NETWORK CONNECTION CONTROL PROGRAM, NETWORK CONNECTION CONTROL METHOD, AND NETWORK CONNECTION CONTROL SYSTEM
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention prevents a computer, which is infected by an unauthorized program such as a virus or spyware when the computer is brought out, from being connected with a secure network such as an intracompany LAN. When a user terminal is started, a connection with the intracompany LAN is attempted. Then, a network connection is temporarily stopped and an environment is compared with the one where the user terminal operated at a previous time. When there is no difference between both of the environments, the connection with the intracompany LAN is restored. However, when it is determined that the user terminal is connected with a network other than the intracompany LAN when the user terminal was operated at a previous time, an inspection for a virus or the like is executed by a USB memory where the latest anti-virus software is stored. After it is confirmed that the user terminal is safe, the connection with the intracompany LAN is restored.
-
Citations
30 Claims
-
1-15. -15. (canceled)
-
16. A network connection control program stored in a memory of a computer and executable on a processor of the computer for preventing a computer where an unauthorized program is stored from being connected with a secure network, the network connection control program comprising:
-
software for stopping a processing for connecting with the network executed by the network connection program stored in the computer; software for reading first environmental information which concerns a connection environment to the secure network, and which is stored in the computer; software for reading second environmental information which concerns a connection environment to the network where the computer operated at a previous time, and which is stored in the computer; software for comparing the first environmental information with the second environmental information, and determining that the environment where the computer operated at a previous time was a connection environment other than the secure network when the first environmental information does not match with the second environment; software for starting an inspection program which inspects whether or not an unauthorized program is stored in the computer, and which is read from the computer or an external storage device connected with the computer when it is determined that the environment where the computer operated at a previous time was the connection environment other than the secure network; and software for starting processing for connecting with the network executed by the network connection program when the unauthorized program is not detected in the computer by the inspection program. - View Dependent Claims (17, 18, 19, 20)
-
-
21. A network connection control method for preventing a computer where an unauthorized program is stored from being connected with a secure network, comprising:
-
stopping, by a computer where a processing for connecting with a network is started, the processing for connecting with the network executed by a network connection program stored in the computer; reading, by the computer, first environmental information concerning a connection environment to the secure network, the first environmental information stored in the computer; reading, by the computer, second environmental information which concerns a connection environment to the network where the computer operated at a previous time, and which is stored in the computer; comparing, by the computer, the first environmental information with the second environmental information, and determining that the environment where the computer operated at a previous time was a connection environment other than the secure network when the first environmental information does not match with the second environment; starting, by the computer, an inspection program which inspects whether or not an unauthorized program is stored in the computer, and which is read from the computer or the external storage device connected with the computer when it is determined that the environment where the computer operated at a previous time was the connection environment other than the secure network; and starting, by the computer, the processing for connecting with the network executed by the network connection program when the unauthorized program is not detected in the computer by the inspection program. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A network connection control system for preventing a computer where an unauthorized program is stored from being connected with a secure network, and the network connection control system comprising:
-
a network connection for executing a processing for connecting with a network of the computer; a connection processing stopping mechanism for stopping the processing for connecting with the network executed by the network connection means when the computer is started; a first environmental information store for storing first environmental information on the connection environment to the secure network; a second environmental information store for storing second environmental information on a connection environment to the network where the computer operated at a previous time; an environmental information comparing mechanism for comparing the first environmental information with the second environmental information by reading the first environmental information from the first environmental information store, and by reading the second environmental information from the second environmental information store; a connection environment determining mechanism for determining that an environment where the computer operated at a previous time is connection environment other than the secure network when the first environmental information does not match with the second environment in the environmental information comparing mechanism; and an inspection program starting mechanism for starting an inspection program which inspects whether or not the unauthorized program is stored in the computer, and which is read from the computer or the external storage device connected with the computer when it is determined that the environment where the computer operated at a previous time was the connection environment other than the secure network in the connection environment determining mechanism;
whereinthe processing for connecting with the network by the network connection mechanism is started when the unauthorized program is not detected in the computer by the inspection program which was started by the inspection program starting mechanism. - View Dependent Claims (27, 28, 29, 30)
-
Specification