Integrated information communication system using internet protocol

ABSTRACT

The integrated information communication system is comprised of an access control apparatus for connecting a plurality of computer communication networks or information communication equipment to each, and a relay device for networking the aforementioned access control apparatus. The system has functions for performing routing by transferring information by a unified address system and by changing address at the access control apparatus, and is configured such that the aforementioned plurality of computer communication networks or information communication equipment can perform communications in an interactive manner. The integrated information communication system ensures communication speed, communication quality, communication trouble countermeasures in a unified manner, without using dedicated lines or the Internet, wherein security and reliability in communication is ensured without change of a private address system.

This is a Rule 1.53(b) Divisional application of Ser. No. 08/962,563,Filed Oct. 31, 1997, now U.S. Pat. No. 6,145,011.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to an integrated informationcommunications system integrally connecting information communicationequipments or information communication systems such as and/or forpersonal computer, LAN (Local Area Network), telephone (includingportable telephone), FAX (Facsimile), CATV (Cable Television), Internetand the like, not only via dedicated lines, but also via ISDN(Integrated Services Digital Network), FR (Frame Relay), ATM(Asynchronous Transfer Mode), IPX (Integrated Packet Exchange),satellite, wireless and public lines. Here, the integrated informationcommunication equipment performs communication provided with an address(for the information or the communication) for distinguishing theintegrated information communication equipments with other equipments.Particularly, the present invention relates to an integrated informationcommunication system which integrates data transfer services based onconnection-less networks (e.g., IP (Internet Protocol) technology usedRFC791 or RFC1883) and improves the overall economics of the informationcommunication system by employing a unified address system, and ensuringsecurity to realize an interactive communication between connectedterminals or systems.

2. Description of the Prior Art

In accordance with a development of computer and informationcommunication technology, computer communication networks have in recentyears come to be widely used in universities, research institutes,government organizations and intra-corporation/inter-corporationsituations. LANs are used for intra-corporation communication networks,and in the event that the geographic locale is on a national basis, theform thereof becomes such as shown in FIG. 1. In the example describedin FIG. 1, each local LAN uses a common protocol, with each beingconnected by dedicated lines. Here, e.g., corporation X has LAN-X1,LAN-X2 and LAN-X3 as LANs, corporation Y has LAN-Y1, LAN-Y2 and LAN-Y3as LANs, and both corporations X and Y use communication address systemsADX and ADY for respectively performing computer communications. Sinceit is necessary to lay a separate dedicated line for each corporationwith such a LAN network, system architecture becomes costly, and in theevent that connection is to be made to a LAN network of anothercorporation, interfacing must be matched such as the communicationaddress system, making inter-connection very difficult and very costly.

On the other hand, the Internet has recently become widespread as aglobal-scale computer communication network. On the Internet, networksare connected using a router of a provider, a communication protocolcalled TCP (Transmission Control Protocol)/IP (Internet Protocol) isemployed, dedicated lines or FR networks are used for connecting remoteareas, and Ethernets which are 10 Mbps LANs or FDDIs (Fiber DistributedData Interface) which are 100 Mbps LANs are used as communication pathswithin structures. FIG. 2 shows an example of an Internet connection, inwhich the routers in the providers maintain mutual connection byexchanging routing-table connection information. Each router isconnected to a plurality of networks, and judgment is made based on therouting-table regarding to which router connected to which provider'snetwork received data should go next. Thus, on the Internet, the IPaddress attached to each IP frame (IP datagram) is checked, the judgmentis made to which router the IP frame should be sent, and that the IPframe is sent accordingly. Thus, the IP frames are transferred one afteranother and delivered to a destination computer, by means of all routersperforming the above-described operation.

FIG. 3 illustrates the information contents of the RFC791 of the IPframe used by the Internet, divided into a control field and a datafield. FIG. 4 illustrates the information contents of a similar RFC1883,also divided into a control field and a data field. In either figure,the parentheses ( ) indicate the number of bits.

However, with the Internet, since the system is such that thecommunication path is not administrated in an integrated manner, onecannot tell whether the other party with which communication is beingmade is the authorized party, and there are problems regarding securityin that information may be eavesdropped. Also, in reality, IP addresseswithin many LANs are being separately decided by the LAN users, so thereis the necessity to replace the IP address of the LAN user to the IPaddress for the Internet when connecting the LAN to the Internet. Also,communication quality such as communication speeds and communicationerror rates for the trunk lines making up the Internet communicationpath differ from one line to another for each LAN, and are practicallynon-uniform. For example, there are problems such as an attempt to senda 10 Mbps TV signal for video-conferencing not achieving the desiredcommunication speed. Therefore, the Internet cannot be in peace used forthe communication of the country and the research institute whichespecially require the reliability or for the business of the company.Further, there is no administrator for performing maintenance of thenetwork such as in the case of failure, of for integrating the overallnetwork for future planning for the network and so forth. Also, with LANnetworks and the Internet, the terminals are personal computers(computers), and it has been difficult to user telephones, FAX, CATV andso on in an integrated manner therein.

SUMMARY OF THE INVENTION

The present invention has been made in accordance with theabove-described situations, and it is an object of the present inventionto provide an integrated information communication system capable ofcontaining a plurality of VANs (Value Added Networks) which performdata/information transfer by using IP frame of which security andreliability in communications has been ensured, by means of not usingdedicated lines or the Internet so as to improve economic considerationsof the information communication system architecture, and ensuringcommunication speeds, communication quality and communication troublecountermeasures in a unified manner. Also, it is another object of thepresent invention to provide an integrated information communicationsystem which uses a single information transfer which is not dependenton the type of service, such as sound, image (motion and still), text,etc., so as to inter-connect services which have conventionally beenprovided separately, such as total communication services,analog/digital telephone line services, Internet provider services, FAXservices, computer data exchange services, CATV services and so forth.Further, it is another object of the present invention to provide anintegrated information communication system which enablesinter-corporation communication with very little change to the computercommunication address systems which have been independently andseparately created within each separate corporation (includinguniversities, research institutes, government organizations, etc.).

The present invention relates to an integrated information communicationsystem, and the above objects of the present invention are realized asfollows: the present invention is configured by providing an accesscontrol apparatus for connecting a plurality of computer communicationnetworks or information communication equipments to each, and a relaydevice for networking the aforementioned access control apparatus, thesystem having functions for performing routing by transferring theinformation by a unified address system, and is configured such that theaforementioned plurality of computer communication networks orinformation communication equipments can perform communications in aninteractive manner.

In FIG. 1 which is given as an example of a conventional arrangement,the range of dedicated lines used for intra-corporation andinter-corporation communications is indicated by solid lines, and thisis replaced with the equivalent of a computer communication networkaccording to IP technology as a common communication network indicatedby broken lines.

The above-described objects of the present invention are achieved by anICS (Information Communication System) user frame having a unique ICSuser address system ADX being converted into an ICS network frame havingan address system ADS, based on the administration of a conversion tableprovided within an access control apparatus, and by being arranged suchthat in the case that transmission is made over at least one VANcontained therein following rules of the aforementioned address systemADS, and the destination other access control apparatus is reached,conversion is made to the aforementioned ICS user address system ADXbased on the administration of the aforementioned conversion table, andanother external information communication apparatus is reached. Also,the above-described objects of the present invention are achieved by anICS user frame having a unique ICS user address system ADX beingconverted into an ICS network frame corresponding with a reception ICSnetwork address registered beforehand to the conversion table inaccordance with a user logic communication line, rather than using anICS user address within the aforementioned ICS user frame based on theadministration of a conversion table provided within the access controlapparatus, and by being arranged such that in the case that transmissionof the aforementioned ICS network frame is made to another accesscontrol device via at least one VAN following rules of the ICS addresssystem ADS, the transfer destination of the aforementioned ICS networkframe being either 1 or N, this is returned to the aforementioned ICSnetwork frame based on the administration of a conversion table providedwithin the aforementioned access control apparatus, and another externalinformation communication apparatus is reached.

BRIEF DESCRIPTION OF THE DRAWINGS

In the accompanying drawings:

FIG. 1 is a block diagram for describing conventional LAN networks;

FIG. 2 is a diagram illustrating an example of a form of the Internet;

FIG. 3 is a diagram illustrating an IP frame according to RFC791stipulations;

FIG. 4 is a diagram illustrating an IP frame according to RFC1883stipulations;

FIG. 5 is a block diagram systematically illustrating the basicprinciple of the present invention;

FIG. 6 is a block diagram to show an example of a network wherein an ICSaccording to the present invention is constructed of a plurality ofVANs;

FIG. 7 is a block diagram to show an example of configuring the accesscontrol apparatus;

FIG. 8 is a block diagram to show an example of configuring the relayapparatus;

FIG. 9 is a block diagram to show an example of configuring theinter-VAN gateway;

FIG. 10 is a block diagram to show an example of configuring the ICSnetwork server;

FIG. 11 is an array diagram illustrating an example of the ICS useraddress used in the present invention;

FIG. 12 is a wiring diagram illustrating the connection relation betweenthe ICS logic terminals and the user communication lines;

FIG. 13 is a diagram illustrating the relation between the ICS userframe and the ICS network frame which are used in the present invention;

FIG. 14 is a portion of a constructional block diagram to show a firstembodiment (intra-corporation communication, inter-corporationcommunication) according to the present invention;

FIG. 15 is a portion of a constructional block diagram to show a firstembodiment (intra-corporation communication, inter-corporationcommunication) according to the present invention;

FIG. 16 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 17 is a diagram to show an example of the temporary conversiontable in the access control apparatus;

FIG. 18 is a flowchart to show an example of operation of the accesscontrol apparatus;

FIG. 19 is a flowchart to show an example of operation of the accesscontrol apparatus in inter-corporation communication;

FIG. 20 is a constructional block diagram to show a second embodiment(virtual dedicated line) according to the present invention;

FIG. 21 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 22 is a flowchart to show an example of operation of the accesscontrol apparatus in virtual dedicated line connection;

FIG. 23 is a constructional block diagram to show a third embodiment(ICS network server) according to the present invention;

FIG. 24 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 25 is a diagram to show an example of the table in the ICS networkdatabase;

FIG. 26 is a flowchart to show an example of operation within the accesscontrol apparatus in virtual ICS network server connection;

FIG. 27 is a constructional block diagram to show a fourth embodiment(ICS address administration server) according to the present invention;

FIG. 28 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 29 is a diagram to show an example of the correspondence table inthe ICS address administration server;

FIG. 30 is a flowchart to show an example of operation of the ICSaddress administration server;

FIG. 31 is a constructional block drawing illustrating a fifthembodiment (ICS name server) according to the present invention;

FIG. 32 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 33 is a diagram to show an example of the ICS name conversion tablein the ICS name server;

FIG. 34 is a flowchart to show an example of operation of the ICS nameserver;

FIG. 35 is a portion of a constructional block drawing illustrating aeighth embodiment (accounting server) according to the presentinvention;

FIG. 36 is a portion of a constructional block diagram to show an eighthembodiment (accounting server) according to the present invention;

FIG. 37 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 38 is a diagram to show an example of the fixed charging definitiontable in the accounting server;

FIG. 39 is a diagram to show an example of the accounting informationdatabase in the accounting server;

FIG. 40 is a flowchart to show an example of operation of the chargingprocess;

FIG. 41 is a portion of a constructional block diagram to show a ninthembodiment (ICS frame database server) according to the presentinvention;

FIG. 42 is a portion of a constructional block diagram to show a ninthembodiment (ICS frame database server) according to the presentinvention;

FIG. 43 is a diagram to show an example of the stored informationadministration table and the Box in the ICS frame database server;

FIG. 44 is a diagram to show an example of the stored informationadministration table and the Box in the ICS frame database server;

FIG. 45 is a diagram illustrating an example of an ICS user frame usedby the ICS frame database server;

FIG. 46 is a flowchart to show an example of operation of thecommunication example 1 of the ICS frame database server;

FIG. 47 is a flowchart to show an example of operation of thecommunication example 2 of the ICS frame database server;

FIG. 48 is a flowchart to show an example of operation of thecommunication example 3 of the ICS frame database server;

FIG. 49 is a portion of a constructional block diagram to show a tenthembodiment (transfer by X.25, FR, ATM, satellite communication, andcontainment of telephone line, ISDN line, CATV line, satellite line, IPXframe) according to the present invention;

FIG. 50 is a portion of a constructional block diagram to show a tenthembodiment according to the present invention;

FIG. 51 is a portion of a constructional block diagram to show a tenthembodiment according to the present invention;

FIG. 52 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 53 is a diagram illustrating the manner of frame conversion of theICS network frame and the X.25 format;

FIG. 54 is a diagram illustrating the manner of frame conversion of theICS network frame and the FR format;

FIG. 55 is a diagram illustrating the manner of frame conversion of theICS network frame and the ATM format;

FIG. 56 is a portion of a constructional block diagram to show aneleventh embodiment (transfer by X.25, FR, ATM, satellite communication,and containment of telephone line, ISDN line, CATV line, satellite line,IPX frame) according to the present invention;

FIG. 57 is a portion of a constructional block diagram to show aneleventh embodiment according to the present invention;

FIG. 58 is a portion of a constructional block diagram to show a twelfthembodiment (containment of the access control apparatus within the X.25network and FR network) according to the present invention;

FIG. 59 is a portion of a constructional block diagram to show a twelfthembodiment according to the present invention;

FIG. 60 is a portion of a constructional block diagram to show athirteenth embodiment (the access control apparatus connected with therelay network) according to the present invention;

FIG. 61 is a portion of a constructional block diagram to show afourteenth embodiment (provision of access control apparatuses outsideof the ICS) according to the present invention;

FIG. 62 is a portion of a construction block diagram to show a fifteenthembodiment according to the present invention;

FIG. 63 is a portion of a construction block diagram to show a fifteenthembodiment according to the present invention;

FIG. 64 is a portion of a construction block diagram to show a fifteenthembodiment according to the present invention;

FIG. 65 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 66 is a diagram illustrating an example of the table to define therelation between the communication speed and the speed class;

FIG. 67 is a flowchart to show an example of operation of the fifteenthembodiment;

FIG. 68 is a flowchart to show an example of operation of the fifteenthembodiment;

FIG. 69 is a diagram to show the ICS user frame after the electronicsignature assignment;

FIG. 70 is a diagram to show the ICS user frame before the electronicsignature assignment;

FIG. 71 is a construction block diagram to show a sixteenth embodimentaccording to the present invention;

FIG. 72 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 73 is a flowchart to show an example of operation of the sixteenthembodiment;

FIG. 74 is a diagram to explain the electronic signature at sending andreceiving times;

FIG. 75 is a construction block diagram to show a seventeenth embodimentaccording to the present invention;

FIG. 76 is a construction block diagram to show a eighteenth embodimentaccording to the present invention;

FIG. 77 is a diagram to show an example of the conversion table in theaccess control apparatus;

FIG. 78 is a diagram to show an example of the conversion table originalin the ICS conversion table server;

FIG. 79 is a diagram to show an example of the correspondence table inthe ICS address administration server;

FIG. 80 is a diagram to show an example of the ICS name convertion tablein the ICS name server;

FIG. 81 is a construction block diagram to show a nineteenth embodimentaccording to the present invention;

FIG. 82 is a diagram to show an example of the intensive conversiontable in the intensive access control apparatus;

FIG. 83 is a diagram to show an example of the simple conversion tablein the simple access control apparatus; and

FIG. 84 is a flowchart to show an operation of the nineteenthembodiment.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

FIG. 5 systematically illustrates the basic principle of the presentinvention, wherein an integrated information communication system(hereafter referred to as “ICS”) 1 according to the present inventionhas self-appointed address providing rules as a computerinformation/communication address. i.e., the system has a unique addresssystem ADS, and has access control apparatuses (2 through 7 in thepresent example) which serve as access points for connecting a pluralityof computer communication networks or information communicationequipment, e.g., a great number of LANs (in the present example,corporation X's LAN-X1, LAN-X2 and LAN-X3, and corporation Y's LAN-Y1,LAN-Y2 and LAN-Y3). Here, the corporation X's LAN-X1, LAN-X2 and LAN-X3have the same address system ADX, and the corporation Y's LAN-Y1, LAN-Y2and LAN-Y3 have the same address system ADY. The access controlapparatuses 2, 3 and 4 have conversion tables for administrating mutualconversion between the address system ADS and the address system ADX.The access control apparatuses 5, 6 and 7 have conversion tables foradministrating mutual conversion between the address system ADS and theaddress system ADY. The computer communication data (ICS frame) withinthe ICS 1 uses addresses according to the address system ADS of the ICS1, and performs the communication according to IP frame which is used onthe Internet.

