JPH04154233A - Communication concealing method - Google Patents

Communication concealing method

Info

Publication number
JPH04154233A
JPH04154233A JP2278216A JP27821690A JPH04154233A JP H04154233 A JPH04154233 A JP H04154233A JP 2278216 A JP2278216 A JP 2278216A JP 27821690 A JP27821690 A JP 27821690A JP H04154233 A JPH04154233 A JP H04154233A
Authority
JP
Japan
Prior art keywords
network
terminal
communication
information
encryption system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2278216A
Other languages
Japanese (ja)
Other versions
JP3111468B2 (en
Inventor
Haruki Fukuda
福田 治樹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujitsu Ltd
Original Assignee
Fujitsu Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujitsu Ltd filed Critical Fujitsu Ltd
Priority to JP02278216A priority Critical patent/JP3111468B2/en
Publication of JPH04154233A publication Critical patent/JPH04154233A/en
Application granted granted Critical
Publication of JP3111468B2 publication Critical patent/JP3111468B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Landscapes

  • Small-Scale Networks (AREA)

Abstract

PURPOSE:To make an unauthorized person difficult to read classified communication and further to carry out accurate communication between terminals by dividing the whole body of a cipher system into a cipher system of communication apparatuses in a network such as bridge, router, or the like and into a cipher system between terminals and by using the inter-terminal cipher system and the intra-network cipher system separately. CONSTITUTION:A sending terminal 111 uses an inter-terminal cipher system 1 for dealing with information necessary to communicate with a party terminal 121 and an intra-network cipher system 2 for dealing with information necessary to carry out data transfer processing or the like in networks 11 and 12 or bridges 31 and 32. A party terminal 121 belonging to a network 12 uses the intra-network cipher system 2 to interprete part of the network of the message received from bridge 32, recognizes that the message is sent to the party terminal 121 itself, and uses the inter-terminal cipher system 1 to interprete inter-terminal information. With this, message communication between terminals 111 and 121 via networks 11 and 12 including bridges 31 and 32 or router is enciphered, thereby making an unauthorized person through networks 11 and 12 difficult to read the message communication and making it possible to carry out normal communication between terminals 111 and 121.

Description

【発明の詳細な説明】 〔概要〕 ネットワークを介してメツセージ通信を行う端末が、送
信する情報を暗号化して送出し、受信した情報を復号化
する通信秘匿方式に関し、ブリッジやルータを含むネッ
トワークを介して行う端末間のメツセージ通信を暗号化
しネットワークでの第三者の解読を困難にし当該端末間
では正常通信を行なえる通信秘匿方式を目的とし、端末
が端末相互間の暗号系とネットワーク内の暗号系の2種
類の暗号系を具え、端末間でのみ必要な情報には該端末
相互間の暗号系を使用し、ネットワークでの転送処理等
に必要な情報には該ネットワーク内の暗号系を使用する
ように構成する。
[Detailed Description of the Invention] [Summary] This invention relates to a communication security method in which a terminal that performs message communication via a network encrypts and sends out information and decrypts received information. The purpose of this method is to encrypt message communication between terminals via the network, making it difficult for a third party to decrypt it on the network, and allowing normal communication to occur between the terminals. It is equipped with two types of encryption systems: the encryption system between terminals is used for information that is only necessary between terminals, and the encryption system within the network is used for information necessary for transfer processing over the network. Configure it for use.

また、端末とネットワーク装置間の暗号系とネットワー
ク装置相互間の暗号系とを別にし、ネットワーク装置は
端末からのネットワークでの転送処理等に使用する情報
を第1の暗号系で解読し、ネットワーク装置相互間の第
2の暗号系に変換して転送するように構成する。
Furthermore, apart from the encryption system between the terminal and the network device and the encryption system between the network devices, the network device uses a first encryption system to decrypt information used for transfer processing on the network from the terminal, and It is configured to convert into the second encryption system and transfer between devices.

〔産業上の利用分野〕[Industrial application field]

本発明は、ネットワークを介して端末間で行うメツセー
ジ通信を、暗号化して秘匿する通信秘匿方式に関する。
The present invention relates to a communication concealment method for encrypting and concealing message communications carried out between terminals via a network.

IEEE標準のC3MA/CD (Carrier 5
ense MultipleAccess / Co1
1ision Detection)のLAN (Lo
calArea Network)のように、端末間で
メツセージ通信を行うネットワークでは、送受信アドレ
スと通信情報とが一つのメツセージとして送受信される
が、これを全て暗号化してしまうと、方式の異なるLA
N間を接続するブリッジやルータを経由して通信する場
合、該ブリッジやルータが転送すべきネットワークを正
しく認識することか出来ず、正常な通信かできない。ネ
ットワークで使用する部分のメツセージを暗号化しない
と、通信した事と相手か誰かなどの情報が公開された状
態となり、特定通信を傍受しようとする者にとっては、
暗号化した情報を容易に入手することか可能となり解読
を容易にする結果となる。
IEEE standard C3MA/CD (Carrier 5
ense MultipleAccess / Co1
1ision Detection) LAN (Lo
In a network that performs message communication between terminals, such as the calArea Network, sending and receiving addresses and communication information are sent and received as a single message, but if this is all encrypted, LAs with different methods
When communicating via a bridge or router that connects N, the bridge or router may not be able to correctly recognize the network to which it should be transferred, and normal communication may not be possible. If the part of the message used on the network is not encrypted, information such as the communication and the other party will be exposed, making it difficult for anyone who attempts to intercept specific communications.
This makes it possible to easily obtain encrypted information, making it easier to decipher it.

〔従来の技術〕[Conventional technology]

従来は、端末間のメツセージ通信の暗号化の場合、一般
にネットワーク内の部分は暗号化せず、特にネットワー
ク内の部分を暗号化する場合は、ネットワーク通信の機
器相互間の情報を暗号化していた。
Conventionally, when encrypting message communications between devices, the part inside the network was generally not encrypted, and when encrypting the part inside the network, the information between the network communication devices was encrypted. .

〔発明が解決しようとする課題〕[Problem to be solved by the invention]

したがって、C3MA/CDのLANのように各端末か
バス上の情報を自由に取り込めるようなネットワークで
は、その端末寄りの部分では、通信の内容が秘匿されな
いという問題点かあった。本発明の課題は、ブリッジや
ルータを含むネットワークを介して行う端末間のメツセ
ージ通信を暗号化しネットワークでの第三者の解読を困
難にして、当該端末間では正常通信を行なえる通信秘匿
方式の提供にある。
Therefore, in a network such as a C3MA/CD LAN in which each terminal can freely take in information on the bus, there is a problem that the contents of communication cannot be kept confidential in the portion close to the terminal. The problem of the present invention is to develop a communication secrecy method that encrypts message communication between terminals via a network including bridges and routers, making it difficult for third parties to decrypt it on the network, and allowing normal communication between the terminals. On offer.

〔課題を解決するための手段〕[Means to solve the problem]

この課題は、第1図の原理図の如く、複数のブリッジ(
31,32,33)で接続される複数ネットワーク(1
1,12,13)に属する複数端末のなかの特定端末(
111、121)間で行うメツセージ通信を暗号化して
秘匿する通信秘匿方式において、各端末が端末相互間の
暗号系(1)とネットワーク内の暗号系(2)の2種類
の暗号系を具え、特定端末(111,121)間でのみ
必要な情報には該端末相互間の暗号系(1)を使用し、
ネットワーク(11,12)での転送処理等に必要な情
報には該ネットワーク内の暗号系(2)を使用するよう
に構成した本発明の第1発明の通信秘匿方式によって達
成される。
This problem involves multiple bridges (as shown in the principle diagram in Figure 1).
31, 32, 33) connected by multiple networks (1
1, 12, 13) among multiple terminals belonging to
111, 121), each terminal is equipped with two types of encryption systems: an inter-terminal encryption system (1) and an intra-network encryption system (2), For information that is necessary only between specific terminals (111, 121), the encryption system (1) between the terminals is used,
This is achieved by the communication secrecy system of the first aspect of the present invention, which is configured to use the encryption system (2) within the network for information necessary for transfer processing, etc. in the network (11, 12).

又、この課題は、図示しないが、端末とネットワーク装
置間の暗号系とネットワーク装置相互間の暗号系とを別
にし、ネットワーク装置は端末からのネットワークでの
転送処理等に使用する情報を第1の暗号系で解読し、ネ
ットワーク装置相互間の第2の暗号系に変換して転送す
るように構成した本発明の第2発明によっても達成され
る。
Although not shown in the figure, this problem is solved by separating the encryption system between the terminal and the network device and the encryption system between the network devices, and the network device transmits information from the terminal to the network for transfer processing etc. This can also be achieved by the second aspect of the present invention, which is configured to decrypt the data using a second encryption system, convert it to a second encryption system, and transfer it between network devices.

〔作用〕[Effect]

本発明の第1発明の通信秘匿方式は、第1図を参照し、
送信端末Illは相手端末121との通信に必要な情報
のみには、端末相互間の暗号系(1)を適用し、ネット
ワーク11. 12やブリッジ31.32での転送処理
等に必要な情報には、ネットワーク内の暗号系(2)を
適用する。 即ち、送信端末111は、自分の属するネ
ットワーク11と相手端末121の属するネットワーク
12とを接続するブリッジ31゜32のネットワークの
アドレス等のネットワーク内のみで使用する情報には該
ネットワーク内の暗号系(2)により暗号化し、両端末
(111,121)相互間のみの情報には該端末相互間
の暗号系(1)で暗号化し、一つのメツセージとして自
分111の属するネットワーク11へ送出する。そして
ネットワーり11に接続されたブリッジ31は該メツセ
ージを受信し該ネットワーク11で使用する部分を解読
し、相手端末121の属するネットワーク12と接続さ
れるブリッジ32へ転送する。ブリッジ32も、同様に
ネットワーク12で使用する部分を解読し、該ネットワ
ークへ該メツセージを送出する。ネットワーク12に属
する相手端末121は、ブリッジ32から受信したメツ
セージの中のネットワークで使用する部分をネットワー
ク内の暗号系(2)で解読し、自分宛であることを認識
して端末間の情報を、端末相互間の暗号系(1)で解読
する。
The communication secrecy system of the first invention of the present invention is as shown in FIG.
The sending terminal Ill applies the inter-terminal encryption system (1) only to the information necessary for communication with the other party's terminal 121, and transmits the information to the network 11. Encryption system (2) within the network is applied to information necessary for transfer processing in 12 and bridges 31 and 32. That is, the sending terminal 111 uses the encryption system ( 2), and information only between the two terminals (111, 121) is encrypted using the encryption system (1) between the terminals, and sent as one message to the network 11 to which the terminal 111 belongs. Bridge 31 connected to network 11 receives the message, decodes the part used by network 11, and transfers it to bridge 32 connected to network 12 to which partner terminal 121 belongs. Bridge 32 similarly decodes the portion for use by network 12 and sends the message to that network. The other party's terminal 121 belonging to the network 12 decrypts the part of the message used by the network in the message received from the bridge 32 using the encryption system (2) within the network, recognizes that it is addressed to it, and transmits the information between the terminals. , decrypted using the encryption system (1) between the terminals.

また、本発明の第2発明の通信秘匿方式は、図示しない
か、端末とネットワーク装置間の暗号系とネットワーク
装置相互間の暗号系とが別なので、ネットワーク装置は
、端末からのネットワーつての転送処理等に使用する情
報を、第1の暗号系で解読し、ネットワーク装置相互間
の第2の暗号系に変換したのち、相手のネットワーク装
置へ転送する。
Furthermore, in the communication security system of the second aspect of the present invention, the encryption system between the terminal and the network device is different from the encryption system between the network devices, which is not shown in the figure. Information used for transfer processing, etc. is decoded by the first encryption system, converted into a second encryption system between the network devices, and then transferred to the other network device.

〔実施例〕〔Example〕

第2図のa、bは、本発明の第1発明の実施例の通信秘
匿方式の送信端末と受信端末の各構成を示すブロック図
であり、第3図は第1発明の実施例の動作を説明するだ
めの端局からネットワークへの送信信号のフレーム構成
例を示す。
FIGS. 2a and 2b are block diagrams showing the respective configurations of a transmitting terminal and a receiving terminal in the communication secrecy system according to the embodiment of the first invention, and FIG. 3 is a block diagram showing the operation of the embodiment of the first invention. An example of a frame structure of a transmission signal from a terminal station to a network is shown to explain the above.

第2図のaの送信端末は、外部からの送信データを、セ
レクタSEL、で、端末間のみで必要なデータやCRC
信号等の情報と、ネットワーク内のみで必要な受信先ア
ドレス、送信元アドレス等の情報とに選別し、それぞれ
、端末間暗号系1とネットワーク内暗号系2により、暗
号化する。そして、それら2系の暗号化出力を、セレク
タ5EL2て選択し、第3図の構成例の如く、フレーム
を構成し、送信部によりネットワークへ送出する。
The transmitting terminal a in Fig. 2 uses the selector SEL to send data sent from the outside by using the selector SEL to check the data and CRC required only between the terminals.
The information is sorted into information such as signals, and information such as destination addresses and source addresses that are necessary only within the network, and is encrypted using the terminal-to-terminal encryption system 1 and the intra-network encryption system 2, respectively. Then, the encrypted outputs of these two systems are selected by the selector 5EL2, a frame is constructed as in the configuration example shown in FIG. 3, and the frame is sent to the network by the transmitter.

第2図のbの受信端末は、ネットワークからの第3図の
如くフレーム構成された暗号化情報を、受信部で受信し
、セレクタSEL、で、端末間のみで必要なデータ、 
CRC信号等の情報と、ネットワーク内のみで必要な受
信先アドレス、送信元アドレス等の情報に選別し、それ
ぞれ、端末間暗号系Iとネットワーク内暗号系2により
、復号化する。
The receiving terminal b in FIG. 2 receives encrypted information in a frame structure as shown in FIG.
The information is sorted into information such as a CRC signal, and information such as a destination address and a source address that are necessary only within the network, and decrypted using the terminal-to-terminal encryption system I and the intra-network encryption system 2, respectively.

そして、それら2系の復号化出力をセレクタ5EL2で
選択し、受信データとして外部へ出力する。
Then, the decoded outputs of these two systems are selected by the selector 5EL2 and outputted to the outside as received data.

第4図は本発明の第2発明の実施例の通信秘匿方式の構
成を示すブロック図であり、全体の暗号系を、端末とネ
ットワーク装置間の第1暗号系Aとネットワーク装置相
互間の第2暗号系Bとに別け、第1のネットワーク装置
41は端末141からの該ネットワーク14での転送処
理等に使用する情報を第1暗号系Aで解読し、その暗号
変換器A/Bでネットワーク装置相互間の第2暗号系B
に変換して第2のネットワーク装置42へ転送する。そ
して相手端末151は、そのネットワーク装置42から
の第2暗号系Bで暗号化された転送信号を、該装置42
内の、前と逆の暗号変換器B/Aで変換した第1暗号系
Aで解読して、自分宛であることを認識して端末141
と正常に通信する。
FIG. 4 is a block diagram showing the configuration of the communication security system according to the embodiment of the second invention of the present invention. The first network device 41 decrypts information from the terminal 141 used for transfer processing on the network 14 using the first encryption system A, and decrypts the information from the terminal 141 to the network 14 using the encryption converter A/B. Second encryption system B between devices
and then transfers it to the second network device 42. Then, the partner terminal 151 transfers the transfer signal encrypted with the second encryption system B from the network device 42 to the device 42.
Terminal 141 decrypts it with the first encryption system A converted by the reverse encryption converter B/A, recognizes that it is addressed to it, and sends it to the terminal 141.
communicate normally.

〔発明の効果〕〔Effect of the invention〕

以上説明した如く、本発明によれば、CSMA/CDの
LANの様にメツセージ通信を行うネットワークで、全
体の暗号系をブリッジ、ルータ等のネットワーク内の通
信機器との暗号系と、端末相互間の暗号系とに分離し、
端末間でのみ必要な情報には端末相互間の暗号系を使用
し、ネットワークでの転送処理等に使用する情報にはネ
ットワーク内の暗号系を使用するので、第三者の解読を
困難とし当該端末間では正常な通信を行える効果が得ら
れる。
As explained above, according to the present invention, in a network that performs message communication such as a CSMA/CD LAN, the entire encryption system is a bridge, an encryption system between communication devices in the network such as a router, and an encryption system between terminals. The encryption system is separated into
An inter-terminal encryption system is used for information that is required only between devices, and an internal encryption system is used for information used for transfer processing over the network, making it difficult for third parties to decipher the information. The effect is that normal communication can be performed between the terminals.

【図面の簡単な説明】[Brief explanation of drawings]

第1図は本発明の第1発明の通信秘匿方式の基本構成を
示す原理図、 第2図は本発明の′$1発明の実施例の通信秘匿方式の
ブロック図、 第3図は第1発明の実施例の動作を説明するための端局
の送信信号のフレーム構成例を示す図、第4図は本発明
の第2発明の通信秘匿方式のブロック図である。 図において、1は端末相互間の暗号系、2はネットワー
ク内の暗号系、11.12.13.14.15はネット
ワーク、21.22は通信パス、31.32.33.4
1.42はブリッジ等のネットワーク機器、111.1
12.121゜122、131.132.141.15
1は端末である。 本発明の第1発明の涌信杖匿方式の基米構成左示す原理
図 第 凹 ネットワーク ネットワーク α、送信唯末 す 受信端末 第1発明の芙施例の送信端末と受信端末O凰成左示すブ
ロック図 第2図 ロネットワーク内暗号糸 cSS3端末間暗号系 第1発明の芙施例の動作を晩期すづための端局の送信信
号のフレーム樽9jΣ示す凶第 3 囚
FIG. 1 is a principle diagram showing the basic configuration of the communication security system of the first invention of the present invention, FIG. 2 is a block diagram of the communication security system of the embodiment of the '$1 invention of the present invention, and FIG. FIG. 4 is a diagram showing an example of a frame structure of a transmission signal from a terminal station for explaining the operation of the embodiment of the invention, and FIG. 4 is a block diagram of a communication secrecy system according to the second aspect of the invention. In the figure, 1 is the encryption system between terminals, 2 is the encryption system within the network, 11.12.13.14.15 is the network, 21.22 is the communication path, 31.32.33.4
1.42 is network equipment such as bridges, 111.1
12.121°122, 131.132.141.15
1 is a terminal. Basic configuration of the Wakushinjo concealment method of the first invention of the present invention The principle diagram shown on the left shows the concave network α, the receiving terminal that transmits and ends the transmitting terminal and the receiving terminal O of the embodiment of the first invention shown on the left Block diagram Figure 2 shows the frame barrel of the transmission signal of the terminal station for the late termination of the operation of the embodiment of the cryptographic system cSS3 between terminals in the network.

Claims (1)

【特許請求の範囲】 1、ネットワークを介してメッセージ通信を行う端末が
、送信する情報を暗号化して送出し、受信した情報を復
号化する通信秘匿方式において、各端末が端末相互間の
暗号系(1)とネットワーク内の暗号系(2)の2種類
の暗号系を具え、端末間でのみ必要な情報には該端末相
互間の暗号系(1)を使用し、ネットワークでの転送処
理等に必要な情報には該ネットワーク内の暗号系(2)
を使用することを特徴とした通信秘匿方式。 2、ネットワークを介してメッセージ通信を行う端末が
、送信する情報を暗号化して送出し、受信した情報を復
号化する通信秘匿方式において、端末とネットワーク装
置間の暗号系とネットワーク装置相互間の暗号系とを別
にし、ネットワーク装置は端末からのネットワークでの
転送処理等に使用する情報を第1の暗号系で解読し、ネ
ットワーク装置相互間の第2の暗号系に変換して転送す
ることを特徴とした通信秘匿方式。
[Claims] 1. In a communication security system in which terminals that communicate messages via a network encrypt and send out information to be sent and decrypt received information, each terminal uses an encryption system between the terminals. It has two types of encryption systems: (1) and an intra-network encryption system (2), and the inter-terminal encryption system (1) is used for information that is required only between terminals, and transfer processing over the network, etc. The information necessary for the encryption system (2) in the network
A communication secrecy method characterized by the use of . 2. In a communication security method in which a terminal that communicates messages via a network encrypts the information it sends and decrypts the information it receives, the encryption system between the terminal and the network device and the encryption system between the network devices. Separately from the system, the network device decrypts the information used for transfer processing etc. on the network from the terminal using the first encryption system, converts it to the second encryption system and transfers it between the network devices. Characteristic communication secrecy method.
JP02278216A 1990-10-17 1990-10-17 Communication concealment method Expired - Fee Related JP3111468B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP02278216A JP3111468B2 (en) 1990-10-17 1990-10-17 Communication concealment method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP02278216A JP3111468B2 (en) 1990-10-17 1990-10-17 Communication concealment method

Publications (2)

Publication Number Publication Date
JPH04154233A true JPH04154233A (en) 1992-05-27
JP3111468B2 JP3111468B2 (en) 2000-11-20

Family

ID=17594225

Family Applications (1)

Application Number Title Priority Date Filing Date
JP02278216A Expired - Fee Related JP3111468B2 (en) 1990-10-17 1990-10-17 Communication concealment method

Country Status (1)

Country Link
JP (1) JP3111468B2 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0927804A (en) * 1994-09-15 1997-01-28 Sun Microsyst Inc Transmission and reception method of data packet between computer systems and its system
US6016350A (en) * 1996-06-28 2000-01-18 Mitsubishi Denki Kabushiki Kaisha Encryption apparatus for enabling encryption and non-encryption terminals to be connected on the same network
JPWO2003096613A1 (en) * 2002-05-09 2005-09-15 新潟精密株式会社 Centralized management system for encryption
US8064583B1 (en) 2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8209709B2 (en) 2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine
US8316098B2 (en) 2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US8412675B2 (en) 2005-08-01 2013-04-02 Seven Networks, Inc. Context aware data presentation
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8838744B2 (en) 2008-01-28 2014-09-16 Seven Networks, Inc. Web-based access to data objects
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8849902B2 (en) 2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network
USRE45348E1 (en) 2004-10-20 2015-01-20 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
USRE39360E1 (en) 1994-09-15 2006-10-17 Sun Microsystems, Inc. System for signatureless transmission and reception of data packets between computer networks
JPH0927804A (en) * 1994-09-15 1997-01-28 Sun Microsyst Inc Transmission and reception method of data packet between computer systems and its system
US6016350A (en) * 1996-06-28 2000-01-18 Mitsubishi Denki Kabushiki Kaisha Encryption apparatus for enabling encryption and non-encryption terminals to be connected on the same network
DE19721949C2 (en) * 1996-06-28 2000-07-13 Mitsubishi Electric Corp Encryption device
JPWO2003096613A1 (en) * 2002-05-09 2005-09-15 新潟精密株式会社 Centralized management system for encryption
JP4594081B2 (en) * 2002-05-09 2010-12-08 オニシックス グループ エルエー エルエルシー Centralized management system for encryption
USRE45348E1 (en) 2004-10-20 2015-01-20 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system
US8209709B2 (en) 2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine
US8064583B1 (en) 2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication
US8839412B1 (en) 2005-04-21 2014-09-16 Seven Networks, Inc. Flexible real-time inbox access
US8438633B1 (en) 2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access
US8069166B2 (en) 2005-08-01 2011-11-29 Seven Networks, Inc. Managing user-to-user contact with inferred presence information
US8412675B2 (en) 2005-08-01 2013-04-02 Seven Networks, Inc. Context aware data presentation
US8364181B2 (en) 2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices
US9712986B2 (en) 2008-01-11 2017-07-18 Seven Networks, Llc Mobile device configured for communicating with another mobile device associated with an associated user
US8107921B2 (en) 2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator
US8849902B2 (en) 2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network
US8838744B2 (en) 2008-01-28 2014-09-16 Seven Networks, Inc. Web-based access to data objects
US8078158B2 (en) 2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device
US8838783B2 (en) 2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management
US8326985B2 (en) 2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization
US8166164B1 (en) 2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8204953B2 (en) 2010-11-01 2012-06-19 Seven Networks, Inc. Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8843153B2 (en) 2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience
US8291076B2 (en) 2010-11-01 2012-10-16 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor
US8190701B2 (en) 2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache
US8417823B2 (en) 2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network
US8356080B2 (en) 2011-04-19 2013-01-15 Seven Networks, Inc. System and method for a mobile device to use physical storage of another device for caching
US8316098B2 (en) 2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management
US9832095B2 (en) 2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic
US10263899B2 (en) 2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network

Also Published As

Publication number Publication date
JP3111468B2 (en) 2000-11-20

Similar Documents

Publication Publication Date Title
JPH04154233A (en) Communication concealing method
JP3816337B2 (en) Security methods for transmission in telecommunications networks
US5841873A (en) Methods of detecting decryption errors
US5086469A (en) Encryption with selective disclosure of protocol identifiers
EP0464564B1 (en) Generic encryption technique for communication networks
US8775790B2 (en) System and method for providing secure network communications
JPH05227152A (en) Method and device for establishing privacy communication link
CN108377495A (en) A kind of data transmission method, relevant device and system
CN105792190A (en) Data encryption, decryption and transmission method in communication system
JPH1168730A (en) Encryption gateway device
JPH09307542A (en) Data transmitter and data transmission method
JPH06318939A (en) Cipher communication system
US20040255121A1 (en) Method and communication terminal device for secure establishment of a communication connection
US20020116606A1 (en) Encryption and decryption system for multiple node network
JPH07170280A (en) Local area network
JPH11239184A (en) Switching hub
JPH0677954A (en) Apparatus and method for processing of code provided with arbitrary selective status encoding
CN110351308A (en) A kind of Virtual Private Network communication means and Virtual Private Network equipment
JPS60260254A (en) Ciphering processing system
JPH10173722A (en) Method for communication using plural lines
CN110650476B (en) Management frame encryption and decryption
JPS63155930A (en) Enciphered data communication system
US20240015009A1 (en) AUTOMATIC IN-BAND MEDIA ACCESS CONTROL SECURITY (MACsec) KEY UPDATE FOR RETIMER DEVICE
JPS6181043A (en) Cipher processing system of packet communication
JPH09252315A (en) Cipher communication system and enciphering device

Legal Events

Date Code Title Description
FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080922

Year of fee payment: 8

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20080922

Year of fee payment: 8

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20090922

Year of fee payment: 9

LAPS Cancellation because of no payment of annual fees