![]() METHOD FOR TRANSMITTING INFORMATION BETWEEN TWO DOMAINS OF SEPARATE SECURITY LEVELS
专利摘要:
First and second applications are run in a red domain, and a third application is executed in a black domain, of lower security level, and through which an encrypted communication tunnel passes between the first and second applications. The first application transmits to the second application a nominal sequence of packets ordered according to their respective sizes; said nominal sequence is intercepted by the third application which, when it wishes to transmit information to the red domain, modifies said nominal sequence by deleting at least one packet, each deleted packet being a function of said information; upon receiving a packet sequence assumed to be the nominal packet sequence, the second application checks whether at least one packet has been deleted; and if so, the second application retrieves said information from the size of each packet thus deleted. 公开号:FR3039952A1 申请号:FR1501657 申请日:2015-08-03 公开日:2017-02-10 发明作者:Marc Cartigny;Olivier Klotz;Herve Fritsch;Claude Poletti 申请人:Airbus Defence and Space SAS; IPC主号:
专利说明:
The present invention relates to a transmission of information to a first application and / or a second application from a third application, the first application being executed by a first device of a first red-type subnetwork, the second application being executed on a second device of a second red-type subnet, the third application being executed by a device of a black-type network, each red-type subnet being of a higher security level than black-type network, the first and second red-type subnetworks being interconnected by a secure tunnel via the black-type network and the first and second red-type subnetworks belong to the same security domain. Communication networks may have different requirements for the security of the data passing through them. Some communication networks with strong security requirements may use other communication networks in which the level of security requirements is lower, to pass data from a communication subnetwork to strong security requirements to another. There is talk of a red communication network for the higher security communication network and black communication network for the lower security communication network. For example, a first group of devices of a first red type communication subnetwork communicates with a second group of devices of a second red type communication subnet via an unsecured transit communication network or security level lower than that of red type, called black type. We also speak of black domain to designate the black type of communication network, and of red domain to designate the set formed by the first and second red type communication subnetworks. In order for the first group of devices and the second group of devices to communicate securely, security gateways (such as network encryptors) are implemented, defining a boundary between the black domain and the red domain. These security gateways ensure the confidentiality of the communications, by encryption / decryption of data to pass from one of the red type of communication subnetworks to the other of the red type of communication subnetworks via the transit communication network. black type. These security gateways thus create a secure communication tunnel across the black domain, generally compliant with the Internet Protocol Security (IPSEC) standard. The red type of communication subnetworks then form a virtual private network VPN (Virtual Private Network in English). Thus, data from / to red-type communication subnetworks transiting the black-type transit communication network are not transmitted in clear. In particular, the network addressing plan and the content of the red domain communications are inaccessible within the black domain, which makes it possible to meet the red domain security requirements. Such an architecture of communication networks with several levels of security is implemented for example for the networks of large companies of the energy sector in which the various production sites are connected to the headquarters of the company through a network. transit network using highly resource-intensive terrestrial communications infrastructure or radiofrequency infrastructures with limited and variable resource capacity, notably due to weather conditions, such as satellite communication infrastructures. In the context of a transit network using satellite communication infrastructures, the variability of transmission conditions in terms of bit rate, latency and jitter has an impact on the quality and the communication capacity. Also, to ensure the quality of voice and data telecommunications services (data in English) in a red domain communication network, using a transit network located in a black domain to communicate between remote subnets of the domain red, the transmission conditions of the transit network located in the black domain must be taken into account in the service admission plan implemented in the red domain. A disadvantage of this kind of communication infrastructure is that, because of the presence of the security gateways, there is currently no adequate solution to allow one or more devices of the black-type transit communication network to communicate with one or more devices of one or the other of the red communication subnetworks, without having to question the security requirements of the red communication subnetworks, that is to say say without having to create a security breach. Such information may be transmission condition information in the black-type transit communication network, as in the above-mentioned example, or commands, thereby coordinating QoS QoS policies end-to-end. (End-to-End Quality of Service) between the black-type transit communication network and the red-type communication subnetworks. It is therefore desirable, in these circumstances, to provide a solution that allows one or more devices of the black domain to communicate information to one or more devices of the red domain, without having to question the security requirements of the red domain. It is also desirable to provide a solution that is compatible with most of the network equipment available on the shelf, in particular with network security equipment (Network Security Equipment in English), and which imposes, in its implementation, neither safety equipment and no additional security function at the edge of the security domain. Finally, it is desirable to provide a solution that is simple to implement. The invention relates to a method for transmitting information to a first application and / or a second application from a third application, the first application being executed in a first red-type subnet and the second application. in a second red-type subnet, the third application being executed in a black-type network, each red-type subnet being of higher security level than the black-type network, the first and second sub-networks of type red being interconnected via the black-type network by a secure tunnel between a first security gateway of the first red-type subnet and a second security gateway of the second red-type subnet applying encryption and decryption operations such as that each first packet of smaller size than a second packet results after encryption into a first encrypted packet less than or equal to the size of the packet resulting from the encryption of the second packet. The method is such that: the first application transmits to the second application a nominal packet sequence, the packets of said nominal sequence being ordered according to a predefined scheduling according to their respective sizes, and said nominal sequence being such that it it is possible to determine unambiguously in reception the size of each packet that would have been removed from said sequence; network equipment of the black type network on a mandatory path of said secure tunnel route to the third application each packet of said nominal sequence after encryption of the first gateway; when the third application wishes to transmit said information to the first application and / or the second application, the third application makes modifications to said nominal sequence after encryption of the first gateway, by deleting at least one packet, each packet deleted as a function of said information, and propagates the packets of said sequence after encryption of the first gateway that have not been deleted; when the third application does not wish to transmit information to the first application and / or the second application, the third application propagates the packets of said nominal sequence after encryption of the first gateway; upon receipt of a packet sequence assumed to be the nominal packet sequence, the second application checks whether at least one packet has been deleted by the third application; and when the second application detects that at least one packet has been deleted by the third application, the second application retrieves said information from the size of each packet thus removed from said nominal packet sequence. Thus, by relying on the packet size of said nominal sequence, and by allowing the third application to delete at least one of these packets without having access to their content (because of the encryption of the first gateway), it is possible to pass information from the third application (black domain) to the first application and / or the second application (red domain). In this implementation, neither security equipment nor additional security function is implemented at the edge of the security domain. According to a particular embodiment, the nominal packet sequence is delimited by at least one start packet and at least one end packet of predefined respective sizes that are not used within said nominal packet sequence. Thus, the nominal packet sequence, possibly modified by the third application, can be easily identified. According to a particular embodiment, the packets of the nominal sequence of packets are colored with a predefined class of service, and said network equipment of the black type network routes each packet thus colored, coming from the first sub-network of red type, to the third application. Thus, packets of said nominal packet sequence are easily routed to the third application. According to a particular embodiment, when the third application has transmitted said information to the first application and / or the second application, the first application transmits to the second application another sequence of packets representative of a positive acknowledgment. receiving said information, the packets of said other sequence being ordered according to a predefined schedule according to their respective sizes, and said network equipment of the black-type network route to the third application each packet of said other sequence after encryption of the first bridge. Thus, the information passed from the third application to the first application and / or the second application is acknowledged. According to a particular embodiment, the third application maintains the changes for each nominal sequence of packets that is received later, until a predefined condition is met. Thus, any packet losses between the third application and the second application are not disturbing. According to a particular embodiment, when the second application receives a modified nominal packet sequence, the second application waits to receive at least one other copy of said modified packet sequence before determining which information is transmitted by the third application to the first application and / or the second application. Thus, the second application is able to distinguish a lack of packet due to a deliberate action of the third application of a lack of packet due to a loss between the third application and the second application. According to a particular embodiment, each potentially transmitting information from the third application to the first application and / or the second application corresponds to a code in a predetermined correspondence table, the said information corresponding to a binary code MI in the said table. Correspondence, the third application repeats the following steps for each packet until all packets of the nominal sequence of packets after encryption are processed: retrieve the size Te of said packet; applying a function Fc to the size Te recovered so as to obtain a binary code Mc, the function Fc being a bijective function such that, for a given packet size among the possible sizes of the nominal sequence of packets after encryption, the function Fc returns a binary code with a single bit at the value "1" and the other bits at the value "0"; whether or not to delete said packet based on the result of a logical AND operation between the MI and Mc bit codes; and the second application repeats the following steps for each packet until all packets of the sequence assumed to be the nominal packet sequence are processed: recovering the size T of said packet; applying a function F to the retrieved size T so as to obtain a binary code M, the function F is a bijective function such that, for a given packet size among the possible sizes of the nominal packet sequence, the function F returns a binary code with a single bit at the value "1" and the other bits at the value "0", and further such that, for a packet of size T resulting after encryption by the first security gateway into a packet of size Te, F (T) = Fc (Tc); and updating an MF variable, initialized to the value "0" for the very first packet of the sequence assumed to be the nominal packet sequence, with the result of a logical OR operation between the binary code Turns the MF variable; and the variable MF gives a binary code representative of said information within the previously mentioned correspondence table. Thus, encoding and decoding said information are simple operations. According to a particular embodiment, said information is representative of a change of state control in a state machine. Thus, it is easy to control state machine progressions, despite the presence of domains of different security levels. According to a particular embodiment, a particular packet size is representative of an action to transition to a previous state in a predefined ordered list of states of the state machine, and the first application transmits at least two packets of that size. particular in the nominal sequence of packets, this particular size not being used in the remainder of the nominal sequence, and the third application suppresses a quantity * of packets of said particular size within said nominal sequence after encrypting the first gateway to represent a transition to a state of rank Nx. Thus, larger state machines can be controlled. According to a particular embodiment, an initialization phase is previously implemented as follows: the first application transmits to the second application a test sequence consisting of a predefined sequence of all the packet sizes used to generate said sequence nominal packet, each packet of the test sequence having a different size and said packets are ordered by increasing or decreasing size; said network equipment of the black-type network route to the third application each packet of said test sequence after encryption of the first gateway; the third application deletes each duplicate of size in the test sequence after encryption of the first gateway and propagates the test sequence thus modified to the second application; and when the second application receives a sequence of packets assumed to be the test sequence, the second application determines the packet sizes that have not been deleted by the third application, which packet sizes can then be distinctly used to generate said sequence nominal packet, and inform the first application. Thus, it is possible to detect that the first gateway inserts padding data in encryption operations, so that two packets of different sizes transmitted by the first application are found with the same size after encryption. According to a particular embodiment, the packets of the test sequence are colored with a predefined class of service, and said network equipment of the black type network routes each packet thus colored, coming from the first sub-network of red type, to the third application. Thus, the packets of said test sequence are easily routed to the third application. According to a particular embodiment, the initialization phase is previously as follows: the first application transmits to the second application an initialization sequence consisting of a remarkable sequence of packets, the size of each packet of the sequence d initialization is either equal to a maximum size without fragmentation in the first and second red type subnets, or equal to a minimum packet size in the first and second red type subnets; and said network equipment of the black-type network route to the third application each packet of said initialization sequence after encryption of the first gateway. Thus, it is possible to trigger the initialization phase without knowing a priori if and how the first gateway inserts stuffing data during encryption operations. According to a particular embodiment, the packets of the initialization sequence are colored with a predefined service class, and said network equipment of the black-type network routes each packet thus colored, coming from the first red-type subnetwork, to the third application. Thus, the packets of said initialization sequence are easily routed to the third application. According to a particular embodiment, each potentially transmitting information from the third application to the first application and / or the second application corresponds to a code in a predetermined correspondence table, and: the first application transmits to the second application a sequence of packets representative of a correspondence table selected from a predefined set of correspondence tables according to the packet sizes that have not been deleted by the third application within the test sequence, and said sequence of packets representative of the selected correspondence table comprises a first set of packets representative of the selected correspondence table and a second set intended to allow the third application to perform an acknowledgment by deleting at least one packet from said second set, the size of each package e the sequence of packets representative of the selected correspondence table is equal to the maximum size without fragmentation in the first and second sub-networks of the red type, or equal to the minimum packet size in the first and second subnetworks of red type; and said network equipment of the black-type network route to the third application each packet of said sequence of packets representative of the selected correspondence table after encryption of the first gateway. Thus, the correspondence table to be applied to allow the third application to pass said information to the first application and / or the second application is easily shared between said first, second and third applications. The invention also relates to a system for transmitting information to a first application and / or a second application from a third application, the first application being executed in a first red-type subnet and the second application in a second red-type subnet, the third application being executed in a black-type network, each red-type subnet being of higher security level than the black-type network, the first and second sub-networks of red type being interconnected via the black-type network by a secure tunnel between a first security gateway of the first red-type subnet and a second security gateway of the second red-type subnet applying encryption and decryption operations such that each first packet of smaller size than a second packet results after encryption into a first packet encrypted smaller than or equal to the size of the packet resulting from the encryption of the second packet. The system is such that: the first application is adapted to transmit a nominal packet sequence to the second application, the packets of said nominal sequence being ordered according to a predefined order according to their respective sizes, and said nominal sequence being such it is possible to determine unambiguously in reception the size of each packet that would have been removed from said sequence; a network equipment of the black type network on a mandatory path of said secure tunnel is adapted to route to the third application each packet of said nominal sequence after encryption of the first gateway; when the third application wishes to transmit said information to the first application and / or the second application, the third application is adapted to make modifications of said nominal sequence after encryption of the first gateway, by deleting at least one packet , each deleted packet being a function of said information, and to propagate the packets of said sequence after encryption of the first gateway that have not been deleted; when the third application does not wish to transmit information to the first application and / or the second application, the third application is adapted to propagate the packets of said nominal sequence after encryption of the first gateway; upon receiving a packet sequence assumed to be the nominal packet sequence, the second application is adapted to check if at least one packet has been deleted by the third application; and when the second application detects that at least one packet has been deleted by the third application, the second application is adapted to retrieve said information from the size of each packet thus removed from said nominal packet sequence. The characteristics of the invention mentioned above, as well as others, will emerge more clearly on reading the following description of an exemplary embodiment, said description being given in relation to the attached drawings, among which: Fig. 1 schematically illustrates a communication system in which the present invention can be implemented, the communication system comprising a first red type communication subnetwork and a second red type communication subnetwork interconnected by a communication network. black type; FIG. 2 schematically illustrates an example of hardware architecture of devices of the communication system; FIG. 3 schematically illustrates an algorithm, implemented by a first application, located in the first red type of communication subnetwork, to allow said first application, using a second application, located in the second sub-network. red type communication network, receiving information from a third application, located in the black type communication network; FIG. 4 schematically illustrates an algorithm, implemented by said third application, to enable said first application to receive information from said third application, using said second application; FIG. 5 schematically illustrates an algorithm, implemented by said second application, to enable said first application to receive information from said third application, using said second application; - Figs. 6A, 6B and 6C schematically illustrate sequences of packets appearing in exchanges occurring within the framework of the execution of the algorithms of FIGS. 3 to 5; FIG. 7 schematically illustrates a state machine, which can be controlled or monitored, by executing the algorithms of FIGS. 3 to 5; - Figs. 8A and 8B schematically illustrate sequences of packets appearing in exchanges involved in the context of control, or monitoring, of the state machine of FIG. 7; FIG. 9 schematically illustrates an algorithm, implemented by said first application, as part of an initialization phase; FIG. 10 schematically illustrates an algorithm, implemented by said third application, in the context of the initialization phase; and - FIG. 11 schematically illustrates an algorithm, implemented by said second application, in the context of the initialization phase. Fig. 1 schematically illustrates a communication system in which the present invention can be implemented. The communication system is a packet communication system, preferably based on IP (Internet Protocol) technology. The communication system comprises a first communication subnet 101 of the red type and a second communication subnet 102 of the red type interconnected by a communication network 103 of the black type. The black type communication network 103 is therefore of a lower level of security than the first 101 and second 102 red type communication subnetworks. The black type communication network 103 comprises network equipment items 113, 114, 131, 132 making it possible to put the first 101 and second 102 red type communication subnetworks in communication. For example, the network equipment 113, 114 are routers providing packet routing within the black type communication network 103, and the network equipment 131, 132 are transceiver devices communicating with each other. one with the other via a satellite link. The transceiver equipment then includes respectively modems and antennas for implementing the satellite link. Other types of communication technologies may be implemented to port the first 101 and second 102 red type communication subnetworks, whether these technologies are wired or wireless. The network devices 113, 114, 131, 132 act preferentially at level three of the OS1 model and more particularly at the IP level. The first red type communication subnet 101 includes a first security gateway 121 and a first network equipment 111. The first network equipment 111 is for example a router providing a packet routing from the first red type communication subnet 101 and packets to the first communication subnet 101 of the red type. Any router acting at level three of the OSI model, the first network equipment 111 is preferably an IP router. The second red type of communication subnet 102 includes a second security gateway 122 and a second network device 112. The second network device 112 is for example a router providing routing of packets from the second communication subnet 102 red type and packets to the second communication subnet 102 of the red type. The second network equipment 111 is preferably an IP router. The first security gateway 121 and the second security gateway 122 are adapted to set up a secure tunnel between the first red type communication sub-network 101 and the second red type 102 communication subnet via the network. communication 103 black type. Thus, for each packet transmitted by a device of the first red type of communication subnet 101 to a device of the second red type of communication subnet 102, the first security gateway 121 applies an encryption operation before sending via the communication network 103 of the black type. And, for each encrypted packet received via the black type communication network 103, the second security gateway 122 applies a decryption operation before propagating said packet via the second red type communication subnet 102. In a symmetrical manner, for each packet transmitted by a device of the second red type of communication subnet 102 to a device of the first red type of communication sub-network 101, the second security gateway 122 applies an operation of encryption before sending via the communication network 103 of the black type. And, for each encrypted packet received via the black type communication network 103, the first security gateway 121 applies a decryption operation before propagating said packet via the first red type communication subnet 101. A secure tunnel is thus established between the first security gateway 121 and the second security gateway 122. Thus, according to an illustrative example shown in FIG. 1, the network equipment 113 of the black domain is connected to the first security gateway 121 (defining the boundary between the first communication subnet 101 of the red type and the black domain) and the network equipment 114 of the black domain is connected to the first security gateway 122 (defining the boundary between the second communication subnet 102 of the red type and the black domain). The network equipment 113 is further connected to the network equipment 131 and the network equipment 114 is further connected to the network equipment 132 (the network equipment 131 and the network equipment 132 are interconnected, for example via a network connection. satellite link), thus making it possible to put the red-type communication sub-networks 101 and 102 into secure communication via the black-type communication network 103 acting as a transit network. The communication system shown in FIG. 1 is thus for example adapted to implement secure communications of VoIP (Voice over IP in English) type between a telephone terminal of the first communication subnet 101 of the red type and another telephone terminal of the second communication subnetwork 102 of red type. The communication system shown in FIG. 1 is thus for example adapted to implement secure data type communications (data in English). The first red type communication sub-network 101 further comprises a first application 141, that is to say a communication module acting at level seven of the OSI model, namely the layer of the OSI model closest to " "user" (in the broad sense) and provides network services to the "user". The first application 141 can be implemented by a device of the first red type communication subnet 101 connected to the first network equipment 111. In a variant, the first application 141 can be implemented by the first network equipment 111. Similarly, the second red type of communication subnet 102 further comprises a second application 142, that is to say a communication module acting at level seven of the OSI model. The second application 142 may be implemented by a device of the second red type communication subnet 102 which is connected to the second network equipment 112. Alternatively, the second application 142 may be implemented by the second network equipment 112. In addition, the black type communication network 103 further comprises a third application 143, that is to say a communication module acting at level seven of the OSI model. The third application 143 may be implemented by a device of the black type communication network 103 which is connected to the network equipment 131, 132 (in the black type communication network 103, any device is directly or indirectly connected to the network equipment 131, 132). As a variant, the third application 143 may be implemented by one or other of the network equipments 131, 132. The first 141, second 142 and third 143 applications interact to allow the third application to transmit information to the first application 141 and / or the second application 142 (i.e., the red domain), despite the presence of the first 121 and second 122 security gateways. In this context, the behavior of the first application 141 is described below in relation to FIG. 3, the behavior of the second application 142 is described below in relation to FIG. And the behavior of the third application 143 is described below in connection with FIG. 4. In a particular embodiment, the first 141, second 142 and third 143 applications implement an initialization phase. In this context, the behavior of the first application 141 is described below in relation to FIG. 9, the behavior of the second application 142 is described below in relation to FIG. 11 and the behavior of the third application 143 is described below in connection with FIG. 10. Fig. 2 schematically illustrates an example of hardware architecture of devices of the communication system. More particularly, FIG. 2 schematically illustrates an example of a hardware architecture adapted to the implementation of the first 141, second 142 and third applications. Let us consider as an illustration that the example of hardware architecture shown schematically in FIG. 2 corresponds to a machine on which the first application 141 is executed. The machine on which the first application 141 is executed then includes, connected by a communication bus 210: a processor or CPU (Central Processing Unit in English) 201; Random Access Memory (RAM) 202; a ROM (Read Only Memory) 203; a storage unit 204 or a storage medium reader, such as a SD (Secure Digital) card reader or a hard disk drive (HDD); and at least one interface 205 enabling the machine on which the first application 141 is executed to communicate within the communication system. The processor 201 is capable of executing instructions loaded in the RAM 202 from the ROM 203, or an external memory, or a storage medium, or a communication network. When the machine on which the first application 141 is executed is powered up, the processor 201 is able to read instructions from RAM 202 and execute them. These instructions form a computer program causing the implementation, by the processor 201, all or part of the algorithms and steps described below in relation to the first application 141. The same applies to the machine on which is executing the second application 142 and the machine on which the third application 143 is executed. All or some of the algorithms and steps described below can thus be implemented in software form by executing a set of instructions by a programmable machine, such as a DSP (Digital Signal Processor in English) or a microcontroller, or be implemented in hardware form by a machine or a dedicated component, such as an FPGA (Fielcl-Programmable Gate Array in English) or an ASIC (Application-Specific Integrated Circuit in English). Fig. 3 schematically illustrates an algorithm, implemented by the first application 141, to allow said first application 141 to receive information from the third application 143, using the second application 142. In a step S301, the first application 141 obtains a sequence of packets of predefined respective sizes. This sequence of packets is hereinafter referred to as the nominal sequence of packets, since it is the sequence of packets that is supposed to go from the first red type communication subnet 101 to the second red type 102 communication subnetwork. when the third application 143 has no information to provide to the red domain. In the nominal packet sequence, the packets are ordered according to a predefined schedule according to their respective sizes, and this scheduling is known from the first 141, second 142 and third 143 applications. The nominal sequence of packets is such that, when one or more packets are removed from said nominal packet sequence, it is possible to unambiguously determine in reception which packets have been removed and more particularly how large each packet so removed has been . As will be apparent from reading the following description, what matters to allow the third application 143 to pass information to the red domain is the size of the packets propagated in the communication system more than their respective contents (given that the first 121 and second 122 security gateways perform encryption and decryption operations). The contents of the packets of the nominal packet sequence are not important in the context of the present invention. Indeed, what matters is the size of these packets. The same applies to the other packet sequences transmitted from the first application 141 to the second application 142 intended to allow the third application 143 to provide information to the red domain by deleting at least one packet of said sequence . Thus, the packets of these sequences can contain dummy data, that is to say that the sequences are created specifically for the need to pass information from the black domain to the red domain without the packets. concerned do not contain useful data. In an alternative embodiment, the packets of these sequences may contain data to be transmitted from the first communication subnet 101 of the red type to the second communication subnet 102 of the red type (the encryption performed by the security gateway 121 preventing any device in the black domain to have access to the actual content of these packets). According to a preferred embodiment, the nominal packet sequence consists of a succession of packets ordered by increasing size. Alternatively, the nominal packet sequence consists of a succession of packets ordered by decreasing size. Any other predefined and known scheduling of the first 141, second 142 and third 143 applications is applicable. According to a preferred embodiment, the nominal packet sequence is delimited by at least one start packet and at least one end packet of predefined respective sizes. The sizes of the start and end packets are known from the first 141, second 142 and third 143 applications, and are not used within said nominal packet sequence. An example of a nominal packet sequence comprising such start and end packets is presented below in connection with FIG. 6A. In an alternative embodiment, the first application 141 transmits the nominal packet sequence over predefined (e.g. regularly) and known time periods of the second 142 and third 143 applications. In a next step S302, the first application 141 transmits, to the second application 142, the nominal packet sequence obtained in step S301. Packets of the nominal packet sequence obtained in step S301 are transmitted based on a transport protocol without acknowledgment or retransmission in case of loss. In a preferred embodiment, packets of the nominal packet sequence are transmitted based on the User Datagram Protocol (UDP) as defined by RFC 768. The nominal sequence of packets (after encryption) is intended to be intercepted by the third application 143. A network equipment of the black domain on a mandatory path of the secure tunnel from the first communication subnet 101 of the red type to the second sub red-type communication network 102, such as the network equipment 113, is adapted to discriminate the packets of the nominal packet sequence (after encryption) from the packets transported in the black domain and to route the packets up to the third application 143. The packets of said nominal sequence are then received by the security gateway 121 which then proceeds to an encryption of said packets. This encryption operation generally changes the size of the packets. However, a first packet of smaller size than a second packet results in a first encrypted packet of size generally less than (and at most equal to) the size of the packet resulting from the encryption of the second packet. In the case where the encryption of two packets of different sizes can lead to two respective encrypted packets of the same size, the first 141, second 142 and third 143 applications preferentially implement an initialization phase as described below in relation with Figs. 9-11. The different packet sizes of said nominal sequence are such that the encryption of said packets by the security gateway 121 generates respective encrypted packets of different sizes. After encryption, the packets of said nominal sequence are transmitted in the black domain, and are routed therein so that the third application 143 can process said packets as described below in relation with FIG. 5. In a particular embodiment, the nominal sequence of packets is colored with a dedicated Class of Service (CoS) service class, eg using a DSCP (DiffServ CodePoint) service class code as defined in FIG. normative document RFC 2474). Preferably, the nominal packet sequence is colored with the highest priority CoS service class among the CoS service classes not used in the quality of service QoS plan implemented in the communication system (preferably, using a code CS5 level DSCP service class or higher), in order to reduce the transport latencies experienced by the nominal packet sequence and to reduce the risk of packet loss within the nominal packet sequence). This CoS class of service benefits in the QoS plan from a guaranteed routing policy under network signaling, in order to eliminate the risk of packet loss due to QoS mechanisms within said nominal packet sequence. The CoS class of service information is typically copied in a clear header by the security gateways 121, 122 (to allow the black domain to implement a traffic management policy based on the CoS service classes of packets carried in the black domain). Another approach is to use routing addresses, at the level of the security gateways 121 and 122, which are specific for the nominal packet sequence (specific tunnel), and which are known to the network equipment of the black domain to route the packet of the packet. said nominal sequence via the third application 143. The packets of said nominal sequence can thus be easily discriminated from the other packets transported in the black domain. In a next step S303, the first application 141 waits for information from the third application 143, via the second application 142. This aspect is detailed below in relation to FIGS. 4 and 5. If within a predetermined period of time, no information from the third application 143 is received through the second application 142, the step S302 is repeated with a new sending of said nominal sequence of packets. Otherwise, a step S306 is performed, wherein said information is processed by the first application 141. The first application 141 can then propagate said information to an NMS network management station (Network Management Station in English), in charge of implementing FCAPS mechanisms {Fault, Configuration, Administration, Performance, Security in English) for the red domain, according to the ISO {International Organization for Standardization) network management model. In a particular embodiment, said information is representative of transmission conditions in the black domain {e.g. indication of congestion). In another particular embodiment, said information is representative of a command to be applied by the first application 141 or by the NMS network management station, or even a change of state command in a state machine implemented in the red domain {eg by the first application 141 or by the NMS network management station of the red domain). An example of such commands may be the implementation of a fallback QoS QoS plan of adjusting a service admission {e.g. closing / opening of certain physical interfaces and / or certain ports, limitation of FTP {File Transfer Protocol (English)) or HTTP {HyperText Transport Protocol (English)) traffic, reduction of a number of simultaneous authorized voice calls ,. ..), this QoS service quality plan of withdrawal applying to all or part of all network equipment interfaces with the black domain. In another particular embodiment, said information is status change information in a state machine implemented in the black domain (e.g. by the third application 143). In an alternative embodiment, when information from the third application 143 is received through the second application 142, the first application 141 performs a step S304 in which the first application 141 obtains, as a function of the information received in step S303, another sequence of packets of predefined sizes, this other sequence of packets being representative of a positive acknowledgment of the reception by the first application 141 of said information from the third application 143. As for the nominal sequence of packets, the packets are ordered according to a predefined scheduling according to their respective sizes, and this scheduling is known from the first 141, second 142 and third 143 applications. As detailed later, the third application 143 generates said information by deleting at least one packet from the nominal packet sequence (as obtained after encryption); this modified sequence of packets is representative of the information that the third application 143 wishes to provide to the red domain. Thus, in a particular embodiment, the packet sequence obtained by the first application 141 in step S304 is the same as the nominal packet sequence as received by the second application 142 after modification by the third application 143 to make pass said information to the red domain. For example, assume that the nominal sequence of packets is a succession of five packets of respective sizes T1, T2, T3, T4, T5. After encryption, the nominal sequence of packets becomes a succession of five packets of respective sizes TC1, TC2, TC3, TC4, TC5. Suppose also that the third application removes the size packet TC3 to provide information to the red domain. After decryption, the modified sequence of packets becomes a succession of four packets of respective sizes T1, T2, T4, T5. The second application 142 uses a predetermined look-up table to determine which information corresponds to the succession of the four packets of respective sizes T1, T2, T4, T5 received. The second application 142 then transmits said information to the first application 141. The first application 141 then generates the packet sequence in step S304 so as to consist of a succession of four packets of respective sizes T1, T2, T4, T5. The second 142 and third 143 applications are then informed of a positive acknowledgment, indicating that said information has been received by said first application 141. As for the nominal packet sequence transmitted in step S302, the packet sequence obtained in step S304 is intended to be intercepted by the third application 143. A black domain network equipment on the transit path from the first slot red-type communication network 101 up to the second red-type communication subnet 102, for example the network equipment 113, is adapted to discriminate the packets of the packet sequence obtained in step S304 (after encryption) among packets transported in the black domain and for routing said packets to the third application 143. In a particular embodiment, the packet sequence obtained in step S304 is colored with a dedicated CoS class of service, e.g. using a dedicated DSCP class of service code. Preferably, the packet sequence obtained in step S304 is colored with the same class of service CoS as the nominal packet sequence. Thus, the packet sequence obtained in step S304 is preferentially colored with the higher priority CoS service class among the CoS service classes not used in the QoS quality of service plan implemented in the communication system ( preferably, using a CS5 or higher order DSCP service class code), in order to reduce the transport latencies experienced by the packet sequence obtained in step S304 and to reduce the risk of packet loss within of the packet sequence obtained in step S304). This CoS class of service benefits in the QoS plan from a guaranteed routing policy under the network signaling, in order to eliminate the risk of packet loss due to the QoS mechanisms within said sequence of packets obtained at the same time. step S304. As for the nominal packet sequence transmitted in step S302, the packet sequence obtained in step S304 may be delimited by at least one start packet and at least one end packet. In an alternative embodiment, the first application 141 transmits said sequence of packets during predefined and known time periods of the second 142 and third 143 applications, wherein the first application 141 is assumed to transmit the nominal packet sequence. As for the nominal packet sequence transmitted in step S302, the packets of the packet sequence obtained in step S304 are transmitted based on a transport protocol without acknowledgment or retransmission in case of loss. In a preferred embodiment, the packets of the packet sequence obtained in step S304 are transmitted based on the UDP protocol. In a next step S305, the first application 141 transmits at least once, to the second application 142, this other packet sequence obtained in step S304. Preferably, said packet sequence is transmitted at least twice, so as to counter packet losses that may occur along the way. Preferably, said packet sequence is colored with the service class CoS as the nominal packet sequence. Then, the first application 141 performs step S306. It should therefore be noted that steps S304 and S305 are optional and advantageously allow the first application 141 to indicate to the third application 143 that the information sent by the third application 143 to the red domain has been received in the third application 143. red domain. Fig. 4 schematically illustrates an algorithm, implemented by the third application 143, to allow the first application 141 to receive information from said third application 143 via the second application 142. In a step S401, the third application 143 receives a sequence of packets of predefined respective sizes. The packets of said sequence are ordered according to a predefined scheduling according to their respective sizes. The packet sequence received at step S401 by the third application 143 corresponds to an encrypted version of the nominal packet sequence transmitted by the first application 141 in step S302. In a next step S402, the third application 143 checks whether the third application should provide information to the first application 141 and / or the second application 142 (i.e. to the red domain). Said information may come from an NMS network management station, in charge of implementing FCAPS mechanisms for the black domain, according to the ISO model of network management. In general, said information can come from a network equipment of the black domain. In a particular embodiment, said information is representative of transmission conditions in the black domain (e.g. indication of congestion). In another particular embodiment, said information is representative of a command to be applied by the first application 141 or by the NMS network management station, or even a change of state command in a state machine implemented in the red domain (eg by the first application 141 or by the NMS network management station of the red domain). In another particular embodiment, said information is status change information in a state machine implemented in the black domain (e.g., by the third application 143). If the third application 143 is to provide information to the first application 141 and / or the second application 142, a step S404 is performed; otherwise, a step S403 is performed. In step S403, the third application 143 propagates without modification, to the second application 142, the packet sequence received in step S401. Then, the algorithm of FIG. 4. In step S404, the third application 143 obtains the information to be provided to the first application 141 and / or the second application 142. In a next step S405, the third application 143 determines a code corresponding to the information to be provided. Each information potentially to be transmitted to the first application 141 and / or the second application 142 corresponds to a code in a predetermined correspondence table, of which the first 141, second 142 and third 143 applications are aware. In a next step S406, the third application 143 applies changes to the received packet sequence in step S401, by deleting at least one packet of said sequence, representative of the determined code. The third application 143 thus encodes the information to be provided to the red domain. Referring again to the example discussed in connection with FIG. 3, the packet sequence received in step S401 is a succession of five packets of respective sizes TC1, TC2, TC3, TC4, TC5. Assume that the code to which the information to be provided corresponds to deleting the size packet TC3 to provide said information to the first application 141 and / or the second application 142, then the third application 143 deletes the size packet TC3 from the packet sequence received at step S401. Such packet sequence modification is presented below in connection with FIG. 6B. Depending on the determined code, more than one packet may be discarded from the packet sequence received in step S401. Such packet sequence modification is presented below in connection with FIG. 6C. According to a particular embodiment based on binary codes, the third application 143 obtains, thanks to the correspondence table previously mentioned, a binary code MI which corresponds to the information to be transmitted to the red domain. The number of bits usable to define the binary code MI, whatever the information to be transmitted, is equal to the number of packets of different sizes in the nominal sequence of packets after encryption (which is therefore the same as the number of packets of distinct sizes in the nominal packet sequence as transmitted by the first application 141). Then, each packet of the nominal sequence of packets after encryption as received by the third application 143 is stored in a FIFO buffer (First-In First-Out). The packets are processed one after another by the third application 143 in the following manner (without necessarily waiting for all the packets of the nominal sequence of packets after encryption to be received by the third application 143): the third application 143 depile a packet of the FIFO buffer and retrieves the size Te; the third application 143 applies a function Fc to the size Te recovered so as to obtain a binary code Mc. The number of bits defining the binary code Mc is equal to the number of packets of different sizes in the nominal sequence of packets after encryption (which is therefore the same as the number of packets of distinct sizes in the nominal packet sequence as transmitted by the first application 141). The function Fc is a bijective function such that, for a given packet size among the possible sizes of the nominal sequence of packets after encryption, the function Fc returns a binary code with a single bit at the value "1" and the other bits at the value "0". The binary code Mc is therefore representative of the size of the depilated packet; the third application 143 performs a logical AND operation between the MI and Mc binary codes. When the result of the logical AND operation is equal to the binary code Mc, then the third application 143 decides not to delete said packet and to propagate it to the second application 142; otherwise, the third application 143 decides to delete said packet and not to propagate it to the second application 142. In other words, the third application 143 decides to delete or not said packet depending on the result of an operation logical AND between the MI and Mc binary codes; and - the third application 143 repeats these operations until all packets of the nominal sequence of packets after encryption as received by the third application 143 are unstacked and processed. In a next step S407, the third application 143 propagates to the second application 142 the packet sequence thus modified. In an optional next step S408, the third application 143 maintains these changes for each nominal sequence of packets that is received later, until a predefined condition is met. In a particular embodiment, the third application 143 maintains these changes for each nominal sequence of packets that is received later, until a predefined quantity Q of such nominal packet sequences has been so modified. This predefined quantity Q is such that, having maintained these modifications for Q successive packet nominal sequences, it is considered that the second application 142 has been able to discriminate the modifications made by the third application 143 of any packet losses related to poor transmission conditions between the first communication subnet 101 of the red type and the second communication subnet 102 of the red type. According to another particular embodiment, the third application 143 maintains these modifications for each nominal sequence of packets that is received later, until the first application 141 positively acknowledges the receipt of the information that has been provided by the third application 143 through these modifications. It is thus possible to get rid of packet losses that may occur along the way. Fig. 5 schematically illustrates an algorithm, implemented by the second application 142, to allow the first application 141 to receive information from the third application 143, using said second application 142. In a step S501, the second application 142 receives a sequence of packets. The received packet sequence is assumed to be the nominal packet sequence transmitted by the first application 141 in step S302 (since the second security gateway 122 decrypted), unless the third application 143 has proceeded. to modifications by deleting at least one packet with respect to the sequence of packets resulting from the encryption by the security gateway 121 of the nominal packet sequence as transmitted by the first application 141 in step S302. It is also possible, depending on the transmission conditions in the black domain, that one or more packets have been lost along the way. All packets of said sequence are assumed to be received when an end-of-sequence delimiter is received by the second application 142, or when a predefined duration timer elapses after receiving the last packet without a new packet being able to match. the same sequence of packets is received. In a next step S502, the second application 142 checks whether the received packet sequence at step S501 is complete, i.e. if the received packet sequence at step S501 corresponds to the nominal packet sequence . In a particular embodiment, if the packet sequence received in step S501 is incomplete, the second application 142 waits to receive at least one other copy of said packet sequence before determining which information is transmitted by the third application 143 to the black domain, to confirm that each missing packet is not due to a loss on the way. If the packet sequence received in step S501 is complete, a step S503 is performed; otherwise, a step S504 is performed. In step S503, the second application 142 throws the (nominal) packet sequence received in step S501, when it is expected that the packets of said sequence contain dummy data (dummy data in English). The second application 142 processes the contents of the packets of said sequence, when it is expected that the packets of said sequence contain useful data. In step S504, the second application 142 obtains information that has been encoded by the third application 143 in the incomplete packet sequence received in step S501. As detailed in connection with FIG. 4, the third application 143 encoded said information by deleting at least one packet with respect to the received packet sequence from the first application 141. The second application 142 detects each missing packet in the incomplete packet sequence and deduce a corresponding code. With a predetermined correspondence table, the second application 142 determines from said code which information is provided by the third application 143. By taking the example approached in relation to FIGS. 3 and 4, the packet sequence received in step S501 is a succession of four packets of respective sizes T1, T2, T4, T5 (the third application having deleted the size packet TC3). Since the size packet T3 has disappeared from the expected sequence from the first application 141, the second application deduces what information the third application 142 wanted to pass in the red domain. In said particular embodiment based on bit codes, each packet of the packet sequence as received by the second application 142 is stored in a FIFO buffer. The packets are processed one after the other by the second application 142 in the following manner: the second application 142 unpacks a packet from the FIFO buffer and retrieves the size T; the second application 142 applies a function F to the size T recovered so as to obtain a binary code M. The number of bits defining the binary code M is equal to the number of packets of different sizes in the nominal sequence of packets as transmitted by the first application 141. The function F is a bijective function such that, for an input packet size among the possible sizes of the nominal packet sequence, the function F returns a binary code with a single bit at the value "1 And the other bits at the value "0". The function F is furthermore such that, for a packet of size T resulting after encryption by the security gateway 121 into a packet of size Te, F (T) = Fc (Tc). The binary code M is therefore representative of the size of the depilated packet; the second application 142 performs a logical OR operation between the binary code Mets an MF variable which is a binary code of the same size as the binary code M. The variable M M is initialized to the value "0" before unstacking the very first packet of the packet sequence as received by the second application 142. The variable MF is updated with the result of said logical OR operation; and - the second application 142 repeats these operations until all packets of the packet sequence as received by the second application 142 are unstacked and processed. Thus, after having pared and processed all the packets of the packet sequence as received by the second application 142, the variable MF gives a binary code representative of the information that the third application 143 wanted to pass to the red domain. The information that the third application 143 wanted to pass to the red domain can then be found thanks to the binary code of the variable MF and the correspondence table previously mentioned. In a next step S505, the second application 142 transmits, to the first application 141, the information obtained in step S504. In a preferred embodiment, the second application 142 transmits said information using a message in a color packet with a different CoS class of service from that used by the first application 141 to transmit the nominal packet sequence at step S302. This makes it possible to implement in parallel a mechanism similar to that described in relation with FIGS. 3 to 5, but in the communication direction from the second application 142 to the first application 141, without interference between these parallel mechanisms. This message is preferably sent based on a transport protocol with acknowledgment and retransmission, to ensure the good reception of said message by the first application 141. Preferably, said message is transmitted based on the TCP protocol. (Transmission Control Protocol in English), as defined in RFC 793. Figs. 3 to 5 detail a mechanism in which information is transmitted by the third application 143, located in the black domain, to the first application 141, located in the red domain and generating the nominal sequence of packets that the third application 143 is capable of to modify, by deleting at least one packet, to provide said information. This mechanism is based in particular on a return of the second application 142 to the first application 141, which allows the first application 141 to receive said information provided by the third application 143. This assumes that the first application 141 is the recipient of said information provided by the third application 143. In the case where the second application 142 is addressed to said information provided by the third application 143, the return of the second application 142 to the first application 141 may be omitted, or used to require that the first application 141 transmits a sequence of packets representative of a positive acknowledgment of receipt by the second application 142 of said information provided by the third application 143. The second application 142 does not transmit, in this case, to the first application 141, said information provided by the third application 143, but a request from ac positive leave. In addition, in this case, said information is processed by the second application 142. The second application 142 can then propagate said information to the network management station NMS, in charge of implementing mechanisms FCAPS for the red domain, according to the ISO model of network management. As mentioned above, said information may be representative of conditions of transmission in the black domain (e.g. indication of congestion), or of a command to be applied by the second application 142 or by the NMS network management station. Said information may also be a state change command in a state machine implemented in the red domain (e.g., by the second application 142 or by the NMS network management station of the red domain). Said information may also be status change information in a state machine implemented in the black domain (e.g., the third application 143). Figs. 6A, 6B and 6C schematically illustrate sequences of packets appearing in exchanges occurring within the framework of the execution of the algorithms of FIGS. 3 to 5. The packets are represented diagrammatically by rectangles, the respective heights of which are representative of the sizes of said packets (or whose differences in heights are representative of the relative differences in sizes of said packets). Fig. 6A schematically represents an example of a succession of packets as issued by the first application 141 in step S302. The packet sequence begins with a start packet 60. Then begins said nominal packet sequence, as obtained by the first application 141 in step S301. Said nominal sequence of packets presented comprises a set of five packets 61, 62, 63, 64, 65 ordered by increasing size. Then there is an end packet 66. The start 60 and end 66 packets have respective predefined distinct sizes, and these sizes are not used to generate said nominal packet sequence. When the third application 143 has no information to pass to the red domain, the second application 142 is assumed to receive the packet sequence as issued by the first application 141 in step S302. When the third application 143 has information to be passed to the red domain, the third application 143 removes at least one packet from the received sequence of the first application 141, and the second application 142 receives a modified sequence of packets with respect to the sequence nominal packet as emitted by the first application 141 in step S302. Fig. 6B schematically illustrates an exemplary packet sequence received by the second application 142 in step S501, when the first application 141a transmitted in step S302 the nominal packet sequence shown in FIG. 6A and that the third application has removed the packet 63 (in its encrypted version) to pass information to the red domain. Fig. 6C schematically shows an exemplary packet succession received by the second application 142 in step S501, when the first application 141a transmitted in step S302 the nominal packet sequence shown in FIG. 6A and that the third application has removed packets 61 and 63 (in their respective encrypted versions) to pass information to the red domain. By execution of the algorithms of Figs. 3-5, the third application 143 can pass information to the red domain. The variety of information that the third application 143 can pass to the red domain depends on the size of the nominal packet sequence used, i.e. the amount of possible changes that the third application 143 is allowed to apply to the encrypted version of the nominal sequence of packets. If, for example, the nominal packet sequence comprises five packets of respective distinct sizes and the third application 143 is allowed to delete only one packet of the encrypted version of the nominal packet sequence, then the third application 143 can pass five separate information to the red domain. If, for example, the nominal sequence of packets comprises five packets of respective distinct sizes and the third application 143 is authorized to delete several packets from the encrypted version of the nominal sequence of packets without, however, deleting all the packets, then the third application 143 can pass thirty separate information to the red domain. The information that the third application 143 can make pass to the red domain are for example predefined commands, or even state change commands in a state machine implemented within the red domain. This information that the third application 143 can pass to the red domain is for example status change information in a state machine implemented within the black domain. An example of such state machines is presented below in connection with FIG. 7. The state machine shown in FIG. 7 comprises three states 701, 702, 703, and is illustratively described as being implemented in the black domain and the third application 143 informs the first application 141 of the progress within the state machine. A transition event 710 makes it possible to go from state 701 to state 702, a transition event 711 makes it possible to go from state 702 to state 703, a transition event 712 makes it possible to go from state 701 at state 703, transition event 721 returns state 702 to state 701, transition event 722 returns state 703 to state 702, and transition event 723 allows a return of state 703 to state 701. A nominal packet sequence comprising three packets of respective distinct sizes thus allows the third application 143 to pass information representative of the state change events in the machine. state shown in FIG. 7. In this state machine frame, it is possible to reduce the amount of events needed to manage the state machine. Transition event 721, returning from state 702 to state 701, and transition event 722, returning from state 703 to state 702, may be identical and signify "pass to a previous state in a predefined ordered list of states of the state machine ". To do this, a particular predefined size of packets is used. This particular size is not used in the rest of the nominal sequence. The first application 141 transmits two packets of this particular size in the nominal packet sequence, for example at the end of said nominal sequence. When the third application 143 removes a packet corresponding to the encrypted version of one of these particular size packets, the third application 143 requires switching to a state of rank N1 (considering that the current state is of rank N) in a predefined ordered list of states of the state machine (i.e., state 701 if the current state is state 701 and state 702 if the current state is state 703). It is possible to skip to N-x, x> 1, in the predefined ordered list of states of the state machine, using more packets of this particular size in the nominal sequence of packets. For example, the first application 141 transmits three packets of this particular size in the nominal packet sequence, for example at the end of said nominal sequence. When the third application 143 removes a packet corresponding to the encrypted version of one of these particular size packets, the third application 143 requires changing to a state of rank N1 in the predefined ordered list of states of the state machine ( ie at the state 701 if the current state is the state 701 and at the state 702 if the current state is the state 703), and when the third application 143 withdraws a packet corresponding to the encrypted version of one of these packets of a particular size, the third application 143 requires switching to a state of rank N-2 in the predefined ordered list of states of the state machine (ie in state 701 if the current state is state 703). This approach is particularly interesting in the case where the state machine has a large amount of states. Figs. 8A and 8B schematically illustrate sequences of packets appearing in exchanges occurring within the framework of the management of the state machine presented in FIG. 7. As for Figs. 6A to 6C, the packets are diagrammatically represented by rectangles, the respective heights of which are representative of the sizes of said packets (or of which the differences in heights are representative of the relative differences in sizes of said packets). Fig. 8A schematically represents an example of packet succession as issued by the first application 141 in step S302. The packet sequence begins with the start packet 60. Then begins said nominal packet sequence, as obtained by the first application 141 in step S301. Said nominal sequence of packets presented comprises a set of five packets. The packets 61, 62, 63 already present in FIG. 6A, and two packets 64 of the same particular size. The packets are scheduled in said nominal sequence by increasing size. Then comes the end packet 66. When the third application 143 has no information to pass to the red domain, the second application 142 is assumed to receive the packet sequence as issued by the first application 141 to the step S302. When the third application 143 has information to be passed to the red domain, the third application 143 removes at least one packet from the received sequence of the first application 141, and the second application 142 receives a modified sequence of packets with respect to the sequence nominal packet as emitted by the first application 141 in step S302. Fig. 8B schematically represents an exemplary packet sequence received by the second application 142 in step S501, when the first application 141 has transmitted in step S302 the nominal packet sequence shown in FIG. 8A and that the third application 143 has removed one of the packets 64 (in its encrypted version) to ask the red domain to move to a state of rank N-1 in the predefined ordered list of states of the state machine. The mapping tables used by the first 141, second 142 and third 143 applications can be predefined at the installation of the communication system. It is however possible that the first 141, second 142 and third 143 applications do not a priori know all the specificities of the security gateways 121, 122, so that the first 141, second 142 and third 143 applications do not know a priori what size changes brings the security gateway 121 during encryption, depending on the size of the packets transmitted by the first application 141. Indeed, it is possible that for certain packet sizes transmitted by the first application 141, the security gateway 121 inserts padding data in the encryption operation, so that two packets of different sizes transmitted by the first application 141 are found with the same size after encryption. In order to determine the packet sizes that can be used to construct the nominal packet sequence, the first, second, and second applications preferably implement an initialization phase, described below in relation to FIGS. 9 to 11. Fig. 9 schematically illustrates an algorithm, implemented by the first application 141, in the context of the initialization phase. In a step S901, the first application 141 performs, with the second application 142, a trigger exchange of the initialization phase. To do this, the first application 141 transmits to the second application a message indicating that the first application 141 wishes to trigger the initialization procedure. This message is preferably sent based on a transport protocol with acknowledgment and retransmission, to ensure the good reception of said message by the second application 142. Preferentially, said message is transmitted based on the TCP protocol . The first application 141 then receives a response message from the second application 142. If the response message includes information indicating that the second application 142 is ready to trigger the initialization procedure, a step S902 is performed; otherwise, step S901 is reiterated later. At the time when the initialization phase is triggered, the first 141, second 142 and third 143 applications consider that there are two packet sizes usable to build the nominal packet sequence that can pass information from the black domain to the domain red: a minimum size and a maximum size. From the point of view of the first 141 and second 142 applications, the minimum size corresponds to the size that each packet transmitted by the first application 141 to the second application 142 must have at least, and the maximum size corresponds to the size that each packet transmitted by the first application 141 to the second application 142 may have at most. From the point of view of the third application 143, the minimum size corresponds to the size after encryption of a packet having a size equal to the size that each packet transmitted by the first application 141 to the second application 142 must have at least , and the maximum size corresponds to the size after encryption of a packet having a size equal to the size that each packet transmitted by the first application 141 to the second application 142 can have at most. The size that each packet transmitted by the first application 141 to the second application 142 must have at least and the maximum size corresponds to the size that each packet transmitted by the first application 141 to the second application 142 can have at most are such that, after encryption, the corresponding packets have distinct sizes. In step S902, the first application 141 obtains an initialization sequence. The initialization sequence consists of a remarkable sequence of packets of predefined respective sizes. Each packet of the initialization sequence is of size equal to the maximum MTU (Maximum Transmission Unit in English) of the packets transmitted without fragmentation in the red domain, or of size equal to the minimum size of the packets transmitted in the red domain. . For the communication networks mentioned in the introductory part, a maximum MTU size of 1300 bytes is generally allowed at the level of the network equipment of the red domain, to remain consistent with the size of headers added by the security gateways and not to exceed in the black domain the maximum size set by satellite modems (maximum MTU size equal to 1500 bytes at this level). The layout of the initialization sequence is known from the first 141, second 142 and third 143 applications. The initialization sequence preferably further comprises another set of packets intended to allow the third application 143 to perform an acknowledgment, by deleting at least one of the packets of said other set. For example, said other set comprises at least two packets, at least one packet of size equal to said minimum size and at least one packet of size equal to said maximum size. The third application 143 is then supposed to delete at least one packet of size equal to said minimum size when the third application 143 does not wish to launch the initialization phase (negative acknowledgment), and is supposed to delete at least one packet of size equal to said maximum size otherwise (positive acknowledgment). This aspect is detailed below in relation to FIG. 10. In a next step S903, the first application 141 transmits, to the second application 142, the initialization sequence obtained in step S901. As for the nominal packet sequence transmitted in step S302, the initialization sequence (after encryption) is intended to be intercepted by the third application 143. A network equipment of the black domain on the transit path from the first subsystem communication network 101 of the red type up to the second red type of communication subnet 102, for example the network equipment 113, is adapted to discriminate the packets of the initialization sequence (after encryption) among the packets transported in the black domain and for routing said packets to the third application 143. As for the nominal packet sequence transmitted in step S302, the packets of the initialization sequence are transmitted based on a transport protocol without acknowledgment or retransmission in case of loss. In a preferred embodiment, the packets of the initialization sequence are transmitted based on the UDP protocol. The packets of the initialization sequence are then received by the security gateway 121 which then proceeds to an encryption of said packets. After encryption, the packets of the initialization sequence are transmitted in the black domain, in order to be processed by the third application 143 as described below in relation with FIG. In a particular embodiment, the initialization sequence is stained with a dedicated CoS class of service, e.g. using a dedicated DSCP class of service code. Preferably, the initialization sequence is colored with the same service class CoS as the nominal packet sequence. Thus, the initialization sequence is preferentially colored with the higher priority CoS service class among the CoS service classes not used in the quality of service QoS plan implemented in the communication system (preferentially, using a CS5 level or higher order DSCP service class code), in order to reduce the transport latencies experienced by the initialization sequence and to reduce the risk of packet loss within the initialization sequence. This CoS class of service benefits in the QoS plan from a guaranteed routing policy under network signaling, in order to eliminate the risk of packet loss due to the QoS mechanisms within said initialization sequence. In a next step S904, the first application 141 waits for a positive acknowledgment from the second application 142. As detailed below in relation to FIGS. 10 and 11, such a positive acknowledgment is representative that the second application 142 has detected the initialization sequence transmitted by the first application 141 to step S903 and the third application 143 has indicated having recognized the encrypted version of the initialization sequence transmitted by the first application 141 to step S903. If within a predetermined time, no positive acknowledgment is received from the second application 142, or if a negative acknowledgment is received from the second application 142, a step S905 is performed. Otherwise, a step S907 is performed. In step S905, the first application 141 checks whether a predefined maximum quantity of tests has been reached to implement the initialization phase. If this is the case, a step S906 is performed, during which the algorithm of FIG. 9; otherwise, step S903 is repeated. The implementation of an acknowledgment mechanism vis-à-vis the initialization sequence is optional, and advantageously makes it possible to ensure that the second 142 and third 143 applications have detected the initialization sequence transmitted by the initialization sequence. first application 141 in step S903. In step S907, the first application 141 obtains a test sequence. The test sequence consists of a predefined concatenation of all the usable packet sizes (without taking into account possible restrictions related to the security gateway 121) to generate the nominal packet sequence which makes it possible to pass information from the packet. black domain at the red domain. Each packet in the test sequence has a different size. In the test sequence, packets are ordered by increasing size or decreasing size. In a next step S908, the first application 141 transmits, to the second application 142, the test sequence obtained in step S907. As for the initialization sequence transmitted in step S903, the test sequence (after encryption) is intended to be intercepted by the third application 143. A black domain network equipment on the transit path from the first subnet communication device 101 of the red type to the second red type of communication sub-network 102, such as, for example, the network equipment 113, is adapted to discriminate the packets of the test sequence (after encryption) from the packets transported in the black domain and for routing said packets to the third application 143. The packets of the test sequence are then received by the security gateway 121 which then proceeds to an encryption of said packets. After encryption, the packets of the test sequence are transmitted in the black domain, in order to be processed by the third application 143 as described below in relation to FIG. 10. In a particular embodiment, the test sequence is stained with a dedicated CoS class of service, e.g. using a dedicated DSCP class of service code. Preferably, the test sequence is colored with the same CoS class of service as the nominal sequence of packets. Thus, the test sequence is preferentially colored with the higher priority CoS service class among the CoS service classes not used in the QoS service quality plan implemented in the communication system (preferentially, by using a code CS5 level DSCP service class or higher order), in order to reduce the transport latencies experienced by the test sequence and to reduce the risk of packet loss within the test sequence). This CoS class of service benefits in the QoS plan from a guaranteed routing policy under network signaling, in order to eliminate the risk of packet loss due to QoS mechanisms within said test sequence. As for the nominal packet sequence transmitted in step S302, the packets of the test sequence are transmitted based on a transport protocol without acknowledgment or retransmission in case of loss. In a preferred embodiment, the packets of the test sequence are transmitted based on the UDP protocol. In a next step S909, the first application 141 waits for a list of packets from the second application 142. This list contains a description of each of the packets of the test sequence that the second application 142 has actually received. . Indeed, as detailed below in relation to FIG. 10, the third application 143 is capable of deleting one or more packets from the test sequence, to signify that several packets after encryption are of the same size, while the packets of the test sequence before encryption have respective distinct sizes. In a next step S910, the first application 141 selects an applicable correspondence table from the list of packets received in step S909, from among a predefined set of possible lookup tables. The more packets of different sizes received in step S909, the greater the variety of information that the third application 143 can pass to the red domain. Selecting the mapping table defines the nominal sequence of packets to be used, since this defines the number of distinct size packets that the first application 141 can use to allow the third application 143 to pass information to the red domain. In said particular embodiment based on binary codes, each correspondence table is associated in a predefined manner with a function F and a function Fc. Selecting the correspondence table amounts to imposing the function F and also the function Fc, so that the processes performed by the first 141, second 142 and third 143 applications are consistent with each other. In a next step S911, the first application 141 transmits, to the second application 142, a sequence of packets representative of the correspondence table selected in step S910. Said sequence therefore comprises a first set of packets that is representative of the correspondence table selected in step S910. Each packet of said first set is of equal size to either said maximum size or said minimum size, and said first set is a succession of such packets such that respective sizes of successive packets of said first set represent the selected correspondence table. at step S910. The sequence of packets representative of the correspondence table selected in step S910 is intended to be intercepted by the third application 143. A black domain network equipment on the transit path from the first red type communication subnet 101 to the second communication subnet 102 of the red type, such as for example the network equipment 113, is adapted to discriminate the packets of said sequence (after encryption) from the packets transported in the black domain and to route said packets as far as possible. 'to the third application 143. The sequence of packets representative of the correspondence table selected in step S910 preferably also comprises a second set of packets intended to allow the third application 143 to perform an acknowledgment, by deleting at least one of the packets of said second together. For example, said second set comprises at least two packets, at least one packet of size equal to said minimum size and at least one packet of size equal to said maximum size. The third application 143 is then supposed to delete at least one packet of size equal to said minimum size when the third application 143 disagrees with the correspondence table selected by the first application 141 (negative acknowledgment), and is supposed to delete at least one packet of size equal to said maximum size otherwise (positive acknowledgment), or vice versa. This aspect is detailed below in relation to FIG. 10. In a particular embodiment, the sequence of packets representative of the correspondence table selected in step S910 is colored with a dedicated CoS class of service, e.g. using a dedicated DSCP class of service code. Preferably, the sequence of packets representative of the correspondence table selected in step S910 is colored with the same service class CoS as the nominal packet sequence. Thus, the sequence of packets representative of the correspondence table selected in step S910 is preferentially colored with the higher priority CoS service class among the CoS service classes not used in the QoS QoS plan implemented. in the communication system (preferably, using CS5-level or higher-level DSCP service class code), to reduce the transport latencies experienced by the packet sequence representative of the selected correspondence table at the same time. step S910 and reduce the risk of packet loss within the sequence of packets representative of the correspondence table selected in step S910. This CoS class of service benefits in the QoS plan from a guaranteed routing policy under network signaling, in order to eliminate the risk of packet loss related to QoS mechanisms within said sequence of packets representative of the correspondence table selected in step S910. As for the nominal packet sequence transmitted in step S302, the packets of the packet sequence representative of the correspondence table selected in step S910 are transmitted based on a transport protocol without acknowledgment or retransmission in case of loss. In a preferred embodiment, the packets of the packet sequence representative of the correspondence table selected in step S910 are transmitted based on the UDP protocol. In a next step S912, the first application 141 waits for a positive acknowledgment from the second application 142. As detailed below in relation to FIGS. 10 and 11, this positive acknowledgment is representative of the fact that the second application 142 detected that the third application 143 indicated having received the encrypted version of the sequence of packets representative of the correspondence table selected in step S910, and therefore to be applied in the context of the execution of Figs. 3 to 5. If a positive acknowledgment is received, a step S913 is performed, during which the first application 141 decides to apply, in the context of the execution of Figs. 3 to 5, the correspondence table selected in step S910; otherwise, a step S914 is performed, during which the algorithm of FIG. 9. Fig. 10 schematically illustrates an algorithm, implemented by the third application 143, as part of the initialization phase. In a step S1001, the third application 143 receives an encrypted version of the initialization sequence transmitted by the first application 141 in step S903. In an optional next step S1002, the third application 143 modifies the initialization sequence by deleting at least one packet, to indicate that the third application 143 has recognized the encrypted version of the initialization sequence transmitted by the first application 141 at step S903. In a particular embodiment already mentioned, the initialization sequence further comprises another set of packets intended to allow the third application 143 to perform an acknowledgment, by deleting at least one of the packets of said other set. For example, said other set comprises at least two packets, at least one packet of size equal to said minimum size and at least one packet of size equal to said maximum size. The third application 143 is then supposed to delete at least one packet of size equal to said minimum size when the third application 143 does not wish to launch the initialization phase (negative acknowledgment), and is supposed to delete at least one packet of size equal to said maximum size otherwise (positive acknowledgment). In a next step SI 003, the third application 143 propagates, to the second application 142, the initialization sequence (in encrypted form), possibly modified in step S1002. In a next step S1004, the third application 143 receives another sequence of packets. This other packet sequence is an encrypted version of the test sequence transmitted by the first application 141 in step S908. In a next step S1005, the third application 143 optionally modifies the packet sequence received in step S1004. The third application 143 traverses the packets of said sequence of packets in their order of arrival, and analyzes the respective sizes. When the third application 143 encounters a packet size already encountered in the course of said packet sequence, the third application 143 deletes the corresponding packet from said packet sequence. In other words, the third application 143 deletes the size duplicates in the packet sequence received in step S1004. As already mentioned, these size duplicates may occur as a result of jamming data being inserted by the security gateway 121 during the packet encryption operations of the test sequence issued by the first application 141 in step S908. Since the test sequence transmitted by the first application 141 is based on increasing or decreasing size ordered packets, the size duplicates are successive packets in the packet sequence received in step S1004. In a next step S1006, the third application 143 propagates, to the second application 142, the test sequence (in encrypted form) possibly modified in step S005. In a next step SI007, the third application 143 waits to receive a sequence of packets representative of the correspondence table selected by the first application 141. Said sequence of packets is that transmitted by the first application 141 to step S911 . In a next step S1008, the third application 143 stores information representative of the correspondence table selected by the first application 141, so as to apply, in the context of the execution of Figs. 3 to 5, the correspondence table selected by the first application 141. If the third application 143 disagrees with the correspondence table selected by the first application 141, the third application 143 does not perform the step S1008. In the particular embodiment based on binary codes already mentioned, each correspondence table is associated in a predefined manner with a function Fc to be applied to retrieve a binary code from an encrypted packet size. The third application 143 therefore selects the function Fc to be applied in the context of the execution of Figs. 3 to 5. In a next optional step S1009, the third application 143 modifies the received packet sequence at step S007, by deleting at least one packet, to indicate whether the third application 143 agrees with the match table selected by the first application 141. As indicated in connection with FIG. 9, said sequence of packets preferably comprises a set of packets intended to allow the third application 143 to perform an acknowledgment, by deleting at least one of the packets of said set. For example, said set comprises at least two packets of different sizes, namely at least one packet of size equal to said minimum size and at least one packet of size equal to said maximum size. The third application 143 deletes at least one packet of size equal to said minimum size when the third application 143 disagrees with the correspondence table selected by the first application 141 (negative acknowledgment), and deletes at least one packet of size equal to said maximum size otherwise (positive acknowledgment) .. In a next step SI010, the third application 143 propagates, to the second application 142, the sequence modified in step SI 009. Fig. 11 schematically illustrates an algorithm, implemented by the second application 142, in the context of the initialization phase. In a step SI 101, the second application 142 performs, with the first application 141, a trigger exchange of the initialization phase. To do this, the second application 142 receives from the first application 141 a message indicating that the first application 141 wishes to trigger the initialization procedure. Upon receipt of this message, the second application 142 responds to the first application 141 with a response message. If the second application 142 is ready to initiate the initialization procedure, the response message includes information indicating that the second application 142 is ready to trigger the initialization procedure, and a step S112 is performed; otherwise, step SI 101 is reiterated later. This response message is preferably sent based on a transport protocol with acknowledgment and retransmission, in order to ensure the good reception of said message by the first application 141. Preferably, said message is transmitted based on the TCP protocol. In step S102, the second application 142 receives a sequence of packets. This sequence of packets is assumed to correspond to the initialization sequence transmitted by the first application 141 in step S903, possibly modified by the third application 143 in step S1002. Consider later that the third application 143 is supposed to modify the initialization sequence (in its encrypted version) to provide an acknowledgment. In a next step S110, the second application 142 checks whether the packet sequence received at step S1 102 is complete, that is, if the packet sequence received at step S110 corresponds to the sequence initialization as transmitted by the first application 141 to step S903. If this is the case, it means that the third application 143 did not recognize the encrypted version of the initialization sequence transmitted by the first application 141 in step S903, and the second application 142 then sends, in a step SI 103, a negative acknowledgment to the first application 141. If the packet sequence received at step S110 is incomplete and the change corresponds to an indication that the third application 143 has recognized the encrypted version of the initialization sequence transmitted by the first application 141 to step S903 (modification optionally applied by the third application 143 to step S1002), then the second application 142 sends, in step S110, a positive acknowledgment to the first application 141; otherwise, the second application 142 sends, in step S110, a negative acknowledgment to the first application 141. Then, a step S1104 is performed. In the case where the third application is not supposed to modify the initialization sequence (in its encrypted version) to provide an acknowledgment, the algorithm of FIG. 11 goes directly from step SI 102 to step SI 104. In the next step S104, the second application 142 receives a test sequence, possibly modified following the operations performed by the third application 143 in step S0000. The test sequence received by the second application 142 may therefore be different from that transmitted by the first application 141 in step S908. The test sequence received by the second application 142 in step S104 contains packets that are of different sizes, since any duplicates have been removed by the third application 143 in step S0000. In a next step S110, the second application 142 determines a list of packet sizes present in the test sequence received at step S104. These are the packet sizes that can be distinctly used by the first application 141 to generate the nominal packet sequence which allows the third application 143 to pass information to the red domain. In a next step S106, the second application 142 transmits, to the first application 141, the list of packet sizes determined in step S1105. In a next step SI 107, the second application 142 receives a sequence of packets representative of the correspondence table selected by the first application 141. Said sequence of packets is that which was possibly modified by the third application 143 in step S1009 . The modification possibly made by the third application 143 in step S1009 indicates whether the third application 143 agrees with the correspondence table selected by the first application 141. If the third application 143 does not agree with the Correspondence table selected by the first application 141, the second application 142 propagates a negative acknowledgment to the first application 141 and terminates the algorithm of FIG. 11. Otherwise, in a next step S118, the second application 142 stores information representative of the correspondence table selected by the first application 141, so as to apply, in the context of the execution of FIGS. 3 to 5, the correspondence table selected by the first application 141. In the particular embodiment based on binary codes already mentioned, each correspondence table is associated in a predefined manner with a function F to be applied to retrieve a binary code to from an unencrypted packet size. The second application 142 therefore selects the function F to be applied in the context of the execution of Figs. 3 to 5. The first application 141 can do the same. Then, in a next step 109, the second application 142 propagates a positive acknowledgment to the first application 141 and terminates the algorithm of FIG. 11. Thus by executing the algorithms of Figs. 9 to 11, a correspondence table adapted to the operation of the security gateway 121 is selected by the first application 141 from a predefined set of correspondence tables.
权利要求:
Claims (15) [1" id="c-fr-0001] CLAIMS 1 / Method for transmitting information to a first application (141) and / or a second application (142) from a third application (143), the first application being executed in a first subnetwork (101) of the red type and the second application in a second red-type subnet (102), the third application being executed in a black-type network (103), each red-type subnet being of security level greater than the black-type network, the first and second red-type subnetworks being interconnected via the black-type network by a secure tunnel between a first security gateway (121) of the first red-type subnet and a second gateway security device (122) of the second red-type subnet applying encryption and decryption operations such that each first packet of smaller size than a second packet results after in a first encrypted packet of size less than or equal to the size of the packet resulting from the encryption of the second packet, characterized in that: the first application transmits (S302) to the second application a nominal sequence of packets, the packets of said nominal sequence being ordered according to a predefined order according to their respective sizes, and said nominal sequence being such that it is possible to unambiguously determine in reception the size of each packet that would have been removed from said sequence; a network device (113) of the black type network on a mandatory path of said secure tunnel route to the third application each packet of said nominal sequence after encryption of the first gateway; when the third application wishes to transmit said information to the first application and / or the second application, the third application makes modifications (S406) of said nominal sequence after encryption of the first gateway, by deleting at least one packet each packet deleted being a function of said information, and propagates (S407) packets of said sequence after encryption of the first gateway that have not been deleted; when the third application does not wish to transmit information to the first application and / or the second application, the third application propagates (S403) the packets of said nominal sequence after encryption of the first gateway; upon receipt (S501) of a packet sequence assumed to be the nominal packet sequence, the second application verifies (S502) whether at least one packet has been deleted by the third application; and when the second application detects that at least one packet has been deleted by the third application, the second application retrieves (S504) said information from the size of each packet thus removed from said nominal packet sequence. [0002] 2 / A method according to claim 1, characterized in that the nominal packet sequence is delimited by at least one start packet (60) and at least one end packet (66) of predefined respective sizes which are not used within of said nominal packet sequence. [0003] 3 / A method according to any one of claims 1 and 2, characterized in that the packets of the nominal packet sequence are colored with a predefined class of service, and in that said network equipment type black route each packet thus colored, from the first subnet red type, to the third application. [0004] 4 / A method according to any one of claims 1 to 3, characterized in that, when the third application has transmitted said information to the first application and / or the second application, the first application transmits (S305) to the second