EP1723772A2 - Method, system and device for time-delaying a data packet flow - Google Patents
Method, system and device for time-delaying a data packet flowInfo
- Publication number
- EP1723772A2 EP1723772A2 EP05739712A EP05739712A EP1723772A2 EP 1723772 A2 EP1723772 A2 EP 1723772A2 EP 05739712 A EP05739712 A EP 05739712A EP 05739712 A EP05739712 A EP 05739712A EP 1723772 A2 EP1723772 A2 EP 1723772A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- data
- module
- receiver
- software
- transmitter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims description 24
- 238000004458 analytical method Methods 0.000 claims abstract description 11
- 238000012986 modification Methods 0.000 claims abstract description 9
- 230000004048 modification Effects 0.000 claims abstract description 9
- 238000001914 filtration Methods 0.000 claims abstract description 5
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000012545 processing Methods 0.000 claims description 10
- 238000012163 sequencing technique Methods 0.000 description 8
- 238000007689 inspection Methods 0.000 description 7
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 5
- 238000011282 treatment Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000013519 translation Methods 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000010921 in-depth analysis Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000005477 standard model Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/142—Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/564—Enhancement of application control based on intercepted application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
- H04L67/62—Establishing a time schedule for servicing the requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—Architecture of open systems interconnection [OSI] 7-layer type protocol stacks, e.g. the interfaces between the data link level and the physical level
- H04L69/322—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Intralayer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer [OSI layer 7]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/2871—Implementation details of single intermediate entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
Definitions
- the present invention relates to a method and a system applying to a device cut off in a computer network, traversed by a stream of data packets and having the objective of selective analysis and / or modification and / or selective filtering of the data packet stream.
- the method allows the device to achieve these objectives by minimizing the necessary computer resources, memory and / or computing power, while improving the performance of the device.
- the rules (protocol) for circulating data on the Internet are known as Internet Protocol (IP for Internet Protocol, see RFC 791). This protocol is based on the OSI standard model (cf. ISO / IEC 7498-1: 1994).
- the OSI model structures the data passing over the network into 7 layers: Layer 7, or application layer, allows the interface with applications.
- Layer 6, or presentation layer defines the format of the data.
- Layer 5, or session layer defines the opening of sessions on machines on the network.
- Layer 4, or transport layer makes it possible to control the transport of data and to manage errors.
- the TCP protocol (cf. Transmission Control Protocol: RFC 793) is the most common implementation of the transport layer.
- Layer 3, or network layer defines the routing of data.
- Layer 2, or data link layer defines the interface with the network card.
- Layer 1, or physical layer defines how data is converted to digital signals.
- the problem to be solved is therefore to be able to offer systems providing services on the network a means enabling them to provide these services, while retaining the constraint of limiting computer resources and without losing the advantages of the "black boxes" mentioned above. .
- PRIOR ART The solutions adopted today in on-board systems for performing services of the type of those mentioned above, implement a technology called session inspection or “stateful inspection”: a table maintains the list of flows which have been authorized. through the "black box” and these authorized flows can be modified in order to provide the services.
- the analysis of the flow is carried out up to the application layers (layer 5 to 7 of the OSI model), the technology is then called content inspection or "content inspection".
- content inspection content inspection
- the invention which is the subject of this patent makes it possible to solve the problems mentioned above without having the drawbacks of the prior art. It overcomes the problems and limitations of existing technologies by proposing an inventive solution.
- Solution Method The invention relates to a method applying to a device cut off in a computer network and traversed by a stream of data packets.
- the objective of the device is to analyze and / or selectively modify and / or selectively filter the flow of data packets.
- the method allows the device to achieve these objectives by minimizing the necessary computer resources, memory and / or computing power, while improving the performance of the device.
- the method includes a timing step.
- Timing consists in temporarily retaining in the device all or part of the data, in particular data of the application layers, of the flow of data packets which pass through it, in a transparent manner for the sender and the receiver of the flow of data packets, independently timed data and dynamically adapting the size of the timed data to the objectives.
- the device comprises software, a first module, a second module and at least one memory, a part of which is of variable size, hereinafter called the timing window, is intended for timing.
- the timer includes an initial substep for the software to set the size of the time window and initialize the first module and the second module.
- the timer comprises a sub-step for the first module to receive all or part of the packets of the stream.
- the timer includes a sub-step for the first module to replace the receiver with the transmitter for all the information exchange operations with the transmitter that the receiver would have carried out if it had itself carried out the reception, so that the time delay is transparent to the transmitter.
