PROTOCOL INFORMATION MANAGEMENT FOR INTER-PRIVATE NETWORK INTERFACE HIERARCHY NETWORK

    公开(公告)号:JP2002051083A

    公开(公告)日:2002-02-15

    申请号:JP2001173974

    申请日:2001-06-08

    Applicant: IBM

    Abstract: PROBLEM TO BE SOLVED: To provide a method and a device for promoting an efficient constitution of a higher hierarchy topology to a physical ATM(Asynchronous Transfer Mode) network topology, concerning a protocol information management of a PNNi (inter-private network interface) network. SOLUTION: A PAR PTSE received from a network is checked by a device 1 for dealing with PAR of the network and redundant protocol information capsuled in the PAR PTSE is identified. Next, the protocol information of the received PAR PTSE is provided to a protocol device related to the device 1 for dealing with PAR. As one execution example, protocol information identified as redundant is excluded from protocol information to be provided to the protocol device. As the other execution example, the protocol information to be provided to the protocol device is tagged and the redundant protocol information is distinguished from non-redundant protocol information. Thus, the efficient constitution of a network topology concerning the relevant protocol is promoted.

    MANAGEMENT OF PROTOCOL INFORMATION IN PNNI HIERARCHICAL NETWORKS
    2.
    发明申请
    MANAGEMENT OF PROTOCOL INFORMATION IN PNNI HIERARCHICAL NETWORKS 审中-公开
    PNNI分层网络中的协议信息管理

    公开(公告)号:WO02054687A2

    公开(公告)日:2002-07-11

    申请号:PCT/IB0102598

    申请日:2001-12-20

    CPC classification number: H04Q11/0478 H04L2012/5621 H04L2012/5623

    Abstract: Described is a method for managing flow of protocol information in a node of a hierarchical network in which the protocol information is communicated between network nodes in topology state elements. The method comprises checking topology state elements generated by the node to identify protocol information encapsulated therein, and selectively allowing transmittal of the topology state elements from the node to lower levels of the network based on the protocol information identified.

    Abstract translation: 描述了一种在分层网络的节点中管理协议信息流的方法,其中在拓扑状态元素中的网络节点之间传送协议信息。 该方法包括:检查由节点生成的拓扑状态元素以识别封装在其中的协议信息,并且基于所识别的协议信息,选择性地允许将拓扑状态元素从网络的节点传输到较低级别。

    Key attribute verification
    3.
    发明专利

    公开(公告)号:AU2021252200B2

    公开(公告)日:2024-05-02

    申请号:AU2021252200

    申请日:2021-03-17

    Applicant: IBM

    Abstract: A key identifier that identifies a cryptographic key is transmitted to a cryptographic coprocessor. A first set of attributes is received from the cryptographic coprocessor. The first set of attributes and a second set of attributes are serialized into a first sequence of attributes. The first sequence of attributes are stored to an attribute frame. One or more attributes in the second set of attributes are associated with the cryptographic key and originate from a key attribute storage of the key management system. The second set of attributes is different from the first set of attributes. The first sequence of attributes is transmitted to the cryptographic coprocessor. A first message authentication code (MAC) calculated from the first sequence of attributes is received from the cryptographic coprocessor. The attribute frame is verified by comparing the first MAC, or a value derived from the first MAC, to a reference value.

    System zum Ermöglichen des Überprüfens von digitalen Signaturen

    公开(公告)号:DE112012000770B4

    公开(公告)日:2021-02-18

    申请号:DE112012000770

    申请日:2012-02-22

    Applicant: IBM

    Abstract: Verfahren zum Ermöglichen des Prüfens von digitalen Signaturen, das in einem computergestützten System (1) umgesetzt wird, das einen Server (10) aufweist, der mit Anwendungen (A, B, C) Daten austauscht, und das die folgenden Schritte an dem Server (10) aufweist:- Empfangen (S13) einer oder mehrerer von einer oder mehreren der Anwendungen ausgegebenen Signaturanforderungen (ai, bi, ci) an dem Server (10);- Zentrales Zuteilen und Weiterleiten (S14) durch den Server (10) von ersten Daten, die den empfangenen Signaturanforderungen entsprechen, an eine oder mehrere Signiereinheiten (Sig1-4) zum anschließenden Signieren der ersten Daten;- Speichern (S16) eines aktualisierten Systemzustands (sn+1), der unter Verwendung einer Funktion aus Folgendem berechnet (S15) wurde:- einem Bezugssystemzustand (sn); und- zweiten Daten (ai, bi, ci, Ai, Bi, Ci), die den empfangenen Signaturanforderungen entsprechen, wobei der Bezugssystemzustand und der aktualisierte Systemzustand die Signaturanforderungen bestätigen; und- Wiederholen der obigen Schritte (S13 bis S16) unter Verwendung des aktualisierten Systemzustands (sn+1) als neuen Bezugssystemzustand.

