WO2000038382A1 - Systeme de communication et procede de communication - Google Patents
Systeme de communication et procede de communication Download PDFInfo
- Publication number
- WO2000038382A1 WO2000038382A1 PCT/JP1999/007172 JP9907172W WO0038382A1 WO 2000038382 A1 WO2000038382 A1 WO 2000038382A1 JP 9907172 W JP9907172 W JP 9907172W WO 0038382 A1 WO0038382 A1 WO 0038382A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication
- data
- server device
- client device
- gateway server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/67—Risk-dependent, e.g. selecting a security level depending on risk profiles
Definitions
- the present invention relates to a communication system in which a client and a server exist on different communication networks and perform communication via a gateway server that relays between different communication networks, and a communication method thereof. This reduces the load on the equipment.
- SSL Secure Sockets Layer
- JPEG Joint Photographic Experts Group
- the Inuichi Net has been used on personal convenience stores (hereafter, PC) and workstations (hereafter, WS), but in recent years, it has also started to be used on various devices other than PCs.
- PC personal convenience stores
- WS workstations
- these devices are small and portable, and can be connected to the Internet via a wireless network, such as a mobile phone network, to provide e-commerce and banking services using the Internet anytime, anywhere. It becomes possible to use one screw.
- the SSL protocol requires complicated calculations and has a more limited processing capacity than PCs There is a possibility that the service will not be provided smoothly because the load is heavy to perform the processing on the information terminal.
- data flowing through a mobile phone network is usually encrypted, and the terminal of the mobile phone originally has a function of encrypting and decrypting the data.
- the mobile phone network is different from the Internet in that security is secured as a communication network.
- the present invention has been made in view of such a problem, and connects to an Internet network via a secure communication network such as a mobile phone network to provide e-commerce and banking services. It is an object of the present invention to provide a communication method capable of reducing a load on a terminal device to be implemented, and to provide a communication system for implementing the communication method. Disclosure of the invention
- a content server device that manages content data and a client device that exists on a communication network different from the content server device perform the communication via a gateway server device that relays between different communication networks.
- the communication network between the client device and the gateway server device may be temporarily disabled.
- the encryption is not performed, and the encryption is performed only in the communication via the communication network between the gateway server and the content server where security is not secured.
- the client device has a data communication device for transmitting and receiving data to and from the gateway server device, and the client device and the content server through the data communication device.
- An encrypted communication request means for sending a communication security request between the devices; a gateway server device, a client / data communication device for transmitting / receiving data to / from the client device, and a content server device Server data communication means for transmitting and receiving data to and from the server data communication means through the server data communication means in accordance with the security request from the client device, and receive the data from the server data communication means.
- Decryption of encrypted data and decryption of data output to server data communication means It is provided and the encrypted communication control means for performing and.
- a content server device that manages content and a client device that exists on a communication network different from the content server device are connected via a gateway server device that relays between different communication networks.
- a gateway server device that relays between different communication networks.
- Data encryption is performed only by communication over the communication network between the gateway server device and the content server device that are not performed, and the client device is set up for encrypted communication and encrypted. There is no need to install a processing system to decode the encrypted data, Cancer-bearing is reduced.
- a client device sends a security request on a communication path to a gateway server device, and in response to this, the gateway server device encrypts the content server device with the content server device. Make communication settings, and The server device encrypts the data transmitted to the client device and transmits the encrypted data to the gateway server device, and the gateway server device decrypts the data and transmits the data to the client device. Data sent from the device is encrypted and transmitted securely.
- a client device sends a security request on a communication path together with a data transmission to a gateway server device. This is to set up encrypted communication with the device, encrypt this data and send it to the content server device, and encrypt the data sent from the gateway server device to the content server device for security. Can be transmitted.
- a content server device that manages a content server and a client device that exists on a different communication network from the content server device include a gateway server device that relays between different communication networks.
- a client device and a gateway server device are connected via a secure communication network, and the client device transmits and receives data to and from the gateway server device.
- a client-to-server communication means for transmitting and receiving data with a content server device
- Server data communication means for transmitting and receiving data between the server and the server, and setting processing of encrypted communication with the content server device through the server data communication means in accordance with a safety request from the client device
- Encrypted communication control means for decrypting the encrypted data and encrypting the data to be output to the server data communication means.