application another packet sequence representative of a positive acknowledgment of receipt of said information, the packets of said other sequence being ordered according to a predefined scheduling according to their respective sizes, and in that said network equipment of the network of type black route to the third application each packet of said other sequence after encryption of the first gateway. [0005] 5 / A method according to any one of claims 1 to 4, characterized in that the third application maintains (S408) the changes for each nominal sequence of packets that is received later, to fulfill a predefined condition. [0006] 6 / A method according to claim 5, characterized in that, when the second application receives a modified nominal packet sequence, the second application waits to receive at least one other copy of said modified packet sequence before determining which information is transmitted by the third application to the first application and / or the second application. [0007] 7 / A method according to any one of claims 1 to 6, characterized in that each potentially transmitting information from the third application to the first application and / or the second application corresponds to a code in a predetermined correspondence table, said information corresponding to a binary code MI in said correspondence table, in that the third application repeats the following steps for each packet until all the packets of the nominal sequence of packets after encryption are processed: - recover the size Te said packet; applying a function Fc to the size Te recovered so as to obtain a binary code Mc, the function Fc being a bijective function such that, for a given packet size among the possible sizes of the nominal sequence of packets after encryption, the function Fc returns a binary code with a single bit at the value "1" and the other bits at the value "0"; - delete or not said packet based on the result of a logical AND operation between the binary codes M / and Mc; and in that the second application repeats the following steps for each packet until all the packets of the sequence assumed to be the nominal sequence of packets are processed: - recovering the size T of said packet; applying a function Τ 'to the retrieved size T so as to obtain a binary code M, the function F is a bijective function such that, for an input packet size among the possible sizes of the nominal sequence of packets, the function F returns a binary code with a single bit at the value "1" and the other bits at the value "0", and further such that, for a packet of size T resulting after encryption by the first security gateway in one packet size Te, F (T) -Fc (Tc); and updating an MF variable, initialized to the value "0" for the very first packet of the sequence assumed to be the nominal packet sequence, with the result of a logical OR operation between the binary code. ; and in that the variable MF gives a binary code representative of said information within the previously mentioned correspondence table. [0008] 8 / A method according to any one of claims 1 to 7, characterized in that said information is representative of a change of state control in a state machine. [0009] 9 / A method according to claim 8, characterized in that a particular packet size is representative of an action of transition to a previous state in a predefined ordered list of states of the state machine, and the first application transmits to minus two packets (64) of this particular size in the nominal packet sequence, this particular size not being used in the remainder of the nominal sequence, and in that the third application deletes an x amount of packets of said particular size within said nominal sequence after encrypting the first gateway to represent a transition to a state of rank Nx. [0010] 10 / A method according to any one of claims 1 to 9, characterized in that an initialization phase is previously implemented as follows: - the first application transmits (S908) to the second application a test sequence consisting of a predefined concatenation of the set of packet sizes usable to generate said nominal packet sequence, each packet of the test sequence having a different size and said packets are ordered by increasing or decreasing size; said network equipment of the black-type network route to the third application each packet of said test sequence after encryption of the first gateway; the third application deletes (S 1005) each duplicate of size in the test sequence after encryption of the first gateway and propagates (S 1006) the thus modified test sequence to the second application; and when the second application receives (SI 104) a packet sequence assumed to be the test sequence, the second application determines (SI 105) the packet sizes that were not deleted by the third application, these packet sizes then can be distinctly used to generate said nominal packet sequence, and inform (SI 106) the first application. [0011] 11 / A method according to claim 10, characterized in that the packets of the test sequence are colored with a predefined class of service, and in that said network equipment of the black type network route each packet thus colored, from the first red subnet, to the third application. [0012] 12 / A method according to any one of claims 10 and 11, characterized in that the initialization phase is previously as follows: - the first application transmits (S903) to the second application an initialization sequence consisting of a remarkable sequence of packets, the size of each packet of the initialization sequence is equal to a maximum size without fragmentation in the first and second sub-networks of the red type, or equal to a minimum packet size in the first and second second red-type subnets; and said network equipment of the black-type network route to the third application each packet of said initialization sequence after encryption of the first gateway. [0013] 13 / A method according to claim 12, characterized in that the packets of the initialization sequence are colored with a predefined class of service, and in that said network equipment of the black type network routes each packet thus colored, from the first red subnet, to the third application. [0014] 14 / A method according to any one of claims 12 and 13, characterized in that each potentially transmitting information from the third application to the first application and / or the second application corresponds to a code in a predetermined correspondence table, and the first application transmits (S911) to the second application a sequence of packets representative of a correspondence table selected from a predefined set of correspondence tables according to the packet sizes which have not been deleted by the third application within the test sequence, and said sequence of packets representative of the selected correspondence table comprises a first set of packets representative of the selected correspondence table and a second set to allow the third application to perform an acquittal by deleting at least one packet of said second set, the size of each packet of the sequence of packets representative of the selected correspondence table is equal to the maximum size without fragmentation in the first and second sub-networks of the red type, or equal to the minimum size of packet in the first and second red-type subnets; and - said network equipment of the black-type network route to the third application each packet of said sequence of packets representative of the selected correspondence table after encryption of the first gateway. [0015] 15 / A system for transmitting information to a first application (141) and / or a second application (142) from a third application (143), the first application being executed in a first sub-network ( 101) of the red type and the second application in a second red-type subnet (102), the third application being executed in a black-type network (103), each red-type subnet being of a higher security level. to the black-type network, the first and second red-type subnetworks being interconnected via the black-type network by a tunnel secured between a first security gateway (121) of the first red-type subnetwork and a second gateway of security (122) of the second red-type subnetwork applying encryption and decryption operations such that each first packet of smaller size than a second packet results after u-encryption n first encrypted packet of size less than or equal to the packet size resulting from the encryption of the second packet, characterized in that: - the first application is adapted to transmit (S302) to the second application a nominal packet sequence, the packets of said nominal sequence being ordered according to a predefined order according to their respective sizes, and said nominal sequence being such that it is possible to unambiguously determine in reception the size of each packet that would have been removed from said sequence; a network device (113) of the black type network on a mandatory path of said secure tunnel is adapted to route to the third application each packet of said nominal sequence after encryption of the first gateway; when the third application wishes to transmit said information to the first application and / or the second application, the third application is adapted to perform (S406) modifications of said nominal sequence after encryption of the first gateway, by deletion of least one packet, each deleted packet being a function of said information, and for propagating (S407) the packets of said sequence after encryption of the first gateway that have not been deleted; when the third application does not wish to transmit information to the first application and / or the second application, the third application is adapted to propagate (S403) packets of said nominal sequence after encryption of the first gateway; upon receipt (S501) of a packet sequence assumed to be the nominal packet sequence, the second application is adapted to check (S502) whether at least one packet has been deleted by the third application; and when the second application detects that at least one packet has been deleted by the third application, the second application is adapted to retrieve (S504) said information from the size of each packet thus removed from said nominal packet sequence.
类似技术:
公开号 | 公开日 | 专利标题 EP3332527B1|2020-04-01|Method for transmitting information between two domains of different security levels FR2926939A1|2009-07-31|DATA TRANSMISSION METHOD WITH ACQUITTATION ANTICIPATION, INPUT DEVICE, COMPUTER PROGRAM PRODUCT, AND CORRESPONDING STORAGE MEDIUM FR2923969A1|2009-05-22|METHOD FOR MANAGING FRAMES IN A GLOBAL COMMUNICATION NETWORK, COMPUTER PROGRAM PRODUCT, CORRESPONDING STORAGE MEDIUM AND TUNNEL HEAD EP3210346B1|2018-12-12|Method of creating a substream of data packets EP3476095A1|2019-05-01|Method for multi-path udp communication method between two terminals WO2019002754A1|2019-01-03|Method of quic communication via multiple paths FR2929789A1|2009-10-09|Data flow transmission improvement mechanisms managing method for use over internet to passenger, involves determining nature and location of transmission problem, and managing transmission improvement mechanisms based on determined results EP3476096B1|2020-08-26|Udp communication method between two terminals via multiple paths EP2340636A2|2011-07-06|Mechanism for updating parameters of a session established through a virtual circuit EP2979222B1|2019-10-09|Method for storing data in a computer system performing data deduplication EP3318023B1|2020-06-17|Method of optimizing the loading of a network connections hub EP3117573B1|2018-09-12|Method of managing congestion of a transmission link in a packet communication network FR3039951A1|2017-02-10|METHOD FOR TRANSMITTING INFORMATION BETWEEN TWO DOMAINS OF SEPARATE SECURITY LEVELS EP3664377B1|2021-07-21|Method and device for measuring a parameter representative of the transmission time on an encrypted tunnel FR3039345A1|2017-01-27|ROUTING SYSTEM FOR DATA FILTERING FOR THE INTEGRATION AND TESTING OF OPERATIONAL EQUIPMENT EP2476225B1|2014-02-26|Method and system for controlling the routing of a data stream from a class of service through a meshed and encrypted network WO2006090024A1|2006-08-31|Method for managing an interconnection between telecommunication networks and device therefor FR2947123A1|2010-12-24|Data e.g. video stream, transmitting method for internet, involves forming packets from main data such that length values formed by each packet length corresponds to length values generated by coding, and transmitting packets to receiver FR3013553A1|2015-05-22|METHOD OF TRANSMITTING PACKETS IN A NETWORK AND NETWORK IN WHICH SUCH METHOD IS IMPLEMENTED. FR2925251A1|2009-06-19|Local and remote tunnel heads connection e.g. secured transfer control protocol/internet protocol connection, controlling method for e.g. digital audio/video and photo equipment, involves tilting local tunnel head in unloading mode
同族专利:
公开号 | 公开日 EP3332527B1|2020-04-01| EP3332527A1|2018-06-13| FR3039952B1|2017-08-25| US20180227271A1|2018-08-09| WO2017021388A1|2017-02-09|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 GB2430834A|2005-09-30|2007-04-04|Boeing Co|Routing method for cryptographic networks| US20150215222A1|2014-01-27|2015-07-30|Anue Systems, Inc.|Traffic Differentiator Systems For Network Devices And Related Methods| WO2018113902A1|2016-12-19|2018-06-28|Huawei Technologies Co., Ltd.|Network node and client device for measuring channel state information| US10949343B2|2018-02-12|2021-03-16|International Business Machines Corporation|Instant storage reclamation ensuring uninterrupted media recording| US11038923B2|2018-02-16|2021-06-15|Nokia Technologies Oy|Security management in communication systems with security-based architecture using application layer security|
法律状态:
2016-08-30| PLFP| Fee payment|Year of fee payment: 2 | 2017-02-10| PLSC| Publication of the preliminary search report|Effective date: 20170210 | 2017-08-29| PLFP| Fee payment|Year of fee payment: 3 | 2018-08-29| PLFP| Fee payment|Year of fee payment: 4 | 2019-08-28| PLFP| Fee payment|Year of fee payment: 5 | 2020-07-21| PLFP| Fee payment|Year of fee payment: 6 | 2021-07-23| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1501657A|FR3039952B1|2015-08-03|2015-08-03|METHOD FOR TRANSMITTING INFORMATION BETWEEN TWO DOMAINS OF SEPARATE SECURITY LEVELS|FR1501657A| FR3039952B1|2015-08-03|2015-08-03|METHOD FOR TRANSMITTING INFORMATION BETWEEN TWO DOMAINS OF SEPARATE SECURITY LEVELS| US15/749,279| US20180227271A1|2015-08-03|2016-08-02|Method for transmitting information between two domains with distinct security levels| EP16747493.1A| EP3332527B1|2015-08-03|2016-08-02|Method for transmitting information between two domains of different security levels| PCT/EP2016/068378| WO2017021388A1|2015-08-03|2016-08-02|Method for transmitting information between two domains of different security levels| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|