摘要:
To validate a certificate of a service provider apparatus, a service receiving apparatus determines a certificate validation method on based on a combination of the performance of the service receiving apparatus, the performance of a CRL repository apparatus, the performance of a certificate validation apparatus, and the performance of a network, and performs validation of a certificate by the determined method. Furthermore, to validate a certificate of a service provider apparatus, a service receiving apparatus requests a method selection apparatus to validate the certificate, and the method selection apparatus determines a certificate validation method based on a combination of the performance of the method selection apparatus, the performance of the CRL repository apparatus, the performance of the certificate validation apparatus and the performance of the network, validates the certificate by the determined method, and notifies a validation result to the service receiving apparatus.
摘要:
A peer-to-peer communication apparatus connected to an IP network acquires, from a peer's communication apparatus, presence information including information for judging a communication security environment of the peer's communication apparatus and a security policy to be applied by the peer's communication apparatus to a packet, displays the presence information and security policy information such that a user can judge the prosperity of the security policy information based on the presence information, and processes a data packet to be transmitted to the peer's communication apparatus in accordance with the security policy approved by the user.
摘要:
Upon issuance of an attribute certificate, an attribute authority apparatus makes a determination policy available. The determination policy includes information designating at least one item to be checked by a service provider apparatus for determination to be made to verify the attribute certificate, and a criterion for the determination. The determination policy may be recorded in the attribute certificate, or released to public, or made available by issuing a determination policy certificate released to public. Information for obtaining the determination policy certificate may be recorded in or outside the attribute certificate and furnished to the service provider apparatus. In order to verify an attribute certificate transmitted from a user terminal, a service provider apparatus obtains the determination policy, and determines whether data in the at least one item designated in the determination policy fulfill the criterion recorded in the determination policy.
摘要:
Presence information is shared between a plurality of applications, to grasp a change of presence information of a different kind of application. An IM(X) server 3 receives a notification of a change of presence information from a client A1 (S902), and sends a change notification message for notifying the change of the presence information to a presence server 5 (S906). Then, the presence server 5 sends the change notification message received from the IM(X) server 3 to the IM(Y) server 4 (S908). The IM(Y) server 4 sends the change notification message received from the presence server 5 to a client B2 (S910).
摘要:
In an IP packet communication apparatus, an operation and maintenance function capable of monitoring a transmission path is provided to a layer used to process a packet, which corresponds to an upper layer of an optical network. As one method for applying the operation and maintenance function to the packet layer, in the case of IP over PPP over WDM, an operation/maintenance frame is defined to a PPP frame so as to realize the operation/maintenance function of a PPP connection. In the case that a plurality of connections are multiplexed on the same transmission path, a maintenance frame is conducted in order to operate/manage these connections by being grouped, so that a fault occurring in the optical network is monitored. As another method for applying the operation and maintenance function to the packet layer, an operation/maintenance frame is defined to an IP packet so as to realize an operation and maintenance function of an IP flow. Also, since a plurality of flows are multiplexed on the same transmission path, a management packet is defined to operate/manage these flows to be grouped, so that a fault occurring the in the optical network is monitored.
摘要:
To analyze the cause if an event occurred to a plurality of monitoring targets. A monitoring computer 101 includes a general rule storing part 136 configured to store a general rule, wherein the general rule previously associates a first event which can occur in any of the plurality of monitoring targets and a second event which can cause the first event, an correlation rule generating part 129 configured to generate an correlation rule, wherein the correlation rule is created based on the general rule and configuration information, and in the case where a predetermined number or more of events corresponding to the second events are detected, the correlation rule indicates that an event corresponding to the first event will occur, and an analyzing part 125 configured to analyze a cause of an event indicated by the event information based on received event information and the correlation rule.
摘要:
A session management server, which is provided with a service determination table having a plurality of entries each indicating a service identifier in association with possible particular items of information which may be extracted from a session setup request packet, receives a session setup request packet issued from a client to a particular application server and determines whether the client terminal is authorized to receive an information service by referring to the determination table, in place of the particular application server. When the determination results in success, the session setup request packet is forwarded to the particular application server.
摘要:
Provided is a computer system including: a first computer; a second computer including a second processor and a second memory; and a communication controller for controlling communication between the first and second computers, in which: upon reception of a packet from the first computer, the communication controller translates address information of the received packet to transfer the packet to the second computer; the second memory stores SA candidate information as SA information in which a part of the address information is unknown; and the second processor decrypts the packet encrypted by the first computer by using the SA candidate information upon reception of the encrypted packet from the first computer, and creates SA information based on the SA candidate information used for the decryption and the address information of the encrypted packet upon successful decryption of the encrypted packet.
摘要:
A method serves to compose a VPN (Virtual Private Network) over a plurality of networks, each of which is managed by a different Internet Service Provider (ISP). When a packet with a first capsule header used for composing a VPN in a first ISP network is transmitted to a second ISP network, a route for outputting the packet to the second ISP network is determined based on the information both in the capsule header and in the IP header. In addition, a second capsule header used for composing a VPN in the second ISP network is determined based on the above information.
摘要:
A secure storage system for securely accessing a storage device on a network and improving volume management scalability, consisting of a client having a VPN capability; a storage device in an SAN; a management apparatus having a means for managing a storage capacity and a logical volume allocated to the storage device; a converter for converting a protocol used in the SAN to a protocol used in a LAN/MAN/WAN and vice versa; and a conversion apparatus having the VPN capability. A VPN is provided between the client and the conversion apparatus. The conversion apparatus is provided with a mapping between the VPN and an access range of the storage device. A VPN-ID is used for identifying the VPN. An address in the logical volume is used for the access range of the storage device.