- a client device is provided with a web protocol processing means for transmitting / receiving world wide web data to / from a gateway server device via data communication means.
- a web protocol processing means for transmitting / receiving World Wide Web data to / from a gateway server device via data communication means.
- One client server device Web protocol processing means for transmitting and receiving World Wide Web data through the Antode overnight communication means and the satellite overnight communication means is provided.
- FIG. 1 is a configuration diagram of a communication system according to an embodiment of the present invention.
- FIG. 2 is a flowchart showing the operation of the client device in the communication system of the embodiment.
- FIG. 3 is a flowchart showing an operation when the gateway server device receives data from the client device in the communication system of the embodiment.
- FIG. 4 is a flowchart showing an operation when the gateway server device receives data from the content server device in the communication system of the embodiment.
- FIG. 5 is an example of an encrypted communication request generated by the encrypted communication request generation unit of the client device.
- FIG. 6 is an example of a web page acquisition request created by the web protocol processing unit of the client device.
- FIG. 7 shows an example of a web response received by the gateway server device from the content server device.
- this communication system includes a client device 100 that communicates through a mobile phone network 400 and a gateway server that relays the mobile phone network 400 and the Internet network 500, which are different communication networks. It comprises a device 200 and a content server device 300 connected to the gateway server device 200 through the Internet 500.
- the client device 100 includes an encrypted communication request generation unit 101 that creates a request for requesting data to be transmitted and received safely between the client device 100 and the content server device 300, and a client device 100 and a gateway server device.
- Web protocol processing unit 102 that processes HTTP (Hyper Text Transfer Protocol), which is commonly used between the device 200 and the content server device 300, and the mobile phone network 400
- a data communication unit 103 for transmitting and receiving evenings.
- the gateway server device 200 includes a client data communication unit 201 for transmitting and receiving data to and from the mobile phone network 400, and a web shared between the client device 100, the gateway server device 200, and the content server device 300.
- client data communication unit 201 for transmitting and receiving data to and from the mobile phone network 400
- web protocol processing unit 202 that processes HTTP and the client device 100
- secure encrypted communication is established between the gateway server device 200 and the content server device 300.
- An encryption communication control unit 203 that performs encryption and decryption of data
- a server data communication unit 204 that transmits and receives data to and from the Internet 500 are provided.
- the content server device 300 encrypts data between the data communication unit 301 for transmitting and receiving data to and from the Internet 500 and the gateway server device 200 upon receiving a request from the gateway server device 200.
- the encrypted communication control unit 302 that establishes secure encrypted communication and performs encryption / decryption in one day, and is commonly used among the client device 100, the gateway server device 200, and the content server device 300.
- a web protocol processing unit 303 that processes HTTP.
- the client device 100 of this communication system desires secure communication with the content server device 300
- the client device 100 sends the data to the gateway server device 200 together with the output of the transmission data and the gateway server device 200 and the content server. Requests encrypted communication between devices 300.
- the gateway server device 200 sets the encrypted communication with the content server device 300, encrypts the transmission data, and transmits it to the content server device 300.
- the content server device 300 also encrypts the data to be transmitted to the client device 100 and transmits the encrypted data to the gateway server device 200.
- the gateway server device 200 decrypts the data and transmits it to the client device 100.
- FIG. 2 shows that the client device 100 of this communication system issues a request for establishing encrypted communication. 2 shows the flow of the process when performing.
- Step 601 The encrypted communication request generation unit 101 creates an encrypted communication request
- Step 602 The web protocol processing unit 102 creates a web page acquisition request in the web protocol based on the encrypted communication request generated by the encrypted communication request generation unit 101.
- Step 603 The data communication unit 103 transmits the web page acquisition request created by the web protocol processing unit 102 to the gateway server device 200 via the mobile phone network 400.
- FIG. 3 shows a processing flow after the gateway server device 200 of the communication system receives the data transmitted from the client device 100.
- Step 701 When the client data communication unit 201 receives the data transmitted from the client device 100, it sends it to the web protocol processing unit 202,
- Step 702 The web protocol processing unit 202 analyzes the data received by the client
- Step 703 It is determined whether or not this is a web request including a request for establishing encrypted communication from the client device 100. If the request includes a request to establish encrypted communication, the encrypted communication control unit 203 is activated.
