IDENTIFYING NODES IN A NETWORK
First Claim
1. A method of identifying a node to other nodes in a communications network, wherein it comprises the following steps:
- storing in each node a file containing descriptive parameters of the node, each parameter being indexed by a cryptographic identifier of the node and a parameter identifier;
a first node, on connecting to the network, broadcasting to the other nodes of the network the cryptographic identifier of said first node;
sending the cryptographic identifier of the first node and the identifier of a parameter of the first node requested by another node of the network from said other node to the first node;
searching for a portion of the requested parameter in the file of the first node as a function of the cryptographic identifier and the identifier of the requested parameter; and
sending the found portion of the requested parameter from the first node to said other node.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of secure mutual identification of nodes (Nn) in a communications network comprising for each node a file (Fn) containing parameters descriptive of the node, each parameter being indexed by a cryptographic identifier of the node and an identifier of the parameter. An interface (IR) broadcasts from the node a message containing the cryptographic identifier of said node to the other nodes of the network. A unit (UC) transmits an identification request containing the cryptographic identifier of a first other node and the identifier of a parameter of said first other node requested by said node. A unit (HF) searches the file for a part of a parameter requested by a second other node as a function of the cryptographic identifier of said node and the identifier of the parameter transmitted by the second other node, and the interface transmits the part found of the parameter requested by the second other node to said second other node.
7 Citations
10 Claims
-
1. A method of identifying a node to other nodes in a communications network, wherein it comprises the following steps:
-
storing in each node a file containing descriptive parameters of the node, each parameter being indexed by a cryptographic identifier of the node and a parameter identifier; a first node, on connecting to the network, broadcasting to the other nodes of the network the cryptographic identifier of said first node; sending the cryptographic identifier of the first node and the identifier of a parameter of the first node requested by another node of the network from said other node to the first node; searching for a portion of the requested parameter in the file of the first node as a function of the cryptographic identifier and the identifier of the requested parameter; and sending the found portion of the requested parameter from the first node to said other node. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10)
-
-
8. A node of a communications network, wherein it comprises:
-
a memory for a file containing descriptive parameters of the node, each parameter being indexed by a cryptographic identifier of the node and a parameter identifier; means for broadcasting the cryptographic identifier of said node to the other nodes of the network; means for sending the cryptographic identifier of a first other node and the identifier of a parameter of said first other node requested by said node; means for searching the file for a portion of a parameter requested by a second other node as a function of the cryptographic identifier of said node and the identifier of the parameter sent by the second other node; and means for sending to said second other node the found portion of the parameter requested by said second other node.
-
-
9. A computer program adapted to be executed in a node of a communications network, wherein it comprises instructions which, when the program is executed in said node, execute the following steps:
-
storing in the node a file containing descriptive parameters of the node, each parameter being indexed by a cryptographic identifier of the node and a parameter identifier; broadcasting the cryptographic identifier of said node to the other nodes of the network; sending the cryptographic identifier of a first other node and the identifier of a parameter of said first other node requested by said node; searching for a portion of a parameter requested by a second other node in the file of said node as a function of the cryptographic identifier of said node and the identifier of the parameter sent by the second other node; and sending the found portion of the parameter requested by the second other node to said second other node.
-
Specification