Integrated information communication system

ABSTRACT

To provide an integrated information communication system without using dedicated lines or the Internet, ensuring communication speed, communication quality, communication trouble countermeasures in a unified manner, wherein security and reliability in communication is ensured. The system is comprised of an access control apparatus for connecting a plurality of computer communication networks or information communication equipment to each, and a relay device for networking the aforementioned access control apparatus, the system having functions for performing routing by transferring information by a unified address system, and is configured such that the aforementioned plurality of computer communication networks or information communication equipment can perform communications in an interactive manner.

BACKGROUND OF THE INVENTION

[0001] 1. Field of the Invention

[0002] The present invention relates to an integrated informationcommunication system connecting information communication equipments orinformation communication systems such as personal computers, LANs(Local Area Networks), telephones (including cellular phones), FAXs(Facsimile), CATVs (Cable Television), Internet and the like, not onlyvia dedicated lines, but also via ISDN (Integrated Services DigitalNetwork), FR (Frame Relay), ATM (Asynchronous Transfer Mode), IPX(Integrated Packet Exchange), satellite, wireless and public lines.Integrated information communication equipments perform communicationprovided with an address (for information communication) fordistinguishing the integrated information communication equipment fromother equipment. Particularly, the present invention relates to anintegrated information communication system which integrates datatransfer services based on connection-less networks (e.g., RFC791 orRFC1883 IP (Internet Protocol) technology) and improves the overalleconomics of the information communication system by employing a unifiedaddress system, and ensuring security to realize interactivecommunications between connected terminals or systems.

[0003] 2. Description of the Prior Art

[0004] In accordance with computer and information communicationtechnology, computer communication networks have in recent years come tobe widely used in universities, research institutes, governmentorganizations, and intra-corporation/inter-corporation situations. LANsare used for intra-corporation communication networks, and in the eventthat the geographic locale is on a national basis, the form thereofbecomes such as shown in FIG. 1. In the example described in FIG. 1,each local LAN uses a common protocol, with each being connected bydedicated lines. Here, e.g., a corporation X has LAN-X1, LAN-X2 andLAN-X3 as LANs, a corporation Y has LAN-Y1, LAN-Y2 and LAN-Y3 as LANs,and both corporations X and Y use communication address systems ADX andADY for performing computer communications. Since it is necessary to laya separate dedicated line for each corporation with such a LAN network,system architecture becomes costly, and in the event that connection isto be made to a LAN network of another corporation, interfacing must bematched such as the communication address system, makinginter-connection very difficult and very costly.

[0005] On the other hand, the Internet has recently become widespread asa global-scale computer communication network. On the Internet, networksare connected using a router of a provider, a communication protocolcalled TCP/IP (Transmission Control Protocol/Internet Protocol) isemployed, dedicated lines or FR networks are used for connecting remoteareas, and Ethernets which are 10 Mbps LANs or FDDIs (Fiber DistributedData Interface) which are 10 Mbps LANs are used as communication pathswithin structures. FIG. 2 shows an example of an Internet connection, inwhich the routers in the providers maintain mutual connection byexchanging routing table connection information. Each router isconnected to a plurality of networks, and judgment is made based on therouting table regarding to which router connected to which provider'snetwork received data should go next. Thus, on the Internet, the IPaddress. attached to each IP packet (IP datagram) is checked, judgmentis made to which router the IP packet should be sent, and that IP packetis sent accordingly. Thus, IP packets are transferred one after anotherand delivered to the destination computer, by means of all routersperforming the above-described operation.

[0006]FIG. 3 illustrates the information contents of an RFC791 IP packetused by the Internet, divided into a control field and a data field.FIG. 4 illustrates the information contents of a similar RFC1883,divided into a control field and a data field. In either figure, theparentheses ( )indicate the number of bits.

[0007] However, with the Internet, the path control is restricted by IP,so that one cannot tell whether the other party with which communicationis being made is the authorized party, and the system is such that thecommunication path is not administrated in an integrated manner, meaningthat there are problems regarding security in that information may beeavesdropped. Also, in reality, addresses within the LANs are beingseparately decided by the LAN users, so there is the necessity toreplace the LAN user addresses when connecting the LAN to the Internet.Also, communication quality such as communication speed andcommunication error rate for the trunk lines making up the Internetcommunication path differ from one line to another for each LAN, and arepractically non-uniform. Also, there are problems such as an attempt tosend a 10 Mbps TV signal for video-conferencing not achieving thedesired communication speed. Further, there is no administrator forperforming maintenance of the network such as in the case of failure, orfor integrating the overall network for future planning for the networkand so forth. Also, with LAN networks and the Internet, the terminalsare personal computers (computers), and it has been difficult to usetelephones, FAX and CATV in an integrated manner therein.

SUMMARY OF THE INVENTION

[0008] The present embodiment has been made in accordance with theabove-described situations, and it is an object of the present inventionto provide an integrated information communication system capable ofcontaining a plurality of VANs (Value Added Networks) which perform IPpacket transfer of which security and reliability in communications hasbeen ensured, by means of not using dedicated lines or the Internet soas to improve economic considerations of the information communicationsystem architecture, and ensuring communication speed, communicationquality and communication trouble countermeasure in a unified manner.Also, it is another object of the present invention to provide anintegrated information communication system which uses a singleinformation transfer which is not dependent on the type of service, suchas sound, image (motion and still), text, etc., so as to interconnectservices which have conventionally been provided separately, such astotal communication services, analog/digital telephone line services,Internet provider services, FAX services, computer data exchangeservices, CATV services and so forth. Further, it is another object ofthe present invention to provide an integrated information communicationsystem which enables inter-corporation communication with very littlechange to the computer communication address systems which have beenindependently and separately created within each separate corporation(including universities, research institutes, government organizations,etc.).

[0009] The present invention relates to an integrated informationcommunication system, and the above objects of the present invention arerealized as follows: the present invention is configured by providing anaccess control apparatus for connecting a plurality of computercommunication networks or information communication equipment to eachother, and a relay device for networking the aforementioned accesscontrol apparatus, the system having functions for performing routing bytransferring information by a unified address system, and is configuredsuch that the aforementioned plurality of computer communicationnetworks or information communication equipments can performcommunications in an interactive manner. In FIG. 1 which is given as anexample of a conventional arrangement, the range of dedicated lines usedfor intra-corporation and inter-corporation communications is indicatedby solid lines, and this is replaced with the equivalent of a computercommunications network according to IP as a common communication networkindicated by broken lines.

[0010] The above-described objects of the present invention are achievedby an ICS (Information Communication System) user packet having a uniqueICS user address system ADX being converted into an ICS network packethaving an address system ADS, based on the administration of aconversion table provided within an access control apparatus, and bybeing arranged such that in the case that transmission is made over atleast one VAN contained therein following rules of the aforementionedaddress system ADS, and the destination other access control apparatusis reached, conversion is made to the aforementioned ICS user addresssystem ADX based on the administration of the aforementioned conversiontable, and another external information communication apparatus isreached. Also, the above-described objects of the present invention areachieved by an ICS user packet having a unique ICS user address systemADX being converted into an ICS network packet corresponding with areception ICS network address registered beforehand to the conversiontable in accordance with a user logic communication line, rather thanusing an ICS user address within the aforementioned ICS user packetbased on the administration of a conversion table provided within theaccess control apparatus, and by being arranged such that in the casethat transmission of the aforementioned ICS network packet is made toanother access control apparatus via at least one VAN following rules ofthe ICS address system ADS, the transfer destination of theaforementioned ICS network packet being either 1 or N, this is returnedto the aforementioned ICS network packet based on the administration ofa conversion table provided within the aforementioned access controlapparatus, and another external information communication apparatus isreached.

BRIEF DESCRIPTION OF THE DRAWINGS

[0011] In the accompanying drawings:

[0012]FIG. 1 is a block diagram to explain a conventional LAN network;

[0013]FIG. 2 is a diagram illustrating a form of Internet;

[0014]FIG. 3 is a diagram illustrating an IP packet according to RFC791stipulation;

[0015]FIG. 4 is a diagram illustrating an IP packet according to RFC1883stipulation;

[0016]FIG. 5 is a block diagram systematically illustrating the basicprinciple of the present invention;

[0017]FIG. 6 is a block diagram illustrating an example of a networkwherein an ICS according to the present invention is constructed of aplurality of VANs;

[0018]FIG. 7 is a block diagram illustrating an example of configuringthe access control apparatus;

[0019]FIG. 8 is a block diagram illustrating an example of configuringthe relay apparatus;

[0020]FIG. 9 is a block diagram illustrating an example of configuringthe inter-VAN gateway;

[0021]FIG. 10 is a block diagram illustrating an example of configuringthe ICS network server;

[0022]FIG. 11 is an array diagram illustrating an example of the ICSuser address used in the present invention;

[0023]FIG. 12 is a wiring diagram illustrating the connection relationbetween the ICS logic terminal and user communication line;

[0024]FIG. 13 is a diagram illustrating the relation between the ICSuser packet and the ICS network packet, used in the present invention;

[0025]FIG. 14 is a portion of a constructional block drawingillustrating a first embodiment (intra-corporation communication,inter-corporation communication) according to the present invention;

[0026]FIG. 15 is a portion of a constructional block drawingillustrating a first embodiment according to the present invention;

[0027]FIG. 16 is a diagram to show an example of a conversion table;

[0028]FIG. 17 is a diagram to show an example of a temporary conversiontable;

[0029]FIG. 18 is a flowchart illustrating an example of operation of theaccess control apparatus;

[0030]FIG. 19 is a flowchart illustrating an example of operation of theaccess control apparatus in inter-corporation communication;

[0031]FIG. 20 is a constructional block drawing illustrating a secondembodiment (virtual dedicated line) according to the present invention;

[0032]FIG. 21 is a diagram to show an example of the conversion table;

[0033]FIG. 22 is a flowchart illustrating an example of operation of theaccess control apparatus in virtual dedicated line connection;

[0034]FIG. 23 is a diagram to show an example of format of NSAP type ATMaddress;

[0035]FIG. 24 is a diagram to show an information unit of ATM cell type;

[0036]FIG. 25 is a diagram to explain conversion/restoring operationbetween ICS network packet and CPCS packet;

[0037]FIG. 26 is a diagram to explain dissolution/assembly between CPCSframe and cell;

[0038]FIG. 27 is a portion of a constructional block showing a 3^(rd)embodiment (embodiment using ATM network) according to the presentinvention;

[0039]FIG. 28 is a portion of a constructional block showing a 3^(rd)embodiment according to the present invention;

[0040]FIG. 29 is a diagram to show an example of an ATM addressconversion table and a VC address conversion table;

[0041]FIG. 30 is a diagram to show an example of an ATM addressconversion table and a VC address conversion table;

[0042]FIG. 31 is a flowchart to show a flow of packet using SVC and PVC;

[0043]FIG. 32 is a flowchart to show a flow of packet using SVC and PVC;

[0044]FIGS. 33 and 34 are block diagrams to show 1:N communication orN:1 communication using PVC;

[0045]FIGS. 35 and 36 are block diagrams to show N:N communication usingPVC;

[0046]FIG. 37 is a diagram to show an example of FR frame addressportion;

[0047]FIG. 38 is a diagram to show a variation between ICS networkpacket and FR frame;

[0048]FIG. 39 is a portion of a constructional block showing a fourthembodiment (embodiment using FR network) according to the presentinvention;

[0049]FIG. 40 is a portion of a constructional block showing a fourthembodiment according to the present invention;

[0050]FIG. 41 is a diagram to show an example of an FR addressconversion table and a DLC address conversion table;

[0051]FIG. 42 is a diagram to show an example of an FR addressconversion table and a DLC address conversion table;

[0052]FIG. 43 is a flowchart to show a flow of packet using SVC and PVC;

[0053]FIG. 44 is a flowchart to show a flow of using SVC and PVC;

[0054]FIGS. 45 and 46 are block diagrams to show 1:N communication orN:1 communication using PVC;

[0055]FIGS. 47 and 48 are block diagrams to show N:N communication usingPVC;

[0056]FIG. 49 is a portion of a constructional block showing a fifthembodiment(accommodation of telephone line, ISDN line, CATV line,satellite line, IPX line, cellular phone line) according to the presentinvention;

[0057]FIG. 50 is a portion of a constructional block showing a fifthembodiment according to the present invention;

[0058]FIG. 51 is a portion of a constructional block showing a fifthembodiment according to the present invention;

[0059]FIG. 52 is a portion of a constructional block showing a fifthembodiment according to the present invention;

[0060]FIG. 53 shows an example of the conversion table;

[0061]FIG. 54 is a flowchart to show an operation of a fifth embodiment;

[0062]FIG. 55 is a portion of a constructional block showing a sixthembodiment according to the present invention;

[0063]FIG. 56 is a portion of a constructional block showing a sixthembodiment according to the present invention;

[0064]FIG. 57 is a portion of a constructional block showing a sixthembodiment according to the present invention;

[0065]FIG. 58 is a diagram to show an example of description of routertable in a dial-up router;

[0066]FIG. 59 is a flowchart to show an operation of a sixth embodiment;

[0067]FIG. 60 is a constructional block showing a seventh embodiment(ICS address administration server) according to the present invention;

[0068]FIG. 61 is constructional block showing an eighth embodiment(full-duplex communication including a satellite communication path)according to the present invention;

[0069]FIG. 62 is a timing chart to show an example of operation of afull-duplex communication by TCP;

[0070]FIG. 63 is a timing chart to explain an eighth embodiment;

[0071]FIG. 64 is a timing chart to explain an eighth embodiment;

[0072]FIG. 65 is a timing chart to explain an eighth embodiment;

[0073]FIG. 66 is a constructional block showing a variation of an eighthembodiment;

[0074]FIG. 67 is a timing chart to show an operation of a ninthembodiment (full-duplex communication including a satellitecommunication path) according to the present invention;

[0075]FIG. 68 is a timing chart to explain a ninth embodiment;

[0076]FIG. 69 is a timing chart to explain a ninth embodiment;

[0077]FIG. 70 is a timing chart to explain a tenth embodiment;

[0078]FIG. 71 is a timing chart to explain a tenth embodiment;

[0079]FIG. 72 is a timing chart to explain an eleventh embodiment;

[0080]FIG. 73 s a constructional block showing a twelfth embodiment(full-duplex communication path) according to the present invention;

[0081]FIG. 74 is a timing chart to show an operation of a twelfthembodiment;

[0082]FIG. 75 is a constructional block to show a variation of a twelfthembodiment;

[0083]FIG. 76 is a diagram to show an example of TCP frame;

[0084]FIG. 77 is a diagram to show an example of UDP frame;

[0085]FIG. 78 is a portion of a constructional block showing athirteenth embodiment (control of receiving priority degree) accordingto the present invention;

[0086]FIG. 79 is a portion of a constructional block showing athirteenth embodiment according to the present invention;

[0087]FIG. 80 is a portion of a diagram to explain a thirteenthembodiment;

[0088]FIG. 81 is a portion of a diagram to explain a thirteenthembodiment;

[0089]FIG. 82 is a flowchart to show an operation to decide a degree ofpriority;

[0090]FIG. 83 is a constructional block showing a 14^(th) embodiment(control of transmitting priority degree) according to the presentinvention;

[0091]FIGS. 84 and 85 are diagrams to show an example of a conversiontable used in a 14^(th) embodiment;

[0092]FIG. 86 is a flowchart to show an operation of priority decisionin a 14^(th) embodiment;

[0093]FIG. 87 is a constructional block showing a 15^(th) embodiment(multiplex communication) according to the present invention;

[0094]FIG. 88 is a diagram to show an example of a conversion table usedin a 15^(th) embodiment;

[0095]FIG. 89 is a diagram to show an example of a conversion table usedin a 15^(th) embodiment;

[0096]FIG. 90 is a constructional block to show a variation of a 15^(th)embodiment;

[0097]FIG. 91 is a portion of a constructional block showing a 16^(th)embodiment (operation of ICS) according to the present invention;

[0098]FIG. 92 is a portion of a constructional block showing a 16^(th)embodiment according to the present invention;

[0099]FIG. 93 is a diagram to explain a 16^(th) embodiment;

[0100]FIG. 94 is a diagram to explain a 16^(th) embodiment;

[0101]FIG. 95 is a diagram to explain a 16^(th) embodiment;

[0102]FIG. 96 is a diagram to explain a 16^(th) embodiment;

[0103]FIG. 97 is a diagram to explain a 16^(th) embodiment;

[0104]FIG. 98 is a diagram to explain a 16^(th) embodiment;

[0105]FIG. 99 is a diagram to explain a 16^(th) embodiment;

[0106]FIG. 100 is a diagram to show an example of an ICS network addressappropriation record table used in a 16^(th) embodiment;

[0107]FIG. 101 is a diagram to show an example of an ICS user addressappropriation record table used in a 16^(th) embodiment;

[0108]FIG. 102 is a diagram to show an example of a conversion tableused in a 16^(th) embodiment;

[0109]FIG. 103 is a diagram to show an example of a conversion tableused in a 16^(th) embodiment;

[0110]FIG. 104 is a diagram to show an example of a conversion tableused in a 16^(th) embodiment;

[0111]FIG. 105 is a procedure chart to explain a 16^(th) embodiment;

[0112]FIG. 106 is a diagram to show an example of a conversion tableused in a 16^(th) embodiment;

[0113]FIG. 107 is a procedure chart to explain a 16^(th) embodiment;

[0114]FIG. 108 is a diagram to show an example of a conversion tableused in a 16^(th) embodiment;

[0115]FIG. 109 is a diagram to explain a domain name server;

[0116]FIG. 110 is a diagram to explain a domain name server;

[0117]FIG. 111 is a diagram to explain a domain name server;

[0118]FIG. 112 is a diagram to explain a domain name server;

[0119]FIG. 113 is a diagram to explain a call of a domain name server;

[0120]FIG. 114 is a diagram to explain re-writing of a conversion tablefrom an IP terminal;

[0121]FIG. 115 is a diagram to explain re-writing of a conversion tablefrom an IP terminal;

[0122]FIG. 116 is a constructional block showing a 17^(th) embodiment(calling of a communicator by telephone number) according to the presentinvention;

[0123]FIG. 117 is a diagram to show an example of a conversion table;

[0124]FIG. 118 is a diagram to show an example of an inner table used ina 17^(th) embodiment;

[0125]FIG. 119 is a diagram to show an example of an inner table used ina 17^(th) embodiment;

[0126]FIG. 120 is a diagram to show an example of an inner table used ina 17^(th) embodiment;

[0127]FIG. 121 is a diagram to explain a call of a domain name server;

[0128]FIG. 122 is a diagram to show the steps for searching ICS networkaddress and ICS user address by calling domain name servers.

[0129]FIG. 123 is a portion of a constructional block showing an 18^(th)embodiment (IP terminal to be connected with plural access controlapparatuses) according to the present invention;

[0130]FIG. 124 is a portion of a constructional block showing an 18^(th)embodiment according to the present invention;

[0131]FIG. 125 is a diagram to show an example of a verifying server;

[0132]FIG. 126 is a diagram to show an example of a conversion table;

[0133]FIG. 127 is a timing chart to explain register procedure from ahome IP terminal;

[0134]FIG. 128 is a diagram to explain an accessing method of averifying server;

[0135]FIG. 129 is a diagram to show an example of an inner table used inan 18^(th) embodiment;

[0136]FIG. 130 is a diagram to show an example of an inner table used inan 18^(th) embodiment;

[0137]FIG. 131 is a diagram to show an example of an inner table used inan 18^(th) embodiment;

[0138]FIG. 132 is a block diagram to show a call of a verifying server;

[0139]FIG. 133 is a portion of a constructional block diagramillustrating a 19^(th) embodiment (closed-zone network communication andopen-zone communication used network discriminator) according to thepresent invention;

[0140]FIG. 134 is a portion of a constructional block diagramillustrating a 19^(th) embodiment according to the present invention;

[0141]FIG. 135 is a portion of a constructional block diagramillustrating a 19^(th) embodiment according to the present invention;

[0142]FIG. 136 is a portion of a constructional block diagramillustrating a 19^(th) embodiment according to the present invention;

[0143]FIG. 137 is a diagram to show an example of a conversion tableused in a 19^(th) embodiment;

[0144]FIG. 138 is a diagram to show an example of a conversion tableused in a 19^(th) embodiment;

[0145]FIG. 139 is a diagram to show an example of a conversion tableused in a 19^(th) embodiment;

[0146]FIG. 140 is a diagram to show an example of a conversion tableused in a 19^(th) embodiment;

[0147]FIG. 141 is a flowchart to show an example of an operation of a19^(th) embodiment;

[0148]FIG. 142 is a flowchart to show an example of an operation of a19^(th) embodiment;

[0149]FIG. 143 is a portion of a constructional block diagramillustrating a 20^(th) embodiment (IP terminal to be connected withplural access control apparatus having network identifier) according tothe present invention;

[0150]FIG. 144 is a portion of a constructional block diagramillustrating a 20^(th) embodiment according to the present invention;

[0151]FIG. 145 is a diagram to show an example of a verifying serverused in a 20^(th) embodiment;

[0152]FIG. 146 is a diagram to show an example of a conversion tableused in a 20^(th) embodiment;

[0153]FIG. 147 is a signal flowchart to explain an operation of a20^(th) embodiment;

[0154]FIG. 148 is a diagram to explain a 20^(th) embodiment;

[0155]FIG. 149 is a diagram to explain a 20^(th) embodiment;

[0156]FIG. 150 is a diagram to explain a 20^(th) embodiment;

[0157]FIG. 151 is a diagram to explain a 20^(th) embodiment;

[0158]FIG. 152 is a diagram to explain a 20^(th) embodiment; and

[0159]FIG. 153 is a diagram to explain a 20^(th) embodiment.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

[0160]FIG. 5 systematically illustrates the basic principle of thepresent invention, wherein the integrated information communicationsystem (hereafter referred to as “ICS”) 1 according to the presentinvention has self-appointed address providing rules as a computerinformation/communication address. i.e., the system has a unique addresssystem ADS, and has access control apparatuses (2 through 7 in thepresent example) which serve as access points for connecting a pluralityof computer communication networks or information communicationequipments, e.g., a great number of LANs (in the present example,corporation X's LAN-X1, LAN-X2 and LAN-X3, and corporation Y's LAN-Y1,LAN-Y2 and LAN-Y3). Here, corporation X's LAN-X1, LAN-X2 and LAN-X3 havethe same address system ADX, and corporation Y's LAN-Y1, LAN-Y2 andLAN-Y3 have the same address system ADY. The access control apparatuses2, 3 and 4 have conversion tables for administrating mutual conversionbetween the address system ADS and the address system ADX. The accesscontrol apparatuses 5, 6 and 7 have conversion tables for administratingmutual conversion between the address system ADS and the address systemADY. The computer communication data (ICS packet) within the ICS 1 usesaddresses according to the address system ADS of the ICS 1, and performsIP communication such as is used on the Internet.

[0161] Now, description will be made regarding the operation in the caseof communication within a single corporation. The computer communicationdata (ICS packet) 80 transmitted from the LAN-X1 of the corporation X isprovided with addressing following the address system ADX, but issubjected to address conversion following the address system ADS underadministration of the conversion table of the access control apparatuswithin the ICS 1, and becomes ICS packet 81. This is then sent withinthe ICS 1 following the rules of the address system ADS, and uponreaching the destination access control apparatus 4, is restored to thecomputer communication data 80 of the address system ADX under theadministration of the conversion table thereof, and is sent to theLAN-X3 within the same corporation X. Here, the ICS frame being sent andreceived within the ICS 1 is referred to as an ICS network packet, andthe ICS packet being sent and received outside of the ICS 1 is referredto as an ICS user packet. The ICS user packet is such as stipulated bythe Internet protocol RFC791 or RFC1883 as a rule; but dealing with ICSpackets which do not follow this rule will be described later inconjunction with description of another embodiment.

[0162] The ICS network packet 81 is comprised of a network control field81-1 and a network data field 81-2, with the network control field 81-1storing the addresses (address system ADS) of the access controlapparatuses 2 and 4 therein. The ICS user packet is either used as thenetwork data field 81-2 with no change to the data value thereof, or issubjected to data format conversion following stipulations determinedwithin the ICS 1 and is used as network data field 81-2. An example ofthe data format conversion stipulations might be conversion tociphertext or data compression, and the access control apparatus 2 maybe provided with ciphering means, deciphering means for returning theciphertext to the original plain-text, data compression means, and datadecompression means for returning the compressed data to the originaldata. In the access control apparatus 2, the ICS user packet 80 is usedas the ICS network packet 81-2, and each of the operations of adding thenetwork control field 81-1 to the ICS network packet 81-2 are referredto as “ICS encapsulation”. Also, in the access control apparatus 4, theoperations of removing the network control field 81-1 from the ICSnetwork packet 81 are referred to as “ICS reverse encapsulation”.

[0163] Now, description will be made regarding the operation in the caseof communication between corporations. The computer communication data(ICS user packet) 82 transmitted from the LAN-Y2 of the corporation Y isprovided with addressing following the address system ADY, but issubjected to address conversion following the address system ADS underadministration of the conversion table of the access control apparatus 6within the ICS 1, and becomes ICS packet 83. This is then sent withinthe ICS 1 following the rules of the address system ADS, and uponreaching the destination access control apparatus 3, is converted to thecomputer communication data 82 of the address system ADX under theadministration of the conversion table thereof, and is sent to theLAN-X2 within the corporation X. While address lengths of 32 bits and128 bits are used in the present invention, the present invention is byno means restricted to these. Even if the length of the addresses arechanged to such other than 32-bit or 128-bit, this does not change theprinciple of address conversion which is the principle idea of thepresent invention.

[0164] Thus, according to the present invention, both intra-corporationand inter-corporation computer communications are enabled by unifiedaddress administration by the ICS 1. Generally used user terminals forcomputer communications are incorporated within the LAN within thestructure of the user, and incorporated within the VAN (Value AddedNetwork) via access line, and user data packets are sent which havediffering data formats and differing address system for each type ofservice. For example, an IP address is used for Internet services, atelephone number/ISDN number (E.164 address) for telephone services, andan X.121 address is used for X.25 packet services. Conversely, accordingto the ICS 1 of the present invention, address conversion is performedwith the conversion table of the access control apparatus based on theinput ICS user packet, thus realizing sending of information frames ofdata of varied structures unified under a single data format and addresssystem, i.e., converted to ICS packets.

[0165]FIG. 6 schematically illustrates an example wherein the ICS 1 ofthe present invention is comprised of a plurality of VANs (VAN-1, VAN-2,VAN-3), with each VAN being administered by a VAN operator. An ICS 1user applies to the VAN operator for a user communication line, and theVAN operator decides the ICS address and ICS network address for theuser and registers this information with the circuit type in aconversion table 12 within the access control apparatus 10 such as shownin FIG. 7. The ICS 1 has, as access points serving as externalconnection elements with the LANs (or terminals) of the corporations Xand Y, the access control apparatuses 10-1, 10-2, 10-3, 10-4 and 10-5,as shown in FIG. 7, and further has relay apparatuses 20-1, 20-2, 20-3and 20-4, and also ICS network servers 40-1, 40-2, 40-3, 40-4 and 40-5,as well as ICS address administration servers 50-1 and 50-2. A relayapparatus 20 such as shown in FIG. 8 is provided to the communicationpath within each of the VANs, and an inter-VAN gateway 30 such asillustrated in FIG. 9 is provided as the connection element of VAN-2 andVAN-3. The LANs 1-1, 1-2, 1-3 and 1-4 are respectively connected to theaccess control apparatuses 10-1, 10-5, 10-4 and 10-2, via the usercommunication lines 36-1, 36-2, 36-3 and 36-4.

[0166] The access control apparatus 10 (10-1, 10-2, 10-3, 10-4 and 10-5)are devices containing the user communication lines from the user(corporations X and Y) to the ICS 1, and as shown in FIG. 7, arecomprised of a processing device 11 comprised of a CPU or the like, aconversion table 12 serving as a database for performing addressconversion and the like, an input/output interface line portion 13, anda temporary conversion table 14. Also, the relay apparatus 20 hasnetwork packet transferring functions and path specification routingfunctions, and as shown in FIG. 8 has a processing device 21 comprisedof a CPU or the like and a conversion table 22, the conversion table 22being used for determining the communication destination when the ICSnetwork frame is transferred within the ICS 1. The inter-VAN gateway 30has a processing device 31 comprised of a CPU or the like and a relaytable 32 for determining where to send ICS network packets between VANs,as shown in FIG. 5.

[0167] As shown in FIG. 10, the ICS server 40 is comprised of aprocessing device 41 and an ICS network database 42, the usage of theICS network database 42 not being restricted. Examples of this usageinclude: user-specific data corresponding with the ICS address (such asthe name or address of the user), data not corresponding with the ICSaddress, such as data indicating the state of communication troublewithin the VAN, or data not directly related to the VAN, such as anelectronic library which maintains and discloses digital documents,public keys for a public encryption system using encryption technologyemployed in verifying the authenticity of the sender and receiver, andmaintaining data such as public proof data and related data or secretkeys for a secret encryption system and related data. The processingdevice 41 refers to the ICS network database 42, and obtainscorresponding data and sends the data to the access control apparatus10. Further, not only does the ICS network database 42 operate instand-alone manner, but also is capable of communicating with other ICSnetwork servers and obtaining data therefrom, by means of sending andreceiving ICS network frames based on IP communication technology.Within the ICS, the ICS network server is the only component providedwith an ICS network address.

[0168] According to the present invention, the address used to identifycomputers, terminals and the like used within the ICS network packet isreferred to as an ICS network address, and the address used to identifythe computers, terminals and the like used within the ICS user packet isreferred to as an ICS user address. The ICS network address is used onlywithin the ICS, one or both of the two types being used; 32-bit and/or128-bit. Similarly, the ICS user address also uses one or both of thetwo types; 32-bit and/or 128-bit. The access control apparatus 10, therelay apparatus 20, the VAN gateway 30 and the ICS network server arearranged so as to be provided each with an ICS network address so as tobe uniquely identified. Also, the ICS user address is formed of a VANupper code and VAN internal code. With the length of the VAN upper codebeing represented as C1 bits and the length of the VAN internal codebeing represented as C2 bits, the ICS user address is used such that thetotal of C1+C2 equals either 32 bits or 128 bits.

[0169] In the present invention, no particular method for deciding theVAN upper code and VAN internal code is stipulated, but in the case ofC1+C2 =32 bits, the following example can be given for a method fordeciding such:

[0170] VAN upper address=district administration code(4-bit)∥country

[0171] code(4-bit)∥VAN code(8-bit)

[0172] VAN internal code=VAN district code(4-bit)∥VAN access point

[0173] code(8-bit) ∥user logic code(4-bit)

[0174]FIG. 11 makes description thereof using an example of an ICS useraddress. Here, the symbol “a∥b” indicates linkage of data “a” and “b”,i.e., data obtained by means of arrayed data “a” and “b” in this order.The ICS network address can be provided with locality in the same manneras with the user network address. That is,

[0175] ICS network address=district administration code∥country code

[0176] ∥VAN code ∥VAN district code ∥user logic

[0177] communications line code

[0178] Thus, the relay apparatus can efficiently find the transferdestination by means of deciding the transferring destination withconsideration to the district. The address can be determined in the sameway in the case of C1+C2=128 bits, as well. Incidentally, with thepresent invention, the ICS frame can be constructed as described later,as long as C1+C2=32 bits or C1+C2=128 bits is kept, regardless of howthe field sections for the VAN upper code and VAN internal code aremade, or the length of each of the sections.

[0179] Also, when deciding the VAN upper code and VAN internal code,part of these codes may be made to be unique to the user. That is, theuser can make a user-specific address system. The address values withina 32 bit address value are from address 0 to address (2³²−1), thepresent invention is carried out by providing an address decideduniquely to the user within the range of address 10×2²⁴ to address(10×2²⁴+2²⁴−1), i.e., address (172×2²⁴+16×2¹⁶) to address(172×2²⁴+32×2¹⁶−1) or address (192×2²⁴+168×2¹⁶) to address(192×2²⁴+169×2¹⁶−1) (192×2²⁴+169×2¹⁶−1).

[0180] A physical communication line can be separated into a pluralityof communication lines and used, this being realized in conventional artas frame relay (FR) multiplex communication method, for example.According to the present invention, the user's communication line isseparated into a user physical communication line and one or more userlogic communication lines. FIG. 12 illustrates an example of the above,wherein a user physical communication line 60 is separated into two userlogic communication lines 61-1 and 61-2 of the communication rate 50Mbps. Also, separate computer communication apparatuses 62-1, 62-2,62-3, and 62-4 are each connected to respective user logic communicationlines, and the ICS user addresses “4123,0025,0026,4124” are provided toeach of the computer communication apparatuses 62-1 through 62-4. Theuser physical communication line 60 is connected to the access controlapparatus 63, and the point of contact between the two is called “ICSlogic terminal”. The ICS logic terminal is provided with an only ICSnetwork address within the ICS. In the example shown in FIG. 12 userlogic communication lines 61-1 and 61-2 are connected to the accesscontrol apparatus 63, and ICS network addresses “8710” and “8711” areprovided to the contact point ICS logic terminals 64-1 and 64-2,respectively.

[0181] As described above, the ICS network server 40 is also providedwith an only ICS network address, so that the ICS network address candetermine that the ICS logic terminal or the ICS network server is theonly one within the ICS. The ICS network server is capable of exchanginginformation with other ICS servers by means of sending and receiving ICSnetwork packets provided with each other's ICS network addresses, usingthe IP communication technology. This function is referred to as “ICSnetwork server communication function”. The access control apparatus isalso provided with an only ICS network address within the ICS, and iscapable of exchanging information with other ICS servers by means of theICS network server communication function. The ICS network servercommunication function is realized by using conventional TCP or UDP(UserDatagram Protocol) technology.

[0182] There are two types of ICS packets in the present invention, asdescribed earlier, the ICS network packet which is sent and receivedwithin the ICS, and the ICS user packet which is sent and receivedoutside of the ICS. Each packet is comprised of a control field and adata field, and, as shown in FIG. 13, the packets are comprised of anetwork control field (Network-CNT), a user control field, a networkdata field and a user data field, so as to allow usage by ICSencapsulation and ICS reverse encapsulation. That is, when the ICS userpacket enters the ICS from the access control apparatus, the ICS userpacket becomes part of the data of the ICS network packet, and thecontrol field of the ICS network packet (network control field) is addedthereto (ICS encapsulation). The network control field is divided into abasic field and an external field. The basic field is used as a headerof RFC791 or RFC1833 stipulation and the external field is used forciphering or the like.

[0183] Inside the network control field of the ICS packet is placed arange for storing the sender's address and the intended receiver'saddress. There are two types of ICS packets, those with a 32-bit addresslength and those with a 128-bit address length, with a packet formatbeing employed according to the RFC791 stipulation shown in FIG. 3, forexample. In the event that 32 bits is insufficient for the ICS networkaddress, for example, in the event that a 64-bit address is to be used,following the RFC791 stipulation, the lacking 32 bits (64 bits-32 bits)are written into the option portion of the ICS network packet controlfield, thus making the network address usable at 64 bits. Now,supplemental description will be made regarding the aforementioneduser-specific address. In the event that a great number of users have aprivate address (a type of ICS address) in the section between (10×2²⁴)and (10×2²⁴+2²⁴−1) for example, in the case that the length of the ICSuser address is 32 bits, the 32 bits is insufficient for the ICS networkaddress, since the ICS network address is provided corresponding to theICS user address, and 64 bits is required, for example. In this case, asdescribed above, the lacking 32 bits are written into the option portionof the ICS network packet control field, thus making the network addressusable at 64 bits.

[0184] The fact that communication between the same user (called“intra-corporation communication”) is possible using a private addresswill be described in the first embodiment. Also, in the event that theaddress length is 128 bits, the present embodiment is carried outfollowing packet format according to the RFC1883 stipulation such asshown in FIG. 4, for example. The transmitting address range within thenetwork control field, and the address stored in the destination addressare made to be ICS network addresses, each respectively being thetransmitting ICS network address and the receiving ICS network address.Further, the transmitting address range within the user control field,and the address stored in the destination address are made to be ICSuser addresses, each respectively being the sender ICS user address andthe receiver ICS user address.

[0185] Incidentally, there is no need to follow the RFC791 or RFC1883stipulation for the ICS packet format in carrying out the presentinvention; the present invention can be carried out as long as thepacket format is such that it uses addresses of 32 bits or 128 bits inlength. Generally, ICSs receive ICS user packets stipulated by RFC791 orRFC1883, but other packet formats can be handled within the ICS networkby converting to ICS user packets with conversion means.

Embodiment-1 (Basic ICS, Intra-Corporation Communication andIntra-Corporation Communication)

[0186] A first embodiment of the present invention will be describedwith reference to FIGS. 14 and 15, regarding basic communication whereinthe transfer destination within the ICS is determined from thereceiver's ICS user address, based on administration by a conversiontable. In the figures, 170-1, 170-2, 170-3 and 170-4 respectively denotegateways provided within the LANs 100-1, 100-2, 100-3 and 100-4, and theICS packets can pass through these gateways 170-1 through 170-4.

[0187] First, description will be made regarding communication between aterminal which is connected to LAN 100-1 of a corporation X which has aunique address system ADX, and a terminal which is connected to LAN100-2 of the same corporation X. That is, this is communication betweena terminal which has an ICS user address “0012” on the LAN 100-1, and aterminal which has an ICS user address “0034” on the LAN 100-2. Thiscommunication is typical of communication made between terminals whichhave set addresses based on a unique address system within a singlecorporation (ADX in this example), the communication being made via theICS 100 in an interactive manner. This type of communication is referredto as intra-corporation communication service (or intra-corporationcommunication). Next, description will be made regarding communicationbetween a terminal which is connected to LAN 100-1 of a corporation Xwhich has a unique address system ADX, and a terminal which is connectedto LAN 100-3 of a corporation Y which has a unique address system ADY.That is, this is communication between a terminal which has an ICS useraddress “0012” on the LAN 100-1, and a terminal which has an ICS useraddress “1156” on the LAN 100-3. This communication is typical ofcommunication made between terminals which have different addresssystems within different corporations, the communication being madeusing an ICS address system which can be shared between the two. Thistype of communication is referred to as inter-corporation communicationservice (or inter-corporation communication).

[0188] <<Common Preparation>>

[0189] In describing the present embodiment, the address format and soforth is determined as described below, but the specific numeric valuesand formats are all but an example, and the present invention is by nomeans limited to these. The ICS network address is represented by a4-digit number, and the sender ICS user address and the receiver ICSuser address are both represented by a 4-digit number. Of the sender ICSuser address and the receiver ICS user address, addresses of which theupper two digits are not “00” are used as inter-corporationcommunication addresses, and these inter-corporation communicationaddresses are an only value within the ICS 100. Of the sender ICS useraddress and the receiver ICS user address, addresses of which the uppertwo digits are “00” are used as intra-corporation communicationaddresses, and these intra-corporation communication addresses may beduplicate of other intra-corporation communication addresses within theICS 100. The ICS address administration server 150-1 is capable ofuniquely identifying the inter-corporation communication addresses.Also, the conversion table 113-1 provided to the access controlapparatus 110-1 contains the following: originating ICS networkaddresses, receiving ICS network addresses, sender ICS networkaddresses, receiver ICS network addresses, request identification, speedsegments and so forth. The request identification registered to theconversion table 113-1 is such that, e.g., “1” representsintra-corporation communication service, “2” representsinter-corporation communication service, and “3” represents virtualdedicated line connection. The speed segment is the line speed that thecommunication from the ICS network address requires, includingthroughput (e.g., the number of ICS packets sent within a certain amountof time).

[0190] <<Preparation for Intra-Corporation Communication>>

[0191] The users of LAN 100-1 and LAN 100-2 specify the terminal andapply to a VAN operator in order that the intra-corporationcommunication of the terminals connected to the LANs can performcommunication via the VAN-1 and VAN-3. The VAN operator responds to theapplication and sets the aforementioned ICS network address, ICS useraddress, request identification number, etc. to the conversion tables ofthe access control apparatuses 110-1 and 110-5 connected to the LAN100-1 and LAN 100-2.

[0192] The items to be set for the VAN-1 are as follows. The ICS networkaddress is decided by the ICS logic terminal of the access controlapparatus 110-1 to which the LAN 100-1 is connected, with the ICSnetwork address of the ICS logic terminal in this case being set as“7711”. The intra-corporation communication address of the terminalconnected to the LAN 100-1 from which the application was made is set as“0012”, and this is used as the sender ICS user address. Theintra-corporation communication address used by the terminal of theaddress is set as “2212”, and this is used as the sender ICS useraddress. Next, the intra-corporation communication address of theterminal connected to the LAN 100-2 from which the application was madeis decided by the ICS logic terminal of the access control apparatus110-5 to which the LAN 100-2 is connected, in this case the ICS networkaddress being set as “9922”, and this is used as the receiving ICSnetwork address. Further, the ICS user address used by the terminalconnected to the LAN 100-2 is set as “0034”, and this is used as thereceiver ICS user address. The number “1” is set as the requestidentification, indicating the intra-corporation communication servicethat was applied for, and the above is registered to the conversiontable 113-1.