- Step 704 The activated encrypted communication control unit 203 transmits a setting request for encrypted communication to the content server device 300 through the server data communication unit 204, and Step 705: encrypts the content server device 300. Perform the setting process to establish the communication.
- Step 706 Next, the encrypted communication control unit 203 encrypts the web page acquisition request analyzed by the web protocol processing unit 202 according to the setting, and transmits the encrypted data to the server data communication unit 204.
- Step 707 The server data overnight communication unit 204 transmits the data requested to be transmitted to the content server device 300 through the network 500.
- step 703 if the analyzed data is a normal web request that does not include a request to establish the encrypted communication, the process proceeds to step 707, where the data The web request is transmitted to the evening communication unit 204 as it is.
- the data communication unit 301 receives the data transmitted from the Internet 500 and if the data is encrypted, the encrypted communication control unit 302 Decrypts the data, and the web protocol processing unit 303 performs web transfer processing.
- the encryption communication control unit 302 encrypts the data, and the data communication unit 301 sends the encrypted data to the Internet 500.
- FIG. 4 shows the flow of subsequent processing when the gateway server device 200 of this communication system receives data transmitted from the content server 300.
- Step 801 Upon receiving the data from the content server device 300, the server data communication unit 204
- Step 802 It is determined whether or not the data received from the content server device 300 is encrypted data. If the data is encrypted data, the encrypted communication control unit 203 is activated. I do.
- Step 803 The encrypted communication control section 203 decrypts the encrypted data received by the server data communication section 204 and transmits the received data to the web protocol processing section 202.
- Step 804 The web protocol processing unit 202 analyzes the received web response and transmits the analyzed web response to the client data communication unit 201.
- Step 805 The client-side overnight communication unit 201 transmits the received web response to the client device 100 via the mobile phone network 400.
- step 802 If it is determined in step 802 that the data received from the content server device 300 is not encrypted data, the received data is transmitted to the web protocol processing unit 202, and the processing in steps 804 and 805 is performed. Done.
- FIG. 5 shows a case where the encrypted communication request generation unit 101 of the client device 100 generates the request. This is an example of an encrypted communication request.
- the client device 100 requests the establishment of encrypted communication using the keyword “https” in FIG.
- FIG. 6 is an example of a web page acquisition request created by the web protocol processing unit 102 of the client device 100 from the encrypted communication request of FIG.
- the web page acquisition request shown in FIG. 6 is configured by starting with the encrypted communication request shown in FIG. 5 and adding some information necessary as a digest protocol as a header.
- the keyword for establishing the encrypted communication is not limited to “https” in the example of FIG.
- a key determined between web protocols used by the client device 100, the gateway server device 200, and the content server device 300 may be used.
- the keyword for establishing the encrypted communication need not necessarily be in the first line of the web page acquisition request as in the example of FIG.
- FIG. 7 shows the encrypted data transmitted from the content server device 300 to the gateway server device 200 when the gateway server device 200 transmits the web page acquisition request of FIG. 6 to the content server device 300. This is an example of a web response that decrypts evening.
- the communication network between the client device 100 and the gateway server device 200 where security is ensured is a mobile phone network.
- any other communication network with security can be used.
- a communication network may be used, and the application of the present invention is not limited to a mobile phone network.
- the client device 100, the gateway server device 200, and the content server device 300 communicate using the web protocol (HTTP).
- HTTP web protocol
- the application of the present invention is limited to HTTP. is not.
- the communication method and communication system of the present invention provide The client device on the communication network in which the security is secured can safely receive the data transmitted from the content server device only by transmitting the request for the encrypted communication to the gateway server. This eliminates the need for the client device to be equipped with a processing system that performs encrypted communication settings and decrypts encrypted data. Even devices other than PCs with little memory can be used as client devices. It becomes possible.
- data transmitted from the client device can be encrypted and transmitted securely.
- the client device on the communication network in which security is ensured performs processing for setting encrypted communication and decrypting the encrypted web page. Even without a system, data can be transmitted and received safely to and from content server devices.
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE69923954T DE69923954T2 (de) | 1998-12-21 | 1999-12-21 | Kommunikationssystem und verfahren |
EP99959938A EP1058429B1 (en) | 1998-12-21 | 1999-12-21 | Communication system and communication method |
US09/622,726 US6708200B1 (en) | 1998-12-21 | 1999-12-21 | Communication system and communication method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP36291798A JP3497088B2 (ja) | 1998-12-21 | 1998-12-21 | 通信システム及び通信方法 |
JP10/362917 | 1998-12-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000038382A1 true WO2000038382A1 (fr) | 2000-06-29 |
Family
ID=18478055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP1999/007172 WO2000038382A1 (fr) | 1998-12-21 | 1999-12-21 | Systeme de communication et procede de communication |
Country Status (6)
Country | Link |
---|---|
US (1) | US6708200B1 (ja) |
EP (1) | EP1058429B1 (ja) |
JP (1) | JP3497088B2 (ja) |
CN (1) | CN1125550C (ja) |
DE (1) | DE69923954T2 (ja) |
WO (1) | WO2000038382A1 (ja) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7865719B2 (en) | 2000-02-21 | 2011-01-04 | E-Plus Mobilfunk Gmbh & Co. Kg | Method for establishing the authenticity of the identity of a service user and device for carrying out the method |
US7673329B2 (en) * | 2000-05-26 | 2010-03-02 | Symantec Corporation | Method and apparatus for encrypted communications to a secure server |
US7509490B1 (en) * | 2000-05-26 | 2009-03-24 | Symantec Corporation | Method and apparatus for encrypted communications to a secure server |
DE60134943D1 (de) | 2000-11-08 | 2008-09-04 | Matsushita Electric Ind Co Ltd | Rundfunksystem zum Senden und Empfangen von Programmen |
US7003799B2 (en) * | 2001-01-30 | 2006-02-21 | Hewlett-Packard Development Company, L.P. | Secure routable file upload/download across the internet |
US7730528B2 (en) * | 2001-06-01 | 2010-06-01 | Symantec Corporation | Intelligent secure data manipulation apparatus and method |
AU2002317062A1 (en) | 2001-06-12 | 2002-12-23 | Research In Motion Limited | Method for processing encoded messages for exchange with a mobile data communication device |
US7254712B2 (en) * | 2001-06-12 | 2007-08-07 | Research In Motion Limited | System and method for compressing secure e-mail for exchange with a mobile data communication device |
US6965770B2 (en) * | 2001-09-13 | 2005-11-15 | Nokia Corporation | Dynamic content delivery responsive to user requests |
US20030161472A1 (en) * | 2002-02-27 | 2003-08-28 | Tong Chi Hung | Server-assisted public-key cryptographic method |
EP1503537A1 (en) * | 2002-05-09 | 2005-02-02 | Niigata Seimitsu Co., Ltd. | Centralized encryption management system |
KR100554799B1 (ko) * | 2002-11-19 | 2006-02-22 | 엘지전자 주식회사 | Gsm이동통신 시스템의 전송 데이타 암호화 및 암호화 해제 방법 |
CN100388659C (zh) * | 2003-09-10 | 2008-05-14 | 中兴通讯股份有限公司 | 实现异种网络间加密通信的装置、系统及方法 |
CN1765079B (zh) * | 2004-04-05 | 2011-10-12 | 日本电信电话株式会社 | 分组密码处理代理装置 |
CN100397812C (zh) * | 2004-07-26 | 2008-06-25 | 中国工商银行股份有限公司 | 一种基于虚拟链路的客户端与银行网的通信方法及系统 |
CN101065940B (zh) * | 2004-11-29 | 2013-02-20 | 国际商业机器公司 | 对通信终端与服务器之间的通信进行中继的装置和方法 |
EP1841161B1 (de) * | 2006-03-30 | 2008-05-28 | Siemens Aktiengesellschaft | Verfahren zur gesicherten Nutzdatenübertragung |
CN101052034A (zh) * | 2006-04-19 | 2007-10-10 | 华为技术有限公司 | 传输网络事件日志协议报文的方法和系统 |
US8402110B2 (en) | 2006-09-28 | 2013-03-19 | Microsoft Corporation | Remote provisioning of information technology |
US8012023B2 (en) | 2006-09-28 | 2011-09-06 | Microsoft Corporation | Virtual entertainment |
US9746912B2 (en) | 2006-09-28 | 2017-08-29 | Microsoft Technology Licensing, Llc | Transformations for virtual guest representation |
US8014308B2 (en) | 2006-09-28 | 2011-09-06 | Microsoft Corporation | Hardware architecture for cloud services |
US20080082670A1 (en) * | 2006-09-28 | 2008-04-03 | Microsoft Corporation | Resilient communications between clients comprising a cloud |
US8719143B2 (en) | 2006-09-28 | 2014-05-06 | Microsoft Corporation | Determination of optimized location for services and data |
US7716150B2 (en) | 2006-09-28 | 2010-05-11 | Microsoft Corporation | Machine learning system for analyzing and establishing tagging trends based on convergence criteria |
US8595356B2 (en) | 2006-09-28 | 2013-11-26 | Microsoft Corporation | Serialization of run-time state |
US7680908B2 (en) | 2006-09-28 | 2010-03-16 | Microsoft Corporation | State replication |
US7672909B2 (en) | 2006-09-28 | 2010-03-02 | Microsoft Corporation | Machine learning system and method comprising segregator convergence and recognition components to determine the existence of possible tagging data trends and identify that predetermined convergence criteria have been met or establish criteria for taxonomy purpose then recognize items based on an aggregate of user tagging behavior |
US7797453B2 (en) | 2006-09-29 | 2010-09-14 | Microsoft Corporation | Resource standardization in an off-premise environment |
US8474027B2 (en) | 2006-09-29 | 2013-06-25 | Microsoft Corporation | Remote management of resource license |
TWI330032B (en) * | 2006-11-24 | 2010-09-01 | Mstar Semiconductor Inc | Method for authorized-user verification and related apparatus |
CN101072102B (zh) * | 2007-03-23 | 2010-10-06 | 南京联创科技集团股份有限公司 | 网络环境下基于安全桌面的信息防泄漏技术 |
CN101127604B (zh) * | 2007-09-25 | 2010-06-23 | 中兴通讯股份有限公司 | 信息安全传输方法和系统 |
US8406424B2 (en) | 2007-10-25 | 2013-03-26 | Yahoo! Inc. | Visual universal decryption apparatus and methods |
US8718042B2 (en) * | 2008-05-08 | 2014-05-06 | Microsoft Corporation | Extensible and secure transmission of multiple conversation contexts |
US8433895B1 (en) * | 2008-05-30 | 2013-04-30 | Symantec Corporation | Methods and systems for securely managing multimedia data captured by mobile computing devices |
JP5487659B2 (ja) * | 2009-03-17 | 2014-05-07 | 株式会社リコー | 情報処理装置、情報処理方法およびプログラム |
CN102647428A (zh) * | 2012-05-02 | 2012-08-22 | 四川建设网有限责任公司 | 一种基于通信网络的托管控制加解密系统及方法 |
CN102655511A (zh) * | 2012-05-25 | 2012-09-05 | 中山大学 | 一种基于家庭网关的云安全解密方法及系统 |
CN102710628B (zh) * | 2012-05-25 | 2015-08-05 | 中山大学 | 一种基于家庭网关的云安全加密方法及系统 |
CN102710764A (zh) * | 2012-05-25 | 2012-10-03 | 东莞中山大学研究院 | 一种基于云计算下的用户远程控制终端设备的方法及系统 |
CN102685144A (zh) * | 2012-05-25 | 2012-09-19 | 中山大学 | 一种基于家庭网关的云安全处理方法及系统 |
US9124582B2 (en) | 2013-02-20 | 2015-09-01 | Fmr Llc | Mobile security fob |
US10893025B2 (en) | 2018-02-15 | 2021-01-12 | Nokia Technologies Oy | Security management in communication systems with network function assisted mechanism to secure information elements |
CN113141333B (zh) * | 2020-01-18 | 2023-05-09 | 佛山市云米电器科技有限公司 | 入网设备的通信方法、设备、服务器、系统及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09191318A (ja) * | 1996-01-08 | 1997-07-22 | Fujitsu Ltd | ゲートウェイシステム |
JPH10327193A (ja) * | 1997-05-26 | 1998-12-08 | Nec Corp | 暗号化方式 |
JPH11249559A (ja) * | 1998-02-26 | 1999-09-17 | Nec Corp | 通信方法および通信システム |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3263878B2 (ja) * | 1993-10-06 | 2002-03-11 | 日本電信電話株式会社 | 暗号通信システム |
JP3263877B2 (ja) * | 1993-10-06 | 2002-03-11 | 日本電信電話株式会社 | 暗号ゲートウェイ装置 |
US5369702A (en) * | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
US5864683A (en) * | 1994-10-12 | 1999-01-26 | Secure Computing Corporartion | System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights |
GB2318486B (en) | 1996-10-16 | 2001-03-28 | Ibm | Data communications system |
JPH10178421A (ja) * | 1996-10-18 | 1998-06-30 | Toshiba Corp | パケット処理装置、移動計算機装置、パケット転送方法及びパケット処理方法 |
FI104873B (fi) * | 1997-04-16 | 2000-04-14 | Nokia Networks Oy | Datapalvelu matkaviestinverkossa |
US6298446B1 (en) * | 1998-06-14 | 2001-10-02 | Alchemedia Ltd. | Method and system for copyright protection of digital images transmitted over networks |
-
1998
- 1998-12-21 JP JP36291798A patent/JP3497088B2/ja not_active Expired - Fee Related
-
1999
- 1999-12-21 WO PCT/JP1999/007172 patent/WO2000038382A1/ja active IP Right Grant
- 1999-12-21 EP EP99959938A patent/EP1058429B1/en not_active Expired - Lifetime
- 1999-12-21 DE DE69923954T patent/DE69923954T2/de not_active Expired - Lifetime
- 1999-12-21 CN CN99803177A patent/CN1125550C/zh not_active Expired - Fee Related
- 1999-12-21 US US09/622,726 patent/US6708200B1/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09191318A (ja) * | 1996-01-08 | 1997-07-22 | Fujitsu Ltd | ゲートウェイシステム |
JPH10327193A (ja) * | 1997-05-26 | 1998-12-08 | Nec Corp | 暗号化方式 |
JPH11249559A (ja) * | 1998-02-26 | 1999-09-17 | Nec Corp | 通信方法および通信システム |
Non-Patent Citations (1)
Title |
---|
See also references of EP1058429A4 * |
Also Published As
Publication number | Publication date |
---|---|
DE69923954D1 (de) | 2005-04-07 |
JP2000188616A (ja) | 2000-07-04 |
EP1058429B1 (en) | 2005-03-02 |
JP3497088B2 (ja) | 2004-02-16 |
EP1058429A1 (en) | 2000-12-06 |
DE69923954T2 (de) | 2005-07-21 |
US6708200B1 (en) | 2004-03-16 |
CN1125550C (zh) | 2003-10-22 |
EP1058429A4 (en) | 2003-05-02 |
CN1291396A (zh) | 2001-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2000038382A1 (fr) | Systeme de communication et procede de communication | |
KR100431567B1 (ko) | 프록시의 보안 통신에 관여하게 하는 방법, 암호화시스템, 컴퓨터 프로그램 제품 | |
KR100480225B1 (ko) | 데이터 안전화 통신장치 및 그 방법 | |
AU2002315013B9 (en) | Authentication of a user across communication sessions | |
EP1748594B1 (en) | Method for realizing transmission of syncml synchronous data | |
US8145896B2 (en) | System and method for implementing an enhanced transport layer security protocol | |
US8874791B2 (en) | Automatically reconnecting a client across reliable and persistent communication sessions | |
TW200307439A (en) | Mechanism for supporting wired and wireless methods for client and server side authentication | |
US7386717B2 (en) | Method and system for accelerating the conversion process between encryption schemes | |
AU2002315013A1 (en) | Authentication of a user across communication sessions | |
JP2003503901A (ja) | インターネット環境の移動通信システムにおける使用者情報セキュリティ装置及びその方法 | |
JP3714850B2 (ja) | ゲートウェイ装置、接続サーバ装置、インターネット端末、ネットワークシステム | |
WO2016141513A1 (zh) | 业务处理方法及装置 | |
JPH11203222A (ja) | 暗号通信方法 | |
JP2005027183A (ja) | ゲートウェイ機器及び暗号方式変換方法 | |
JP2001290784A (ja) | 時刻認証方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99803177.1 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999959938 Country of ref document: EP |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09622726 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 1999959938 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1999959938 Country of ref document: EP |