Method and device for managing access to network
First Claim
Patent Images
1. An access control method for controlling access to a network from software, comprising:
- a step of storing, when a client downloads software from a resource on a network, a scheme and a transmission port number used by said resource in addition to a host name of said resource;
a step of comparing, when accessing a resource on a network by executing said downloaded software, a host name of a resource to be accessed, and a scheme and a destination port number used for said access, with said stored host name, scheme, and transmission port number; and
a step of permitting said access when the compared items agree with each other, while not permitting said access when the compared items do not agree with each other as a result of the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
When downloading a Java™ application AP from a server 40, a scheme and a transmission port number used by server 40 when downloading Java™ application AP are stored in addition to a host name of server 40. Then, when the Java™ application AP accesses a resource on the Internet, the host name of a resource to be accessed, and a scheme and a destination port number are compared with the stored host name, scheme, and transmission port number. The network access is permitted only when the compared items agree with each other.
35 Citations
6 Claims
-
1. An access control method for controlling access to a network from software, comprising:
-
a step of storing, when a client downloads software from a resource on a network, a scheme and a transmission port number used by said resource in addition to a host name of said resource;
a step of comparing, when accessing a resource on a network by executing said downloaded software, a host name of a resource to be accessed, and a scheme and a destination port number used for said access, with said stored host name, scheme, and transmission port number; and
a step of permitting said access when the compared items agree with each other, while not permitting said access when the compared items do not agree with each other as a result of the comparison. - View Dependent Claims (2)
-
-
3. A computer program product for causing a computer to implement an access control method for controlling access to a network, said computer program product comprising:
-
a computer readable program means for causing a computer to execute a process of storing, when a client downloads software from a resource on a network, a scheme and a transmission port number used by said resource in addition to a host name of said resource;
a computer readable program means for causing a computer to execute a process of comparing, when accessing a resource on a network by executing said downloaded software, a host name of a resource to be accessed, and a scheme and a destination port number used for said access, with said stored host name, scheme, and transmission port number; and
a computer readable program means for causing a computer to execute a process of permitting said access when the compared items agree with each other, while not permitting said access when the compared items do not agree with each other as a result of the comparison.
-
-
4. A computer-readable recording medium which has recorded a program for causing a computer to implement an access control method for controlling access to a network from software, said program comprising:
-
a computer readable program means for causing a computer to execute a process of storing, when a client downloads software from a resource on a network, a scheme and a transmission port number used by said resource in addition to a host name of said resource;
a computer readable program means for causing a computer to execute a process of comparing, when accessing a resource on a network by executing said downloaded software, a host name of a resource to be accessed, and a scheme and a destination port number used for said access, with said stored host name, scheme, and transmission port number; and
a computer readable program means for causing a computer to execute a process of permitting said access when the compared items agree with each other, while not permitting said access when the compared items do not agree with each other as a result of the comparison.
-
-
5. An access control device for controlling access to a network from software, comprising:
-
memory storage means for storing, when a client downloads software from a resource on a network, a scheme and a transmission port number used by said resource in addition to a host name of said resource;
comparing means for comparing, when accessing a resource on a network by executing said downloaded software, a host name of a resource to be accessed, and a scheme and a destination port number used for said access, with said stored host name, scheme, and transmission port number; and
controlling means for permitting said access when the compared items agree with each other, while not permitting said access when the compared items do not agree with each other as a result of the comparison.
-
-
6. A mobile communications terminal served by a mobile communications network, said mobile communications terminal performing data communications through the network, comprising:
-
downloading means for downloading software from a given resource through said mobile communications network;
memory storage means for storing a scheme and a transmission port number used when downloading said software in addition to a host name of said resource;
comparing means for comparing, when accessing a resource on a network by executing said downloaded software, a host name of a resource to be accessed, and a scheme and a destination port number used for said access, with said stored host name, scheme, and transmission port number; and
controlling means for permitting said access when the compared items agree with each other, while not permitting said access when the compared items do not agree with each other as a result of the comparison.
-
Specification