摘要:
A method and system for providing limited access privileges with an untrusted terminal allows a user to perform privileged operations between the untrusted terminal and a remote terminal in a controlled manner. The user can establish a secure communications channel between the untrusted terminal and a credentials server to receive credentials therefrom. Once the user receives the credentials, the secure communications channel is closed. The user can then use the credentials to perform privileged operations on a remote terminal through the untrusted terminal. The remote terminal knows to grant the user limited privileges based on information included in the credentials. The effects of malicious actions by the untrusted terminal are limited and controlled.
摘要:
A method and apparatus for filtering packets uses digital signatures to filter packets in a network. A filter point, such as a router or firewall to an intranet, receives a packet including a header, detects the existence of a signature in the header, tests the validity of the signature using a public key, and forwards the packet in accordance with the validity of the signature. A sender uses a private key obtained from an owner to generate the signature, which is created by encrypting a fingerprint which corresponds to the data in the packet. Public keys are created by an owner which installs them in a domain name system or a certification server. Private keys are also created by the owner but are disseminated only to authorized senders. A method and apparatus for sending packets stores a private key in a memory of the data processor, generates a signature using the private key, installs the signature into a header of a packet; and sends the packet.
摘要:
An arrangement efficiently renders forwarding decisions for a packet using a forwarding database dictionary of an intermediate node configured to optimize space consumed by addresses stored therein as well as to reduce time required to search those addresses. The arrangement generally includes a lookup mechanism comprising a search engine coupled to a set of registers and to the dictionary. The register set, in turn, comprises a number of registers operating in parallel to compare values specified by a number of bits with a predetermined starting point of an input string. The specified values are preferably representative of address prefixes stored in the dictionary and the input string is a destination address of the packet.
摘要:
A novel acknowledgment mechanism efficiently requests affirmation from a neighboring node coupled to a communication link of a network that the neighbor is "alive" and connected to that link. The acknowledgment mechanism comprises control information generated by a source node and generally stored in a network layer header of a data packet transmitted to the neighbor. This next-hop acknowledgement (or lack thereof) from the neighbor provides a fast and efficient indication of (lost) system connection between adjacent nodes of a network.
摘要:
The present invention is an improved certificate revocation process that improves the efficiency of an authentication exchange in a public key distributed network system. Specifically, the present invention includes a novel revocation service (RS) that, in response to a unique request from a server node, selects certain revoked certificates from a current CRL to include in its reply so as to consume minimal system bandwidth. The unique request includes a number of parameters for consideration by the RS in generating its reply, including a maximum CRL size and/or a timestamp. The maximum CRL size indicates the largest number of revoked certificate serial numbers that the server node can process and thus receive in the revocation service reply, whereas the timestamp indicates the latest certificate revocation date of the certificates included in the CRL presently retained by the server node. Significantly, the RS generates an optimal CRL for its reply that contains all, part, or none of the current CRL revoked certificate serial numbers. Determination of the optimal CRL entails consideration of any number and combination of optimization factors, including the number of revoked certificates stored in the CRL storage facility and the time remaining before the current CRL is to be updated by a certificate authority (CA), the expiration date of the certificates, as well as the maximum CRL size and/or timestamp parameters provided to the RS in the server node request. The server node may control whether it will receive an optimal CRL and if so, what portion of the current CRL it will include by manipulating the parameters it provides to the RS. This enables each server node to request the CRL based upon its own specific security needs while optimizing the certificate revocation process. Further, the RS and/or server node may discard certificate serial numbers as their expiration dates come to pass.
摘要:
A method of transferring foreign protocol information across a hierarchical backbone network is disclosed. The hierarchical backbone network operates according to a first protocol and includes multiple areas, some of which have a destination that operates according to a second protocol. Additionally, each area has at least one router located therein. The locations of the destinations in each area are identified to the router in that area. Information that identifies the locations of the destinations in each area is transferred to a router in each of the other areas regardless of whether the destinations are located in the same area as the router. Finally, information formatted according to the second protocol is transferred among any of the destinations.
摘要:
A frame having a desired destination address written into the destination address field of the frame is transmitted onto a first communications system, the frame is received by the apparatus, the frame is transmitted by the apparatus onto a second communications system with a second destination address written into the destination address field of the second frame, and also the desired destination address is written into a predetermined field of the second frame along with an indicator. The indicator is capable if being interpreted by a receiving station to mean that the desired destination address is written into the predetermined field of the second frame.
摘要:
A communications system is disclosed, having a first communications link, a second communications link, a first end station attached to said first communications link, a first packet forwarding apparatus attached to the first communications link, a second end station attached to the second communications link, and a second packet forwarding apparatus attached to the second communications link. Each packet forwarding apparatus routes packets it receives having destination address equal to a data link destination address of the apparatus, and bridges all other received packets. When the first end station wishes to send a packet to the second end station, it first transmits an ARP request message to learn the data link address of the second end station. The first apparatus receives the ARP (Address Resolution Protocol) request message, and determines that the end station for which a data link address is requested is attached to a remote communications link. The first apparatus requests the second apparatus to transmit an ARP request message to determine the second station's address, and to relay the ARP response back to the first apparatus. When the first apparatus receives the ARP response, it forwards the response to the first end station. The first end station transmits subsequent packets to the second end station, using the data link address of the second end station as a data link destination address. These subsequent packets can be bridged by any intermediary apparatus between the first end station and the second end station.
摘要:
Methods and apparatus for automatically assigning LAN numbers to LANs in a network comprised of LANs and bridges connected to LANs. The bridges associate the LANs with LAN numbers and each LAN is related to one of the bridges. A central database links each LAN (identified by LAN number) to the identity of its related bridge and the port of that bridge which is connected to the LAN. To obtain a LAN number for a given LAN, the bridge related to the given LAN transmits a request identifying the related bridge and the port of the related bridge which is connected to the given LAN. In response, a LAN number which has not been associated with any LAN other than the given LAN is selected and included in a response which is sent back to the requesting bridge. The requesting bridge then transmits LAN number identification messages incorporating the selected LAN number to the other bridges on the given LAN.
摘要:
Use of a multicast address in a LAN, where the LAN does not support an adequate multicast address space, is implemented. An apparatus is provided for delivering a multicast address to a station on a local area network, where the local area network does not support the multicast address. The frame is transmitted onto the local area network, where the frame has: a predetermined field containing a reference to the multicast address; an indicator, the indicator capable of being interpreted by a receiving station to mean that the multicast address may be recovered from the frame by parsing the frame; and an applications program may be executed in response to the multicast address. Also, the apparatus may have a receiving station capable of receiving the frame, and an applications program may be executed in the receiving station in response to the multicast address.