Now, description will be made regarding the operation in the case ofcommunication within a single corporation. The computer communicationdata (ICS frame) 80 transmitted from the LAN-X1 of a corporation X isprovided with addressing following the address system ADX, but issubjected to address conversion following the address system ADS underadministration of the conversion table of the access control apparatuswithin ICS 1, and becomes ICS frame 81. This is then sent within the ICS1 under the rules of the address system ADS, and upon reaching thedestination access control apparatus 4, is restored to the computercommunication data 80 of the address system ADX under the administrationof the conversion table thereof, and is sent to the LAN-X3 within thesame corporation X. Here, the ICS frame being sent and received withinthe ICS 1 is referred to as an “ICS network frame”, and the ICS framebeing sent and received outside of the ICS 1 is referred to as an “ICSuser frame”. The form of the ICS user frame is stipulated by a formdefined by RFC791 or RFC1883 as a rule used in the Internet, but dealingwith ICS frames which do not follow the above rule will be describedlater in conjunction with description of another embodiment.

The ICS network frame 81 is comprised of a network control field 81-1and a network data field 81-2, with the network control field 81-1storing the addresses (address system ADS) of the access controlapparatuses 2 and 4 therein. The ICS user frame is either used as thenetwork data field 81-2 with no change to the data value thereof, or issubjected to data format conversion under the stipulations determinedwithin the ICS 1 and is used as network data field 81-2. An example ofthe data format conversion stipulations might be conversion tociphertext or data compression, and the access control apparatus 2 maybe provided with ciphering means, deciphering means for returning theciphertext to the original plain-text (ICS user frame), data compressionmeans, and data decompression means for returning the compressed data tothe original data. In the access control apparatus 2, the ICS user frame80 is used as the ICS network frame 81-2, and the operation of addingthe network control field 81-1 to the ICS network frame 81-2 is referredto as “ICS encapsulation”. Also, in the access control apparatus 4, theoperation of removing the network control field 81-1 from the ICSnetwork frame 81 is referred to as “ICS reverse encapsulation”.

Now, description will be made regarding the operation in the case ofcommunication between different corporations. The computer communicationdata (ICS user frame) 82 transmitted from the LAN-Y2 of a corporation Yis provided with addressing following the address system ADY, but issubjected to address conversion following the address system ADS underadministration of the conversion table of the access control apparatus 6within ICS 1, and becomes ICS frame 83. This is then sent within the ICS1 in accordance with the rules of the address system ADS, and uponreaching the destination access control apparatus 3, is converted to thecomputer communication data 82 of the address system ADX under theadministration of the conversion table thereof, and is sent to theLAN-X2 within the corporation X. While address lengths of 32 bits and128 bits are used in the present invention, the present invention is byno means restricted to these. Even if the length of the address ischanged to such other than 32-bit or 128-bit, this does not change theprinciple of address conversion which is the principle idea of thepresent invention.

Thus, according to the present invention, both intra-corporation andinter-corporation computer communications are enabled by unified addressadministration by the ICS 1. Generally used user terminals for computercommunications are incorporated within the LAN within the structure ofthe user, and incorporated within the VAN (Value Added Network) viaaccess lines, and user data frames are sent which have differing dataformats and differing address system for each type of service. Forexample, an IP address is used for Internet services, a telephonenumber/ISDN number (E.164 address) for telephone services, and an X.121address is used for X.25 packet services. Conversely, according to theICS 1 of the present invention, address conversion (referred to as “ICSaddress conversion”) is performed with the conversion table of theaccess control apparatus based on the inputted ICS user frame, thusrealizing sending of information frames of data of varied structuresunified under a single data format and address system, i.e., convertedto ICS frames.

FIG. 6 schematically illustrates an example wherein the ICS 1 of thepresent invention is comprised of a plurality of VANs (VAN-1, VAN-2,VAN-3), with each VAN being administered by a VAN operator. An ICS 1user applies to the VAN operator for a user communication line, and theVAN operator decides an ICS address, an ICS network address and the likefor the user and registers these informations with a circuit type in aconversion table 12 within the access control apparatus 10 such as shownin FIG. 7. The ICS 1 has as access points serving as external connectionelements with the LANs (or terminals thereof) of the corporations X andY the access control apparatuses 10-1, 10-2, 10-3, 10-4 and 10-5, andfurther has relay apparatuses 20-1, 20-2, 20-3 and 20-4, and also ICSnetwork servers 40-1, 40-2, 40-3, 40-4 and 40-5, as well as ICS addressadministration servers 50-1 and 50-2. A relay apparatus 20 such as shownin FIG. 8 is provided to the communication path within each of the VANs,and an inter-VAN gateway 30 such as illustrated in FIG. 9 is provided asa connection element of the VAN-2 and the VAN-3. The LANs 1—1, 1-2, 1-3and 1-4 shown in FIG. 6 are respectively connected to the access controlapparatuses 10-1, 10-5, 10-4 and 10-2, via the user communication lines36-1, 36-2, 36-3 and 36-4.

The access control apparatus 10 (10-1, 10-2, 10-3, 10-4 and 10-5) aredevices containing the user communication lines from the user(corporations X and Y) to the ICS 1, and as shown in FIG. 7, iscomprised of a processing device 11 comprised of a CPU and so on, aconversion table 12 serving as a database for performing addressconversion and the like, a line portion 13 of an input/output interface,and a temporary conversion table 14. Also, the relay apparatus 20 has atransferring function of an ICS network frame and a routing function ofpath designating, and as shown in FIG. 8 has a processing device 21comprised of a CPU and so on and a relay table 22, the relay table 22being used for determining the communication destination when the ICSnetwork frame is transferred within the ICS 1. The inter-VAN gateway 30has a processing device 31 comprised of a CPU and so on and a relaytable 32 for determining where to send the ICS network frames betweenthe VANs, as shown in FIG. 9.

As shown in FIG. 10, the ICS network server 40 is comprised of aprocessing device 41 and an ICS network database 42, the usage of theICS network database 42 being various. Examples of the usage include:user-specific data (such as the name or address of the user)corresponding with the ICS user address, data not corresponding with theICS user address, such as data indicating the state of communicationtrouble within the VAN, or data not directly related to the VAN, such asan electronic library which maintains and discloses digital documents,public keys for a public encryption system using encryption technologyemployed in verifying the authenticity of the transmitter and receiver,and maintaining data such as public key proof data or secret keys for asecret encryption system. The processing device 41 refers to the ICSnetwork database 42, and obtains corresponding data and transmits thedata to the access control apparatus 10. Further, not only does the ICSnetwork database 42 operate in stand-alone manner, but also is capableof communicating with other ICS network servers and obtaining datatherefrom, by means of transmitting and receiving the ICS network framesbased on IP communication technology. Within the ICS, the ICS networkserver is the only component provided with a single ICS network address.

According to the present invention, the address used to identifycomputers, terminals and the like used within the ICS network frame isreferred to as an “ICS network address”, and the address used toidentify computers, terminals and the like used within the ICS userframe is referred to as an “ICS user address”. The ICS network addressis used only within the ICS, one or both of the two types being used;32-bit length and/or 128-bit length. Similarly, the ICS user addressalso uses one or both of the two types; 32-bit length and/or 128-bitlength. The ICS logic terminal within the access control apparatus 10,the relay apparatus 20, the inter-VAN gateway 30 and the ICS networkserver are arranged so as to be provided each with an ICS networkaddress so as to be uniquely identified. Also, the ICS user address isformed of a VAN upper code and a VAN internal code. With the length ofthe VAN upper code being represented as C1 bits and the length of theVAN internal code being represented as C2 bits, the ICS user address isused such that the total of C1+C2 equals either 32 bits or 128 bits.

In the present invention, no particular method for deciding the VANupper code and the VAN internal code is stipulated, but in the case ofC1+C2=32 bits, the following example can be given for a method fordeciding such:

-   -   VAN upper code=district administration code (4 bits)∥country        code (4 bits)∥VAN code (8 bits)    -   VAN internal code=VAN district code (4 bits)∥VAN access point        code (8 bits)∥user logic code (4 bits)

FIG. 11 makes description thereof using an example of an ICS useraddress. Here, the symbol “a∥b” indicates linkage of data “a” and “b”,i.e., data obtained by means of arrayed data “a” and “b” in this order.The ICS network address can be provided with locality in the same manneras with the user network address. i.e.,

-   -   ICS network address=district administration code∥country        code∥VAN code∥VAN district code∥user logic communications line        code

Thus, the relay apparatus can efficiently find the transfer destinationby means of deciding the transferring destination with consideration tothe district. The address can be determined in the same way in the caseof C1+C2=128 bits, as well. Incidentally, with the present invention,the ICS frame can be constructed as described later, as long as C1+C2=32bits or C1+C2=128 bits is kept, regardless of how the field sections forthe VAN upper code and the VAN internal code are made, or the length ofeach of the sections. Also, when deciding the VAN upper code and the VANinternal code, part of these codes may be made to be unique to the user.That is, the user can make a user-specific address system. The addressvalues of a 32 bit expression value are from address 0 to address(2³²−1), the present invention is carried out by providing an addressdecided uniquely to the user within the range of address 10×2²⁴ toaddress (10×2²⁴+2²⁴−1), or address (172×2²⁴+16×2¹⁶) to address(172×2²⁴+32×2¹⁶−1) or address (192×2²⁴+168×2¹⁶) to address(192×2²⁴+169×2¹⁶−1).

A physical communication line can be separated into a plurality ofcommunication lines and used, this being realized in conventional art asa multiplex communication method by frame relay (FR), for example.According to the present invention, the user's communication line isseparated into a user physical communication line and one or more userlogic communication lines. FIG. 12 illustrates an example of thisaspect, wherein a user physical communication line 60 is separated intotwo user logic communication lines 61-1 and 61-2. Also, separatedcomputer communication apparatuses 62-1, 62-2, 62-3 and 62-4 are eachconnected to respective user logic communication lines, and the ICS useraddresses “4123, 0025, 0026, 4124” are assigned to each of the computercommunication apparatuses 62-1 through 62-4. The user physicalcommunication line 60 is connected to the access control apparatus 63,and the point of contact between the two is called “ICS logic terminal”.The ICS logic terminal is provided with an only ICS network addresswithin the ICS. In the example shown in FIG. 12, the user logiccommunication lines 61-1 and 61-2 are connected to the access controlapparatus 63, and ICS network addresses “8710” and “8711” are assignedto the ICS logic terminals 64-1 and 64-2 of the contact points,respectively.

As described above, the ICS network server 40 is also provided with anonly ICS network address, so that the ICS network address can determinethat the ICS logic terminal or the ICS network server is the only onewithin the ICS. The ICS network server is capable of exchanginginformation with other ICS network servers by means of transmitting andreceiving the ICS network frames provided with each other's ICS networkaddresses, using IP communication technology. This function is referredto as a “ICS network server communication function”. The access controlapparatus is also provided with an only ICS network address within theICS, and is capable of exchanging information with other ICS servers bymeans of a communication function of the ICS network server. The ICSnetwork server communication function can be realized by TCP or UDP(User Datagram Protocol) of a conventional technology.

There are two types of the ICS frames in the present invention, asdescribed above, the ICS network frame which is transmitted and receivedwithin the ICS, and the ICS user frame which is transmitted and receivedoutside of the ICS. Each ICS network frame is comprised of a controlfield and a network data field (ICS user frame), and, as shown in FIG.13, the network control field is comprised of a besic field and anexpansion field, and the network data field is comprised of a usercontrol field and user data field, so as to allow usage by ICSencapsulation or ICS reverse encapsulation. That is, when the ICS userframe enters the ICS from the access control apparatus, the ICS userframe becomes a data field of the ICS network frame, and the controlfield (network control field) of the ICS network frame is added thereto(ICS encapsulation). The expansion field in the network control field isused for the cipher or the like. In a case that the cipher is useless,the expansion field is not used.

Inside the network control field of the ICS frame is placed an area forstoring the transmitter's address and intended receiver's address. Thereare two types of the ICS frames, those with a 32-bit address length andthose with a 128-bit address length, and a frame format with 32-bitaddress length being employed according to the RFC791 stipulations shownin FIG. 3, for example. In the event that 32 bits is insufficient forthe ICS network address, for example, in the event that a 64-bit addressis to be used, following the RFC791 stipulations, the lacking 32 bits(64 bits−32 bits) are written into an option field or the expansionfield in the network control field of the ICS network frame controlfield, thus making the network address usable at 64 bits. Now,supplemental description will be made regarding the aforementioneduser-specific address. In the event that a great number of users have aprivate address (a type of ICS user address) in the section between anaddress (10×2²⁴) and an address (10×2²⁴+2²⁴−1) for example, in the casethat the length of the ICS user address is 32 bits, the 32 bits isinsufficient for the ICS network address, since the ICS network addressis assigned corresponding to the ICS user address, and 64 bits isrequired, for example. In this case, as described above, the lacking 32bits are written into the option field of the ICS network frame controlfield, thus making the network address usable at 64 bits. The fact thatcommunication between the same user (called “intra-corporationcommunications”) is possible using a private address will be describedin the first embodiment. Also, in the event that the address length is128 bits, the present embodiment is carried out under the frame formataccording to the RFC1883 stipulations such as shown in FIG. 4, forexample. The originating address area within the network control fieldand the address stored in the destination address area are made to beICS network addresses, each respectively being the transmitting ICSnetwork address and the receiving ICS network address. Further, theoriginating address area within the user control field and the addressstored in the destination address area are made to be ICS useraddresses, each respectively being the sending ICS user address and thereceiving ICS user address.

Incidentally, there is no need to following the RFC791 or RFC1883stipulations for the ICS frame format in carrying out the presentinvention; the present invention can be carried out as long as the frameformat is such that uses addresses of 32 bits or 128 bits in length.Generally, the ICS receives the ICS user frame stipulated by RFC791 orRFC1883, but other frame formats can be handles within the ICS networkby converting to ICS user frame with a conversion means (or changingportion).

Embodiment-1 Basic ICS, Intra-Corporation Communication andInter-Corporation Communication

A first embodiment of the present invention will be described withreference to FIGS. 14 and 15, regarding a basic communication whereinthe transfer destination within the ICS is determined from the receiverICS user address, based on administration by a conversion table. In thefigures, 170-1, 170-2, 170-3 and 170-4 respectively denote gatewaysprovided within the LANs 100-1, 100-2, 100-3 and 100-4, and the ICSframes can pass through these gateways 170-1 through 170-4. FIG. 16shows an example of a conversion table 113-1 in the access controlapparatus 111-1 and FIG. 17 does the same of a temporary conversiontable 114-2 in the access control apparatus 110-4.

First, description will be made regarding communication between aterminal which is connected to a LAN 100-1 of the corporation X whichhas a unique address system ADX, and a terminal which is connected to aLAN 100-2 of the same corporation X. That is, this is a communicationbetween a terminal which has an ICS user address “0012” on the LAN 100-1and a terminal which has an ICS user address “0034” on the LAN 100-2.This communication is a typical communication made between terminalswhich have set addresses based on a unique address system within asingle corporation (ADX in this example), the communication being madevia the ICS 100 in an interactive manner. This type of communication isreferred to as intra-corporation communication service (orintra-corporation communication). Next, description will be maderegarding a communication between a terminal which is connected to a LAN100-1 of the corporation X which has a unique address system ADX and aterminal which is connected to a LAN 100-3 of the corporation Y whichhas a unique address system ADY. That is, this is a communicationbetween a terminal which has an ICS user address “0012” on the LAN 100-1and a terminal which has an ICS user address “1156” on the LAN 100-3.This communication is a typical communication made between terminalswhich have different address systems within different corporations, thecommunication being made using an ICS address system which can be sharedbetween the two. This type of communication is referred to asinter-corporation communication service (or inter-corporationcommunication).

<<Common Preparation>>

In describing the present embodiment, the address format and so forth isdetermined as described below, but the specific numeric values andformats are all but an example, and the present invention is by no meanslimited to these. The ICS network address is represented by a 4-digitnumber, and the sender ICS user address and the receiver ICS useraddress are both represented by a 4-digit number. Of the sender ICS useraddress and the receiver ICS user address, addresses of which the uppertwo digits are not “00” are used as an inter-corporation communicationaddress, and this inter-corporation communication address is an onlyvalue within the ICS 100. Of the sender ICS user address and thereceiver ICS user address, addresses of which the upper two digits are“00” are used as an intra-corporation communication address, and thisintra-corporation communication address may be duplicate of otherintra-corporation communication address within the ICS 100. Also, theconversion table 113-1 in FIG. 16 provided to the access controlapparatus 110-1 contains the following: transmitting ICS networkaddresses, receiving ICS network addresses, sender ICS networkaddresses, receiver ICS network addresses, request identification (ID),speed segments and so forth. The request identification registered tothe conversion table 113-1 is such that, e.g., “1” represents theintra-corporation communication service, “2” represents theinter-corporation communication service, and “3” represents a virtualdedicated line connection (which will be descrived hereinafter). Thespeed segment is the line speed that the communication from the ICSnetwork address requires, including throughput (e.g., the number of ICSframes sent within a predetermined time).

<<Preparation for Intra-Corporation Communication>>

The users of the LAN 100-1 and the LAN 100-2 specify the terminals andapply to the VAN operator in order that the intra-corporationcommunication of the terminals connected to the LANs can perform thecommunication via the VAN-1 and VAN-3. The VAN operator responds to theapplication and sets the aforementioned ICS network address, ICS useraddress, requested identification, etc. to the conversion tables of theaccess control apparatuses 110-1 and 110-5 connected to the LAN 100-1and LAN 100-2, and further writes and holds them in the ICS addressadministration server 150-1.

The items to be set for the VAN-1 are as follows. The ICS networkaddress is decided by the ICS logic terminal of the access controlapparatus 110-1 to which the LAN 100-1 is connected, with the ICSnetwork address of the ICS logic terminal in this case being set as“7711”. The intra-corporation communication address of the terminalconnected to the LAN 100-1 from which the application was made is set as“0012”, and this is used as the sender ICS user address. Theintra-corporation communication address used by the terminal of theabove address is set as “2212”, and this is used as the sender ICS useraddress. Next, the intra-corporation communication address of theterminal connected to the LAN 100-2 from which the application was madeis decided by the ICS logic terminal of the access control apparatus110-5 to which the LAN 100-2 is connected, in this case the ICS networkaddress being set as “9922”, and this is used as the receiving ICSnetwork address. Further, the ICS user address used by the terminalconnected to the LAN 100-2 is set as “0034”, and this is used as thereceiver ICS user address. The number “1” is set as the requestidentification, indicating the intra-corporation communication servicethat was applied for, and the above is registered to the conversiontable 113-1 in FIG. 16.

The items to be set for the VAN-3 are as follows. Values necessary forreverse communication (communication from the LAN 100-2 to the LAN-1)are set to the conversion table of the access control apparatus 110-5connecting the LAN 100-2 from which application was made. That is, datais set reverse to the transmitting ICS network address and the receivingICS network address, and at the same time, data is set reverse to thesender ICS user address and the receiver ICS user address. The ICSnetwork address of the LAN 100-2 is set as “9922”, and this is used asthe transmitting ICS network address. The address “0034” is set as thesender ICS user address for the intra-corporation ICS user address ofthe terminal connected to the LAN 100-2, and the ICS user address “0012”of the terminal of the other party is used as the receiver ICS useraddress. Also, the ICS user address “7711” of the LAN 100-1 is used asthe receiving ICS network address and the value “1” is set as therequest identification, indicating the intra-corporation communicationservices. The above is written to the conversion table in the accesscontrol apparatus 110-5 and registered.

<<Operation of Intra-Corporation Communication>>

The terminal having an ICS user address “0012” sends an ICS user frameP1 to the receiver “0034”. This ICS user frame P1 has set as the senderICS user address “0012”, and as the receiver ICS user address has set“0034”.

The operation will be explained with reference to FIG. 18. The ICS userframe P1 is sent to the access control apparatus 110-1 via the logiccommunication line 180-1. The access control apparatus 110-1 refers tothe conversion table 113-1 of FIG. 16 from the transmitting ICS networkaddress “7711” (Steps S100 and S101) and the receiver ICS user address“0034” of the received ICS user frame, it knows that the communicationis the intra-corporation communication due to the value “1” of therequest identification (Step S102). The access control apparatus 110-1obtains that the receiving ICS network address corresponding to thereceiver ICS user address “0034” is “9922”, and then it isICS-encapsulized (Step S106). The above procedures illustrated in aflowchart are as shown in FIG. 18, with the intra-corporation being flow(1) therein. The sender ICS user address may be used to specify thetransmitted original of the ICS frame.

The access control apparatus 110-1 sends the ICS network frame P2 to therelay apparatus 120-1 by the ICS encapsulation. Since the networkaddress of the network control field is ensured of its uniqueness withinthe ICS, there is no conflict with other ICS frames. The ICS networkframe P2 passes through the relay apparatus 120-1 and 120-2 based on thereceiving ICS network address, and reaches the access control apparatus110-5 of the VAN-3. The access control apparatus 110-5 removes thenetwork control field from the ICS network frame P4 and performs the ICSreverse encapsulation, and re-creates an ICS user frame P5 which is thesame as the ICS user frame P1 from the network data field of the ICSframe, and sends it to the LAN 100-2. The ICS user frame is routedthrough the LAN 100-2, and is transferred to the terminal which has theICS user address “0034”.

<<Preparation for Inter-Corporation Communication>>

As an example of performing the inter-corporation communication, acommunication between a terminal which has an ICS user address “0012”and is connected to a LAN 100-1 under the address system ADX, and aterminal which has an ICS user address “1156” and is connected to a LAN100-3 under the address system ADY, will be described. The users of theLANs 100-1 and 100-3 specify the terminal to the VAN each is connectedto so as to be able to perform the communication via VAN-1 and VAN-2,and make application to the VAN operator. The VAN operator sets thenecessary items in the conversion table of the access control apparatuswhich is connected to the LANs 100-1 and 100-3, in accordance with theapplication.

The items to be set regarding the VAN-1 are as follows. The ICS networkaddress of the LAN 100-1 is made to be “7711”, the intra-corporationcommunication address held by the terminal connected to the LAN 100-1from which there was application is made to be “0012”, and this is madeto be the sender ICS user address. The inter-corporation communicationaddress provided to the terminal of the above ICS user address is madeto be “2212”, and this is made to be the sender ICS user address(inter-corporation). The ICS network address is determined by the ICSlogic terminal of the access control apparatus 110-4 connected to theICS network address of the LAN 100-3 from which there was application,the ICS network address here being “8822”, and this is made to be thereceiving ICS network address. Also, the ICS user address of a terminalconnected to the LAN 100-3 is made to be “1156”, and this is made to bethe receiver ICS user address. Further, number “2” is set as the requestidentification, indicating the inter-corporation communication servicethat was applied for, and the above is registered to the conversiontable 113-1.

The items to be set regarding the VAN-2 are as follows. As a conversiontable for the access control apparatus 110-4 to which the LAN 100-3 isconnected, a temporary conversion table 114-2 which holds reverse datafor a certain time, e.g., 24 hours, is set. That is, regarding the ICSnetwork address “8822” to which is connected the LAN 100-3 which usesthe inter-corporation communication service, the following are providedwithin the access control apparatus 110-4: a temporary conversion table114-2 which includes a transmitting ICS network address, sender ICS useraddress, receiver ICS user address, receiving ICS network address,request identification and so forth. The setting of the temporaryconversion table will be explained hereinafter.

<<Operation of Inter-Corporation Communication>>

The terminal having an ICS user address “0012” transmits the ICS userframe F1 in which the sender ICS user address “0012” and the receiverICS user address “1156” are set. The ICS user frame F1 is transferred tothe access control apparatus 110-1 via the user logic communicationsline 180-1.

The access control apparatus 110-1 refers to the conversion table 113-1from the transmitting ICS network address “7711” (Steps S100 and S101)and the receiver ICS user address “1156”, it knows that the requestidentification is “2”, that is, the communication is theinter-corporation communication (Step S102). Next, the access controlapparatus 110-1 obtains that the receiving ICS network addresscorresponding to the receiver user address “1156” is “8822” (Step S104),and then converts the sender ICS user address “0012” into aninter-corporation communication user address “2212” (Step S105). Theaccess control apparatus 110-1 performs the ICS encapsulation by addinga network control field as the transmitting ICS network address “7711”,the sender ICS user address “2212”, the receiver ICS user address “1156”and the receiving ICS network address “8822”, and sends it to the relayapparatus 120-1 as the ICS network frame F2 (Step S106). The aboveprocedures illustrated in a flowchart are as shown in FIG. 18, with theinter-corporation communication being flow (2) therein.

In the above inter-corporation communication, in the event that thesender ICS user address within the ICS user frame F1 is made to be theinter-corporation communication address “2212”, the sender and receiverperform the inter-corporation communication using an inter-corporationcommunication address (Steps S102 and S104). In this case, the accesscontrol apparatus 110-1 does not perform the process of converting thesender ICS user address “2212” into the inter-corporation communicationaddress “2212”, as such is not necessary. The above procedures areillustrated in a flowchart shown in FIG. 18, with the inter-corporationcommunication as flow (3). The sender ICS user address may be used tospecify the transmitted original of the ICS frame.

The relay apparatus 120-1 transfers the ICS network frame to the accesscontrol apparatus 110-4 within the VAN-2 via the relay apparatus 120-2within the VAN-1, the inter-VAN gateway 130, and the relay apparatus120-3 within the VAN-2, based on the receiving ICS network address. Itwill be described with reference to FIG. 19. The access controlapparatus 110-4 receives the ICS network frame (Step S110), forms an ICSuser frame F5 from the network data field (Step S111: ICS reverseencapsulation), decides from the receiving ICS network address the ICSlogic terminal for sending ((1) in Step S112), and sends to the LAN100-3 (Step S113). At the same time, in the event that the relationamong the transmitting ICS network address “7711”, the sender ICS useraddress “2212”, the receiver ICS user address “1156” and the receivingICS network address “8822” is not registered in the conversion tablewithin the access control apparatus 110-4, a temporary conversion table114-2 is compiled ((2) in Step S112). The registration contents of thetemporary conversion table 114-2 are updated according to a process suchas the contents being deleted if there is no usage thereof for 24 hours.The ICS use frame is routed through the LAN 100-3, and is transferred tothe terminal having the ICS user address “1156”.

In this embodiment, it is not set in the temporary conversion table114-2. In another embodiment of this, the conversion table 113-1 doesnot include the sender ICS user address (intra-corporation) and thesender ICS user address (inter-corporation), and further does notcontain the flowchart (2) in FIG. 18, i.e., Step S105. A merit of thisembodiment is that the register number to the conversion table can bereduced to one of the sender ICS user address if there are the senderICS user address for one of the receiver ICS user address.

Embodiment-2 Virtual Dedicated Line

Now, description of the operation of virtual dedicated line connectionaccording to the present invention will be made with reference to FIG.20. Here, the virtual dedicated line connection refers to communicationwherein the ICS user frame is transferred in a fixed manner to areceiving ICS network address already registered in the conversiontable, regardless of the ICS user address within the user control fieldof the ICS user frame, in which the format taken is one-on-one orone-on-N. While the components of FIG. 20 are the same as those ofEmbodiment-1 shown in FIGS. 14 and 15, what is different is the contentsof registration in the conversion table shown in FIG. 21. In theconversion table of the access control apparatus, the receiving ICSnetwork address is determined from the transmitting ICS network addressin a fixed manner, so that either the sender ICS user address(intra-corporation), the sender ICS user address (inter-corporation) andthe receiver ICS user address are either not registered, or ignored ifregistered.

Description will now be given regarding a case in which the corporationX uses virtual dedicated line connection, and the communication isconducted between the LAN 200-1 of the corporation X which is connectedto the access control apparatus 210-1, and the LAN 200-2 of thecorporation X which is connected to the access control apparatus 210-5.

<<Preparation>>

The user applies to the VAN operator for the virtual dedicated lineconnection. The VAN operator determines the ICS network address “7711”of the ICS logic terminal at the connection point between the accesscontrol apparatus 210-1 for connecting the LAN 200-1 of the corporationX and the user logic communications line 240-1, and similarly determinesthe ICS network address “9922” of the ICS logic terminal at theconnection point between the access control apparatus 210-5 forconnecting the LAN 200-2 of the corporation X and the user logiccommunications line 240-2. Next, the VAN operator performs setting tothe conversion table 213-1 of the access control apparatus 210-1 of thefollowing: the transmitting ICS network address “7711”, the receivingICS network address “9922” and the request identification. Illustratedin FIG. 21 is an example wherein the request identification “3” has beenmade to serve as the virtual dedicated line connection. Similarly, theVAN operator performs setting to the conversion table of the accesscontrol apparatus 210-5 of the following: the transmitting ICS networkaddress “9922”, the receiving ICS network address “7711” and the requestidentification.

<<Procedures>>

The operation will be explained with reference to FIG. 22. The LAN 200-1of the corporation X sends an ICS user frame F10 to the ICS 200 via theuser logic communications line 240-1. The access control apparatus 210-1receives the ICS user frame F10 from the ICS logic terminal of the ICSnetwork address “7711” (Steps S200 and S201), references to the requestidentification “3” of the originating ICS network address “7711” in theconversion table 213-1, identifies this as a virtual dedicated lineconnection (Step S202), and reads the receiving ICS network address“9922” (Step S203). Next, the access control apparatus 210-1 adds anetwork control field to the ICS user frame F10 in which the receivingICS network address is set to “9922” and the transmitting ICS networkaddress is set to “7711”, thus forming an ICS network frame F11 (StepS204; ICS encapsulation), and sends the frame F1 to the relay apparatus200-1 (Step S205). The relay apparatus 220-1 which received the ICSnetwork frame F11 determines the destination based on the receiving ICSnetwork address of the ICS network frame F11, and sends an ICS networkframe F12 to the relay apparatus 220-2. The ICS network frame F12 istransferred to the access control apparatus 210-5 via the relayapparatus 220-4 within the VAN-3.

The access control apparatus 210-5 removes the network control fieldfrom the ICS network frame F13 (ICS reverse encapsulation), and sendsthe ICS network frame F14 from the ICS logic terminal of the ICS networkaddress “9922” to the user logic communications line 240-2. Then, theLAN 200-2 of the corporation X receives the ICS user frame F14.Transmission can be made in the same say as described from the LAN 200-2to the LAN 200-1, and thus, interactive communication is available.Since it is clear that the sender and the receiver are not necessary tobe the same corporation X, using the same method, an ICS user frame canbe transferred from the LAN 200-1 of the corporation X to a LAN 200-3 ofanother corporation Y.

While the above description has been made with reference to a case ofone-on-one, one-on-N communication can also be performed. For example, aplurality of ICS network addresses may be set to the conversion table213-1 of the access control apparatus 210-1 shown in FIG. 20, asindicated by the transmitting ICS network address “7712”. In the presentexample, two ICS network addresses “6611” and “8822” are set. The accesscontrol apparatus 210-1, upon receiving the ICS user frame from the ICSlogic terminal with an ICS network address “7712”, forms a first ICSnetwork frame wherein an ICS network control field set with “6611” forthe receiving ICS network address is added thereto, and a second ICSnetwork frame wherein a network control field set with “8822” for thereceiving ICS network address is added thereto, these being sent to therelay apparatus 220-1. Consequently, one-on-two communication can beperformed. Further, one-on-N communication can be performed bytransferring each ICS network frame in the same manner as describedabove.

Embodiment-3 ICS Network Server

AS shown in FIG. 23, an ICS network server 330 is comprised of aprocessing device 331 and an ICS network database 332, the data held bythe ICS network database 332 comprising: question item, type, contentsof answer, and network addresses of other ICS network servers. The ICSnetwork server 330 analyzes the data portion of the ICS frames receivedfrom the access control apparatus 310-1, refers to the ICS networkdatabase 332 based on this, obtains answer contents corresponding withthe question items (in the event that the identification is “1”), andsends the obtained answer to the access control apparatus 310-1. In theevent that the ICS network database 332 does not have answer contentscorresponding with the question items (in the event that theidentification is “2”), questions another ICS network server and obtainsthe answer contents corresponding with the question items therefrom,using the ICS network server communication function, based on the ICSnetwork address of another ICS network server, and sends the answerobtained thus to the access control apparatus 310-1.

In further detail, the following are registered to the conversion table313-1 shown in FIG. 24 as preparatory items: the ICS user address “2000”of the ICS network server 330, the ICS network address “7721” and therequest identification “4”. Here, the request identification “4”indicates that the ICS user address “2000” is a number used in commonwith other users (called an “ICS special number”), like the telephonenumber “119” in Japan. Next, it is written to the ICS network database332 that the type of the question Q1 is “1” and that the answer contentsare “A1”, that the type of question Q2 is “2”, the answer contents fieldis left blank, and the ICS network address for the other ICS networkserver 340 is written as “8844”.

