Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method for encrypted communication

A technology for encrypted communication and communication system, applied in the field of encrypted communication, can solve the problems of complicated password management and complicated processing, and achieve the effects of simplified authentication, secure communication, and simplified authentication processing.

Inactive Publication Date: 2009-06-17
HITACHI LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] For example, when an external communication terminal connected to the Internet remotely accesses an internal communication terminal connected to the company's network to perform work, and when using the service of an application server from the internal communication terminal, other than the VPN device In addition to authentication processing, authentication processing in the application server is required, such as inputting user ID, password, etc., and there is a problem that password management becomes complicated
[0013] In addition, in the conventional VPN technology, there is the following problem, that is, if the communication encryption between the VPN device and the internal communication terminal and between the internal communication terminal and the AP server is not considered in advance, in order to ensure security, the external The overall communication path between the communication terminal and the AP server is encrypted, and the processing for this is very cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for encrypted communication
  • System and method for encrypted communication
  • System and method for encrypted communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0073] figure 1 It is a diagram illustrating the configuration of a communication system according to an embodiment of the present invention.

[0074] The communication system of this embodiment has an external network (referred to as the Internet) 17 such as the Internet, and an external communication terminal 11 connected to the Internet 17. 1 ~External communication terminal 11 N (collectively referred to as "external terminal 11"), and an intra-organizational network 16 connected to the Internet 17. Although not shown in the figure, the Internet 17 and the intra-organization network 16 may be connected via a device called a firewall to prevent unauthorized communication between them. In this case, communication between the external terminal 11 and the management server 12 is set in advance so as not to be blocked by a firewall. In addition, each network may be either wired or wireless.

[0075] In addition, an AP server 14 that provides business applications, databases...

no. 2 approach

[0147] In this embodiment, when the external terminal 11 accesses the AP server 14 via the internal terminal 15, operations as shown in FIGS. 13 , 14 , and 15 are performed.

[0148] As shown in Figure 13, the AP server 14 and the management server 12 implement Figure 6 , Figure 7 From Step 1001 to Step 1016 and from Step 1101 to Step 1104 between the internal terminal 15 and the management server 12 shown, an encrypted communication path between the terminal and the server is established in advance (Step 5001 ). And, in the case that the AP server 14 has not registered its own address, by implementing Figure 8 From step 2002 to step 2006 shown, the address of the AP server 14 is registered in the management server 12 (step 5002).

[0149] When steps 5001 and 5002 are performed normally, the address information of the AP server 14 and the authentication result are registered in the authentication status table 60 . Specifically, the address information of the AP server 14...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In an encryption communication using VPN technologies, a load on a VPN system becomes large if the number of communication terminals increases. When an external terminal accesses via an internal terminal an application server , processes become complicated because it is necessary to perform authentication at VPN and authentication at the application server. A management server is provided for managing external terminals, internal terminals and application servers. The management server authenticates each communication terminal and operates to establish an encryption communication path between communication terminals. Authentication of each terminal by the management server relies upon a validation server. When the external terminal performs encryption communication with the application server via the internal terminal, two encryption communication paths are established and used between the external terminal and internal terminal and between the internal terminal and application server.

Description

technical field [0001] The present invention relates to technology for encrypted communication via a communication network such as the Internet. Background technique [0002] VPN (Virtual Private Network: Virtual Private Network) technology is used in order to properly access corporate information assets from a communication terminal at home, or to securely connect LANs of corporate bases to each other. [0003] For example, a case will be described where an external communication terminal (hereinafter sometimes referred to as external terminal) connected to an external network such as the Internet and an internal communication terminal (hereinafter sometimes referred to as internal terminal) connected to an organization network such as a company perform secure communication. [0004] First, the external communication terminal transmits a connection request to the internal communication terminal from the Internet to the VPN device at the entrance of the organization network....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L9/00H04L9/32H04L9/30
Inventor 桥本洋子藤城孝宏锻忠司高田治星野和义中村信次
Owner HITACHI LTD