Abstract:
A method and device for providing a certificate to an item of equipment in an “edge computing” environment, which may be deployed in distributed infrastructures and in which equipment may be reconfigured, suspended, removed, reactivated or even reassigned to another master node depending on the requirements to be met. The method and device for providing a certificate make it possible, by reusing components that are already present in a communication network, to reliably authenticate such an item of equipment by providing it with a certificate the integrity of which cannot be called into question since a trusted third party that issued the certificate is an operator managing the communication network.
Abstract:
Controlling operations in a network having multiple multi-access edge computing architectures is disclosed. A method for controlling a service application in a multi-access edge computing network, the network including a plurality of interconnected entities, includes controlling, by a platform module comprised in a first entity of the plurality, an execution of a service application installed in a second entity of the plurality, by means of a proxy function comprised in the second entity, the second entity being distinct from the first entity.
Abstract:
In some existing naming identifier resolution solutions, a resolver obtains network addresses of servers associated with a naming identifier to be resolved and located in a third-party network that is not managed by an Internet service provider for which a user of a terminal has subscribed to a service offering. This impacts the resource management of communication devices managed by the Internet service provider and involved in the resolution of naming identifiers that are not used in an optimum manner. The method allows a third-party company to delegate the naming identifier resolution performed by resolvers of the third-party company to web servers managed by an Internet service provider. Delegating the naming identifier resolution to these web servers makes it possible to reduce costs linked to naming identifier resolution and also exhibits improved performance.
Abstract:
A method for requesting proof of delegation for delivery of content to a client terminal via an encrypted connection. The content is referenced on a content server, to which the client terminal emitted a request to obtain the content. The content server has delegated the delivery of the content to a primary delivery server. The method is implemented by a secondary delivery server, to which the primary delivery server has delegated the delivery of the content. The method includes: receiving a request to establish an encrypted connection, from the client terminal, including an identifier of the content server; emitting a request for proof of delegation of delivery, addressed to the content server; receiving of a message from the content server, including an encryption key; emitting a response for establishing an encrypted connection, addressed to the client terminal; and establishing the encrypted connection with the client terminal using the encryption key.
Abstract:
Methods for validating delivery of content and verifying a delegation of delivery of a content, and corresponding devices and computer program products. A method is proposed for validating a delivery of a content to a client terminal. Such a method includes receiving, by the client terminal, an address, referred to as the received address, in response to a request sent to an address server in order to obtain an address of a delivery server of the content. The request includes a piece of information relating to the delivery server. Such a method further includes receiving, by the client terminal, a piece of information relating to an authentic address associated with the delivery server, the information being sent by a server of the content supplier, and determining the validity of the received address with respect to the authentic address on the basis of the information relating to the authentic address.
Abstract:
One embodiment relates to a method for obtaining, in a communication network, a routing policy indicating rules for routing requests emitted by a software module running on a client device. The method comprises sending, by the client device, a connection request to an authentication server of the communication network in order to attach the client device to the communications network- and receiving, by the client device, a connection context response from the authentication server. The context comprises an identifier of a system for managing routing rules. The software module obtains the routing policy in accordance with at least one first rule for routing to a proxy system certified by the operator of the communications network obtained by means of the identifier.
Abstract:
A method for caching a piece of content in a content distribution network of a first network, a browser module running on a user terminal and allowing access to content by using encrypted sessions, the browser module being associated with a proxy server of a second network interconnected with the first network, the proxy server controlling a current session status between the browser module and a content provider. The method includes: the browser module sending a request relating to the content to the content provider; the proxy server obtaining a piece of information relating to the request; the browser module receiving the requested content; and the proxy server commanding the browser module to cache the content in the content distribution network.
Abstract:
The invention relates to a method for controlling service request routing, said method including the following steps and being implemented by a server providing said service: receiving the service request; verifying that the request was received from a proxy server in charge of controlling requests for said service; and, when said request has not been received from a proxy server in charge of controlling requests for said service, transmitting said service request to at least one proxy server in charge of controlling requests for said service.
Abstract:
A method for signaling a piece of congestion information regarding a first data stream routed by a first node in a network. The method includes the following acts implemented by a second node via which the first data stream and at least a second data stream are routed: obtaining a piece of congestion information regarding the second data stream, the congestion information indicating that a third node, via which the first data stream is routed, has detected a congestion situation for a routing of the second stream in a data transfer plane; checking that the first data stream has a priority level lower than that of the second data stream; and sending, to the first node, a control message in a control plane, the control message carrying the congestion information.
Abstract:
A method for routing data of a session initialized between a terminal and a server, over a first network slice corresponding to a set of data-processing functions of a communication infrastructure, implemented by the terminal. This method includes receiving from the server at least one routing identifier determined as a function of at least one communication parameter of the session, configuring session information as a function of the at least one identifier received, and emitting to the server subsequent data routed over at least one second slice corresponding to the configured information.