The present invention relates to the protection of terminals when they are connected to a private or public computer network, such as the Internet.
It applies particularly, but not exclusively, to terminals of nomad users, irrespective of the network to which they are connected, the connection mode and the type of terminal. Hence the network may be of Ethernet, WiFi, GPRS (General Packet Radio Service), ADSL (Asymmetric Digital Subscriber Line), PSTN (Public Switched Telephone Network) type, . . . , the connection mode may be of wire or wireless type (Bluetooth for example) with or without intermediate proxy, and the terminal may be of PC, PDA type, . . . .
At the current time, nomad users have increasingly more network connection means. With the development of wireless networks such as WiFi and Bluetooth, nomad user terminals generally have several network interfaces which may be activated simultaneously. In addition, some of these network interfaces may connect automatically, for example on start-up of the terminal with no particular action on the user's part. As a result the security of said terminals is affected.
To overcome this drawback, users must permanently and manually check the uniqueness of their network connection.
In general, the security of a terminal is ensured by what is called a firewall which in some situations, nomad situations in particular, must be configured manually by the user and activated or deactivated depending on whether or not the terminal is connected to a secure environment.
The most frequent case occurs with users having a laptop which they can use at their usual workplace or outside thereof. For this purpose, the laptop has an Ethernet network interface (wireline) or a WiFi interface with which to connect to a local network, the local network itself being connected to a public IP network such as the Internet via a proxy and a firewall. When users have nomad status (outside their usual workplace) they can connect to the Internet via the WiFi interface and firewall software installed in the laptop.
At the current time, whenever users leave their office and access the Internet under nomad status, or return to their office, they must manually configure their network interface cards, firewall and proxy parameters of their navigator. This leads to major risks of error which could have serious consequences if the security functions are not correctly activated or if the terminal is connected to the Internet simultaneously via a secure local network and a WiFi interface. Configuration errors may also prevent the terminal from connecting to the local network or Internet, or from being remotely updated (software and anti-virus updates) when connected to a secure local network. Such configuration errors may also involve dysfunction of the web browser (wrong configuration of proxy parameters) making Internet connections impossible and having the consequences of time losses and unnecessary calls to computer assistance services.
The situation becomes further complicated if the user's terminal has more than two network interfaces, each interface then being associated with a respective network environment and security configuration consisting of a set of configuration parameters, firewall parameters in particular.
The present invention sets out to overcome these drawbacks and in particular to securitize the terminal's network connection.
For this purpose, the invention proposes a method comprising steps during which the terminal:
Advantageously, an order of priority is allocated to each of the possible physical links of the terminal with a network, the maintained physical link having highest priority.
According to a preferred embodiment of the invention, if a physical link with a network cannot be disconnected, the terminal emits an alert message to the user and configures the terminal taking active physical links into account.
According to a preferred embodiment of the invention, the determination of the characteristics of a physical link with a network comprises an identification step of a possible local network to which the active network interface is connected, by attempting connection to a secure server known to the terminal and supposedly visible solely to the local network.
According to a preferred embodiment of the invention, the configuration of the terminal consists of selecting a set of parameter values corresponding to the maintained network link.
According to a preferred embodiment of the invention, the step consisting of verifying whether the terminal is connected to the network via a unique link is preceded by a detection step to detect a change in physical connection of the terminal to a network.
According to one variant, the detection step is triggered periodically.
According to another variant, the detection step is triggered on receipt of a system event.
The invention also concerns an automatic configuration programme of the security of a terminal able to be connected to at least one network via several network interfaces, this programme comprising programme code instructions to carry out the above-defined method when the programme is executed on a terminal.
The invention also concerns a terminal containing said programme.
The invention also concerns a nomad user's terminal comprising at least two network interfaces to connect to at least one network, a firewall and navigational software. According to the invention, this terminal comprises programmed processing means to:
Advantageously, the processing means are programmed to allocate an order of priority to each of the possible network links of the terminal, the maintained network link being giving highest priority.
According to a preferred embodiment of the invention, the processing means are programmed to emit an alert message to the user if a physical link cannot be disconnected, and to configure the terminal taking several active physical links into consideration.
According to a preferred embodiment of the invention, the processing means are programmed to identify a possible local network to which the active network interface is connected, by conducting an attempted connection to a secure server known to the terminal and supposedly visible solely to the local network.
A preferred embodiment of the invention is described below as a non-restrictive example with reference to the appended drawings in which:
The network interfaces 13, 14 may be of Ethernet network card type, modem (ADSL, PSTN, GPRS), WiFi interface, Bluetooth interface, etc. These interfaces may also be of the same type. Therefore the terminal may for example comprise two WiFi interfaces and one PSTN modem.
With this configuration terminal 10 can for example be connected directly to a public network 1 such as the Internet as illustrated
In
Changing between the configurations illustrated
For this purpose, terminal 10 is equipped, according to the invention, with an automatic configuration device 17, advantageously in the form of a programme designed to verify permanently that the terminal is connected to a network 1, 2 by a unique physical link, to determine the type of network to which the terminal is so connected and to select a security configuration in relation to the network and the type of link with this network.
As illustrated
Detection of a change in physical connection to a network consists of determining changes in the connected/disconnected status of the network interfaces of terminal 10. This detection may be performed by verifying the connected/disconnected status of the network interfaces which can be triggered either periodically or on receipt of a system event (such as a change in IP address).
Verification of the uniqueness of the. terminal's physical connection to a network consists of verifying that a single physical connection is active on the terminal at a given time. This verification consists of applying the following rules:
An example of procedure 21 for verifying uniqueness of the physical connection is illustrated
The order of priority of the physical connections may be chosen as follows:
All these connections may be disable with the exception of the connections via modem. Therefore if the user sets up several connections with modems, the procedure alerts the user (step 36) that several modems are simultaneously connected, and configures the terminal to ensure the greatest security (activation of the local firewall 16) having regard to these connections (step 37).
In the other cases, solely the physical connection having highest priority is maintained (step 35). In particular, if terminal 10 is connected to the network via the WiFi interface, a physical connection via the Ethernet wire link causes disabling of the WiFi link. Procedure 21 then ends by feeding back that uniqueness of the physical connection is not verified.
Identification of the network connected to the physical interface (step 22) is performed in securitized manner using authentication parameters for access to the network (802, 1x, . . . ) or by attempting connection to a server accessible solely in the local network using a secure protocol (SSL, HTTPS, . . . ).
For example, as shown
The configuration of terminal 10 in relation to the network and/or network interface (step 23) consists of selecting a security configuration (activation/configuration of a firewall, setting up a connection of virtual private network type . . . ) and of configuring other applications non-related to security but depending upon the connected local network, such as the terminal's navigator (navigator's proxy parameter). The terminal therefore memorizes a configuration (set of values for security parameters and configuration) for each possible terminal link with the public network 1.
Number | Date | Country | Kind |
---|---|---|---|
0410400 | Oct 2004 | FR | national |