Next, the user of the ICS user address “0012” sends an ICS frame F20(including question Q1) to the ICS user address “2000” of the ICSnetwork database 332. The access control apparatus 310-1 receives theICS user frame F20 from the ICS logic terminal of the line portion311-1, obtains the ICS network address “7711”, references the conversiontable 313-1, and sends an ICS network frame which is ICS encapsulated tothe ICS network server 320 as illustrated in the flowchart shown in FIG.26. The ICS network database 332 finds the answer A1 corresponding tothe question Q1 contained in the ICS frame F20 (Step S300 and S301), andreturns the answer A1 to the access control apparatus 310-1. The accesscontrol apparatus 310-1 sends an ICS frame containing the answer A1 tothe ICS user address “0012”.

The user of the ICS user address “0012” sends an ICS frame F21(including question Q2) to the ICS user address “2000”. The accesscontrol apparatus 310-1 refers to the conversion table 313-1, and uponobtaining the ICS network address “7721”, sends an ICS frame comprisedof the ICS encapsulated frame F21. The ICS network database 332recognizes the type “2” corresponding to the question Q2 contained inthe ICS frame F21 (Step S300) and knows that the ICS network database332 itself does not have the answer (A2). Therefore, the ICS networkdatabase 332 performs information exchange with another ICS networkserver 340 using ICS network communication functions, based on the ICSnetwork address “8844” of the ICS network server 340 (Step S302), andreturns the answer A2 to the access control apparatus 310-1. The accesscontrol apparatus 310-1 sends an ICS frame containing the answer A2 tothe ICS user address “0012”.

Embodiment-4 ICS Address Administration Server

As shown in FIG. 27, the ICS address administration server 430 isconnected with via the access control apparatus 410-1 via the ICSnetwork communication line 460 and holds a correspondence table 432regarding an ICS network address having an ICS logic terminal at theline portion 411-1 of the access control apparatus 410-1 and the ICSuser address corresponding thereto. Examples of the conversion table413-1 and the correspondence table 432 are respectively shown in FIGS.28 and 29. That is, the ICS address administration server 430 holds ICSuser addresses “2013”, “2014”, “1234” and “4500”, and the correspondingICS network addresses “7711”, “7711”, “7712” and “7713”. At the sametime, all the information to be described in the conversion table,address related information such as records dealing with VAN operationmay be included, as well. Further, the ICS address administration server430 holds the ICS network addresses of a plurality of other ICS addressadministration servers, and the ICS network addresses of a plurality ofICS name servers. Also, the ICS address administration server 430 iscapable of communicating using the ICS name server described inEmbodiment-5 and the ICS network server communication function, thusobtaining ICS names corresponding with ICS user addresses.

The processing device 412-1 of the access control apparatus 410-1 canperform the communication with the ICS address administration server 430using the ICS network server communication function, and disclose thevalue of the ICS network address and have the corresponding ICS useraddress, or disclose the value of the ICS user address and have thecorresponding ICS network address. The operation will be explained withreference to FIG. 30. The ICS address administration server 430 checksor not whether the ICS network address or the ICS user addressquestioned from the access control apparatus server 410-1 is registeredin its correspondence table 432 (Step S400), and answers a reply if itis registered (Step S401). If the ICS network address or the ICS useraddress is not registered in the correspondence table, the ICS addressadministration server 430 communicates with another ICS addressadministration server 440 using the ICS network server communicationfunction, thus obtaining the ICS user address or the ICS network address(Step S402), the results thereof being replied to the access controlapparatus 410-1 (Step S403). According to such a configuration, theaccess control apparatus 410-1 is able to request of the ICS addressadministration server 430 and to obtain one of the ICS network addressor ICS user address based on the other.

Embodiment-5 ICS Name Server

The ICS user address is problematic in that it is a 32-bit binaryexpression or 128-bit binary expression for example, and thus isdifficult to remember. There is a method wherein an “ICS name” which iseasily remembered, is used.

First, description will be made regarding the ICS name. The ICS addressexpressed in binary form is, as shown in FIG. 11, expressed by e.g., adistrict administration code, country code, VAN code, VAN district code,VAN access point code, and user logic code, with these numeric valuesbeing arrayed to form an expression such as district administrationcode∥country code∥VAN code∥VAN district code∥VAN access point code∥userlogic code. In the ICS name, the district administration code which canbe expressed in the binary form as described above, for example, isexpressed as follows: AS (an ICS name component which indicates Asia),JP (Japan), VAN#1 (identification of a VAN), DIS#1 (identification of aVAN district code which comprises the VAN#1), ACS#1 (identification of aVAN access point code restricted by the DIS#1), USR#1 (identification ofa user logic code). The components of the ICS name thus decided arereversed and separated by dots “.”, thus forming the ICS name“USR#1.ACS#1.DIS#1.VAN#1.JP.AS”. In the above-described case, this ICSname may be even further divided, so that the USR#1 is divided intoUSR#10 and COMP#10, and ACS#1 is divided into ACS#11 and ACS#12, thusgiving the overall ICS name “USR#10.COMP#10.ACS#11.ACS#12.DIS#1.VAN#1.JP.AS”.

The ICS name server, which is a type of ICS network server, will now bedescribed. As shown in FIG. 31, the ICS name server 550 is made up of aprocessing device 551 and an ICS name conversion table 552, with the ICSname conversion table 552 being comprised of e.g., ICS name, type(identification of existence of an ICS user address corresponding to theICS name), ICS user address and so forth. The type “2” indicates thatthe ICS network database 332 does not hold an ICS network addresscorresponding to the ICS name, and thus the ICS network addresscorresponding to the ICS name is to be obtained from another ICS nameserver. An example of the conversion table 513-1 is shown in FIG. 32.Here, another ICS name server administrating the ICS name“USR#2.ACS#2.DIS#2.VAN#2. JP.AS” can be called up “DIS#2.VAN#2.JP.AS”with “USR#2” and “ACS#2” removed. The ICS name server 550 analyzes theICS frame data field received from the access control apparatus 510-1,refers to the ICS name conversion table 552 based on the above analysis,obtains an ICS user address corresponding to the ICS name, and sends itto the access control apparatus 510-1. Further based on the ICS useraddress, a reply is made regarding the ICS name corresponding thereto.In the event that an ICS user address corresponding thereto does notexist within the ICS name conversion table 552, the ICS networkcommunication function is used to request the questioned ICS useraddress from another ICS name server which has the ICS user address, andthe ICS user address obtained therefrom is sent to the access controlapparatus 510-1.

Now, description will be made the method whereby the terminal of thesender ICS user address “0012” connected to the LAN 500-1 obtains an ICSuser address corresponding to the ICS name #1 “USR#1.ACS#1.DIS#1.VAN#1.JP.AS”. Here, two cases will be described: thatwherein the access control apparatus 510-1 obtains data from the ICSname server 550, and that wherein the access control apparatus 510-1obtains data from another ICS name server 560.

First, in preparation, an ICS network address “7741” corresponding tothe ICS user address “1000” of the ICS name server 550, and a requestidentification “4” thereof are registered in the conversion table 513-1of the access control apparatus 510-1. Here, the request number “4”indicates that as the ICS user address “1000” is the telephone number“119”, it is a special ICS number to be common to another user. Thereceiver ICS user address “2014” corresponding to the ICS name“USR#1.ACS#1.DIS#1.VAN#1. JP.AS” is registered in the ICS nameconversion table 552 of the ICS name server 550. Then, the terminal userof the sender ICS user address “0012” of the LAN 500-1 sends an ICS userframe F40 to the access control apparatus 510-1, and requests aconversion from the ICS name #1 “USR#1.ACS#1.DIS#1.VAN#1.JP.AS” to anICS user address. The processing device 512-1 within the access controlapparatus 510-1 receives the ICS user frame F40 from the ICS logicterminal in the line portion 511-1, obtains the ICS network address“7711” and then refers to the conversion table 513-1 based on thereceiver ICS user address of the ICS user frame F40. If thecorresponding request identification is “4” (connection to an ICS nameserver of the ICS special number), the processing device 512-1 performsthe ICS encapsulation of the ICS user frame F40 by using the obtainedICS network address “7711”, and sends an ICS network frame including anICS name to the ICS name server 550.

As shown in FIG. 34, the ICS name server 550 analyzes the ICS namewithin the ICS frame received from the access control apparatus 510-1with the processing device 551, and refers to the ICS name conversiontable 552 (Step S500). Then, in the event that an ICS user addresscorresponding to the ICS name exists within the ICS name conversiontable 552, the ICS user address is obtained, and the ICS network frameF45 including the ICS user address “2014” is sent to the access controlapparatus 510-1 (Step S501). In the event that the questioned ICS namedoes not exist within the ICS name conversion table 552, the accesscontrol apparatus 512-1 receives an ICS user frame F41 for example, andin the event that the ICS name #2 (i.e.,“USR#2.ACS#2.DIS#2.VAN#2.JP.AS”) described in the ICS user frame F41 isnot described in the ICS name conversion table 552, the ICS name server550 obtains the ICS network address of another ICS name server from theICS name conversion table 552 based on the ICS name (i.e.,“DIS#2.VAN#2.JP.AS”), and then obtains the ICS user address “1130”corresponding to the questioned ICS name, by means of performing aninformation exchange by using the ICS name server 560 and the ICSnetwork server communication function (Step S502). The obtained resultis sent to the access control apparatus 510-1 (Step S503). The accesscontrol apparatus 510-1 exchanges informations with the ICS addressadministration server 570 based on the receiver ICS user address whichis received from the ICS name server 550 and is described in the ICSnetwork frame F45, obtains the ICS network address corresponding to theICS user address and the address related information contained in thecorrespondence table, and writes the data comprised of the obtained ICSuser address, ICS network address and address-related information, tothe conversion table 513-1. The access control apparatus 510-1 sends theICS user address “2014” (or “1130”) obtained from the ICS name server550 to a terminal user of the sender ICS user address “0012” of the LAN500-1. The ICS user address “0012” is written in the ICS network frameF45. The terminal user of the sender ICS user address “0012” of the LAN500-1 obtains the receiver ICS user address “2014” (or “1130”) obtainedfrom the access control apparatus 510-1.

Embodiment-6 ICS Name Server

In Embodiment-5, the access control apparatus 510-1 does not write thedata such as the obtained ICS user address, the ICS network address andso on to the conversion table 513-1, but rather writes this obtaineddata to a temporary conversion table 514-1. In this case, theaforementioned address written to this temporary conversion table aredeleted after 24 hours, for example.

Embodiment-7 ICS Name Server

In Embodiment-5, the access control apparatus 510-1 does not call up theaddress administration server 570 and only performs service of tellingthe obtained ICS user address “2014” (or “1130”) to the terminal of theICS user address “0012”.

Embodiment-8 Accounting Server

There are three types of charging systems: the “network charging system”wherein the charging is performed by counting ICS user frames to be sentor received when a communication is made, the “information chargingsystem” wherein the charging is performed by counting the transferredinformation in the ICS user frame, and the “fixed charging system”wherein no charging is performed regarding the transferred ICS userframes, but a constant amount is charging for a certain period (month,year, etc.) of a time when the registration of the ICS user address orthe like continues in the conversion table of the access controlapparatus. The information charging system counts and charges bydesignating the identification which indicates the information chargingto the user control field of the ICS user frame. The network chargingsystem and the information charging system are “transmitting account” ifthe transmitter of the communication bears the charges, and are“receiving account” if the receiver does. Each of the network chargingsystem and the information charging system is called as“charge-by-quantity charging system”.

<<Configuration>>

The charging system in the ICS network according to the presentinvention will be explained with reference to FIGS. 35 and 36. Eachexample of the conversion table 813-1, the definition table for fixedcharges 843 and the account information database 842 are respectivelyshown in FIG. 37, FIG. 38 and FIG. 39.

Setting information of the charging system is held in the conversiontable 813-1 in the access control apparatus 810-1 and the definitiontable for fixed charges 843 in the account server 840, and a set valueindicating the network charging or the information charging and a setvalue indicating the charge-by-quantity charging system (identify thetransmitting account and the receiving account) or the fixed chargingsystem (identify the transmitting account and the receiving account) areheld in the conversion table 813-1. The operation will be explained withreference to FIG. 40. The access control apparatus 810-1 receives theICS user frame F50 (Step S800), and reads out the type of chargingsystem for each ICS frame held in the conversion table 813-1 us read outbased on the ICS user address contained in the ICS user frame F50 andchecks up the account condition (Step S801). The access controlapparatus 810-1 forms the account information in the event that the readtype indicates the charge-by-quantity charging system, and transfers theaccount information in the form of an account information frame F51 tothe account server 840 which is one of the ICS network servers (StepS810). However, in the event that the read type indicates the fixedcharging system, no formation of account information not transferringthe account information in the form of an account information frame F51to the account server 840 is performed (Step S820).

The account server 840 receives the account information frame F51 sentfrom each of the access control apparatuses, and stores the accountinformation contained within the account information frames. There is anaccount processing device 841 and an account information database 842within the account server 840, whereby the account processing device 841receives the accounting information frame F51 sent from the accesscontrol apparatus 810-1, analyzes the account information containedwithin the account information frame F51, and stores the information inthe account information database 842. The account information database842 uses the ICS network address and the ICS user address asidentifiers, and stores the account information as a database. Also, inthe event that the charging system is the charge-by-quantity chargingsystem, the account information database 842 stores the informationregarding the quantity in the form of a count number, which the countnumber may be set with an upper limit, and in the event that the countexceeds the set upper limit, the account server 840 notifies to theaccess control apparatus 810-1 that the upper limit has been exceeded,and the access control apparatus 810-1 which receives the notificationterminates the communication of the user. The account server 840 iscapable of handing the stored account information to other VANs andusers using the ICS network server communication function.

(1) Example of communication with an arrangement of network charging,transmitting charging and charge-by-quantity charging system:

Description will be made regarding a case wherein the corporation X andthe corporation Y perform inter-corporation communication using the ICS800 according to the present invention. In this case, the chargingsystem for the LANs 800-1 and 800-3 is the charge-by-quantity chargingsystem for the network charging, with the entire bill being borne by theLAN 800-1, and no information charging being conducted.

<<Preparations to Make for Communication>>

The LANs 800-1 and 800-3 are each connected to the respective accesscontrol apparatuses 810-1 and 810-4.

<<Preparations to Make for Charging>>

The charging condition for the LANs 800-1 and 800-3 which are to conductthe communication is registered in the conversion table 813-1. Thecharging conditions are set for registering in the conversion table813-1 based on the transmitting ICS network address, the receiver ICSuser address, the receiving ICS network address, and the receiver ICSuser address. A value “1” is set to indicate that network charging is tobe conducted by charge-by-quantity charging with transmitting charging.Also, a value “1” is set for the charging unit price. Since theinformation charging is not to be performed, a value “0” indicatingnon-charging is set to the charging conditions in the informationcharging condition of the conversion table 813-1. A value “0” indicatingthe fixed charging system is set in the conversion table of the accesscontrol apparatus 810-4 containing the LAN 800-3, to keep the accesscontrol apparatus 810-4 from performing the account processing, sincethe LAN 800-1 is to be billed.

<<Description of Operation of Charging>>

Regarding the ICS user frame F50 sent from the terminal of the ICSnetwork address “0012” connected to the LAN 800-1, the chargingcondition fields are specified from the sender ICS user address and thereceiver ICS user address in the ICS user frame at the processing device812-1 within the access control apparatus 810-1 (Steps S800 and S801),and a reference is made to the charging conditions in order to specifythe charging system relating to the network charging from the field(Step S810). Since this is “1” indicating that the charging system isthe charge-by-quantity charging and that transmitting charging is to beperformed, the charging unit price is referred to (Step S811), thecharging information is formed (e.g., charging unit price “1” is formedas one unit of charging information) (Step S812), and that charginginformation is transferred to the account server 840 in the form of anaccount information frame F51 (Step S813). In the account processingdevice 841 within the account server 840, the network account counter ofthe account information database 842 is incremented, according to thecharging information within the account information frame F51 receivedfrom the access control apparatus 810-1 (Step S814). In the event thatthe charging conditions is neither in examples described later, thecharging described here is performed.

(2) Example of communication with an arrangement of network charging,transmitting charging and fixed charging system:

Description will be made regarding a case wherein the corporation Xperforms the intra-corporation communication using the ICS 800 accordingto the present invention. In this case, the charging system for the LANs800-1 and 800-2 is the fixed charging system for the network charging,with the entire bill being borne by the LAN 800-1, and no informationcharging being conducted.

<<Preparations to Make for Communication>>

The LANs 800-1 and 800-2 are each connected to the respective accesscontrol apparatuses 810-1 and 810-5.

<<Preparations to Make for Charging>>

The charging condition for the LANs 800-1 and 800-2 which are to conductthe communication is registered in the conversion table 813-1. Thecharging conditions are set for registering in the conversion table813-1 based on the transmitting ICS network address, the sender ICS useraddress, the receiving ICS network address and the receiver ICS useraddress. A value “0” is set to indicate that network charging is to beconducted by the fixed charging system, and also, a value “1” indicatingthe transmitting charging is set to billing bearing of the definitiontable for fixed charges 843, indicating the party bearing the charges.Since the information charging is not to be performed, a value “0”indicating non-charging is set to the charging conditions in theinformation charging condition of the conversion table 813-1. A value“0” indicating the fixed charging system is set in the conversion tableof the access control apparatus 810-5 containing the LAN 800-2.

<<Description of Operation of Charging>>

Regarding the ICS user frame sent from the terminal of the ICS networkaddress “0012” connected to the LAN 800-1, the charging condition fieldsare specified from the sender ICS user address and the receiver ICS useraddress and in the ICS user frame at the processing device 812-1 withinthe access control apparatus 810-1 (Steps S800 and S801), and areference is made to the charging conditions in order to specify thecharging system relating to the network charging from the field (StepS810). Since this is “0” indicating that the charging system is fixedcharging, no charging processing such as forming the charginginformation is performed (Step S820). The processing for billing isperformed with reference to the definition table for fixed charges 843.That is, billing is performed to the LAN 800-1, since the value “0”indicating transmitting charging is set to the definition table forfixed charges 843.

(3) Example of communication with an arrangement of network charging,receiving charging and charge-by-quantity charging system:

Description will be made regarding a case wherein the corporation X andthe corporation Y perform inter-corporation communication. In this case,the charging system for the LANs 800-1 and 800-3 is thecharge-by-quantity charging system for network charging, with the entirebill being borne by the LAN 800-3, and no information charging beingconducted.

<<Preparations to Make for Communication>>

The LANs 800-1 and 800-3 are each connected to the respective accesscontrol apparatuses 810-1 and 810-4.

<<Preparations to Make for Charging>>

The charging condition for the LANs 800-1 and 800-3 which are to conductthe communication is registered in the conversion table 813-1. Thecharging conditions are set for registering in the conversion table813-1 based on the transmitting ICS network address, the sender ICS useraddress, the receiving ICS network address and the receiver ICS useraddress. A value “2” is set to indicate that network charging is to beconducted by the charge-by-quantity charging system, and also, a value“1” is set for the charging unit price. Since the information chargingis not to be performed, a value “0” indicating non-charging is set tothe charging conditions in the information charging condition of theconversion table 813-1. A value “2” indicating the charge-by-quantitycharging system and the receiver charging is set to the conversion tableof the access control apparatus 810-4 containing the LAN 800-3, sincethe LAN 800-3 is to be billed.

<<Description of Operation of Charging>>

Regarding the ICS user frame sent from the terminal of the ICS networkaddress “0012” connected to the LAN 800-1, the charging condition fieldsare specified from the sender ICS user address and the receiver ICS useraddress in the ICS user frame at the processing device 812-1 within theaccess control apparatus 810-1 (Steps S800 and S801), and a reference ismade to the charging conditions in order to specify the charging systemrelating to the network charging from the field (Step S810). Since thisis “2” indicating that the charging system is charge-by-quantity andthat the receiving charging is to be performed, the charging informationis formed (e.g., charging unit price “1” is formed as two units of thecharging information), and that the account information frame istransferred to the account server 840. In the account processing device841 within the account server 840, the network account counter of theLAN 800-3 of the account information database 842 is incremented,according to the charging information within the account informationframe received from the access control apparatus 810-4.

(4) Example of communication with an arrangement of network charging,receiving charging and fixed charging system:

Description will be made regarding a case wherein the corporation Xperforms intra-corporation. In this case, the charging system for theLANs 800-1 and 800-2 is the fixed charging system for the networkcharging, with the entire bill being borne by the LAN 800-2, and noinformation charging being conducted.

<<Preparations to Make for Communication>>

The LANs 800-1 and 800-2 are each connected to the respective accesscontrol apparatuses 810-1 and 810-5.

<<Preparations to Make for Charging>>

The charging condition for the LANs 800-1 and 800-2 which are to conductthe communication is registered in the conversion table 813-1. Thecharging conditions are set for registering in the conversion table813-1 based on the transmitting ICS network address, the receiver ICSuser address, the receiving ICS network address, and the receiver ICSuser address. A value “0” is set to indicate that network charging is tobe conducted by fixed charging, and also, a value “2” indicatingreceiving charging is set to billing bearing of the definition table forfixed charges 843, indicating the party bearing the charges. Since theinformation charging is not to be performed, a value “0” indicatingnon-charging is set to the charging conditions in the informationcharging condition of the conversion table 813-1. A value “0” indicatingthe fixed charging system is set to the conversion table of the accesscontrol apparatus 810-5 containing the LAN 800-2.

<<Description of Operation of Charging>>

Regarding the ICS user frame sent from the terminal of the ICS networkaddress “0012” connected to the LAN 800-1, the charging condition fieldsare specified from the sender ICS user address and the receiver ICS useraddress in the ICS user frame at the processing device 812-1 within theaccess control apparatus 810-1 (Steps S800 and S801), and a reference ismade to the charging conditions in order to specify the charging systemrelating to the network charging from the field (Step S810). Since thisis “0” indicating that the charging system is fixed charging, nocharging processing such as forming charging information is performed(Step S820). The processing for billing is performed with reference tothe definition table for fixed charges 843. That is, billing isperformed to the LAN 800-2, since a value “2” indicating transmittingbilling is set to the definition table for fixed charges 843.

(5) Example of communication with an arrangement of informationcharging, transmitting charging and charge-by-quantity charging system:

Description will be made regarding a case wherein the corporation X andthe corporation Y perform the communication. In this case, the chargingsystem for the LANs 800-1 and 800-3 is the information charging, with nonetwork charging being conducted. The entire bill is borne by the LAN800-1.

<Preparations to Make for Communication>>

The LANs 800-1 and LAN 800-3 are each connected to the respective accesscontrol apparatuses 810-1 and 810-4.

<<Preparations to Make for Charging>>

For the charging conditions for the network charging conditions, a value“0” indicating non-charging is set in the conversion table 813-1, andsince charging itself is not performed, there is no setting of thecharging unit price. A value “3” is set to indicate that informationcharging condition is to be conducted by charge-by-quantity charging andtransmitting charging. Also, a value “2” is set for the charging unitprice.

<<Description of Operation of Charging>>

Regarding the ICS user frame sent from the terminal of the ICS networkaddress “0012” connected to the LAN 800-1, the charging condition fieldsare specified from the sender ICS user address and the receiver ICS useraddress in the ICS user frame at the processing device 812-1 within theaccess control apparatus 810-1 (Steps S800 and S801), and a reference ismade to the charging conditions in order to specify the charging systemrelating to the network communication from the field (Step S810). Sincethis is “0” indicating non-charging is set, network charging is notperformed (Step S820). Next, a reference is made to the chargingconditions of the information charging conditions, in order to specifythe conditions of charging related to the information charging. In thiscase, a value “1” is set which indicates charging-by-quantity which isto be borne by the transmitter, so the charging-by-quantity charging isperformed. Also, the charging unit price which indicates the weightingof this charging-by-quantity is referred to, which in the case is set ata value of “2”. Next, based on the obtained information, the charginginformation for each ICS user frame is formed (e.g., charging unit price“2” is formed as two units of the charging information), and that thecharging information is transferred to the account server 840 in theform of an account information frame F51. The account processing device841 within the account server 840 which received the charginginformation specifies the information storage field of the accountinformation database 842 based on the transmitting ICS network address,the sender ICS user address, the receiving ICS network address and thereceiver ICS user address from the account information frame F51, andthe network account counter is incremented according to the charginginformation within the account information frame F51.

(6) Example of communication with an arrangement of informationcharging, receiving charging and charge-by-quantity charging system:

Description will be made regarding a case wherein the corporation X andthe corporation Y perform the inter-corporation communication. In thiscase, the charging system for the LANs 800-1 and 800-3 is thecharge-by-quantity charging system for the information charging, and nonetwork charging being conducted. The entire bill is borne by the LAN800-3 which is a receiver.

<<Preparations to Make for Communication>

The LANs 800-1 and 800-3 are each connected to the respective accesscontrol apparatuses 810-1 and 810-4.

<<Preparations to Make for Charging>>

For the charging conditions for network charging conditions, a value “0”indicating non-charging is set in the conversion table 813-1, and sincecharging itself is not performed, there is no setting of the chargingunit price. A value “2” is set to the information charging conditions toindicate that information charging condition is to be conducted bycharge-by-quantity charging and transmitting charging. Also, a value “2”is set for the charging unit price.

<<Description of Operation of Charging>>

Regarding the ICS user frame sent from the terminal of the ICS networkaddress “0012” connected to the LAN 800-1, the charging condition fieldsare specified from the sender ICS user address and the receiver ICS useraddress and in the ICS user frame at the processing device 812-1 withinthe access control apparatus 810-1 (Steps S800 and S801), and areference is made to the charging conditions in order to specify thecharging system relating to the network communication from the field(Step S810). Since this is “0” indicating non-charging is set, networkcharging is not performed (Step S820). Next, a reference is made to thecharging conditions of the information charging conditions, in order tospecify the conditions of charging related to the information charging.In this case, a value “2” is set which indicates thecharging-by-quantity charging which is to be borne by the receiver, sothe charging-by-quantity charging is performed. Also, the charging unitprice which indicates the weighting of the charging-by-quantity chargingis referred to, which in this case is set at a value of “2”. Next, basedon the obtained information, the charging information for each ICS userframe is formed (e.g., charging unit price “2” is formed as two units ofthe charging information), and that the charging information istransferred to the account server 840 in the form of an accountinformation frame F51. The account processing device 841 within theaccount server 840 which received the charging information specifies theinformation storage field of the account information database 842 basedon the transmitting ICS network address, the sender ICS user address,the receiving ICS network address and the receiver ICS user address fromthe account information frame F51, and the network account counter isincremented according to the charging information within the accountinformation frame F51.

(7) Example of communication with an arrangement of informationcharging, transmitting charging and charge-by-quantity charging system,wherein the charging conditions have not been registered in, aconversion table beforehand:

Description will be made regarding a case wherein the corporation X andthe corporation Y perform a communication. The charging conditions for acommunication between the LANs 800-1 and 800-3 are the same as describedabove, but there is a difference in this case in that values forstipulating the charging conditions are not registered in the conversiontable 813-1 of the access control apparatus 810-1 connected to the LAN800-1.

<<Preparations to Make for Communication>

The LANs 800-1 and 800-4 are each connected to the respective accesscontrol apparatuses 810-1 and 810-2.

<<Preparations to Make for Charging>>

In this case, there are no charging conditions registered in theconversion table 813-1, so there is no need to make a preparation in theaccess control apparatus 810-1 containing the LAN 800-1. The receivingcharging conditions for the LAN 800-4 are set in the conversion table inthe access control apparatus 810-2 containing the LAN 800-4. A value “0”indicating non-charging is set to the charging conditions in theinformation charging condition of the conversion table 813-1. Since thecharging itself is not performed, there is no setting of the chargingunit price. A value “3” is set to the information charging conditions toindicate that the information charging is to be conducted by thecharge-by-quantity charging and the transmitting charging. Also, a value“1” is set for the charging unit price.

<<Description of Operation of Charging>>

Regarding the ICS user frame sent from the terminal of the ICS networkaddress “0012” connected to the LAN 800-1, specification of the chargingcondition fields is attempted using the sender ICS user address, and thereceiver ICS user address in the ICS user frame from the conversiontable 813-1 at the processing device 812-1 within the access controlapparatus 810-1 (Steps S800 and S801), but since there are no fieldsindicating the pertinent charging conditions in this case, a contact ismade with the access control apparatus 810-4 containing the receiveruser, based on the receiver ICS user address of the receiver user (StepS802). The access control apparatus 810-4 refers to the chargingconditions of the receiver user with the conversion table in the accesscontrol apparatus 810-4, and replies of the charging conditions to theaccess control apparatus 810-1. The charging conditions which the accesscontrol apparatus 810-1 has obtained from the access control apparatus810-4 are registered in a temporary conversion table 814-1 (Step S803).Subsequently, a reference is made in the processing device 812-1 to thecharging conditions in order to specify the charging conditions relatingto the network communication from the charging conditions. Since this is“0” indicating non-charging is set, network charging is not performed(Step S820). Next, a reference is made to the charging conditions of theinformation charging conditions, in order to specify the conditions ofcharging related to the information charging. In this case, a value “1”is set which indicates charging-by-quantity which is to be borne by thetransmitter, so the charging-by-quantity charging is performed. Also,the charging unit price which indicates the weighting of thecharging-by-quantity charging is referred to, which in this case is setat a value of “1”, and thus the weighting of this charging is known.Next, based on the obtained information, the charging information foreach ICS user frame is formed (e.g., charging unit price “1” is formedas one unit of the charging information), and that the charginginformation is transferred to the account server 840 in the form of anaccount information frame F51. The account processing device 841 withinthe account server 840 which received the charging information specifiesthe information storage field of the account information database 842based on the transmitting ICS network address and the receiver ICS useraddress from the account information frame F51, and the network accountcounter is incremented according to the account information within theaccount information frame F51.

Embodiment-9 ICS Frame Database Server

FIGS. 41 and 42 show an example of an ICS 900 which includes ICS framedatabase servers 950 and 960 which are a type of ICS network servers.The ICS frame database servers 950 and 960 store data based on requestedtiming from the side of the terminals (hereafter referred to as“ICS-using terminal”) using the ICS 900, or removes the stored data andsends the data to the requester. The ICS frame database servers 950 and960 are respectively comprised of processing devices 951 and 961,storage information administration tables 952 and 962, and BOXs 953 and963. Examples of storage information administration tables 952 and BOX953, and storage information administration tables 962 and BOX 963 arerespectively shown in FIGS. 43 and 44.

The processing devices 951 and 961 receive ICS user frames from theICS-using terminals, refer to the usage requests of ICS frame databaseservers explicitly indicated by the ICS-using terminals, perform storagecommanding of the ICS user frames to the storage informationadministration tables 952 and 962, and perform storage instruction ofinformation to the BOXs 953 and 963. The storage informationadministration tables 952 and 962, upon receiving the instruction fromthe processing devices 951 and 961, store items regarding whichadministration is necessary for each separate ICS-using terminal, suchas the index number of stored information. The BOXs 953 and 963, uponreceiving the instruction from the processing devices 951 and 961, storeadministration number of stored information for each separate ICS-usingterminal, user information and so forth. The following is a descriptionof the preparatory items for using ICS frame database servers 950 and960 and examples of communication therewith.

<<Preparatory Items>>

The operator of the VAN-1 registers the information (in the presentembodiment, ICS user address “0012”, etc.) regarding the user in thestorage information administration table 952 and the BOX 953 beforehand,so that the storage of information can be performed for a terminalhaving the ICS user address “0012”, being connected to the LAN 900-1 ofthe corporation X. Also, in the same way, the operator of the VAN-3registers the information (in the present embodiment, ICS user address“0034”, etc.) regarding the user in the storage informationadministration table 962 and the BOX 963 beforehand, so that the storageof information can be performed for a terminal having the ICS useraddress “0034”, being connected to the LAN 900-2 of the corporation X.The ICS-using user sends an ICS user frame F60 as shown in FIG. 45 tothe ICS 900. This ICS user frame F60 is provided with the following tothe user control field thereof: a usage request identifier (anidentifier which explicitly indicates using the ICS frame databaseserver) for using the ICS frame database server, and an informationoperating identifier (an identifier which explicitly indicates operationof information stored in the ICS frame database server). Incidentally,although the description of the present embodiment involves the userattaching the usage request identifier and the information operatingidentifier to the user control field of the ICS user frame F60, thusachieving the usage request of the ICS frame database server by theuser, but the usage request identifier and the information operationidentifier may be attached to the ICS user data field, instead.<<Examples of Communication>>

(1) Communication example-1 (Operation of the ICS frame database serveron the sending side):

A terminal which is connected to the LAN 900-1 of the corporation X andhas an ICS user address “0012” performs a communication to a terminalwhich is connected to the LAN 900-2 of the corporation X and has an ICSuser address “0034”, using the ICS frame database server. A flowchart isshown in FIG. 46, describing the operation thereof.

