the laptop. The
`personal firewall may, for example, contain information on
`the IP address Space of home network, and optionally,
`foreign networks, or a list of addresses available for the
`laptop in the home network.
`0034. When the current IP address of the laptop matches
`to a given address Space or a list of addresses of the home
`network 10, for example, it can be assumed that the laptop
`is located in the home network 10 and the rule base 300 of
`the home network 10 is used. Thus, the current IP address is
`used as a selection rule for activating the rule base 300.
`However, there is Some uncertainty in determining the
`location based on the current IP address only, and Some
`approaches to overcome this problem are described with
`reference to further embodiments of the invention below.
`0.035
`Referring again to the generic flow diagram shown
`in FIG. 4, the current IP address of the laptop is firstly
`determined in the step 401. The current IP address may be
`obtained Simply by asking for it from the operating System
`of the laptop by means of using IP configuration routine. The
`current location of the laptop is monitored constantly, and
`therefore the personal firewall may be configured to peri
`odically query the current IP address from the operating
`System. More preferably, the operating System of the laptop
`may be configured to inform any changes in the IP address
`to the personal firewall, and therefore a need for query the
`IP address time-to-time can be avoided. The step 401 may
`also include Verification of the location determined based on
`the IP address by a verification procedure described below.
`In step 402, the personal firewall compares the current IP
`address with the current IP address stored in the personal
`firewall. If the IP address has not changed, the present active
`rule base can be maintained. However, if the IP address has
`changed, the personal firewall checks whether the new IP
`address matches to any IP address space or IP address
`belonging to one of the networks on the Selection rule list in
`the personal firewall (step 403). If the new IP address does
`not belong to any of the networks on the Selection rule list,
`the personal firewall considers the current network an uni
`dentified network, and a default rule base 302 is selected
`(step 404). If the network cannot be identified and the
`default rule base must be used, it is normally assumed that
`the laptop is in a potentially hostile environment, most likely
`in the public Internet 12. Therefore, the default rule base is
`typically defined to provide the maximum protection
`needed. If the new IP address belongs to one of the networks
`defined on the selection rule list in step 403, it means that the
`network has been identified and a rule base linked to the
`identified network (or the corresponding Selection rule) is
`selected and activated (step 405). In the simplest implemen
`tation, the Selection rules include only the home network of
`the laptop and the corresponding IP address Space or list of
`addresses. If the current IP address belongs to the home
`network, the rule base 300 of the home network 10 is used.
`Otherwise the rule base 310 for foreign network or the
`default rule base 302 is used. In a more complicated imple
`mentation, there are Selection rules (i.e. IP addresses and
`
`associated rule bases) also for at least one foreign network
`and/or different segments of the home network 10.
`0036). In the examples described above there are two or
`more rule bases which are enabled or disabled on the basis
`of the current location of the laptop. However, there are also
`alternative ways to implement different rule bases. One
`alternative is to provide only one rule base in which the rules
`are enabled and disabled in different combinations on the
`basis of the current location of the laptop.
`0037 AS noted above, there are situations where the
`location (the current network) determined on the basis of the
`current IP address is uncertain, i.e. the IP address fails to
`indicate the current location of the laptop. If the IP address
`does not match the current network, use of the Internet
`protocol (IP) to attack against the laptop is not likely, and
`one may reason that in that case a personal firewall does not
`need to be used. However, there is still a possibility that
`there is an attack using other protocols, such NetBEUI or
`IPX. By detecting the situation where the IP address of the
`laptop is not an IP address of the current network, it is
`possible to block Such protocols while in foreign networkS.
`Further, NAT (network address translation) and private IP
`addresses are frequently used. This means that the Same IP
`address is in use in Several networks. In that case it is not
`enough to trust IP address information only when determin
`ing the location of the laptop. It is even possible that while
`being connected to a hostile network, the DHCP (dynamic
`host configuration protocol) gives familiar IP address to
`make it easier to attack the laptop. Basically, the DHCP
`enables individual computers on a network to connect to a
`DHCP server, such as the server 9 in FIG. 1, and be assigned
`a dynamic IP address of the current network.
`0038. Thus, according to an aspect of the invention, in
`addition to the detection of location based on the current IP
`address described above, a further l

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket