DE602004010879D1 - Befehlsverarbeitungssystem durch einen Verwaltungsagenten - Google Patents

Befehlsverarbeitungssystem durch einen Verwaltungsagenten

Info

Publication number
DE602004010879D1
DE602004010879D1 DE200460010879 DE602004010879T DE602004010879D1 DE 602004010879 D1 DE602004010879 D1 DE 602004010879D1 DE 200460010879 DE200460010879 DE 200460010879 DE 602004010879 T DE602004010879 T DE 602004010879T DE 602004010879 D1 DE602004010879 D1 DE 602004010879D1
Authority
DE
Germany
Prior art keywords
processing system
command processing
management agent
management
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
DE200460010879
Other languages
English (en)
Other versions
DE602004010879T2 (de
Inventor
Takahiro Fujita
Yasunori Kaneda
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi Ltd filed Critical Hitachi Ltd
Publication of DE602004010879D1 publication Critical patent/DE602004010879D1/de
Application granted granted Critical
Publication of DE602004010879T2 publication Critical patent/DE602004010879T2/de
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • G06F21/805Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
    • H04L69/322Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
DE200460010879 2004-03-01 2004-03-01 System zur Befehlsverwaltung durch einen Verwaltungsagent Expired - Lifetime DE602004010879T2 (de)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP20040004722 EP1571797B1 (de) 2004-03-01 2004-03-01 Befehlsverarbeitungssystem durch einen Verwaltungsagenten

Publications (2)

Publication Number Publication Date
DE602004010879D1 true DE602004010879D1 (de) 2008-02-07
DE602004010879T2 DE602004010879T2 (de) 2008-12-11

Family

ID=34745961

Family Applications (1)

Application Number Title Priority Date Filing Date
DE200460010879 Expired - Lifetime DE602004010879T2 (de) 2004-03-01 2004-03-01 System zur Befehlsverwaltung durch einen Verwaltungsagent

Country Status (2)

Country Link
EP (2) EP1571797B1 (de)
DE (1) DE602004010879T2 (de)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NO327765B1 (no) * 2007-08-29 2009-09-21 Message Man As Fremgangsmate og et arrangement relatert til sikkerhetsmekanismer for meldingsbaserte elektroniske transaksjoner
CN102710641B (zh) * 2012-05-31 2014-09-10 北京神州绿盟信息安全科技股份有限公司 一种安全配置优化的方法及装置

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0842471A4 (de) * 1995-07-31 2006-11-08 Hewlett Packard Co Verfahren und gerät zum mittelbetrieb unter kontrolle eines sicherheitsmoduls oder eines anderen sicheren prozessors
US6119228A (en) * 1997-08-22 2000-09-12 Compaq Computer Corporation Method for securely communicating remote control commands in a computer network
US7305701B2 (en) * 2001-04-30 2007-12-04 Microsoft Corporation Methods and arrangements for controlling access to resources based on authentication method
US20030115447A1 (en) 2001-12-18 2003-06-19 Duc Pham Network media access architecture and methods for secure storage

Also Published As

Publication number Publication date
EP1571797B1 (de) 2007-12-26
EP1873993A1 (de) 2008-01-02
EP1873993B1 (de) 2012-01-18
DE602004010879T2 (de) 2008-12-11
EP1571797A1 (de) 2005-09-07

Similar Documents

Publication Publication Date Title
FI20040184A0 (fi) Eleidenhallintajärjestelmä
DE602005014721D1 (de) Getrenntes Kontrollnetz für einen Softrouter
DE602005001041D1 (de) Schnappschuss-System
FI20050842A0 (fi) Paikannusmenetelmä hissijärjestelmässä
FI20050361A (fi) Hissijärjestelmä
NO20054549D0 (no) A method and a system for secure transactions
DE602005005873D1 (de) Tür für einen Bahnsteig
DE602005010924D1 (de) Informationsverarbeitung
NO346038B1 (no) Innfanging i frekvensdelt fleraksess-systemer
FI20050130A0 (fi) Hissijärjestelmä
FI20050504A0 (fi) Hissijärjestelmä
DE602004027424D1 (de) Operationsverwaltungsprogramm, operationsverwaltun
DE602005015276D1 (de) Steuersystem für einen Bedienroboter
FI20050960A (sv) Hiss-system
ITMI20062004A1 (it) Dispositivo di comando
DE602005005078D1 (de) Kontaktlose datenschutzvorrichtung
DE502005001451D1 (de) Fugenabdeckprofil
FI20040238A (fi) Tietojenkäsittelyjärjestelmä
DE602005020166D1 (de) Bewegungsführungsvorrichtung
DE602004010879D1 (de) Befehlsverarbeitungssystem durch einen Verwaltungsagenten
ITMO20050284A1 (it) Dispositivo di comando
FR2879415B1 (fr) Epingle a chignon
DE502004005570D1 (de) Mousepad
DE10323822B4 (de) Betriebsverfahren für einen Rechner
DE602004018483D1 (de) Fotopolymerisierbare Zusammensetzung.

Legal Events

Date Code Title Description
8364 No opposition during term of opposition