摘要:
A distributed authentication framework is presented. The framework includes an authentication stack that is created by an authentication server. The server receives an authentication request from an end-user, the request including an authentication domain ID that distinguishes the end-user. The authentication stack has entries that trigger local or remote specific authentication actions providing respective results. When the results are consolidated the authentication status of the end-user is determined.
摘要:
The invention concerns a router associated to a secure device (DC) and included in a communication network (RC), comprising an interface (IRT) to communicate with the secure device following an authentication of the router by the secure device, and comprising a protocol interpreter (INT) to command the execution of the critical operations of one or more routing protocols by the secure device. The sensitive or critical portions of a routing protocol are executed in a secure and reliable manner in the secured device, for example of a chip card type.
摘要:
Communication network security risk exposure management systems and methods are disclosed. Risks to a communication network are determined by analyzing assets of the communication network and vulnerabilities affecting the assets. Assets may include physical assets such as equipment or logical assets such as software or data. Risk analysis may be adapted to assess risks to a particular feature of a communication network by analyzing assets of the communication network which are associated with that feature and one or more of vulnerabilities which affect the feature and vulnerabilities which affect the assets associated with the feature. A feature may be an asset itself or a function or service offered in the network and supported by particular assets, for example.
摘要:
The invention concerns a router associated to a secure device (DC) and included in a communication network (RC), comprising an interface (IRT) to communicate with the secure device following an authentication of the router by the secure device, and comprising a protocol interpreter (INT) to command the execution of the critical operations of one or more routing protocols by the secure device. The sensitive or critical portions of a routing protocol are executed in a secure and reliable manner in the secured device, for example of a chip card type.
摘要:
A distributed authentication framework is presented. The framework includes an authentication stack that is created by an authentication server. The server receives an authentication request from an end-user, the request including an authentication domain ID that distinguishes the end-user. The authentication stack has entries that trigger local or remote specific authentication actions providing respective results. When the results are consolidated the authentication status of the end-user is determined.
摘要:
A virtual security server enabling a set of applications to access a plurality of security services. In response to a service request from a software application, the virtual security server receive service determines which of the security servers is able to provide the requested service. The virtual security server sends to a selected security server data enabling the selected security server to provide the security service corresponding to the service request. Accordingly, communication between the applications and the security servers is simplified because the application are not required to manage negotiation protocols associated with the security servers and choose the security server(s) appropriate for the required service.
摘要:
A system for improving security of management and control functions at a network element in a communications network is described. The control card of the network element is configured to function in association with an execution device such as a smartcard. The execution device has embedded thereon one or several processors each implementing specific security related operations. This limits access to the network element which, in turn, minimizes access to sensitive and confidential information.