- the timing includes a sub-step for the first module to place in the timing window, all or part of the data, in particular application data, of the packet received by the first module.
- the timing includes a sub-step for the software to be informed that new data is available in the timing window.
- the timing includes a sub-step for the software to analyze and / or to selectively modify and / or to selectively filter the data contained in the timing window.
- the timer comprises a sub-step for the software to inform the second module that data from the timer window are to be transmitted.
- the timer includes a substep for the second module to send the data to be sent to the receiver.
- the method further comprises a substep, for the second module, of replacing the transmitter with the receiver for all the information exchange operations with the receiver that the transmitter would have performed if he had carried out himself the transmission of data, so that the time delay is transparent to the receiver.
- the timer comprises a substep for the second module to inform the first module and / or the software that the data have been sent.
- the timing includes a substep for the software to modify the size of the timing window.
- System The invention also relates to a system which comprises a device cut off in a computer network and traversed by a stream of data packets. The objective of the device is to analyze and / or selectively modify and / or selectively filter the flow of data packets. The device achieves these objectives by minimizing the necessary computer resources, memory and / or computing power, while improving the performance of the device.
- the device includes timing means.
- the timing means temporarily retain in the device all or part of the data, in particular data from the application layer, from the data packet stream, in a manner transparent to the sender and the receiver of the data packet stream, independently of the data. and by dynamically adapting the size of the timed data to the objectives.
- the device comprises software, a first module, a second module and at least one memory, part of which is of variable size, hereinafter called the timing window.
- the device comprises initialization means allowing the software to fix the size of the time window and to initialize the first module and the second module.
- the device comprises reception means allowing the first module to receive all or part of the packets of the stream.
- the first module is intended to replace the receiver with the transmitter for all the information exchange operations with the transmitter that the receiver would have carried out if it had carried out itself on reception, so that the time delay is transparent to the transmitter.
- the first module is intended to place in the time window, all or part of the data, in particular application data, of the packet received by the first module.
- the system is such that the software is informed that new data is available in the time window.
- the software is associated with computer processing means to selectively analyze and / or modify and / or selectively filter the data contained in the time window.
- the system has means allowing the software to inform the second module that data from the time window are to be transmitted.
- the second module comprises means for transmitting the data to be transmitted to the receiver.
- the second module replaces the transmitter with the receiver for all the information exchange operations with the receiver that the transmitter would have carried out if it had carried out the data transmission, so that the timer is transparent to the receiver.
- the system has means allowing the second module to inform the first module and / or the software that the data have been transmitted.
- the software is associated with means for modifying the size of the timing window.
- FIG. 1 represents the general diagram of the invention. interconnection of the system acting in the invention with a computer network.
- the system which is the subject of the present invention applies to a device D placed in cutoff on any computer network R: it may be the Internet, an Intranet network, a home network or even just two posts linked together. Cut means the physical separation of the network R into two subnetworks linked together using the device D. Thus, the entire flow of data packets passing from one subnetwork to the other subnetwork must pass through the device D.
- the purpose of device D is to provide security services on the fly on the flow of FPD data packets which passes through it.
- sender A and receiver B to designate the sender of the FPD data packet stream and the receiver of the FPD data packet stream.
- the services are provided by software L.
- the software L uses specialized "hardware" blocks to perform all or part of the services.
- the device D has a memory ME shared by the software L and by other computer processing carried out by the device D.
- an "anti-spam” service carried out on the mail reception flows e.
- This "anti-spam” service consists in analyzing only the subject field of e-mails and, when an unsolicited mail is identified, in adding the tag "[SPAM]" at the beginning of the subject of the mail in order to inform the 'user. Mail can then be automatically directed to a special mailbox.
- E-mail receipts are carried out on flows following the TCP / IP protocols, that is to say sequenced flows comprising an acknowledgment system ("acknoledgement").
- the acknowledgment system is one of the reliability services offered by TCP: an acknowledgment is generated and sent by the receiver of a message to its sender to signal to the latter that he has received part of the message data. The part of the data well received is designated in the acknowledgment, these are the acknowledged data.
- the subject field of the email is split into two packets, the first containing the "Pu” application data and the next containing the "blicity” application data.
- the software L On receipt of the first packet containing "Pu”, the software L identifies during its analysis (of content inspection type) the presence of the object field. Analysis also shows that this object is not complete. The software L therefore decides to initiate a timing of the flow of FPD data packets. The L software then allocates the time window
- the FT within the ME memory. It sets the size of the FT time window to 50 characters because it is the average size of an email object.
