WO2023083772A1 - Procédés de contrôle et de transmission, et entités configurées pour mettre en œuvre ces procédés - Google Patents
Procédés de contrôle et de transmission, et entités configurées pour mettre en œuvre ces procédés Download PDFInfo
- Publication number
- WO2023083772A1 WO2023083772A1 PCT/EP2022/081048 EP2022081048W WO2023083772A1 WO 2023083772 A1 WO2023083772 A1 WO 2023083772A1 EP 2022081048 W EP2022081048 W EP 2022081048W WO 2023083772 A1 WO2023083772 A1 WO 2023083772A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- service
- dns
- client equipment
- domain name
- trusted entity
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 230000005540 biological transmission Effects 0.000 title claims description 36
- 230000004044 response Effects 0.000 claims description 24
- 238000012545 processing Methods 0.000 claims description 10
- 238000004891 communication Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 238000012546 transfer Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 9
- 230000008901 benefit Effects 0.000 description 6
- 238000013475 authorization Methods 0.000 description 5
- 229940082150 encore Drugs 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 2
- 235000021183 entrée Nutrition 0.000 description 2
- 239000003607 modifier Substances 0.000 description 2
- 238000010200 validation analysis Methods 0.000 description 2
- 101100536354 Drosophila melanogaster tant gene Proteins 0.000 description 1
- 241001414834 Ephemeroptera Species 0.000 description 1
- 241001080024 Telles Species 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 210000004027 cell Anatomy 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006866 deterioration Effects 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000004377 microelectronic Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000000306 recurrent effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
Definitions
- the invention belongs to the general field of telecommunications.
- DNS Domain Name System
- a DNS system is a fundamental component in IP (Internet Protocol) communication networks. It makes it possible to associate with a resource such as a domain name, an identifier of the URI type (for "Uniform Resource Identifier" in English) one or more IP addresses allowing access to this resource.
- a resource such as a domain name, an identifier of the URI type (for "Uniform Resource Identifier" in English) one or more IP addresses allowing access to this resource.
- a client device such as for example a terminal or an application
- wishes to establish, to access any service a communication with a server identified by a fully qualified domain name (or FQDN for "Fully Qualified Domain Name in English), such as "www.example.com”
- the DNS client embedded in the client device in question sends a DNS resolution request to a DNS server to retrieve the IP address or addresses associated with this name of domain.
- the DNS server can then respond with a list of IP addresses if an entry that corresponds to this domain name is available locally, or relay the request from the communicating entity to another DNS server (recursive DNS server) according to the DNS hierarchy known if it does not have such an entry, etc.
- the DNS service and more particularly the DNS server to be used for domain name resolution, is generally configured at the client equipment level by the operator who provides it with IP connectivity ( access network operator or IP service). This configuration takes place prior to any communication from the client equipment, typically when it is connected or attached to the network of the operator in question or via a factory configuration.
- alternate servers are generally public DNS servers, offered by third-party operators, and display faster response times than some nominal DNS servers provided by operators, and/or offering more advanced security features.
- DNS configuration i.e. nominal server provided by the IP connectivity operator, or alternative public or private server
- Service providers are therefore dependent on the performance of this DNS configuration for the rendering of the services they offer to users, and therefore do not control the overall quality of experience perceived by the latter. Indeed, if the underlying DNS service offered by the nominal DNS server provided by the operator or the alternative DNS server selected by the user is not optimal, a degradation of the service may follow.
- the invention improves this situation by proposing, according to a first aspect, a method for controlling client equipment to access a service via a network, this control method being intended to be implemented by a trusted entity to the service and/or the client equipment and comprising a step of controlling a configuration of said client equipment, when it accesses said service, so that it transmits to at least one device designated for the service and authorized by the trusted entity, at least one domain name resolution request sent by the client equipment as part of the service.
- the invention also relates to a trusted entity for a service and/or client equipment of a network, this trusted entity comprising a control module, configured to control a configuration of the client equipment during an access to the service, so that it transmits to at least one device designated for the service and authorized by the trusted entity, at least one domain name resolution request sent by the client equipment within the framework of the service.
- This trusted entity is for example a server involved directly or indirectly in the provision of the service, such as for example an authoritative server (or "authoritative server") requested by the client equipment for the provision of the service.
- an authoritative server or "authoritative server”
- it may be an intermediate entity placed on a communication path taken during access to the service by the client equipment.
- Such an intermediate entity can in particular be a proxy (or relay).
- the invention therefore proposes to dynamically control, by a trusted entity for the service and/or for the client equipment, the DNS configuration of the latter in order to correlate it with the service to which it provides access.
- the trusted entity replaces the nominal DNS server or the alternative DNS server configured by default in the client equipment by a device that it has designated to resolve the DNS queries sent by the client equipment in the framework of a service.
- This control makes it possible to personalize the DNS service used when accessing the service (i.e. when the client equipment consumes the service in question), to optimize it for this service, and thus to improve the quality of experience perceived by the user.
- the DNS service thus controlled is advantageously adapted to the service: it can in particular be adapted to service constraints, offer advanced functions based on the DNS service benefiting the user and the service, or even be configured so that all or part of the connections (service) established from the client equipment are subject to special processing. It can also be adapted to the client equipment, and differ from one client equipment to another.
- DNS device responsible for resolving domain name resolution requests issued by a client device as part of its access to a service, it is possible to control the equipment through which the connections established by the client equipment as part of the service pass, and therefore incidentally the processing applied to these connections.
- customer equipment may be configured with customer identity preservation policies (for example, minimizing the volume of credentials shared with services, location or network attachment).
- customer identity preservation policies for example, minimizing the volume of credentials shared with services, location or network attachment.
- the invention makes it possible to ensure that the client equipment uses DNS information reported by a trusted entity which maintains a list of DNS servers per service. This list can be enriched with quality of service measures and depending on the location of the client equipment.
- the trusted entity selects the DNS server(s) for the client equipment when accessing the service to check the identification information and/or improve the quality of service.
- the invention allows in particular a better distribution of the DNS traffic sent by the client equipment; this avoids a concentration of DNS requests to a single DNS server, which reduces the traceability of users based on their DNS requests (also known as "DNS profiling").
- the service provider has overall control over the provision of its service and can thus incur liability in the event of deterioration of this service ( g. degraded access time to the service).
- control of the DNS configuration according to the service as proposed by the invention can be exploited to implement new functions in the network in connection with the service.
- the DNS device can adapt its responses to the DNS queries of the client equipment so as to be in the path of all the connections established by the client equipment when accessing the service, namely not only the connection main connection established by the user equipment with the infrastructure offering the service, but also all the secondary connections established on the sidelines of this main connection, such as for example with tracking servers, etc. Thanks to this privileged position, the DNS device is able to analyze the data packets transmitted on all of these connections and to track or detect specific events likely to affect the private nature of the data transmitted in these packets, such as for example the transport by these packets of information identifying the user of the client equipment. It can also designate another device responsible for analyzing the data transported in the packets sent by the user's client device.
- the invention also offers the possibility of adding more easily and immediately to the DNS device, new advanced functions advantageous for the implementation of the service.
- deployment of such functions requires the involvement of several actors, which makes this deployment complex.
- RR for "Resource Record”
- RR for "Resource Record”
- the invention allows a service provider to deploy new functions within the framework of this service without being dependent on these other players and allows the client equipment to benefit from such functions.
- the DNS device designated by the trusted entity can also be advantageously configured with "private" domain names, specific to the implementation of the service and which the service provider does not wish to communicate to a public DNS server or to a nominal DNS server provided by the network operator (context of a service based on connected objects for example). Such a public or nominal DNS server will then return a negative response if it is asked to resolve such a private domain name. Not disclosing these private domain names is a security measure to minimize the risk of potential denial of service attacks targeting these domain names.
- the invention offers a certain flexibility in terms of introducing or removing domain names at the level of the DNS chain, which is not the case with a public or nominal DNS server.
- DNS device designated by the trusted entity it is also possible to configure the DNS device designated by the trusted entity so that it returns personalized responses to the client equipment when it is requested for the resolution of domain names, allowing for example to satisfy constraints of service.
- a personalized response may consist in particular of sending one or more IP addresses located near the client equipment (also called "Geoproximity IP").
- the step of configuring the client equipment comprises a transmission by the trusted entity to the client equipment of a message comprising at least information on the reachability of at least one said designated device for the service and authorized by the trusted entity.
- the message in question may or may not be encrypted. Encrypting the message helps prevent hacking of connections by a third-party entity, and such encryption is preferable in the case of a trusted entity for the service.
- the security of the exchanges between the trusted entity and the client equipment can be ensured by other mechanisms (for example for a trusted entity for the client configured using ACL rules (for "Access Control Lists in English) adequate).
- This embodiment also has the advantage of separating the service logic from the DNS logic, and allows better stability of the DNS service and mechanism: the customization of the DNS service is carried out by the device designated by the trusted entity and not by the infrastructure (eg authoritative server) providing the service.
- the message in question may be a response message to a service invocation message sent by the client equipment.
- a service invocation message is for example a TCP 3WHS message as mentioned above, or a ClientHello TLS message (for "Transport Layer Security" in English) or even a Handshake QUIC message, messages known per se. This is transparent to the user and saves the signaling (and bandwidth) required to implement the invention.
- the message in question may be a message sent asynchronously by the trusted entity.
- said at least one reachability information is included in a header, an option, a frame (for example a QUIC frame), an attribute (for example an SDP (Session Description Protocol) attribute), a load useful (or "message body" in English with a predefined structure), etc.
- a frame for example a QUIC frame
- an attribute for example an SDP (Session Description Protocol) attribute
- a load useful or "message body" in English with a predefined structure
- This variant is relatively simple to implement and is based on already existing messages. Only a header (or, where applicable, an option, a frame, an attribute or a payload having a predefined structure according to the variant envisaged) must be newly introduced for the purposes of the invention.
- the invention has a privileged application when any version of the HTTP protocol is used, it can also be used in association with other protocols, such as for example with the CoAP protocol (Constrained Application Protocol) by means of the definition of a new option dedicated to the invention, or with the QUIC protocol, by means of the definition of a new frame dedicated to the invention.
- CoAP protocol Constrained Application Protocol
- QUIC protocol QUIC protocol
- the reachability information is sent in a dedicated response message whose structure is explicitly indicated by a new media type (or "media type” in English such as for example "json+dns-resolver ").
- This media type indicates that the content of a message is of type "JSON" and carries a DNS server.
- the configuration of the client equipment can be implemented via the sending, by the trusted entity, of a list of domain names potentially involved when accessing the service by the client equipment, and IP addresses which are respectively associated with them, for example in a response to a service invocation message or to a DNS query. It should however be noted that this embodiment has an implication on the size of the messages sent to the client equipment, and can induce, depending on the transport protocol involved, fragmentation.
- the invention also offers the possibility of indicating to the client equipment a plurality of DNS devices (and in particular information on the reachability of these DNS devices), each DNS device being able to be associated with a context of use so that the client equipment is able to direct its DNS requests to the most suitable DNS device according to the context in which it is located (eg according to its geographical location).
- the message transmitted by the trusted entity may include, for at least one said device designated for said service and authorized by said trusted entity, at least one item of information characterizing at least one functional capability of said device.
- Such a functional capability is for example a list of methods, and/or records (RR), and/or protocols supported by the device in question.
- the DNS device is adapted to the context in which the client equipment requests domain name resolution and can provide a detailed response to the client equipment.
- the client equipment further comprises an obtaining module, configured to obtain for at least one said designated device, information characterizing at least one functional capacity of this device, the transmission module being configured to transmitting said at least one domain name resolution request to a said device selected according to said at least one functional capacity of this device.
- the transmission method and the client equipment benefit from the same advantages mentioned above as the control method and the trusted entity.
- control and transmission methods are implemented by a computer.
- the invention also relates to a computer program on a recording medium, this program being able to be implemented in a computer or more generally in a trusted entity in accordance with the invention and comprises instructions adapted to the implementation of a control method as described above.
- the invention also relates to a computer program on a recording medium, this program being capable of being implemented in a computer or more generally in client equipment in accordance with the invention and comprises instructions adapted to the implementation implementation of a transmission method as described above.
- Each of these programs may use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in partially compiled form, or in any what other desirable form.
- the invention also relates to an information medium or a recording medium readable by a computer, and comprising instructions of a computer program as mentioned above.
- the information or recording medium can be any entity or device capable of storing programs.
- the medium may comprise a storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or else a magnetic recording means, for example a hard disk, or a flash memory.
- the information or recording medium may be a transmissible medium such as an electrical or optical signal, which may be routed via an electrical or optical cable, by radio link, by wireless optical link or by other ways.
- the program according to the invention can in particular be downloaded from an Internet-type network.
- the information or recording medium may be an integrated circuit in which a program is incorporated, the circuit being adapted to execute or to be used in the execution of the control or transmission methods according to the invention.
- control and transmission methods the trusted entity, the client equipment and the system according to the invention to have all or part of the aforementioned characteristics in combination.
- NW Network
- the NW network can be composed of one or more (sub)networks connected to each other.
- the service S is an application service offered via the Internet by a service provider SP to a client equipment 2 of a user U, in accordance with the invention.
- a service provider SP to a client equipment 2 of a user U
- the service provider SP relies on a service infrastructure hosted in a service domain SR (or "Service Realm”).
- the service domain SR comprises an authoritative server 3 (or "authoritative server” in English) with which, to access the service S, the user U establishes a so-called main connection (C1) via its client equipment 2.
- the service domain SR comprises a plurality of servers (eg authoritative server, cache servers, load balancers (or " load balancers), etc.) hosted in a single structure (e.g. a cloud computing infrastructure) or a single piece of equipment, or in several structures or several pieces of equipment.
- the service S can also be located in a network other than the Internet network, for example in an operator's network or in a public infrastructure (eg public cloud or "public cloud” in English).
- the user equipment 2 in order to access the Internet network and the service S, the user equipment 2 is connected directly to an operator's network, and more particularly to a cellular access network AN or PLMN (for "Public Land Mobile Network” in English) administered by a PO operator.
- AN cellular access network
- PLMN Public Land Mobile Network
- the user equipment 3 can be connected to the Internet network via a local network (or LAN for "Local Area Network” in English) such as a home network, a corporate network, etc., through dedicated equipment referred to as CPE (Customer Premises Equipment).
- CPE Customer Premises Equipment
- the operator OP configures the user equipment 2 with reachability information (e.g. address(es) IP, domain name, alias, authentication identifier, etc.) of a so-called nominal DNS server 4 to be used to resolve its DNS requests, regardless of the service to which the client equipment 2 wishes to access.
- This reachability information can possibly be modified by the user U, via a user interface provided for this purpose, to replace the nominal DNS server 4 with a public DNS server 5, accessible via the Internet network.
- This DNS configuration of the client equipment 2 (whether with the nominal DNS server 4 or with the public DNS server 5) is carried out independently of any access to a service by the client equipment 2, for example prior to any access to a service (in particular for the configuration with the nominal DNS server 4), in other words before any invocation or consumption of the service by the client equipment 2, and applies here once performed, regardless of the service to which the client equipment 2 accesses. It is referred to here as "nominal DNS configuration".
- nominal DNS server 4 has been considered in the nominal DNS configuration. It is however possible to define in this nominal DNS configuration several DNS servers which can be selected according to the network interface used by the client equipment 2 to access a service.
- the system 1 for accessing the service S makes it possible to check the DNS configuration of the client equipment 2 to adapt it to the service S. This check takes place when the client equipment 2 invokes the service S, as further detailed later.
- the system 1 comprises, in addition to the client equipment 2, a trusted entity 6, in accordance with the invention.
- the trusted entity 6 is an entity with which the provider SP of the service S has a relationship of trust. It may for example be an entity managed by the provider SP of the service S or an entity with which it has a security relationship. Such an entity is for example an entity 7 for coordinating the service S located in the service domain SR, or even the authoritative server 3.
- this trusted entity 6 which, in accordance with the invention, is able to authorize at least one device generally referenced by 8 (also sometimes referred to as "DNS device 8" in the following), designated specifically for the service S, to resolve the DNS requests of the client equipment 2 and to control the DNS configuration of the client equipment 2 so that it addresses the DNS requests that it has within the framework of the access to the service S to this or these DNS devices 8 for the resolution of the domain names targeted by these DNS queries.
- DNS device(s) 8 are chosen is described in more detail later. They may differ from one client device to another.
- the DNS devices 8 belong in accordance with the invention to the system 1 for accessing the service S.
- the client equipment 2 and the trusted entity 6 for the service S have the hardware architecture of a computer 9 as illustrated in . It is noted that as a variant, the client equipment 2 and/or the trusted entity 6 can be software instances hosted by a physical equipment having the hardware architecture of the computer 9.
- the computer 9 comprises in particular a processor 10, a random access memory 11, a read only memory 12, a non-volatile memory 13, and communication means 14 allowing in particular the entities of the system 1 to communicate with each other.
- the read only memory 12 of the computer 9 constitutes a recording medium in accordance with the invention, readable by the processor 10 and on which is recorded a computer program in accordance with the invention.
- the ROM 12 of the computer 9 comprises, when the latter is or hosts a trusted entity 6 in accordance with the invention, a recording of a computer program PROG6, comprising instructions defining the main steps of a control method according to the invention.
- modules 6A and 6B are described in more detail later with reference to the steps of the control method according to the invention.
- the ROM 12 of the computer 9 then comprises a recording of a computer program PROG2, comprising instructions defining the main steps of a transmission method according to the invention.
- modules 2A to 2C are described in more detail later with reference to the steps of the transmission method according to the invention.
- the trusted entity 6 is the authoritative server 3.
- the client equipment 2 is configured to use the nominal DNS configuration introduced previously, in other words to transmit its domain name resolution requests or DNS requests to the nominal DNS server 4.
- the 2D local cache does not contain any alternative DNS configuration to the nominal DNS configuration to be applied in the context of access to the service S.
- the client equipment 2 when the client equipment 2 wishes to access the service S, and in particular establish a connection with the authoritative server 3, it sends, via its transmission module 2C, a DNS request designated by QUERY (3), to its nominal DNS server 4 (step H10).
- the nominal DNS server 4 responds to it, in a manner known per se, by providing an IP address, denoted @IP3, of the authoritative server 3 (step H20).
- IP3 IP address
- he can contact recursive DNS servers if necessary.
- connection underlying the service for example via an exchange based on the TCP and TLS protocols, the client equipment 2 then sends an HTTP POST request of access to the service S to the authoritative server 3 using as destination address the IP address @IP3 which was transmitted to it (step H30).
- the authoritative server 3 acts as a trusted entity 6 according to the invention. It therefore includes the modules 6A and 6B of the trusted entity 6 described above.
- the authoritative server 3 upon receipt of the HTTP POST access request from the client equipment 2, the authoritative server 3 (acting as a trusted entity 6) processes this request. He also consults his authorization module 6A to obtain the reachability information(s) (eg IP addresses here) of the DNS device(s) 8 authorized for the service S to resolve the DNS queries sent in the context of access to the service S. It is assumed here that a number K greater than or equal to 1 of DNS devices 8 are concerned. These K DNS devices are referenced respectively by DNS devices 8-1, 8-2, ..., 8-K in the following.
- the authoritative server 3 then inserts, via its control module 6B, in its HTTP 200 OK response to the HTTP POST access request received from the client equipment 2, the K IP addresses, @IP8-1, ..., @IP8 -K of the K DNS devices 8 provided by its authorization module 6A, an indication (explicit or implicit) that the client equipment 2 must send its future DNS requests issued within the framework of the service S to at least one of said K DNS devices 8, as well as here, the DNS query selection rules applying to these K DNS devices 8 (in other words, the rules which allow the client equipment 2 to recognize the DNS queries associated with the service S which must be addressed to these DNS devices 8). Then it sends the HTTP 200 OK response to client equipment 2 (step H40).
- the addresses @IP8-1, ..., @IP8-K are inserted by the control module 6B in the DNS_RESOLVER header which in itself indicates to the client equipment 2 that it must send its future DNS requests sent within the framework of the service S to at least one of the DNS devices 8 associated with one of the addresses @IP8-1, ..., @IP8-K.
- the control module 6B also inserts into the DNS_RESOLVER header in association with each IP address, at least one item of information characterizing at least one functional capacity as described above of the DNS device 8 corresponding to this IP address (e.g. a list protocols or RR records or even methods supported by each DNS device 8, or a combination of such lists).
- Functional capacities can, depending on their nature, be inserted in different fields of the DNS_RESOLVER header.
- the transport protocols supported by the DNS device 8 considered in a TRANSPORT_SET field
- the RR records in an RR_SET field and the methods in a QUERY_SET field.
- these names are given for illustrative purposes only.
- the insertion of the DNS_RESOLVER header in the HTTP 200 OK response to the HTTP POST request is a control step within the meaning of the invention by the authoritative server 3 acting as a trusted entity 6 .
- the DNS_RESOLVER header is inserted in a response to an HTTP POST access request to the service sent after the establishment of the underlying connection to the service S between the client equipment 2 and the authoritative server 3.
- a header may be inserted in a response to an HTTP POST request sent during the procedure for establishing the underlying connection to the service S.
- Such an HTTP POST request may for example be sent in a SYN and ClientHello TLS message if the TCP Fast Open and 0-RTT TLS mechanisms described in IETF RFC 7413 and RFC 8446 respectively are enabled.
- the previously mentioned indications, carried by the DNS_RESOLVER header are inserted in a TCP and/or TLS option in response to a service access request or to a request to establish the underlying connection in service S.
- the module 2B for modifying the client equipment 2 modifies the DNS configuration applied by the client equipment 2 (which corresponds here to that which is stored in the storage module 2A in the absence of DNS configuration associated with the service S stored in the local cache 2D). More specifically, it memorizes in the local 2D cache the addresses @IP8-1, ..., @IP8-K of the DNS devices 8 included in the DNS_RESOLVER header to be used when accessing the service S as well as the selection rules allowing the client equipment 2 to identify the DNS requests concerned by these DNS devices (step H50).
- the transmission module 2C of the client equipment 2 addresses the future DNS requests (QUERY(X)) sent within the framework of the service S (for example, all the requests relating to the subdomains “*.example .com” according to the selection rules defined by the trusted entity 6) to one of the DNS devices 8 identified in the new DNS configuration stored in the local cache 2D (and no longer to its nominal DNS server 4 as when of step H10, which can however continue to be requested for DNS queries sent within the framework of services other than service S and not concerned by the DNS configuration stored in the local cache 2D) (eg steps 60, H70).
- these DNS requests can target a public domain name, but also a private domain name that the DNS devices 8 are adapted to resolve, or a domain name generated within the framework of the service S for the client equipment 2, or an ephemeral domain name generated within the framework of the service S, etc., or even a domain name verifying several of these characteristics.
- step H10 the 2D local cache already includes a DNS configuration to be applied for the service S different from the nominal DNS configuration, and this DNS configuration is associated in the local cache 2D to a non-expired period of validity
- the client equipment 2 applies this DNS configuration recorded in the local cache 2D and addresses directly one of the DNS devices 8 to resolve its DNS request .
- Said device supplies the address @IP3 of the authoritative server 3 in response to the DNS request sent by the client equipment 2 during step H20.
- Steps H30 and H40 are maintained and make it possible, if necessary, to extend the validity period of the DNS configuration already stored in the local 2D cache for the service S, or if the DNS configuration applying to the service S has been modified by the entity 6, modify this DNS configuration.
- the transmission module 2C selects one DNS devices 8 according to a given criterion.
- a criterion is for example here the functional capacities of the DNS devices 8.
- the transmission module 2C can either select the DNS device 8-1 or the device 8-2 for sending DNS GET and POST requests, and select the device 8-1 only for sending DNS FETCH requests.
- SVCB Ses ViCe Binding
- MX Mail eXchange
- the DNS_RESOLVER header received by the client equipment 2 indicates a list of protocols supported by each of the DNS devices 8-1, 8-2, and more particularly for the DNS device 8-1 the Do53 and DoQ protocols, while for the DNS device 8-2 the DoH (DNS over HTTPS) and DoC (DNS over CoAP) protocols, the DoT (DNS over TLS) protocol, the Do53, DoQ (
- other criteria can be considered, such as for example a random selection, or a selection of a DNS device 8 according to its geographical proximity with respect to the client equipment 2, or even a combination of several criteria, etc
- the new DNS configuration to be applied is communicated by the authoritative server 3 / the trusted entity 6 to the client equipment 2 in response to its request for access to the service S. It should however be noted that this hypothesis is not limiting in itself and that the new configuration can be communicated to the client equipment 2 in response to any other service invocation message S, provided that it is sent while the client equipment 2 accesses the service S.
- the indication to apply the new DNS configuration can be transmitted by the authoritative server 3 / the trusted entity 6 to the client equipment 2 asynchronously or spontaneously, that is to say without being linked to a particular service S invocation message sent by the client equipment 2.
- the authoritative server 3/the trusted entity 6 itself indicates to the client equipment 2 the new DNS configuration to be applied for the service S, in other words the authoritative server 3 / the trusted entity 6 directly modifies the DNS configuration applied by the client equipment 2 for the service S.
- the modification at the level of the client equipment 2 can be controlled (i.e. decided) by the trusted entity 6 but be implemented in the customer equipment 2 by an intermediate entity.
- This intermediate entity can be any entity with which the trusted entity 6 maintains a relationship of trust and/or security, such as for example an entity of the service infrastructure or a third-party entity placed in particular on the path of communications borrowed when accessing the service by the client equipment. It may even be one of the DNS devices it has authorized for the service.
- the authoritative service 3 / the trusted entity 6 is a trusted entity 6 for the service, since it is a entity of the infrastructure on which the service is based. It is however possible to envisage other trusted entities than entities of the service infrastructure, such as for example an entity designated by the service provider or of another infrastructure with which the service provider has established an agreement based on a trust.
- the trusted entity which controls the DNS configuration used by the client equipment 2 during its access to the service S is a trusted entity for the client equipment 2.
- it may be an intermediate equipment via which the client equipment 2 establishes a connection with the Internet network to access the service S and with which it has itself established a secure connection (for example encrypted, or a secure communication tunnel) so that all the messages transmitted and received by the client equipment 2 during access to the service S pass through this intermediate equipment.
- Such intermediate equipment may be, by way of illustration, equipment of the CPE (for "Customer Premises Equipment") type, or a relay or proxy located in the Gi interface of a mobile network, etc.
- This list of rules may come from measurements carried out by the intermediate equipment in question or by another equipment allowing the intermediate equipment to classify the DNS devices according to their availability or their performance, for example.
- DNS devices for the service S, devices of the network NW via which it is desired that connections established by the client equipment within the framework of the service S transit. These connections can include the main connection established by the client equipment with the authoritative server to access the service, but also all the secondary connections established on the sidelines of this main connection, sometimes without the knowledge of the user of the client equipment. .
- the DNS devices thus designated can thus resolve each DNS query sent by the client equipment 2 by providing their own IP addresses so as to receive each data packet sent by the client equipment on the main and secondary connections. Upon receipt of these data packets, they can thus set up various processing operations, such as for example the analysis of the content of these packets to determine whether they contain user identification information, or other information that they wish to stalk.
- the DNS devices can also, as a variant, resolve each request sent by the client equipment by providing the IP address of another trusted equipment responsible for such processing. This use case makes it possible to place given equipment on the path of the main and secondary connections established by the client equipment as part of the S service.
- DNS devices for the service S are designated DNS devices which have been configured to resolve, among other things, queries for domain names relating to private and/or personalized domain names and/or even ephemeral, generated within the framework of the service S, for example by the service provider. These domain names are deliberately kept secret and will remain unknown to public or nominal DNS servers set up by network operators.
- This second use case can be adopted as a security measure to prevent denial of service attacks, for example. It also allows the service provider to consider customizable domain names, and for example to generate personalized domain names based on the identity of the user of the client equipment, or ephemeral domain names.
- the use of service-specific DNS devices facilitates the addition and/or removal of such domain names and avoids the latency induced by such an approach with a public/nominal DNS server.
- DNS devices for the service S, DNS devices which have been configured to carry out a personalized resolution of the DNS requests addressed by a client equipment, for example with a view to respecting the service constraints.
- a DNS device may return to a client equipment an IP address for a domain name and located near the client equipment (e.g. having a delay of less than "x ms").
- DNS devices which implement advanced DNS functions, which are not implemented by public or nominal DNS servers provided by the operators.
- S DNS devices which implement advanced DNS functions, which are not implemented by public or nominal DNS servers provided by the operators.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Selective Calling Equipment (AREA)
Abstract
Description
- un nom de domaine privé ; et/ou
- un nom de domaine généré dans le cadre du service pour l’équipement client ; et/ou
- un nom de domaine éphémère.
- une étape de modification, lors d’un accès au service et sous un contrôle d’une entité de confiance pour le service et/ou l’équipement client, d’une configuration de l’équipement client pour qu’il transmette vers au moins un dispositif désigné pour un traitement des requêtes de résolution de noms de domaine associées au service et autorisé par l’entité de confiance, au moins une requête de résolution de noms de domaine émise par l’équipement client dans le cadre de l’accès au service ; et
- une étape de transmission d’au moins une requête de résolution de noms de domaine dans le cadre de l’accès au service vers au moins un dit dispositif désigné.
- un module de modification, configuré pour modifier, lors d’un accès à un service fourni via le réseau et sous un contrôle d’une entité de confiance pour le service et/ou l’équipement client, une configuration de l’équipement client pour qu’il transmette vers au moins un dispositif désigné pour un traitement des requêtes de résolution de noms de domaine associées au service et autorisé par l’entité de confiance, au moins une requête de résolution de noms de domaine émise par l’équipement client dans le cadre de l’accès au service ; et
- un module de transmission, configuré pour transmettre, au moins une requête de résolution de noms de domaine dans le cadre de l’accès au service vers au moins un dit dispositif désigné.
- une entité de confiance selon l’invention ;
- un équipement client selon l’invention ; et
- au moins un dispositif désigné pour un traitement des requêtes de résolution de noms de domaine associées au service et autorisé par l’entité de confiance avec lequel est configuré l’équipement client par l’entité de confiance pour transmettre au moins une requête de résolution de noms de domaine dans le cadre de l’accès au service.
- un module 6A d’autorisation, configuré pour autoriser au moins un dispositif DNS 8 désigné pour le service S à résoudre des noms de domaine qui lui sont adressés par l’équipement client 2 dans le cadre du service S. Selon le contexte d’application de l’invention, le ou les dispositifs DNS 8 en question peuvent avoir été choisis par l’entité 6 de confiance ou par une autre entité, puis validés et autorisés par l’entité 6 de confiance. Aucune limitation n’est attachée à la façon dont le module 6A d’autorisation autorise, ou de façon équivalente, valide l’intervention du ou des dispositifs DNS 8. Par exemple, si ceux-ci ont été sélectionnés par une autre entité, cette validation peut résulter de l’existence d’une relation de sécurité ou de confiance avec cette autre entité, ou de la présence de cette autre entité dans une liste d’entités autorisées par le fournisseur du service S. On peut également envisager un échange sécurisé entre l’entité 6 de confiance et les dispositifs DNS 8 pour vérifier qu’ils sont bien autorisés à agir pour la résolution de noms de domaine dans le cadre du service S, ou la présence de ces dispositifs DNS 8 dans une liste fournie par le fournisseur de service S, etc. ; et
- un module 6B de contrôle, configuré pour contrôler une configuration DNS de l’équipement client 2 appliquée lors d’un accès par l’équipement client 2 au service S, pour qu’il transmette vers au moins un dit dispositif DNS 8 désigné pour le service S et autorisé par le module 6A d’autorisation de l’entité 6 de confiance, au moins une requête de résolution de noms de domaine émise par l’équipement client 2 dans le cadre de son accès au service S. Les requêtes de résolution de noms de domaine concernées sont définies par des règles de sélection fournies par le module 6B de contrôle à l’équipement client 2. De telles règles de sélection définissent les noms de domaines associés au service S concernés par la configuration, tels que par exemple tous les sous-domaines « *.example.com » ou seulement une partie d’entre eux (ex. « *.piv.example.com). On peut envisager différentes façons pour le module 6B de contrôle de contrôler la configuration DNS de l’équipement client 2. Par exemple, le module 6B de contrôle peut contrôler la configuration DNS de l’équipement client 2 en lui envoyant un message contenant un entête spécifique, par exemple un entête nommé DNS_RESOLVER, cet entête contenant une information de joignabilité (ex. adresse IP, nom de domaine, alias, identifiant d’authentification, etc.) dudit au moins un dispositif DNS 8 désigné pour le service S et indiquant à l’équipement client 2 qu’il doit adresser ses requêtes DNS à ce ou ces dispositifs DNS 8. Ce message peut être envoyé de façon asynchrone (spontanée) par le module 6B de contrôle à l’équipement client 2 ou en réponse à un message d’invocation du service S. Il peut en outre comprendre au moins une information caractérisant une capacité fonctionnelle de chacun des dispositifs DNS 8, comme par exemple une liste des méthodes, ou des enregistrements (RR) ou encore des protocoles supportés par chacun des dispositifs DNS 8. En variante, le module 6B de contrôle peut agir par l’intermédiaire d’une autre entité du réseau pour qu’elle transmette un tel entête DNS_RESOLVER à l’équipement client 2. Dans une autre variante encore, le contrôle peut s’effectuer via la transmission d’une option dédiée ou d’une trame dédiée plutôt qu’un entête DNS_RESOLVER. D’autres variantes encore peuvent être envisagées de façon alternative ou complémentaire.
- un module 2A de stockage d’une configuration DNS, comprenant l’information de joignabilité (ex. adresse IP, nom de domaine, alias, identifiant d’authentification, etc.) d’un ou de plusieurs serveurs DNS à utiliser pour la résolution de noms de domaine. Le module 2A de stockage comprend ici, suite à la connexion de l’équipement client 2 au réseau AN, l’information de joignabilité, et plus particulièrement l’adresse IP, du serveur DNS nominal 4 (ou d’un serveur DNS nominal en cas de pluralité de serveurs DNS nominaux). En variante, si l’utilisateur U de l’équipement client 2 a modifié cette configuration, le module 2A de stockage peut comprendre l’information de joignabilité du serveur DNS public 5. En tout état de cause, le module 2A de stockage comprend l’information de joignabilité du serveur DNS de la configuration DNS nominale, introduite précédemment ;
- un module 2B de modification, configuré pour modifier, en cours d’accès au service S et sous le contrôle de l’entité 6 de confiance, la configuration DNS de l’équipement client 2 applique pour résoudre ses requêtes DNS pour que l’équipement client 2 transmette vers au moins un dispositif DNS 8, désigné pour le service S et autorisé par l’entité 6 de confiance, au moins une requête de résolution de noms de domaine dans le cadre du service S. Dans le mode de réalisation décrit ici, la configuration DNS, incluant les règles de sélection des requêtes DNS concernées et définies par le module 6B de l’entité 6 de confiance (autrement dit celles associées au service S) et la ou les informations de joignabilité du ou des dispositifs DNS 8, est enregistrée dans un cache 2D local de l’équipement client 2. Chaque entrée du cache 2D fait correspondre une configuration DNS à un service donné et est associée ici à une durée de validité : tant que la durée de validité d’une entrée n’est pas expirée, elle est appliquée par l’équipement client 2 pour le service concerné, ce qui est avantageux en cas d’invocation récurrente dudit service comme illustré ultérieurement. On note que les règles de sélection associées à chaque configuration DNS permettent avantageusement de distinguer les configurations DNS stockées dans le cache 2D local et qui peuvent concerner plusieurs services distincts, et d’ainsi permettre à l’équipement client 2 d’appliquer, en fonction du service concerné, la bonne configuration DNS. En variante, on peut envisager un cache local par service ; et
- un module 2C de transmission, configuré pour transmettre au moins une requête de résolution de noms de domaine dans le cadre de l’accès au service S (c’est-à-dire correspondant aux règles de sélection précitées) vers l’un des serveurs DNS identifié dans la configuration DNS stockée dans le cache local 2D. Ainsi, avant exécution de l’invention, le module 2C de transmission est configuré pour transmettre ses requêtes DNS vers le serveur DNS nominal 4 ou vers le serveur DNS public 5 selon la configuration DNS nominale adoptée et mémorisée dans le module de stockage 2A ; après exécution du procédé de contrôle selon l’invention, le module 2C de transmission est configuré pour transmettre ses requêtes DNS émises dans le cadre de l’accès au service S vers l’un des dispositifs DNS 8 autorisés par l’entité 6 de confiance identifiés dans le cache local 2D. Dans le mode de réalisation décrit ici, si plusieurs dispositifs DNS 8 sont autorisés par l’entité 6 de confiance dans le cadre de l’accès au service S, le module 2C de transmission est configuré pour obtenir au moins une information caractérisant une capacité fonctionnelle de chacun des dispositifs DNS 8 autorisés (ex. liste de méthodes, d’enregistrements RR ou de protocoles supportés par chacun des dispositifs DNS 8) et pour sélectionner l’un d’entre eux en fonction de ses capacités fonctionnelles. Ces informations sur les capacités fonctionnelles des dispositifs DNS 8 peuvent être stockées dans la configuration DNS mémorisée dans le cache local 2D. En variante, d’autres critères de sélection peuvent être envisagés, tel que par exemple, la localisation du serveur DNS par rapport à celle de l’équipement client 2, etc.
Claims (16)
- Procédé de contrôle d’un équipement client (2) pour accéder à un service via au moins un réseau, ledit procédé de contrôle étant destiné à être mis en œuvre par une entité (6,3) de confiance pour ledit service et/ou pour ledit équipement client et comprenant une étape de contrôle (H40) d’une configuration dudit équipement client, lors d’un accès de celui-ci audit service, pour qu’il transmette vers au moins un dispositif (8 ;8-1, …, 8-K) désigné pour ledit service et autorisé par ladite entité de confiance, au moins une requête de résolution de noms de domaine émise par ledit équipement client dans le cadre dudit service.
- Procédé de contrôle selon la revendication 1 dans lequel ladite entité de confiance (3) est un serveur impliqué dans la fourniture dudit service.
- Procédé de contrôle selon la revendication 1 dans lequel ladite entité (6) de confiance est une entité intermédiaire placée sur un chemin de communication emprunté lors de l’accès par ledit équipement client audit service.
- Procédé de contrôle selon l’une quelconque des revendications 1 à 3 dans lequel l’étape (H40) de contrôle d’une configuration dudit équipement client comprend une transmission par l’entité de confiance audit équipement client d’un message comprenant au moins une information de joignabilité (@IP8-1, …, @IP8-K) d’au moins un dit dispositif désigné pour ledit service et autorisé par ladite entité de confiance.
- Procédé de contrôle selon la revendication 4 dans lequel ledit message est un message de réponse à un message d’invocation dudit service émis par ledit équipement client ou un message envoyé de façon asynchrone par ladite entité de confiance.
- Procédé de contrôle selon la revendication 4 ou 5 dans lequel ladite au moins une information de joignabilité est incluse dans un entête, une option, une trame, un attribut, ou une charge utile du message.
- Procédé de contrôle selon l’une quelconque des revendications 4 à 6 dans lequel ledit message est conforme à une version d’un protocole HTTP (HyperText Transfer Protocol) ou d’un protocole CoAP (Constrained Application Protocol) ou d’un protocole QUIC.
- Procédé de contrôle selon l’une quelconque des revendications 4 à 7 dans lequel ledit message comprend, pour au moins un dit dispositif désigné pour ledit service et autorisé par ladite entité de confiance, au moins une information caractérisant au moins une capacité fonctionnelle dudit dispositif.
- Procédé de contrôle selon l’une quelconque des revendications 1 à 8 dans lequel au moins une dite requête de résolution de noms de domaine concerne :
- un nom de domaine privé ; et/ou
- un nom de domaine généré dans le cadre dudit service pour ledit équipement client ; et/ou
- un nom de domaine éphémère.
- Procédé de transmission d’au moins une requête de résolution de noms de domaine destiné à être mis en œuvre par un équipement client (2) dans le cadre d’un service fourni via un réseau, ledit procédé comprenant :
- une étape (H50) de modification, lors d’un accès audit service et sous un contrôle d’une entité de confiance pour ledit service et/ou ledit équipement client, d’une configuration de l’équipement client pour qu’il transmette vers au moins un dispositif désigné pour un traitement des requêtes de résolution de noms de domaine associées au service et autorisé par ladite entité de confiance, au moins une requête de résolution de noms de domaine émise par ledit équipement client dans le cadre dudit service ; et
- une étape (H60,H70) de transmission d’au moins une requête de résolution de noms de domaine dans le cadre dudit service vers au moins un dit dispositif désigné.
- Programme d’ordinateur (PROG6,PROG2) comportant des instructions pour l’exécution d’un procédé de contrôle selon l’une quelconque des revendications 1 à 9 ou d’un procédé de transmission selon la revendication 10, lorsque ledit programme est exécuté par un ordinateur.
- Support d’enregistrement (12) lisible par un ordinateur (9) sur lequel est enregistré un programme d’ordinateur selon la revendication 11.
- Entité (6) de confiance pour un service et/ou pour un équipement client d’un réseau, ladite entité de confiance comprenant un module (6B) de contrôle, configuré pour contrôler une configuration dudit équipement client lors d’un accès audit service, pour qu’il transmette vers au moins un dispositif désigné pour ledit service et autorisé par ladite entité de confiance, au moins une requête de résolution de noms de domaine émise par ledit équipement client dans le cadre dudit service.
- Equipement client (2) d’un réseau comprenant :
- un module (2B) de modification, configuré pour modifier, lors d’un accès à un service fourni via le réseau et sous un contrôle d’une entité de confiance pour ledit service et/ou ledit équipement client, une configuration de l’équipement client pour qu’il transmette vers au moins un dispositif désigné pour un traitement des requêtes de résolution de noms de domaine associées au service et autorisé par ladite entité de confiance au moins une requête de résolution de noms de domaine émise par ledit équipement client dans le cadre dudit service ; et
- un module (2C) de transmission, configuré pour transmettre au moins une requête de résolution de noms de domaine dans le cadre dudit service vers au moins un dit dispositif désigné.
- Equipement client selon la revendication 14 comprenant en outre un module (2C) d’obtention, configuré pour obtenir pour au moins un dit dispositif désigné, une information caractérisant au moins une capacité fonctionnelle de ce dispositif, ledit module de transmission étant configuré pour transmettre ladite au moins une requête de résolution de noms de domaines vers un dit dispositif sélectionné en fonction de ladite au moins une capacité fonctionnelle de ce dispositif.
