首页>
外国专利>
Optimization procedure of transfer of data streams protected by an autonomous network
Optimization procedure of transfer of data streams protected by an autonomous network
展开▼
机译:自治网络保护的数据流传输的优化过程
展开▼
页面导航
摘要
著录项
相似文献
摘要
Optimization procedure flux transfer protected by an autonomous network (30) between a plurality of users Pi Producers of information and a plurality of users Cj Consumer information including data, each, at least one client (40) and / or at least one server (4) process wherein said autonomous network comprises at least one central element (44) responsible for distributing slogans optimization of the transfer, at least one observation module (46) in charge of measuring the characteristics flows to be transferred, and at least one optimization module (48) responsible for implementing such slogans optimization taking into account the measurements obtained by the observation module (46), and wherein the client (40) and servers (4) configured to exchange mutual authentication parameters and protection parameters of the flows exchanged between users Pi Producers marketing information, ions and users Cj Consumers of information, and to apply after this negotiation control integrity flows transferred and protection of confidentiality as such and protection parameters according to said authentication parameters, process characterized includes the following steps: for each protected session between a user Pi producer information and a user Cj Consumer information: a) detected by an optimization module (48) located geographically closest to a server (4) the initialization of a protected session between a client (40) and a server (4), b) timing the negotiation between the client (40) and the server (4) at said optimization module (48), c) establish for said timing control channel protected between said optimization module (48) and an autonomous agent (42) associated with the client (40), d) exchanging between said module opti zation (48) and said autonomous agent (42) through said control channel protected parameters no remaining security, e) applying between the autonomous agent (42) and the optimization module (48) a method of protecting initialised by said parameters no remaining security so that during an exchange of flow between the user Pi Producer information and user Cj Consumer information, the optimization module that provides security settings no remnants appear as the client to the server during that session.
展开▼