Communication system, communication apparatus, communication method, and program

A technology of a communication system and a communication device, applied in the field of communication, can solve the problems of time-consuming, installation-consuming, information leakage, etc., and achieve the effect of reducing the burden

Inactive Publication Date: 2008-01-23
NEC CORP
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, there is a risk of information leakage due to setting errors, and setting takes time
[0019] The fifth problem with the prior art described above is that when there are multiple PCs on the network that are likely to cause information leakage, in order to perform encryption using the prior art, it is necessary to pre-install an encryption application program, an encryption driver, and an encryption program on all the PCs. LSI, therefore installation and setting take time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication system, communication apparatus, communication method, and program
  • Communication system, communication apparatus, communication method, and program
  • Communication system, communication apparatus, communication method, and program

Examples

Experimental program
Comparison scheme
Effect test

no. 1 approach

[0149] [Structure Description]

[0150] A first embodiment for carrying out the first invention of the present invention will be described in detail with reference to the drawings. FIG. 1 is a diagram showing the network configuration of the first embodiment, and includes a PC 1 , a server 2 and a hub 3 .

[0151] The PC1 is connected to the hub 3, acquires frames from the hub 3, and performs desired processing on the acquired frames. Moreover, PC1 transmits the frame generated by the internal processing of PC1 to the hub 3 .

[0152] The server 2 is connected to the hub 3, acquires frames from the hub 3, and performs desired processing on the acquired frames. Also, the server 2 transmits the frame generated by the internal processing of the server 2 to the hub 3 .

[0153] The hub 3 is connected to the PC1 and the server 2 . The hub 3 acquires the frame from the PC1, analyzes the acquired frame, and transfers the frame to an appropriate port based on the analysis result. ...

no. 2 approach

[0301] [explanation of the structure]

[0302] Next, a second embodiment for carrying out the second invention of the present invention will be described in detail with reference to the drawings. The network configuration of the second embodiment is the same as the network configuration of the first embodiment shown in FIG. 1 , and therefore description thereof will be omitted.

[0303] FIG. 12 is a diagram showing communication processing performed by a CPU and an NIC mounted in each device of the present embodiment. Referring to FIG. 12 , the second embodiment differs from the first embodiment in that it has a drive A19 and a virtual NICA 20 in addition to the configuration of PC1 in the first embodiment in FIG. 3 .

[0304] The function of the driver A19 is the same as that of the driver A5 shown in FIG. 3 , and therefore description thereof will be omitted.

[0305] The NICA 20 is assumed to be software that mediates the driver A19 and the relay application A15. It is a...

no. 3 approach

[0349] [explanation of the structure]

[0350] Next, a third embodiment for carrying out the second invention of the present invention will be described in detail with reference to the drawings. The network configuration of the third embodiment is the same as the network configuration of the first embodiment shown in FIG. 1 , so description thereof will be omitted.

[0351] FIG. 15 is a diagram showing communication processing of the CPU and NIC mounted in each device of the present embodiment. Referring to FIG. 15, the third embodiment can eliminate the driver A19 and the virtual NICA20 in the structure of the PC1 in the second embodiment shown in FIG. It is different from the second embodiment. Along with this, the function of each module changes as follows.

[0352] The outline of the function of TCPA25 is substantially the same as that of TCPA21 of the second embodiment shown in FIG. .

[0353] The outline of the function of the relay application A26 is almost the sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

If it is determined by a frame analyzing means in an intermediate driver (A11) of PC 1 that data, which is to be transmitted from a client application (A1) to a server application (B1), needs to be encrypted, then the data is relayed by use of a total of two TCP cessions consisting of a TCP cession 1 between TCP (A14) and TCP (A2) and a TCP cession 2 between TCP (A17) and TCP (B3). In this way, relaying the TCP cessions can achieve a coincidence of TCP / IP protocol hierarchy between SSL (A16) in the intermediate driver (A11) and the SSL (B2) in the server (2). This allows automatic exchanges of the certificate information, encryption algorithm and so on required for the starting of an SSL cession therebetween. As a result, secret data to be transmitted from the PC can be encrypted without changing the setting of the server or installing any software.

Description

technical field [0001] The present invention relates to communication technology, and in particular to encryption communication technology for encrypting and transmitting data sent from an information processing terminal. Background technique [0002] Currently, data transmitted and received via a network such as the Internet or a LAN (Local Area Network) is frequently stolen by a third party through illegal monitoring or the like, and leaks of confidential information occur frequently, which has become a social problem. [0003] As an effective method for preventing such data theft, there is a method of "encrypting" data sent from a PC (Personal Computer). Data confidentiality can be maintained through encryption. [0004] In order to maintain the confidentiality of data, it is necessary to encrypt all confidential data sent from the PC. However, in the prior art, in order to encrypt the data sent from the PC, the user needs to instruct the encryption software to encrypt ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/36G06F13/00H04L12/56
CPCH04L63/166H04L63/045
Inventor 吉见英朗榎本敦之飞鹰洋一
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products