摘要:
A method and apparatus for providing access control to objects in a distributed network directory employing static resolution to resolve object attributes. A first object has a Security Equals attribute and a second object has an Equivalent To Me attribute. Upon receiving a request for the first object to access the second object, authorization of such access is verified by checking if the two attributes are synchronized. The attributes are synchronized when the Security Equals attribute of the first object includes the second object, and the Equivalent To Me attribute of the second object includes the first object. A method of synchronizing the two attributes is also disclosed.
摘要翻译:一种用于提供对使用静态分辨率解析对象属性的分布式网络目录中的对象的访问控制的方法和装置。 第一个对象具有Security Equals属性,第二个对象具有“等价对象”属性。 在接收到第一对象访问第二对象的请求时,通过检查两个属性是否同步来验证这种访问的授权。 当第一个对象的Security Equals属性包含第二个对象时,属性将同步,而第二个对象的Equivalent To Me属性包含第一个对象。 还公开了一种使两个属性同步的方法。
摘要:
A method of providing authoritative access control to computer networks that employs a distributed network directory using a static means of resolving object attributes is disclosed. The method employs the existing directories and an authentication procedure for each server. A first object that is under the physical control of the administrator of one partition of the distributed network directory requests access to a second object that is under the physical control of the administrator of another partition of the distributed network directory. The directory verifies that the access control list of the first object includes the second object. The access control list of the second object is then checked to verify that it includes a reference to the first object as an object that is permitted access to the second object. As a result, access is only granted in response to requests from objects that appear in the access control list of the second object. A method of synchronizing the access control lists based upon an authoritative access control list is also disclosed.
摘要:
A technique for transitioning streamed digital video content between stream servers involves identifying a transition identifier that indicates a point at which streaming of the digital video content transitions from a first stream server to a second stream server and then transitioning the streaming from the first stream server the second stream server at a point in the digital video content that corresponds to the transition identifier. For example, the first stream server stops streaming the digital video content at a point in the digital video content that corresponds to the transition identifier and the second stream server starts streaming the digital video content at a point in the digital video content that corresponds to the transition identifier.
摘要:
A technique for transitioning streamed digital video content between stream servers involves identifying a transition identifier that indicates a point at which streaming of the digital video content transitions from a first stream server to a second stream server and then transitioning the streaming from the first stream server the second stream server at a point in the digital video content that corresponds to the transition identifier. For example, the first stream server stops streaming the digital video content at a point in the digital video content that corresponds to the transition identifier and the second stream server starts streaming the digital video content at a point in the digital video content that corresponds to the transition identifier.
摘要:
The present invention provides a method and apparatus for message packet authentication to prevent the forging of message packets. After a message packet is created, a secret session key is preappended to the message, and a message digesting algorithm is executed on the altered message to create a message digest. A portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire. The receiving station strips the signature from the message, preappends the same secret session key and creates its own message digest. The signature of the digest created by the receiving station is compared to the signature of the digest appended by the sending station. If there is a match, an authentic message is assumed. If there is no match, the message is considered as invalid and discarded. An advantage of the present invention is that the session key is never transmitted over the wire. The receiving station (server) already has the key and uses the key along with the message data to recalculate the message digest upon receiving the packet. The shared secret key (session key) is generated during initiation of the NCP session. In addition, cumulative state information is maintained by both the sending station and the receiving station. This state information is also used to authenticate messages.
摘要:
The present invention provides a method and apparatus for message packet authentication to prevent the forging of message packets. After a message packet is created, a secret session key is preappended to the message, and a message digesting algorithm is executed on the altered message to create a message digest. A portion of the message digest, referred to as the signature, is then appended to the actual message when it is sent over the wire. The receiving station strips the signature from the message, preappends the same secret session key and creates its own message digest. The signature of the digest created by the receiving station is compared to the signature of the digest appended by the sending station. If there is a match, an authentic message is assumed. If there is no match, the message is considered as invalid and discarded. An advantage of the present invention is that the session key is never transmitted over the wire. The receiving station (server) already has the key and uses the key along with the message data to recalculate the message digest upon receiving the packet. The shared secret key (session key) is generated during initiation of the NCP session. In addition, cumulative state information is maintained by both the sending station and the receiving station. This state information is also used to authenticate messages.