[0193] The items to be set for the VAN-3 are as follows. Valuesnecessary for reverse communication (communication from LAN 100-2 toLAN-1) are set to the conversion table of the access control apparatus110-5 connecting the LAN 100-2 from which application was made. That is,data is set reverse to the transmitting ICS network address and thereceiving ICS network address, and at the same time, data is set reverseto the sender ICS user address and the receiver ICS user address. TheICS network address of the LAN 100-2 is set as “9922”, and this is usedas the transmitting ICS network address. Numeral “0034” is set as thesender ICS user address for the intra-corporation ICS user address ofthe terminal connected to the LAN 100-2, and the ICS user address “0012”of the terminal of the other party is used as the receiver ICS useraddress. Also, the ICS user address “7711” of the LAN 100-1 is used asthe receiving ICS network address and the value “1” is set as therequest identification, indicating intra-corporation communicationservices. The above is written to the conversion table of the accesscontrol apparatus 110-5 and registered.

[0194] <<Operation of Intra-Corporation Communication>>

[0195] Regarding communication between a terminal connected to LAN 100-1and having a sender ICS user address “0012”, and a terminal connected toLAN 100-2 and having a receiver ICS user address “0034”, the sender“0012” sends an ICS user packet to the receiver “0034”. This ICS userpacket has set as the sender ICS user address “0012”, and as thereceiver ICS user address has set “0034”, and the terminal with the ICSuser address “0012” performs sending thereof.

[0196] The operation will be explained with reference to a flowchart inFIG. 18. The conversion table 113-1 is shown in FIG. 16 and thetemporary conversion table 114-2 is shown in FIG. 17.

[0197] The ICS user packet P1 is sent via the user logic communicationline 180-1, and transferred to the access control apparatus 110-1 as theICS user packet P1. The access control apparatus 110-1 refers to theconversion table 113-1 from the transmitting ICS network address “7711”(Steps S100 and S101) and the receiver ICS user address “0034” of thereceived ICS user packet, and knows that the communication is anintra-corporation communication from the request identification value“1” obtained at the same time(Step S102). Then, the receiving ICSnetwork address “9922” corresponding to the sender ICS user address“0034” is obtained (Step S103) and is ICS-encapsulated (Step S106). Theabove procedures illustrated in a flowchart are as shown in FIG. 18,with the intra-corporation being flow (1) therein. The sender ICS useraddress may be used to specify a source of the ICS packet.

[0198] The access control apparatus 110-1 performs the ICSencapsulation, forming the ICS network packet P2 which is sent to therelay apparatus 120-1. Since the ICS network address of the networkfield is ensured of its uniqueness within the ICS, there is no conflictwith other ICS packets. The ICS network packet P2 passes through therelay apparatus 120-1 and 120-2 based on the receiving ICS networkaddress, and reaches the access control apparatus 110-5 of the VAN-3.The access control apparatus 110-5 removes the network control fieldfrom the ICS network packet P4 and performs ICS reverse encapsulation,and re-creates a user data packet P5 which is the same as the ICS userpacket P1 from the network data field of the ICS packet, and sends it tothe LAN 100-2. The ICS user packet is routed through the LAN 100-2, andis transferred to the terminal which has the ICS user address “0034”.

[0199] <<Preparation for Inter-Corporation Communication>>

[0200] As an example of performing inter-corporation communication, thecommunication between a terminal which has an ICS user address “0012”and is connected to a LAN 100-1 following address system ADX, and aterminal which has an ICS user address “1156” and is connected to a LAN100-3 following address system ADY, will be described. The users of theLAN 100-1 and LAN 100-3 specify the terminal to the VAN each isconnected to so as to be able to perform the communication via VAN-1 andVAN-2, and make application to the VAN operator. The VAN operator setsthe necessary items in the conversion table of the access controlapparatus which is connected to the LAN 100-1 and LAN 100-3, inaccordance with the application.

[0201] The items to be set regarding VAN-1 are as follows. The ICSnetwork address of the LAN 100-1 is made to be “7711”, theintra-corporation communication address held by the terminal connectedto the LAN 100-1 from which there was application is made to be “0012”,and this is made to be the sender ICS user address. Theinter-corporation communication address provided to the terminal of theabove ICS user address made to be “2212”, and this is made to be thesender user address (inter-corporation). The ICS network address isdetermined by the ICS logic terminal of the access control apparatus110-4 connected to the ICS network address of the LAN 100-3 from whichthere was application, the ICS network address here being “8822”, andthis is made to be the receiving ICS network address. Also, the ICS useraddress of a terminal connected to the LAN 100-3 is made to be “1156”,and this is made to be the receiver ICS user address. Further, a value“2” is set as the request identification, indicating theinter-corporation communication service that was applied for, and theabove is registered to the conversion table 113-1.

[0202] The items to be set regarding VAN-2 are as follows. As aconversion table for the access control apparatus 110-4 to which the LAN100-3 is connected, a temporary conversion table 114-2 which holdsreverse data for a certain time, e.g., 24 hours, is set. That is,regarding the ICS network address “8822” to which is connected the LAN100-3 which uses the inter-corporation communication service, thefollowing are provided within the access control apparatus 110-4: atransmitting ICS network address, a sender ICS user address, a receiverICS user address, a receiving ICS network address and temporaryconversion table 114-2 which includes a request identification and soforth.

[0203] <<Operation of Inter-Corporation Communication>>

[0204] A terminal having an ICS user address “0012” sends an ICS userpacket F1 wherein the sender ICS user address is set as “0012” and thereceiver ICS user address is set as “1156”. The ICS user packet F1 istransferred to the access control apparatus 110-1 via the user logiccommunications line 180-1.

[0205] The access control apparatus 110-1 refers to the conversion table113-1 from the originating ICS network address “7711” of the LAN100-1(Steps S100 and S101) and the receiver ICS user address “1156”, andknows that the request identification value is “2”, i.e., thiscommunication is an inter-corporation communication (Step S102). Thereceiving ICS network address corresponding to the receiver ICS useraddress “1156” is known as “8822” (Step S104), and then the sender ICSuser address “0012” is converted into an inter-corporation communicationaddress “2212” (Step S105). The access control apparatus 110-1 adds anetwork control field, from the obtained transmitting ICS networkaddress “7711”, the sender ICS user address “2212”, the receiver ICSuser address “1156” and the receiving ICS network address “8822”, andperforms the ICS encapsulation, forming the ICS network packet F2 whichis sent to the relay apparatus 120-1(Step S106). The above proceduresare illustrated in a flow (2) in FIG. 18.

[0206] In the above inter-corporation communication, in the event thatthe sender ICS user address within the ICS user packet F1 is made to bethe inter-corporation communication address “2212”, the sender and thereceiver perform the inter-corporation communication using aninter-corporation communication address (Steps S102 and S104). In thiscase, the access control apparatus 110-1 does not perform the process ofconverting the sender ICS user address “2212” into the inter-corporationcommunication address “2212”, as such is not necessary. The aboveprocedures are illustrated in a flow (3) in FIG. 18. The sender ICS useraddress may be used to specify a source of the ICS packet.

[0207] The relay apparatus 120-1 transfers the ICS network packet to theaccess control apparatus 110-4 within the VAN-2 via the relay apparatus120-2 within the VAN-1, the interVAN gateway 130 and the relay apparatus120-3 within the VAN-2, based on the receiving ICS network address. Theoperation will be explained with reference to FIG. 19. The accesscontrol apparatus 110-4 receives the ICS network packet(Step S110),creates an ICS user packet F5 from the network data field(Step S111: ICSreverse encapsulation), and decides from the receiving ICS networkaddress the logic terminal for sending((1) of Step S112) and sends it tothe LAN 100-3(Step S113). At the same time, in the event that therelation among the transmitting ICS network address “8822”, the senderICS user address “1156”, the receiver ICS user address “2212” and thereceiving ICS network address “7711” is not registered in the conversiontable within the access control apparatus 110-4, a value “2” of therequest identification, i.e., a designation of the inter-corporationcommunication is set to the temporary conversion table 114-2((2) of StepS112). The registration contents of the temporary conversion table 114-2are updated according to processes such as the contents being deleted ifthere is no usage thereof for 24 hours. The ICS user packet is routedthrough the LAN 100-3, and is transferred to the terminal having the ICSuser address “1156”. In a case that the column of the sender ICS useraddress in the conversion table 114-2 is separated as“intra-corporation” and “inter-corporation” of the conversion table113-1, e.g., in the case that “1159” is described in the conversiontable as the sender ICS user address “1159” which is described at theaddress column of user control field of ICS user packet just after theICS reverse encapsulation is processed. Then, the process in which theaddress of the user control field is rewritten to “0023” is added to theprocess of the Step S112(1). As described above, although the ICS useraddress “0023” for the intra-corporation communication is used withinLAN, the ICS “1159” for the corporations outside LAN. In anotherembodiment, the values are not set in the temporary conversion table.Further, in another embodiment, the conversion table 113-1 does notinclude the sender ICS address (intra-corporation) and the sender ICSuser address (inter-corporation) and does not include the flow (2) inFIG. 18, i.e., Step S105. At the Step S104, the sender ICS user addressis not referred. An effect of this embodiment is that register number ofthe conversion table is to be reduced to one of the sender ICS useraddress when there are many of the sender ICS user addresses.

Embodiment-2 (Virtual Dedicated Line)

[0208] Now, description of the operation of a virtual dedicated lineconnection according to the present invention will be made withreference to FIG. 20. Here, the virtual dedicated line connection refersto communication wherein ICS user packets are transferred in a fixedmanner to a receiving ICS network address already registered in theconversion table, regardless of the ICS user address within the usercontrol field of the ICS user packet, in which the format taken isone-on-one or one-on-N. While the components of FIG. 20 are the same asthose of Embodiment-1 shown in FIGS. 14 and 15, what is different is thecontents of registration in the conversion table. In the conversiontable of the access control apparatus, the receiving ICS network addressis determined from the transmitting ICS network address in a fixedmanner, so that either the sender ICS user address (intra-corporation),the sender ICS user address (inter-corporation) and the receiver ICSuser address are either not registered, or ignored if registered.

[0209] Description will now be given regarding a case in which acorporation X uses virtual dedicated line connection, and thecommunication is conducted between LAN 200-1 of the corporation X whichis connected to the access control apparatus 210-1, and LAN 200-2 of thecorporation X which is connected to the access control apparatus 210-5.The conversion table 213-1 is shown in FIG. 21.

[0210] <<Preparation>>

[0211] The user applies to a VAN operator for virtual dedicated lineconnection. The VAN operator determines the ICS network address “7711”of the ICS logic terminal at the connection point between the accesscontrol apparatus 210-1 for connecting the LAN 200-1 of the corporationX and the user logic communications line 240-1, and similarly determinesthe ICS network address “9922” of the ICS logic terminal at theconnection point between the access control apparatus 210-5 forconnecting the LAN 200-2 of the corporation X and the user logiccommunications line 240-2. Next, the VAN operator performs setting tothe conversion table 213-1 of the access control apparatus 210-1 of thefollowing: the transmitting ICS network address “7711”, the receivingICS network address “9922” and the request type. Illustrated in FIG. 20is an example wherein the request type “3” has been made to serve as thevirtual dedicated line connection. Similarly, the VAN operator performssetting to the conversion table of the access control apparatus 210-5 ofthe following: the transmitting ICS network address “9922”, thereceiving ICS network address “7711” and the request type.

[0212] <<Procedures>>

[0213] The operation will be explained with reference to FIG. 22. TheLAN 200-1 of the corporation X sends a user packet F10 to the ICS 200via the user logic communication line 240. The access control apparatus210-1 which has received the ICS user packet F10 from the logic terminalof the ICS network address “7711” makes reference to the request type ofthe transmitting ICS network address “7711” (Steps S200 and S201) andidentifies this as a virtual dedicated line connection by referring therequest identification “3” (Step S202), and reads the receiving ICSnetwork address “9922” (Step S203). Next, the access control apparatus210-1 adds a network control field to the ICS user packet F10 in whichthe receiving ICS network address is set to “9922” and the transmittingICS network address is set to “7711”, thus forming an ICS network packetF11(Step S204: ICS encapsulation), and sends this to the relay apparatus220-1(Step S205). The relay apparatus 200-1 which receives the ICSnetwork packet F11 determines the destination based on the receiving ICSnetwork address of the ICS network packet F11, and sends an ICS networkpacket F12 to the relay apparatus 220-2. The ICS network packet F12 istransferred to the access control apparatus 210-5 via the relayapparatus 220-4 within the VAN-3.

[0214] The access control apparatus 210-5 removes the network controlfield from the ICS network packet F13 (ICS reverse encapsulation), andsends the ICS network packet F14 from the logic terminal of the ICSnetwork address “9922” to the user logic communications line 240-2.Then, the LAN 200-2 of the corporation X receives the ICS user packetF14. Transmission can be made in the same say as described from the LAN200-2 to the LAN 200-1, and thus, interactive communication isavailable. Using the same method, ICS user packets can be transferredfrom the LAN 200-1 of the corporation X to a LAN 200-3 of anothercorporation Y.

[0215] Also, while the above description has been made with reference toa case of one-on-one communication, one-on-N communication can also beperformed. For example, a plurality of ICS network addresses may be setto the conversion table 213-1 of the access control apparatus 210-1shown in FIG. 20, as indicated by the transmitting ICS network address“7712”. In the present example, two ICS network addresses are set,“6611” and “8822”. The access control apparatus 210-1, upon receivingthe ICS user packet from the ICS logic terminal with an ICS networkaddress “7712”, creates a first ICS network packet wherein a networkcontrol field set with “6611” for the receiving ICS network address isadded thereto, and a second ICS network packet wherein a network controlfield set with “8822” for the receiving ICS network address is addedthereto, these being sent to the relay apparatus 220-1. Consequently,one-on-two communication can be performed. Subsequently, one-on-Ncommunication can be performed by transferring each ICS network packetin the same manner as described above.

Embodiment-3 (Embodiment using an ATM Network)

[0216] An embodiment will be described wherein the network inside theICS according to the present invention is configured using an ATMnetwork. The present embodiment will be described in the followingorder: (1) supplementary explanation of ATM-related conventional art,(2) description of components, (3) flow of packets using SVC, (4) flowof packets using PVC, (5) one-on-N or N-on-one communication using PVC,and (6) N-on-N communication using PVC. Incidentally, since the presentembodiment mainly discloses art regarding address conversion between ICSnetwork packets and ATM networks, so any of the following can be appliedto the present embodiment: intra-corporation communication service andinter-corporation communication service described in Embodiment-1 andvirtual dedicated line service described in Embodiment-2.

[0217] (1) Supplementary Explanation of ATM-Related Conventional Art:

[0218] First, supplementary explanation will be made regardingATM-related conventional art to the extent that is necessary to describethe present embodiment. With an ATM network, a plurality of non-fixedlogic channels which can flexibly deal with communication speed and soforth can be set on a physical line, these logic channels being referredto as VCs (Virtual Channel). There are two types of virtual channelsstipulated according to the way of setting, SVC (Switched VirtualChannel) and PVC (Permanent Virtual Channel). The SVC performs callsetting of a virtual channel whenever necessary, and can establish alogic line having the necessary speed for a necessary duration with anarbitrary ATM terminal (a general term for communication devices whichare connected to the ATM network and perform communications using theATM network). Call setting of the virtual channel is performed by theATM terminal which is attempting to initiate communication, and the“signaling method” is standardized in ITU-T regarding this method. Anaddress for identifying the destination ATM terminal to which callsetting is to be performed (this address hereafter referred to as “ATMaddress”) is necessary for call setting, and the ATM addresses aresystematized so that each ATM terminal has a unique ATM address withinthe ATM network, in order to enable identification of the ATM terminals.There are the following address systems: E.164 format stipulated in theITU-T Recommendations Q.2931, and the three types of NSAP method ATMaddresses such as shown in FIG. 23 following the ATM Forum UNI 3.1Specifications. Now, regarding ICS, which of the above ATM addresssystems is used is decided by the specific construction of the ATMnetwork, so description of the present embodiment will proceed using theterm “ATM address”.

[0219] The PVC performs call setting in a semi-permanent manner, and canbe considered to be a virtual line as viewed from the ATM terminal. IDsfor identifying virtual channels (hereafter referred to as “virtualchannel ID”) are appropriated to established virtual channels for boththe VC and PVC. A virtual channel ID is comprised of the VPI (VirtualPath Identifier) and the VCI (Virtual Channel Identifier) of the cellheader portion of the ATM cell format (63 bytes) shown in FIG. 24.

[0220] Information communication within the ATM network is performed ininformation units of the ATM cell format shown in FIG. 24, so there isthe necessity to convert the ICS network packets into the ATM cells inorder to send over an ATM network. This conversion is performed in twosteps: conversion to CPCS (Common Part Convergence Sublayer) shown inFIG. 25, and degradation of the CPCS frames to the ATM frames as shownin FIG. 26. Dividing a communication packet into ATM cells results in aplurality of the ATM cells in most circumstances, so the series of ATMcells related to the since communication packet is referred to as an ATMcell sequence. Reception of an ATM cell sequence results in reverseconversion, which is performed in two steps: assembling a CPCS framefrom the ATM cell sequence shown in FIG. 26, and extracting andreproducing the communication packet (ICS network packet) from the CPCSframe shown in FIG. 25. Conversion to the CPCS frame anddegradation/assembly of the ATM cells constitute known art, which hasbeen standardized following the ITU-T Recommendations. Also, protocolheaders within the CPCS frame user information have been standardized inRFC1483 of IETF.

[0221] (2) Description of Components:

[0222]FIGS. 27 and 28 focus on the ATM network 1042, in which theinternal construction of the conversion unit 1033-1 within the ATMexchange 10133-1 and of the conversion unit 1033-2 within the ATMexchange 10133-2 is described, and also the access control apparatus1010-2 and 1010-1 are described in a simplified manner. Contents of anATM address conversion table 1533-5 and a VC address conversion table1433-5 are shown in FIG. 29, and contents of an ATM address conversiontable 1533-6 and a VC address conversion table 1433-6 are shown in FIG.30. In the present embodiment, the internal configuration of the accesscontrol apparatus and the operation of the processing device within theaccess control apparatus are basically the same in principle as thedescription given in Embodiment-1.

[0223] Appropriated to the access control apparatus 1010-5 shown in FIG.27 are ICS network addresses “7711” and “7722”, serving as connectionpoints (ICS logic terminals) for corporations X and A which are theusers of the ICS 905. Also appropriated to the access control apparatus1010-7 are ICS network addresses “7733” and “7744”, serving asconnection points for corporations W and C, similarly. In FIG. 28,appropriated to the access control apparatus 1010-6 are ICS networkaddresses “9922” and “9933”, serving as connection points forcorporations Y and B, and similarly appropriated to the access controlapparatus 1010-8 are ICS network addresses “9944” and “9955”, serving asconnection points for corporations Z and D. Here, in the ATM networkembodiment, the corporations X, Y and so forth, which are given asexamples of users, may be differing locations within a singlecorporation which performs intra-corporation communication, or may bedifferent corporations which perform inter-corporation communication.

[0224] An interface unit 1133-5 is provided in the conversion unit1033-5 within the ATM exchange 10133-5, this interface unit 1133-5handling the processing of rectifying interfacing (physical layers, datalink layer protocol) of the communication lines connecting the accesscontrol apparatus 1010-5 and the ATM exchange 10133-5. The conversionunit 1033-5 is comprised of a processing device 1233-5, and also an ATMaddress conversion table 1533-5 for call setting with the SVC, and a VCaddress conversion table 1433-5 for converting addresses from ICSnetwork addresses used by both SVC and PVC to virtual channel. Also, theATM exchange 10133-5 connects the ATM address administration server1633-5 serving as an information processing device for storing the ATMaddress conversion table with, in the case of using PVC, the PVC addressadministration server 1733-5 serving as an information processing devicefor storing the VC address conversion table, thereby performing theinformation processing relating to address conversion. The componentsmaking up the ATM exchange 10133-6 are the same as the description givenregarding the ATM exchange 10133-5. In FIGS. 27 and 28, the accesscontrol apparatus 1010-5 and the access control apparatus 1010-7 areconnected to the ATM exchange 10133-5 via the communication line 1810-5and communication line 1810-7, respectively, and also, the accesscontrol apparatus 1010-6 and the access control apparatus 1010-8 areconnected to the ATM exchange 10133-6 via the communication line 1810-6and communication line 1810-8, respectively. An ATM address “3977”unique to the network is set to the conversion unit 1033-5 within theATM exchange 10133-5, and an ATM address “3999” unique to the network isset to the conversion unit 1033-6 within the ATM exchange 10133-6. TheATM exchange 10133-5 and the ATM exchange 10133-6 are connected via theATM exchange 10133-7 in the present embodiment.

[0225] (3) Flow of Packets using SVC:

[0226] An embodiment wherein SVC is applied as a communication pathwithin the ATM network will be described with an example of an ICS userpacket sent from a terminal of a corporation X toward a terminal of acorporation Y, with reference to FIGS. 27 and 28.

[0227] <<Preparation>>

[0228] A receiving ICS network address indicating the destination of theICS network packet, a receiving ATM address for indicating the otherparty for call setting of the virtual channel on the ATM network, andchannel capabilities such as communication speed requested by thevirtual channel, are registered in the ATM address conversion table1533-5. Also, similar registration is made to the ATM address conversiontable 1533-6. In the embodiment, the values set in the ATM addressconversion table 1533-5 are as follows: “9922” which is the ICS networkaddress appropriated to the ICS logic terminal of the access controlapparatus 1010-6 is set as the communication address of the corporationY, and the ATM address “3999” which is uniquely appropriated to theconversion unit 1033-6 within the ATM network is registered as thereceiving ATM address. In the present embodiment, a communication speedof 64 Kbps is set as the channel capabilities. The contents registeredto the ATM address conversion table 1533-5 are also written to the ATMaddress administration server 1633-5.

[0229] The values set in the ATM address conversion table 1533-6 are asfollows: “7711” which is the ICS network address appropriated to the ICSlogic terminal of the access control apparatus 1010-5 is set as thecommunication address of the corporation X, and the ATM address “3977”which is uniquely appropriated in the ATM network to the conversion unit1033-5 within the ATM exchange 10133-5 to which the access controlapparatus 1010-5 is connected is registered as the receiving ATMaddress. In the present embodiment, a communication speed of 64 Kbps isset as the channel capabilities. The contents registered to the ATMaddress conversion table 1533-6 are also written to the ATM addressadministration server 1633-6.

[0230] <<Transferring ICS Network Packets from the Access ControlApparatus>>

[0231] As described in Embodiment-1, the ICS user packets sent from aterminal of the corporation X toward the terminal of the corporation Yconnected to the access control apparatus 1010-6 via the access controlapparatus 1010-5 is encapsulated upon passing through the access controlapparatus 1010-5, and becomes an ICS network packet F1 having thetransmitting ICS network address “7711” and the receiving ICS networkaddress “9922” as an ICS packet header. The ICS network packet F1 issent from the access control apparatus 1010-5 to the ATM exchange10133-5, and reaches the conversion unit 1033-5. The following is adescription thereof made with reference to FIG. 31.

[0232] <<Obtaining a Virtual Channel ID>>

[0233] Once the conversion unit 1033-5 receives the ICS network packetF1(Step S1601), there is the need to request a virtual channel ID of theSVC virtual channel determined by the relation of the transmitting ICSnetwork address “7711” and the receiving ICS network address “9922” inthe ICS packet header, in order to correctly transfer the receivedpacket F1 to the ATM exchange 10133-5. In the case that thecommunication is based on the SVC, there are cases that the virtualchannel corresponding with the communication path is established at thetime of the receiving the ICS network packet, and cases in which thevirtual channel has not yet been established. In order to find outwhether or not the virtual channel has been established, the processingdevice 1233-5 first searches whether or not a virtual channelcorresponding with the pair of a transmitting ICS network address “7711”and a receiving ICS network address “9922” is registered in the VCaddress conversion table 1433-5 (Step S1602), and in the event thatthere is registration here, establishment of the virtual channel can bethus confirmed. That is, the fact that the virtual channel correspondingwith the pair of transmitting ICS network address “7711” and receivingICS network address “9922” is “33” is obtained, and further, it can befound that this virtual channel is communicating based on the SVC, fromthe value “11” of the channel type obtained at the same time. In theevent that there is no such registration on the VC address conversiontable 1433-5, the requested virtual channel is established with thelatter-described <<call setting>>, and the virtual channel ID isobtained from the information registered to the VC address conversiontable 1433-5 at that point (Step S1603).

[0234] <<Call Setting>>

[0235] Regarding the above-mentioned case wherein “there is noregistration of a virtual channel ID corresponding with a communicationpath determined by correspondence between a transmitting ICS networkaddress and a receiving ICS network address on the VC address conversiontable 1433-5”, i.e., in the case that there is no virtual channel IDcorresponding with the communication path established yet, it becomesnecessary to perform the following call setting, to establish a virtualchannel within the ATM network comprising ICS 905. An example ofoperation of the call setting will now be described.

[0236] The processing device 1233-5 of the conversion unit 1033-5, uponmaking reference to the VC address conversion table 1433-5 and findingthat there is no registration of a virtual channel ID corresponding withthe pair of transmitting ICS network address “7711” and receiving ICSnetwork address “9922” (Step S1602), the processing device 1233-5 of theconversion unit 1033-5 refers to the VC address conversion table 1533-5,finds the receiving ICS network address “9922” registered in the VCaddress conversion table 1533-5 matching the receiving ICS networkaddress “9922”, and obtains transmitting ATM address “3999”corresponding thereto and channel capabilities “64K” correspondingthereto, and so forth. The processing device 1233-5 uses the obtainedtransmitting ATM address “3999” to perform a request for call setting tothe ATM exchange 10133-5, and also requested at this time is channelcapabilities such as communication speed of the virtual channelsimultaneously obtained from the VC address conversion table 1533-5 andso forth. The ATM exchange 10133-5, upon receiving the call settingrequest, uses a signal method which is provided standard to ATMexchanges proper as known technique to establish a virtual channelwithin the ATM network which reaches the ATM exchange 10133-6 (StepS1606). The virtual channel ID appropriated for identification of thevirtual channel is notified from the ATM exchanges to conversion units1033-5 and 1033-6 therein, but in the event that this is based onstipulations of a signal method according to known technique, the valuenotified from the calling party ATM exchange 10133-5 (e.g., “33”) andthe value notified from the receiving party ATM exchange 10133-6(e.g.,“44”) may not be the same value. At the conversion unit 1033-5, thevirtual channel ID “33” which is notified from the ATM exchange 10133-5is registered in the VC address conversion table 1433-5 along with thetransmitting ICS network address “7711” and the receiving ICS networkaddress “9922” (Step S1607), and stores these on the VC addressconversion table 1433-5 while the connection of this virtual channel isestablished. When the virtual channel connection is no longer necessary,the conversion unit 1033-5 requests call release of the virtual channelto the ATM exchange 10133-5, and at the same time deletes theregistration corresponding with virtual channel ID “33” on the VCaddress conversion table 1433-5. Registration to the VC addressconversion table 1433-6 in the conversion unit 1033-6 will be describedlater.

[0237] <<Packet Transfer>>

[0238] The processing device 1233-5 of the conversion unit 1033-5converts the ICS network packet F1 received from the access controlapparatus 1010-5 into a CPCS frame shown in FIG. 25 according to thevirtual channel (virtual channel ID “33”) established according to theabove description, and further performs degradation into ATM cells asshown in FIG. 26 and transfers to the relay ATM exchange 10133-7(StepS1604).

[0239] <<Transfer of ATM Cells>>

[0240] According to the above-described method, the ATM cell series S1comprised of a plurality of cells obtained by converting the ICS networkpacket F1 is transferred from the ATM exchange 10133-5 to the relay ATMexchange 10133-7, and further is transferred to the ATM exchange 10133-6as ATM cell series S2. The following is a description thereof withreference to the flowchart in FIG. 32.

[0241] <<Operation Following Arrival of Packet>>

[0242] Once the ATM cell series S2 reaches the ATM exchange 10133-6(Step S1610), this ATM cell series S2 is transferred from the ATMexchange 10133-6 to the conversion unit 1033-6. At the conversion unit1033-6 as shown in FIG. 26, the received ATM cells are assembled into aCPCS frame, and further, as shown in FIG. 25, an ICS network packet isrestored from the CPCS frame (Step S1611). In FIG. 28, the restored ICSnetwork packet is shown as ICS network packet F2, but the contentsthereof are identical to that of the ICS network packet F1. The ICSnetwork packet F2 is transferred to an access control apparatusdetermined by the receiving ICS network address “9922” in the headerthereof, i.e., to access control apparatus 1010-6 which has an ICS logicterminal appropriated with ICS network address “9922” (Step S1612).

[0243] At this time, at the conversion unit 1033-6, the transmitting ICSnetwork address “7711”, the receiving ICS network address “9922”, thechannel type “11” indicating the fact this is SVC identified at thepoint of receiving the call, and the virtual channel ID “44”appropriated at the time of call setting of the SVC virtual channel areregistered in the VC address conversion table 1433-6 (Step S1614), andat this time, the transmitting ICS network address “7711” of the ICSnetwork packet F2 is written to the receiving ICS network address of theVC address conversion table 1433-6, and the receiving ICS networkaddress “9922” is written to the transmitting ICS network address of theVC address conversion table 1433-6, i.e., these are written in reversepositions. However, if at the point of registration an item alreadyexists within the VC address conversion table 1433-6 identical to thatregarding which registration is being attempted, no registration ismade. The address conversion information registered in the VC addressconversion table 1433-6 is stored on the VC address conversion table1433-5 while the connection of the virtual channel having acorresponding virtual channel (in this example, virtual channel ID “44”)is established (Step S1613).

[0244] <<Reverse Packet Flow>>

[0245] Now, description of the case of reverse flow of the ICS packet,i.e., flow from a corporation Y to a corporation X, will be made withreference to FIGS. 27 and 28, under the presumption that call setting ofthe SVC virtual channel has been made according to the abovedescription. An ICS user packet sent out from the corporation Y to thecorporation X is converted into an ICS network packet F3 having thetransmitting ICS network address “9922” and the receiving ICS networkaddress “7711” in the header portion thereof, and the processingfollowing the flow shown in FIG. 31 as described above is performed bythe processing device 1233-6 of the conversion unit 1033-6 within theATM exchange 10133-6.

[0246] In this case, the VC address conversion table 1433-6 in theconversion unit 1033-6 has registered therein a virtual channel ID “44”with a channel type “11” which means SVC, corresponding with thetransmitting ICS network address “9922” and receiving ICS networkaddress “7711”, so the system operates following the flow(1) shown inFIG. 31, thereby converting the ICS network packet F3 into a pluralityof ATM cells (ATM series S3) and transferring, with regard to thevirtual channel ID “44”. The ICS network packet F3 is relayed andtransferred by the relay ATM exchange 10133-7, becomes ATM series S4 andreaches the ATM exchange 10133-5. The ATM series S4 is received via thevirtual channel having virtual channel ID “33” in the conversion unit1033-5 thereof, and restored into an ICS network packet F4 havingidentical contents with the ICS network packet F3. In the conversionunit 1033-5, the pair of the transmitting ICS network address “9922” andthe receiving ICS network address “7711” in the header of the ICSnetwork packet F4 is already registered in the VC address conversiontable 1433-5 in reverse fashion, so registration to the VC addressconversion table is not performed, and the ICS network packet F4 istransferred to the access control apparatus 1010-5.

[0247] <<Example of Application to Half-Duplex Communication>>

[0248] The above description has been made with reference to caseswherein an ICS packet is transferred from the corporation X to thecorporation Y, and reverse from the corporation Y to the corporation X,with a network within the ICS 905 having been configured of an ATMnetwork, being carried out with a single SVC virtual channel. Forexample, applying this transfer and reverse transfer to a request packetto a server terminal of the corporation Y to be connected to the ICSfrom a client terminal of the corporation X to be connected to the ICS(transfer), and a response packet to this request packet from the clientterminal of the corporation X to server terminal of the corporation Y(reverse transfer) results in an application example of half-duplexcommunication in which one-way communication is performed at times, andboth-way communication is realized by switching the communicationdirection by time frames.

[0249] <<Example of Application to Full-Duplex Communication>>

[0250] The virtual channel set on the ATM network is capable offull-duplex communication, i.e., simultaneous both-way communication,due to the ATM stipulations. For example, applying the transfer andreverse transfer to request packets to a plurality of server terminalsof the corporation Y to be connected to the ICS from a plurality ofclient terminals of the corporation X to be connected to the ICS(transfer), and response packets to the request packets from theplurality of client terminals of the corporation X to the plurality ofserver terminals of the corporation Y (reverse transfer) results inasynchronous transfer of packets between the client terminals and theserver terminals, so simultaneous both-way communication is conducted onthe single SVC virtual channel serving as the communication path,thereby making for an application example of full-duplex communication.

[0251] (4) Flow of Packets using PVC

[0252] An embodiment wherein the network within the ICS 906 isconfigured with an ATM network and PVC is applied as a communicationpath within the ATM network will be described with an example of an ICSuser packet sent from a terminal of a corporation W toward a terminal ofa corporation Z, with reference to FIGS. 27 and 28.

[0253] <<Preparation>>

[0254] A transmitting ICS network address, a receiving ICS address, thevirtual channel ID of the PVC fixed on the ATM network (indicating thecommunication path between the ATM exchange 10133-5 and the ATM exchange10133-6), and the channel type indicating that the virtual channel ID isPVC, are registered in the VC address conversion table 1433-5. Thisregistration is different from the case of SVC, in that registration ismade in the VC address conversion table 1433-5 at the same time that thePVC virtual channel is set in the ATM exchanges (10133-5, 10133-7,10133-6) serving as the communication path, and is saved in a fixedmanner while the communication path is necessary, i.e., until thesetting of the PVC virtual channel is canceled. Also, the registrationis made to the VC address conversion table 1433-6 in the same manner.Incidentally, the PVC virtual channel ID is appropriated to therespective ATM exchanges at the time that PVC is fixedly connectedbetween the ATM exchanges.

[0255] The values set in the VC address conversion table 1433-5 are asfollows: value “7733” which is the transmitting ICS network addressappropriated to the ICS logic terminal of the access control apparatus1010-7 is set as the communication address of the corporation W, andvalue “9944” which is the receiving ICS network address appropriated tothe ICS logic terminal of the access control apparatus 1010-8 is set asthe communication address of the corporation Z. Further, the PVC virtualchannel ID “55” which is appropriated to the ATM exchange 10133-5 is setas the virtual channel ID, and value “22” is set as the channel type,indicating the PVC. Also, settings for registering to the VC addressconversion table 1433-5 are written to the PVC address administrationserver 1733-5, and stored.

[0256] In the same way, similar settings are made in the VC addressconversion table 1433-6 in the conversion unit 1033-6 in the ATMexchange 10133-6, with the transmitting ICS network address and thereceiving ICS network address reversed. In this case, even if the samePVC is being implied, the virtual channel ID stored in conversion table1433-6 may be of a different value than the VC address stored inconversion table 1433-5. When the registering to VC address conversiontable 1433-6 in this instance, this is also written to and stored in thePVC address administration server 1733-6.

[0257] The values set in the VC address conversion table 1433-6 are asfollows: value “9944” which is the transmitting ICS network addressappropriated to the ICS logic terminal of the access control apparatus1010-8 is set as the communication address of the corporation Z, andvalue “7733” which is the receiving ICS network address appropriated tothe ICS logic terminal of the access control apparatus 1010-7 is set asthe communication address of the corporation W. Further, the PVC virtualchannel ID “66” which is appropriated to the ATM exchange 10133-6 is setas the virtual channel ID, and value “22” is set as the channel type,indicating PVC.

[0258] <<Transferring ICS Network Packets from Access ControlApparatus>>

[0259] The ICS user packet sent toward the terminal of the corporation Zconnected to the access control apparatus 1010-8 via the access controlapparatus 1010-7 is ICS-encapsulated upon passing through the accesscontrol apparatus 1010-7, and becomes an ICS network packet F5 havingthe transmitting ICS network address “7733” and the receiving ICSnetwork address “9944” as an ICS packet header. The ICS network packetF5 is sent from the access control apparatus 1010-7 to the ATM exchange10133-5, and reaches the conversion unit 1033-5 via the interface unit1133-5.

[0260] <<Obtaining a Virtual Channel ID>>

[0261] The processing device 1233-5 refers to the VC address conversiontable 1433-5 using the transmitting ICS network address “7733” and thereceiving ICS network address “9944” in the header of the received ICSnetwork packet F5, and obtains the fact that the virtual channel IDidentifying the virtual channel set between the conversion units 1033-5and 1033-6 inside the ATM exchange 10133-6 connected to the accesscontrol apparatus 1010-8 with the ICS logic terminal provided with areceiving ICS network address “9944” is “55”. At the same time, it canbe found that the virtual channel is PVC, from the value “22” of thechannel type obtained.

[0262] <<Transfer of Packets>>

[0263] The processing device 1233-5 converts the ICS network packet F5received from the access control apparatus 1010-7 into an ATM cellseries, and transfers this to the ATM exchange 10133-7, with regard tothe PVC virtual channel “55” obtained as described above. The method ofATM cell conversion is the same as that described above in theembodiment of SVC. The above processing procedures of the conversionunit 1033-5 are as shown in FIG. 31, and PVC always follows the flow(1).

[0264] <<Transfer of ATM Cells>>

[0265] The ATM cell series S1 comprised of a plurality of cells obtainedby converting the ICS network packet F5 is transferred from the ATMexchange 10133-5 to the relay ATM exchange 10133-7, and further istransferred to the ATM exchange 10133-6 as ATM cell series S2. Thisoperation is the same as with SVC.

[0266] <<Operation Following Arrival of Packet>>

[0267] Once the ATM cell series S2 reaches the ATM exchange 10133-6,this ATM cell series S2 is transferred from the ATM exchange 10133-6 tothe conversion unit 1033-6 within the ATM exchange 10133-6. Theconversion unit 1033-6 assembles the received ATM cells into a CPCSframe, which is the same as with SVC. In FIG. 28, the restored ICSnetwork packet is shown as an ICS network packet F6, but the contentsthereof are identical to that of the ICS network packet F5. The ICSnetwork packet F6 is transferred to an access control apparatusdetermined by the receiving ICS network address “9944” in the headerthereof, i.e., to access control device 1010-8 which has an ICS logicterminal appropriated with ICS network address “9944”. The aboveprocessing procedures of the conversion unit 1033-6 are as shown in FIG.32, and PVC always follows the flow (1).

[0268] <<Reverse Packet Flow>>

[0269] Next, description of the case of reverse flow of the ICS packet,i.e., flow from the corporation Z to the corporation W, will be madewith reference to FIGS. 27 and 28, in the same manner as above. An ICSuser packet sent out from the corporation Z to the corporation W isICS-encapsulated into an ICS network packet F7 having the transmittingICS network address “9944” and the receiving ICS network address “7733”in the header portion thereof, and the processing following the flowshown in FIG. 31 as described above is performed by the processingdevice 1233-6 of the conversion unit 1033-6 within the ATM exchange10133-6. In this case, the VC address conversion table 1433-6 in theconversion unit 1033-6 has registered therein a virtual channel ID “66”corresponding with a transmitting ICS network address “9944” and areceiving ICS network address “7733”, so the system converts the ICSnetwork packet F7 into a plurality of ATM cell series and transfers,with regard to the virtual channel ID “66”.

[0270] The ATM cell series transferred through the ATM network reach theconverting unit 1033-5 of the ATM exchange 10133-5, are received via thevirtual channel having virtual channel ID “55”, and restored into an ICSnetwork packet F8 having identical contents with the ICS network frameF7. However, in the conversion unit 1033-5, the pair of the transmittingICS network address “9944” and the receiving ICS network address “7733”in the header of the ICS network packet F4 is already registered in theVC address conversion table 1433-5 in reverse fashion, and informationthat the virtual channel ID “55” as to this transmitting/receivingaddress pair is channel type “22” is obtained, so registration to the VCaddress conversion table is not performed, and the ICS network packet F8is transferred to the access control apparatus 1010-7.

[0271] <<Example of Application to Half-Duplex Communication>>

[0272] The above description has been made with reference to anembodiment of transferring an ICS packet using PVC with a network withinICS 905 having been configured of an ATM network, but the differencebetween the PVC and the SVC is whether the virtual channel is fixed orcalled and set as necessary, so there is no difference in the operationitself of transferring packets over the set virtual channel.Accordingly, regarding the ICS according to the present invention, anexample of application to half-duplex communication using an ATM networkPVC virtual channel is the same as an example of application tohalf-duplex communication using a SVC network PVC virtual channel.

[0273] <<Example of Application to Full-Duplex Communication>>

[0274] The example of application of PVC full-duplex communication isequivalent to the example of application of full-duplex communication inSVC, due to the same reason as the example of application to half-duplexcommunication.

[0275] (5) One-On-N or N-On-One Communication Using PVC

[0276] In the above example, an embodiment was described wherein onevirtual channel was described as a communication path connecting onecorporation (location) with one corporation (location), i.e., acommunication path connecting one ICS logic terminal with one ICS logicterminal, but one PVC virtual channel can be used as a communicationpath connecting one ICS logic terminal with a plurality of ICS logicterminals. Such One-on-N or N-on-one communication will be describedwith reference to FIGS. 33 and 34.