The transmitter terminal sends an ICS user frame F60 for using the ICSframe database server 950 to the ICS 900, the ICS user frame F60 beingprovided at the user control field with a usage request identifier(transmitting storage user administration number: a code which the userusing the ICS provides optionally, used as a search index number in theevent that the ICS user operates the stored information) and aninformation operating identifier (transfer schedule time, informationstorage, information transfer, information elimination, informationcompletion, etc.). The access control apparatus 910-1 received this(Step S900) refers to the usage request identifier of the ICS user frameF60 at the processing device 912-1 (Step S901), and in the event thatthe number of the user request identifier set by the transmitterterminal exists, the ICS user frame F60 is transferred to the processingdevice 951. The processing device 951 received the ICS user frame F60refers to the usage request identifier and the information operatingidentifier (Step S910), and executes the operation indicated in theinformation operating identifier.

In the event that information storage is indicated, the processingdevice 951 receives the usage request identifier (transmitting storageuser administration number) and the information operating identifier(information storage) of the ICS user frame F60 sent from thetransmitter terminal, thereby storing the receiver ICS user address andthe usage request identifier in the storage information administrationtable 952 corresponding to the sender ICS user address of the frame, andthen stores the ICS user data frame in the BOX 953 (Step S911). Sincethe user frame to be stored is sent from the transmitter in the form ofbeing divided into a plurality of ICS user frames, this operation isperformed until the last frame of the ICS user frames to be stored isindicated, by means of the information operation identifier (informationcompletion) indicated in the ICS user frame F60 (Step S912)

In the event that the transfer schedul time is indicated (Step S913),the processing device 951 receives the usage request identifier(transmitting storage user administration number) and the informationoperating identifier (transfer schedule time) of the ICS user frame F60sent from the transmitter terminal, thereby storing the specified timein the storage information administration table 952 (Step S914), and theprocessing device 951 also transfers the information stored in the BOX953 to the receiver terminal at a predetermined time, by means ofconstantly monitoring the transfer schedul time (Step S915).

In the event that the information transfer is indicated, the processingdevice 951 receives the usage request identifier (transmitting storageuser administration number) and the information operating identifier(transfer request) of the ICS user frame F60 sent from the transmitterterminal, thereby sending the information (ICS user frame) stored in theBOX 953 to the receiver terminal (Step S916). Also, in the event thatthe information elimination is indicated, the processing device 951receives the usage request identifier and the information operatingidentifier (information elimination) of the ICS user frame F60 sent fromthe transmitter terminal, thus eliminating the information stored in thestorage information administration table 952 and the BOX 953 (StepS917).

(2) Communication example-2 (Operation of the ICS frame database serveron the receiving side):

A terminal which is connected to the LAN 900-2 of the corporation X andhas an ICS user address “0034” receives a communication from a terminalwhich is connected to the LAN 900-1 of the corporation X and has an ICSuser address “0012”, using the user BOX. A flowchart is shown in FIG.47, describing the operation thereof.

The transmitter terminal sends an ICS user frame F60 for using thereceiver side ICS frame database server 960 to the ICS 900, the ICS userframe F60 being provided at the user control field with a usage requestidentifier (receiving storage user administration number: a code whichthe user using the ICS provides optionally, used as an index number inthe event that the ICS user operates the stored information) and theinformation operating identifier. The ICS user frame F60 is sent throughthe ICS 900 to the access control apparatus 910-5 containing thereceiver terminal (Step S920). The processing device 912-5 refers to theusage request identifier of the ICS user frame F60 (Step S921), and ifthe number of the usage request identifier set by the transmitterterminal exists, transfers the ICS user frame F60 to the processingdevice 961.

The processing device 961 received the ICS user frame F60 checks up theinformation operating identifier (information storage, informationtransfer, information elimination, information completion, etc.) of theICS user frame F60 (Step S930), in a case of the information storage,stores the usage request identifier in the storage informationadministration table 962 corresponding to the sender ICS user addressand the receiver user address of the frame, and then stores the ICS userframe in the BOX 963 (Step S931). The ICS user frame to be stored issent from the transmitter in the form of being divided into a pluralityof ICS user frames, so in the present embodiment, this operation isperformed until the last frame of the ICS user frames to be stored isindicated, by means of the information operating identifier (informationcompletion) indicated in the ICS user frame F60 (Steo S932). Theprocessing device 962 notifies to the terminal of the receiver thatthere is information addressed to the receiving terminal in the ICSframe database server 960 by attaching the receiving storage useradministration number, at a timing (e.g. noon) agreed on beforehand withthe receiver terminal (Step S933). The receiver terminal which has beennotified sends an ICS user frame F60 which set the usage requestidentifier and information operating identifier (information transfer),to the access control apparatus 910-5, the ICS frame database server 960sends the information stored in the BOX 963 to the receiver terminal(Step S936) and then the receiver terminal receives the information (ICSuser frame) stored in the ICS frame database server 960.

The processing device 961, upon receiving a frame explicitly indicatingthe usage request identifier and the information operating identifier(information elimination) of the ICS user frame F60, eliminates theinformation stored in the storage information administration table 962and the BOX 963 (Step S937).

(3) Communication example-3 (Case of the receiving side temporarilycannot receive):

In a case that a terminal which is connected to the LAN 900-1 of thecorporation X and has an ICS user address “0012” performs acommunication to a terminal which is connected to the LAN 900-2 of thecorporation X and has an ICS user address “0034”, even if a connectioncannot be made temporarily between the transmitter terminal and the LAN900-2 of the corporation X, the ICS frame database server 960temporarily stores information addressed to the receiving terminal, andexecutes the communication when the connection becomes possible. Aflowchart is shown in FIG. 48, describing the operation thereof.

The transmitter terminal sends an ICS user frame F60 to the ICS 900, theICS user frame F60 being provided at the user control field with aninformation operating identifier (temporary storage) which allowsinformations to be distributed even if the communication with thereceiver terminal is impossible, by storing the informations in the ICSframe database server 960 temporarily. The ICS user frame F60 is sentthrough the ICS 900 to the access control apparatus 910-5 containing thereceiver terminal, the access control apparatus 910-5 receives the ICSuser frame F60 (Step S940), and the processing device 912-5 checks uswhether or not the usage request identifier in the ICS user frame F60exists (Step S941) and refers to the information operating identifier(temporary storage) of the ICS user frame F60 (Step S942). If there is arequest for temporary storage, a judgment is made whether the receivingside terminal is in a state in which communication is available. In theevent that the communication is available, the ICS user frame F60 istransferred to the receiving terminal (Step S950), in the event that thecommunication is not available, the ICS user frame F60 is transferred tothe processing device 961 of the ICS frame database server 960.

The processing device 961, stores the sender ICS user address, thereceiver ICS user address and the usage request identifier of the ICSuser frame F60 in the storage information administration table 962, andthen stores the ICS user frame in the BOX 963 (Step S951). The ICS userframe to be stored is sent from the transmitter in the form of beingdivided into a plurality of ICS user frames, so in the presentembodiment, this operation is performed until the last frame of the ICSuser frames to be stored is indicated, by means of the informationoperating identifier (information completion) indicated in the ICS userframe F60 (Step S952). The processing device 912-5 constantly monitorsthe communication state with the receiving terminal, and when thereceiving terminal becomes to be possible to receive, it notifies to theprocessing device 961 that the communication with the receiver isavailable. Upon receiving the notification, the processing device 961notifies to the receiver terminal that there is information addressed tothe receiver in the ICS frame database server 960, at a timing (e.g.after 5 minutes) agreed on beforehand with the receiver terminal (StepS953). The receiver terminal which has been notified sends an ICS userframe F60 which is set the usage request identifier (ICS storage useradministration number) and the information operating identifier(information transfer), to the access control apparatus 910-5, the ICSframe database server 960 sends the information stored in the BOX 963 tothe receiver terminal (Step S956), and the receiver terminal receivesthe stored information from the ICS frame database server 960 (StepS945).

When the processing device 961 receives a frame explicitly indicatingthe usage request identifier and the information operating identifier(information elimination) of the ICS user frame F60 sent from thereceiver terminal, it eliminates the information stored in the storageinformation administration table 962 and the BOX 963 (Step S957).

Embodiment-10 Transfer by X.25, FR, ATM, Satellite Communication, andContainment of Telephone Line, ISDN Line, CATV Line, Satellite Line

The data format from the user in the ICS according to the presentinvention is not restricted to the ICS user frames following theprotocol of RFC 791 or RFC 1883, but can also be applied to containmentof telephone line, ISDN line, CATV line, satellite line, IPX. Also, therelay network of the ICS network frame within the ICS network may handleX.25, FR, ATM, satellite communication, etc. In the present invention,the ATM exchanger includes cell-relay equipment, and the ATM networkincludes cell-relay networks.

FIG. 49 through FIG. 51 are an example of interface conversion in an ICS1000 according to the present invention, comprised of access controlapparatuses 1010-1 and 1010-2, ICS frame interface network 1050, X.25network 1040, FR network 1041, ATM network 1042, satellite communicationnetwork 1043, X.25/ICS network frame converting units 1031-1 and 1031-2,FR/ICS network frame converting units 1032-1 and 1032-2, ATM/ICS networkframe converting units 1033-1 and 1033-2, satellite/ICS network frameconverting units 1034-1 and 1034-2, telephone line converting units1030-1 and 1030-2, ISDN line converting units 1029-1 and 1029-2, CATVline converting units 1028-1 and 1028-2, satellite line converting units1027-1 and 27-2, and IPX converting units 1026-1 and 1026-2. An exampleof the conversion table 1013-1 in the access control apparatus 1010-1 isshown in FIG. 52.

The ICS frame interface network 1050 is a relay network which transfersthe ICS network frame following the protocol of RFC 791 or RFC 1883 inthe format that it is in. The X.25 network 1040 is a relay network fortransferring frames of an X.25 format, and has as the input/outputportion thereof X.25/ICS network frame converting units 1031-1 and1031-2 for converting ICS network frames into frames of an X.25 format,and for performing reverse conversion. The FR network 1041 is a relaynetwork for transferring frames of a frame relay format, and has as theinput/output portion thereof FR/ICS network frame converting units1032-1 and 1032-2 for converting ICS network frames into frames of an FRformat, and for performing reverse conversion. The ATM network 1042 is arelay network for transferring frames of an ATM format, and has as theinput/output portion thereof ATM/ICS network frame converting units1033-1 and 1033-2 for converting ICS network frames into frames of anATM format, and for performing reverse conversion. The satellitecommunication network 1043 is a relay network for transferring frames ofa satellite communication format, and has as the input/output portionthereof satellite/ICS network frame converting units 1034-1 and 1034-2for converting ICS network frames into satellite communication networkinterface, and for performing reverse conversion. The telephone lineconverting units 1030-1 and 1030-2 have the functions of converting afunction equivalent to physical layer or data link layer (first andsecond layers of 0SI communication protocol) between the telephone lineand the access control apparatus, and for performing reverse conversion.The ISDN line converting units 1029-1 and 1029-2 have the functions ofconverting a function equivalent to physical layer or data link layerbetween the ISDN line and the access control apparatus, and forperforming reverse conversion. The CATV line converting units 1028-1 and1028-2 have the functions of converting a function equivalent tophysical layer or data link layer between the CATV line and the accesscontrol apparatus, and for performing reverse conversion. The satelliteline converting units 1027-1 and 1027-2 have the functions of convertinga function equivalent to physical layer or data link layer between thesatellite line and the access control apparatus, and for performingreverse conversion. The IPX line converting units 1026-1 and 1026-2 havethe functions of converting a function equivalent to physical layer ordata link layer between the IPX line and the access control apparatus,and for performing reverse conversion.

(1) Description will be made regarding a case wherein communication isperformed between the access control apparatus 1010-1 and the accesscontrol apparatus 1010-2, via the X.25 network 1040.

The access control apparatus 1010-1 sends the ICS network frame to theX.25 exchanger 10131-1. The X.25/ICS network frame converting unit1031-1 within the X.25 exchanger 10131-1 converts the ICS network framereceived from the access control apparatus 1010-1 into an X.25 formatframe as shown in FIG. 53. Then, the X.25 exchanger 10131-1 sends theX.25 format frame into the X.25 network 1040. The X.25 format frame sentfrom the X.25 exchanger 10131-1 is transferred through the X.25 network1040, and reaches the X.25 exchanger 10131-2. Next, the X.25/ICS networkframe converting unit 1031-2 within the X.25 exchanger 10131-2 performsreverse conversion of the received X.25 format frame into ICS networkframe format, and outputs to the access control apparatus 1010-2. Theaccess control apparatus 1010-2 receives the ICS network frame. Networkframes of the ICS 1000 sent from the access control apparatus 1010-2 tothe X.25 exchanger 10131-2 are transferred to the access controlapparatus 1010-1 in the same manner.

(2) Description will be made regarding a case wherein a communication isperformed between the access control apparatus 1010-1 and the accesscontrol apparatus 1010-2, via the FR network 1041.

The access control apparatus 1010-1 sends the ICS network frame. TheFR/ICS network frame converting unit 1032-1 within the FR exchanger10132-1 converts the ICS network frame received from the access controlapparatus 1010-1 into an FR format frame as shown in FIG. 54. Then, theFR exchanger 10132-1 sends the X.25 format frame into the FR network1041. The FR format frame sent from the FR exchanger 10132-1 istransferred through the FR network 1041, and reaches the FR exchanger10132-2. The FR/ICS network frame converting unit 1032-2 within the FRexchanger 10132-2 performs reverse conversion of the received FR formatframe into ICS network frame format, and outputs to the access controlapparatus 1010-2. The access control apparatus 1010-2 receives the ICSnetwork frame. ICS network frames sent from the access control apparatus1010-2 to the FR exchanger 10132-2 are transferred to the access controlapparatus 1010-1 in the same manner.

(3) Description will be made regarding a case wherein a communication isperformed between the access control apparatus 1010-1 and the accesscontrol apparatus 1010-2, via the ATM network 1042.

The access control apparatus 1010-1 sends the ICS network frame to theATM exchanger 10133-1. The ATM/ICS network frame converting unit 1033-1within the ATM exchanger 10133-1 converts the ICS network frame receivedfrom the access control apparatus 1010-1 into an ATM format frame asshown in FIG. 55. Then, the ATM exchanger 10133-1 sends the ATM formatframe into the ATM network 1042. The ATM format frame sent from the ATMexchanger 10133-1 is transferred through the ATM network 1042, andreaches the ATM exchanger 10133-2. Next, the ATM/ICS network frameconverting unit 1033-2 within the ATM exchanger 10133-2 performs reverseconversion of the received ATM format frame into ICS network frameformat, and outputs to the access control apparatus 1010-2. The accesscontrol apparatus 1010-2 receives the ICS network frame. ICS networkframes sent from the access control apparatus 1010-2 to the ATMexchanger 10133-2 are transferred to the access control apparatus 1010-1in the same manner.

(4) Description will be made regarding a case wherein a communication isperformed between the access control apparatus 1010-1 and the accesscontrol apparatus 1010-2, via the satellite communications network 1043.

The access control apparatus 1010-1 sends the ICS network frame to thesatellite receiver/transmitter 10134-1. The satellite/ICS network frameconverting unit 1034-1 within the satellite receiver/transmitter 10134-1converts the ICS network frame received from the access controlapparatus 1010-1 into an interface within the satellite communicationsnetwork 1043. Then, the satellite receiver/transmitter 10134-1 sends theICS network frame converted into an interface within the satellitecommunications network 1043 into the satellite communications network1043. The ICS network frame converted into an interface within thesatellite communications network 1043 sent from the satellitereceiver/transmitter 10134-1 is transferred through the satellitecommunications network 1043, and reaches the satellitereceiver/transmitter 10134-2. The satellite/ICS network frame convertingunit 1034-2 within the satellite receiver/transmitter 10134-2 performsreverse conversion of the received interface within the satellitecommunications network 1043 into ICS network frame format, and outputsto the access control apparatus 1010-2. The access control apparatus1010-2 receives the ICS network frame. ICS network frames sent from theaccess control apparatus 1010-2 to the satellite receiver/transmitter10134-2 are transferred to the access control apparatus 1010-1 in thesame manner.

