Abstract:
PROBLEM TO BE SOLVED: To provide a method and a device for promoting an efficient constitution of a higher hierarchy topology to a physical ATM(Asynchronous Transfer Mode) network topology, concerning a protocol information management of a PNNi (inter-private network interface) network. SOLUTION: A PAR PTSE received from a network is checked by a device 1 for dealing with PAR of the network and redundant protocol information capsuled in the PAR PTSE is identified. Next, the protocol information of the received PAR PTSE is provided to a protocol device related to the device 1 for dealing with PAR. As one execution example, protocol information identified as redundant is excluded from protocol information to be provided to the protocol device. As the other execution example, the protocol information to be provided to the protocol device is tagged and the redundant protocol information is distinguished from non-redundant protocol information. Thus, the efficient constitution of a network topology concerning the relevant protocol is promoted.
Abstract:
Described is a method for managing flow of protocol information in a node of a hierarchical network in which the protocol information is communicated between network nodes in topology state elements. The method comprises checking topology state elements generated by the node to identify protocol information encapsulated therein, and selectively allowing transmittal of the topology state elements from the node to lower levels of the network based on the protocol information identified.
Abstract:
A key identifier that identifies a cryptographic key is transmitted to a cryptographic coprocessor. A first set of attributes is received from the cryptographic coprocessor. The first set of attributes and a second set of attributes are serialized into a first sequence of attributes. The first sequence of attributes are stored to an attribute frame. One or more attributes in the second set of attributes are associated with the cryptographic key and originate from a key attribute storage of the key management system. The second set of attributes is different from the first set of attributes. The first sequence of attributes is transmitted to the cryptographic coprocessor. A first message authentication code (MAC) calculated from the first sequence of attributes is received from the cryptographic coprocessor. The attribute frame is verified by comparing the first MAC, or a value derived from the first MAC, to a reference value.
Abstract:
Verfahren zum Ermöglichen des Prüfens von digitalen Signaturen, das in einem computergestützten System (1) umgesetzt wird, das einen Server (10) aufweist, der mit Anwendungen (A, B, C) Daten austauscht, und das die folgenden Schritte an dem Server (10) aufweist:- Empfangen (S13) einer oder mehrerer von einer oder mehreren der Anwendungen ausgegebenen Signaturanforderungen (ai, bi, ci) an dem Server (10);- Zentrales Zuteilen und Weiterleiten (S14) durch den Server (10) von ersten Daten, die den empfangenen Signaturanforderungen entsprechen, an eine oder mehrere Signiereinheiten (Sig1-4) zum anschließenden Signieren der ersten Daten;- Speichern (S16) eines aktualisierten Systemzustands (sn+1), der unter Verwendung einer Funktion aus Folgendem berechnet (S15) wurde:- einem Bezugssystemzustand (sn); und- zweiten Daten (ai, bi, ci, Ai, Bi, Ci), die den empfangenen Signaturanforderungen entsprechen, wobei der Bezugssystemzustand und der aktualisierte Systemzustand die Signaturanforderungen bestätigen; und- Wiederholen der obigen Schritte (S13 bis S16) unter Verwendung des aktualisierten Systemzustands (sn+1) als neuen Bezugssystemzustand.
Abstract:
Methods and apparatus are provided for managing protocol information in a PNNI hierarchical network. In a PAR-enabled device ( 1 ) of the network PAR PTSEs received by the PAR-enabled device ( 1 ) from the network are checked to identify redundant protocol information encapsulated in the PAR PTSEs. Protocol information in received PAR PTSEs is then supplied to a protocol device associated with the PAR-enabled device ( 1 ). In some embodiments, protocol information identified as redundant is excluded from the protocol information supplied to the protocol device. In other embodiments, the protocol information supplied to the protocol device is tagged to distinguish redundant protocol information from non-redundant protocol information. This facilitates efficient configuration of the network topology for the protocol in question.
Abstract:
A method for providing a user device with a set of access codes comprises, in the user device, storing an encryption key a an identification code, and sending a message containing the identification code to a server via a communications network. In the server, an encryption key is stored corresponding to the key stored in the user device, allocating the set of access codes on receipt of the identification code from the user device. A look up function is performed based on the identification code received in the message to retrieve the key from storage. The set of access codes is encrypted using the retrieved key to produce an encrypted set. A message containing the encrypted set is sent to the user device via the network. In the user device, the encrypted set received from the server is decrypted using the key in storage, and storing the decrypted set of access codes for use by a user of the user device.
Abstract:
A key identifier that identifies a cryptographic key is transmitted to a cryptographic coprocessor. A first set of attributes is received from the cryptographic coprocessor. The first set of attributes and a second set of attributes are serialized into a first sequence of attributes. The first sequence of attributes are stored to an attribute frame. One or more attributes in the second set of attributes are associated with the cryptographic key and originate from a key attribute storage of the key management system. The second set of attributes is different from the first set of attributes. The first sequence of attributes is transmitted to the cryptographic coprocessor. A first message authentication code (MAC) calculated from the first sequence of attributes is received from the cryptographic coprocessor. The attribute frame is verified by comparing the first MAC, or a value derived from the first MAC, to a reference value.
Abstract:
The invention is notably directed to methods and systems for enabling digital signature auditing (S41). The methods are implemented in a computerized system (1) comprising a server (10) communicating with applications (A, B, C), and comprising, at the server, steps of: - receiving (S13) one or more signature requests (a i, b i, c i ) issued by one or more of the applications; - forwarding (S14) first data corresponding to the received signature requests to one or more signing entities (Sig 4 ) for subsequent signature of the first data; - storing (S16) an updated system state (s n+ ), computed (S15) using a function of: - a reference system state (s n ); and - second data (a i, b i, c i, A i, B i, C i ) corresponding to the received signature requests, whereby the reference system state and the updated system state attest to 1 the signature requests; and - repeating the above steps (S12 S16), using the updated system state (s n+ ) as a new reference system state.
Abstract:
Described is a method for managing flow of protocol information in a node of a hierarchical network in which the protocol information is communicated between network nodes in topology state elements. The method includes checking topology state elements generated by the node to identify protocol information encapsulated therein, and selectively allowing transmittal of the topology state elements from the node to lower levels of the network based on the protocol information identified.
Abstract:
Described is a method for managing flow of protocol information in a node of a hierarchical network in which the protocol information is communicated between network nodes in topology state elements. The method includes checking topology state elements generated by the node to identify protocol information encapsulated therein, and selectively allowing transmittal of the topology state elements from the node to lower levels of the network based on the protocol information identified.