[0277] <<Description of Components>>

[0278] In FIGS. 33 and 34, regarding the access control apparatus1010-10, the corporation X is connected to an ATM exchange 10133-10 withan ICS logic terminal within the access control apparatus 1010-10provided with the ICS network address “7711”. With the parties to bereached from the corporation X as the corporations A through D, thecorporation A is connected to an ICS logic terminal within the accesscontrol apparatus 1010-20 provided with the ICS network address “9922”,and the corporation B is connected to an ICS logic terminal within theaccess control apparatus 1010-20 provided with the ICS network address“9923”. In the same manner, the corporation C is connected to an ICSlogic terminal within the access control apparatus 1010-40 provided withthe ICS network address “9944”, and the corporation D is connected to anICS logic terminal within the access control apparatus 1010-40 providedwith the ICS network address “9955”. The access control apparatuses1010-20 and 1010-40 are connected to the ATM exchange 10133-20, and theATM exchanges 10133-10 and 10133-20 are connected via a relay network.

[0279] <<Preparation>>

[0280] With regard to the ATM exchanges 10133-10 and 10133-20, a singlePVC virtual channel connecting the conversion unit 1033-10 within theATM exchange 10133-10 and the conversion unit 1033-20 within the ATMexchange 10133-20, setting “33” as the virtual channel ID provided tothe conversion unit 1033-10 of the virtual channel, and “44” as thevirtual channel ID provided to the conversion unit 1033-20 of thevirtual channel. Registration such as shown in FIGS. 33 and 34 isperformed regarding the VC address conversion table 1433-10 within theconversion unit 1033-10 and the VC address conversion table 1433-20within the conversion unit 1033-20.

[0281] <<Packet Flow for One-On-N Communication>>

[0282] The flow of packets for one-on-N communication will be describedconcerning packets sent from the corporation X to each of thecorporations A through D. An ICS network packet sent from thecorporation X toward the corporation A, having a transmitting ICSnetwork address “7711” and a receiving network address “9922”, istransferred to the PVC virtual channel with a virtual channel ID “33”,by means of making reference to the VC address conversion table 1433-10in the conversion unit 1033-10. An ICS network packet sent from thecorporation X toward the corporation B, having a transmitting ICSnetwork address “7711” and a receiving network address “9933”, is alsotransferred to the PVC virtual channel with a virtual channel ID “33”.An ICS network packet sent from the corporation X toward the corporationC, having a transmitting ICS network address “7711” and a receivingnetwork address “9944”, and an ICS network packet sent from thecorporation X toward the corporation D, having a transmitting ICSnetwork address “7711” and a receiving network address “9955” aretransferred to the PVC virtual channel with a virtual channel ID “33” inthe same manner. This indicates that one-on-N (corporation X tocorporations A through D) communication is being performed while sharinga single PVC virtual channel. Reverse packet flow, i.e., transfer fromthe corporations A through D to the corporation X, will be described inthe next section.

[0283] <<Packet Flow for N-On-One Communication>>

[0284] The flow of packets for N-on-one communication will be describedconcerning packets sent to the corporation X from each of thecorporations A through D. An ICS network packet sent toward thecorporation X from the corporation A, having a transmitting ICS networkaddress “9922” and a receiving network address “7711”, is transferred tothe PVC virtual channel with a virtual channel ID “44”, by means ofmaking reference to the VC address conversion table 1433-20 in theconversion unit 1033-20. An ICS network packet sent toward thecorporation X from the corporation B, having a transmitting ICS networkaddress “9933” and a receiving network address “7711”, is alsotransferred to the PVC virtual channel with a virtual channel ID “44”.An ICS network packet sent toward the corporation X from the corporationC, having a transmitting ICS network address “9944” and a receivingnetwork address “7711”, and an ICS network packet sent toward thecorporation X from the corporation D, having a transmitting ICS networkaddress “9955” and a receiving network address “7711” are transferred tothe PVC virtual channel with a virtual channel ID “44” in the samemanner. This indicates that N-on-one (corporations A through D tocorporation X) communication is being performed while sharing a singlePVC virtual channel.

[0285] (6) N-On-N Communication using PVC

[0286] Using the same method as one-on-N communication, one PVC virtualchannel can be used as a communication path connecting a plurality ofICS logic terminals with a plurality of ICS logic terminals. Such N-on-Ncommunication will be described with reference to FIGS. 35 and 36.

[0287] <<Description of Components>>

[0288] The corporation X has ICS logic terminal address “7711” of theaccess control apparatus 1010-11 as the contact point thereof, thecorporation Y has ICS logic terminal address “7722” of the accesscontrol apparatus 1010-11 as the contact point thereof, and the accesscontrol apparatus 1010-11 is connected to the ATM exchange 10133-11.With the other party which the corporation X or corporation Y isattempting to reach as the corporation A or corporation C. Thecorporation A has ICS logic terminal address “9922” of the accesscontrol apparatus 1010-21 as the contact point thereof, the corporationY has ICS logic terminal address “9944” of the access control apparatus1010-41 as the contact point thereof. The access control apparatuses1010-21 and 1010-41 are connected to the ATM exchange 10133-21, and theATM exchanges 10133-11 and 10133-21 are connected via a relay network.

[0289] <<Preparation>>

[0290] With regard to the ATM exchanges 10133-11 and 10133-21, a singlePVC virtual channel connects the conversion unit 1033-11 within the ATMexchange 10133-11 and the conversion unit 1033-21 within the ATMexchange 10133-21, setting “33” as the virtual channel ID provided tothe conversion unit 1033-11 of the virtual channel, and “44” as thevirtual channel ID provided to the conversion unit 1033-21 of thevirtual channel. Registration such as shown in FIGS. 35 and 36 isperformed regarding the VC address conversion table 1433-11 within theconversion unit 1033-11 and the VC address conversion table 1433-21within the conversion unit 1033-21.

[0291] <<Packet Flow for N-On-N Communication>>

[0292] The flow of packets for N-on-N communication will first bedescribed concerning packets sent from the corporation X to each of thecorporations A and C. An ICS network packet sent from the corporation Xtoward the corporation A, having a transmitting ICS network address“7711” and a receiving network address “9922”, is transferred to the PVCvirtual channel with a virtual channel ID “33”, by means of makingreference to the VC address conversion table 1433-11 in the conversionunit 1033-11. An ICS network packet sent from the corporation X towardthe corporation C, having a transmitting ICS network address “7711” anda receiving network address “9944”, is also transferred to the PVCvirtual channel with a virtual channel ID “33”. Next, the flow ofpackets will be described concerning packets sent from the corporation Yto each of the corporations A and C. An ICS network packet sent from thecorporation Y toward the corporation A, having a transmitting ICSnetwork address “7722” and a receiving network address “9922”, istransferred to the PVC virtual channel with a virtual channel ID “33”,by means of making reference to the VC address conversion table 1433-11in the conversion unit 1033-11. An ICS network packet sent from thecorporation Y toward the corporation C, having a transmitting ICSnetwork address “7722” and a receiving network address “9944”, is alsotransferred to the PVC virtual channel with a virtual channel ID “33”.

[0293] Next, reverse packet flow will be described concerning packetssent to each of the corporations X and Y from the corporation A. An ICSnetwork packet sent toward the corporation X from the corporation A,having a transmitting ICS network address “9922” and a receiving networkaddress “7711”, is transferred to the PVC virtual channel with a virtualchannel ID “44”, by means of making reference to the VC addressconversion table 1433-21 in the conversion unit 1033-21. An ICS networkpacket sent toward the corporation Y from the corporation A, having atransmitting ICS network address “9922” and a receiving network address“7722”, is also transferred to the PVC virtual channel with a virtualchannel ID “44”, by means of making reference to the VC addressconversion table 1433-21 in the conversion unit 1033-21. An ICS networkpacket sent toward the corporation X from the corporation C, having atransmitting ICS network address “9944” and a receiving network address“7711”, is transferred to the PVC virtual channel with a virtual channelID “44”. An ICS network packet sent toward the corporation Y from thecorporation C, having a transmitting ICS network address “9944” and areceiving network address “7722”, is also transferred to the PVC virtualchannel with a virtual channel ID “44”. Thus, N-on-N communication isperformed while sharing a single PVC virtual channel.

Embodiment-4 (Embodiment using an FR Network)

[0294] An embodiment will be described wherein the network inside theICS according to the present invention is configured using an FRnetwork. The present embodiment will be described in the followingorder: (1) supplementary explanation of FR-related conventional art, (2)description of components, (3) flow of packets using SVC, (4) flow ofpackets using PVC, (5) one-on-N or N-on-one communication using PVC, and(6) N-on-N communication using PVC. With the present embodiment, twotypes of methods using SVC or PVC may be used separately, or these maybe used in conjunction. Description will be given regarding each of thecases of using SVC and PVC. Also, intra-corporation communicationservice and inter-corporation communication service described inEmbodiment-1, and virtual dedicated line service described inEmbodiment-2, can both be realized with the access control apparatusaccording to the present invention, so there is no need to considerthese separately regarding network packet communication with the networkwithin the ICS. Rather, in the present embodiment, these communicationservices will be described integrally.

[0295] (1) Supplementary Explanation of FR-Related Conventional Art:

[0296] First, supplementary explanation will be made regardingFR-related conventional art to the extent that is necessary to describethe present embodiment.

[0297] A frame relay consists of using communication information unitscalled packets with variable lengths to perform communication and tospecify the communication path for each packet. This is a conventionalart which has been standardized in the ITU.TI.233 Recommendations and soforth which have realized accumulated exchange of packets within acircuit network, and also logic multiplexing (a technique formultiplexing a single physical line into a plurality of logic lines).The service using the above technique is referred to as Frame ModeBearer Service (hereafter referred to as “FMBS”), and stipulated forFMBS are: the Frame Switch Bearer Service (hereafter referred to as“FSBS”) wherein the other party to which connection is to be made isselected (SVC); and the Frame Relay Bearer Service (hereafter referredto as “FRBS”) wherein the other party to which connection is to be madeis fixed (PVC). The term “Frame Relay” generally only indicates FRBS(“Frame Relay” in the narrow sense) at times, but with the presentinvention, “Frame Relay” is used as a term indicating all FMBS includingFSBS and FRBS. In the event that only FSBS is to be specificallyindicated, the term “frame relay using SVC” will be used, and in theevent that only FRBS is to be specifically indicated, the term “framerelay using PVC” will be used. Hereafter, the above-defined “frame relayin the wide sense (FMBS)” will be referred to as FR, and packetstransferred over an FR network will be called “FR packets” in order todistinguish these from ICS packets.

[0298] As described earlier, with an FR network, a plurality of logiclines can be set on a physical line, these logic lines being referred toas logic channels. Identifiers appropriated to FR terminals connectingto both ends of the logic channels (an overall reference tocommunication equipment connected to the FR network and communicatingusing the FR network) in order to identify the logic channels are calledData Link Connection Identifiers (hereafter referred to as “DLCI”). SVCand PVC are stipulated to logic channels, depending on the way ofsetting. SVC performs call setting of the logic channel when necessary,and is capable of obtaining a logic line with any FR terminal for anecessary duration, at a necessary speed. Call setting of the logicchannel is performed by the FR terminal attempting to initiatecommunication, the method thereof being standardized in ITU-T. Callsetting requires an address for identifying the FR terminal of the otherparty to which the call is to be set (hereafter referred to as “FRaddress”), the FR addresses being systematized so as to be unique in theFR network, thereby enabling identification of each FR terminal. PVC isfor fixedly setting a call setting to the FR exchange, and can be viewedas a virtual dedicated line from the point of the FR terminal.

[0299] Regarding the established logic channels, DLCIs (Data LinkConnection Identifiers) for identifying logic channels are appropriatefor both SVC and PVC, and in the event of transferring an FR packet, theDLCI is set at the DLCI bit portion on the FR packet address portionshown in FIG. 37. There are three formats stipulated for the FR packetaddress portion, FIG. 37 showing the 2-byte format which is one ofthese. Logic channel capabilities (channel capabilities) of the FRnetwork include: Committed Information Rate (hereafter referred to as“CIR”) which is the information transfer speed guaranteed at a normalstate (a state wherein there is no congestion) of the FR network.

[0300] There is the necessity to convert ICS network packets into FRpackets in order to send such communication packets over an FR network,as shown in FIG. 38. Reception of an FR packet results in reverseconversion, consisting of extracting and reproducing the communicationpacket (ICS network packet) from the FR packet as shown in FIG. 38.Conversion of this FR packet has been standardized following the ITU-TRecommendations. Also, protocol headers within the FR packet userinformation have been standardized in RFC1490 of IETF.

[0301] (2) Description of Components

[0302]FIGS. 39 and 40 show a forth embodiment of the present invention.In the present embodiment, the internal configuration of the accesscontrol apparatus and the operation of the processing device within theaccess control apparatus are basically the same in principle as thedescription given in Embodiment-1.

[0303] Appropriated to the access control apparatus 1010-5 are ICSnetwork addresses “7711” and “7722”, serving as connection points (ICSlogic terminals) for the corporations X and A which are the users of theICS 925. Also appropriated to the access control apparatus 1010-7 areICS network addresses “7733” and “7744”, serving as connection pointsfor the corporations W and C, similarly. Appropriated to the accesscontrol apparatus 1010-6 are ICS network addresses “9922” and “9933”,serving as connection points for the corporations Y and B, and similarlyappropriated to the access control apparatus 1010-8 are ICS networkaddresses “9944” and “9955”, serving as connection points for thecorporations Z and D. Here, in the embodiment shown in FIGS. 39 and 40,etc., the corporations X, Y and so forth, which are given as examples ofusers, may be differing locations within a single corporation whichperforms the intra-corporation communication, or may be differentcorporations which perform the inter-corporation communication.

[0304] An interface unit 1132-5 is provided in the conversion unit1032-5 within the FR exchange 10132-5, this interface unit 1132-5handling the processing of rectifying interfacing of the communicationline 1812-5 connecting the access control apparatus 1010-5 and the FRexchange 10132-5, and the communication line 1812-7 connecting theaccess control apparatus 1010-7 and the FR exchange 10132-5 (physicallayers, data link layer protocol). The conversion unit 1032-5 iscomprised of a processing device 1232-5, and also an FR addressconversion table 1532-5 for call setting with SVC, and a DLC addressconversion table 1432-5 for converting addresses from ICS networkaddresses used by both SVC and PVC to logic channel. Also, the FRexchange 10132-5 connects the FR address administration server 1632-5serving as an information processing device for storing the FR addressconversion table with, in the case of using PVC, the DLC addressadministration server 1732-5 serving as an information processing devicefor storing the DLC address conversion table, thereby performing aninformation processing relating to address conversion. The componentsmaking up the FR exchange 10132-6 are the same as the description givenregarding the FR exchange 10132-5. In the present embodiment, the accesscontrol apparatuses 1010-5 and 1010-7 are connected to the FR exchange10132-5 via the communication lines 1812-5 and 1812-7, respectively, andalso, the access control apparatuses 1010-6 and 1010-8 are connected tothe FR exchange 10132-6 via the communication lines 1812-6 and 1812-8,respectively. An FR address “2977” unique to the network is set to theconversion unit 1032-5 within the FR exchange 10132-5, and an FR address“2999” unique to the network is set to the conversion unit 1032-6 withinthe FR exchange 10132-6. The FR exchanges 10132-5 and 10132-6 areconnected via the FR relay network, but in the present embodiment,connecting is made via the FR exchange 10132-7 representing the FR relaynetwork.

[0305] (3) Flow of Packets using SVC

[0306] An embodiment wherein the network within an ICS is configured ofan FR network, and SVC is applied as a communication path within the FRnetwork, will be described with an example of an ICS user packet sentfrom a terminal of the corporation X toward a terminal of thecorporation Y, with reference to FIGS. 39 and 40.

[0307] <<Preparation>>

[0308] A receiving ICS network address indicating the destination of theICS network packet to be transferred from the conversion unit 1032-5 tothe FR network, a receiving FR address for indicating the other partyfor call setting of the logic channel on the FR network, and channelcapabilities such as communication speed requested by the logic channel,are registered in the FR address conversion table 1532-5 within theconversion unit 1032-5 inside the FR exchange 10132-5. Also, similarregistration is made to the FR address conversion table 1532-6.

[0309] In the embodiment, the values set in the FR address conversiontable 1532-5 are as follows: “9922” which is the ICS network addressappropriated to the ICS logic terminal of the access control apparatus1010-6 is set as the communication address of the corporation Y, and theFR address “2999” which is uniquely appropriated to the conversion unit1032-6 within the FR network is registered as the receiving FR address.In the present embodiment, a communication speed of 64 Kbps is set asthe channel capabilities. The contents registered to the FR addressconversion table 1532-5 are also written to the FR addressadministration server 1632-5.

[0310] The values set in the FR address conversion table 1532-6 are asfollows: value “7711” which is the ICS network address appropriated tothe ICS logic terminal of the access control apparatus 1010-5 is set asthe communication address of the corporation X, and the FR address“2977” which is uniquely appropriated in the FR network to theconversion unit 1032-5 within the FR exchange 10132-5 to which theaccess control apparatus 1010-5 is connected is registered as thereceiving FR address. In the present embodiment, a communication speedof 64 Kbps is set as the channel capabilities. The contents registeredto the FR address conversion table 1532-6 are also written to the FRaddress administration server 1632-6.

[0311] <<Transferring ICS Network Packets from Access ControlApparatus>>

[0312] The ICS user packet sent toward the terminal of the corporation Yconnected to the access control apparatus 1010-6 via the access controlapparatus 1010-5 is ICS-encapsulated upon passing through the accesscontrol apparatus 1010-5, and becomes an ICS network packet F1 havingthe transmitting ICS network address “7711” and the receiving ICSnetwork address “9922” as an ICS packet header. The ICS network packetF1 is sent from the access control apparatus 1010-5 to the FR exchange10132-5, and reaches the conversion unit 1032-5 via an interface unit1132-5 which processes conversion/rectifying of electric signals in thecommunication path. The following is a description thereof made withreference to the flowchart in FIG. 43.

[0313] <<Obtaining a DLCI>>

[0314] Once the conversion unit 1032-5 receives the ICS network packetF1(Step S1701), there is the need to request a DLCI of the SVC logicchannel determined by the relation of the transmitting ICS networkaddress “7711” and the receiving ICS network address “9922” in the ICSpacket header, in order to correctly transfer the received packet F1 tothe FR exchange 10132-5. In the case that the communication is based onSVC, there are cases that the logic channel corresponding with thecommunication path is established at the time of receiving the ICSnetwork packet, and cases in which the logic channel has not yet beenestablished. In order to find out whether or not the logic channel hasbeen established, the processing device 1232-5 first searches whether ornot a logic channel corresponding with the pair of a transmitting ICSnetwork address “7711” and a receiving ICS network address “9922” isregistered in the DLC address conversion table 1432-5(Step S1702), andin the event that there is registration here, establishment of the logicchannel can be thus confirmed. That is, the fact that the logic channelcorresponding with the pair of transmitting ICS network address “7711”and receiving ICS network address “9922” is “16” is obtained, andfurther, it can be found that this logic channel is communicating basedon SVC, from the value “10” of the channel type obtained at the sametime. In the event that there is no such registration on the DLC addressconversion table 1432-5, the requested logic channel is established withthe latter-described <<call setting>>, and DLCI is obtained from theinformation registered to the DLC address conversion table 1432-5 atthat point (Step S1703).

[0315] <<Call Setting>>

[0316] Regarding the above-mentioned case wherein “there is noregistration of a DLCI corresponding with a communications pathdetermined by correspondence between a transmitting ICS network addressand a receiving ICS network address on the DLC address conversion table1432-5”, i.e., in the case that there is no DLCI corresponding with thiscommunications path established yet, it becomes necessary to perform thefollowing call setting, to establish a logic channel within the FRnetwork comprising ICS 925. An example of operation of the call settingwill now be described.

[0317] The processing device 1232-5 of the conversion unit 1032-5, uponmaking reference to the DLC address conversion table 1432-5 and findingthat there is no registration of a DLCI corresponding with the pair oftransmitting ICS network address “7711” and receiving ICS networkaddress “9922” (Step S1702), the processing device 1232-5 of theconversion unit 1032-5 refers to the DLC address conversion table1532-5, finds the receiving ICS network address “9922” registered in theDLC address conversion table 1532-5 matching the receiving ICS networkaddress “9922”, and obtains transmitting FR address “2999” correspondingthereto and channel capabilities “64K” corresponding thereto, and soforth (Step S1705). As described in the above <<Preparation>> section,this transmitting FR address “2999” is an address which is uniquelyappropriated within the FR network to the conversion unit 1032-6 in theFR exchange 10132-6 to which the access control apparatus 1010-6 isconnected, this access control apparatus 1010-6 having the ICS logicterminal provided with a receiving ICS network address “9922”.

[0318] The processing device 1232-5 uses the obtained transmitting FRaddress “2999” to perform a request for call setting to the FR exchange10132-5, and also requested at this time is channel capabilities such ascommunication speed of the logic channel simultaneously obtained fromthe FR address conversion table 1532-5 and so forth(Step S1706). The FRexchange 10132-5, upon receiving the call setting request, uses a signalmethod which is provided standard to FR exchanges proper as knowntechnique to establish a logic channel within the FR network whichreaches the FR exchange 10132-6. The DLCI appropriated foridentification of the logic channel is notified from the FR exchanges toconversion units 1032-5 and 1032-6 therein, but in the event that thisis based on stipulations of a signal method according to knowntechnique, the value notified from the calling party FR exchange 10132-5(e.g., “16”) and the value notified from the receiving party FR exchange10132-3 (e.g., “26”) may not be the same value. At the conversion unit1032-5, the DLCI “16” which is notified from the FR exchange 10132-5 isregistered in the FR address conversion table 1432-5 along with thetransmitting ICS network address “7711” and the receiving ICS networkaddress “9922” (Step S1707), and stores these on the FR addressconversion table 1432-5 while the connection of the above logic channelis established. When the logic channel connection is no longernecessary, the conversion unit 1032-5 requests call release of the logicchannel to the FR exchange 10132-5, and at the same time deletes theregistration corresponding with DLCI “16” on the FR address conversiontable 1432-5. Registration to the FR address conversion table 1432-6 inthe conversion unit 1032-6 will be described later.

[0319] <<Packet Transfer>>

[0320] The processing device 1232-5 of the conversion unit 1032-5converts the ICS network packet F1 received from the access controlapparatus 1010-5 into a FR packet shown in FIG. 38 according to thelogic channel(DLCI “16”) established according to the above description,and further performs the conversion into FR packets and transfers to therelay FR exchange 10132-7(Step S1704).

[0321] <<Transfer of FR Packets>>

[0322] According to the above-described method, the FR packet S1obtained by converting the ICS network packet F1 is transferred from theFR exchange 10132-5 to the relay FR exchange 10132-7, and further istransferred to the FR exchange 10132-6 as FR packet S2. The following isa description thereof with reference to the flowchart in FIG. 44.

[0323] <<Operation Following Arrival of Packet>>

[0324] Once the FR packet S2 reaches the FR exchange 10132-6(StepS1710), this FR packet S2 is transferred from the FR exchange 10132-6 tothe conversion unit 1032-6. At the conversion unit 1032-6, as shown inFIG. 38, an ICS network packet is restored from the received FR packet(Step S1711). In FIG. 40, the restored ICS network packet is shown as anICS network packet F2, but the contents thereof are identical to that ofthe ICS network packet F1. The ICS network packet F2 is transferred toan access control apparatus determined by the receiving ICS networkaddress “9922” in the header thereof, i.e., to access control apparatus1010-6 which has an ICS logic terminal appropriated with ICS networkaddress “9922” (Step S1712).

[0325] At this time, at the conversion unit 1032-6, the transmitting ICSnetwork address “7711”, the receiving ICS network address “9922”, thechannel type “10” indicating the fact this is SVC identified at thepoint of receiving the call, and DLCI “26” appropriated at the time ofcall setting of the SVC logic channel are registered in the FR addressconversion table 1432-6(Step S1714), and at this time, the transmittingICS network address “7711” of the ICS network packet F2 is written tothe receiving ICS network address of the FR address conversion table1432-6, and the receiving ICS network address “9922” is written to thetransmitting ICS network address of the FR address conversion table1432-6, i.e., these are written in reverse positions. However, if at thepoint of registration an item already exists within the FR addressconversion table 1432-6 identical to that regarding which registrationis being attempted, no registration is made. The address conversioninformation registered in the FR address conversion table 1432-6 isstored on the DLC address conversion table 1432-6 while the connectionof the logic channel having a corresponding logic channel (in thisexample, DLCI “26”) is established.

[0326] <<Reverse Packet Flow>>

[0327] Now, description of the case of reverse flow of the ICS packet,i.e., flow from the corporation Y to the corporation X, will be madewith reference to FIGS. 39 and 40, under the presumption that callsetting of the SVC logic channel has been made according to the abovedescription.

[0328] An ICS user packet sent out from the corporation Y to thecorporation X is ICS-encapsulated upon passing through the accesscontrol apparatus 1010-6 and is converted into an ICS network packet F3having the transmitting ICS network address “9922” and the receiving ICSnetwork address “7711” in the header portion thereof, and is transferredto the conversion unit 1032-6 within the FR exchange 10132-6. Theprocessing following the flow shown in FIG. 43 as described above isperformed by the processing device 1232-6 of the conversion unit 1032-6,but the FR address conversion table 1432-6 in the conversion unit 1032-6has registered therein a DLCI “26” with a channel type “10” which meansSVC, corresponding with transmitting ICS network address “9922” andreceiving ICS network address “7711”, so the system operates followingthe flow (1) shown in FIG. 43, thereby converting the ICS networkpackets F3 into an FR packet (FR packet S3) and transferring, withregard to DLCI “26”.

[0329] The FR packet S3 is relayed and transferred by the relay FRexchange 10132-7, becomes FR packet S4 and reaches the FR exchange10132-5. The FR packet S3 is received via the logic channel having DLCI“16” in the conversion unit 1032-6 thereof, and restored into an ICSnetwork packet F4 having identical contents with the ICS network packetF3. In the conversion unit 1032-5, the pair of the transmitting ICSnetwork address “9922” and the receiving ICS network address “7711” inthe header of the ICS network packet F4 is already registered in the FRaddress conversion table 1432-5 in reverse fashion, so registration tothe FR address conversion table is not performed, and the ICS networkpacket F4 is transferred to the access control apparatus 1010-5.

[0330] <<Example of Application to Half-Duplex Communication>>

[0331] The above description has been made with reference to caseswherein an ICS packet is transferred from the corporation X to thecorporation Y, and reverse from the corporation Y to the corporation X,with an network within ICS 925 having been configured of an FR network,being carried out with a single SVC logic channel. For example, applyingthe transfer and reverse transfer to a request packet to a serverterminal of the corporation Y to be connected to the ICS from a clientterminal of the corporation X to be connected to the ICS (transfer), anda response packet to the request packet from the client terminal of thecorporation X to server terminal of the corporation Y (reverse transfer)results in an application example of half-duplex communication in whichone-way communication is performed at times, and both-way communicationis realized by switching the communication direction by time frames.

[0332] <<Example of Application to Full-Duplex Communication>>

[0333] The logic channel set on the FR network is capable of full-duplexcommunication, i.e., simultaneous both-way communication, due to the FRstipulations. For example, applying the transfer and reverse transfer torequest packets to a plurality of server terminals of the corporation Yto be connected to the ICS from a plurality of client terminals of thecorporation X to be connected to the ICS (transfer), and responsepackets to the request packets from the plurality of client terminals ofthe corporation X to the plurality of server terminals of thecorporation Y (reverse transfer) results in asynchronous transfer ofpackets between the client terminals and the server terminals, sosimultaneous both-way communication is conducted on the single SVC logicchannel serving as the communication path, thereby making for anapplication example of full-duplex communication.

[0334] (4) Flow of Packets using PVC:

[0335] An embodiment wherein the network within the ICS 925 isconfigured with an FR network and PVC is applied as a communication pathwithin the FR network will be described with an example of an ICS userpacket sent from a terminal of the corporation W toward a terminal ofthe corporation Z.

[0336] <<Preparation>>

[0337] A transmitting ICS network address of an ICS network packet to betransferred to the FR network from the conversion unit 1032-5, areceiving ICS address, the DLCI of the PVC fixed on the FR network(indicating the communication path between the FR exchange 10132-5 andthe FR exchange 10132-6), and the channel type indicating that the DLCIis PVC, are registered in the FR address conversion table 1432-5. Thisregistration is different from the case of SVC; in that registration ismade in the FR address conversion table 1432-5 at the same time that thePVC logic channel is set in the FR exchanges (10132-5, 10132-5, 10132-6)serving as the communication path, and is saved in a fixed manner whilethe communication path is necessary, i.e., until the setting of the PVClogic channel is canceled. Also, the registration is made to the DLCaddress conversion table 1432-6 in the same manner. Incidentally, theDLCI of PVC is appropriated to the respective FR exchanges at the timethat PVC is fixedly connected between the FR exchanges.

[0338] The values set in the DLC address conversion table 1432-5 are asfollows: value “7733” which is the transmitting ICS network addressappropriated to the ICS logic terminal of the access control apparatus1010-7 is set as the communication address of the corporation W, andvalue “9944” which is the receiving ICS network address appropriated tothe ICS logic terminal of the access control apparatus 1010-8 is set asthe communication address of the corporation Z. Further, PVC logicchannel ID “18” which is appropriated to the FR exchange 10132-5 is setas the DLCI, and value “20” is set for the channel type, indicating PVC.Also, settings for registering to the DLC address conversion table1432-5 are written to the DLC address administration server 1732-5, andstored. In the same way, similar settings are made in the DLC addressconversion table 1432-6 in the conversion unit 1032-6 in the FR exchange10132-6, with the transmitting ICS network address and the receiving ICSnetwork address reversed. In this case, even if the same PVC is beingimplied, the DLCI may be of a different value to the DLC addressconversion table 1432-5.

[0339] The values set in the DLC address conversion table 1432-6 are asfollows: value “9944” which is the transmitting ICS network addressappropriated to the ICS logic terminal of the access control apparatus1010-8 is set as the communication address of the corporation Z, andvalue “7733” which is the receiving ICS network address appropriated tothe ICS logic terminal of the access control apparatus 1010-7 is set asthe communication address of the corporation W. Further, PVC logicchannel ID “28” which is appropriated to the FR exchange 10132-6 is setas the DLCI, and value “20” is set as the channel type, indicating PVC.Also, settings registered to the DLC address conversion table 1432-6 arealso written to and stored in the DLC address administration server1732-6.

[0340] <<Transferring ICS Network Packets from the Access ControlDevice>>

[0341] As described in Embodiment-1, the ICS user packet sent toward theterminal of the corporation Z connected to the access control apparatus1010-8 via the access control apparatus 1010-7 is ICS-encapsulated uponpassing through the access control apparatus 1010-7, and becomes an ICSnetwork packet F5 having the transmitting ICS network address “7733” andthe receiving ICS network address “9944” as an ICS packet header. TheICS network packet F5 is sent from the access control apparatus 1010-7to the FR exchange 10132-5, and reaches the conversion unit 1032-5.

[0342] <<Obtaining a DLCI>>

[0343] The processing device 1232-5 refers to the DLC address conversiontable 1432-5 using the transmitting ICS network address “7733” and thereceiving ICS network address “9944” in the header of the receivednetwork packet F5, and obtains the fact that the DLCI identifying thelogic channel set as a communication path for this ICS network addresspair is “18”. At the same time, it can be found that this logic channelis PVC, from the value “20” of the channel type obtained.

[0344] <<Transfer of Packet>>

[0345] The processing device 1232-5 converts the ICS network packet F5received from the access control apparatus 1010-7 into an FR frame, andtransfers it to FR exchange 10132-7, with regard to the PVC logicchannel “18” obtained as described above. The method of FR packetconversion is the same as that described above in the embodiment of SVC.The above processing procedures of the conversion unit 1032-5 are asshown in FIG. 43, and PVC always follows the flow (1).

[0346] <<Transfer of FR Packet>>

[0347] The FR packet S1 comprised of a plurality of cells obtained byconverting the ICS network packet F5 is transferred from the FR exchange10132-5 to the relay FR exchange 10132-7, and further is transferred tothe FR exchange 10132-6 as FR packet S2. This operation is the same aswith SVC.

[0348] <<Operation Following Arrival of Packet>>

[0349] Once the FR packet S2 reaches the FR exchange 10132-6, this FRpacket S2 is transferred from the FR exchange 10132-6 to the conversionunit 1032-6 within the FR exchange 10132-6. The conversion unit 1032-6restores the received FR packet into an ICS network packet, which is thesame as with SVC. In FIG. 40, the restored ICS network packet is shownas ICS network packet F6, but the contents thereof are identical to thatof the ICS network packet F5. The ICS network packet F6 is transferredto an access control apparatus determined by the receiving ICS networkaddress “9944” in the header thereof, i.e., to access control apparatus1010-8 which has an ICS logic terminal appropriated with the ICS networkaddress “9944”. The above processing procedures of the conversion unit1032-6 are as shown in FIG. 44, and PVC always follows the flow (1).

[0350] <<Reverse Packet Flow>>

[0351] Next, description of the case of reverse flow of the ICS packet,i.e., flow from the corporation Z to the corporation W, will be made,with a PVC logic channel as the communication path. An ICS user packetsent out from the corporation Z to the corporation W is ICS-encapsulated into an ICS network packet F7 having the transmitting ICSnetwork address “9944” and the receiving ICS network address “7733” inthe header portion thereof when passing through the access controlapparatus 1010-8, and is transferred to the conversion unit 1032-6within the FR exchange 10132-6. The processing following the flow shownin FIG. 43 is performed by the processing device 1232-6 of theconversion unit 1032-6. In this case, the DLC address conversion table1432-6 in the conversion unit 1032-6 has registered therein a DLCI “28”corresponding with the transmitting ICS network address “9944” and thereceiving ICS network address “7733”, so the system converts the ICSnetwork packets F7 into an FR packet and transfers, with regard to DLCI“28”.

[0352] The FR packet transferred through the FR network reaches theconversion unit 1032-5 of the FR exchange 10132-5, is received via thelogic channel having DLCI “18”, and restored into an ICS network packetF8 having identical contents with the ICS network packet F7. However, inthe conversion unit 1032-5, the pair of the transmitting ICS networkaddress “9944” and the receiving ICS network address “7733” in theheader of the ICS network packet F8 is already registered in the DLCaddress conversion table 1432-5 in reverse fashion, and an informationthat the DLCI “18” as to this transmitting/receiving address pair ischannel type “20” is obtained, so the registration to the FR addressconversion table is not performed, and the ICS network packet F8 istransferred to the access control apparatus 1010-7.

[0353] <<Example of Application to Half-Duplex Communication>>

[0354] The above description has been made with reference to anembodiment of transferring an ICS packet using PVC with a network withinICS 925 having been configured of an FR network, but the differencebetween PVC and the earlier-described SVC is whether the logic channelis fixed or called and set as necessary, so there is no difference inthe operation itself of transferring packets over the set logic channel.Accordingly, regarding the ICS according to the present invention, anexample of application to half-duplex communication using an FR networkwith a PVC logic channel is the same as an example of application tohalf-duplex communication using a SVC logic channel.

[0355] <<Example of Application to Full-Duplex Communication>>

[0356] Due to the same reason as that regarding the example ofapplication to full-duplex communication, an example of application toPVC full-duplex communication is the same as an example of applicationto SVC full-duplex communication.

[0357] (5) One-On-N or N-On-One Communication Using PVC:

[0358] In the above example, an embodiment was described wherein onelogic channel was described as a communication path connecting onecorporation (location) with one corporation (location), i.e., acommunication path connecting one ICS logic terminal with one ICS logicterminal, but one PVC logic channel can be used as a communication pathconnecting one ICS logic terminal with a plurality of ICS logicterminals. Such One-on-N or N-on-one communication will be describedwith reference to FIGS. 45 and 46.

[0359] <<Description of Components>>

[0360] The corporation X is connected with an ICS logic terminal withinthe access control apparatus 1010-12 provided with the ICS networkaddress “7711”, and the access control apparatus 1010-12 is connected tothe FR exchange 10132-12. With the parties to be reached from thecorporation X as the corporations A through D, the corporation A isconnected to an ICS logic terminal within the access control apparatus1010-22 provided with the ICS network address “9922”, and thecorporation B is connected to an ICS logic terminal within the accesscontrol apparatus 1010-22 provided with the ICS network address “9933”.In the same manner the corporation C is connected to an ICS logicterminal within the access control apparatus 1010-42 provided with theICS network address “9944”, and the corporation D is connected to an ICSlogic terminal within the access control apparatus 1010-42 provided withthe ICS network address “9955”. The access control apparatuses 1010-22and 1010-42 are connected to the FR exchange 10132-22, and the FRexchange 10132-52 and FR exchange 10132-62 are connected via a relaynetwork.

[0361] <<Preparation>>

[0362] With regard to the FR exchanges 10132-12 and 10132-22, a singlePVC logic channel connecting the conversion unit 1032-12 within the FRexchange 10132-12 and the conversion unit 1032-22 within the FR exchange10132-22, setting “16” as the DLCI provided to the conversion unit1032-12 of the logic channel, and “26” as the DLCI provided to theconversion unit 1032-22 of the logic channel. Registration such as shownin FIGS. 45 and 46 is performed regarding the DLC address conversiontable 1432-12 within the conversion unit 1032-12 and the DLC addressconversion table 1432-22 within the conversion unit 1032-22.

[0363] <<Frame Flow for One-On-N Communication>>

[0364] The flow of packet for one-on-N communication will be describedconcerning packet sent from the corporation X to each of thecorporations A through D. An ICS network packet sent from thecorporation X toward the corporation A, having a transmitting ICSnetwork address “7711” and a receiving network address “9922”, istransferred to the PVC logic channel with a DLCI “16”, by means ofmaking reference to the DLC address conversion table 1432-12 in theconversion unit 1032-12. An ICS network packet sent from the corporationX toward the corporation B, having a transmitting ICS network address“7711” and a receiving network address “9933”, is also transferred tothe PVC logic channel with a DLCI “16”. An ICS network packet sent fromthe corporation X toward the corporation C, having a transmitting ICSnetwork address “7711” and a receiving network address “9944”, and anICS network packet sent from the corporation X toward the corporation D,having a transmitting ICS network address “7711” and a receiving networkaddress “9955” are transferred to the PVC logic channel with a DLCI “16”in the same manner. This indicates that one-on-N (the corporation X tothe corporations A through D) communication is being performed whilesharing a single PVC logic channel. Reverse packet flow, i.e., transferfrom the corporations A through D to the corporation X, will bedescribed next.

[0365] <<Packet flow for N-On-One Communication>>

[0366] The flow of packet for N-on-one communication will be describedconcerning packet sent to the corporation X from each of thecorporations A through D. An ICS network packet sent toward thecorporation X from the corporation A, having a transmitting ICS networkaddress “9922” and a receiving network address “7711”, is transferred tothe PVC logic channel with a DLCI “26”, by means of making reference tothe DLC address conversion table 1432-22 in the conversion unit 1032-22.An ICS network packet sent toward the corporation X from the corporationB, having a transmitting ICS network address “9933” and a receivingnetwork address “7711”, is also transferred to the PVC logic channelwith a DLCI “26”. An ICS network packet sent toward the corporation Xfrom the corporation C, having a transmitting ICS network address “9944”and a receiving network address “7711”, and an ICS network packet senttoward the corporation X from the corporation D, having a transmittingICS network address “9955” and a receiving network address “7711” aretransferred to the PVC logic channel with a DLCI “26” in the samemanner. This indicates that N-on-one (the corporations A through D tothe corporation X) communication is being performed while sharing asingle PVC logic channel.

[0367] (6) N-On-N Communication using PVC:

[0368] Using the same method as one-on-N communication, one PVC logicchannel can be used as a communication path connecting a plurality ofICS logic terminals with a plurality of ICS logic terminals. Such N-on-Ncommunication will be described with reference to FIGS. 47 and 48.

[0369] <<Description of Components>>

[0370] The corporation X has ICS logic terminal address “7711” of theaccess control apparatus 1010-13 as the contact point thereof, thecorporation Y has ICS logic terminal address “7722” of the accesscontrol apparatus 1010-13 as the contact point thereof, and the accesscontrol apparatus 1010-13 is connected to the FR exchange 10132-13. Withthe other party which the corporation X or corporation Y is attemptingto reach as the corporation A or corporation C, the corporation A hasICS logic terminal address “9922” of the access control apparatus1010-23 as the contact point thereof, the corporation Y has ICS logicterminal address “9944” of the access control apparatus 1010-43 as thecontact point thereof. The access control apparatuses 1010-23 and1010-43 are connected to the FR exchange 10132-23, and the FR exchanges10132-13 and 10132-23 are connected via a relay network.

[0371] <<Preparation>>

[0372] With regard to the FR exchanges 10132-13 and 10132-23, a singlePVC logic channel connects the conversion unit 1032-13 within the FRexchange 10132-13 and the conversion unit 1032-23 within the FR exchange10132-23, setting “16” as the DLCI provided to the conversion unit1032-13 of the logic channel, and “26” as the DLCI provided to theconversion unit 1032-23 of the logic channel. The registration such asshown in FIGS. 47 and 48 is performed regarding the DLC addressconversion table 1432-13 within the conversion unit 1032-13 and the DLCaddress conversion table 1432-23 within the conversion unit 1032-23.