(5) Description will be made regarding a case wherein communication isperformed with an interface of a telephone line between a user 1060-1connected to a telephone line converting unit 1030-1 of an accesscontrol apparatus 1010-1, and a user 1060-2 connected to a telephoneline converting unit 1030-2 of an access control apparatus 1010-2, thefirst user originating the call.

The user 1060-1 applies a telephone line connection to the VAN operator.The VAN operator specifies the access control apparatus 1010-1connecting the user 1060-1, and decides on an ICS network address “7721”for the ICS logic terminal. Next, the VAN operator sets informations inthe conversion table 1013-1 of the access control apparatus 1010-1, suchas the transmitting ICS network address “7721”, the receiving telephonenumber “06-5555-9876”, the receiving ICS network address “5521”, requestidentification and so forth. In the present embodiment, the requestidentification “5” indicates a telephone line connection. In the sameway, the VAN operator sets informations in the conversion table 1013-2of the access control apparatus 1010-2, such as the transmitting ICSnetwork address “5521”, the receiving telephone number “03-5555-1234”,the receiving ICS network address “7721”, request identification and soforth.

The user 1060 sends the telephone number “06-5555-9876”. The telephoneline converting unit 1030-1 converts the received telephone number intoa format which can be read by the processing device 1012-1, and sends itto the processing device 1012-1. The processing device 1012-1 receivedthe telephone number information from the telephone line converting unit1030-1 with the ICS network address “7721” refers to the requestidentification of the transmitting ICS network address “7721” of theconversion table 1013-1, identifies it as a telephone line connection,and reads the receiving ICS network address “5521” from the receivingtelephone number “06-5555-9876”. The access control apparatus 1010-1forms an ICS network frame having a network control field wherein thereceiving ICS network address is set to “5521” and the transmitting ICSnetwork address is set to “7721” and a network data field describedinformation to notify that there is a telephone reception, and sends itinto a network of ICS 1000. The ICS network frame sent from the accesscontrol apparatus 1010-1 is transferred through the network of the ICS1000, and reaches the access control apparatus 1010-2. The accesscontrol apparatus 1010-2 received the ICS network frame having thenetwork data field described information to notify that there istelephone reception, outputs a signal from the telephone line convertingunit 1030-2 with the ICS network address “5521” to the user 1060-2notifying the reception. Then, the user 1060-2 sends a response signal.

Upon receiving the response signal, the telephone line converting unit1030-2 converts it into a format which can be transferred through thenetwork of the ICS 1000. The access control apparatus 1010-2 forms anICS network frame having a network control field wherein the receivingICS network address is set to “7721” and the transmitting ICS networkaddress is set to “5521”, and a network data field described informationto notify that there is reply of the telephone, and sends it into anetwork of the ICS. The ICS network frame sent from the access controlapparatus 1010-2 is transferred through the network of the ICS, andreaches the access control apparatus 1010-1. The access controlapparatus 1010-2 received the ICS network frame having the network datafield described information to notify that there is a response, outputsa signal from the telephone line converting unit 1030-1 having the ICSnetwork address “7721” to the user 1060-1, notifying the response. Thus,the user 1060-1 and the user 1060-2 begin full-duplex communication byanalog signals (voice, etc.) and the user 1060-1 sends analog signals.The telephone line converting unit 1030-1 received the analog signalsconverts the analog signals into an analog information format which canbe transferred through the ICS network.

The access control apparatus 1010-1 forms an ICS network frame having anetwork control field wherein the transmitting ICS network address isset to “7721” and the receiving ICS network address is set to “5521”,and a network data field described analog information, and sends it intoa network of the ICS 1000. The ICS network frame sent from the accesscontrol apparatus 1010-1 is transferred through the network of the ICS1000, and reaches the access control apparatus 1010-2. The accesscontrol apparatus 1010-2 received the ICS network frame having networkdata field described the analog information outputs the analoginformation as analog signals converted into a telephone line interfacefrom the telephone line converting unit 1030-2 having the ICS networkaddress “5521” to the user 1060-2. The analog signals sent from the user1060-2 are transferred to the user 1060-1 by means of the sameprocedure.

(6) Description will be made regarding a case wherein a communication isperformed with an interface of an ISDN line between a user 1061-1connected to an ISDN line converting unit 1029-1 of an access controlapparatus 1010-1, and a user 1061-2 connected to an ISDN line convertingunit 1029-2 of an access control apparatus 1010-2, the first useroriginating the call.

The user 1061-1 applies an ISDN line connection to the VAN operator. TheVAN operator specifies the access control apparatus 1010-1 connectingthe user 1061-1, and decides on an ICS network address “7722” for theICS logic terminal. Next, the VAN operator set informations in theconversion table 1013-1 of the access control apparatus 1010-1, such asthe transmitting ICS network address “7722”, the receiving ISDN number“06-5555-2222”, the receiving ICS network address “5522”, requestidentification and so forth. In the present embodiment, the requestidentification “6” indicates a ISDN line connection. In the same way,the VAN operator sets informations in the conversion table 1013-2 of theaccess control apparatus 1010-2, such as the transmitting ICS networkaddress “5522”, the receiving ISDN number “03-5555-1111”, the receivingICS network address “7722”, request identification and so forth.

The user 1061-1 sends the ISDN number “06-5555-2222”. The ISDN lineconverting unit 1029-1 converts the received ISDN number into a formatwhich can be read by the processing device 1012-1, and sends it to theprocessing device 1012-1. The processing device 1012-1 received the ISDNnumber information from the ISDN line converting unit 1029-1 with theICS network address “7722” refers to the request identification of thetransmitting ICS network address “7722” of the conversion table 1013-1,identifies it as an ISDN line connection, and reads the receiving ICSnetwork address “5522” from the receiving ISDN number “06-5555-2222”.The access control apparatus 1010-1 forms an ICS network frame having anetwork control field wherein the receiving ICS network address is setto “5522” and the transmitting ICS network address is set to “7722”, anda network data field described information to notify that there is anISDN reception, and sends it into a network of the ICS 1000.

The ICS network frame sent from the access control apparatus 1010-1 istransferred through the network of the ICS 1000, and reaches the accesscontrol apparatus 1010-2. The access control apparatus 1010-2 receivedthe ICS network frame having the network data field describedinformation to notify that there is a reception, outputs a signal fromthe ISDN line converting unit 1029-2 with an ICS network address “5522”to the user 1061-2, notifying the reception. Then, the user 1061-2 sendsa response signal. Upon receiving the response signal, the ISDN lineconverting unit 1029-2 converts it into a format which can betransferred through the network of the ICS 1000. The access controlapparatus 1010-2 forms an ICS network frame having a network controlfield wherein the receiving ICS network address is set to “7722” and thetransmitting ICS network address is set to “5522”, and a network datafield described information to notify that there is a reply of the ISDN,and sends it into a network of the ICS 1000.

The ICS network frame sent from the access control apparatus 1010-2 istransferred through the network of the ICS 1000, and reaches the accesscontrol apparatus 1010-1. The access control apparatus 1010-2 receivedthe ICS network frame having a network data field described informationto notify that there is a response, outputs a signal from the ISDN lineconverting unit 1029-1 having the ICS network address “7722” to the user1061-1, notifying the response. Thus, the user 1061-1 and the user1061-2 begin full-duplex communication by digital signals (voice, etc.)and the user 1061-1 sends the digital signals. The ISDN line convertingunit 1029-1 received the analog signal converts into a digitalinformation format which can be transferred through the ICS 1000.

The access control apparatus 1010-1 forms an ICS network frame having anetwork control field wherein the receiving ICS network address is setto “5522” and the transmitting ICS network address is set to “7722”, anda network data field described digital information, and sends it into anetwork of the ICS 1000. The ICS network frame sent from the accesscontrol apparatus 1010-1 is transferred through the network of the ICS1000, and reaches the access control apparatus 1010-2. The accesscontrol apparatus 1010-2 received the ICS network frame having a networkdata field described the digital information, outputs the digitalinformation as digital signals converted into a ISDN line interface fromthe ISDN line converting unit 1029-2 having the ICS network address“5522” to the user 1061-2. The digital signals sent from the user 1061-2are transferred to the user 1061-1 by means of the same procedure.

(7) Description will be made regarding a case wherein a communication isperformed with an interface of a CATV line between a CATV broadcastingstation 1062-1 connected to a CATV line converting unit 1028-1 of anaccess control apparatus 1010-1, and a user 1062-2 connected to a CATVline converting unit 1028-2 of an access control apparatus 1010-2.

The CATV broadcasting station 1062-1 applies a CATV line connection withthe user 1062-2 to the VAN operator. The VAN operator specifies theaccess control apparatus 1010-2 connecting the user 1062-2, and decideson an ICS network address “5523” for the ICS logic terminal. Next, theVAN operator sets informations to a portion of the conversion table1013-1 of the access control apparatus 1010-1 corresponding to thetransmitting ICS network address “7723”, such as the receiving ICSnetwork address “5523”, request identification and so forth. In thepresent embodiment, the request identification “7” indicates a CATV lineconnection. In the same way, the VAN operator sets informations in theconversion table 1013-2 of the access control apparatus 1010-2, such asthe transmitting ICS network address “5523”, the receiving ICS networkaddress “7723”, request identification and so forth.

The CATV broadcasting station 1062-1 sends CATV analog signals. The CATVline converting unit 1028-1 converts the received CATV analog signalsinto a format which can be transferred through the ICS 1000. The accesscontrol apparatus 1010-1 forms an ICS network frame having a networkcontrol field wherein the receiving ICS network address is set to “5523”and the transmitting ICS network address is set to “7723”, and a networkdata field described the CATV information, and sends it into a networkof the ICS 1000. The ICS network frame sent from the access controlapparatus 1010-1 is transferred through the ICS 1000, and reaches theaccess control apparatus 1010-2. The access control apparatus 1010-2received the ICS network frame having network data field described theCATV information, outputs the CATV information from the CATV lineconverting unit 1028-2 with an ICS network address “5523” to the user1062-2 as CATV analog signals converted to a CATV line interface. TheCATV analog signals outputted from the user 1062-2 are transferred tothe CATV broadcasting station 1062-1 with the same procedures.

(8) Description will be made regarding a case wherein a communication isperformed with an interface of a satellite line between a user 1063-1connected to a satellite line converting unit 1027-1 of an accesscontrol apparatus 1010-1, and a user 1063-2 connected to a satelliteline converting unit 1027-2 of an access control apparatus 1010-2.

The user 1063-1 and the user 1063-2 applies a satellite line connectionbetween the user 1063-1 and the user 1063-2 to the VAN operator. The VANoperator specifies the access control apparatus 1010-1 connecting theuser 1063-1, and decides on an ICS network address “7724” for the ICSlogic terminal. In the same way, the VAN operator specifies the accesscontrol apparatus 1010-2 connecting the user 1063-2, and decides on anICS network address “5524” for the ICS logic terminal. Next, the VANoperator sets informations to a portion of the conversion table 1013-1of the access control apparatus 1010-1 corresponding to the transmittingICS network address “7724”, such as the receiving ICS network address“5524”, request identification and so forth. In the present embodiment,the request identification “8” indicates the satellite line connection.In the same way, the VAN operator sets informations in the conversiontable 1013-2 of the access control apparatus 1010-2, such as thetransmitting ICS network address “5524”, the receiving ICS networkaddress “7724”, request identification and so forth.

The user 1063-1 sends satellite signals. The satellite line convertingunit 1027-1 received interface satellite signals of the satellite lineconverts the satellite signals into an information format which can betransferred through the ICS 1000. The access control apparatus 1010-1forms an ICS network frame having a network control field wherein thereceiving ICS network address is set to “5524” and the originating ICSnetwork address is set to “7724”, and a network data field describingsatellite signal information, and sends this into the ICS 1000 network.The ICS network frame sent from the access control apparatus 1010-1 istransferred through the ICS network 1000, and reaches the access controlapparatus 1010-2. The access control apparatus 1010-2 received the ICSnetwork frame having a network data field described the satelliteinformation, outputs satellite signal information from the satelliteline converting unit 1027-2 with an ICS network address “5524” to theuser 1063-2 as satellite signals converted to a satellite lineinterface. The satellite line interface satellite signals outputted fromthe user 1063-2 are also transferred to the user 1063-1 with the sameprocedures.

(9) Description will be made regarding a case wherein a communication isperformed with an IPX interface between a terminal having an IPX address“9901” of a user 1064-1 and a terminal having an IPX address “8801” of auser 1064-2.

The users 1064-1 and 1064-2 apply an IPX connection between a terminalhaving an IPX address “9901” of the user 1064-1 and a terminal having anIPX address “8801” of the user 1064-2 to the VAN operator. The VANoperator specifies the access control apparatus 1010-1 connecting theuser 1064-1 and the IPX converting unit 1026-1 with an ICS networkaddress “7725”. In the same say, the VAN operator specifies the accesscontrol apparatus 1010-2 connecting the user 1064-2 and the IPXconverting unit 1026-2 with an ICS network address “5525”. Next, the VANoperator sets informations to a portion of the conversion table 1013-1of the access control apparatus 1010-1 corresponding to the transmittingICS network address “7725”, such as the sender IPX address “9901”, thereceiver IPX address “8801”, the receiving ICS network address “5525”,request identification and so forth. In the present embodiment, therequest identification “9” indicates an IPX connection. In the same way,the VAN operator sets informations to a portion of the conversion table1013-2 of the access control apparatus 1010-2 corresponding to thetransmitting ICS network address “5525”, such as the sender IPX address“8801”, the receiver IPX address “9901”, the receiving ICS networkaddress “7725”, request identification and so forth.

The terminal having an IPX address “9901” of the user 1064-1 sends anIPX frame with the sender IPX address set to “9901” and the receiver IPXaddress set to “8801”. The IPX converting unit 1026-1 of the accesscontrol device receives the IPX frame, and reads the sender IPX address“9901” and the receiver IPX address “8801”, and then reads the receivingnetwork address “5525” of the receiver IPX address “8801” of the senderIPX address “9901” of the transmitting ICS network address “7725”, fromthe conversion table 1013-1. The access control apparatus 1010-1 formsan ICS network frame having a network control field wherein thetransmitting ICS network address is set to “5525” and the receiving ICSnetwork address is set to “7725”, and a network data field described IPXframe information, and sends it into a network of the ICS 1000.

The ICS network frame sent from the access control apparatus 1010-1 istransferred through the network of the ICS 1000, and reaches the accesscontrol apparatus 1010-2. The access control apparatus 1010-2 receivedthe ICS network frame having a network data field described the ICSnetwork frame information, outputs IPX frame information from the IPXconverting unit 1026-2 with an ICS network address “5525” to the user1064-2, in the form of IPX frame converted into IPX interface. Theterminal having the IPX address “8801” of the user 1064-2 receives theIPX frame. On the other hand, the IPX frame set in the sender IPXaddress “8801” and the receiver IPX address “9901” sent from theterminal having the IPX address “8801” of the user 1064-2 is alsotransferred to the user 1064-1 with the same procedures.

Embodiment-11 Transfer by X.25, FR, ATM, Satellite Communication, andContainment of Telephone Line, ISDN Line, CATV Line, Satellite Line

In the above Embodiment-10, the X.25/ICS network frame converting units1031-1 and 1031-2, FR/ICS network frame converting units 1032-1 and1032-2, ATM/ICS network frame converting units 1033-1 and 1033-2,satellite/ICS network frame converting units 1034-1 and 1034-2 are eachlocated within relay networks, i.e., within the X.25 network 1040, FRnetwork 1041, ATM network 1042 and satellite communication network 1043.Conversely, as shown in FIGS. 56 and 57, with the Embodiment-11, theX.25/ICS network frame converting units 1131-1 and 1131-2, FR/ICSnetwork frame converting units 1132-1 and 1132-2, ATM/ICS network frameconverting units 1133-1 and 1133-2, satellite/ICS network frameconverting units 1134-1 and 1134-2 are each located within the accesscontrol apparatuses 1110-1 and 1110-2. That is, while withEmbodiment-10, the received ICS network frames are converted andreverse-converted into formats which can be transferred on the side ofeach of the relay networks (X.25 network 1040, FR network 1041, ATMnetwork 1042, satellite communication network 1043), the conversionbeing performed by the relay networks, with the Embodiment-11,conversion and reverse conversion into formats which can be transferredin each of the relay networks is performed on the side of the accesscontrol apparatuses.