- the software L finally places the data of the application layers of the current packet, that is to say "Pu", in the time window FT.
- the software L also initializes a first module Ml and a second module M2 with the data of the lower layers of the current packet. In accordance with the TCP / IP protocols, this data contains inter alia the IP addresses of receiver B and transmitter A but also a sequencing number (Si) and an acknowledgment number (Al) of the current packet.
- the first module Ml then generates an acknowledgment for the data of the time-delayed packet "Pu" and sends it to the transmitter A: it is capable of generating this acknowledgment since, at its initialization, it has received (SI) and (Al) . It therefore calculates for this acknowledgment, a sequencing number worth (Al) and an acknowledgment number worth: (SI) + the length of the data "Pu".
- the first module M1 uses the IP address of the acknowledgment packet as the IP address of the receiver B so that for the transmitter A it is the receiver B which will appear to have sent the acknowledgment: the timing of the "Pu" packet will be transparent to transmitter A. The timing is then initialized.
- the “blicity” arrives in the device D, it is the first module Ml which receives it. It then generates an acknowledgment for the data of this second packet and sends it to the transmitter A: here again the module M1 is capable of generating this acknowledgment since it is consecutive to that generated during the initialization phase. It therefore calculates for this acknowledgment, a sequencing number worth again (Al) and an acknowledgment number worth: (SI) + the length of the "Advertising" data.
- the first module M1 uses the IP address of the acknowledgment packet as the IP address of the receiver B so that for the transmitter A it is the receiver B which will appear to have sent the acknowledgment.
- the timing of the "blicity" packet will be transparent to the sender A.
- the application data received that is to say,
- the first Ml module places “blicity” in the window, thus reconstituting the "Advertising” object. Finally, it signals to the software L that the time delay window FT contains new data. This can then resume its analysis on the entire "Advertising" subject field and identify unsolicited mail. It then changes the "Advertising" object to "[SPAM] Advertising". The processing of this object being finished, it signals to the second module M2 that all the data of the time delay window FT can be transmitted. The second module M2 then transmits the modified data "[SPAM] Advertising" to receiver B, deletes them from the time window FT and signals to L and to the first module
- the second module is capable of generating a coherent flow towards the receiver B since the sequencing and acknowledgment numbers to be used are those of the "Pu" packet which it received on initialization: (SI) and (A1).
- the addition of the tag "[SPAM]" in the data therefore generates a shift in the overall sequencing of the FPD flow equal to the size of the data added: in fact, at the input of the device D "Advertising” had a sequencing (SI ).
- the chain "Publicity" has a sequencing equal to: (SI) + the size of the tag "[SPAM]".
- the suite of TCP / IP protocols i-n includes a checksum system to guarantee against any modification of the packet data, it is a kind of signature of the packet data inserted in its header (in the OSI layer 4).
- the second module M2 therefore calculates the checksum corresponding to the modified data and inserts it into the generated FPD stream.
- the second module M2 uses the IP address of the transmitter as the transmitter IP address of the acknowledgment packet.
- the time delay will be transparent for the receiver B.
- L receives the information that the data has been sent, it signals to the modules Ml and M2 that the timer has ended and deallocates the timer window FT, thereby freeing up part of the memory ME.
- the rest of the FPD stream coming from the transmitter A will however be modified by the second module M2 in terms of the data of the low layers.
- the sequencing and acknowledgment numbers must continue to be offset by the size of the data that has been added.
- This example clearly shows how easily the present invention allows the system to perform the service.
- This example does not limit the present invention to placing data from the application layers in the FT time window.
- the data placed in the FT time window can come from any OSI layer if necessary.
- This example does not limit the modules M1 and M2 of the present invention to the treatments described in the example.
- the modules M1 and M2 can take care of any processing on the FPD flow, in particular up to the level of the application layers.
- the first module M1 may need to generate application data and send it to the emitter A, to force the emitting application to continue sending the FPD stream to it.
- the modules M1 and M2 each have their own transmission buffer and reception buffer, hereinafter called transmission buffer and reception buffer.
- the first module M1 can place data as soon as space becomes available in the window, that is to say as soon as it receives the information from the second module M2 that data has been released.
- the reception buffer specific to the first module M1 is full, the packets sent by the transmitter A are no longer acknowledged.
- Transmitter A must therefore, according to the rules of the TCP / IP protocol, re-transmit these packets.
- the advantage for the second module M2 is to make asynchronous the release of data from the time delay window FT and the transmission of data to the receiver
- the first module M1 When the third packet, containing "bli" is recreated, the first module M1 then places both the "bli” data and the "cited” data in the time window FT, thus reconstituting the "Advertising" object.
- the continuation of the treatments is identical to that described previously.
- This example clearly shows how easily the present invention allows the system to perform the service even when the FPD data packet flow is out of sequence.
- the first module M1 places data in the time delay window FT, it does not hold account of the distribution in packets that these data followed when they were received. Let us take an example where L fixed the size of the FT time window at 150 bytes.
- the first module M1 receives two packets of 100 bytes of application data, it places in the window the data of the entire first packet and half of the data of the second, thus filling the time window FT. This therefore optimizes the amount of data placed in the window, that is to say the amount of data that can be analyzed by the software L.
- the data of the lower layers corresponding to the timed application data are kept in the form of a linked list. by the system which is the subject of the present invention.
- the software L can modify this linked list. This allows the system to perform services requiring analysis and / or modifications of the lower layers, in particular NAT — PT services (cf. RFC 3022, Traditional IP Network Translater, P. Srisuresh,
- the software L is capable of starting the timing in the middle of the flow of FPD data packets, thus optimizing the processing costs and the amount of memory used at the start of the flow.
- the L software is capable of increasing and / or reducing the size of the FT time window at any time, thus optimizing the amount of memory used.
- the software L is capable of stopping the timer before the end of the stream by completely freeing the timer window FT, thus optimizing the amount of memory used at the end of the FPD stream.
- the time delay is therefore only carried out when it is necessary and uses an adequate amount of memory.
- the reception buffer of the second module M2 can be released: the transmission buffer of the first module M1 then also becomes reception buffer for the second module M2 .
- the software L stops the timer without having ever modified the FPD flow it can signal to the second module M2 that there is no change to. apply low layer data to the rest of the FPD flow, further optimizing processing costs.
- the modules Ml and M2 are made wholly or partly in "hardware".
- the software L has access to blocks
- the present invention allows the system to time out any type of flow, independently of the data of the application layers, that is to say, independently of the application passing through the network R.
- the modules M1 and M2 play symmetrical roles for the processing of the reverse flow to the FPD flow: when the transmitter A becomes receiver and the receiver B becomes transmitter, a new time window FT is created, the first module Ml plays the role of the second module M2 and vice versa.
- the software L can then advantageously link the processing operations on the two inverse flows from one another.
- the system object of the present invention thus allows a device to perform services on a stream of data packets while minimizing the necessary computer resources, memory and / or computing power, while improving the performance of the device. It is therefore particularly suitable for embedded systems, subject to constraints on IT resources for reasons of cost and size.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR0450404A FR2867004B1 (en) | 2004-03-01 | 2004-03-01 | METHOD, SYSTEM AND DEVICE FOR TIMING A STREAM OF DATA PACKETS |
PCT/FR2005/050137 WO2005086455A2 (en) | 2004-03-01 | 2005-03-01 | Method, system and device for time-delaying a data packet flow |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1723772A2 true EP1723772A2 (en) | 2006-11-22 |
Family
ID=34834272
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP05739712A Withdrawn EP1723772A2 (en) | 2004-03-01 | 2005-03-01 | Method, system and device for time-delaying a data packet flow |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP1723772A2 (en) |
FR (1) | FR2867004B1 (en) |
WO (1) | WO2005086455A2 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7761915B2 (en) | 2005-12-28 | 2010-07-20 | Zyxel Communications Corp. | Terminal and related computer-implemented method for detecting malicious data for computer network |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5623600A (en) * | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks |
EP1750384B1 (en) * | 1997-07-24 | 2009-09-30 | Axway Inc. | E-mail firewall |