[0373] <<Packet Flow for N-On-N Communication>>

[0374] The flow of packets for N-on-N communication will first bedescribed concerning packets sent from the corporation X to each of thecorporations A and C. An ICS network packet sent from the corporation Xtoward the corporation A, having a transmitting ICS network address“7711” and a receiving network address “9922”, is transferred to the PVClogic channel with a DLCI “16”, by means of making reference to the DLCaddress conversion table 1432-13 in the conversion unit 1032-13. An ICSnetwork packet sent from the corporation X toward the corporation C,having a transmitting ICS network address “7711” and a receiving networkaddress “9944”, is also transferred to the PVC logic channel with a DLCI“16”. Next, the flow of packet will be described concerning packets sentfrom the corporation Y to each of the corporations A and C. An ICSnetwork packet sent from the corporation Y toward the corporation A,having a transmitting ICS network address “7722” and a receiving networkaddress “9922”, is transferred to the PVC logic channel with a DLCI“16”, by means of making reference to the DLC address conversion table1432-13 in the conversion unit 1032-13. An ICS network packet sent fromthe corporation Y toward the corporation C, having a transmitting ICSnetwork address “7722” and a receiving network address “9944”, is alsotransferred to the PVC logic channel with a DLCI “16”.

[0375] Next, reverse packet flow will be described concerning packetssent to each of the corporations X and Y from the corporation A. An ICSnetwork packet sent toward the corporation X from the corporation A,having a transmitting ICS network address “9922” and a receiving networkaddress “7711”, is transferred to the PVC logic channel with a DLCI“26”, by means of making reference to the DLC address conversion table1432-23 in the conversion unit 1032-23. An ICS network packet senttoward the corporation Y from the corporation A, having a transmittingICS network address “9922” and a receiving network address “7722”, isalso transferred to the PVC logic channel with a DLCI “26”. An ICSnetwork packet sent toward the corporation X from the corporation C,having a transmitting ICS network address “9944” and a receiving networkaddress “7711”, is transferred to the PVC logic channel with a DLCI“26”. An ICS network packet sent toward the corporation Y from thecorporation C, having a transmitting ICS network address “9944” and areceiving network address “7722”, is also transferred to the PVC logicchannel with a DLCI “26”. Thus, N-on-N communication is performed whilesharing a single PVC logic channel.

Embodiment-5 (Containment of Telephone Line, ISDN Line, CATV Line,Satellite Line, IPX Line, Cellular Phone Line):

[0376] As described in Embodiment-1 and Embodiment-2, connection toaccess control apparatuses which serve as access points is not limitedto communication lines to LANs (dedicated lines, etc.), but rather,telephone lines, ISDN lines, CATV lines, satellite lines, IPX lines andcellular phone lines may also be contained. The following is adescription of an embodiment.

[0377]FIG. 49 through FIG. 52 illustrate an example of a systemcontaining telephone lines, ISDN lines, CATV lines, satellite lines, IPXlines and cellular phone lines, according to the ICS 6000. The lineportions 6011-1 and 6011-2 are made up of telephone line conversionunits 6030-1 and 6030-2, ISDN line conversion units 6029-1 and 6029-2,CATV line conversion units 6028-1 and 6028-2, satellite line conversionunits 6027-1 and 6027-2, IPX line conversion units 6026-1 and 6026-2,and cellular phone line conversion units 6025-1 and 6025-2. Thetelephone line conversion units 6030-1 and 6030-2 have capabilities forconversion and reverse-conversion equivalent to physical layers and datalink layers (first layer and second layer of OSI(Open SystemsInterconnection) communication protocol) between the telephone lines6160-1 and 6160-2 and the access control apparatuses 6010-1 and 6010-2.Also, the ISDN line conversion units 6029-1 and 6029-2 have capabilitiesfor conversion and reverse-conversion equivalent to physical layers anddata link layers between the ISDN lines 6161-1 and 6161-2 and the accesscontrol apparatuses 6010-1 and 6010-2, and the CATV line conversionunits 6028-1 and 6028-2 have capabilities for conversion andreverse-conversion equivalent to physical layers and data link layersbetween the CATV lines 6162-1 and 6162-2 and the access controlapparatuses 6010-1 and 6010-2. Further, the satellite line conversionunits 6027-1 and 6027-2 have capabilities for conversion andreverse-conversion equivalent to physical layers and data link layersbetween the satellite lines 6163-1 and 6163-2 and the access controlapparatuses 6010-1 and 6010-2, and the IPX conversion units 6026-1 and6026-2 have capabilities for conversion and reverse-conversionequivalent to physical layers and data link layers between the IPX lines6164-1 and 6164-2 and the access control apparatuses 6010-1 and 6010-2.The cellular phone conversion units 6025-1 and 6025-2 have capabilitiesfor conversion and reverse-conversion equivalent to physical layers anddata link layers between the cellular phone wireless lines 6165-1 and6165-2 and the access control apparatuses 6010-1 and 6010-2. An exampleof the conversion table 6013-1 is shown in FIG. 53.

[0378] The ICS packet interface network 6050 transfers ICS networkpackets following the RFC791 or RFC1883 stipulations, without change inthe ICS network packet format. The X.25 network 6040 accepts ICS networkpackets and converts these to X.25 format and transfers, and at the endreverse-converts these into ICS network packet format and outputs. TheFR network 6041 accepts ICS network packets and converts these to FRformat and transfers, and at the end reverse-converts these into ICSnetwork packet format and outputs. The ATM network 6042 accepts ICSnetwork packets and converts these to ATM format and transfers, and atthe end reverse-converts these into ICS network packet format andoutputs. The satellite communication network 6043 accepts ICS networkpackets and transfers the information using the satellite, and at theend reverse-converts these into ICS network packet format and outputs.Also, the CATV line network 6044 accepts ICS network packets andconverts into CATV format packets and transfers the contents thereof,and at the end reverse-converts these into ICS network packet format andoutputs.

[0379] <<Common Preparation>>

[0380] The conversion table 6013-1 within the access control apparatus6010-1 contains the transmitting ICS network address, the sender ICSuser address, the receiver ICS user address, the receiving ICS networkaddress, the request identification and the speed as shown in FIG. 53.The request identification represents services and connections, e.g., asfollows: value “1” indicates intra-corporation service, value “2”indicates inter-corporation service, value “3” indicates virtualdedicated line connection, and value “4” indicates ICS serverconnection. The conversion table 6013-1 contains addresses registeredtherein with the same method as that described in Embodiment-1 andEmbodiment-2. The ICS network server 670 has an ICS user address of“2000” and an ICS network address of “7821”, and is connected to theaccess control apparatus 6010-1 via ICS communications line 6081-1. Theconversion table 6013-1 contains the receiver ICS user address “2000” ofthe ICS network server 670, receiving ICS network address of “7821” andrequest identification of “4”.

[0381] The operation thereof is described with reference to FIG. 54.

[0382] <<Communication from a Telephone Line to an ISDN Line>>

[0383] The user 6060-1 sends out the ICS user frame F110 with a senderICS user address “3400” and a receiver ICS user address “2500” to theaccess control apparatus 6010-1 via the telephone line 6160-1. Theaccess control apparatus 6010-1 receives the ICS user packet F110 fromthe telephone line conversion unit 6030-1 with the ICS network address“7721” (Step S1800), and checks whether or not the ICS network address“7721” is registered on the conversion table 6013-1 with the requestidentification as virtual dedicated line connection “3” (Step S1801). Inthis case, the registration has not been made, so next, the accesscontrol apparatus 6010-1 checks that the receiver ICS user address“2500” is registered on the conversion table 6013-1(Step S1803) and thatthe request identification has been registered as inter-corporationcommunication “2” (Step S1804). In this case, the registration has beenmade, so the receiving ICS network address “5522” is obtained from theconversion table 6013-1, processing such as billing related to theinter-corporation communication is performed (Step S1805), the ICS userpacket F110 is ICS-encapsulated (Step S1820), converted into an ICSnetwork packet F120, and sent to the ICS packet transfer network 6030via ICS network communication line 6080-1 (Step S1825).

[0384] <<Communication From an ISDN Line to a CATV Line>>

[0385] The user 6061-1 sends out the ICS user packet F111 with a senderICS user address “3500” and a receiver ICS user address “2600” to theaccess control apparatus 6010-1 via the ISDN line 6161-1. The accesscontrol apparatus 6010-1 receives the ICS user packet F11 from the ISDNline conversion unit 6029-1 with the ICS network address “7722” (StepS1800), and checks whether or not the ICS network address “7722” isregistered on the conversion table 6013-1 with the requestidentification as virtual dedicated line connection “3” (Step S1801). Inthis case, the registration has been made, so the receiving ICS networkaddress “5523” is obtained from the conversion table 6013-1, processingsuch as billing related to dedicated line connection is performed(StepS1802), the ICS user packet F111 is ICS-encapsulated (Step S1820),converted into an ICS network packet F121, and sent to the ICS packettransfer network 6030 via ICS network communication line 6080-1(StepS1825).

[0386] Incidentally, regarding the virtual dedicated line connection,the sender ICS user address and receiver ICS user address written withinthe ICS network packet F111 do not have to be used in the access controlapparatus. Next, the ICS network packet F121 reaches the access controlapparatus 6010-2 via the FR network 6041 and the ICS networkcommunication line 6080-2 for example, is reversely ICS-encapsulated andrestored into the ICS user packet F111, and reaches the user 6062-2connected to the CATV line 6162-2 via the CATV line unit 6028-2 which isprovided with the transmitting ICS network address “5523”.

[0387] <<Communication from a CATV Line to a Satellite Line>>

[0388] The user 6062-1 sends out the ICS user packet F112 with a senderICS user address “3600” and a receiver ICS user address “2700” to theaccess control apparatus 6010-1 via the CATV line 6162-1. The accesscontrol apparatus 6010-1 receives the ICS user packet F112 from the CATVline conversion unit 6028-1 with the ICS network address “7723” (StepS1800), and checks whether or not the ICS network address “7723” isregistered on the conversion table 6013-1 with the requestidentification as virtual dedicated line connection “3” (Step S1801). Inthis case, the registration has not been made, so next, the accesscontrol apparatus 6010-1 checks that the receiver ICS user address“2700” is registered on the conversion table 6013-1(Step S1803) and thatthe request identification has been registered as inter-corporationcommunication “2” (Step S1804). In this case, the registration has beenmade as intercorporation communication “2”, so the receiving ICS networkaddress “5524” is obtained from the conversion table 6013-1, processingsuch as billing related to inter-corporation communication isperformed(Step S1805), the ICS user packet F112 is ICS-encapsulated(StepS1820), converted into an ICS network packet F122, and sent to the ICSpacket transfer network 630 via ICS network communication line6080-1(Step S1825). The ICS network packet F122 reaches the accesscontrol apparatus 6010-2 via the ATM network 6042 and the ICS networkcommunication line 6080-2 for example, is reversely ICS-encapsulated andrestored into the ICS user packet F112, and reaches the user 6063-2 withthe receiving ICS network address “2700”.

[0389] <<Communication from a Satellite Line to an IPX Line>>

[0390] The user 6063-1 sends out the ICS user packet F113 with a senderICS user address “3700” and a receiver ICS user address “2800” to theaccess control apparatus 6010-1 via the telephone line 6163-1. Theaccess control apparatus 6010-1 receives the ICS user packet F113 fromthe satellite line conversion unit 6027-1 with the ICS network address“7724” (Step S1800), and checks whether or not the ICS network address“7724” is registered on the conversion table 6013-1 with the requestidentification as virtual dedicated line connection “3” (Step S1801). Inthis case, the registration has not been made, so next, the accesscontrol apparatus 6010-1 checks that the receiver ICS user address“2800” is registered on the conversion table 6013-1(Step S1803) and thatthe request identification has been registered as inter-corporationcommunication “2” (Step S1804). In this case, the registration has beenmade as intercorporation communication “2”, so the receiving ICS networkaddress “5525” is obtained from the conversion table 6013-1, processingsuch as billing related to inter-corporation communication isperformed(Step S1805), the ICS user packet F113 is ICS-encapsulated(StepS1820), converted into an ICS network packet F123, and sent to the ICSframe transfer network 6030 via ICS network communication line6080-1(Step S1825). The ICS network packet F123 reaches the accesscontrol apparatus 6010-2 via the ICS packet interface 6050 and ICSnetwork communication line 6080-2 for example, is reverselyICS-encapsulated and restored into the ICS user packet F113, and reachesthe user 6064-2 with the receiving ICS network address “2800”.

[0391] <<Communication from an IPX Line to a Cellular Telephone Line>>

[0392] The user 6064-1 sends out the ICS user packet F114 with a senderICS user address “0012” and a receiver ICS user address “2900” to theaccess control apparatus 6010-1 via the IPX line 6164-1. The accesscontrol apparatus 6010-1 receives the ICS user packet F114 from the IPXline conversion unit 6026-1 with the ICS network address “7725” (StepS1800), and checks whether or not the ICS network address “7725” isregistered on the conversion table 6013-1 with the requestidentification as virtual dedicated line connection “3” (Step S1801). Inthis case, the registration has not been made, so next, the accesscontrol apparatus 6010-1 checks that the receiver ICS user address“2900” written in the ICS user packet F114 is registered on theconversion table 6013-1(Step S1803) and that the request identificationhas been registered as inter-corporation communication “2” (Step S1804).In this case, the registration has not been made as inter-corporationcommunication “2”, so the access control apparatus 6010-1 checks whetherthe registration has been made as intra-corporation communication “1”(Step S1810). In this case, the registration has been made asintra-corporation communication “1”, so the receiving ICS networkaddress “5526” is obtained from the conversion table 6013-1, processingsuch as billing related to intra-corporation communication isperformed(Step S1811), the ICS user packet F114 is ICS-encapsulated(StepS1820), converted into an ICS network packet F124, and sent to the ICSpacket transfer network 6030 via ICS network communication line6080-1(Step S1825). The ICS network packet F124 reaches the accesscontrol apparatus 6010-2 via the CATV line network 6044 and ICS networkcommunication line 6080-2 for example, is reversely ICS-encapsulated andrestored into the ICS user packet F114, and reaches the user 6065-2 withthe receiving ICS network address “2900”.

[0393] <<Communication from a Cellular Telephone Line to a TelephoneLine>>

[0394] The user 6065-1 sends out the ICS user packet F115 with a senderICS user address “3900” and a receiver ICS user address “2400” to theaccess control apparatus 6010-1 via the cellular telephone line 6165-1.The access control apparatus 6010-1 receives the ICS user packet F115from the cellular telephone line conversion unit 6025-1 with the ICSnetwork address “7726” (Step S1800), and checks whether or not the ICSnetwork address “7726” is registered on the conversion table 6013-1 withthe request identification as virtual dedicated line connection “3”(Step S1801). In this case, the registration has not been made, so next,the access control apparatus 6010-1 checks that the receiver ICS useraddress “2400” written in the ICS user packet F115 is registered on theconversion table 6013-1(Step S1803) and that the request identificationhas been registered as inter-corporation communication “2” (Step S1804).In this case, the registration has been made as inter-corporationcommunication “2”, so the receiving ICS network address “5521” isobtained from the conversion table 6013-1, processing such as billingrelated to intra-corporation communication is performed(Step S1811), theICS user packet F115 is ICS-encapsulated (Step S1820), converted into anICS network packet F125, and sent to the ICS packet transfer network6030 via ICS network communication line 6080-1(Step S1825). The ICSnetwork packet F124 reaches the access control apparatus 6010-2 via thesatellite line network 6043 and ICS network communication line 6080-2for example, is reversely ICS-encapsulated and restored into the ICSuser packet F115, and reaches the user 6060-2 with the receiving ICSnetwork address “2400”.

[0395] <<Communication from a Cellular Telephone Line to an ICS NetworkServer>>

[0396] The user 6066-1 sends out the ICS user packet F116 with a senderICS user address “3980” and a receiver ICS user address “2000” to theaccess control apparatus 6010-1 via the cellular telephone line 6166-1.The access control apparatus 6010-1 receives the ICS user packet F116from the cellular telephone line conversion unit 6025-1 with the ICSnetwork address “7727” (Step S1800), and checks whether or not the ICSnetwork address “7726” is registered on the conversion table 6013-1 withthe request identification as virtual dedicated line connection “3”(Step S1801). In this case, the registration has not been made, so next,the access control apparatus 6010-1 checks that the receiver ICS useraddress “2000” written in the ICS user packet F116 is registered on theconversion table 6013-1(Step S1803) and that the request identificationhas been registered as inter-corporation communication “2” (Step S1804).In this case, the registration has not been made so the access controlapparatus 6010-1 checks whether or not the request identification isregistered as intra-corporation communication “1” (Step S1810). In thiscase, the registration has not been made, so the access controlapparatus 6010-1 checks whether or not the request identification isregistered as ICS network server “4” (Step S1812). In this case, theregistration has been made as ICS network server communication “4”, sothe receiving ICS network address “7821” is obtained from the conversiontable 6013-1, processing such as billing related to ICS network servercommunication is performed(Step S1813), the ICS user packet F115 isICS-encapsulated(Step S1820), converted into an ICS network packet, andsent to the ICS network server 670 (Step S1825).

[0397] According to the above-described transferring methods, changingthe ICS user address written into the ICS user packet allows for thesending side to select any of the following on the receiving side:telephone line, ISDN line, CATV line, satellite line, IPX line, orcellular phone line; regardless of whether the sending side is any ofthe following: telephone line, ISDN line, CATV line, satellite line, IPXline, or cellular phone line. Embodiment-6 (Dial-up router):

[0398] An example of using a dial-up router will be described withreference to FIG. 55 through FIG. 57. A user 7400-1 within a LAN 7400has an ICS user address “2500”, and similarly, a user 7410-1 within aLAN 7410 has an ICS user address “3601”. The administrator of thedial-up router 7110 enters in the router table 7113-1 of the dial-uprouter 7110 the telephone number specified from the receiver ICS useraddress and the order or priority thereof from the router table inputunit 7018-1.

[0399] Now, registration to the router table 7113-1 will be describedwith reference to FIG. 58. In the event that the receiver ICS useraddress “3601” has been specified, the highest on the priority list istelephone number “03-1111-1111”, No.2 on the priority list is telephonenumber “03-2222-2222”, and No.3 on the priority list is telephone number“03-3333-3333”. The receiver ICS user addresses “3602” and “3700” arealso registered in the same manner. Here, reference will be made to theflowchart shown in FIG. 59 as an example of communication from thesender ICS user address “2500” to the receiver ICS user address “3601”.

[0400] The user 7400-1 sends the ICS user packet F200 to the dial-uprouter 7110 via the gateway 7400-2 and the user logic communication line7204. The dial-up router 7110 operates under the processing device7112-1, and receives the ICS user packet F200(Step S1901), reads thereceiver ICS user address “3601” included in the ICS user packet F200,searches the router table 7113-1 with the address “3601” included in theICS user packet F200 as the search keyword(Step S1902), and finds thetelephone number with high priority. In this case, the telephone numberhighest on the priority list is “03-1111-1111”, as shown in the routertable in FIG. 58, so the dial-up router 7110 dials the telephone number“03-1111-1111” via the telephone network as the first attempt(StepS1910). As a result, a telephone communication path 7201 with the lineportion 7011-1 of the access control apparatus 7010-1 which is called bythe telephone number “03-1111-1111” is established, i.e., the dial-uprouter 7110 and the line portion 7011-1 are connected by a telephoneline. In the event that the dial-up router 7110 and the line portion7011-1 are not connected by a telephone line, dial-up router 7110 findsthe telephone number “03-2222-2222” that is second in priority, anddials the telephone number “03-2222-2222” via the telephone network asthe second attempt(Step S1911). As a result, a telephone communicationpath 7202 with the line portion 7011-1 of the access control apparatus7010-1 which is called by the telephone number “03-2222-2222” isestablished. Also, in the event that the dial-up router 7110 and theline unit 7011-1 are not connected by a telephone line, the dial-uprouter 7110 finds the telephone number “03-3333-3333” that is third inpriority, and dials the telephone number “03-3333-3333” via thetelephone network as the third attempt(Step S1911). As a result, atelephone communication path 7203 with the line portion 7011-3 of theaccess control apparatus 7010-3 which is called by the telephone number“03-3333-3333” is established. In the event that the dial-up router andthe access control apparatus are not connected by a telephone lineregardless of the above multiple attempts, the dial-up router 7110stores the received ICS packet F200 in a memory 7117-1(Step S1913),makes reference again to the router table(Step S1902) after a certainamount of time(Step S1914), and attempts establishment of telephonecommunication path 7201, 7202 or 7203.

[0401] Next, description will be made regarding the operations followingthe connection of the aforementioned dial-up router 7110 and the lineportion 7011-1. The dial-up router 7110 enters verification proceduresfor determining whether this is an authorized user registered in theaccess control apparatus 7010-1 as a user(Step S1920). Any arrangementwhich achieves the object of verification is agreeable for theverification procedures, but for example, an ID and password foridentifying the dial-up router are sent from the dial-up router 7110 tothe line portion 7011-1 via the telephone line 7201 the verifying unit7016-1 of the access control apparatus 7010-1 checks whether or not thereceived ID and password are correct, and in the event that the user iscorrect, the fact that the user is correct, i.e., communication datanotifying “affirmative confirmation” is sent to the dial-up router 7110via the telephone communication path 7201, thus completing theverification procedures. In the event that either one of the ID orpassword is incorrect, communication via the telephone communicationpath 7201 is terminated.

[0402] Upon receiving notification of “affirmative confirmation” fromthe telephone line 7201 in user verification, the dial-up router 7110sends the ICS user packet F200 to the telephone communication path 7201(Step S1930), and when the confirmation has been made that the accesscontrol apparatus 7010-1 has received the ICS user packet F200, releasesthe telephone communication path 7201 and hangs up(Step S1931), thuscompleting the above-described series of processes for the dial-uprouter.

[0403] Upon receiving the ICS user packet F200, the access controlapparatus 7010-1 uses the conversion table 7013-1 under administrationof the processing device 7012-1, generating an ICS network packet F301,which is sent out into the ICS network communication line 7301 withinthe ICS 7100. In the present embodiment, the transmitting ICS networkaddress for the ICS network packet F301 is “7501” which is a networkaddress appropriated to the ICS logic terminal within the line portion7011-1, and the receiving ICS network address is “8601” appropriated tothe ICS logic terminal within the access control apparatus 7010-2. TheICS network packet F301 is transferred across the ICS 7100 and reachesthe access control apparatus 7010-2, where it is reverselyICS-encapsulated and reaches the user 7410-1 with the ICS user address“3601” via the user logic communication line 7601.

[0404] In the above description, in the event that a telephonecommunication path 7202 called by the telephone number “03-2222-2222” isestablished between the dial-up router 7110 and the line portion 7011-1of the access control apparatus 7010-1, the ICS user packet F200 istransferred from the dial-up router 7110 to the line portion 7011-1 viathe telephone communication path 7202. In this case also, upon receivingthe ICS user packet F200, the access control apparatus 7010-1 performsthe ICS encapsulation to generate an ICS network packet F302, which issent out into the ICS network communication line 7301 within the ICS7100. Now, the transmitting user address for the ICS user packet F302 is“7502”, and the receiving ICS user address, “8601”.

[0405] Also, in the event that a telephone communication path 7203called by the telephone number “03-3333-3333” is established between thedial-up router 7110 and the line portion 7011-3 of the access controlapparatus 7010-3, the ICS user packet F200 is transferred from thedial-up router 7110 to the line portion 7011-3 via the telephonecommunication path 7203. In this case, upon receiving the ICS userpacket F200, the access control apparatus 7010-3 performs the ICSencapsulation to generate an ICS network packet F303, which is sent outinto the ICS network communication line 7303 within the ICS 7100. Inthis case, the transmitting user address for the ICS user packet F303 is“7800” which is a network address provided to an ICS logic terminalwithin the line portion 7011-3, and the receiving ICS user address is“8601”, which is a network address provided to an ICS logic terminalwithin the line portion 7010-2. The ICS network packet F303 istransferred across the ICS 7100 and reaches the access control apparatus7010-2, where it is reversely ICS-encapsulated and reaches the user7410-1 with the ICS user address “3601” via the user logic communicationline 7601.

Embodiment-7 (ICS Address Name Administration Server)

[0406] In the present embodiment shown in FIG. 60, ICS address nameadministration servers 13000-1, 13000-2, 13000-3 and 13000-4 within theICS 13000-1 are respectively connected to access control apparatuses13010-1, 13010-2, 13010-3 and 13010-4. The ICS address nameadministration server 13000-1 has a processing device 130001-1, acorrelation table 13002-1 and an ICS name converting table 13003-1, andfurther is appropriated an ICS network address “9801” which can beuniquely distinguished within the ICS.

[0407] The other ICS address name administration servers 13000-2,13000-3 and 13000-4 also have the same capabilities as the ICS addressname administration server 13000-1, each containing a processing device,a correlation table and an ICS name conversion table, each having therespective ICS network addresses “9802”, “9803” and “9804”, eachcommunicating one with another using ICS network communicationfunctions, and each capable of exchanging the information that anotherICS address name administration server has. The ICS address name VANrepresentative administration server 13020-1 has an ICS network address“9805”, and another ICS address name VAN representative administrationserver 13020-2 has an ICS network address “9806”, these communicatingwith a great many ICS address name administration servers and other ICSaddress name VAN representative administration servers using ICS networkcommunication functions, and each capable of exchanging the informationthat each other has. The ICS address name VAN representativeadministration server 13020-1 has a processing device 13031-1 and adatabase 13032-1, performs exchange of the information such as ICSaddresses and ICS names with all ICS address name administration serverswithin the VAN 13000-1, the collected data relating to the ICS addressesand ICS names is stored in the database 13032-1. Hence the ICS addressname VAN representative administration server 13020-1 represents the VAN13030-1 by means of performing the above procedures.

[0408] The above ICS address name VAN administration server 13020-1includes a processing device, a correlation table and an ICS nameconversion table, and another embodiment may be formed by grouping thecorrelation table and the ICS name conversion table into a single table,in which case one of the ICS user addresses contained in both of thesetwo types of tables is used.

Embodiment-8 (Full-Duplex Communication Including SatelliteCommunication Path: Part 1)

[0409] <<Configuration of User, Data Providing Corporation,Communication Satellite, etc.>>

[0410] The present embodiment performs a type of full-duplexcommunication by combining a satellite's transmitting functions and IPcommunication functions. In the present embodiment, “IP terminal”indicates a terminal or computer which has functions of sending andreceiving IP packets.

[0411] Description will be made with reference to FIG. 61. The presentembodiment is comprised of: ICS 16000-1; access control apparatuses16100-1, 16110-1 and 16120-1; data providing corporation 16200-1; IPterminal 16210-1 of the data providing corporation; satellitetransmission corporation 16300-1; IP terminal 16310-1 of the satellitetransmission corporation; database 16320-1 of the satellite transmissioncorporation; satellite transmission equipment 16330-1 of the satellitetransmission corporation; communication satellite 16400-1; users16500-1, 16510-1 and 16520-1; IP terminals 16501-1, 16511-1 and 16521-1of each user; satellite receivers 16502-1, 16512-1 and 16522-1 of eachuser; satellite electric wave communication lines 16600-1, 16610-1,16620-1 and 16630-1; and user logic communication lines 16710-1,16720-1, 16730-1 and 16740-1. The IP terminals 16210-1, 16501-1, 16511-1and 16521-1 each have ICS user addresses “3000”, “2300”, “2400” and“2500”, respectively, and are respectively connected to the accesscontrol apparatuses 16100-1, 16120-1, 16120-1 and 16110-1, via userlogic communication lines. The IP terminal 16310-1 can be classified asan ICS network server, having an ICS special number “4300”, andconnected to the access control apparatus 16100-1 via the ICS networkcommunication line within the ICS 16000-1. Electric wave transmittedfrom the satellite transmitter 16330-1 transfer information via thesatellite electric wave communication path 16600-1, the electric wave isreceived by satellite receivers 16502-1, 16512-1 and 16522-1, thereceived data being delivered to the IP terminals 16501-1, 16511-1 and16521-1. The present embodiment is characterized by the satellitetransmission corporation 16300-1 having satellite communicationfunctions.

[0412] <<Preparation: Description of Conventional Art>>

[0413] In order to describe the present embodiment, first, known TCP andUDP communication technology will be explained. FIG. 62 is an example offull-duplex communication using TCP, wherein a communicating party 1sends a synchronous packet #1, and a communicating party 2 returns aconfirming packet #2 upon receiving the first packet. Communicationprocedures wherein such packets #1 and #2 are sent and received isreferred to as TCP connection establishment phase. Next, bothcommunicating parties send or receive packets #3-1, #3-2, #3-3 and #3-4,and communication procedures wherein such sending and receiving ofpackets is performed is referred to as TCP data transfer phase. Finally,a final packet #4 is sent and a confirming packet #5 is returned toconfirm the reception of the packet. Communication procedures whereinsuch packets #4 and #5 are sent and received is referred to as TCPconnection ending phase. Besides the above TCP communication procedures,there are communication procedures called UDP, comprised of datatransfer alone. An example is shown in FIG. 62, UDP is characterized incomparison with TCP by the absence of the TCP connection establishmentand connection ending phases.

[0414] The communication procedures according to the present embodimentwill be made with reference to FIGS. 61 and 63. In the followingprocedures, the aforementioned TCP technology full-duplex communicationis employed except for the cases of transmission instruction tosatellite transmission equipment (#6 and #14 in FIG. 63) and “datatransmission” using electric wave from the satellite transmissionequipment (#7 and #15 in FIG. 63), however, only the TCP data transferphase is shown in FIG. 63, and the TCP connection establishment phaseand TCP connection ending phase are omitted from the drawing and fromdescription thereof The IP terminal 16210-1 of the data providingcorporation 16200-1 obtains “data to be provided” from the database16220-1 thereof and sends it to the IP terminal 16310-1 of the satellitetransmission corporation 16300-1 which can be identified by the ICSspecial number “4300”, using the IP frame transmission functions of theICS (#1 in FIG. 63, the same hereafter). The satellite transmissioncorporation 16300-1 stores the received “data to be provided” in itsdatabase 16320-1. The IP terminal 16501-1 of the user 16500-1 sends an“inquiry packet” to the IP terminal 16210-1 which can be identified withthe ICS user address “3000” (#2). The IP terminal 16210-1 returns a“reply packet” (#3), the IP terminal 16501-1 receives this “replypacket”, and then sends a “request packet” to the IP terminal16210-1(#4). When the IP terminal 16210-1 receives the “request packet”,it sends a “transmission instruction packet” to the IP terminal 16310-1(#5). When the IP terminal 16310-1 receives the “instruction packet”, itinstructs transmission of the “data to be provided” saved in thedatabase 16220-1(#6). The satellite transmission equipment 16330-1 emitsthe “data to be provided” as electric wave toward the communicationsatellite 16400-1 (first half of #7), the communication satellite16400-1 amplifies the received “data to be provided” and emits it(latter half of #7), the satellite receiving equipment 16502-1 receivesthe “data to be provided” as electric wave, and hands it to the IPterminal 16501-1. Thus, the IP terminal 16501-1 obtains the “data to beprovided” via the communication satellite 16400-1, and sends a“reception confirmation packet” to the IP terminal 16210-1 of thecorporation 16200-1 providing the “data to be provided” (#8). Next, theIP terminal 16210-1 sends a “reception confirmation packet” to the IPterminal 16310-1 of the satellite transmission corporation 16300-1 (#9).In the above procedures, #1, #2, #3, #4, #5, #8 and #9 use theabove-described TCP communication technology, and the TCP data transferphase alone is shown and described.

[0415] Next, the procedures #10, #11, #12, #13, #14, #15, #16 and #17shown in FIG. 63 are almost the same as the above procedures, thedifference in this example being that instead of the user 16500-1, theIP terminal 16501-1 and the satellite receiving equipment 16502-1,another user 16510-1, IP terminal 16511-1 and satellite receivingequipment 16512-1 are used, and the present embodiment is capable oftransferring “data to be provided” to a plurality of users.

[0416] The above-described communication procedures shall be describedwith reference to FIG. 64. The sending of an “inquiry packet” (#2),returning a “reply packet” (#3), sending of a “request packet” (#4),“data transmission” by satellite communication(#7), and sending“reception confirmation packet” (#8) in FIG. 64 corresponds with thesending of an “inquiry packet” (#2), returning a “reply packet” (#3),sending of a “request packet” (#4), “data transmission” by satellitecommunication(#7), and sending “reception confirmation packet” (#8) inFIG. 63. From the above description, in the event that the satellitecommunication corporation 16300-1 and the data providing corporation16200-1 are viewed as an integrated communication function unit(hereafter referred to as an “integrated communication entity”). Theuser in FIG. 64 can be considered to be performing full-duplexcommunication with the aforementioned integrated communication entity.

[0417] <<Variation on Above Embodiment>>

[0418] Next, a variation of the above embodiment wherein only a portionof the communication procedures has been changed shall be described withreference to FIGS. 61 and 65.

[0419] First, the IP terminal 16501-1 of the user 16500-1 sends an“inquiry packet” to the IP terminal 16210-1 which can be identified withthe ICS user address “3000” (#1 in FIG. 65: the same hereafter). The IPterminal 16210-1 returns a “reply packet” (#2), the IP terminal 16510-1receives the “reply packet”, and then sends a “request packet” to the IPterminal 16210-1(#3). When the IP terminal 16210-1 receives the “requestpacket”, it sends “data to be provided” from the database 16220-1thereof to the IP terminal 16310-1 which can be identified by the ICSspecial number “4300” (#4), and also sends a “transmission instructionpacket” to the IP terminal 16310-1(#5).

[0420] The satellite transmission corporation 16300-1 stores thereceived “data to be provided” in its database 16320-1, and instructstransmission of the saved “data to be provided” (#6). The satellitetransmission equipment 16330-1 emits the “data to be provided” aselectric wave toward the communication satellite 16400-1 (first half of#7), the communication satellite 16400-1 amplifies the received “data tobe provided” and emits it (latter half of #7), the satellite receivingequipment 16502-1 receives the “data to be provided” as electric wave,and hands it to the IP terminal 16501-1. Thus, the IP terminal 16501-1obtains the “data to be provided” via the communication satellite16400-1, and sends a “reception confirmation packet” to the IP terminal16210-1 of the corporation 16200-1 providing the “data to be provided”(#8). Next, the IP terminal 16210-1 sends a “reception confirmationpacket” to the IP terminal 16310-1 of the satellite transmissioncorporation 16300-1(#9). Next, the procedures #10, #11, #12, #13, #14,#15, #16, #17 and #18 are almost the same as the above procedures, thedifference in this example being that instead of the user 16500-1, theIP terminal 16501-1 and satellite receiving equipment 16502-1, anotheruser 16510-1, IP terminal 16511-1 and satellite receiving equipment16512-1 are used.

[0421] <<Another Variation on Above Embodiment>>

[0422] In the above two embodiments, TCP technology full-duplexcommunication is employed, and only the TCP data transfer phase is shownin the figures, with the TCP connection establishment phase and TCPconnection ending phase being omitted from the drawings and fromdescription thereof In the embodiment to be described now, UDPcommunication technology described in FIG. 62 is applied to a part or toall, and part or all of the packet sending and receiving using the TCPdata transfer phase technique is replaced with packet sending andreceiving using the UDP data transfer phase technique. <<Anothervariation on above embodiment>>Another version will be described withreference to FIG. 66. In FIG. 61, the satellite transmission corporation16300-1, the IP terminal 16310-1 of the satellite transmissioncorporation, the database 16320-1 of the satellite transmissioncorporation, and satellite transmission equipment 16330-1 of thesatellite transmission corporation are each within the ICS 16000-1, theIP terminal 16310-1 being provided with an ICS special number “4300”. Ascompared to this, in the example shown in FIG. 66, the satellitetransmission corporation 16300-2, the IP terminal 16310-2 of thesatellite transmission corporation, the database 16320-2 of thesatellite transmission corporation, and the satellite transmissionequipment 16330-2 of the satellite transmission corporation are eachoutside of the ICS 16000-2, the IP terminal 16310-2 being provided withan ICS user address “3900”. The data providing corporation 16200-1 andusers 16500-1, 16510-1, 16520-1 are capable of sending and receiving ofIP packets completely regardless of whether the other party has an ICSuser address or an ICS special number, so sending and receiving of IPframes can be performed in combination with satellite communication withthe example in FIG. 66 just as with that in FIG. 61.

Embodiment-9 (Full-Duplex Communication Including SatelliteCommunication Path: Part 2)

[0423] The present embodiment is another variation of Embodiment-S, withdescription being made with reference to FIGS. 61 and 66. The dataproviding corporation 16200-1, the satellite transmission corporation16300-1, the user 16500-1, etc. are the same; only the communicationprocedures are different. Also, TCP technology full-duplex communicationwill be employed, but FIG. 67 only illustrates the TCP data transferphase.

[0424] The IP terminal 16210-1 of the data providing corporation 16200-1obtains “data to be provided” from the database 16220-1 thereof andsends this to the IP terminal 16310-1 of the satellite transmissioncorporation 16300-1 which can be identified by the ICS special number“4300”, using the IP frame transmission functions of the ICS (#1 in FIG.67, the same hereafter). The satellite transmission corporation 16300-1stores the received “data to be provided” in its database 16320-1. Next,the IP terminal 16210-1 of the data providing corporation 16200-1 sendsa “transmission notification frame” to the IP terminal 16501-1 of theuser 16500-1(#2). Upon receiving the “transmission notification packet”,the IP terminal 16501-1 returns a “transmission consent packet” to theIP terminal 16210-1(#3). When the IP terminal 16210-1 receives the“transmission consent packet”, it sends a “transmission instructionpacket” to the IP terminal 16310-1(#4). When the IP terminal 16310-1 ofthe satellite transmission corporation 16300-1 receives the“transmission instruction packet”, it instructs transmission of the“data to be provided” saved in the database 16220-1(#5). The satellitetransmission equipment 16330-1 emits the “data to be provided” aselectric wave toward the communication satellite 16400-1(first half of#6), the communication satellite 16400-1 amplifies the received “data tobe provided” and emits it(latter half of #6), the satellite receivingequipment 16502-1 receives the “data to be provided” as electric wave,and hands it to the IP terminal 16501-1. Thus, the IP terminal 16501-1obtains the “data to be provided” via the communication satellite16400-1, and sends a “reception confirmation packet” to the IP terminal16210-1 of the data providing corporation 16200-1 providing the “data tobe provided” (#7).

[0425] The above-described communication procedures shall be describedwith reference to FIG. 68. The sending of a “transmission notificationpacket” (#2), the returning of a “transmission consent packet” (#3),“data transmission” by satellite communication (#6), and the sending of“reception confirmation packet” (#7) in FIG. 68 correspond with thesending of an “transmission notification frame” (#2), the returning of a“transmission consent packet” (#3), “data transmission” by satellitecommunication(#6), and the sending of “reception confirmation packet”(#7) in FIG. 67□respectively. From the above description, in the eventthat the satellite communication corporation 16300-1 and the dataproviding corporation 16200-1 are viewed as an integrated communicationfunction unit (hereafter referred to as an “integrated communicationentity”), the user 16500-1 in FIG. 68 can be considered to be performingfull-duplex communication with the aforementioned integratedcommunication entity.

[0426] <<Another Variation on Above Embodiment>>

[0427] Next, a variation of the above embodiment wherein only a portionof the communication procedures has been changed shall be described withreference to FIGS. 61 and 69. The IP terminal 16210-1 of the dataproviding corporation 16200-1 sends a “transmission notification packet”to the IP terminal 16501-1 of the user 16500-1 (#1 in FIG. 69: the samehereafter). Upon receiving the “transmission notification packet”, theIP terminal 16501-1 returns a “transmission consent packet” to the IPterminal 16210-1(#2). When the IP terminal 16210-1 receives the“transmission consent packet”, it obtains “data to be provided” from thedatabase 16220-1 thereof and sends this to the IP terminal 16310-1 ofthe satellite transmission corporation 16300-1 which can be identifiedby the ICS special number “4300” (#3) and further sends a “transmissioninstruction packet” to the IP terminal 16310-1(#4). When the IP terminal16310-1 of the satellite transmission corporation 16300-1 receives the“transmission instruction packet”, it instructs transmission of the“data to be provided” saved in the database 16220-1(#5). The subsequentcommunication procedures are the same as those described above.

[0428] <<Another Variation on Above Embodiment>>

[0429] In the above two embodiments, TCP technology full-duplexcommunication is employed, and only the TCP data transfer phase is shownin the figures, with the TCP connection establishment phase and the TCPconnection ending phase being omitted from the drawings and from thedescription thereof In the embodiment to be described now, UDPcommunication technology described in FIG. 62 is applied to a part or toall, and part or all of the packet sending and receiving using the TCPdata transfer phase technique is replaced with packet sending andreceiving using the UDP data transfer phase technique.

[0430] <<Another Variation on Above Embodiment>>

[0431] Another version will be described with reference to FIG. 66. InFIG. 61, the satellite transmission corporation 16300-1, the IP terminal16310-1 of the satellite transmission corporation, the database 16320-1of the satellite transmission corporation, and the satellitetransmission equipment 16330-1 of the satellite transmission corporationare each within the ICS 16000-1, the IP terminal 16310-1 being providedwith an ICS special number “4300”. As compared to this, in the exampleshown in FIG. 66, the satellite transmission corporation 16300-2, the IPterminal 16310-2 of the satellite transmission corporation, the database16320-2 of the satellite transmission corporation, and the satellitetransmission equipment 16330-2 of the satellite transmission corporationare each outside of the ICS 16000-2, the IP terminal 16310-2 beingprovided with an ICS user address “3900”.

Embodiment-10 (Full-Duplex Communication Including SatelliteCommunication Path: Part 3)

[0432] The present embodiment is another variation of Embodiment-8, andwill be described with reference to FIGS. 61 and 70. The data providingcorporation 16200-1, the satellite transmitting corporation 16300-1, theuser 16500-1 are the same, with only the communication procedures beingdifferent. The present embodiment performs the full-duplex communicationof TCP technology, but only the TCP data transfer phase is shown in FIG.70.

[0433] The IP terminal 16210-1 of the data providing corporation 16200-1carries out a scheduled notification, i.e., sends a “plan notificationpacket” to each of the following: the IP terminal 16501-1 having an ICSuser address “2300”, ICS user address “2400” (16511-1), and ICS useraddress “2500” (16521-1) (#1 in FIG. 70: the same hereafter). Next, theIP terminal 16210-1 of the data providing corporation 16200-1 obtains“data to be provided” from the database 16220-1 thereof and sends thisto the IP terminal 16310-1 of the satellite transmission corporation16300-1 which can be identified by the ICS special number “4300”, usingthe IP frame transfer functions of the ICS(#2). The satellitetransmission corporation 16300-1 stores the received “data to beprovided” in its database 16320-1, and also instructs transmission ofthe “data to be provided” (#3). The satellite transmission equipment16330-1 emits the “data to be provided” as electric wave toward thecommunication satellite 16400-1(first half of #4), the communicationsatellite 16400-1 amplifies the received “data to be provided” and emitsit(latter half of #4), the satellite receiving equipment 16502-1receives the “data to be provided” as electric wave, and hands it to theIP terminal 16501-1.

[0434] Thus, the IP terminal 16501-1 obtains the “data to be provided”via the communication satellite 16400-1, and sends an “individual reportpacket” to the IP terminal 16210-1(#5-1). Using the same communicationprocedures, the IP terminal 16511 -1 obtains the “data to be provided”,and sends an “individual report packet” to the IP terminal16210-1(#5-2). The IP terminal 16521-1 also obtains the “data to beprovided”, and sends an “individual report packet” to the IP terminal16210-1(#5-3). The IP terminal 16210-1 sends an “individual inquirypacket” to the IP terminal 16511-1 of the user 16510-1(#6), and the IPterminal 16511-1 returns an “individual reply packet” to the IP terminal16210-1(#7).

[0435] The above-described communication procedures will be describedwith reference to FIG. 71. The sending of the “plan notification frame”(#1), “data transmission” by satellite communication(#4), the sending of“individual report packet” (#5-2), the sending of “individual inquirypacket” (#6), and the returning of “individual reply packet” (#7) inFIG. 71 correspond with the sending of the “plan notification packet”(#1), “data transmission” by satellite communication(#4), the sending of“individual report frame” (#5-2), the sending of “individual inquiryframe” (#6), and the returning of “individual reply frame” (#7) in FIG.70, respectively. From the above description, in the event that thesatellite communication corporation 16300-1 and the data providingcorporation 16200-1 are viewed as an integrated communication entity,the user 16500-1 in FIG. 67 can be considered to be performingfull-duplex communication with the aforementioned integratedcommunication entity.

[0436] <<Another Variation on Above Embodiment>>

[0437] In each of the above embodiments, the full-duplex communicationof TCP technology is employed, and only the TCP data transfer phase isshown in the figures, with the TCP connection establishment phase andTCP connection ending phase being omitted from the drawings and from thedescription thereof. In the embodiment to be described now, UDPcommunication technology described in FIG. 62 is applied to a part or toall, and part or all of the packet sending and receiving using the TCPdata transfer phase technique is replaced with packet sending andreceiving using the UDP data transfer phase technique.

[0438] <<Another Variation on Above Embodiment>>

[0439] Another version will be described with reference to FIG. 66. InFIG. 61, the satellite transmission corporation 16300-1, the IP terminal16310-1 of the satellite transmission corporation, the database 16320-1of the satellite transmission corporation, and the satellitetransmission equipment 16330-1 of the satellite transmission corporationare each within the ICS 16000-1, the IP terminal 16310-1 being providedwith an ICS special number “4300”. As compared to this, in the exampleshown in FIG. 66, the satellite transmission corporation 16300-2, the IPterminal 16310-2 of the satellite transmission corporation, the database16320-2 of the satellite transmission corporation, and the satellitetransmission equipment 16330-2 of the satellite transmission corporationare each outside of the ICS 16000-2, the IP terminal 16310-2 beingprovided with an ICS user address “3900”.

Embodiment-11 (Full-Duplex Communication Including SatelliteCommunication Path: Part 4)

[0440] The present embodiment is another variation of Embodiment-8, andwill be described with reference to FIGS. 61 and 72. The data providingcorporation 16200-1, the satellite transmission corporation 16300-1, theuser 16500-1 are the same, with only the communication procedures beingdifferent. The present embodiment performs the full-duplex communicationof TCP technology, but only the TCP data transfer phase is shown in FIG.72.

[0441] The IP terminal 16210-1 of the data providing corporation 16200-1obtains “data to be provided” from the database 16220-1 thereof andsends this to the IP terminal 16310-1 of the satellite transmissioncorporation 16300-1 which can be identified by the ICS special number“4300”, using the IP frame transfer functions of the ICS (#1 in FIG. 72:the same hereafter). The satellite transmission corporation 16300-1stores the received “data to be provided” in its database 16320-1.

[0442] Next, the IP terminal 16501-1 of the user 16500-1 sends an“inquiry packet” to the IP terminal 16310-1 which can be identified withthe ICS user address “4300” (#2). The IP terminal 16310-1 returns a“reply packet” (#3), the IP terminal 16510-1 receives the “replypacket”, and then sends a “request packet” to the IP terminal16310-1(#4). When the IP terminal 16310-1 receives the “request packet”,it instructs satellite transmission equipment to transmit the “data tobe provided” saved in the database 16300-1(#5). The satellitetransmission equipment 16330-1 emits the “data to be provided” aselectric wave toward the communication satellite 16400-1 (first half of#6), the communication satellite 16400-1 amplifies the received “data tobe provided” and emits it (latter half of #6), the satellite receivingequipment 16502-1 receives the “data to be provided” as electric wave,and hands it to the IP terminal 16501-1. Thus, the IP terminal 16501-1obtains the “data to be provided” via the communication satellite16400-1, and sends a “reception confirmation packet” to the IP terminal16310-1 of the data providing corporation 16200-1 providing the “data tobe provided” (#7). In the above procedures, #1, #2, #3, #4 and #7 usethe above-described TCP communication technology, and the TCP datatransfer phases alone are shown and described. Next, the procedures #8,#9, #10, #11, #12 and #13 shown in FIG. 72 are almost the same as theabove procedures, the difference in this example being that instead ofthe user 16500-1, the IP terminal 16501-1, and the satellite receivingequipment 16502-1, another corporation 16510-1, IP terminal 16511-1, andsatellite receiving equipment 16512-1 are used.

[0443] The above-described communication procedures shall be describedwith reference to FIG. 64. The sending of an “inquiry packet” (#2), thereturning of a “reply packet” (#3), the sending of a “request packet”(#4), “data transmission” by satellite communication(#7), and thesending of “reception confirmation packet” (#8) in FIG. 64 correspondwith the sending of an “inquiry packet” (#2), the returning of a “replypacket” (#3), the sending of a “request packet” (#4), “datatransmission” by satellite communication(#7), and the sending “receptionconfirmation packet” (#8) in FIG. 72, respectively. From the abovedescription, in the event that the satellite communication corporation16300-1 and the data providing corporation 16200-1 are viewed as anintegrated communication entity, the user 16500-1 in FIG. 64 can beconsidered to be performing full-duplex communication with theaforementioned integrated communication entity.

[0444] <<Another Variation on Above Embodiment>>

[0445] In the above two embodiments, the full-duplex communication ofTCP technology is employed, and only the TCP data transfer phase isshown in the figures, with the TCP connection establishment phase andTCP connection ending phase being omitted from the drawings and from thedescription thereof. In the embodiment to be described now, UDPcommunication technology described in FIG. 62 is applied to a part or toall, and part or all of the packet sending and receiving using the TCPdata transfer phase technique is replaced with packet sending andreceiving using the UDP data transfer phase technique.

[0446] <<Another Variation on Above Embodiment>>

[0447] Another version will be described with reference to FIG. 66. InFIG. 61, the satellite transmission corporation 16300-1, the IP terminal16310-1 of the satellite transmission corporation, the database 16320-1of the satellite transmission corporation, and the satellitetransmission equipment 16330-1 of the satellite transmission corporationare each within the ICS 16000-1, the IP terminal 16310-1 being providedwith an ICS special number “4300”. As compared to this, in the exampleshown in FIG. 66, the satellite transmission corporation 16300-2, the IPterminal 16310-2 of the satellite transmission corporation, the database16320-2 of the satellite transmission corporation, and the satellitetransmission equipment 16330-2 of the satellite transmission corporationare each outside of the ICS 16000-2, the IP terminal 16310-2 beingprovided with an ICS user address “3900”.

Embodiment-12 (Full-Duplex Communication Including SatelliteCommunication Path: Part 5)

[0448] The present embodiment performs a type of full-duplexcommunication by combining a satellite transmission function and an IPcommunication function. A major difference between the presentembodiment and Embodiment-8 is the fact that the satellite receivingequipment is within the access control apparatus in the presentembodiment.

[0449] Description will be made with reference to FIG. 73. The presentembodiment is comprised of an ICS 16000-3; access control apparatuses16100-3, 16110-3 and 16120-3; satellite reception equipments 16102-3,16112-3 and 16122-3; a data providing corporation 16200-3; an IPterminal 16210-3 of the data providing corporation; a satellitetransmission corporation 16300-3; an IP terminal 16310-3 of thesatellite transmission corporation; a database 16320-3 of the satellitetransmission corporation; a satellite transmission equipment 16330-3 ofthe satellite transmission corporation; a communication satellite16400-3; users 16500-3, 16510-3 and 16520-3; IP terminals 16501-3,16511-3 and 16521-3 of each user; satellite airwaves communication lines16600-3, 16610-3, 16620-3 and 16630-3; and user logic communicationlines 16710-3, 16720-3, 16730-3 and 16740-3. The IP terminals 16210-3,16501-3, 16511-3 and 16521-3 each have ICS user addresses “3000”,“2300”, “2400” and “2500”, respectively and are respectively connectedto the access control apparatuses 16100-3, 16120-3, 16120-3 and 16110-3,via user logic communication lines. The IP terminal 16310-3 can beclassified as an ICS network server, having an ICS special number“4300”, and connected to the access control apparatus 16100-3 via theICS network communications line within the ICS 16000-3. Electric wavetransmitted from the satellite transmitter 16330-3 transfers informationvia the satellite electric wave communication path 16630-3, the electricwave is received by satellite receivers 16102-3, 16112-3 and 16122-3.

[0450] <<Example of Communication Procedures>>

[0451] The communication procedures according to the present embodimentwill be made with reference to FIGS. 73 and 74. In the followingprocedures, the aforementioned full-duplex communication of TCPtechnology is employed except for the cases of transmission instructionto satellite transmission equipment (#5 and #12 in FIG. 74) and “datatransmission” using electric wave from the satellite transmissionequipment (#6 and #13 in FIG. 74), however, only the TCP data transferphase is shown in FIG. 74.

[0452] The IP terminal 16210-3 of the data providing corporation 16200-3obtains “data to be provided” from the database 16220-3 thereof andsends this to the IP terminal 16310-3 of the satellite transmissioncorporation 16300-3 which can be identified by the ICS special number“4300”, using the IP packet transfer function of the ICS (#1 in FIG. 74,the same hereafter). The satellite transmission corporation 16300-3stores the received “data to be provided” in its database 16320-3. TheIP terminal 16501-3 of the user 16500-3 sends an “inquiry packet” to theIP terminal 16310-3 which can be identified with the ICS user address“4300” (#2). The IP terminal 16310-3 returns a “reply packet” (#3), theIP terminal 16501-3 receives the “reply packet”, and then sends a“request packet” to the IP terminal 16310-3 (#4). When the IP terminal16310-3 receives the “request packet”, it converts the “data to beprovided” saved in the database 16320-3 into ICS packet format andinstructs transmission thereof(#5). Here, the data portion of the ICSpacket is the “data to be provided”, and the destination ICS useraddress is address “2300” of the IP terminal 16501-3. The satellitetransmission equipment 16330-3 emits the ICS packet including “data tobe provided” as electric wave toward the communication satellite 16400-3(first half of #6), the communication satellite 16400-3 amplifies thereceived “data to be provided” and emits it (latter half of #6), thesatellite receiving equipments 16102-3, 16112-3 and 16122-3 each receivethe ICS frame including the “data to be provided” as electric wave, eachcheck the destination of the “data to be provided”, and since thedestination of the “data to be provided” is IP terminal 16501-3, theaccess control apparatus 16122-3 returns the “data to be provided”, tothe ICS user frame format, and sends it to the IP terminal 16501-3(#7).Upon receiving the “data to be provided”, the IP terminal 16501-3 sendsa “reception confirmation packet” to the IP terminal 16310-3(#8). In theabove procedures, #1, #2, #3, #4, #7 and #8 use the above-described TCPcommunication technology, and the TCP data transfer phase alone is shownand described.

[0453] Next, the procedures #9, #10, #11, #12, #13, #14 and #15 shown inFIG. 74 are almost the same as the above procedures, the difference inthis example being that instead of the user 16500-3, and the IP terminal16501-3, another company 16510-3, and IP terminal 16511-3, and thepresent embodiment is capable of transferring “data to be provided” to aplurality of users.

[0454] The above-described communication procedures shall be describedwith reference to FIG. 64. The sending of an “inquiry packet” (#2), thereturning of a “reply packet” (#3), the sending of a “request packet”(#4), “data transmission” by satellite communication(#7), and thesending of “reception confirmation packet” in FIG. 64 correspond withthe sending of an “inquiry packet” (#2), the returning of a “replypacket” (#3), the sending of a “request packet” (#4), “datatransmission” by satellite communication(#7), and the sending of“reception confirmation packet” (#8) in FIG. 74, respectively. From theabove description, in the event that the satellite communicationcorporation 16300-3 and the data providing corporation 16200-3 areviewed as an “integrated communication entity, the user in FIG. 64 canbe considered to be performing full-duplex communication with theaforementioned integrated communication entity.

[0455] <<Another Variation on Above Embodiment>>

[0456] In the above two embodiments, the full-duplex communication ofTCP technology is employed, and only the TCP data transfer phase isshown in the figures, with the TCP connection establishment phase andTCP connection ending phase being omitted from the drawings and from thedescription thereof In the embodiment to be described now, UDPcommunication technology described in FIG. 62 is applied to a part or toall, and part or all of the packet sending and receiving using the TCPdata transfer phase technique is replaced with packet sending andreceiving using the UDP data transfer phase technique.

[0457] <<Another Variation on Above Embodiment>>

[0458] Another version will be described with reference to FIG. 75. InFIG. 73, the satellite transmission corporation 16300-3, the IP terminal16310-3 of the satellite transmission corporation, the database 16320-1of the satellite transmission corporation, and the satellitetransmission equipment 16330-3 of the satellite transmission corporationare each inside the ICS 16000-3, the IP terminal 16310-3 being providedwith an ICS special number “4300”. As compared to this, in the exampleshown in FIG. 75, the satellite transmission corporation 163004, the IPterminal 16310-4 of the satellite transmission corporation, the database16320-2 of the satellite transmission corporation, and the satellitetransmission equipment 16330-4 of the satellite transmission corporationare each outside of the ICS 16000-3, the IP terminal 16310-4 beingprovided with an ICS user address “3900”.

Embodiment-13 (Control of Receiving Priority Degree)

[0459] In the control field of the IP packet shown in FIG. 3, there is atransmitting IP address and a destination IP address in addition to the“protocol type”, and in the TCP packet shown in FIG. 76 and the UDPframe shown in FIG. 77 there are defined a sender's port number and anintended receiver's port number, respectively. The 48 bits of dataconsisting of the IP address (32 bits) and the port number (16 bits)laid out is called a socket number. That is, socket number =IPaddress∥port number. In the present embodiment, the following termsshall be used: sender's socket number=sender's IP address sender's portnumber; intended receiver's socket number=intended receiver's IP address11 intended receiver's port number. The present embodiment is an exampleof controlling the degree of priority of the ICS user frame which isobtained by reaching the access control apparatus from the ICS networkcommunication line and being reversely ICS-encapsulated here, thiscontrolling the degree of priority being performed using the “protocoltype” which is displayed in the ICS user frame, and the socket numberthereof.

[0460] As shown in FIGS. 78 and 79, an ICS 17000-1 includes accesscontrol apparatuses 17100-1, 17110-1, 17120-1, 17130-1, 17140-1, 17150-1and 17160-1, and the access control apparatus 17100-1 includes a lineunit 17111-1, a processing device 17112-1 and a conversion table17113-1. Blocks 17200-1, 17210-1, 17220-1, 17230-1, 17240-1, 17250-1,17260-1, 17270-1 and 17280-1 are each corporation LANs, and are eachconnected to the ICS 17000-1 via the respective gateways 17201-1,17211-1, 17221-1, 17231-1, 17241-1, 17251-1, 17261-1, 17271-1 and17281-1. Each LAN has 2 to 3 terminals having functions for sending IPuser packet, wherein the ICS user addresses are: for within LAN 17200-1,“2600” and “2610”; for within LAN 17200-1, “2600” and “2610”; for withinLAN 17210-1, “1230” and “1240”; for within LAN 17220-1, “2700”, “2710”,and “2720”; for within LAN 17230-1, “2800” and “2810”; for within LAN17240-1, “2100” and “2110”; for within LAN 17250-1, “1200”, “1210”, and“1220”; for within LAN 17260-1, “2200” and “2210”; for within LAN17270-1, “2300” and “2310”; and for within LAN 17280-1, “2400” and“2410”. Further, blocks 17291-1 and 17292-1 are each terminals whichhave functions of sending and receiving IP user packets, respectivelyhaving ICS user addresses “2500” and “1250”, being connected to ICS17000-1.

[0461] <<Conversion Table>>

[0462] The conversion table 17113-1 within the access control apparatus17100-1 shall be described with reference to FIGS. 80 and 81. Thefunction of the conversion table is the same as those in the otherembodiments, and the present invention is characterized in that theportion table, named “degree of priority of reception” code (Code ofReceiving Priority Degree), degree of priority of protocol (PriorityDegree of Protocol), degree of priority of TCP socket (Priority Degreeof TCP Socket), and degree of priority of UDP socket (Priority Degree ofUDP Socket), which are components of the conversion table 17113-1 areused for controlling the degree of priority. In the event that thetransmitting ICS network address of the conversion table is “7821”, the“degree of priority of reception” code is stipulated to be “pr-7821”.That is, the “degree of priority of reception” code is made to be aparameter which is dependent on the ICS network address provided to theICS user logic terminal sent from the access control apparatus after theICS reverse encapsulation. Looking at the other portion table of theconversion table 17113-1, e.g., in regard to “pr-7821”, the degree ofpriority of protocol is described as being “p-1”, the degree of priorityof TCP socket as “t-1”, and the degree of priority of UDP socket as“NULL”. Here, “NULL” indicates “unspecified”. The degree of priority ofprotocol “p-1” dictates that the degree of priority is, in descendingorder, “TCP”, “UDP”, “ICPM” and “IGPM”.

[0463] Looking at even other portion table with regard to the degree ofpriority of TCP socket “t-1p”, the dictated order of degree of priorityis, in descending order, “sk-1” and “sk-7”. Looking at even otherportion table with regard to the degree of priority of UDP socket “u-1”,the dictated order of degree of priority is, in descending order, “sk-3”and “sk-8”. Further, in the contents of the socket code “sk-1” which iswritten in another portion table, “To” indicates the intended receiver'ssocket number, and indicates that the intended receiver's IP address is“2100” and that the intended receiver's port number is “30”, and in thesame manner, in the contents of the socket code “sk-2”, “From” indicatesthe sender's socket number, and indicates that the sender's IP addressis “1240” and that the sender's port number is “32”.

[0464] <<Individual Description of ICS Packet>>

[0465] The ICS network frame NF01 is sent out from the terminal 17291-1with the ICS user address “2500”, and then is ICS-encapsulated at theaccess control apparatus 17110-1 with a transmitting ICS network address“7200” and a receiving ICS network address “7821”, then is transferredwithin the ICS 17000-1 and reaches the access control apparatus 17100-1,where it is reversely ICS-encapsulated to become an ICS user frame UF01,and reaches the terminal with the ICS user address “2100” via the userlogic communication line 17821-1. The “protocol type” of the controlfield of the user packet UF01 which is within the ICS network packetNF01 is TCP, and the “intended receiver's port number” of the TCP packetis “30” in the example.

[0466] In the following, beginning with a packet NF02, brief descriptionwill be made in the order of NF03, NF04, NF05, NF06, NF07, NF08, NF09,NF10 and NF11, as shown in FIG. 78.

[0467] A frame NF02 is sent out from a terminal with the ICS useraddress “2600”, and then is ICS-encapsulated at access control apparatus17120-1 with a transmitting ICS network address “7300” and a receivingICS network address “7821”, then is transferred within the ICS and isreversely ICS-encapsulated to become a frame UF02, and reaches theterminal with the ICS user address “2110” via the user logiccommunication line 17821-1. The “protocol type” of the packet UF02 isTCP, and the “intended receiver's port number” of the TCP packet is“30”, in this example.

[0468] A frame NF03 is sent out from a terminal with the ICS useraddress “1230”, and then is ICS-encapsulated at access control apparatus17130-1 with a transmitting ICS network address “7400” and a receivingICS network address “7822”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF03, and reaches theterminal with the ICS user address “1200” via the user logiccommunication line 17822-1. The “protocol type” of the packet UF03 isTCP, and the “intended receiver's port number” of the TCP packet is“30”, in this example.

[0469] A frame NF04 is sent out from a terminal with the ICS useraddress “1240”, and then is ICS-encapsulated at access control apparatus17130-1 with a transmitting ICS network address “7400” and a receivingICS network address “7822”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF04, and reaches theterminal with the ICS user address “1210” via the user logiccommunication line 17822-1. The “protocol type” of the packet UF04 isTCP, and the “intended receiver's port number” of the TCP packet is“32”, in this example.

[0470] A frame NF05 is sent out from a terminal with the ICS useraddress “1250”, and then is ICS-encapsulated at access control apparatus17140-1 with a transmitting ICS network address “7500” and a receivingICS network address “7822”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF05, and reaches theterminal with the ICS user address “1220” via the user logiccommunication line 17822-1. The “protocol type” of the packet UF05 isTCP, and the “intended receiver's port number” thereof is “32”, in thisexample.

[0471] A frame NF06 is sent out from a terminal with the ICS useraddress “2610”, and then is ICS-encapsulated at access control apparatus17120-1 with a transmitting ICS network address “7300” and a receivingICS network address “7823”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF06, and reaches theterminal with the ICS user address “2200” via the user logiccommunication line 17823-1. The “protocol type” of the packet UF06 isUDP, and the “intended receiver's port number” of the TCP packet is“40”, in this example.

[0472] A frame NF07 is sent out from a terminal with the ICS useraddress “2700”, and then is ICS-encapsulated at access control apparatus17150-1 with a transmitting ICS network address “7600” and a receivingICS network address “7823”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF07, and reaches theterminal with the ICS user address “2210” via the user logiccommunication line 17823-1. The “protocol type” of the packet UF07 isUDP, and the “intended receiver's port number” thereof is “40”, in thisexample.

[0473] A packet NF08 is sent out from a terminal with the ICS useraddress “2710”, and then is ICS-encapsulated at access control apparatus17150-1 with a transmitting ICS network address “7600” and a receivingICS network address “7824”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF08, and reaches theterminal with the ICS user address “2300” via the user logiccommunication line 17824-1. The “protocol type” of the packet UF08 isUDP, and the “intended receiver's port number” thereof is “40”, in thisexample.

[0474] A packet NF09 is sent out from a terminal with the ICS useraddress “2800”, and then is ICS-encapsulated at access control apparatus17160-1 with a transmitting ICS network address “7700” and a receivingICS network address “7824”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF09, and reaches theterminal with the ICS user address “2310” via the user logiccommunication line 17824-1. The “protocol type” of the packet UF09 isUDP, and the “intended receiver's port number” thereof is “42”, in thisexample.

[0475] A packet NF10 is sent out from a terminal with the ICS useraddress “2720”, and then is ICS-encapsulated at access control apparatus17150-1 with a transmitting ICS network address “7600” and a receivingICS network address “7825”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF10, and reaches theterminal with the ICS user address “2400” via the user logiccommunication line 17825-1. The “protocol type” of the packet UF10 isTCP, and the “intended receiver's port number” thereof is “60”, in thisexample.

[0476] A frame NF11 is sent out from a terminal with the ICS useraddress “2810”, and then is ICS-encapsulated at access control apparatus17160-1 with a transmitting ICS network address “7700” and a receivingICS network address “7825”, then is transferred within the ICS and isreversely ICS-encapsulated to become a packet UF11, and reaches theterminal with the ICS user address “2410” via the user logiccommunication line 17825-1. The “protocol type” of the packet UF11 isUDP, and the “intended receiver's port number” thereof is “70”, in thisexample.

[0477] <<Example 1 for Determining the Degree of Priority>>

[0478] The manner in which the degree of priority is determined will bedescribed with reference to the flowchart in FIG. 82. The access controlapparatus 17100-1 receives the ICS network packets NF01 and NF02 fromthe ICS network communication line almost at the same time (Step S1000),and reversely ICS-encapsulates each to obtain ICS user packets UF01 andUF02(Step S1010). From the conversion table 17113-1 it can be known thatthe receiving ICS network address of the ICS logic terminal sendingthese ICS user packets is “7821” for both, i.e., that there is amatch(Step S1020). The “degree of priority of reception” code for bothICS network packets NF01 and NF02 is “pr-7821”, and then according toportion table of the conversion table 17113-1, the degree of priority ofprotocol for “pr-7821” is specified as being “p-1”, the degree ofpriority of TCP socket as “t-1”, and the degree of priority of UDPsocket as “NULL”. Further, looking at even other portion tablecomprising the conversion table 17113-1, the degree of priority ofprotocol “p-1” dictates that the degree of priority of is, in descendingorder, TCP, UDP, ICPM and IGPM, and with regard to the degree ofpriority of TCP socket “t1”, the dictated order of degree of priority ofis, in descending order, “sk-1” and “sk-7”, and the contents of thesocket code “sk-1” indicate that the IP address comprising the intendedreceiver's socket number is “2100” and that the intended receiver's portnumber thereof is “30”. The protocol type indicated within the ICSnetwork packet NF01 is “TCP”, the intended receiver's ID address is“2100”, and the intended receiver's port number is “30”. On the otherhand, the protocol type indicated within the ICS network packet NF02 is“TCP”, the intended receiver's ID address is “2110”, and the intendedreceiver's port number is “30”. In the present embodiment, it can beunderstood that it is the ICS network packet NF01 that has the protocoltype and intended receiver's socket number that matches with thespecifications of the aforementioned socket code “sk-1”. Based on theabove procedures, it is determined that the ICS network packet to besent out with higher priority is NF01(Step S1030). Next, this ICSnetwork packet NF01 is sent out to the user logic terminal via the ICSlogic terminal (Step S1040).

[0479] <<Example 2 for Determining the Degree of Priority>>

[0480] The access control apparatus 17100-1 receives the ICS networkframes NF03, NF04 and NFO5 from the ICS network communication linealmost at the same time(Step S1000), and reversely ICS-encapsulates eachto obtain ICS user packets UF03, UF04 and UF05(Step S1010). From theconversion table 17113-1 it can be known that the receiving ICS networkaddress of the ICS logic terminal sending these ICS user packets is“7822” for all, i.e., that there is a match (Step S1020). The “degree ofpriority of reception” code for all of the ICS network packets NF03,NF04 and NF05 is “pr-7822”, the degree of priority of protocol thereofis specified as being “P-1”, the degree of priority of TCP socket as“t-2”, and the degree of priority of UDP socket as “NULL”. The contentsof the degree of priority of protocol “p-1” dictates that TCP has thehighest degree of priority, and with regard to the degree of priority ofTCP socket “t-2”, “sk-2” has the highest degree of priority, and thecontents of the socket code “sk-2” indicate that the IP addresscomprising the sender's socket number is “2100” and that the sender'sport number thereof is “30”. The protocol type indicated within the ICSnetwork packet NF03 is “TCP”, the sender's ID address is “1230”, and thesender's port number is “30”. The protocol type indicated within the ICSnetwork packet NF04 is “TCP”, the sender's ID address is “1240”, and thesender's port number is “32”. Also, the protocol type indicated withinthe ICS network packet NF05 is “TCP”, the sender's ID address is “1250”,and the sender's port number is “32”. In the present embodiment, it canbe understood that it is the ICS network packet NF04 that has theprotocol type and the intended receiver's socket number that matcheswith the specifications of the aforementioned socket code “sk-2”. Basedon the above procedures, it is determined that the ICS network packet tobe sent out, with higher priority is NF04 (Step S1030). Next, this ICSnetwork packet NF04 is sent out to the user logic terminal via the ICSlogic terminal (Step S1040).

[0481] <<Example 3 for Determining the Degree of Priority>>

[0482] The access control apparatus 17100-1 receives the ICS networkpackets NF06 and NF07 from the ICS network communication line almost atthe same time (Step S1000), and reversely ICS-encapsulates each toobtain ICS user packets UF06 and UF07 (Step S1010). From the conversiontable 17113-1 it can be known that the receiving ICS network address ofthe ICS logic terminal sending these ICS user packets is “7823” forboth, i.e., that there is a match (Step S1020). The “degree of priorityof reception” code for both ICS network packets NF06 and NF07 is“pr-7823”, and the degree of priority of protocol is specified as being“p-2”, the degree of priority of TCP socket as “NULL”, and the degree ofpriority of UDP socket as “u-1”. Further, looking at even other portiontable comprising the conversion table 17113-1, the degree of priority ofprotocol “p-2” dictates that the degree of priority is, in descendingorder, UDP, TCP, ICPM and IGPM, and with regard to the degree ofpriority of UDP socket “u-1”, the dictated order of degree of priorityis, in descending order, “sk-3” and “sk-8”, and the contents of thesocket code “sk-3” indicate that the IP address comprising the intendedreceiver's socket number is “2200” and that the intended receiver's portnumber thereof is “40”. The protocol type indicated within the ICSnetwork packet NF06 is “UDP”, the intended receiver's ID address is“2200”, and the intended receiver's port number is “40”. On the otherhand, the protocol type indicated within the ICS network packet NF07 is“UDP”, the intended receiver's ID address is “2110”, and the intendedreceiver's port number is “40”. In the present embodiment, it can beunderstood that it is the ICS network packet NF06 that has the protocoltype and the intended receiver's socket number that matches with thespecifications of the aforementioned socket code “sk-3”. Based on theabove procedures, it is determined that the ICS network packet to besent out with higher priority is NF06 (Step S1030). Next, this ICSnetwork packet NF06 is sent out to the user logic terminal via the ICSlogic terminal (Step S1040).

[0483] <<Example 4 for Determining the Degree of Priority>>

[0484] The access control apparatus 17100-1 receives the ICS networkpackets NF08 and NF09 from the ICS network communication line almost atthe same time (Step S1000), and reversely ICS-encapsulates each toobtain ICS user packets UF08 and UF09 (Step S1010). From the conversiontable 17113-1 it can be known that the receiving ICS network address ofthe ICS logic terminal sending these ICS user packets is “7824” forboth, i.e., that there is a match (Step S1020). The “degree of priorityof reception” code for both ICS network packets NF08 and NF09 is“pr-7824”, and the degree of priority of protocol is specified as being“p-2”, the degree of priority of TCP socket as “NULL”, and the degree ofpriority of UDP socket as “u-2”. The degree of priority of UDP socket“u-2” dictates that socket code “sk-4” has the highest priority, and thecontents of the socket signal “sk-4” indicate that the IP addresscomprising the sender's socket number is “2710” and that the sender'sport number thereof is “40”. The protocol type indicated within the ICSnetwork packet NF08 is “UDP”, the sender's ID address is “2710”, and thesender's port number is “40”. On the other hand, the protocol typeindicated within the ICS network packet NF09 is “UDP”, the sender's IDaddress is “2800”, and the sender's port number is “42”. In the presentembodiment, it can be understood that it is the ICS network packet NF08that has the protocol type and the sender's socket number that matcheswith the specifications of the aforementioned socket code “sk-4”. Basedon the above procedures, it is determined that the ICS network packet tobe sent out with higher priority is NF08 (Step S1030). Next, this ICSnetwork packet NF08 is sent out to the user logic terminal via the ICSlogic terminal (Step S1040).

[0485] <<Example 5 for Determining the Degree of Priority>>

[0486] The access control apparatus 17100-1 receives the ICS networkframes NF10 and NF11 from the ICS network communication line almost atthe same time (Step S1000), and reversely ICS-encapsulates each toobtain ICS user packets UF10 and UF11 (Step S1010). From the conversiontable 17113-1 it can be known that the receiving ICS network address ofthe ICS logic terminal sending these ICS user packets is “7825” forboth, i.e., that there is a match (Step S1020). The “degree of priorityof reception” code for both ICS network packets NF10 and NF11 is“pr-7825”, and the degree of priority of protocol is specified as being“p-1”, the degree of priority of TCP socket as “t-3”, and the degree ofpriority of UDP socket as “u-3”. The degree of priority of protocol“p-1” dictates that the degree of priority of TCP is higher than that ofUDP. The protocol type indicated in the ICS network packet NF10 is“TCP”, and the protocol type indicated in the ICS network packet NF10 is“UDP”. Based on the above procedures, it is determined that the ICSnetwork packet to be sent out with higher priority is NF10 (Step S1030).Next, this ICS network packet NF10 is sent out to the user logicterminal via the ICS logic terminal (Step S1040).

Embodiment-14 (Control of Transmitting Priority Degree)

[0487] Description will now be made regarding and embodiment whereinuser IP packets arriving from outside the ICS are ICS-encapsulated withthe access control apparatus, and then the order of sending out onto theICS network communication line is decided.

[0488] <<Configuration>>

[0489] As shown in FIG. 83, an ICS 17000-2 includes access controlapparatuses 17100-2 through 17190-2, and the access control apparatus17100-2 includes a line unit 17111-2, a processing device 17112-2 and aconversion table 17113-2. Blocks 17240-2 through 17280-2 are corporateLANs which are each connected to the ICS 17000-2 via the ICS user logiccommunication line. Each of the LANs includes a plurality of IPterminals and blocks 17401-2 and 17411-2 are both IP terminals.

[0490] <<Conversion Table>>

[0491] The functions of the conversion table 17113-2 shown in FIGS. 84and 85 are the same as those in the other embodiments, and the presentinvention is characterized in that the portion table, named “degree ofpriority of reception” code, degree of priority of protocol, degree ofpriority of TCP socket, and degree of priority of UDP socket, which arecomponents of the conversion table 17113-2 are used for controlling thedegree of priority. In the event that the transmitting ICS networkaddress of the conversion table is “7821”, the “transmitting prioritydegree” code is stipulated to be “ps-7821”. That is, the “receivingpriority degree” code is made to be a parameter which is dependent onthe ICS network address provided to the ICS user logic terminal sentfrom the access control apparatus after the ICS reverse encapsulation.Looking at the other portion table of the conversion table 17113-2,e.g., in regard to “ps-7821”, the degree of priority of protocol isdescribed as being “p-21”, the degree of priority of TCP socket as“t-21”, and the degree of priority of UDP socket as “NULL”. The methodof describing the degree of priority of protocol, the degree of priorityof TCP socket, and the degree of priority of UDP socket, etc. is thesame as that of Embodiment-13.

[0492] <<Example 1 for Determining the Degree of Priority>>

[0493] The manner in which the degree of priority is determined will bedescribed with reference to the flowchart in FIG. 86. The access controlapparatus 17100-2 receives the ICS user packets F01 and F02 from the ICSnetwork communication line almost at the same time, and obtains the ICSnetwork address appropriated to the ICS logic terminal (Step S2700).Next, the procedures for control of transmitting priority degree are asfollows. The “transmitting priority degree” code for both ICS userpackets F01 and F02 is “ps-7821”, and then according to portion table ofthe conversion table 17113-2, the degree of priority of protocol for“ps-7821” is specified as being “p-21”, the degree of priority of TCPsocket as “t-21”, and the degree of priority of UDP socket as “NULL”.Further, looking at other portion table comprising the conversion table17113-2, the degree of priority of protocol “p-21” dictates that thedegree of priority is, in descending order, TCP, UDP, ICPM, and IGPM,and with regard to the degree of priority of TCP socket “t-21”, thedictated order of degree of priority of is, in descending order, “sk-21”and “sk-27”, and the contents of the socket signal “sk-21” indicate thatthe IP address comprising the sender's socket number is “2100” and thatthe sender's port number thereof is “30”. The protocol type indicatedwithin the ICS user packet F01 is “TCP”, the sender's ID address is“2100”, and the sender's port number is “30”. On the other hand, theprotocol type indicated within the ICS network packet F02 is “TCP”, thesender's ID address is “2110”, and the sender's port number is “30”. Inthe present embodiment, it can be understood that it is the ICS networkpacket F01 that has the protocol type and the intended receiver's socketnumber that matches with the specifications of the aforementioned socketcode “sk-21”. Based on the above procedures, it is determined that theICS user packet to be sent out with higher priority is F01 (Step S2710).

[0494] Next, the system checks whether or not the ICS network address“7821” provided to the logic terminal which received the ICS user packetF01 is registered on the conversion table 17113-2 with the requestidentification as virtual dedicated line connection “3” (Step S2720).The subsequent steps are the same as the steps S2730 through S2770described with the other embodiments, and at the end ICS encapsulationis performed (Step S2780), and the ICS network packet NF01 is sent intothe ICS 17000-2 with priority (Step S2790).

[0495] <<Another Example for Determining the Degree of Priority >>

[0496] Regarding example 2 for determining the degree of prioritywherein the access control apparatus 17100-2 receives the ICS userpackets F03, F04 and F05 from the ICS logic terminal of the line portion17111-2 provided with ICS network address “7822” almost at the sametime; example 3 for determining the degree of priority wherein theaccess control apparatus 17100-2 receives the ICS user packets F06 andF07 from the ICS logic terminal of the line portion 17111-2 providedwith ICS network address “7823” almost at the same time; example 4 fordetermining the degree of priority wherein the access control apparatus17100-2 receives the ICS user packets F08 and F09 from the ICS logicterminal of the line portion 17111-2 provided with ICS network address“7824” almost at the same time; and example 5 for determining the degreeof priority wherein the access control apparatus 17100-2 receives theICS user packets F10 and F11 from the ICS logic terminal of the lineportion 17111-2 provided with ICS network address “7825” almost at thesame time: the method for determining the degree of priority is the sameas example 1 for determining the degree of priority, as shown in theportion table comprising the conversion table 17113-2, and descriptionthereof will be omitted.

Embodiment-15 (Multiple Communication)

[0497] The description of the present embodiment will be made withreference to FIG. 87 through FIG. 89. An ICS 18000-1 includes accesscontrol apparatuses 18140-1, 18141-1, 18142-1, 18143-1 and 18144-1, aconversion table within the access control apparatus 18140-1 being18195-1 and the conversion table within the access control apparatus18141-1 being 18196-1. The conversion table 18195-1, as with theconversion table 6013-1, contains specified values “1”, “2”, “3” and “4”for request identification, and correspondingly, intra-corporationcommunication, inter-corporation communication, virtual dedicated lineconnection, and ICS network server connection can be made within asingle access control apparatus. The conversion table 18196-1, containsonly the specified value “3” for request identification, enablingvirtual dedicated line connection. The ICS network server 18160-1 isconnected to the access control apparatus 18140-1 via an ICS networkcommunication line. A block 18184-1 is an FR network or an ATM network;in the event that 18184-1 is an FR network.

[0498] LANs 18110-1 and 18130-1 are each connected with access controlapparatuses 18140-1 and 18142-1, respectively, via an ICS user logiccommunication line. The gateways 18171-1 and 18172-1 are connected tothe access control apparatus 18140-1 or 18141-1, via an ICS user logiccommunication line. LAN 18120-1 includes a plurality of IP terminals,18121-1, 18122-1 and 18123-1. Now, the term “IP terminal” refers to aterminal which has the functions of sending and receiving IP userpackets. The IP terminals 18150-1 and 18151-1 are each connected to ICS18000-1 via access control apparatuses 18143-1, 18144-1, and an ICS userlogic communication line. The ICS network communication line 18191-1connects the conversion unit 18181-1 with the access control apparatus18141-1, and the ICS network communication line 18192-1 connects theconversion unit 18182-1 with the access control apparatus 18142-1.

[0499] ICS user packet sent from the LAN 18120-1 or LAN 18110-1 is, uponarrival to the access control apparatus 18140-1, ICS-encapsulated inorder to receive one of the communication services of intra-corporationcommunication, inter-corporation communication, virtual dedicated lineconnection, or ICS network server connection, following control of therequest identification values “1”, “2”, “3” or “4” listed in theconversion table 18195-1. Also, an ICS user packet sent from the gateway18172-1, upon arrival to the access control apparatus 18141-1, isICS-encapsulated in order to receive virtual dedicated linecommunication service filling the control of the request identification“3” listed on the conversion table 18196-1, passes through theconversion unit 18181-1 via the ICS network communication line 18191-1,further passes through the FR network or ATM network 18184-1, passesthrough the conversion unit 18182-1, passes through the ICS networkcommunication line 18192-1, and is delivered to the access controlapparatus 18142-1. For the FR network or ATM network 18184-1 here, fixedconnection with the other party (PVC) which is a known art is used asthe function of the FR network or ATM network. Thus, according to theabove-described procedures, transfer of ICS user packets is realized.

[0500] <<Partial Change to Above Embodiment: Variation>>

[0501] Description will be made with reference to FIG. 90. As with ICS18000-1, ICS 18000-2 also includes multiple access control apparatuses,and is connected with LANs and IP terminals through the access controlapparatuses. The FR network or ATM network 18184-1 in FIG. 87 isreplaced with FR network or ATM network 18200-1; the access controlapparatus 18141-1, the conversion unit 18181-1, and the ICS networkcommunication line 18191-1 are replaced with PVC interface conversionunit 18210-2; the access control apparatus 18142-1, the conversion unit18182-1, and the ICS network communication line 18192-1 are replacedwith PVC interface conversion unit 18220-2; and further, the gateways18171-1 and 18172-1 are replaced with a gateway 18230-2. Now, in theevent that a block 18200-2 is an FR network, the PVC interfaceconversion units 18210-2 and 18220-2 are functions for converting theICS user packet into the FR packet format, and reverse-convertingthereof. In the event that 18200-2 is an ATM network, the PVC interfaceconversion units 18210-2 and 18220-2 are functions for converting theICS user packet into the ATM frame format, and reverse-convertingthereof Transfer of ICS user packet according to this variation isrealized by using the functions of fixed connection with the other party(PVC) by the FR network or ATM network.

Embodiment-16 (Operation of ICS)

[0502] Description will be made with reference to FIGS. 91 and 92. TheICS 19000-1 includes: VAN 19010-1, VAN 19020-1, access controlapparatuses 19300-1, 19310-1, 19320-1 and 19330-1, relay devices19400-1, 19410-1, 19420-1 and 19430-1, inter-VAN gateway 19490-1, andserver devices 19500-1, 19510-1, 19520-1, 19530-1 and 19540-1. Eachserver is provided with an ICS network address, and has a plurality ofICS network servers therein. These plurality of ICS network servers aredistinguished by port numbers used with TCP communication protocol orUDP communication protocol. The access control apparatuses 19300-1,19310-1, 19320-1 and 19330-1 each include conversion tables 19301-1,19311-1, 19321-1 and 19331-1, each includes conversion table servers19731-1, 19732-1, 19733-1 and 19734-1, and also includes domain nameservers 19741-1, 19742-1, 19743-1 and 19744-1, and also includesresource administration servers 19751-1, 19752-1, 19753-1 and 19754-1,the relay device 19400-1 includes a path information server 19761-1 andresource administration server 19755-1, the relay device 19410-1includes a path information server 19762-1, the relay device 19420-1includes a path information server 19763-1, the relay device 19430-1includes a path information server 19764-1, the server device 19500-1includes a user service server 19711-1 and ICS authority server 19721-1,the server device 19510-1 includes a governing resource administrationserver 19750-1 and governing resource administration server 19760-1, theserver device 19520-1 includes a user service server 19712-1 and ICSauthority server 19722-1, the server device 19530-1 includes an ICSnetwork server 19980-1 which has an ICS user address “1200” and performselectronic library services, and an ICS network server 19981-1 which hasan ICS user address “1300” and performs travel information services, theserver device 19540-1 includes a governing resource administrationserver 19720-1, governing domain name server 19740-1, governingconversion table server 19730-1, and governing user service server19710-1.

[0503] The above-described access control apparatuses, relay device,server devices, and VAN gateways are connected by the ICS networkcommunication lines 19040-1, 19041-1, 19042-1 and 19043-1, so as to beable to exchange information one with another using ICS networkcommunication functions. The server devices are formed by, e.g., givingthe ICS network communication function to a computer, with programsrunning therein for realizing server functions.

[0504] A block 19110-1 is an FR network, and the conversion units19111-1 and 19112-1 are for performing interface conversion with thecommunication lines of the FR exchange network and the ICS communicationlines transferring ICS network packets. Also, a block 19900-1 is an ATMnetwork, and the conversion units 19901-1 and 19902-1 are for performinginterface conversion with the communication lines of the ATM exchangenetwork and the ICS communication lines transferring ICS networkpackets.

[0505] In the embodiment, connected outside of the ICS 19000-1 are LANs19600-1, 19601-1, 19602-1, 19603-1, 19604-1 and 19605-1, and IPterminals 19606-1 and 19607-1 having functions for sending and receivingICS network packets.

[0506] <<Hierarchical Structure of the ICS Network Server>

[0507] Description will be made with FIGS. 93 through 98. The governinguser server 19710-1 has superior controlling authority in instructingthe user service servers 19711-1 and 19712-1 or requesting individualinformation reports, the meaning of superior controlling authority beingillustrated in a tree-structure diagram in FIG. 93. A block 19811-1 is acommunication path for information exchange between the governing userservice server 19710-1 and the user service server 19711-1, and iscomprised of ICS communication lines and relay device, among others. Thegoverning resource administration server 19720-1, the governingconversion table server 19730-1, the governing domain name server19740-1, the governing resource administration server 19750-1, and thegoverning resource administration server 19760-1 are also the same, eachbeing shown in FIGS. 94 through 98. Now, in the present embodiment,there are two layers in the tree-structure hierarchy, but this can beincreased to three or more layers by increasing the name of accesscontrol apparatuses, relay devices, servers devices, etc., places withinthe ICS. The path information service is provided with the functions ofsending and receiving inside the ICS, a path table used by the relaydevices and access control apparatuses. The resource administrationserver is provided with administration functions of keeping up onmounting information or obstruction information of the relay devices,access control apparatuses and server devices.

[0508] <<Operation of ICS 19000-1 by ICS Operator>>

[0509] The ICS operators 19960-1 and 19961-1 provide instructions suchas operation start-up to, or request reports of individual informationfrom, the governing user service server 19710-1, the governingconversion table server 19730-1, the governing resource administrationserver 19750-1, and the governing resource administration server19760-1, thereby facilitating operation of the ICS 19000-1.

[0510] <<Operation of ICS 19000-1 by ICS Authority>>

[0511] The ICS authority 19950-1 provides instructions such as theoperation start-up to, or request reports of individual informationfrom, the governing resource administration server 19720-1 and thegoverning domain name server 19740-1, thereby facilitatingadministration of addresses and the like used in the ICS 19000-1.

[0512] <<Socket Number and Server>>

[0513] The ICS servers each have ICS user addresses and ICS networkaddresses, but an addition to the other embodiments is that the aboveservers have, in addition to ICS network addresses, port numbersstipulated by TCP or UDP communication protocol. That is, each of theaforementioned servers is identified by a 32-bit ICS network address anda 16-bit port number, making for a value with a total of 48 bits (thisbeing referred to as “socket number”). Each server includes programswhich have peculiar functions operating within the ICS 19000-1, andfurther, there are servers among these which have “operating interface”,as described later. Now, the “operating interface” is a function whichperforms exchange of information, and sends and receives instructionssuch as operation of the various server functions or start-up oroperation, with the operator via a keyboard or the like. Each serverprovides access control apparatuses or relay devices, for example, withICS network addresses, applies differing port numbers to the pluralityof programs within these devices (i.e., servers), distinguishing by thesocket number. As described in the embodiments, each server has ICSnetwork communication functions, and can exchange information one withanother using the ICS network address and the port numbers.

[0514] <<Registration 1 to ICS of User: Inter-Corporation Communicationand ICS Network Server>>

[0515] Description will be made with reference to FIG. 91, FIG. 92 andFIG. 99. An applicant 19200-1 to the ICS 19000-1 applies to the ICSreceptionist 19940-1 for ICS membership (procedure P100). The“Application reception data” is a usage item of ICS wherein the ICS useraddress, the ICS network address, and the ICS name has been deleted, andis comprised of, e.g., request identification (classification ofintra-corporation communication, inter-corporation communication,virtual dedicated line connection, or ICS network server connection),communication band conditions such as speed class and priority, billingconditions, open-zone connection conditions, payment method, name andaddress of user (personal ID data), signing conditions, encryptionconditions and so on.

[0516] The ICS receptionist 19940-1 enters the above “applicationreception data” to the user service server 19711-1 via the “operatinginterface”, and stores the “application reception data” in the userdatabase 19611-1 (procedure P110). Next, the user service server 19711-1requests of the ICS authority server 19721-1 the ICS user address, ICSnetwork address and ICS name, using the ICS network communicationfunctions (procedures P120). The ICS authority server 19721-1appropriates the requested aforementioned ICS address and ICS name usingthe ICS network address appropriation record table 19622-1 (FIG. 100)and the ICS user address appropriation record table 19623-1 (FIG. 101)stored within the database 19621-1 (procedure P130), stores theappropriation results in the aforementioned appropriation tables, andfurther returns the appropriation results to the user service server19711-1 (procedure P140). The user service server 19711-1 stores theappropriation results obtained from the ICS authority server 19721-1 inthe user database 19611-1 (procedure P150).

[0517]FIG. 100 is an example of the ICS network address appropriationrecord table 19622-1, and in the first line of this table there is anexample which states beforehand that an ICS network address “7700” hasbeen appropriated to ICS logic terminal identifying code LT-001 of thenode identifying code ACU-1, that the appropriate identifying code isuser-1, that the date of appropriation is Apr. 1, 1998, and that thenode identifying code ACU-1 points to the access control apparatus19300-1. Also, in the third line of this table there is an example whichstates beforehand that an ICS network address “6930” has beenappropriated to port number “620” of the node identifying code SVU-1,that the appropriate identifying code is Sc-001, that the date of,appropriation is Feb. 1, 1998, and that the node identifying code SVU-1points to the server device 19530-1.

[0518]FIG. 101 is an example of an ICS user address appropriation recordtable, and in the first line of this table there is an example whichstates that the ICS name address “4610” has been appropriated with anICS name (also called an ICS domain name) of “dd1.cc1.bb1.aa1.jp”, thatthe request identification value is “2”, that the appropriateidentifying code is user-1, and that the date of appropriation is Apr.1, 1998. Further, in the fourth line of this table there is an examplewhich states that the ICS name address “1200” has been appropriated withan ICS name of “rrl.qq.pp.jp”, that the request identification value is“4”, that the appropriate identifying code is Sv-001, and that the dateof appropriation is Feb. 1, 1998.

[0519] The user service server 19711-1 provides information to theconversion table server 19731-1 via the ICS network communicationfunction so as to write the application contents of the usage applicant19200-1 and the obtained ICS network address into the conversion table19301-1 in the access control apparatus 19300-1 (procedure P160). Thecontents to be provided are: transmitting ICS network address, senderICS user address, request identification, speed class, priority, signingconditions, encryption conditions, open-zone class and so on. Also, inthe event that the aforementioned ICS network address and ICS useraddress have a request value of “2”, i.e., inter-corporationcommunication, registration is made as transmitting ICS network addressand sender ICS user address. In the event that the request value is “4”,i.e., ICS network server, registration is made as receiving ICS networkaddress and receiver ICS user address. The conversion table server19731-1 adds the above contents to the conversion table 19301-1(procedures P170). The receiving ICS network address and the receiverICS user address are not registered in the conversion table 19301-1 atthis time, but are registered in the conversion table 19301-1 at thetime of “registration of other party of communication”, later describedin the present embodiment.

[0520] Next, the conversion table server 19731-1 notifies the ICS domainname server 19641-1 of the ICS network address, the ICS user address andthe ICS name (procedure P180). The ICS domain name server 19641-1 writesthe above received ICS network address, ICS user address and ICS name inthe database therein and stores them (procedure P190), and reportscompletion of writing to the conversion table server 19731-1 (procedureP200). The conversion table server 19731-1 confirms this report(procedure P210), reports completion of the series of procedures to theuser service server 19711-1 (procedure P220), the user service server19711-1 confirms this report (procedure P230), and informs the usageapplicant of the appropriation results, namely, the ICS user address andICS name (procedure P240). Incidentally, the ICS network address is usedonly within the ICS, so the usage applicant is not notified of this. Inthe event that the request value is “4”, i.e., ICS network server, theuser service server 19711-1 notifies all conversion table servers withinthe ICS 19000-1 at the time of the procedure P160, and requestsregistration to the conversion table of all access control apparatuses.

[0521] <<Re-Writing Administration of Conversion Table by GoverningConversion Table Server>>

[0522] Description will be made with reference to procedures 800 through960 to the bottom of FIG. 99 and FIG. 91, FIG. 92, FIG. 95. Thegoverning conversion table server 19730-1 instructs the conversion tableserver 19731-1 to re-write the contents of the conversion table 19301-1,e.g., speed class priority, transmitting ICS network address, a part orall of other items in the conversion table (procedure P800), and theconversion table server 19731-1 changes the contents of the conversiontable 19301-1 according to the instructions (procedure P810). Also, thedomain name server 19741-1 is instructed to re-write the ICS networkaddress and the like (procedure P820), the domain name server 19741-1follows the instructions and updates the internal table (procedureP830), reports the results to the conversion table server 19731-1(procedure P840), the conversion table server 19731-1 confirms(procedure P850), and reports to the governing conversion table server19730-1 (procedure P860). Also, the governing conversion table server19730-1 instructs the user service server 19711-1 to re-write thecontents of the user database 19611-1, such as speed class, ICS networkaddress, etc. (procedure P900), and the user service server 19711-1follows the instructions and updates the contents of the user database19611-1 (procedure P910). Also, the ICS network addresses, ICS useraddress, and ICS names which have become unnecessary to the ICSauthority server 19721-1 are returned, or new requests are made(procedure P920), the ICS authority server 19721-1 follows theseinstructions and updates the ICS network address appropriation recordtable 19622-1 and the ICS user address appropriation record table19623-1 (procedure P930), reports the results thereof to the userservice server 19711-1 (procedure P940), the user service server 19711-1confirms the report (procedure P950), and reports to the governingconversion table server (procedure P960).

[0523] In the above description, an arrangement may be used whereinfirst, the governing conversion table server 19730-1 calls up the userservice server 19711-1 and performs the. aforementioned procedures P900through P960, and then secondly calls up the conversion table server19731-1 and performs the aforementioned procedures P800 through P860.With such an arrangement, the ICS operator 19960-1 instructingre-writing of the contents of the access control table to the governingconversion table server 19730-1 enables exchanging of the conversiontable within the access control apparatus and the address informationrelated thereto with domain name servers and ICS authority servers whichhave administration, thereby facilitating ease of re-writing managementof the contents of a conversion table with consistency, i.e., ease ofupdating management of all conversion tables within the access controlapparatuses within the ICS 19000-1.

[0524] <<Registration of Other Party of Communication>>

[0525]FIG. 105 will be described. A usage applicant for the ICS 19000-1applies for registration of other party of communication to the ICSreceptionist 19940-1 along with the domain name of the other party ofcommunication (procedure P300). The ICS receptionist 19940-1 receivesthe domain name of the other party of communication (procedure P310),and sends it to the conversion table server 19731-1 (procedure P320).The conversion table server 19731-1 exchanges information with thedomain name servers 19740-1, 19742-1, etc. (procedures P330 and P331),obtains the ICS network address and the ICS user address correspondingwith the domain name of the other party of communication regarding whichthere was inquiry, updates the contents of the conversion table 19301-1(procedure P340), and reports the results (procedures P350 and P360).The updated results are shown to the conversion table 19301-2. The ICSnetwork address obtained here is registered in a conversion table suchas shown in FIG. 106 as a receiving ICS network address, and the ICSuser address obtained here is registered as a receiver ICS user address.Incidentally, in the case of an ICS network server, the spaces for theICS network address and the ICS user address remain blank.

[0526] <<Registration 2 to ICS of User: Intra-corporation Communicationand Virtual Dedicated Line>>

[0527] Description will be made with reference to FIG. 107. Thedifference with intra-corporation communication as compared to the aboveinter-corporation communication is that an ICS user address is handed inand an ICS name cannot be used, accordingly, there is no appropriationof the ICS names, and there are no procedures for using ICS names(procedures P180, P190 and P200). First, an applicant 19200-1 to the ICS19000-1 applies to the ICS receptionist 19940-1 for ICS membership(procedure P400). The “Application reception data” is a usage item ofICS wherein the ICS network address and the ICS name has been deleted,and is comprised of, e.g., ICS user address, request identification(classification of intra-corporation communication, inter-corporationcommunication, virtual dedicated line connection, or ICS network serverconnection), speed class and priority, etc., the same as with theprevious inter-corporation communication. The ICS user address furthershows a plurality of pairs for both sender ICS user address and receiverICS user address. Also, in the case of a virtual dedicated lineconnection, the sender ICS user address and the receiver ICS useraddress are not shown; this is what is different as compared to theintra-corporation communication.

[0528] The ICS applicant 19940-1 enters the above “application receptiondata” to the user service server 19711-1 via the “operating interface”,and stores the “application reception data” in the user database 19611-1(procedure P410). Next, the user service server 19711-1 requests of theICS authority server 19721-1 the ICS user address, the ICS networkaddress and the ICS name, using the ICS network communication function(procedures P420). The ICS authority server 19721-1 appropriates onlythe ICS network address as with the above procedure P130 (procedureP430), records the appropriation results in the aforementionedappropriation tables, and further returns the appropriation results tothe user service server 19711-1 (procedure P440). The user serviceserver 19711-1 stores the appropriation results obtained from the ICSauthority server 19721-1 in the user database 19611-1 (procedure P450).

[0529] The user service server 19711-1 notifies the conversion tableserver 19731-1 of the application contents and the obtained ICS networkaddress (procedure P460), the conversion table server 19731-1 adds theabove contents to the conversion table 19301-1 (procedure P370), andreports completion of registration (procedures P480 and P495). FIG. 108shows and example of registration to the conversion table 19301 of theintra-corporation communication and the virtual dedicated line.

[0530] <<Description of Domain Name Server>>

[0531] An example of 4-layer hierarchy will be described with referenceto FIG. 109 and FIGS. 110 to 112, regarding the procedures P330 and P331regarding the domain name server in the description of FIG. 105. The ICSnetwork address of the internal table 19600-1 of the domain name serverwhich is the object of the domain name “root” is “9500”, and domainnames “a1”, “a2”, “a3” and so forth exist below, indicating, e.g., thatthe ICS network address of the domain name server which handles thedomain name “a1” is “9610”, and the port number is “440”. The ICSnetwork address of the internal table 19610-1 of the domain name serverwhich is the object of the domain name “a1” is “9610”, and domain names“b1”, “b2”, “b3” and so forth exist below, indicating, e.g., that theICS network address of the domain name server which handles the domainname “b2” is “9720”, and the port number is “440”.

[0532] The ICS network address of the internal table 19620-1 of thedomain name server which is the object of the domain name “b2” is“9720”, and domain names “c4”, “c5”, “c6” and so forth exist below,indicating, e.g., that the terminal space for the domain name “c5” isYES, meaning that there are no more domain names below, and that in thisexample, the ICS network address of the ICS name “c5.b2.a1.” is “9720”,and that the ICS user address is “4510”. Also, the record of theinternal table 19620-1 of the domain name server, i.e., the ICS name(ICS domain name), the ICS network address and the ICS user address“4610” are considered to be one group of data and referred toparticularly as a “resource record” of the domain name server.

[0533] <<Calling Domain Name Servers>>

[0534] With reference to FIG. 113, description will be made regardingthe procedures in which the conversion table server 19630-1 calls thedomain name servers 19640-1, 19650-1 and 19660-1, and searches for theICS network address and the ICS user address corresponding with thedomain name “c5.b2.a1.”. The conversion table server 19630-1 enters thedomain name “c5.b2.a1.” in the resolver 19635-1 in the conversion table.The resolver 19635-1 sends the ICS packet 19641-1 including “a1” to theICS domain name server 19640-1, and an ICS packet 19642-1 including anICS network address “9610” of the ICS domain name server for “a1” isreturned. Next, The resolver 19635-1 sends an ICS packet 19651-1including “b2” to the ICS domain name server 19650-1, and an ICS packet19652-1 including an ICS network address “9720” of the ICS domain nameserver for “b2” is returned.

[0535] Next, the resolver 19635-1 sends an ICS packet 19661-1 including“c5” to the ICS domain name server 19660-1, and an ICS packet 19662-1including an ICS network address “9820” for “c5” and an ICS user address“4520” is returned. According to the above procedures, the conversiontable server 19630-1 obtains an ICS network address “9820” and an ICSuser address “4520” corresponding with the domain name “c5.b2.a1.”.

[0536] <<Re-Writing of Conversion Table From an IP Terminal>>

[0537] Description will be made with reference to FIGS. 114 and 115. AnICS user packet including the domain name “c5.b2.a1.” is sent from theIP terminal 19608-1 to the conversion table server 19731-1 (procedureP500). The conversion table server 19731-1 makes inquiry to the domainname server (procedure P510), the domain name server searches andobtains the ICS network address “9820” and the ICS user address “4520”corresponding with the domain name “c5.b2.a1.” (procedure P520), andreturns this to the conversion table server 19731-1 (procedure P530),the conversion table server writes this to the conversion table 19301-1(procedure P540), and reports to the IP terminal 19608-1 (procedureP550). In these procedures, the ICS network address “9820” is writteninto the conversion table as a receiving network address, and the ICSuser address “4520” as a receiver ICS user address, the re-writtenconversion table being shown in FIG. 103. Incidentally, FIG. 103 omitsthe items listed in the conversion table corresponding with the requestidentification included in FIG. 102.

[0538] Next, the IP terminal 19608-1 sends an ICS user packet to theconversion table server 19731-1, including specification for changingthe speed class to “2”, with regard to the registered contents of theconversion table 19301-1X (procedure P600). The conversion table server19731-1 re-writes the registration contents of the conversion table19301-1X so that the speed class is “2”, according to the specification(procedure P610), and reports to the IP terminal 19608-1 (procedureP620). The conversion table re-written by these procedures is shown as19301-Y (FIG. 104).

[0539] <<Moving a Terminal between Access Control Apparatuses>>

[0540] As can be seen in FIG. 101 from the embodiment of the ICS useraddress appropriation record table 19623-1, the first line of this tableappropriates ICS name “dd1.cc1.bb1.aa1.jp” to the ICS user address“4610”, and holds the ICS user address and the ICS name. For example, inthe event that a terminal 19608-1 (FIG. 91) having an ICS user address“4610” is moved from the access control apparatus 19300-1 to the accesscontrol apparatus 19320-1 (FIG. 92), and in the event that this terminalis appropriated a new ICS network address “7821” for example, theconversion table has registered therein a transmitting ICS networkaddress “7821” and a sender ICS user address “4610” as a pair. In thiscase, the ICS name “dd1.cc1.bb1.aa1.jp” is paired with the ICS useraddress “4610” as stipulated by the ICS user address appropriationrecord table 19623-1, and the ICS name is not changed. The resourcerecord comprised of the ICS name “dd1.cc1.bb1.aa1.jp” within the domainname server, the ICS network address “7700”, and the ICS user address“4610”, is changed to that having the ICS name “dd1.cc1.bb1.aa1.jp”, theICS network address “7821” and the ICS user address “4610”. That is, theICS network address “7700” is re-written to another address “7821”, butthe ICS name “dd1.cc1.bb1.aa1.jp” and the ICS user address “4610” arenot re-written. Summarizing this, the resource record of the domain nameserver and ICS user address appropriation record table of the ICSauthority server hold the ICS user address and the ICS name, and thereis no case in which only one is changed. Accordingly, in the event thata terminal is moved between access control apparatuses, there is no needto change the ICS user address and ICS name of the terminal.

[0541] (Other embodiment: determination of ICS user address by the user)

[0542] This is an arrangement wherein the above embodiment has beenchanged so that the user determines the ICS user address. That is, whenthe user (usage applicant 19200-1) applies to the ICS 19000-1, an ICSuser address is added. The ICS receptionist 19940-1 includes the ICSuser address in the application reception data. Also, the ICS authorityserver 19711-1 stores the ICS user address that the user has applied forin the ICS user address appropriation record table 19623-1. According tothe above method, the user can determine his/her own ICS user address,thus increasing freedom of usage.

Embodiment-17 (Calling other Party of Communication by Telephone Number)

[0543] The present embodiment shows an example wherein using thetelephone number as the ICS domain name allows sending and receiving ofICS user IP packet with the other party of communication, in whichdigitized voice is stored within the user IP packet, therebyfacilitating public communication using a telephone. In the presentembodiment, description will be made with reference to the examplewherein the telephone number 81-3-1234-5678 in Tokyo, Japan, is viewedas being domain name “5678.34.12.3.81.” Here, “3” indicates Tokyo, and“81” indicates Japan.

[0544] Description will be made with reference to FIG. 116. An ICS20000-1 includes access control apparatuses 20010-1, 20020-1 and20030-1, relay devices 20080-1 and 20090-1, domain name servers 20110-1,20120-1, 20130-1, 20140-1 and 20150-1, and the access control apparatus20010-1 includes line portion 20011-1, a processing device 20012-1, aconversion table 20013-1 and a conversion table server 20040-1. Theconversion table server 20040-1 is within the access control apparatus20010-1, and an ICS network address of “7800” and port number of “600”are appropriated. The conversion table server 20040-1 is provided withan ICS user address “4600” from outside of the ICS 20000-1, and appearsto be an ICS server having the functions of converting an entered domainname into an ICS user address and returning, and also registering theICS network address in the conversion table 20013-1 within the accesscontrol apparatus 20010-1.

[0545] A block 20210-1 is a LAN, blocks 20211-1 and 20300-1 are both IPterminals having the functions of sending and receiving ICS user frames,each having ICS user addresses “4520” and “1200”, and are connected tothe ICS 20000-1 via the ICS user logic communication line. IP terminal20300-1 can be used as a telephone and thus is referred to as an “IPtelephone”. The IP telephone 20300-1 includes a telephone number inputunit 20310-1, IP address accumulating unit 20320-1, voice datasending/receiving unit 20330-1, input buttons 20340-1, and voiceinput/output unit 20350-1.

[0546] <<Obtaining ICS User Address by Telephone Number>>

[0547] The telephone number “1234-5678” is entered into the telephonenumber input unit 20310-1 by the input buttons 20340-1. The telephonenumber input unit 20310-1 generates the ICS user packet P1201, anddelivers this to the access control apparatus 20010-1 via the ICS userlogic communication line. Here, the ICS user packet is the sender ICSuser address “1200” and the receiver ICS user address “4600”, and thetelephone number “1234-5678” entered by the input buttons 20340-1 isincluded in the data. The processing device 20010-1 looks at theconversion table 20013-1, and sends the ICS user packet P1201 to theconversion table server 20040-1 indicated by the ICS user address“4600”. Also, in the present embodiment, the conversion table server20040-1 is within the access control apparatus 20010-1, so there is noneed to use ICS network communication functions. Based on the telephonenumber “1234-5678” included in the data field of the ICS user packet,the conversion table server 20040-1 sequentially contacts domain nameservers 20130-1, 20140-1 and 20150-1, and obtains the ICS networkaddress “7920” and the ICS user address “4520” of the terminal 20211-1of the other party of communication in the event that the telephonenumber “1234-5678” is viewed as a domain name.

[0548] Next, the conversion table server 20040-1 creates a conversiontable new item 20030-1 using the two addresses “7920” and “4520”obtained here, generates an ICS user packet P1202 for the ICS useraddress “4520” and writes the ICS user address “4520” therein and sendsit to the IP telephone 20300-1. The IP telephone 20300-1 combines theICS user address “4520” contained in the received ICS user packet P1202with the telephone number “1234-5678” regarding which inquiry hasalready been made, and stores these in the IP address storage unit20320-1, and uses it at a later day at the point that the ICS useraddress “4520” corresponding with the telephone number “1234-5678”becomes necessary. The aforementioned conversion table new item 20030-1correlates the IP telephone 20300-1 having the ICS network address“7820” and the ICS user address “1200” with the destination terminal20211-1 specified by the telephone number “1234-5678”. The conversiontable new item 20030-1 is used as a new component of the conversiontable 20013-1.

[0549] <<Communication using ICS User Address>>

[0550] Voice is inputted from the voice input/output unit 20350-1, thevoice is converted into digital data at the voice data sending/receivingunit 20330-1, stored in the ICS user packet P1210, and sent to thedestination specified by the telephone number “1234-5678”, i.e., to theterminal 20211-1 determined by the ICS user address “4520”. After this,telephone communication is performed by sending and receiving ICS userpacket between the two terminals 20211-1 and 20300-1.

[0551] <<Detailed Description of Domain Name Server>>

[0552] Regarding the above description, the method of the conversiontable server presenting the telephone number “1234-5678” to the domainname server and obtaining the ICS network address “7920” and the ICSuser address “4520” will be described in detail.

[0553]FIG. 118 is diagram illustrating an embodiment of a 6-layerhierarchy “domain name tree”, with root domain name “root-tel” beingprovided on Level 1 of the tree, domain names “1” . . . “44” . . . “81”. . . “90” . . . existing on Level 2 which is lower on the tree, anddomain names . . . “3” . . . “6” . . . for example existing on Level 3beneath domain name “81”, and domain names . . . “11”, “12”, “13”, . . .for example existing on Level 4 beneath domain name “3”, and furtherdomain names . . . “33”, “34”, “35”, . . . for example existing on Level5 beneath domain name “12”, and domain names . . . “5677”, “5678”,“5679” . . . existing on Level 6 beneath domain name “34”.

[0554]FIG. 119 illustrates the internal table 20131-1 of the domain nameserver 20130-1 handling the domain name “3”, and indicates that, e.g.,under domain name “3” the domain server 20140-1 which handles domainname “12” has an ICS network address of “8720” and a port number of“440”. FIG. 120 illustrates the internal table 20141-1 of the domainname server 20140-1 handling the domain name “12”, and indicates that,e.g., under domain name “12” the domain server 20150-1 which handlesdomain name “34” has an ICS network address of “8820” and a port numberof “440”. Also, FIG. 121 illustrates the internal table 20151-1 of thedomain name server 20150-1 handling the domain name “34”, and indicatesthat the endpoint for the domain name “5678” in the internal table20151-1 is YES, meaning that there are no more domain names below, andin this example, the ICS network address corresponding to the domainname “5678.34.12.3.18.” is “7920”, and the ICS user address thereof is“4520”.

[0555] <<Calling Domain Name Server>>

[0556] With reference to FIG. 122, description will be made of theprocedures for the conversion table server 20040-1 calling the domainname servers 20130-1, 20140-1 and 20150-1, and searching for the ICSnetwork address and the ICS user address corresponding with the domainname “5678.34.12.3.81.”. Now, the resolver 20041-1 has therein the ICSnetwork address of a domain name server handling the Level 1 domain“root-tel” shown in FIG. 119. Also, in the event that there is a greatdeal of communication with the domain name server which handles theLevel 2 and Level 3 domains, the ICS network addresses of the upperdomain name servers thereof are stored in the resolver 20041-1.

[0557] The conversion table server 20040-1 inputs domain name“5678.34.12.” into the internal resolver 20041-1. The resolver 20041-1has the ICS network address “8610” of the server handling the domainname “3.81.” which indicates “81” for Japan and “3” for Tokyo, and sendsan ICS packet 20135-1 including the domain name “12” which is under thedomain name “3” to the ICS domain name server 20130-1 using the ICSnetwork communication function, in response to which an ICS frame20136-1 including the ICS network address “8720” of the ICS domain nameserver 20140-1 which handles the domain name “12” is returned. Next, theresolver 20041-1 sends an ICS packet 20145-1 including the domain name“34” to the ICS domain name server 20140-1, in response to which an ICSpacket 20146-1 including the ICS network address “8820” of the ICSdomain name server 20150-1 which handles the domain name “34” isreturned.

[0558] Next, the resolver 20041-1 sends an ICS packet 20155-1 includingthe domain name “5678” to the ICS domain name server 20150-1, inresponse to which an ICS packet 20156-1 including the ICS networkaddress “7920” and “ICS user address 4520” of the ICS domain name server20150-1 corresponding with the domain name “5678” is returned. Accordingto the above procedures, the conversion table 20040-1 obtains the ICSnetwork address “7920” and the ICS user address “4520” corresponding tothe domain name “5678.34.12.3.81.”.

[0559] <<Telephone Line Connection >>

[0560] Referring back to FIG. 116, there is a telephone line conversionunit 20510-1 within the line portion 200011-1, and the telephone 20520-1is connected to the telephone line conversion unit 20510-1 via thetelephone line 20530-1. The telephone line conversion unit 20510-1 hasthe same function as those described in the other embodiments, andgenerates an ICS user packet sorted in the data field, as well asconverting voice sent from the telephone line 20530-1 into digitizedvoice. Also, ICS user packet which is sent in reverse, i.e., from theICS network to pass through the access control line portion, have thedigitized voice stored therein converted into analog voice in thetelephone line conversion unit 20510-1, or in the event of an ISDN line,converted into digitized voice. According to such an arrangement, the IPterminal 20300-1 provided with an ICS domain name and the telephone20520-1 can perform communication by telephone voice.

[0561] (Connecting to a public telephone network)

[0562] Further, the telephone line conversion unit 20510-1 and theprivate exchange 20600-1 are connected by a telephone line 20530-2.Telephones 20520-2 and 20520-3 are connected with a private telephoneline 20540-1 extending from the private exchange 20600-1, and atelephone communication can be carried out between the telephone 20520-2and the telephone 20300-1. Also, connection can be made via the privateexchange 20600-1 to public telephone networks/international telephonenetwork 20680-1. Such an arrangement enables the telephone communicationbetween the telephones 20520-4 and 20300-1.

Embodiment-18 (IP Terminal Capable of Connecting to Plural AccessControl Apparatuses)

[0563] The present embodiment does not fix the IP terminal having thefunctions for sending and receiving ICS user IP packets to a specificaccess control apparatus; rather, it realizes an IP terminal which canbe moved and connected to other access control apparatuses and used,i.e., capable of roaming. Roaming is realized based on the ICS domainname provided to the IP terminal.

[0564] <<Password Transmission Technique using Cipher>>

[0565] The present embodiment includes procedures for ciphering a secretpassword PW and sending it from the sender (encoding (ciphering) side)to the receiver (decoding side). First, a ciphering function Ei and adecoding function Di will be described. The ciphering function Ei isrepresented by y=Ei(k1, x), and the decoding function Di is representedby x=Di(k2, y). Here, “y” denotes the ciphertext, “x” denotesplain-text, “k1” and “k2” are keys, and “i” represents cipher numbers(i=1, 2, . . . ) determining the secret key code and the public keycode, including how the value of the cipher key is to be used. In theabove, an arrangement may be used wherein plain-text x′ is cipheredinstead of plain-text x with x′=x∥r (wherein “r” is a random number),and discarding the random number r from the plain-text x′ upon decoding,thus obtaining the plain-text x. Such an arrangement generates adifferent ciphertext each time the same plain-text is ciphered, owing tothe random number, and it is said that such is less susceptible to codecracking.

[0566] (Example of Cipher Number i=1)

[0567] <<Preparation>>

[0568] The sender m discloses the domain name thereof (DNm) to thepublic including the receiver. The receiver calculates Km=Hash-1(DNm)using the secret data compression function Hash-1, and hands over onlythe cipher key Km using a safe method so as to be unnoticed by a thirdparty. This example is an example of using DES ciphering, and the senderholds a “ciphering module DES-e” for realizing the ciphering functionEi, and a cipher key Km. The cipher key Km is a secret value which thesender and receiver share. The receiver has the “decoding module DES-d”for realizing the decoding function Di, and the data compressionfunction Hash-1. What is used for the data compression function Hash-1is determined separately for each cipher number. A data compressionfunction is also referred to as a “hash function”.

[0569] <<Ciphering by Sender>>

[0570] The sender sets the secret password PW as x=PW, and ciphers asy=DES-e(Km, x) with the ciphering module DES-e and the cipher key Kmbeing held, thereby sending the ciphertext y and domain name DNm.

[0571] <<Decoding by Receiver>>

[0572] The receiver receives the ciphertext y and the domain name DNm,calculates the secret cipher key Km as Km=Hash-1(DNm) using thereceiver's secret data compression function Hash-1, and the obtains theplaintext x as x=DES-d(Km, y) using the decoding module. The plain-textx is password PW, and the receiver can obtain the secret password PW. Athird party does not know the data compression function Hash-1 and thuscannot calculate the cipher key Km, and accordingly, cannot calculatethe secret password PW. In the above embodiment, as stipulation of thecipher number i=3, the ciphering functions and the decoding functionscan be replaced with ciphering functions and decoding functions otherthan DES code.

[0573] (Example of Cipher Number i=2)

[0574] <<Preparation>>

[0575] The present example is an example of employing RSA encoding,wherein the sender generates ciphering function y=x^(e) mod n anddecoding function y=x^(d) mod n. Here, e≠d holds, the key d being asecret value. The sender hands to the receiver the disclosable cipheringkeys e and n, and ciphering module RSA-e for realizing y=x^(e) mod n.The sender holds the ciphering keys and the ciphering module RSA-e. Thesender holds neither the secret ciphering module nor secret data. On theother hand, the receiver holds n and the secret key d, and the cipheringmodule RSA-e for realizing y=x^(e) mod n.

[0576] <<Ciphering by Sender>>

[0577] The sender encodes the secret password PW, own domain name DNm,and time of sending (year/month/day hour/minute/second) as x=PW ∥x1 ∥x2(wherein x1: domain name DNm, and x2: year/month/day/hour/minute/second)and ciphers as y=X^(e) mod n using the ciphering module RSA-e, thussending the ciphertext y.

[0578] <<Decoding by Receiver>>

[0579] The receiver receives the ciphertext y and calculates x=y^(d) modn using the decoding module RSA-d held beforehand and the decoding key.The result is x=PW ∥x1 ∥x2, so the data which is at a certain positionfrom the head of x is used as the password PW. In the above ciphering,domain name x1 and year/month/day/hour/minute/second x2 are used asrandom numbers. A third party does not know the secret key d and thuscannot calculate the secret password PW. In the above embodiment, asstipulations of the cipher number i=4, the values of the cipher keys e,d and n can be changed. Also, as stipulations of the cipher number i=5,the RSA ciphering technique can be replaced with a different public keyciphering technique.

[0580] <<Terminal Verification Technique using Password and RandomNumber>>

[0581] Description will be made regarding verification technique fordetermining whether or not the password PW used by a roaming terminalagrees with the password registered in the verifying server. Asprerequisite conditions, the verifying server of the verifying entityand the terminal of the user to receive verification have a password PWthat is secret to a third party, with a ciphering function E (whereiny=E(k, x), y represents ciphertext, k represents ciphering key, and xrepresents plain-text). Specific procedures for terminal verificationwill now be described. The terminal of the user to receive verificationdecides upon a random number R using appropriate means, calculatesY1=F(PW, R) using the password PW and function y=F(PW, R) and sends boththe random number R and the function Y1 to the verifying entity. Theverifying entity receives the random number R and the function Y1, andcalculates Y2=F(FW, R) using the received random number R, the passwordPW held within, and the function F, and checks whether or not Y1=Y2holds. In the event that there is a match, verification can be made thatthe owner of the terminal which is being verified is using the correctpassword PW, i.e., verification of the terminal can be made. In theabove technique, an arrangement in which the user to be verified cannotfreely select the random number R but rather the random number R isrestricted to depending on time (called a time random number) furtherincreases difficulty of a third party calculating the password. Insteadof the ciphering function used above, the secret data compressionfunction Hj may be used instead, for Y1, Y2=(PW, R).

[0582] <<Overall Configuration>>

[0583]FIGS. 123 and 124 illustrate an overview of the roaming techniqueaccording to the present embodiment, wherein the ICS 21000-1 includesaccess control apparatuses 21010-1, 21020-1, 21030-1, 21040-1, 21050-1and 21060-1, relay devices 21080-1, 21081-1, 21082-1, and 21083-1,verifying servers 21100-1, 21101-1, 21102-1 and 21103-1, domain nameservers 21130-1, 21131-1, 21132-1 and 21133-1, a user service server21250-1 and an ICS authority server 21260-1. The access controlapparatus 21010-1 is provided with a conversion table 21013-1, aconversion table server 21016-1, a registration server 21017-1 and aconnection server 21018-1. The access control apparatus 21020-1 isprovided with a conversion table 21023-1, a conversion table server21026-1, a registration server 21027-1 and a connection server 21028-1.The connection servers 21018-1 and 21028-1 are provided with an ICS useraddress “6310”, and have the function to register access controlapparatuses determined as necessary to the IP terminal, or to connectthereto.

[0584] The conversion table server 21016-1 has a function for re-writingthe contents of the conversion table 21013-1, and the conversion tableserver 21026-1 has a function for re-writing the contents of theconversion table 21023-1. Also, the LAN 21150-1 has an IP terminal21151-1, the LAN 21160-1 has an IP terminal 21161-1, and a block 21170-1is an IP terminal. A block 21200-1 is a portable roaming terminal, andis identified by ICS domain name “c1.b1.a1.” provided uniquely withinthe ICS 21000-1.

[0585] <<Application for use of Roaming Terminal>>

[0586] The owner of a roaming terminal 21200-1 indicates as an ICS usageapplicant 21270-1 a payment method for the roaming terminal 21200-1, andapplies to the ICS authority server 21260-1 via user service server21250-1 for an ICS domain name and an ICS user address. The paymentmethod represented by billing class “MNY”, e.g., in the event thatMNY=1, the charges are billed to the home IP (i.e., an IP terminal whichis connected to the access control apparatus in a fixed manner), in theevent that MNY=2, the charges are paid according to the record of theverifying server. The ICS authority server 21260-1 sets an ICS domainname “c1.b1.a1.” for using the roaming terminal 21200-1, and an ICS useraddress “1200”. Further, in order to be connected to the access controlapparatus 21010-1 in a fixed manner and use it, the owner of the IPterminal 21200-1 applies for an ICS network address to the ICS authorityserver 21260-1 via the user service server 21250-1. The user serviceserver 21250-1, upon obtaining the ICS network address, makes a requestto the conversion table server 21016-1 to set the ICS network address“8115” and the ICS user address “1200” in the conversion table 21013-1.

[0587] The ICS receptionist 21271-1 embeds inside the interior 21201-1of the roaming terminal 21200-1 the following: ICS domain name“c1.b1.a1.”, ICS user address “1200”, special ICS address for roamingterminals (called “roaming special number”) “1000”, ICS user address“6300” for registration server, and ICS user address “6310” forconnecting server, and further embeds inside the interior 21202-1 of theroaming terminal 21200-1 the ciphering function Ei and decoding relateddata RP1. Now, RP1=Hj (domain name ∥RP0) ∥RP0 (wherein RP0=NMY ∥i∥j)holds, and the domain name is “c1.b1.a1.”. MNY is the above-describedbilling class, “i” is a cipher number for typifying the cipher Ei, and“j” determines the type of Hash function Hj. Data compression functionHj is a secret dedicated function used only by the verifying server andthe user service server. The user does not hold the data compressionfunction Hj, and does not even know Hj, and thus is incapable ofgenerating code related data RP1.

[0588] <<Registration Procedure from Home IP Terminal>>

[0589] Description will be made with reference to FIG. 127. The roamingterminal user connects the roaming terminal 21200-1 to the position ofthe home IP terminal 21151-1. Next, the roaming terminal user decides ona password (PW) and enters this from the input unit 21204-1, and alsogenerates an ICS user packet PK01 using the ciphering function and thecoding-related data stored within the inner portion 21202-1, and sendsit to the access control apparatus 21010-1 via the ICS user logiccommunication line 21152-1 (procedures T10). The destination of the ICSuser packet PK01 is “6300” which points to the roaming registrationserver, and includes own ICS domain name “c1.b1.a1.”, cipher parameterPR1, ICS user address “1200”, expiration data “98-12-31”, ciphertext “y”which is the password that has been ciphered, “tg” (wherein tg=1 inorder to display registration procedures), and “Yes” or “No” for roamingconnection specification. The generation method employed for theciphertext “y” is the coding technique described earlier. For example,in the event that the cipher number=2, ciphertext “y” is generated withy=x^(e) mod n (wherein x=PW ∥c1.b1.a1. ∥year/month/day/hour/minute/second). The access control apparatus 21010-1looks at the conversion table 21013-1 and transfers the ICS user packetPK01 to the registration server 21017-1 with the destination “6300”(procedure T15). The registration server 21017-1 uses the domain name“c1.b1.a1.” to call the verifying server 21100-1 (procedure T20). Also,the method by which the registration server 21017-1 calls the verifyingserver 21100-1 using the domain name is the same as the method by whichthe connection server 21028-1 calls the verifying server 21100-1 usingthe domain name, the details thereof being described in detail later.The verifying server 21100-1 checks the contents of the received ICSuser packet PK01, and decodes the ciphertext “y” using theearlier-described technique, thereby calculating the password PW. Forexample, in the event that the cipher number=2, the ciphertext “y” isdecoded with x=y^(d) mod n. This yields x=PW∥c1.b1.a1.∥year/month/day/hour/minute/second, so the password PW can be obtained.

[0590] Next, the contents of the cipher parameter PP1 is RP1=Hj (domainname ∥RP0) ∥RP0 (wherein RP0=MNY ∥i ∥j), so the verifying server 21100-1uses the secret Hash function Hj held within the verifying server21100-1 and the obtained domain name “c1.b1.a1.” to calculate t =Hj(domain name 11 RP0) 11 RP0), and checks whether or not t=RP1 holds forthe received RP1. If it holds, judgment is passed that the domain name“c1.b1.a1.”, the billing class MNT, and the cipher numbers “i” and “j”have not been tampered with. The verifying server 21100-1 checks forexcessive or insufficient registration contents, and in the event thatthe contents are normal, the registration results are registered in theverification table 21100-2, see FIG. 125; registration is not made inthe event there are insufficient registration contents.

[0591] This is illustrated in the verifying table 21100-2 in the linewith the administration number 1, with the domain name as “c1.b1.a1.”,cipher (encryption) number “2”, billing class (MNY) “1”, value ofcalculated password PW “224691”, expiration date “98-12-31”, roamingconnection of “Yes”, i.e., acceptance of a roaming connection. At thetime of generating the PK01 in procedure T10, the aforementioned valueof tg may be set to tg=2 and roaming connection set to “No”. Thepassword will not leak to a third party, due to application of theabove-described ciphering method. Roaming registration is reported bypassing through the registration server 21017-1 (procedure T30), thenthe access control apparatus 21010-1 (procedure T35), and reported tothe roaming IP terminal (procedure T40). Further, an ICS user packet forchanging the value of the password PW with tg=3 or changing the date ofexpiration with tg=4 can be sent from the terminal 21200-1 via the ICSuser logic communication line 21152-1, after the above procedure T40 hasbeen completed. Incidentally, a method which can be employed forchanging the password involves specifying the prior password.

[0592] <<Sending and Receiving User IP Packet while Traveling>>

[0593] An example will be described regarding connecting a roamingterminal 21200-1 to the access control apparatus 21020-1 and sending andreceiving of user IP packet between domain name “c1.b1.a1.” of theroaming terminal 21200-1 and the other party of communication with adomain name “c2.b2.a2.”. The user inputs the following from the inputunit 21204-1: the domain name “c2.b2.a2.” of other party ofcommunication, “tg” which has been set to tg=5 for specifying sendingand receiving of user IP packet, own password PW, and “5” whichspecifies the roaming connection period in days (represented by TTL).The inside 21201-1 and 21202-1 of the roaming terminal 21200-1 is usedto this end. Also, the IP frame field 21203-1 is used for generating,and sending and receiving ICS user IP packets PK01, PK02, PK03, PK04 andso forth.

[0594] Next, the roaming terminal 21200-1 generates a user IP packetPK02, and sends it to the access control apparatus 21020-1 via the ICSuser logic communication line 21210-1 (procedure T50). The user IPpacket PK02 includes the sender domain name “c1.b1.a1.”, receiver domainname “c2.b2.a2.”, cipher parameter RP2 and connection period(represented by TTL). The cipher parameter RP2 is data calculated withthe password PW and the inside 21202-1. That is, year/month/day/second“yy-mm-dd-sssss” is generated and used as a time random number TR(TR=yy-mm-dd-sssss), and the clock of inside 21202-2 and the cipherfunction Ei is used to calculate RP2=Ei(PW, TR) ∥TR.

[0595] The access control apparatus 21020-1 receives the user IP packetPK02, obtains the ICS network address “7800” provided to the ICS logicterminal, and since the request identification from the conversion table21023-1 is “4” and further the sender ICS user address written to theuser IP packet PK02 is “1000” (i.e., roaming special number), the aboveICS network address “7800” is held, and is delivered with the ICS userpacket PK02 to the connection server 21028-1 pointed to by the receiverICS user address “6310” (procedure T60). The ICS network address “7800”obtained in this procedure will be used after the later-describedprocess T130.

[0596] <<Function of Connection Server>>

[0597] Next, the connection server 21028-1 calls the verifying server21100-1 using the domain name “c1.b1.a1.”, and transfers the domain name“c1.b1.a1.” and the cipher parameter RP2 to the verifying server(procedure T70). The verifying server 21100-1 reads the values of thepassword PW and cipher number written to the verifying table 21100-2,and selects cipher function Ei and reads the password PW. Next, thecipher parameter RP is RP2=Ei(PW, TR) ∥TR, so the time random numberwhich is to the latter half of the RP2 is used to calculate t=Ei(PW,TR). In the event that the value of this temporary variable t calculatedhere matches the first half Ei(PW, T) of the received RP2, confirmationcan be made that the password PW entered into the terminal 21200-1 iscorrect. The time function TR includes the year/month/day (i.e.,TR=yy-mm-dd-sssss), so unauthorized access can be discovered in the casethat the received year/month/day does not match that time of processing.

[0598] Next, the verifying server 21100-1 reports the following itemswritten in the verifying table 21100-2 to the connection server 21028-1(procedure T80): completion of roaming registration, billing class, andverifying server calling information (procedure T80). In the presentembodiment, the billing class is MNY=1, and the verifying server callinginformation is the ICS network address “7981” of the verifying server21100-1, port number “710” and administration number “1” of theverifying administration table. The connection server 21028-1 presentsthe domain name “c1.b1.a1.” to the domain name server, requests the ICSuser address and the ICS network address associated with the domain name(procedure T90), and obtains the ICS user address “1200” and the ICSnetwork address “8115” (procedure T100). In the same way, the connectionserver presents the domain name “c2.b2.a2.” to the domain name server,requests the ICS user address and the ICS network address associatedwith the domain name (procedure T110), and obtains the ICS user address“2500” and the ICS network address “8200” (procedure T120).

[0599] Next, the connection server 21028-1 informs the conversion tableserver 21026-1 of the following (procedure T130): the ICS networkaddress “7800” of the ICS logic terminal which has input the ICS userpacket (held in procedure T60); the ICS user address “1200”, ICS useraddress “2500”, and ICS network address “8200”, just obtained from thedomain name server; and also the completion of roaming registration,billing class, and verifying server calling information received fromthe verifying server 21100-1.

[0600] The conversion table server 21026-1 writes the four addresses tothe conversion table 21023-1 as received. The value of the requestidentification is “10”, meaning inter-corporation communication byroaming. In the event that the billing class is MNY=1, the ICS networkaddress “8115” and the ICS user address “1200” just obtained from thedomain name server are forwarded to the billing notification destinationof the conversion table 21023-1. Also, in the event that the billingclass is MNY=2, verifying server calling information is forwarded to thebilling notification destination of the conversion table 21013-1.Further, “5” which specifies the roaming connection period in days isalso written to the conversion table 21013-1. When the writing to theconversion table 21023-1 is completed, the conversion table server21026-1 reports the results to the connection server 21028-1 (procedureT140). This completion report is sent via the access control apparatus21020-1 (procedure T150) to the roaming terminal 21200-1 with the ICSuser packet PK03 (procedure T160).

[0601] Now, the ICS user packet PK03 includes the ICS user address“1200” associated with the domain name “c1.b1.a1.” of the roamingterminal 21200-1, and the CS user address “2500” associated with thedomain name “c2.b2.a2.” of the other party of communication. Thecorporation operating the access control apparatus can charge the ownerof the roaming terminal 21200-1 for the above usage of the connectionserver 21028-1, i.e., the procedures for receiving the ICS user packetPK02 up to returning the ICS user packet PK03, and “5” which specifiesthe roaming connection period in days.

[0602] <<Using the Roaming Terminal>>

[0603] The roaming terminal 21200-1 can use the conversion table 21023-1created following the above-described procedures, to performinter-corporation communication (procedures T170 through T220). In theevent that “5” which specifies the roaming connection period in dayselapses, the conversion table server 21026-1 can delete the aboveroaming connection written in the inside of conversion table 21023-1.

[0604] <<Notification of Billing>>

[0605] The access control apparatus 21020-1 notifies the billingnotification destination registered in the conversion table 21023-1 ofthe communication charges (procedure T300 or T310).

[0606] <<Method for Accessing the Verifying Server>>

[0607] On the above description, detailed description will be maderegarding the method for judging whether or not the verification requestcontained in the ICS network packet PK02 generated by the roamingterminal 21200-1 due to the connection server 21028-1 presenting thedomain name “c1.b1.a1.” to a plurality of verifying servers includingverifying server 21100-1 is correct, i.e., whether or not the domainname “c1.b1.a1.” of the roaming terminal 21200-1 is registered with theverifying server.

[0608] An example of 4-layer hierarchy will be described with referenceto FIG. 128. A domain name “root” is provided on Level 1 of the tree,and domain names “a1”, “a2”, “a3” . . . and so forth exist on Level 2below, domain names “b1”, “b2”, “b3”, and so forth exist on Level 3below “a1” for example, and domain names “c1”, “c2”, “c3” . . . and soforth exist on Level 4 below “b1” for example.

[0609]FIG. 129 illustrates the internal table 21102-2 of the verifyingserver 21102-1 handling the domain “root”, indicating, e.g., that theICS network address of the domain name server 21101-1 which handles thedomain name “a1” below the domain name “root” is “7971”, and the portnumber is “710”. Also, FIG. 130 illustrates the internal table 21101-2of the verifying server 21101-1 handling the domain “a1”, indicating,e.g., that the ICS network address of the domain name server 21100-1which handles the domain name “b1” below the domain name “a1” is “7981”,and the port number is “710”.

[0610]FIG. 131 illustrates the internal table 21100-2 of the verifyingserver 21100-1 handling the domain “b1”, indicating, e.g., that thedomain name “c1” below the domain name “b1” shows “YES” in the endpointin the internal table 21100-2, meaning that there are no more domainnames below, and that in this example, the domain name “c1.b1.a1” hasbeen registered with the verifying server, and facts such that thepassword PW is “224691”, that the date of expiration is “98-12-31”,etc., are recorded therein.

[0611] <<Calling Verifying Server>>

[0612] With reference to FIG. 132, description will be made regardingthe procedures in which the connection server 21028-1 calls theverifying server 21100-1 using the domain name “c1.b1.a1.”, and checkswhether or not the domain name “c1.b1.a1.” has been registered in theverifying server. Now, the connection server 21028-1 has therein the ICSnetwork address of the verifying server handling the domain “root” onLevel 1 shown in FIG. 128. Also, in the event that there is a great dealof communication with the verifying servers which handle the Level 2 andLevel 3 domains, the ICS network addresses of the verifying serversthereof are held therein.

[0613] The connection server 21028-1 enters the domain name “c1.b1.a1.”in the internal resolver 21029-1. The resolver 21029-1 sends the ICSframe 21335-1 including “a1” under the domain name “root” and the cipherparameter RP2 to the verifying server 21102-1, and an ICS packet 21336-1including an ICS network address “7971” of the ICS domain name serverfor “a1” is returned. Next, the resolver 21029-1 sends an ICS packet21345-1 including “b1” to the verifying server 21101-1, and an ICSpacket 21346-1 including an ICS network address “7981” of the verifyingserver for “b1” is returned. Next, the resolver 21029-1 sends an ICSpacket 21355-1 including “c1” to the verifying server 21100-1, andregarding the domain name “c1”, the space for the endpoint of 21100-1 is“Yes” this time, so it can be judged that verification information hasbeen registered. In this way, “root”, “a1” and “b1” have been followedin order, so it can be understood that the verification information forthe reversed domain name “c1.b1.a1.” is registered in the internal table21100-2.

[0614] The verifying server 21100-1 checks the received cipher parameterRP, and checks that the expiration date “98-12-31” has not expired.Next, the verifying server 21100-1 reads the password PW and the valueof the cipher number written in the verifying table, and selects cipherfunction Ei. The cipher parameter RP is RR2=Ei(PW, TR)∥TR, so the timerandom number TR to the latter half of RP2 is used to calculate t=Ei(PW,TR). In the event that the value of this temporary variable t calculatedhere matches the first half Ei(PW, TR) of the received RP2, confirmationcan be made that the password PW entered into the terminal 21200-1 iscorrect. The above results are reported to the connection server21028-1. Consequently, the connection server 21028-1 can know theverification results (authorized or denied) and the billing class MNY.

[0615] <<Other Embodiment of Roaming without a Home IP Terminal>>

[0616] In the above embodiment, in the event that the ICS receptionistdoes not set a home IP terminal, the earlier-described “Registrationprocedures from home IP terminal” are performed via the user serviceserver 21250-1. In this case, the billing record “120” within theverifying table 21100-2 within the verifying server 21100-1, and theinformation “7981-710-1” of the verifying server presented to thebilling notification destination within the conversion table 21023-1,are used.

[0617] <<Another Embodiment of Roaming wherein the Verifying Server isIncluded in the Domain Name Server>>

[0618] The structure of the domain name tree shown in FIG. 128 that isthe object of verifying server 21110-1 is the same as the domain nametrees that are the object of domain name servers in other embodiments.Accordingly, each domain server is capable of storing the data of theverifying server described in the present embodiment, and include thefunction of a verifying server. That is, this other method of carryingout roaming is realized by integrating the verifying server described inthe present embodiment with the domain name server described in otherembodiments.

[0619] <<Access Control Apparatus and IP Terminal Connecting withWireless Transceiver>>

[0620] With reference again to FIG. 124, a wireless transceiver 21620-1is provided within the ICS 21000-1, and the wireless transceiver 21620-1and a wireless transceiver 21640-1 can exchange information one withanother via a wireless communication path 21625-1. The terminal 21630-1includes the wireless transceiver 21640-1, and as with the case of theearlier-described IP terminal 21200-1, the terminal 21200-2 hasfunctions for inter-corporation communication using an ICS domain name.There is an information communication path 21610-1 between the accesscontrol apparatus 21020-1 and the wireless transceiver 21620-1. Theinformation communication path 21610-1 is like the ICS user logiccommunication line in that it has functions for sending and receivingICS user packet, and these are different in that the informationcommunication path 21610-1 is within the ICS 21000-1. The wirelesstransceiver 21620-1 and the wireless transceiver 21640-1 both havefunctions for receiving the ICS user packet, converting the informationwithin the ICS user packet into ICS user packet information in waveformformat and transmitting them, and also reverse function, i.e., receivingICS user packet information in waveform format and reverse-convertinginto ICS packet format and transmitting these. Accordingly, the ICS userpacket sent out from the IP terminal 21200-2 passes through the wirelesstransceiver 21640-1 wireless communication path 21625-1, wirelesstransceiver 21620-1, and information communication path 21610-1, and isprovided to the access control apparatus. Also, an ICS packet sent outin the reverse direction, i.e., sent from the access control apparatus21020-1 passes through the information communication path 21610-1, thewireless transceiver 21620-1, the wireless communication path 21625-1,the wireless transceiver 21640-1, and is delivered to the IP terminal21200-2.

Embodiment-19 (Closed-Zone Network Communication using NetworkIdentifier, and Open-Zone Communication)

[0621] A method for using a network identifier to restrict virtualdedicated line service, intra-corporation communication service andinter-corporation communication service to within the closed-zone, and amethod for non-specifying the closed-zone specification of the networkidentifier, i.e., specifying open-zone, will be described. Here, thenetwork identifier is appropriated corresponding with the ICS useraddress.

[0622] <<Configuration>>

[0623] As shown in FIGS. 133 to 136, an ICS 22000-1 includes accesscontrol apparatuses 22010-1, 22020-1, 22030-1 and 22040-1, and theaccess control apparatus 22010-1 includes a line portion 22011-1, aprocessing device 22012-1 and a conversion table 22013-1, the accesscontrol apparatus 22020-1 includes a line portion 22021-1, a processingdevice 22022-1 and a conversion table 22023-1, the access controlappartus 22030-1 includes a line portion 22031-1, a processing device22032-1 and a conversion table 22033-1, the access control apparatus22040-1 includes a line portion 22041-1, a processing device 22042-1 anda conversion table 22043-1, and blocks 22060-1, 22061-1, 22062-1,22063-1 and 22064-1 are each relay devices, and are interconnected andalso connected to one of the access control apparatuses, via the ICSnetwork communication line. Blocks 22101-1, 22102-1, 22103-1, 22104-1,22105-1, 22106-1, 22107-1, 22108-1, 22109-1, 22110-1, 22111-1 and22112-1 are each corporation LANs, and are each connected to the lineportions of one of the access control apparatuses via the respectivegateways and the ICS user logic communication line. Here, a block22120-1 is a gateway for LAN 22101-1, a block 22121-1 is an ICS userlogic communications line, and the other gateways and ICS user logiccommunication lines are also in similar positions, as shown in FIGS. 133through 136.

[0624] Each LAN has 2 to 3 IP terminals having function for sending anIP user packet, wherein the ICS user addresses are: for within LAN22101-1, “1500” and “1510”; for within LAN 22102-1, “5200”, “5210”, and“5250”; for within LAN 22103-1, “1900” and “1910”; for within LAN22104-1, “1100” and “1110”; for within LAN 22105-1, “4200” and “4210”;for within LAN 22106-1, “1800” and “1810”; for within LAN 22107-1,“1920” and “1930”; for within LAN 22108-1, “5410” and “5420”; for withinLAN 22109-1, “1430” and “1440”; for within LAN 22110-1, “6500” and“1960”; for within LAN 22111-1, “1820” and “1830”; and for within LAN22112-1, “4410” and “1420”.

[0625] In the above description, values “1000” through “1999” for theICS user address indicate the ICS user addresses for theintra-corporation communication, values “2000” through “6999” for theICS user address indicate the ICS user addresses for theinter-corporation communication, and values “7000” through “9999” forthe ICS network address indicate the ICS network addresses. The ICSnetwork server uses the ICS user address range (“1000” through “1999”)when performing the intra-corporation communication, and the ICS useraddress range (“2000” through “6999”) when performing theinter-corporation communication. Also, the ICS user addresses used forthe intra-corporation communication can also be used for theinter-corporation communication.

[0626] <<Conversion Table Line and Network Identifier>>

[0627] Description will be made regarding “lines” in the conversiontable. For example, in conversion table 22013-1, shown in FIG. 137 theexample is that wherein: in the first line, the value of requestidentification is “1”, the value of transmitting ICS network address is“8100”, the value of sender ICS user address (intra-corporation) is“1500”, sender ICS user address (inter-corporation) is blank, the valueof receiver ICS user address is “1100”, the value of receiving ICSnetwork address is “7100”, the value of the network identifier is“A001”, and other items are unfilled. Here, a blank space may mean“Null”. The “line” in the conversion table is also referred to as a“record” of the conversion table. The network identifier is a symbolprovided for sectoring off a section of the ICS network and making thatportion a net, and distinguishing the net, and may be a numeral or acode. The network identifiers are provided per line in the conversiontable. Incidentally, in the event that the network is not to be aclosed-zone network, this is indicated in each line in the conversiontable with “Open”, as shown in conversion table 22033-1 (FIG. 139).

[0628] The operation will be described with reference to the flowchartsin FIGS. 141 and 142.

[0629] <<Closed-Zone/Intra-Corporation Communication>>

[0630] An ICS user frame S01 is sent out from an IP terminal having anaddress “1100” within the LAN 22104-1, and reaches the access controlapparatus 22020-1 via the ICS user logic communication line. At the timeof receiving the ICS user packet S01 from the ICS logic terminal withthe address “7100” of the line portion 22021-1, the access controlapparatus 22020-1 obtains the transmitting ICS network address “7100”,and further obtains the sender ICS user address “1100” and the receiverICS user address “1500” from the ICS user packet S01 (Step SP100), andchecks whether the transmitting ICS network address “7100” is registeredon the conversion table 22023-1 with the request identification as “3”(Step SP110). In this case, it is not registered, so next the accesscontrol apparatus 22020-1 checks whether or not there is a record in theconversion table 22023-1 that contains all of the ICS network address“7100”, the sender ICS user address “1100”, and the receiver ICS useraddress “1500”, these having been obtained as described above (StepSP120). In this case, the existence of such is confirmed (Step SP130),and next, the sender ICS user address (intra-corporation) of this recordalone is recorded as “1100”, confirmation is made that the space for thesender ICS user address (inter-corporation) is blank, following whichreceiving ICS network address “8100” is obtained (Step SP160).

[0631] Next, an ICS encapsulation is performed using the transmittingICS network address “7100” thus obtained and the receiving ICS networkaddress “8100” (Step SP180), and the ICS network packet T01 thusobtained is sent out onto the ICS network communication line (StepSP190). The ICS network packet T01 passes through the relay devices22062-1, 22061-1 and 22060-1, and reaches the access control apparatus22010-1. The access control apparatus 22010-1, upon receiving the ICSnetwork packet T01 (Step ST100), confirms that the receiving ICS networkaddress “8100” written within the network control field (ICS capsule) ofthe ICS network packet T01 is registered as the transmitting ICS networkaddress “8100” within the conversion table 22013-1 (Step ST110), andthen performs the ICS reverse encapsulation (Step ST120), and sends theobtained ICS user packet S01 to the ICS logic communication line 12121-1connected to the address “8100” within the line portion 22011-1 (StepST130). Incidentally, in the event that the receiving ICS networkaddress “8100” is not registered within the conversion table 22013-1,the ICS network packet T01 is discarded (Step ST115).

[0632] <<Closed-Zone/Intra-Corporation Communication/Access to NetworkServer>>

[0633] An ICS user packet S02 is sent out from an IP terminal having anaddress “1100” within the LAN 22104-1. At the time of receiving the ICSuser packet S02 from the ICS logic terminal with the address “7100” ofthe line portion 22021-1, the access control apparatus 22020-1 obtainsthe transmitting ICS network address “7100”, and further obtains thesender ICS user address “1100” and the receiver ICS user address “6100”from the ICS user packet S02 (Step SP100), and checks whether the ICSnetwork address “7100” is registered on the conversion table 22023-1with the request identification as “3” (Step SP110). In this case, it isnot registered, so next the access control apparatus 22020-1 checkswhether or not there is a record in the conversion table 22023-1 thatcontains all of the ICS network address “7100”, the sender ICS useraddress “1100” and the receiver ICS user address “6100”, these havingbeen obtained as described above (Step SP120). In this case, thenonexistence of such is confirmed (Step SP130)

[0634] Next, search is made for a record identical to the above receiverICS user address “6100” from one or more records in the conversion tablewith a network identifier the same as the network identifier “A001”having the request identification value “4” in the conversion table22023-1 with the afore-mentioned ICS network address of “7100” and thesender ICS user address of “1100” (in this case, the third record fromthe top in the conversion table 22023-1), and the receiving networkaddress “9100” written to the record is found (Step SP170). Next, theICS encapsulation is performed using the transmitting ICS networkaddress “7100” and the receiving ICS network address “9100” thusobtained (Step SP180), and the ICS network frame T02 thus obtained issent out onto the network communication line (Step SP190). The ICSnetwork packet T02 passes through the relay devices 22062-1 and 22061-1,and reaches the ICS network server 22081-1. The same is true for the ICSuser packet S03 sent out from the IP terminal having the address “1110”within the LAN 22104-1, the network identifier is “A002”, and isICS-encapsulated to become the ICS network packet T03, and passesthrough the relay devices 22062-1 and 22061-1, and reaches the ICSnetwork server 22082-1.

[0635] <<Closed-Zone/Inter-Corporation Communication>>

[0636] An ICS user packet S04 is sent out from an IP terminal having anaddress “4200” within the LAN 22105-1. At the time of receiving the ICSuser frame S04 from the ICS logic terminal with the address “7200” ofthe line portion 22021-1, the access control apparatus 22020-1 obtainsthe transmitting ICS network address “7200”, and further obtains thesender ICS user address “4200” and the receiver ICS user address “5200”from the ICS user packet S04 (Step SP100), and checks whether theaddress “7200” is registered on the conversion table 22023-1 with therequest identification as “3” (Step SP110). In this case, it is notregistered, so next the access control apparatus 22020-1 checks whetheror not there is a record in the conversion table 22023-1 that containsall of the transmitting ICS network address “7200”, the sender ICS useraddress “4200” and the receiver ICS user address “5200”, these havingbeen obtained as described above (Step SP120). In this case, theexistence of such is confirmed (Step SP130), and next, the sender ICSuser address (intra-corporation) of this record is blank, confirmationis made that the sender ICS user address (inter-corporation) alone isrecorded as “4200” (Step SP160).

[0637] Next, the ICS encapsulation is performed using the transmittingICS network address “7200” thus obtained and the receiving ICS networkaddress “8200” (Step SP180), and the ICS network packet T04 thusobtained is sent out onto the network communication line (Step SP190).The ICS network packet T04 passes through the relay devices 22062-1,22061-1 and 22060-1, and reaches the access control apparatus 22010-1.The access control apparatus 22010-1, upon receiving the ICS networkpacket T04 (Step ST100), confirms that the receiving ICS network address“8200” written within the network control field (ICS encapsule) of theICS network frame T04 is registered as the transmitting ICS networkaddress “8200” within the conversion table 22013-1 (Step ST110), andthen performs the ICS reverse encapsulation (Step ST120), and sends theobtained ICS user packet S04 to the ICS logic communication lineconnected to the address “8200” (Step ST130).

[0638] <<Closed-Zone/Inter-Corporation Communication/Access to NetworkServer>>

[0639] An ICS user packet S05 is sent out from an IP terminal having anaddress “4200” within the LAN 22105-1. At the time of receiving the ICSuser packet S05 from the ICS logic terminal with the address “7200” ofthe line portion 22021-1, the access control apparatus 22020-1 obtainsthe transmitting ICS network address “7200”, and further obtains thesender ICS user address “4200” and the receiver ICS user address “6200”from the ICS user packet S05 (Step SP100), and checks whether the ICSnetwork address “7200” is registered on the conversion table 22023-1with the request identification as “3” (Step SP110). In this case, it isnot registered, so next the access control apparatus 22020-1 checkswhether or not there is a record in the conversion table 22023-1 thatcontains all of the transmitting ICS network address “7200”, the senderICS user address “4200” and the receiver ICS user address “6200”, thesehaving been obtained as described above (Step SP120). In this case, thenon-existence of such is confirmed (Step SP130), and next, search ismade for a record identical to the above receiver ICS user address“6200” from one or more records in the conversion table with a networkidentifier the same as the network identifier “B001” having the requestidentification value “4” (ICS network server specification) in theconversion table 22023-1 with the aforementioned receiver ICS networkaddress of “7200” and the sender ICS user address of “4200” (in thiscase, the seventh record from the top in the conversion table 22023-1),and the receiving network address “9200” written to the record is found(Step SP170).

[0640] Next, the ICS encapsulation is performed using the transmittingICS network address “7200” and the receiving ICS network address “9200”thus obtained (Step SP180), and the ICS network packet T05 thus obtainedis sent out onto the ICS network communication line (Step SP190). TheICS network packet T05 passes through the relay device 22062-1 andreaches the ICS network server 22083-1. The same is true for the ICSuser packet S06 sent out from the IP terminal having the address “4210”within the LAN 22105-1, the network identifier is “B002”, and isICS-encapsulated to become the ICS network frame T06, and passes throughthe relay device 22062-1 and reaches the ICS network server 22084-1.

[0641] <<Communication from Network Server within ICS to Network ServerOutside of ICS>>

[0642] The IP terminal 22092-1 within the LAN 22102-1 is an “ICSexternal server”, comprised of an IP terminal placed outside the ICS22000-1 and so forth. The ICS external server 22092-1 has an ICS useraddress “5250”, and is registered in the conversion table 22013-1 (ninthrecord from the top in the in the conversion table 22013-1). However,the receiver ICS user address and the receiving ICS network addressspaces are blank, and are registered as being “Null”. At the time thatthe ICS internal server 22084-1 sends out an ICS network packet T22, theICS network packet T22 passes through the relay devices 22062-1, 22061-1and 22060-1, and reaches the access control apparatus 22010-1 (StepSP100), confirmation is made that the transmitting IC network address isnot registered within the conversion table 22013-1 as “8200”, the ICSreverse encapsulation is performed (Step SP120) in order to form the ICSuser packet S22, which is sent toward the ICS external server 22092-1(Step SP130). For reverse direction communication, the ICS encapsulationis performed using the conversion table 22013-1, and delivery is made tothe ICS internal server 22084-1.

[0643] <<Closed-Zone/Virtual Dedicated Line>>

[0644] An ICS user packet S07 is sent out from an IP terminal having anaddress “1800” within the LAN 22106-1. At the time of receiving the ICSuser packet S07 from the ICS logic terminal with the address “7300” ofthe line portion 22021-1, the access control apparatus 22020-1 obtainsthe transmitting ICS network address “7300”, and further obtains thesender ICS user address “1800” and the receiver ICS user address “1900”from the ICS user packet S07 (Step SP100), and checks whether the ICSnetwork address “7300” is registered on the conversion table 22023-1with the request identification as “3”, i.e., as a virtual dedicatedline connection (Step SP110). In this case, it is registered. Next theaccess control apparatus 22020-1 checks whether or not there is a recordin the conversion table 22023-1 that contains the transmitting ICSnetwork address “7300” and the receiver ICS user address “1900”, thesehaving been obtained as described above (Step SP140). In this case, suchdoes not exist, so the receiver ICS network address “8300” of the recordwherein the receiver ICS user address space is blank (or “Null”) withthe ICS network address “7300” in the conversion table 22023-1 is found(Step SP145), the ICS encapsulation is performed using the transmittingICS network address “7300” thus obtained and the receiving ICS networkaddress “8300” (Step SP180), and the ICS network packet T07 thusobtained is sent out onto the network communication line (Step SP190).The ICS network packet T07 passes through the relay devices 22062-1,22061-1 and 22060-1, and reaches the access control apparatus 22010-1.The access control apparatus 22010-1, upon receiving the ICS networkpacket T07 (Step ST100), confirms that the receiving ICS network address“8300” written within the network control field (ICS capsule) of the ICSnetwork packet T07 is registered as the transmitting ICS network address“8300” within the conversion table 22013-1 (Step ST110), and thenperforms the ICS reverse encapsulation (Step ST120), and sends theobtained ICS user packet S07 to the ICS logic communication line 12121-1connected to the address “8300” within the line portion 22011-1 (StepST130).

[0645] This is the same for ICS user packet S09 sent out from the IPterminal having the ICS user address “1820” within the LAN 22111-1, thenetwork identifier is “C002”, the ICS encapsulation is performed andtransferred through the ICS 22000-1, the ICS reverse encapsulation isperformed at the access control apparatus 22030-1 to form an ICS userpacket S09, which reaches the IP terminal having the ICS user address“1920” within the LAN 22107-1.

[0646] <<Closed-Zone/Virtual Dedicated Line/Access to Network Server>>

[0647] An ICS user packet S08 is sent out from an IP terminal having anaddress “1810” within the LAN 22106-1. At the time of receiving the ICSuser packet S08 from the ICS logic terminal with the address “7300” ofthe line portion 22021-1, the access control apparatus 22020-1 obtainsthe ICS network address “7300”, and further obtains the sender ICS useraddress “1810” and the receiver ICS user address “6300” from thetransmitting ICS user packet S08 (Step SP100), and checks whether “7300”is registered on the conversion table 22023-1 with the requestidentification as “3” (virtual dedicated line) (Step SP110). In thiscase, it is registered. Next the access control apparatus 22020-1 checkswhether or not there is a record in the conversion table 22023-1 thatcontains the transmitting ICS network address “7300” and the receiverICS user address “6300”, these having been obtained as described above(Step SP140). In this case, such does exist, and the receiving networkaddress “9300” written to the record is found (Step SP145). Next, theICS encapsulation is performed using the transmitting ICS networkaddress “7300” and the receiving ICS network address “9300” thusobtained (Step SP180), the transmitting ICS network address “7300” thusobtained and the receiving ICS network are used to perform the ICSencapsulation (Step SP180), and the ICS network packet T08 thus obtainedis sent out onto the ICS network communication line (Step SP190). TheICS network packet T08 passes through the relay devices 22062-1 and22064-1, and reaches the ICS network server 22087-1.

[0648] The same is true for the ICS user packet S10 sent out from the IPterminal having the address “1830” within the LAN 22111-1, the networkidentifier is “C002”, and is ICS-encapsulated to become the ICS networkpacket T10, and passes through the relay device 22064-1 and reaches theICS network server 22089-1.

[0649] <<Open-Zone/Inter-Corporation Communication>>

[0650] Open-zone/inter-corporation communication is almost the same asthe aforementioned closed-zone/inter-corporation communication; thedifference is that checking has been added for registration of both thesender ICS user address (intra-corporation) and the sender ICS useraddress (inter-corporation) in searching the records in conversiontables 22013-1 and 22043-1, as described below.

[0651] An ICS user packet S13 is sent out from an IP terminal having auser address “1420” within the LAN 22112-1. At the time of receiving theICS user packet S13 from the ICS logic terminal with the address “7405”of the line portion 22041-1, the access control apparatus 22040-1obtains the transmitting ICS network address “7405”, and further obtainsthe sender ICS user address “1420” and the receiver ICS user address“5420” from the ICS user packet S13 (Step SP100), and checks whether theICS network address “7405” is registered on the conversion table 22043-1with the request identification as “3” (Step SP110). In this case, it isnot registered, so next the access control apparatus 22040-1 checkswhether or not there is a record in the conversion table 22043-1 thatcontains all of the transmitting ICS network address “7405”, the senderICS network address “1420” and receiver ICS user address “5420”, thesehaving been obtained as described above (Step SP120), the existence ofsuch is confirmed (Step SP130), and next, a record is found recorded inthe conversion table 22043-1 wherein the sender ICS user address(intra-corporation) is “1420” and the sender ICS user address(inter-corporation) is “5420” (in this case, the fifth record from thetop on conversion table 22043-1). Next, the received sender ICS useraddress (intra-corporation) “1420” is re-written to a inter-corporationaddress “4420”, and the receiving ICS network address “8400” registeredto this record is obtained (Step SP160). Next, the ICS encapsulation isperformed using the transmitting ICS network address “7405” and thereceiving ICS network address “8400” thus obtained (Step SP180), and theICS network packet thus obtained is sent out onto the ICS networkcommunication line (Step SP190). The ICS network packet passes throughthe relay devices 22064-1 and 22063-1, and reaches the access controlapparatus 22030-1. The access control apparatus 22030-1, upon receivingthe ICS network packet (Step ST100), confirms that the receiving ICSnetwork address “8400” written within the network control field (ICScapsule) of the ICS network packet is registered as the transmitting ICSnetwork address “8400” within the conversion table 22033-1 (Step ST110),and then performs the ICS reverse encapsulation (Step ST120), and sendsthe obtained ICS user packet S130 to the ICS logic communication lineconnected to the address “8400” (Step ST130).

[0652] An ICS user packet S11 sent out from an IP terminal having an ICSuser address “4410” within the LAN 22112-1 is ICS-encapsulated by theaccess control apparatus 22040-1 by the same procedures as describedabove with regard to closed-zone/inter-corporation communication,transferred through the ICS 22000-1, reversely ICS-encapsulated in theaccess control apparatus 22030-1, and delivered to an IP terminal havingan ICS user address “5410” within the LAN 22108-1. As another example,an ICS user packet S12 sent out from an IP terminal having an ICS useraddress “4410” within the LAN 22112-1 is ICS-encapsulated by the accesscontrol apparatus 22040-1 by the same procedures as described above,transferred through the ICS 22000-1, delivered to the access controlapparatus 22030-1, and at the time of the ICS reverse encapsulation,reference to the record in conversion table 22033-1 (in this case, thefifth record from the top on the conversion table) reveals that theaddress “5430” written within the ICS user packet S12 is an ICS useraddress (inter-corporation), the address value “5430” is re-written toan ICS user address (intra-corporation) “1430” (Step ST120), an ICS userpacket S120 is generated, and delivered to the IP terminal having theICS user address “1430” within the LAN 22109-1. As another example, anICS user packet S14 sent out from an IP terminal having an ICS useraddress “1420” within the LAN 22112-1 has a sender ICS user address“1420” and a receiver ICS user address “5440”, is transferred throughthe ICS 22000-1 and is delivered to the IP terminal within the LAN 22109with an ICS user address of “1440” and a sender ICS user address “4420”,having been converted to an ICS user packet S140 with a receiver ICSuser address “1440”.

[0653] <<Open-Zone/Inter-Corporation Communication/Access to NetworkServer>>

[0654] ICS user packets S15 and S16 sent out from within the LAN 22112-1are delivered to the ICS network server 22085-1 that is the destinationof each, following the same procedures as that described above.

[0655] <<Communication from Network Server within ICS to Network ServerOutside of ICS>>

[0656] A block 22086-1 is an ICS network server within the ICS 22000-1,and is an “ICS external server”, comprised of a database placed outsidethe ICS 22000-1, and so forth. The ICS external servers 22090-1 and22091-1 have ICS user addresses “6500” and “1960”, and are registered inthe conversion table 22033-1 (in this case, the eighth and ninth recordsfrom the top in the in the conversion table 22033-1). However, thereceiver ICS user address and the receiving ICS network address spacesare blank, and are registered as being “Null”. The ICS external server22091-1 has sender ICS user address (intra-corporation) “1960”, andfurther, is provided with a sender ICS user address (inter-corporation)“6960”. Also, the ICS internal server 22086-1 has ICS user address“6600”, ICS network address “9500”, these being registered in theconversion table 22033-1 (in this case, the tenth record from the top inthe in the conversion table 22033-1).

[0657] At the time that the ICS internal server 22086-1 sends out theICS network packet T20, the ICS network packet T20 passes through therelay devices 22063-1 and reaches the access control apparatus 22030-1,the ICS reverse encapsulation is performed using the conversion table22033-1 in order to form the ICS user packet S20, which is delivered tothe ICS external server 22090-1. For reverse direction communication,the ICS reverse encapsulation is performed in the access controlapparatus 22030-1 to form the ICS user packet S21, and delivery is madeto the ICS external server 22086-1. Summarizing the above, an ICSexternal server is placed outside of the ICS 22000-1, and communicationbetween internal servers within the ICS 22000-1 and external serversoutside the ICS 22000 is enabled.

[0658] An arrangement may be used wherein all or a plurality of recordsin the conversion table 22013-1 within the access control apparatus22010-1 are selected as necessary, stored within a conversion tablerecord file 22014-1, and extracting as necessary for performing the ICSencapsulation and the ICS reverse encapsulation. This also is true forthe conversion table 22023-1 within the access control apparatus 22020-1and so forth. In the access control apparatus, the portion of theconversion table 21033-1 in which specification of the networkidentifier is that for open-zone connection (“Open”) is usually not heldwithin the access control apparatus, and instead an arrangement may beused in which address information to be registered to the conversiontable is obtained from the domain name server 22095-1 and temporarilyused as a conversion table 22030-1. Also, the network server 22081-1 forclosed-zone/intra-corporation communication may be used as a domain nameserver for closed-zone/intra-corporation communication which can becommanded by the network identifier “A001”. Incidentally, thehierarchical structure of the domain name in the example is shown to bea single-layer structure specifying, e.g., domain name “a1”, but thismay be made to be 2- or 3-layer hierarchy such as “b1.a1.” or“c1.b1.a1.”. Further, the network server 22083-1 forclosed-zone/inter-corporation communication may be used as a domain nameserver for closed-zone/inter-corporation communication which can becommanded by the network identifier “B001”. The network server 22087-1for closed-zone/virtual dedicated line may be used as a domain nameserver for closed-zone/virtual dedicated line which can be commanded bythe network identifier “C001”. Incidentally, in the present embodiment,the hierarchical structure of the domain name in the example is shown tobe a single-layer structure specifying, e.g., domain name “a1”, but thismay be made to be 2- or 3-layer hierarchy such as “b1.a1.” or“c1.b1.a1.”.

Embodiment-20 (IP Terminal Capable of Connecting to Plural AccessControl Apparatuses with Identifiers)

[0659] The present embodiment does not fix the IP terminal having thefunctions for sending and receiving ICS user IP packet to a specificaccess control device; rather, it realizes usage of an IP terminal whichcan be moved and connected to other access control apparatuses and used,i.e., capable of roaming, using identifiers. Roaming is realized basedon the ICS domain name provided to the IP terminal.

[0660] <<Password Transmission Technique using Cipher>>

[0661] The present embodiment includes procedures for ciphering a secretpassword PW and sending this from the sender (ciphering side) to thereceiver (decoding side). First, the ciphering function Ei and thedecoding function Di will be described. The ciphering function Ei isrepresented by y=Ei(k1, x), and the decoding function Di is representedby x=Di(k2, y). Here, y denotes the ciphertext, x denotes plain-text, k1and k2 are keys, and “i” represents cipher numbers (i=1, 2, . . . )determining the secret key code and public key code, including how thevalue of the cipher key is to be used. In the above, an arrangement maybe used wherein plain-text x′ is ciphered instead of the plain-text xwith x′=x∥r (wherein r is a random number), and discarding the randomnumber r from the plain-text x′ upon decoding, thus obtaining theplain-text x. Such an arrangement generates a different ciphertext eachtime the same plain-text is ciphered, owing to the random number, and itis said that such is less susceptible to cipher cracking.

[0662] (Example of cipher number i=1)

[0663] <<Preparation>>

[0664] The sender m discloses the domain name thereof (DNm) to thepublic including the receiver. The receiver calculates Km=Hash-1(DNm)using the secret data compression function Hash-1, and hands over onlythe cipher key Km using a safe method so as to be unnoticed by a thirdparty. This example is an example of using DES ciphering, and the senderholds a “ciphering module DES-e” for realizing the ciphering functionEi, and a cipher key Km. The cipher key Km is a secret value which thesender and receiver share. The receiver has the “ciphering module DES-d”for realizing the decoding function Di and the data compression functionHash-1. What is used for the data compression function Hash-1 isdetermined separately for each cipher number. A data compressionfunction is also referred to as a “hash function”.

[0665] <<Ciphering by Sender>>

[0666] The sender sets the secret password PW as x=PW, and ciphers asy=DES-e(Km,x) with the ciphering module DES-e and the cipher key Kmbeing held, thereby sending the ciphertext and domain name DNm.

[0667] <<Decoding by Receiver>>

[0668] The receiver receives the ciphertext y and the domain name DNm,calculates the secret cipher key Km as Km=Hash-1(DNm) using thereceiver's secret data compression function Hash-1, and the obtains theplain-text x as x=DES-d(Km,y) using the decoding module. The plain-textx is password PW, and the receiver can obtain the secret password PW. Athird party does not know the data compression function Hash-1 and thuscannot calculate the cipher key Km, and accordingly, cannot calculatethe secret password PW. In the above embodiment, as stipulation of thecipher number i=3, the ciphering function and the decoding function canbe replaced with coding function and decoding function other than DEScode.

[0669] (Example of cipher number i=2)

[0670] <<Preparation>>

[0671] The present example is an example of employing RSA ciphering,wherein the sender generates a ciphering function y=x^(e)mod n and adecoding function y=x^(d)mod n. Here, e≠d holds, the key d being asecret value. The sender hands to the receiver the discloseableciphering keys e and n, and the ciphering module RSA-e for realizingy=x^(e)mod n. The sender holds the ciphering keys and the cipheringmodule RSA-e. The sender holds neither the secret ciphering module norsecret data. On the other hand, the receiver holds n and the secret keyd and the ciphering module RSA-e for realizing y=x^(e)mod n.

[0672] <<Ciphering by Sender>>

[0673] The sender ciphers the secret password PW, own domain name DNm,and time of sending (year/month/day/hour/minute/second) as x=PW∥x1∥x2(wherein X1: domain name DNm, and x2: year/month/day/hour/minute/second)and encodes as y=x^(e)mod n using the ciphering module RSA-e, thussending the ciphertext y.

[0674] <<Decoding by Receiver>>

[0675] The receiver receives the ciphertext y and calculates y=x^(d)modn using the decoding module RSA-d held beforehand and the decoding key.The result is x=PW ∥x1∥x2, so the data which is at a certain positionfrom the head of x is used as PW. In the above ciphering, domain name x1and year/month/day/hour/minute/second x2 are used as random numbers. Athird party does not know the secret key d and thus cannot calculate thesecret password PW. In the above embodiment, as stipulations of thecipher number i=4, the values of the cipher keys e, d and n can bechanged. Also, as stipulations of the cipher number i=5, the RSAciphering technique can be replaced with a different public keyciphering technique.

[0676] <<Terminal Verification Technique using Password and RandomNumber>>

[0677] Description will be made regarding verification technique fordetermining whether or not the password PW used by a roaming terminalagrees with the password registered in the verifying server. Asprerequisite conditions, the verifying server of the verifying entityand the terminal of the user to receive verification have a password PWthat is secret to a third party, with a ciphering function E (whereiny=E(k,x), y represents ciphertext, k represents ciphering key, and xrepresents plain-text). Specific procedures for terminal verificationwill now be described. The terminal of the user to receive verificationdecides upon a random number R using appropriate means, calculatesY1=F(PW, R) using the password PW and the function y=F(PW, R) and sendsboth the random number R and Y1 to the verifying entity. The verifyingentity receives the random numbers R and Y1, and calculates Y2=F(FW, R)using the received random number R, the password PW held within, andfunction F, and checks whether or not Y1=Y2 holds. In the event thatthere is a match, the verification can be made that the owner of theterminal which is being verified is using the correct password PW, i.e.,verification of the terminal can be made. In the above technique, anarrangement in which the user to be verified cannot freely select therandom number R but rather the random number R is restricted todepending on time (called a time random number) further increasesdifficulty of a third party calculating the password. Instead of theciphering function used above, the secret data compression function Hjmay be used instead, for Y1, Y2=Hj(PW, R).

[0678] <<Overall Configuration>>

[0679]FIGS. 143 and 144 illustrate an overview of the roaming techniqueaccording to the present embodiment, wherein an ICS 21000-1 includesaccess control apparatuses 21010-1, 21020-1, 21030-1, 21040-1, 21050-1and 21060-1, relay devices 21080-1, 21081-1, 21082-1 and 21083-1,verification servers 21100-1, 21101-1, 21102-1 and 21103-1, domain nameservers 21130-1, 21131-1, 21132-1 and 21133-1, user service server21250-1 and an ICS authority server 21260-1. The access controlapparatus 21010-1 is provided with a conversion table 21013-1, aconversion table server 21016-1, a registration server 21017-1 and aconnection server 21018-1. The access control apparatus 21020-1 isprovided with a conversion table 21023-1, a conversion table server21026-1, a registration server 21027-1 and a connection server 21028-1.The connection servers 21018-1 and 21028-1 are provided with an ICS useraddress “6310”, and have the function to register access controlapparatuses determined as necessary to the IP terminal, or to connectthereto. The verifying server 21100-2 is shown in FIG. 145 and theconversion table 21023-1 is shown in FIG. 146.

[0680] The conversion table server 21016-1 has a function for re-writingthe contents of the conversion table 21013-1, and the conversion tableserver 21026-1 has a function for re-writing the contents of theconversion table 21023-1, which is the same as described in otherembodiments. Also, the LAN 21150-1 has an IP terminal 21151-1, the LAN21160-1 has an IP terminal 21161-1, and a block 21170-1 is an IPterminal. A block 21200-1 is a portable roaming terminal, and isidentified by the ICS domain name “c1.b1.a1.” provided uniquely withinthe ICS 21000-1.

[0681] <<Application for use of Roaming Terminal>>

[0682] The owner of a roaming terminal 21200-1 indicates as an ICS usageapplicant 21270-1 the payment method for the roaming terminal 21200-1,and applies to the ICS authority server 21260-1 via user service server21250-1 for an ICS domain name and an ICS user address. The paymentmethod is represented by billing class “MNY”, e.g., in the event thatMNY=1, the charges are billed to the home IP (i.e., an IP terminal whichis connected to the access control apparatus in a fixed manner), in theevent that MNY=2, the charges are paid according to the record of theverifying server. The ICS authority server 21260-1 sets an ICS domainname: “c1.b1.a1.” for using the roaming terminal 21200-1, and an ICSuser address “1200”. Further, in order to be connected to the accesscontrol apparatus in a fixed manner and use it, the owner of the IPterminal 21200-1 applies for an ICS network address to the ICS authorityserver 21260-1 via the user service server 21250-1. The user serviceserver 21250-1, upon obtaining the ICS network address, makes a requestto the conversion table server 21016-1 to set the ICS network address“8115” and the ICS user address “1200” in the conversion table 21013-1.

[0683] The ICS receptionist 21271-1 embeds inside the interior 21201-1of the roaming terminal 21200-1 the following: ICS domain name“c1.b1.a1.”, ICS user address “1200”, special ICS address for roamingterminals (called “roaming special number”) “1000”, ICS user address“6300” for registration server, and ICS user address “6310” forconnecting server, and further embeds inside the interior 21201-1 of theroaming terminal 21200-1 the ciphering function Ei and the decodingrelated data RP1. Now, RP1=Hj(domain∥name RP0)∥RP0 (whereinRP0=NMY∥i∥j∥NID) holds, and the domain name is “c1.b1.a1.”. MNY is theabove-described billing class, “i” is a cipher number for the cipher Ei,and “j” determines the type of Hash function Hj, and “NID” is a networkidentifier “B001”. Network identifies are named to distinguish betweenclosed-zone networks and open-zone networks. Data-compression functionHj is a secret dedicated function used only by the verifying server andthe user service server. The user does not hold the data compressionfunction Hj, and does not even known Hj, and thus is incapable ofgenerating cipher related data RP1.

[0684] <<Registration Procedures from Home IP Terminal>>

[0685] Description will be made with reference to FIG. 147. The roamingterminal user connects the roaming terminal 21200-1 to the position ofthe home IP terminal 21151-1. Next, the roaming terminal user decides ona password (PW) and enters this from the input unit 21204-1, and alsogenerates an ICS user packet PK01 using the ciphering function and thecoding-related data stored within 21202-1, and sends it to the accesscontrol apparatus 21010-1 via the ICS user logic communication line21152-1 (procedures T10). The destination of the ICS user packet PK01 is“6300” which points to the roaming registration server, and includes ownICS domain name “c1.b1.a1.”, cipher parameter PR1, ICS user address“1200”, expiration data “98-12-31”, ciphertext “y” which is the passwordthat has been ciphered, “tg” (wherein tg=1 in order to displayregistration procedures), and “Yes” or “No” for roaming connectionspecification. The generation method employed for the ciphertext “y” isthe ciphering technique described earlier. For example, in the eventthat the cipher number=2, ciphertext “y” is generated with y=x^(e)mod n(wherein x=PW∥c1.b1.a1.∥year/month/day/hour/minute/second). The accesscontrol apparatus 21010-1 looks at the conversion table 21013-1 andtransfers the ICS user packet PK01 to the registration server 21017-1with the destination “6300” (procedure T15). The registration server21017-1 uses the domain name “c1.b1.a1.” to call the verifying server21100-1 (procedure T20). Also, the method by which the registrationserver 21017-1 calls the verifying server 21100-1 using the domain nameis the same as the method by which the connection server 21028-1 callsthe verifying server 21100-1 using the domain name, the details thereofbeing described in detail later. The verifying server 21100-1 checks thecontents of the received ICS user packet PK01, and decodes theciphertext “y” using the earlier-described technique, therebycalculating the password PW. For example, in the event that the codenumber=2, the ciphertext “y” is decoded with x=y^(d)mod n. This yieldsx=PW∥1.b1.a1.∥year/month/day/hour/minute/second, so the password PW canbe obtained.

[0686] Next, the contents of the cipher parameter PP1 is RP1=Hj (domainname RP0)∥RP0 (wherein RP0=MNY∥i∥j∥NID), so the verifying server 21100-1uses the secret Hash function Hj held within the verifying server21100-1 and the obtained domain name “c1.b1.a1.” to calculate t=Hj(domain name∥RP0)∥RP0), and checks whether or not t=RP1 holds for thereceived RP1. If it holds, judgment is passed that the domain name“c1.b1.a1.”, billing class MNT, cipher numbers “i” and “j”, and thenetwork identifier “NID” have not been tampered with. The verifyingserver 21100-1 checks for excessive or insufficient registrationcontents, and in the event that the contents are normal, theregistration results are registered in the verifying table 21100-2;registration is not made in the event there are insufficientregistration contents.

[0687] This is illustrated in the verifying table 21100-2 in the linewith the administration number 1, with the domain name as “c1.b1.a1.”,cipher number “2”, billing class (MNY) “1”, value of calculated passwordPW “224691”, expiration date “98-12-31”, roaming connection of “Yes”,i.e., acceptance of a roaming connection. At the time of generating thePK01 in procedure T10, the aforementioned value of tg may be set to tg=2and roaming connection set to “No”. The password will not leak to athird party, due to application of the above-described ciphering method.Roaming registration is reported by passing through the registrationserver (procedure T30), then the access control apparatus 21010-1(procedure T35), and reported to the roaming IP terminal (procedureT40). Further, an ICS user packet for changing the value of the passwordPW with tg=3 or changing the date of expiration with tg=4 can be sentfrom the terminal 21200-1 via the ICS user logic communication line21152-1, after the above procedure T40 has been completed. Incidentally,a method which can be employed for changing the password involvesspecifying the prior password.

[0688] <<Sending and Receiving User IP Packet while Traveling>>

[0689] An example will be described regarding connecting a roamingterminal 21200-1 to the access control apparatus 21020-1 and sending andreceiving of the user IP packet between domain name “c1.b1.a1.” of theroaming terminal 21200-1 and the other party of communication with adomain name “c2.b2.a2.” The user inputs the following from the inputunit 21204-1: the domain name “c2.b2.a2.” of other party ofcommunication, “tg” which has been set to tg=5 for specifying sendingand receiving of user IP packet, own password PW, and “5” whichspecifies the roaming connection period in days (represented by TTL).The cipher parameter RP2 is data calculated with the password PW and theinside 21202-2. That is, year/month/day/second “yy-mm-dd-sssss” isgenerated and used as a time random number TR (TR=yy-mm-dd-sssss), andthe clock of inside 21202-2 and the cipher function Ei is used tocalculate RP2=Ei(PW, TR)∥TR.

[0690] The access control apparatus 21020-1 receives the user IP packetPK02, obtains the ICS network address “7800” provided to the ICS logicterminal, and since the request identification from the conversion tableis “4” and further the sender ICS user address written to the user IPpacket PK02 is “1000” (i.e., roaming special number), the above ICSnetwork address “7800” is held, and is delivered with the ICS userpacket PK02 to the connection server 21028-1 pointed to by the receiverICS user address “6310” (procedure T60). The ICS network address “7800”obtained in this procedure will be used after the later-describedprocess T130.

[0691] <<Function of Connection Server>>

[0692] Next, the connection server 21028-1 calls the verifying server21100-1 using the domain name “c1.b1.a1”, and transfers the domain name“c1.b1.a1” and the parameter RP2 to the verifying server (procedureT70). The verifying server 21100-1 reads the values of the password PWand the cipher number written to the verifying table 21100-2, andselects cipher function Ei and reads the password PW. Next, the cipherparameter RP is RP2=Ei(PW, TR)∥TR, so the time random number which is tothe latter half of the RP2 is used to calculate t=Ei(PW, TR). In theevent that the value of this temporary variable t calculated herematches the first half Ei(PW, T) of the received RP2, confirmation canbe made that the password PW entered into the terminal 21200-1 iscorrect. The time function TR includes the year/month/day (i.e.,TR=yy-mm-dd-sssss), so unauthorized access can be discovered in the casethat the received year/month/day does not match that time of processing.

[0693] Next, the verifying server 21100-1 reports the following itemswritten in the verifying table 21100-2 to the connection server 21028-1(procedure T80): completion of roaming registration, billing class, andverifying server calling information (procedure T80). In the presentembodiment, the billing class is MNY=1, and the verifying server callinginformation is the ICS network address “7981” of the verifying server21100-1, port number “710” and administration number “1” of theverifying administration table. The connection server 21028-1 presentsthe domain name “c1.b1.a1.” to the domain name server, requests the ICSuser address and ICS network address associated with the domain name(procedure T90), and obtains the ICS user address “1200” and ICS networkaddress “8115” (procedure T100). In the same way, the connection serverpresents the domain name “c2.b2.a2.” to the domain name server, requeststhe ICS user address and the ICS network address associated with thedomain name (procedure T110), and obtains the ICS user address “2500”and the ICS network address “8200” (procedure T120).

[0694] Next, the connection server 21028-1 informs the conversion tableserver 21026-1 of the following (procedure T130): the ICS networkaddress “7800” of the ICS logic terminal which has input the ICS userpacket (held in procedure T60); the ICS user address “1200”, ICS useraddress “2500”, and ICS network address “8200”, just obtained from thedomain name server; and also the completion of roaming registration,billing class, and verifying server calling information received fromthe verifying server 21100-1. The conversion table server 2120-6 writesthe four addresses to the conversion table 21023-1 as received. Thevalue of the request identification is “10”, meaning theinter-corporation communication by roaming. The network identifier (NID)is “B001”. In the event that the billing class is MNY=1, the ICS networkaddress “8115” and the ICS user address “1200” just obtained from thedomain name server are forwarded to the billing notification destinationof the conversion table 21023-1. Also, in the event that the billingclass is MNY=2, verifying server calling information is forwarded to thebilling notification destination of the conversion table 21013-1.Further, “5” which specifies the roaming connection period in days isalso written to the conversion table 21013-1. When the writing to theconversion table 21023-1 is completed, the conversion table server21026-1 reports the results to the connection server 21028-1 (procedureT140). This completion report is sent via the access control apparatus21020-1 (procedure T150) to the roaming terminal 21200-1 with the ICSuser packet PK03 (procedure T160).

[0695] Now, the ICS user packet PK03 includes the ICS user address“1200” associated with the domain name “c1.b1.a1.” of the roamingterminal 21200-1, and the CS user address “2500” associated with thedomain name “c2.b2.a2.” of the other party of communication. Thecorporation operating the access control apparatus can charge the ownerof the roaming terminal 21200-1 for the above usage of the connectionserver 21028-1, i.e., the procedures for receiving the ICS user packetPK02 up to returning the ICS user packet PK03, and “5” which specifiesthe roaming connection period in days. The above embodiment is anexample of the network identifier (NID) “B001”, and is applied toclosed-zone networks described in other embodiments. Also, as anotherembodiment, the network identifier (NID) may be set as “Open” andapplied to an open-zone network. In this case, the roaming technique isthe same as that of the aforementioned closed-zone network “B001”.

[0696] <<Using the Roaming Terminal>>

[0697] The roaming terminal 21200-1 can use the conversion table 21023-1created following the above-described procedures, to perform theinter-corporation communication the same as with that described in otherembodiments (procedures T170 through T220). In the event that “5” whichspecifies the roaming connection period in days elapses, the conversiontable server 21026-1 can delete the above roaming connection written inthe inside of conversion table 21023-1.

[0698] <<Notification of Billing>>

[0699] The access control apparatus 21020-1 notifies the billingnotification destination registered in the conversion table 21023-1 ofthe communication charges (procedure T300 or T310).

[0700] <<Method for Accessing the Verifying Server>>

[0701] Of the above description, detailed description will be maderegarding the method for judging whether or not the verification requestcontained in the ICS network packet PK02 generated by the roamingterminal 21200-1 due to the connection server 21028-1 presenting thedomain name “c1.b1.a1.” to a plurality of verifying servers includingverifying server 21100-1 is correct, i.e., whether or not the domainname “c1.b1.a1.” of the roaming terminal 21200-1 is registered with theverifying server.

[0702] An example of 4-layer hierarchy will be described with referenceto FIG. 148. A domain name “root” is provided on Level 1 of the tree,and domain names “a1”, “a2”, “a3” . . . and so forth exist on Level 2below, domain names “b1”, “b2”, “b3” . . . and so forth exist on Level 3below “a1” for example, and domain names “c1”, “c2”, “c3” . . . and soforth exist on Level 4 below “b1” for example.

[0703]FIG. 149 illustrates the internal table 21102-2 of the verifyingserver 21102-1 handling the domain “root”, indicating, e.g., that theICS network address of the domain name server 21101-1 which handles thedomain name “a1” below the domain name “root” is “7971”, and the portnumber is “710”. Also, FIG. 150 illustrates the internal table 21101-2of the verifying server 21101-1 handling the domain “a1”, indicating,e.g., that the ICS network address of the domain name server 21100-1which handles the domain name “b1” below the domain name “a1” is “7981”,and the port number is “710”. FIG. 151 illustrates the internal table21100-2 of the verifying server 21100-1 handling the domain “b1”,indicating, e.g., that the domain name “c1” below the domain name “b1”shows “YES” in the terminal space in the internal table 21100-2, meaningthat there are no more domain names below, and that in this example, thedomain name “c1.b1.a1” has been registered with the verifying server,and facts such that the password PW is “224691”, that the date ofexpiration is “98-12-31”, etc., are recorded therein

[0704] <<Calling Verifying Server>>

[0705] With reference to FIG. 152, description will be made regardingthe procedures in which the connection server 21028-1 calls theverifying server 21100-1 using the domain name “c1.b1.a1.”, and checkswhether or not the domain name “c1.b1.a1.” has been registered in theverifying server. Now, the connection server 21028-1 has therein the ICSnetwork address of the verifying server handling the domain “root” onLevel 1 shown in FIG. 153. Also, in the event that there is a great dealof communication with the verifying servers which handle the Level 2 andLevel 3 domains, the ICS network addresses of the verifying serversthereof are held therein.

[0706] The connection server 21028-1 enters the domain name “c1.b1.a1.”in the internal resolver 21029-1. The resolver 21029-1 sends the ICSpacket 21335-1 including “a1” under the domain name “root” and thecipher parameter RP2 to the verifying server 21102-1, and an ICS packet21336-1 including an ICS network address “7971” of the ICS domain nameserver for “a1” is returned. Next, the resolver 21029-1 sends an ICSpacket 21345-1 including “b1” to the verifying server 21101-1, and anICS packet 21346-1 including an ICS network address “7981” of theverifying server for “b1” is returned. Next, the resolver 21029-1 sendsan ICS packet 21355-1 including “c1” to the verifying server 21100-1,and regarding the domain name “c1”, the space for the endpoint of21100-1 is “Yes” this time, so it can be judged that verifyinginformation has been registered. In this way, “root”, “a1”, and “b1”have been followed in order, so it can be understood that theverification information for the reversed domain name “c1.b1.a1.” isregistered in the internal table 21100-2.

[0707] The verifying server 21100-1 checks the received cipher parameterRP2, and checks that the expiration date “98-12-31” has not expired.Next, the verifying server 21100-1 reads the password PW and the valueof the cipher number written in the verification table, and selectscipher function Ei. The cipher parameter RP is RR2=Ei(PW, TR)∥TR, so thetime random number TR to the latter half of RP2 is used to calculatet=Ei(PW, TR). In the event that the value of this temporary variable tcalculated here matches the first half Ei(PW, TR) of the received RP2,confirmation can be made that the password PW entered into the terminal21200-1 is correct. The above results are reported to the connectionserver 21028-1. Consequently, the connection server 21028-1 can know theverification results (authorized or denied) and billing class MNY.

[0708] <<Other Embodiment of Roaming without a Home IP Terminal>>

[0709] In the above embodiment, in the event that the ICS receptionist21271-1 does not set a home IP terminal, the earlier-described“Registration procedures from home IP terminal” are performed via theuser service server 21250-1. In this case, the billing record “120”within the verifying table 21100-2 within the verifying server 21100-1,and the information “7981-710-1” of the verifying server presented tothe billing notification destination within the conversion table21023-1, are used.

[0710] <<Another Embodiment of Roaming wherein the Verifying Server isIncluded in the Domain Name Server>>

[0711] The structure of the domain name tree shown in FIG. 153 that isthe object of verifying server 21110-1 is the same as the domain nametrees that are the object of domain name servers in other embodiments.Accordingly, each domain server is capable of storing the data of theverifying server described in the present embodiment, and include thefunctions of a verifying server. That is, this other method of carryingout roaming is realized by integrating the verifying server described inthe present embodiment with the domain name server described in otherembodiments.

[0712] <<Access Control Apparatus and IP Terminal Connecting withWireless Transceiver>>

[0713] With reference again to FIG. 144, a wireless transceiver 21620-1is provided within the ICS 21000-1, and the wireless transceiver 21620-1and a wireless transceiver 21640-1 can exchange information one withanother via a wireless communication path 21625-1. The terminal 21630-1includes the wireless transceiver 21640-1, and as with the case of theearlier-described IP terminal 21200-1, the terminal 21200-2 has afunction for the inter-corporation communication using an ICS domainname. There is an information communication path 21620-1 between theaccess control apparatus 21020-1 and the wireless transceiver 21620-1.The information communication path 21610-1 is like the ICS user logiccommunication line in that it has a function for sending and receivingICS user packets, and these are different in that the informationcommunication path 21610-1 is within the ICS 21000-1. The wirelesstransceiver 21620-1 and the wireless transceiver 21640-1 both have afunction for receiving ICS user packets, converting the informationwithin the ICS user frame into ICS user packet information in waveformformat and transmitting them, and also reverse functions, i.e.,receiving ICS user packet information in waveform format andreverse-converting into ICS packet format and transmitting these.Accordingly, the ICS user packet sent out from the IP terminal 21200-2passes through the wireless transceiver 21640-1, wireless communicationpath 21625-1, wireless transceiver 21620-1, and informationcommunication path 21610-1, and is provided to the access controlapparatus. Also, ICS frame sent out in the reverse direction, i.e., sentfrom the access control apparatus 21020-1 passes through the informationcommunication path 21610-1, wireless transceiver 21620-1, wirelesscommunication path 21625-1, wireless transceiver 21640-1, and isdelivered to the IP terminal 21200-2.

[0714] Thus, according to the present invention, administration ofinformation communication is performed with a unified address system,and various services can be provided, without using dedicated lines orthe Internet, thus enabling structuring a large-scale communicationsystem with high security and with relatively low costs. Also,inter-corporation communication can be performed between individualcorporations (including government organizations, universities, and soforth) which had conventionally been services separately withpractically no change to the address system for computer communications.Further, since the network administrator holds the network controlauthority, the overall administration of the network becomes clear,increasing ease of securing reliability and also markedly improvingsecurity.

What is claimed is:
 1. An integrated information communication systemcomprising two or more access control devices, wherein a transmissionICS user frame is inputted from an ICS logical terminal at a terminationof a user communication line, and the transmission ICS user framebecomes an ICS network frame in an access control device of atransmitting side, and the ICS network frame is transferred through aninterior of the integrated information communication system and reachesan access control device of an incoming side, and the ICS network frameis restored as the ICS user frame in the access control device of theincoming side, and when telephone communication is carried out, an ICSuser address of a communication destination is acquired on the basis ofa telephone number, and a voice is carried on a ICS user frame.
 2. Anintegrated information communication system comprising two or moreaccess control devices, wherein a transmission ICS user frame isinputted from an ICS logical terminal at a termination of a usercommunication line, and the transmission ICS user frame becomes an ICSnetwork frame in an access control device of a transmitting side, andthe ICS network frame is transferred through an interior of theintegrated information communication system and reaches an accesscontrol device of an incoming side, and the ICS network frame isrestored as the ICS user frame in the access control device of theincoming side, and a telephone machine is connected via a telephone linefrom a telephone line control section at an interior of the accesscontrol device, and telephone communication is possible.
 3. Anintegrated information communication system comprising two or moreaccess control devices, wherein a transmission ICS user frame isinputted from an ICS logical terminal at a termination of a usercommunication line, and the transmission ICS user frame becomes an ICSnetwork frame in an access control device of a transmitting side, andthe ICS network frame is transferred through an interior of theintegrated information communication system and reaches an accesscontrol device of an incoming side, and in the access control device ofthe incoming side, the ICS network frame connects, to an access controldevice, a first radio transceiver which has a function of convertinginternal information of an ICS user frame into a radio wave type ICSuser frame and sending it and a function of receiving a radio wave typeICS user frame and reversely converting it into internal information ofan ICS user frame, and communication is carried out between the ICSnetwork frame and an IP terminal, in which a second radio transceiverhaving the same functions as said functions, is built-in.
 4. Anintegrated information communication system comprising two or moreaccess control devices, wherein a transmission ICS user frame isinputted from an ICS logical terminal at a termination of a usercommunication line, and the transmission ICS user frame becomes an ICSnetwork frame in an access control device of a transmitting side, andthe ICS network frame is transferred through an interior of theintegrated information communication system and reaches an accesscontrol device of an incoming side, and the ICS network frame isrestored as the ICS user frame in the access control device of theincoming side, and an ICS domain name of a receiver is presented from anexterior IP terminal of the integrated information communication systemto a conversion table server at an interior of the integratedinformation communication system, and the conversion table serverforwards an inquiry to a domain name server and acquires an address of areceiver corresponding to the ICS domain name, and the conversion tableserver rewrites the conversion table.
 5. An IP telephone machinecomprising at least an IP address storing section, a voiceinputting/outputting section, and a voice data transmitting/receivingsection, the IP telephone machine generating an ICS user frame includinga telephone number of a destination telephone machine and transmittingit to an ICS user communication line, wherein an ICS user address in theICS user frame is the ICS user address of the telephone machine includedin the IP address storing section and the ICS user address of an inquirydestination server, and the ICS user frame which stores the ICS useraddress of the destination telephone machine is received from the ICSuser communication line, and a voice is inputted from the voiceinputting/outputting section, and the voice is converted to a digitalvoice in the voice transmitting/receiving section and is stored in theICS user frame and is transmitted to the destination telephone machine,and thereafter, telephone communication is carried out by transmittingand receiving the ICS user frame, and the ICS user address in the ICSuser frame including the digital voice is the ICS user address of thetelephone machine and the ICS user address of the acquired destinationtelephone machine.
 6. An IP terminal comprising at least an ICS domainname and an ICS user address of the IP terminal, an ICS user address ofa registration server, and a code function and a code related data, andfurther comprising a function which generates an ICS user frame andtransmits and receives it, wherein a user of the IP terminal connectsthe IP terminal to a position of a home IP terminal and generates an ICSuser frame including at least an ICS domain name and an ICS user addressof the IP terminal and transmits it to a user communication line, and anaddress of the ICS user frame is the ICS user address of the IP terminaland the ICS user address of the registration server, and the IP terminalcan receive an ICS user frame including a report of the registrationfrom the user communication line.
 7. An IP telephone machine, wherein anintegrated information communication system includes two or more accesscontrol devices, and a transmission ICS user frame is inputted from anICS logical terminal at a termination of a user communication line, andthe transmission ICS user frame becomes an ICS network frame in anaccess control device of a transmitting side, and the ICS network frameis transferred through an interior of the integrated informationcommunication system and reaches an access control device of an incomingside, and the ICS network frame is restored as the ICS user frame in theaccess control device of the incoming side, and the IP telephone machineincludes at least an IP address storing section, a voiceinputting/outputting section, and a voice data transmitting/receivingsection, and, when telephone communication is carried out, generates anICS user frame including a telephone number of a destination telephonemachine and transmits it to an ICS user communication line, and the ICSuser address in the ICS user frame is the ICS user address of thetelephone machine included in the IP address storing section and the ICSuser address of an inquiry destination server, and the ICS user framewhich stores the ICS user address of the destination telephone machineis received from the ICS user communication line, and a voice isinputted from the voice inputting/outputting section, and the voice isconverted to a digital voice in the voice transmitting/receiving sectionand is stored in the ICS user frame and is transmitted to thedestination telephone machine, and thereafter, telephone communicationis carried out by transmitting and receiving the ICS user frame, and theICS user address in the ICS user frame including the digital voice isthe ICS user address of the telephone machine and the ICS user addressof the acquired destination telephone machine.
 8. An integratedinformation communication system comprising at least an IP addressstoring section, a voice inputting/outputting section, and a voice datatransmitting/receiving section, the IP telephone machine generating anICS user frame including a telephone number of a destination telephonemachine and transmitting it to an ICS user communication line, whereinan ICS user address in the ICS user frame is the ICS user address of thetelephone machine included in the IP address storing section and the ICSuser address of an inquiry destination server in the integratedinformation communication system, and the ICS user frame which storesthe ICS user address of the destination telephone machine is receivedfrom the ICS user communication line, and a voice is inputted from thevoice inputting/outputting section, and the voice is converted to adigital voice in the voice transmitting/receiving section and is storedin the ICS user frame and is transmitted to the destination telephonemachine, and thereafter, telephone communication is carried out bytransmitting and receiving the ICS user frame, and communication iscarried out by connecting to the IP telephone machine which carries outcommunication on the basis of the fact that the ICS user address in theICS user frame including the digital voice is the ICS user address ofthe telephone machine and the ICS user address of the acquireddestination telephone machine.
 9. An integrated informationcommunication system comprising two or more access control devices,wherein a transmission ICS user frame is inputted from an ICS logicalterminal at a termination of a user communication line, and thetransmission ICS user frame becomes an ICS network frame in an accesscontrol device at a transmitting side, and the ICS network frame istransferred through an interior of the integrated informationcommunication system and reaches an access control device of an incomingside, and the ICS network frame is restored as the ICS user frame in theaccess control device of the incoming side, and the ICS user frameincludes a digitized voice.
 10. An IP terminal comprising at least anICS domain name and an ICS user address of the IP terminal, an ICS useraddress of a registration server, and further comprising a functionwhich generates an ICS user frame and transmits and receives it, whereina user of the IP terminal connects the IP terminal to a position of ahome IP terminal and generates an ICS user frame including at least anICS domain name and an ICS user address of the IP terminal and transmitsit to a user communication line, and an address of the ICS user frame isthe ICS user address of the IP terminal and the ICS user address of theregistration server, and the IP terminal can receive an ICS user frameincluding a report of the registration from the user communication line.11. An IP terminal, wherein an integrated information communicationsystem includes two or more access control devices, and a transmissionICS user frame is inputted from an ICS logical terminal at a terminationof a user communication line, and the transmission ICS user framebecomes an ICS network frame in an access control device at atransmitting side, and the ICS network frame is transferred through aninterior of the integrated information communication system and reachesan access control device of an incoming side and is restored as the ICSuser frame, and in the access control device of the incoming side, theICS network frame includes at least an ICS domain name of the IPterminal, an ICS user address given to the access control device of theincoming side, and a function generating an ICS user address and an userICS frame of a registration server and transmitting and receiving them,and a user of the IP terminal connects the IP terminal to a position ofa home IP terminal and generates an ICS user frame including at least anICS domain name and an ICS user address of the IP terminal and transmitsit to the user communication line, and the address of the ICS user frameis the ICS user address of the IP terminal and the ICS user address ofthe registration server, and the IP terminal can receive the ICS userframe including a report of the registration from the user communicationline.
 12. An IP terminal comprising at least an IP address storingsection, a voice inputting/outputting section, and a voice datatransmitting/receiving section, and generating an ICS user frameincluding a telephone number of a destination IP terminal andtransmitting it to an ICS user communication line, wherein an ICS useraddress in the ICS user frame is the ICS user address of said IPterminal included in the IP address storing section and the ICS useraddress of an inquiry destination server, and the ICS user frame whichstores the ICS user address of the destination IP terminal is receivedfrom the ICS user communication line, and a voice is inputted from thevoice inputting/outputting section, and the voice is converted to adigital voice in the voice transmitting/receiving section and is storedin the ICS user frame and is transmitted to the destination IP terminal,and thereafter, telephone communication is carried out by transmittingand receiving the ICS user frame, and the ICS user address in the ICSuser frame including the digital voice is the ICS user address of saidIP terminal and the ICS user address of the acquired destination IPterminal.
 13. A communication method comprising at least an IP addressstoring section, a voice inputting/outputting section, and a voice datatransmitting/receiving section, and generating an ICS user frameincluding a telephone number of a destination IP terminal andtransmitting it to an ICS user communication line, wherein an ICS useraddress in the ICS user frame is the ICS user address of said IPterminal included in the IP address storing section and the ICS useraddress of an inquiry destination server, and the ICS user frame whichstores the ICS user address of the destination IP terminal is receivedfrom the ICS user communication line, and a voice is inputted from thevoice inputting/outputting section, and the voice is converted to adigital voice in the voice transmitting/receiving section and is storedin the ICS user frame and is transmitted to the destination IP terminal,and thereafter, telephone communication is carried out by transmittingand receiving the ICS user fame, and the ICS user address in the ICSuser frame including the digital voice is the ICS user address of saidIP terminal and the ICS user address of the acquired destination IPterminal.
 14. An integrated information communication system comprisingtwo or more access control devices, wherein a transmission ICS userframe is inputted from an ICS logical terminal at a termination of auser communication line, and the transmission ICS user frame becomes anICS network frame in an access control device of a transmitting side,and the ICS network frame is transferred through an interior of theintegrated information communication system and reaches an accesscontrol device of an incoming side, and in the access control device ofthe incoming side, the ICS network frame connects, to an access controldevice, a first radio transceiver which has a function of converting anICS user frame into a radio wave type ICS user frame and sending it anda function of receiving a radio wave type ICS user frame and reverselyconverting it into an ICS user frame, and communication is carried outbetween the ICS network frame and an IP terminal, in which a secondradio transceiver having the same functions as said functions, isbuilt-in.
 15. An integrated information communication system (ICS)including two or more access control devices, wherein a transmission ICSuser frame is inputted from an ICS logic terminal connected to a usercommunication line, and the transmission ICS user frame is convertedinto an ICS network frame in an access control device on thetransmitting side, and the ICS network frame is transferred through theintegrated information communication system and reaches an accesscontrol device on the receiving side, and the ICS user frame is restoredfrom the ICS network frame in the access control device on the receivingside, and when telephone communication is carried out, a telephonemachine on the receiving side receives an ICS user frame transmitted viaan ICS user communication line from an originating user, whereininputted voice signals are converted by voice datatransmitting/receiving means into a format which can be transmittedacross the ICS network, and are transmitted to the telephone machine onthe receiving side, and thereafter, telephone communication is carriedout by transmitting and receiving ICS user frames between theoriginating user and the destination user.
 16. A communication method,wherein two telephone machines communicate with each other across theintegrated information communication system (ICS) claimed in claim 15.