    5.
    发明专利
    未知

    公开(公告)号:DE60131047D1

    公开(公告)日:2007-12-06

    申请号:DE60131047

    申请日:2001-04-17

    Applicant: IBM

    Abstract: Methods and apparatus are provided for managing protocol information in a PNNI hierarchical network. In a PAR-enabled device ( 1 ) of the network PAR PTSEs received by the PAR-enabled device ( 1 ) from the network are checked to identify redundant protocol information encapsulated in the PAR PTSEs. Protocol information in received PAR PTSEs is then supplied to a protocol device associated with the PAR-enabled device ( 1 ). In some embodiments, protocol information identified as redundant is excluded from the protocol information supplied to the protocol device. In other embodiments, the protocol information supplied to the protocol device is tagged to distinguish redundant protocol information from non-redundant protocol information. This facilitates efficient configuration of the network topology for the protocol in question.

    6.
    发明专利
    未知

    公开(公告)号:DE60307498T2

    公开(公告)日:2007-09-13

    申请号:DE60307498

    申请日:2003-10-24

    Applicant: IBM

    Abstract: A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.

    Key attribute verification
    7.
    发明专利

    公开(公告)号:AU2021252200A1

    公开(公告)日:2022-07-28

    申请号:AU2021252200

    申请日:2021-03-17

    Applicant: IBM

    Abstract: A key identifier that identifies a cryptographic key is transmitted to a cryptographic coprocessor. A first set of attributes is received from the cryptographic coprocessor. The first set of attributes and a second set of attributes are serialized into a first sequence of attributes. The first sequence of attributes are stored to an attribute frame. One or more attributes in the second set of attributes are associated with the cryptographic key and originate from a key attribute storage of the key management system. The second set of attributes is different from the first set of attributes. The first sequence of attributes is transmitted to the cryptographic coprocessor. A first message authentication code (MAC) calculated from the first sequence of attributes is received from the cryptographic coprocessor. The attribute frame is verified by comparing the first MAC, or a value derived from the first MAC, to a reference value.

    System for enablng digital signature auditing

    公开(公告)号:GB2501645A

    公开(公告)日:2013-10-30

    申请号:GB201313687

    申请日:2012-02-22

    Applicant: IBM

    Abstract: The invention is notably directed to methods and systems for enabling digital signature auditing (S41). The methods are implemented in a computerized system (1) comprising a server (10) communicating with applications (A, B, C), and comprising, at the server, steps of: - receiving (S13) one or more signature requests (a i, b i, c i ) issued by one or more of the applications; - forwarding (S14) first data corresponding to the received signature requests to one or more signing entities (Sig 4 ) for subsequent signature of the first data; - storing (S16) an updated system state (s n+ ), computed (S15) using a function of: - a reference system state (s n ); and - second data (a i, b i, c i, A i, B i, C i ) corresponding to the received signature requests, whereby the reference system state and the updated system state attest to 1 the signature requests; and - repeating the above steps (S12 S16), using the updated system state (s n+ ) as a new reference system state.

    9.
    发明专利
    未知

    公开(公告)号:DE60111083T2

    公开(公告)日:2006-05-04

    申请号:DE60111083

    申请日:2001-12-20

    Applicant: IBM

    Abstract: Described is a method for managing flow of protocol information in a node of a hierarchical network in which the protocol information is communicated between network nodes in topology state elements. The method includes checking topology state elements generated by the node to identify protocol information encapsulated therein, and selectively allowing transmittal of the topology state elements from the node to lower levels of the network based on the protocol information identified.

    Management of protocol information in pnni hierarchical networks

    公开(公告)号:AU2002222383A1

    公开(公告)日:2002-07-16

    申请号:AU2002222383

    申请日:2001-12-20

    Applicant: IBM

    Abstract: Described is a method for managing flow of protocol information in a node of a hierarchical network in which the protocol information is communicated between network nodes in topology state elements. The method includes checking topology state elements generated by the node to identify protocol information encapsulated therein, and selectively allowing transmittal of the topology state elements from the node to lower levels of the network based on the protocol information identified.

Patent Agency Ranking