摘要:
The invention relates to the protection by firewall of a domestic community of interconnectable appliances. The invention allows distributed and totally decentralized management of the firewall policy, implemented at the level of each appliance, which is consistent and adapts dynamically to the changes occurring within the domestic network. We shall speak of ubiquitous firewalls.
摘要:
The invention relates to the protection by firewall of a domestic community of interconnectable appliances.The invention allows distributed and totally decentralized management of the firewall policy, implemented at the level of each appliance, which is consistent and adapts dynamically to the changes occurring within the domestic network. We shall speak of ubiquitous firewalls.
摘要:
A new system for creating and updating a secure community of devices in digital networks is disclosed. A device adapted to belong to a community of networked devices contains; a provable identity and/or means for generating and/or obtaining a provable identity; means adapted to store information about devices of the community having trust relationships with the device; means adapted to store information about devices not trusted by this device; and means for trust relationships synchronization.
摘要:
A method for performing at least one evolution operation in a dynamic, evolutive community of devices in a network comprising at least a first device. The method comprises a step of sending at least one message over the network from the first device to a second device, wherein the first device continues the method without acknowledgement of the at least one message from the second device. The method is suitable for execution on clockless devices. A device for performing the method is also claimed.
摘要:
A method for performing at least one evolution operation in a dynamic, evolutive community of devices in a network comprising at least a first device. The method comprises a step of sending at least one message over the network from the first device to a second device, wherein the first device continues the method without acknowledgement of the at least one message from the second device. The method is suitable for execution on clockless devices. A device for performing the method is also claimed.
摘要:
The present invention concerns a method in a network including at least a first device and a second device, where the sending of a packet by two devices simultaneously generates a collision. The method includes the steps of emitting by the first device a packet comprising a first part, and a second part including at least an identification of a source and a destination of the packet, receiving the first part of the packet by the second device; and in the case of the second device detecting a collision during the reception of the second part of the packet, issuing a packet indicating collision detection by the second device.
摘要:
The present invention relates to IP networks and, more particularly, local area networks, for example home networks. It concerns the manner in which devices connected to such networks obtain and update knowledge of the other compatible devices connected to the network. This method is based on the regular transmission of signalling messages by all the compatible devices. Thus, by monitoring the network, a device is able to detect the other devices in the network.
摘要:
The present invention relates to IP networks and, more particularly, local area networks, for example home networks. It concerns the manner in which devices connected to such networks obtain and update knowledge of the other compatible devices connected to the network. To do this, the invention is based on a finite-state machine, comprising connected, disconnected and standby states. The changes of state take place on receipt of messages, requests or replies from the other devices, or on expiry of timers in the absence of receipt of messages.
摘要:
The present invention relates to IP networks and, more particularly, local area networks, for example home networks. It concerns the manner in which devices connected to such networks obtain and update knowledge of the other compatible devices connected to the network. To do this, the invention is based on a finite-state machine, comprising connected, disconnected and standby states. The changes of state take place on receipt of messages, requests or replies from the other devices, or on expiry of timers in the absence of receipt of messages.
摘要:
A method for discovering emulated clients. A verifier sends a cryptographic challenge C to a client and preferably starts a timer. The client uses a deterministic key search algorithm to find the correct key and returns the result as a number of tries needed. The verifier then stops the timer if this was started and verifies that the result is correct and preferably that the response was timely. Also provided is a verifier.