WO2003005670A1 - Procede pour le controle d'echanges de donnees entre deux applications, respectivement de type client et de type serveur - Google Patents
Procede pour le controle d'echanges de donnees entre deux applications, respectivement de type client et de type serveur Download PDFInfo
- Publication number
- WO2003005670A1 WO2003005670A1 PCT/FR2002/002275 FR0202275W WO03005670A1 WO 2003005670 A1 WO2003005670 A1 WO 2003005670A1 FR 0202275 W FR0202275 W FR 0202275W WO 03005670 A1 WO03005670 A1 WO 03005670A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- hyperserver
- applications
- transfer
- ftp
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/564—Enhancement of application control based on intercepted application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99942—Manipulating data structure, e.g. compression, compaction, compilation
Definitions
- the present invention relates to a method for controlling data exchanges between two applications, respectively of client type and of server type, according to a protocol of FTP type of TCP / IP (RFC 959 1579) or the like, it being understood that:
- TCP Transmission Control Protocol
- Internet Protocol Internet Protocol
- FTP File Transfer Protocol
- TCP / IP file transfer protocol used both on the Internet and on corporate Intranet TCP / IP networks whose network protocol is TCP / IP
- - RFC Request for comments
- TCP / IP protocols TCP / IP protocols
- the server and client applications are specific to the FTP protocol or have the capacity to generate a data stream compatible with this protocol.
- the invention relates more particularly, but not exclusively, to a method implementing a hyperserver application which runs on a host platform and which acts as an intermediary between two applications, one of which is of the FTP type while the other is either an FTP type application, or a compatible application, to conduct the protocol transfer negotiations as well as the data transfers themselves.
- the Hyperserver application is endowed with means enabling it to have visibility and the ability to interpret and translate the information exchanged. This position of the Hyperserveur application allows it, not only to follow exchanges passively, but also to control them by interfering in these exchanges according to control rules, which will be imposed and defined in its directory databases partner applications and transfer profiles.
- the method according to the invention can include agent applications on the execution platforms of applications of FTP type (or compatible).
- FTP type or compatible
- all or only part of the population of FTP (or compatible) applications can be fully controlled. This population (or part of the population) will be called hereinafter "controlled population”.
- All applications of the FTP (or compatible) type that do not benefit from the control of the Hyperserver application are referred to as the unmarked population in the rest of this presentation.
- the two populations can be part of the same IP network or belong to two different networks and, in the second case, the Hyperserver application must reside in the network of the controlled population and be accessible by the applications of the unmarked population.
- the method according to the invention makes it possible to carry out transfers while ensuring the security and confidentiality of the data hosted in the Intranet network. It also provides the functionality of a powerful centralized execution monitor for exchanging files or other transferable objects.
- FTP-type applications (or compatible) of the Intranet network constitute in this case the controlled population and the Internet partners play the role of the unmarked population.
- the security and confidentiality of the entire intranet can be preserved by the method according to the invention since the names of the hosts on this network, the directories of files (or other transferable objects) and their physical names can remain invisible to external partners of the Intranet network.
- external partners need only know the identifiers of the entries in the transfer profile database files and connection profiles, defined below and, among these identifiers, only those accessible to the identified and authenticated requester.
- the Hyperserver application is an intermediate application that has visibility and complete control of all the protocol negotiation data and files (or other transferable objects) exchanged by the applications that communicate with each other. Therefore, and regardless of the execution environment, the Hyperserver application has all the information necessary to ensure the functions of a monitor such as monitoring, statistics and interactions with operators or other applications.
- the method according to the invention can implement
- the controlled population of hosts with that hosting the Hyperserveur application can be a set of computers and files of a company constituting an Intranet network.
- the BDP profile database for file transfers with FTP or compatible applications constitutes the file access system for the hyperserver application under the FTP model.
- the unmarked population can be, in this case, all the computers accessing via the Internet network the Hyperserver application to transfer files with the hosts of the company under its control.
- the BDH database contains all the information necessary for the Hyperserver application to:
- the BDP database defines the profiles and scenarios for file transfers or other transferable objects using the following attributes, including:
- Agent applications provided with a communication interface with the Hyperserver application can retrieve information concerning file transfers from their place of execution and / or receive from the Hyperserver application an order to launch the processes under their own control. at the start or end of these transfers.
- the databases BDH and BDP can constitute the local directories of LDAP type ("Lightweight Directory Access Protocol") of the network of the controlled population.
- LDAP Lightweight Directory Access Protocol
- LDAP is an open and widely distributed protocol that allows access to these directories without additional development for applications running in a highly heterogeneous environment.
- the following presentation describes the procedures for file transfer operations in the Intranet / Internet environment where the Hyperserver application tracks and "monitors" file transfers on the Intranet side. None prevents us from imagining another hyperserver application located on the Internet network generating the flow compatible with FTP and controlling file transfers of its host population.
- the FTP type application of the requesting client on the Internet side opens, thanks to a set of connection opening commands, the connection with the hyperserver application by specifying its user name, password and possibly its authentication data as with a conventional FTP server,
- the information exchanged during this phase of negotiation with the FTP client may be sufficient to determine the entry in this directory defining the connection attributes with the targeted application on the intranet side (otherwise , an additional command, for example FTP SITE, can be used to identify it), - the correlation between the requesting client and the target server allows the Hyperserver application to search the BDH database for all information concerning the access rights of the requester, the possible encryption and its keys, as well as the possible negotiation protocol and the modalities of the connection with the targeted server, - as soon as the protocol and the modalities of connection are known, the Hyperserver application can open the connection with the intended destination application and initiate the exchange of commands, if any, provided for in the protocol,
- the definition of the determined profile allows the Hyperserver application to verify the direction of transfer, to identify the file to be transferred, its attributes, the possible processes to be executed at the start, during and at the end of the transfer as well as the designation of applications under whose control their execution must take place,
- the Hyperserveur application will be able to fulfill the transfer request received from the customer, - two "DATA" connections in the FTP sense will be opened: one, between the FTP client and the hyperserver application and the other between the hyperserver application and the targeted application; the data received by the Hyperserver application on one connection will be sent to the other, possibly undergoing the processing of the process "during the transfer",
- Direct Transfer Request a device of the method according to the invention, called "Direct Transfer Request”.
- the request must contain all the information necessary to determine both the entry of the BDH directory and that of BDP,
- the Hyperserver application will initialize, as a client, two connections: one with the FTP type server (or a compatible application) on the intranet side and one with the FTP type server Internet side,
- the Hyperserveur application will route the data in the file, from its origin to its destination through two DATA type connections in the sense FTP or compatible between themselves and two server applications,
