Virtual private network
First Claim
1. A virtual private network, comprising:
- plural mutually-connected independent networks;
a terminal capable of accessing said networks and having an IP capsule communication and encryption function using a newly-achieved transmission source IP address;
a data base connected to any one of said networks, and an access server that manages and controls an access to said data base and has an IP capsule communication and encryption function, wherein said terminal accesses said data base from any one of the networks by IP capsule encrypted communications while keeping secrecy.
1 Assignment
0 Petitions
Accused Products
Abstract
When an access-desired data base is set up in a private network, a public network, a contract provider for connecting the public network and the private network concerned, the private network in which the data base is set up, and a user terminal having an IP capsule encryption function for accessing the public network are used. The user terminal 10 connects to the contract provider 300 through the public network 200 at a visiting place, and achieves an IP address from the contract provider. The contract provider 300 accesses the private network 100 on the basis of the terminal request concerned, and the private network 100 authenticates an access of the terminal 10 concerned. The terminal 10 encrypts the communications, and carry out IP encapsulated communications through the public network 200 and the contract provider 300.
51 Citations
17 Claims
-
1. A virtual private network, comprising:
-
plural mutually-connected independent networks;
a terminal capable of accessing said networks and having an IP capsule communication and encryption function using a newly-achieved transmission source IP address;
a data base connected to any one of said networks, and an access server that manages and controls an access to said data base and has an IP capsule communication and encryption function, wherein said terminal accesses said data base from any one of the networks by IP capsule encrypted communications while keeping secrecy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification