System and method for encrypted communication
A technology for encrypted communication and communication system, applied in the field of encrypted communication, can solve the problems of complicated password management and complicated processing, and achieve the effects of simplified authentication, secure communication, and simplified authentication processing.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach 1
[0073] figure 1 It is a diagram illustrating the configuration of a communication system according to an embodiment of the present invention.
[0074] The communication system of this embodiment has an external network (referred to as the Internet) 17 such as the Internet, and an external communication terminal 11 connected to the Internet 17. 1 ~External communication terminal 11 N (collectively referred to as "external terminal 11"), and an intra-organizational network 16 connected to the Internet 17. Although not shown in the figure, the Internet 17 and the intra-organization network 16 may be connected via a device called a firewall to prevent unauthorized communication between them. In this case, communication between the external terminal 11 and the management server 12 is set in advance so as not to be blocked by a firewall. In addition, each network may be either wired or wireless.
[0075] In addition, an AP server 14 that provides business applications, databases...
no. 2 approach
[0147] In this embodiment, when the external terminal 11 accesses the AP server 14 via the internal terminal 15, operations as shown in FIGS. 13 , 14 , and 15 are performed.
[0148] As shown in Figure 13, the AP server 14 and the management server 12 implement Figure 6 , Figure 7 From Step 1001 to Step 1016 and from Step 1101 to Step 1104 between the internal terminal 15 and the management server 12 shown, an encrypted communication path between the terminal and the server is established in advance (Step 5001 ). And, in the case that the AP server 14 has not registered its own address, by implementing Figure 8 From step 2002 to step 2006 shown, the address of the AP server 14 is registered in the management server 12 (step 5002).
[0149] When steps 5001 and 5002 are performed normally, the address information of the AP server 14 and the authentication result are registered in the authentication status table 60 . Specifically, the address information of the AP server 14...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 