- Système (1) d’accès à un service fourni via un réseau comprenant :
- une entité (6) de confiance selon la revendication 13 :
- un équipement client (2) selon la revendication 14 ou 15 ; et
- au moins un dispositif (8 ;8-1, …, 8-K) désigné pour un traitement des requêtes de résolution de noms de domaine associées audit service et autorisé par ladite entité de confiance avec lequel est configuré ledit équipement client par ladite entité de confiance pour transmettre au moins une requête de résolution de noms de domaine dans le cadre de l’accès audit service.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280074344.XA CN118303013A (zh) | 2021-11-10 | 2022-11-08 | 控制方法和传输方法以及被配置为实施这些方法的实体 |
EP22813298.1A EP4430814A1 (fr) | 2021-11-10 | 2022-11-08 | Procédés de contrôle et de transmission, et entités configurées pour mettre en ?uvre ces procédés |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FRFR2111975 | 2021-11-10 | ||
FR2111975A FR3129051A1 (fr) | 2021-11-10 | 2021-11-10 | Procédés de contrôle et de transmission, et entités configurées pour mettre en œuvre ces procédés |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023083772A1 true WO2023083772A1 (fr) | 2023-05-19 |
Family
ID=80999528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2022/081048 WO2023083772A1 (fr) | 2021-11-10 | 2022-11-08 | Procédés de contrôle et de transmission, et entités configurées pour mettre en œuvre ces procédés |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP4430814A1 (fr) |
CN (1) | CN118303013A (fr) |
FR (1) | FR3129051A1 (fr) |
WO (1) | WO2023083772A1 (fr) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150271031A1 (en) * | 2014-03-20 | 2015-09-24 | NSONE Inc. | Systems and methods for improving domain name system traffic routing |
US20190166210A1 (en) * | 2016-05-10 | 2019-05-30 | Orange | Method for accessing a content hosted on a server selected as a function of the location of the user terminal |
-
2021
- 2021-11-10 FR FR2111975A patent/FR3129051A1/fr not_active Withdrawn
-
2022
- 2022-11-08 WO PCT/EP2022/081048 patent/WO2023083772A1/fr active Application Filing
- 2022-11-08 CN CN202280074344.XA patent/CN118303013A/zh active Pending
- 2022-11-08 EP EP22813298.1A patent/EP4430814A1/fr active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150271031A1 (en) * | 2014-03-20 | 2015-09-24 | NSONE Inc. | Systems and methods for improving domain name system traffic routing |
US20190166210A1 (en) * | 2016-05-10 | 2019-05-30 | Orange | Method for accessing a content hosted on a server selected as a function of the location of the user terminal |
Non-Patent Citations (1)
Title |
---|
M.S. LENDERS, DNS QUERIES OVER COAP (DOC), DRAFT-LENDERS-DNS-OVER-CAP-01, 1 September 2021 (2021-09-01) |
Also Published As
Publication number | Publication date |
---|---|
FR3129051A1 (fr) | 2023-05-12 |
CN118303013A (zh) | 2024-07-05 |
EP4430814A1 (fr) | 2024-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3568989A1 (fr) | Procédés et dispositifs de vérification de la validité d'une délégation de diffusion de contenus chiffrés | |
EP3568966B1 (fr) | Procédés et dispositifs de délégation de diffusion de contenus chiffrés | |
FR3081653A1 (fr) | Procede de modification de messages par un equipement sur un chemin de communication etabli entre deux noeuds | |
WO2018115647A1 (fr) | Validation de livraison de contenu et de verification d'une delegation de livraison d'un contenu | |
WO2023083772A1 (fr) | Procédés de contrôle et de transmission, et entités configurées pour mettre en œuvre ces procédés | |
FR3023098A1 (fr) | Procede et systeme de traitement d'une demande de resolution d'un nom d'un serveur, emise par une application cliente sur un reseau de communication. | |
WO2021123593A1 (fr) | Procede de resolution d'identifiants de nommage | |
WO2021176166A1 (fr) | Procede et dispositif de detection de l'usage d'un serveur de noms de domaine non certifie | |
WO2023083771A1 (fr) | Procédés de contrôle, de vérification et de configuration, et entités configurées pour mettre en œuvre ces procédés | |
WO2019243706A1 (fr) | Procédé de découverte de fonctions intermédiaires et de sélection d'un chemin entre deux équipements de communication | |
WO2020128239A1 (fr) | Procédé de détermination d'une chaîne de délégation associée à une résolution d'un nom de domaine dans un réseau de communication | |
EP3900305A1 (fr) | Procédé d'acquisition d'une chaîne de délégation relative à la résolution d'un identifiant de nom de domaine dans un réseau de communication | |
WO2023083769A1 (fr) | Procédé de traitement d'au moins un paquet de données, dispositif et système associés. | |
EP3149902B1 (fr) | Technique d'obtention d'une politique de routage de requêtes émises par un module logiciel s'exécutant sur un dispositif client | |
WO2024068722A1 (fr) | Procedes de resolution de nom, de communication, de traitement de messages et serveur, dispositif client et noeud relais correspondants | |
WO2023083770A1 (fr) | Procédé de recherche de données sensibles dans au moins un paquet de données, dispositif et système associés | |
FR3067538A1 (fr) | Procede de controle de l'obtention par un terminal d'un fichier de configuration | |
WO2024156613A1 (fr) | Procédé de révocation d'un jeton de certification permettant d'authentifier l'établissement d'une connexion entre deux équipements de communication, dispositifs et programmes d'ordinateur correspondants | |
WO2023247459A1 (fr) | Procédé de suspension d'un jeton de certification permettant d'authentifier l'établissement d'une connexion entre deux équipements de communication, dispositifs et programmes d'ordinateur correspondants | |
WO2024083694A1 (fr) | Procédé de traitement d'une requête en résolution d'au moins un identifiant de nommage, dispositif et programme d'ordinateur correspondants | |
FR2893208A1 (fr) | Procede et dispositif de fourniture d'un alias de federation d'identite reseau a un fournisseur de service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22813298 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 202280074344.X Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18708760 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2022813298 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 2022813298 Country of ref document: EP Effective date: 20240610 |