摘要:
A device is dedicated to assigning prefixes for network equipments of an Internet Protocol communication network. It comprises processing means which, in the event of a request to assign a prefix of length L(Rk) for a network equipment Rk, determine a node Nj associated with an unallocated prefix Pj of length L(Pj) equal to L(Rk)−m, m≧0, in order to assign that prefix to the network equipment Rk if the value of m is equal to 0 or, if the value of m is greater than 0, to perform successively m loops each consisting in fragmenting the current prefix P into two prefixes P1 and P2 with lengths equal to L(P)+1 and then select one of the two prefixes P1 and P2 as the current prefix for the next loop, until there are obtained in the last of the m loops two prefixes with lengths equal to L(Rk), followed by the selection of one of them for assignment to the network equipment Rk.
摘要:
A method is dedicated to dynamically assigning interface network identifiers for interfaces of network equipments connected to an Internet Protocol communication network including a DHCP network identifier server. In this method, when a network equipment requires an interface network identifier for one of its interfaces, designated by an interface identifier and connected to a link: i) there is generated in the network equipment and sent to the server a request for the assignment of an interface network identifier specifying the identifier of the interface that is the subject of the request and the identifiers of the other interfaces connected to the link; ii) on receipt of the request in the server, there is determined for the interface that is the subject of the request an interface network identifier common to all the interfaces connected to the same link; iii) the interface network identifier thus determined is sent to the network equipment that requested it so that it can configure the interface.
摘要:
A technique is provided for detecting unauthorized use or abnormal activities of a targeted system of a network. The technique includes a comparison of captured data that relates to a targeted system with attack signatures to generate a security alert when the captured data and an attack signature match, a comparison of assurance metrics data from a monitored targeted perimeter with assurance references to generate assurance information when the assurance metrics data and an assurance reference match, a generation of a verified security alarm when the security alert and associated preconditions match a corresponding assurance information, a filtering of the security alert when no match has been found between the associated retrieved preconditions and the corresponding assurance information, and an emitting of a non verified security alert when no preconditions have been retrieved for the security alert and/or no assurance reference corresponding to the preconditions has been defined.
摘要:
The present invention provides a method for detecting the hijacking of computer resources, located on an internal network implementing security and confidentiality criteria specific to this internal network, connected to an external network with no such security and confidentiality criteria, through a connection managed by a service provider, comprising: storing a connection parameter implemented by the computer resources to communicate with the external network; processing the stored parameter based on an irreversible function to generate a unique code that corresponds to said stored parameter but which does not allow the identification of said parameter from the corresponding generated code; and sending said generated code to a server located on the external network so that the server can analyze the activity of the computer resources from said unique code to detect any hijacking of the computer resources.
摘要:
A device (D) is dedicated to controlling the transfer of units of connection time for a communication network (N1) having accounting and/or billing equipment (ABE1). This device (D) includes processing means (PM) that, when they receive a request to transfer a chosen quantity of units of connection time to a beneficiary account associated with the communication identifier of a first communication terminal (BT) connected to a communication network (N1), responsible for accessing a first set of accounting and/or billing equipment (ABE1) managing the account of a donor associated with the communication identifier of a second communication terminal (DT) connected to the communication network (R1), to verify whether the quantity of units of connection time that the donor's terminal (DT) has is at least equal to the chosen quantity, and if so, to order the first set of equipment (ABE1), which also manages the beneficiary's account, to transfer in real time a quantity of units of connection time at most equal to the quantity chosen from the donor's account to the beneficiary's account.
摘要:
A security-procuring method for making an item of communications equipment (E) secure, said item of communications equipment comprising an operating system core (K) and a set of software applications (A), said core including at least one IPv6 protocol stack (PS) making it possible to transmit incoming data packets from an input port (PIN) to an application (A) and to transmit outgoing data packets from an application (A) to an output port (POUT), said protocol stacks including a set of interfaces (HPRE, HIN, HOUT, HPOST) organized to enable external modules connected to them to access said data packets transmitted by said at least one protocol stack at determined points associated with said interfaces. Said method is characterized in that an input module (MIN) and an output module (MOUT) are connected respectively to an input interface (HIN) and to an output interface (HOUT) of said core (K), and in that said modules select, analyze, and, if necessary, modify the data packets of the Network Discovery Protocol (NDP), in compliance with the Secure Neighbor Discovery (SEND) mechanism.
摘要翻译:一种用于使通信设备(E)项目安全的安全采购方法,所述通信设备项目包括操作系统核心(K)和一组软件应用(A),所述核心包括至少一个IPv6协议栈( PS)使得可以将输入数据分组从输入端口(P INL IN)发送到应用(A),并将输出数据分组从应用(A)发送到输出端口(P < SUB> OUT SUB>),所述协议栈包括一组接口(H SUB),H OUT,H OUT, 组织成使得能够连接到它们的外部模块访问由所述至少一个协议栈在与所述接口相关联的确定点处发送的数据分组。 所述方法的特征在于,输入模块(M IN IN IN)和输出模块(M OUT OUT)分别连接到输入接口(H IN IN / SUB>)和所述核(K)的输出接口(H OUT OUT),并且所述模块选择,分析并且如果需要,修改网络发现协议(的数据分组) NDP),符合安全邻居发现(SEND)机制。
摘要:
A gateway (G) between an Internet network (N) and a local network (NL) associated with a building constituted by a plurality of private premises and at least one common area; the common area and at least some of the private premises having multimedia terminals (T1, T2, T3, TP, . . . ) connected to the local network (NL). The gateway is characterized in that it comprises execution means for executing extended services downloaded from a server (S) accessible via said Internet network (N).
摘要:
To control the publication of digital content on a web site managed by a publication server (SP) from a communication terminal (TC1), a control server (SC) capable of communicating with the publication server (SP) and the terminal provide the latter with an application (App) that is downloaded and implemented on the terminal. The application makes it possible to define the control parameters (ParC) associated with the digital content, said parameters comprising a period of validity for the content and a list of web sites authorised to publish the digital content, generate a key (Kc) associated with the digital content, encrypt the digital content with said key, and store the control parameters (ParC), the generated key (Kc), and the encrypted digital content in various databases. The application then generates a reference (Ref) associated with the digital content and requires the publication of the reference by the publication server in place of the digital content.