US6157955A (en) * | 1998-06-15 | 2000-12-05 | Intel Corporation | Packet processing system including a policy engine having a classification unit |
US6693909B1 (en) * | 2000-05-05 | 2004-02-17 | Fujitsu Network Communications, Inc. | Method and system for transporting traffic in a packet-switched network |
US20020133598A1 (en) * | 2001-03-16 | 2002-09-19 | Strahm Frederick William | Network communication |
US7085267B2 (en) * | 2001-04-27 | 2006-08-01 | International Business Machines Corporation | Methods, systems and computer program products for translating internet protocol (IP) addresses located in a payload of a packet |
US9392002B2 (en) * | 2002-01-31 | 2016-07-12 | Nokia Technologies Oy | System and method of providing virus protection at a gateway |
US6801528B2 (en) * | 2002-07-03 | 2004-10-05 | Ericsson Inc. | System and method for dynamic simultaneous connection to multiple service providers |
-
2004
- 2004-03-01 FR FR0450404A patent/FR2867004B1/en not_active Expired - Fee Related
-
2005
- 2005-03-01 EP EP05739712A patent/EP1723772A2/en not_active Withdrawn
- 2005-03-01 WO PCT/FR2005/050137 patent/WO2005086455A2/en not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
None * |
Also Published As
Publication number | Publication date |
---|---|
WO2005086455A3 (en) | 2005-12-29 |
FR2867004B1 (en) | 2006-09-08 |
FR2867004A1 (en) | 2005-09-02 |
WO2005086455A2 (en) | 2005-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1507384B1 (en) | Method of masking the processing of an access request to a server and corresponding system | |
FR2923969A1 (en) | METHOD FOR MANAGING FRAMES IN A GLOBAL COMMUNICATION NETWORK, COMPUTER PROGRAM PRODUCT, CORRESPONDING STORAGE MEDIUM AND TUNNEL HEAD | |
FR2919778A1 (en) | METHOD FOR TRANSMITTING DATA PACKETS IN A TUNNEL, COMPUTER PROGRAM PRODUCT, CORRESPONDING STORAGE MEDIUM AND TUNNEL HEAD | |
FR2925247A1 (en) | CONTROLLING THE TRANSMITTING INTERFAC OF A SIP RESPONSE MESSAGE | |
FR2853187A1 (en) | SYSTEM FOR ALL NETWORK APPLICATIONS TO OPERATE TRANSPARENTLY THROUGH A NETWORK ADDRESS TRANSLATION DEVICE | |
FR2954029A1 (en) | METHOD FOR TRANSMITTING PACKETS OF A PASSENGER BIDIRECTIONAL DATA STREAM, MANAGER DEVICE, COMPUTER PROGRAM PRODUCT, AND CORRESPONDING STORAGE MEDIUM | |
WO2020260813A1 (en) | Method for managing communication between terminals in a communication network, and devices for implementing the method | |
FR3042081A1 (en) | "METHOD FOR CONTROLLING A PACKET DATA COMMUNICATION SYSTEM AND COMMUNICATION SYSTEM IMPLEMENTING THE METHOD" | |
EP3549368B1 (en) | Method of fractioning application messages in an ip network | |
WO2016071607A1 (en) | Delegation of intermediation on an encrypted data exchange | |
EP3991392A1 (en) | Method for managing communication between terminals in a communication network, and devices and system for implementing the method | |
FR2973188A1 (en) | METHOD AND DEVICE FOR EXTRACTING DATA FROM A DATA STREAM CIRCULATING ON AN IP NETWORK | |
EP1723772A2 (en) | Method, system and device for time-delaying a data packet flow | |
WO2013178910A1 (en) | Technique for communication in an information-centred communication network | |
EP3135017A1 (en) | Methods of exchanging data with a device comprising radio communication means | |
EP3235217B1 (en) | Method for data exchange between web browsers, and routing device, terminal, computer program and storage medium therefor | |
FR2809560A1 (en) | Secure communications architecture having server mode allowing permanent internet IP address between connected units software implanted with protocol layers offering communications layers executing cyphering step | |
EP1432210A1 (en) | System to control processes associated to flows inside a communication network | |
EP2031809B1 (en) | Method for processing data streams in a telecommunication network | |
FR2915650A1 (en) | METHOD AND DEVICE FOR INTERFACE BETWEEN UDP OR TCP PROTOCOLS AND SCTP | |
EP1501248B1 (en) | System and method for electronic messaging | |
WO2005008992A1 (en) | Description of packet content in a packet communication network | |
FR2800224A1 (en) | HTTP data caching method, for IP SOCKS server of intranet, terminating TCP and SOCKS connections for datagrams originating from SOCKS client and for HTTP application level forming new datagram if HTTP data held in local cache | |
EP1142261B1 (en) | Method for transporting packets between a subscriber's installation access interface and a shared network, and access interface implementing said method | |
EP1762051A1 (en) | Method for managing an interconnection between telecommunication networks and device therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20061002 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
17Q | First examination report despatched |
Effective date: 20070111 |
|
RIN1 | Information on inventor provided before grant (corrected) |
Inventor name: SCHOTT, OLIVIER Inventor name: STEHLE, NICOLAS Inventor name: HUGEL, RODOLPHE Inventor name: BUCARI, CECILE |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20070724 |