- the Hyperserver application will allow the Hyperserver application to determine the file names on both sides and all the attributes of the transfer as well as the processes to be triggered at the start, during and at the end of the transfer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/482,667 US7440959B2 (en) | 2001-07-03 | 2002-07-01 | Method of controlling exchanges of data between two applications, namely a client-type application and a server-type application respectively |
EP02764936A EP1407594A1 (fr) | 2001-07-03 | 2002-07-01 | Procede pour le controle d'echanges de donnees entre deux applications, respectivement de type client et de type serveur |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR01/08974 | 2001-07-03 | ||
FR0108974A FR2827104B1 (fr) | 2001-07-03 | 2001-07-03 | Procede pour le controle d'echanges de donnees entre deux applications, respectivement de type client et de type serveur |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003005670A1 true WO2003005670A1 (fr) | 2003-01-16 |
Family
ID=8865189
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR2002/002275 WO2003005670A1 (fr) | 2001-07-03 | 2002-07-01 | Procede pour le controle d'echanges de donnees entre deux applications, respectivement de type client et de type serveur |
Country Status (4)
Country | Link |
---|---|
US (1) | US7440959B2 (fr) |
EP (1) | EP1407594A1 (fr) |
FR (1) | FR2827104B1 (fr) |
WO (1) | WO2003005670A1 (fr) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110040730A1 (en) * | 2007-10-23 | 2011-02-17 | Eugen Adrian Belea | System and method for backing up and restoring email data |
WO2011128501A1 (fr) * | 2010-04-15 | 2011-10-20 | Nokia Corporation | Procédé et appareil pour compatibilité et transfert de gadgets logiciels |
US9021017B2 (en) * | 2011-09-03 | 2015-04-28 | Barracuda Networks, Inc. | Configuring a plurality of diverse devices/services from an adaptive configuration control hyper-server apparatus |
US9251360B2 (en) * | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure mobile device content viewing in a networked secure collaborative exchange environment |
US9253176B2 (en) | 2012-04-27 | 2016-02-02 | Intralinks, Inc. | Computerized method and system for managing secure content sharing in a networked secure collaborative exchange environment |
EP2842070B1 (fr) | 2012-04-27 | 2020-08-05 | Intralinks, Inc. | Procédé et système informatisés de gestion d'échanges participatifs sécurisés en réseau |
US9553860B2 (en) | 2012-04-27 | 2017-01-24 | Intralinks, Inc. | Email effectivity facility in a networked secure collaborative exchange environment |
US9514327B2 (en) | 2013-11-14 | 2016-12-06 | Intralinks, Inc. | Litigation support in cloud-hosted file sharing and collaboration |
WO2015164521A1 (fr) | 2014-04-23 | 2015-10-29 | Intralinks, Inc. | Systèmes et procédés d'échange de données sécurisé |
US10033702B2 (en) | 2015-08-05 | 2018-07-24 | Intralinks, Inc. | Systems and methods of secure data exchange |
CN112883009B (zh) * | 2019-11-29 | 2024-05-07 | 北京百度网讯科技有限公司 | 用于处理数据的方法和装置 |
US12081979B2 (en) * | 2020-11-05 | 2024-09-03 | Visa International Service Association | One-time wireless authentication of an Internet-of-Things device |
CN112383612B (zh) * | 2020-11-11 | 2022-06-14 | 成都卫士通信息产业股份有限公司 | 一种文件传输方法、装置、设备及可读存储介质 |
CN115150207B (zh) * | 2022-09-06 | 2022-11-29 | 北京六方云信息技术有限公司 | 工业网络设备识别方法、装置、终端设备及存储介质 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998004971A1 (fr) * | 1996-07-25 | 1998-02-05 | Tradewave Corporation | Procede et systeme de mise en application d'un protocole generalise sur des connexions de communications client/serveur |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4605414A (en) | 1984-06-06 | 1986-08-12 | John Czajka | Reconstruction of a cruciate ligament |
JPH0563749A (ja) * | 1991-09-02 | 1993-03-12 | Hitachi Ltd | マルチプロトコル通信制御装置 |
JP2519390B2 (ja) * | 1992-09-11 | 1996-07-31 | インターナショナル・ビジネス・マシーンズ・コーポレイション | デ―タ通信方法及び装置 |
AU702628B2 (en) | 1995-04-12 | 1999-02-25 | Smith & Nephew, Inc. | Improved process for knee reconstruction |
US6170008B1 (en) * | 1998-12-07 | 2001-01-02 | Mediaone Group, Inc. | On-the-fly trivial file transfer protocol |
US20030149601A1 (en) * | 2000-12-14 | 2003-08-07 | Cabral Anthony J. | Network billboard system and method thereof |
US7171668B2 (en) * | 2001-12-17 | 2007-01-30 | International Business Machines Corporation | Automatic data interpretation and implementation using performance capacity management framework over many servers |
US7724281B2 (en) * | 2002-02-04 | 2010-05-25 | Syniverse Icx Corporation | Device facilitating efficient transfer of digital content from media capture device |
CA2391719A1 (fr) * | 2002-06-26 | 2003-12-26 | Ibm Canada Limited-Ibm Canada Limitee | Edition de fichiers de systemes eloignes dans un environnement de developpement integre |
-
2001
- 2001-07-03 FR FR0108974A patent/FR2827104B1/fr not_active Expired - Fee Related
-
2002
- 2002-07-01 US US10/482,667 patent/US7440959B2/en not_active Expired - Fee Related
- 2002-07-01 EP EP02764936A patent/EP1407594A1/fr not_active Withdrawn
- 2002-07-01 WO PCT/FR2002/002275 patent/WO2003005670A1/fr not_active Application Discontinuation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1998004971A1 (fr) * | 1996-07-25 | 1998-02-05 | Tradewave Corporation | Procede et systeme de mise en application d'un protocole generalise sur des connexions de communications client/serveur |
Also Published As
Publication number | Publication date |
---|---|
FR2827104A1 (fr) | 2003-01-10 |
US7440959B2 (en) | 2008-10-21 |
US20040216128A1 (en) | 2004-10-28 |
EP1407594A1 (fr) | 2004-04-14 |
FR2827104B1 (fr) | 2004-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1407594A1 (fr) | Procede pour le controle d'echanges de donnees entre deux applications, respectivement de type client et de type serveur | |
EP1645971B1 (fr) | Procede de controle d'acces a une base de donnees, controleur d'acces a une base de donnees, serveur de traitement d'agent, programme de controle d'acces a une base de donnees, et support d'enregistrement de ce programme | |
JP2002529856A5 (fr) | ||
CN103583030B (zh) | 在分布式云计算环境中实现数据安全性的方法及装置 | |
US7349974B2 (en) | Method for coordinating actions among a group of servers | |
US20060143301A1 (en) | Systems and methods for establishing and validating secure network sessions | |
US20080189393A1 (en) | Remote Access to Secure Network Devices | |
US20020111996A1 (en) | Method, system and apparatus for networking devices | |
US20070192614A1 (en) | System and method for authenticating a storage device for use with driver software in a storage network | |
US6738909B1 (en) | Method and apparatus for automatic configuration for internet protocol security tunnels in a distributed data processing system | |
US20090193127A1 (en) | Systems and Methods for Establishing and Validating Secure Network Sessions | |
JPWO2009019925A1 (ja) | 通信方法、中継サーバ装置、プログラム及び記録媒体 | |
JP2003518820A (ja) | 循環暗号化および復号化プロセスのための方法および装置 | |
JP4358795B2 (ja) | Tlsセッション情報の引継ぎ方法及びコンピュータシステム | |
KR100953093B1 (ko) | 이종 UPnP네트워크를 통한 멀티미디어 서비스 방법 및 시스템 | |
JP3877388B2 (ja) | 情報提供システム | |
EP2537114B1 (fr) | Procede de verrouillage/deverrouillage a distance d'une machine | |
CN100559769C (zh) | 访问远程应用的方法和基础设施 | |
EP2235881A2 (fr) | Préservation de système client-serveur d'informations d'état mis en réseau par l'intermédiaire d'un protocole sans état | |
Tobarra et al. | Formal verification of the secure sockets layer protocol | |
WO2016116702A1 (fr) | Contrôle d'accès aux équipements d'un site sécurise par authentification biométrique | |
TWI255124B (en) | System and method of managing users based on IP | |
FR3136075A1 (fr) | Infrastructure de sécurité ; procédé et produit programme d’ordinateur associés. | |
FR2778290A1 (fr) | Procede et dispositif d'interconnexion securisee entre des ordinateurs, organises en reseau, par pilotage d'un module de filtrage residant dans la couche de communication ip | |
Davis et al. | Protocols, Sessions, and State |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG US |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 10482667 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002764936 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002764936 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2002764936 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |