FIELD: computer engineering. SUBSTANCE: proposed method and system are used for construction of protected corporate virtual private networks using communications infrastructure of public access network including the Internet. Method involves determination of infrastructure of message source and recipient. Burst data are encoding and output burst is formed. Output burst is converted into TCP/IP format and conveyed to the Internet wherein the Internet addresses and identifiers contained therein are checked for coincidence with addresses and identifiers pre- entered in memory unit. When they coincide, decoded data of burst are transmitted to message recipient. In this way data exchange between local computer network and corporate virtual private public-access network is made impossible and public-access network users acquire this information. EFFECT: enhanced reliability of private network protection. 2 cl, 2 dwg, 3 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR CREATING PROTECTED VIRTUAL NETWORKS | 2004 |
|
RU2276466C1 |
PRIVATE NICKNAMES OF END POINTS FOR ISOLATED VIRTUAL NETWORKS | 2015 |
|
RU2669525C1 |
CREATION OF VIRTUAL NETWORKS COVERING MANY PUBLIC CLOUDS | 2018 |
|
RU2766313C2 |
METHOD OF PROTECTING COMMUNICATION CHANNEL OF COMPUTER NETWORK | 2012 |
|
RU2490703C1 |
VIRTUAL BROADCASTING NETWORK FOR INTER-DOMAIN CONNECTION | 2005 |
|
RU2357281C2 |
METHOD AND SYSTEM FOR TUNNELING TRAFFIC IN DISTRIBUTED NETWORK | 2023 |
|
RU2820803C1 |
METHOD (VARIANTS) AND DEVICE (VARIANTS) FOR PROTECTING COMMUNICATION CHANNEL OF A COMPUTER NETWORK | 2006 |
|
RU2306599C1 |
COMPUTER NETWORK WITH INTERNET SCREEN AND INTERNET SCREEN | 2000 |
|
RU2214623C2 |
METHOD AND SYSTEM FOR TUNNELLING TRAFFIC IN A DISTRIBUTED NETWORK TO DETONATE MALICIOUS SOFTWARE | 2022 |
|
RU2797264C1 |
SYSTEM FOR AGGREGATION OF NETWORK DATA IN COMPUTER NETWORKS | 2019 |
|
RU2694025C1 |
Authors
Dates
2002-05-10—Published
2001-10-03—Filed