摘要:
A security system for preventing unauthorized use of a computer device. An extractable security piece includes an extractable main private key and a main PC public key. A PC security area which is a non-extractable part of the computer device includes a PC private key and an extractable main public key, which, together with the keys of the extractable security piece, constitute a Public Key Infrastructure. The extractable security piece and the PC security area include processing means for mutual authentication of the extractable security piece and the PC security area after the extractable security piece, which had been previously removed, has been reinserted in the computer device, thereby enabling the authorized user to access data stored in the computer device.
摘要:
Method of reinitializing dictionaries in a data transmission system using data compression having a transmit device and a receive device, and in which strings of characters have to be transmitted in a compressed form, the transmit device having a transmit dictionary storing codewords associated with the strings of characters which are transmitted instead of the strings of characters, the receive device having a receive dictionary storing codewords associated with the strings of characters, and both dictionaries being updated each time a new string of characters has to be transmitted so that the contents of the dictionaries remain identical. This method saves at least the addresses of the parts of the transmit or receive dictionary which have to be modified by a dictionary updating operation, builds a check message based upon the contents of the transmit dictionary updated by the dictionary updating operation, transmits the check message from the transmit device to the receive device, and then deletes in both dictionaries the parts which are determined by the saved addresses in the event that the check message does not correspond to the contents of the updated receive dictionary. This enables both dictionaries to be reinitialized in an intermediate state without being reset.
摘要:
In a remote computer, a method for providing a file comprises the steps of receiving a request for this file, identifying this file as being stored in a distant server, requesting the distance server to send the file, identifying this file as being used, and forwarding this file. Further, in a local server, a method for transferring a file from a home server comprises the steps of receiving a request for this file, this request comprising the home server identification, checking that this file is not locally stored, requesting this file to the home server, identifying the file as being locally used, and forwarding this file.
摘要:
Method of updating dictionaries in a data transmission system wherein strings of characters have to be transmitted in a compressed form from the transmit device to the receive device, the transmit device having a transmit dictionary storing codewords associated with the strings of characters which are transmitted instead of the strings of characters, the receive device having a receive dictionary storing codewords associated with the strings of characters, both dictionaries being updated each time a new string of characters has to be transmitted so that their contents remain identical. This method stores a value into a specific field of the dictionary location in which the codeword associated with each string of characters is stored, this value corresponding to at least one parameter dependent on the string of characters; accesses a plurality of dictionary locations to determine which location has a value in this specific field which is closest to a target value, deletes the contents of the dictionary location containing the closest value, and uses this dictionary location to store the codeword corresponding to the new string of characters.
摘要:
A process for operating a communication equipment having a set of mechanically connected apparatuses being vertically and horizontally packed. Each apparatus comprises telecommunication functions such as echo cancellation, data compression or ISDN gateway, as well as vertical and horizontal mechanical and communication connections respectively allowing the vertical and horizontal exchanges of frames with neighboring apparatuses. The communication is based on a frame comprising n bytes routing header with n being an integer and an Asynchronous Transfer Mode (ATM) cell.
摘要:
Process for controlling frames transporting data from a transmitting Terminal (DTE 1) to at least a receiving Terminal (DTE 2) through a plurality of consecutive nodes including a start access node (NODE 1) connected to said transmitting Terminal and at least an end access node (NODE 6) connected to said receiving Terminal and intermediary nodes (NODE 2 to NODE 5), with each data frame comprising one or several protocol layers respectively associated with one or several communication protocols of controlling the frame flow at each node; such a process consisting in adding to each data frame a Data Manipulation Layer (DML) defining the parameters necessary for managing the manipulation (compression and/or encryption) of each field of the data frame located after the DML, and adding to each data frame a Control message for transporting a control protocol defining new parameters to be used by some ones nodes for managing the communication flow through the consecutive nodes.
摘要:
Data transmission system for transmitting packets of data from a source workstation (10) to a destination workstation (18) wherein the packets of data are transmitted over at least an IP network (14) between an ingress node (16) connected to the source workstation and an egress node (20) connected to the destination workstation, wherein each router within the intermediary nodes along the data path from the ingress node to the egress node determines the best route in a routing table defined by the contents of a field contained in each packet of data being received. For this, the router of the ingress node comprises a configuration table which defines the contents of the TOS field in function of information associated with the 4/5 level protocol such as TCP or UDP.
摘要:
Method for validating an electronic payment by a credit card in a transaction system comprising a seller terminal (12) for registering a sale of one or several articles by a buyer (10 or 11) using a credit card associated with a plurality of PIN codes and an electronic payment center (14) connected to the seller terminal by the Internet network (16). The method consists for the electronic payment center to check that a buyer PIN code which is provided by the buyer to the center is associated with the number of the credit card provided by the buyer to the seller terminal and is characterized in that it comprises a step automatically carried out by the electronic payment center of checking with a third party whether the buyer PIN code is valid.
摘要:
A method for validating an electronic payment by a credit/debit card in a transaction system. The method includes registering a purchase of an article by a buyer using a credit/debit card associated with at least one PIN code, checking that the at least one PIN code is associated with the number of said credit/debit card provided by said buyer to said seller terminal, checking, by said electronic payment center, whether or not said at least one PIN code is valid, and one of: after the at least one PIN code is found to be valid, checking, by said electronic payment center, whether the electronic payment center has received a pre-validation from a third party; after the at least one PIN code is found to be valid, contacting a third party via a communication network and requesting that the third party validate the purchase; and after the at least one PIN code is found to be valid, contacting a third party via a communication network and requesting said at least one PIN code from the third party. The third party is a prime owner of the credit/debit card.
摘要:
In a token ring network a periodic recirculating frame having a plurality of information carrying slots and a header section is used for enabling a plurality of telephone stations to exchange information carrying signals. The header is provided with a token which can assume one of three states. In the first state FF, a telephone station wanting to make a call, changes the token to the second state 00 and inserts call establishment information in the header. A server station also connected in the ring detects the second state as a request to establish a connection from and to a station specified in the header. The server changes the token to the third state AA and inserts a slot assignment in the header. All stations receiving a frame with a token in the third state examine the header. The calling station implies confirmation of the requested connection and the called station is made aware of the call and the identity of the caller. When this frame returns to the server the token state is set to FF and another station on the ring can request a slot for communication with another station.