Embodiment-12 Containment of Access Control Apparatuses within RelayNetworks

In the above Embodiment-10, the X.25/ICS network converting units 1031-1and 1031-2, FR/ICS network converting units 1032-1 and 1032-2, ATM/ICSnetwork converting units 1033-1 and 1033-2, satellite communicationnetwork/ICS network converting units 1034-1 and 1034-2 are each locatedwithin relay networks, i.e., within the X.25 network 1040, FR network1041, ATM network 1042 and satellite communication network 1043, withthe access control apparatuses 1010-1 and 1010-2 not being providedwithin the X.25 network, FR network, ATM network and satellitecommunication network. Conversely, as shown in FIGS. 58 and 59, with theEmbodiment-12, the access control apparatuses 1120-1, 1120-2, 1121-1,1121-2, 1122-1, 1122-2, 1123-1 and 1123-2 are each located within therelay networks, i.e., within the X.25 network 1240-1, FR network 1241-1,ATM network 1242-1 and satellite communication network 1243-1. That is,while with the Embodiment-10, a conversion from the ICS user frames tothe ICS network frames and a reverse conversion thereof based on theadministration by the conversion table was performed within the accesscontrol apparatuses set outside of each relay network, in the presentexample, a conversion from the ICS user frames to the ICS network frames(ICS encapsulation) and a reverse conversion thereof (ICS reverseencapsulation) based on the administration by the conversion table isperformed within each of the aforementioned networks, i.e., within theX.25 network 1040, within the FR network 1041, within the ATM network1042 and within the satellite communication network 1043.

Embodiment-13 Connection of Relay Network to Relay Apparatus

In the above Embodiment-10, the X.25 network 1040, FR network 1041, ATMnetwork 1042 and satellite communication network 1043 are each connectedto the access control apparatuses 1010-1 and 1010-2, but are notconnected to relay apparatuses. Conversely, as shown in FIG. 60, withthe Embodiment-13, the X.25 network 2020-1 is connected to the accesscontrol apparatus 2010 and the relay apparatus 2030, the FR network2021-1 is connected to the access control apparatus 2011 and the relayapparatus 2031, the ATM network 2022-2 is connected to the accesscontrol apparatus 2012 and the relay apparatus 2032, and the satellitecommunications network 2023-1 is connected to the access controlapparatus 2013 and the relay apparatus 2033, and further, the X.25network 2020-1 is connected to the relay apparatuses 2030, 2034 and2035, the FR network 2021-2 is connected to the relay apparatuses 2031and 2035, the ATM network 2022-2 is connected to the relay apparatuses2031, 2032 and 2036, and the satellite communications network 2023-2 isconnected to the relay apparatus 2033, 2036 and 2037. That is, in thepresent embodiment, the access control apparatuses are arranged suchthat the X.25 network 2020-1 and 2020-2, the FR network 2021-1 and2021-2, the ATM network 2022-1 and 2022-2, and the satellitecommunication network 2023-1 and 2023-2 are each connected to relayapparatuses.

Embodiment-14 Case where the Access Control Apparatus is ProvidedOutside of the ICS

FIG. 61 shows a 14th embodiment according to the present invention, withthe access control apparatus 1210-1 being provided outside of the ICS1200, i.e., within the LAN-1200 of the corporation X. Accordingly, theICS address administration server 1250-1 and the ICS network server1260-1 are also located outside of the ICS 1200, i.e., within the LAN1200-1. The access control apparatus integrating administration server1240 is located inside of the ICS 1200, The access control apparatusintegrating administration server 1240 has functions of communicatingand exchanging information with the access control apparatus 1210-1, theICS network administration server 1250-1 and the ICS network server1260-1, using the ICS network communication function. At a time that theVAN operator enters into contract with the corporation X, and connectsthe user communication line to the ICS 1200, the functions of the accesscontrol apparatus integrating administration server 1240 are used towrite data in the conversion table within the access control apparatus1210-1. Also, the ICS address administration server 1250-1 and the ICSnetwork server 1260-1 can each use respective ICS network servercommunication function to communicates with the ICS addressadministration server 1250-2 and the ICS network server 1260-2 withinthe ICS 1200. Since the present invention is configured thus, a userterminal within the LAN 1200 can perform the intra-corporationcommunication and the inter-corporation communication, as described withthe above Embodiment-1. Also, it is clearly understood that theintra-corporation communication and the inter-corporation communicationcan be conducted with the user terminal as described above, even in theevent that the ICS address administration server 1250-1 and the ICSnetwork server 1260-1 are located within the ICS 1200.

Embodiment-15 Speed Class and Degree of Priority

<<Configuration>>

As shown in FIG. 62 through FIG. 64, the ICS 8000-1 includes accesscontrol apparatuses 8010-1, 8010-2, 8010-3 and 8010-4, relay apparatus8020-1, ICS address administration server 8025-1 and ICS network server8027-1, these apparatuses being connected by ICS network communicationlines 8030-1, 8030-2, 8030-3, 8030-4, 8030-5 and 8030-6 which transferICS network frame. The line unit 8011-1, processing device 8012-1 andconversion table 8013-1 are all provided within the access controlapparatus 8010-1. Connected to the plurality of ICS logic terminals inthe line unit 8011-1 are ICS logic communication lines 8051-1, 8051-2,8051-3 and 8051-4, these each being provided with ICS network addresses“7721”, “7723”, “7724” and “7725”. Speed classes are given to the ICScommunication lines within the ICS 8000-1, indicating the speed oftransferring the ICS network frames. For example, the speed class of theICS communication lines 8030-1, 8030-2 and 8030-6 are all “4”, the speedclass of the ICS communication lines 8030-3 and 8030-5 are each “3”, andthe speed class of the ICS communication line 8030-4 is “2”. An exampleof the conversion table 893-1 is shown in FIG. 65. The speed class isdetermined by a standard with in the same as the speed class registeredwithin the conversion table 8013-1. An ICS network address “7811” isprovided to the ICS address administration server 8025-1, and an ICSnetwork address “7821” is provided to the ICS address administrationserver 8027-1, these being connected to the access control apparatus8010-1 by the ICS network communication lines 8054-1 and 8054-2.

The user 8400-1 which is an ICS communication terminal has an ICS useraddress “2500”, is connected to the line unit 8011-1 via the ICS logiccommunication line 8051-1; the user 8400-2 which is an ICS communicationterminal has an ICS user address “2510”, is connected to the line unit8010-2 via the ICS logic communication line 8052-1; the user 8400-3which is an ICS communication terminal has an ICS user address “3600”,and the user 8400-4 which is an ICS communication terminal has an ICSuser address “3610”, these being connected to the line unit 8010-3 viathe gateway 8041-1 and the ICS logic communication line 8053-1,respectively.

The method for registering the ICS network address and the ICS useraddress with the conversion table 8013-1 is the same as with theaforementioned Embodiments-1 and -2, with the points differing therewithbeing as follows: the speed registered in the conversion table 113-1 inthe Embodiment-1 is deleted, and instead, a speed class and degree ofpriority are registered; and the speed class and degree of priority arestored in the address administrating server 8025-1 along with thecorresponding the ICS user address, as part of the address-relatedinformation.

The speed class is a system where the communication speed is representedwith numeric values or the like, instead of with units of speed. Forexample, the communication speed of 64 Kbps is Class 1, thecommunication speed of 128 Kbps is Class 2, and so forth, with thecommunication speed of 500 Mbps being Class 7. The greater the numberfor the communication class is, the greater the speed. FIG. 66 shows anexample of correlation between the communication speed and the speedclass, but there is no need to make the speed class system a 7-classsystem from “1” to “7”. This may be, for example, finely divided into a20-class system, in accordance with progress in technology. Also, thereis not need for the communication speed to accurately match the physicalcommunication speed of the ICS network lines within the ICS 8000-1,rather, the system may be made to correspond with 25% of the physicalcommunication speed, giving some leeway with the communication speed.The degree of priority is represented in numeric values, on an 8-tieredsystem, for example, representing the order of priority compared withina single speed class for when sending the ICS network frames from theaccess control apparatus or the relay apparatus to the ICS networkcommunication line. The greater numeric value representing the degree ofpriority, the higher the priority. For example, in the event that therelay apparatus receives two ICS network frames F510 and F511 at almostthe same time, and the speed class of the two frames is the same value“3”, the degree of priority of the ICS network frame F510 is “3”, andthe degree of priority of the ICS network frame F511 is “5”, the systemsends the ICS network frame F511 with higher priority first.

In the present Embodiment-15, e.g., the ICS network communication lines8030-3 and 8030-4 are “in the same communication channel” from the relayapparatus 8020-1 toward the access control apparatus 8010-3, and the ICSnetwork communication lines 8030-5 and 8030-6 are “in the samecommunication channel” from the relay apparatus 8020-1 toward the accesscontrol apparatus 8010-4. The communication line may be headed towardthe relay apparatus from the access control apparatus, or may be headedfrom one relay apparatus toward another relay apparatus connected withthe ICS network communication line. A plurality of ICS networkcommunication lines of the same speed class may be set within the samechannel, and in this case, the same speed class may be in the same ICSnetwork communication line.

<<Operation>>

This operation will now be described with reference to the flowcharts inFIGS. 67 and 68.

The user 8400-1 sends the ICS user frame F500 with the sender ICS useraddress “2500” and the receiver ICS user address “3600” to the ICS logiccommunication line 8051-1. The processing device 8012-1 of the accesscontrol apparatus 8010-1 receives the ICS user frame F500 from the ICSlogic terminal with the ICS network address “7721” of the line unit8011-1, and at the same time, obtains the ICS network address “7721”(Step S2001), and checks whether the ICS network address “7721” has therequest identification thereof registered in the conversion table 8013-1as “3” (virtual dedicated line connection) or not (Step S2002). In thiscase, the registration has not been made as such, so next, the receiverICS network address “3600” written in the ICS user frame F500 isobtained in accordance with the ICS network address “7721” (Step S2004),and checks whether the ICS network address “3600” has the requestidentification thereof registered in the conversion table as “2”(inter-corporation communication) or not (Step S2005). In this case, theregistration has been made, so next, the receiving ICS network address“5522” is obtained from the conversion table 8013-1 as preparation toperform the ICS encapsulation, and accounting-related information,namely “speed class “3” and “degree of priority “3”, is obtained fromthe conversion table 8013-1 (Step S2006). Next, the ICS encapsulation isperformed by generating an ICS network frame F510 written therein with“speed class “3” and degree of priority “3” (Step S2020), which is sentto the ICS network communication line 8030-1 (Step S2021).

Although the above explanation has been made with regard to theinter-corporation communication wherein the request identification ofthe ICS network frame is set at “2” (inter-corporation communication),in the event that the request identification thereof is “3” (virtualdedicated line connection), the receiving ICS network address, speedclass, degree of priority and the like are obtained from the conversiontable 8013-1, and further, information relating to account is obtained(Step S2003). In the event that the request identification thereof is“1” (intra-corporation communication), the receiving ICS networkaddress, speed class, degree of priority and the like are obtained fromthe conversion table 8013-1, and further, information relating toaccount is obtained (Step S2011). In the event that the requestidentification thereof is “4” (communication to an ICS network server),the receiving ICS network address and the like are obtained from theconversion table 8013-1, and further, information relating to account isobtained (Step S2013), following which this is sent to the ICS networkserver 8027-1 after encapsulation.

The ICS network frame F510 formed thus reaches the relay apparatus8020-1 via the ICS network communication line 8030-1. Let us say thatnow, another ICS network frame F511 reaches the relay apparatus 8020-1via the ICS network communication line 8030-2, at almost the same time.This ICS network frame F511 has been sent from the user 8400-2 as an ICSuser frame F501, has arrived at the access control apparatus 8010-2 viathe ICS logic communications line 8052-1, been ICS encapsulated at thatpoint to become the ICS network frame F511 there, and reached the relayapparatus 8020-1 by being sent via the ICS network communication line8030-2. Upon receiving the ICS network frame F510 and the ICS networkframe F511 (Step S2030), the relay apparatus 8020-1, under theadministration of the processing device 8021-1, first checks the relaytable 8022-1 to decide which network communication line to use for theICS network frames F510 and F511, i.e., finds communication channels(Step S2031), and separates these by channel (Step S2032). With thepresent Embodiment-15, both of the two ICS network frames F510 and F511have a transmission destination of the communication channel from therelay apparatus 8020-1 to the control apparatus 8010-3, and two ICSnetwork communication lines exist, namely, the ICS network communicationline 8030-3 and 8030-4. Next, the relay apparatus 8020-1 reads the speedclass described in the control field of the two ICS network frames F510and F511, and separates the ICS network frames by speed class (StepS2041). Hereafter, the procedures are performed separately for eachseparated speed class.

In the case of the present Embodiment-15, the speed class of the two ICSnetwork frames F510 and F511 are both “3”. Next, with the ICS frames ofthe same speed class, the degree of priority described in the controlportion of the two ICS network frames is read for each, and the ICSframe with the higher priority is sent first (Step S2042). If the degreeof priority is the same, either may be sent first. As a result of theabove process, the relay apparatus 8020-1 sends the ICS network frameF511 first over the ICS network communication line 8030-3, andsubsequently sends the ICS network frame F510 over the ICS networkcommunication line 8030-3.

Incidentally, in the above procedures, in the event that the only ICSnetwork communication lines available are of a communication speedslower than the speed class described in the control field of the ICSnetwork frame F510, information regarding slower service due to slowerspeeds, i.e., the sender ICS user address and the receiver ICS useraddress to be described in the relevant ICS network frame, the time tocommunications service (year, month, day, hour, minute, second), etc.,are described in the relay operating file 8023-1. The recorded contentsof the relay operating file 8023-1 are notified to the user according torequests of the ICS 8000-1.

According to the above procedures, of the two ICS network frames F511and F510, the ICS network frame F511 with the higher priority leadstime-wise, and reaches the access control apparatus 8010-3, having beentransferred through the ICS network communication line 8030-3. The ICSnetwork frame F511 is subjected to the ICS reverse-encapsulation,becomes the ICS network frame F501, and reaches the user 8400-4 with theICS user address “3610” via the ICS logic communication path 8053-1. TheICS network frame F510 is subjected to the ICS reverse-encapsulation,becomes the ICS network frame F500, and reaches the user 8400-3 with theICS user address “3600” via the ICS logic communication path 8053-1.

Next, options will be described regarding how to user the degree ofpriority. In the event that the speed class and the degree of priorityrecorded in the conversion table 8013-1 are to be copied to the ICSnetwork frame at the point of the ICS encapsulation, the processingdevice 8012-1 checks the length written in the ICS user frame controlfield which is to be processed, and only in the event that the ICS userframe is equal to or shorter than the predetermined value (e.g., 256bytes) for example, a value with value representing the degree ofpriority incremented by “1” is copied to the ICS network frame. Thus, inthe limited case of short ICS user frames, the ICS user frames can betransferred within the ICS 8000-1 with priority. This, the ICS 8000-1operator is able to easily realizes service wherein the priority ofshort ICS user frames is raised, i.e., the communication service withraised communication charges. As for the users, the short ICS userframes increases the surety of throughput. Whether or not the option isused is determined separately for each access control apparatus, forexample.

A method may be employed wherein only the speed class is implemented,and the above method is executed without the degree of priority, i.e.,with all ICS user frames at the same degree of priority. With otherembodiments, the conversion table 8013-1 does not include the sender ICSuser address (intra-corporation and inter-corporation). In these casesas well, there is no change, since the flowchart shown in FIG. 67 doesnot refer to the sender ICS user address, anyway.

Embodiment-16 Assignment of Electronic Signature to ICS User Frame

An embodiment will now be described wherein ICS user frames areelectronically signed, and wherein there is proof that an ICS user framehas passed through an access control apparatus. Also, the embodimentwill now be described wherein the ICS user frames are encrypted uponrequest. First, description will be made regarding the electronicsignature technology used in the present embodiment. In order for anelectronic signature to be used, there is a signer to form theelectronic signature and a verifier to verify the electronic signature.The signer simultaneously forms a pair of keys, signature key KSa andverification key KPa. The signer keeps the signature key KSaundisclosed, and discloses the verification key KPa one way or another.The signer “a” uses the secret signature key KSa held by the signer “a”lone to form an electronic signature σ which dependent on data m and thesignature key KSa. This is shown in the following expression (1)σ=SIGN(KSa,h(m))  (1)Now, “SIGN” is a signature function representing the function of thesignature, with the function y=h (m) being a hash function forelectronic signing having a function for compressing the data m intoshort data. The verifier “b” uses the disclosed verification key KPa andverifies the authenticity of the electronic signature σ, according tothe following:ν=TEST(σ,KPa,h(m))  (2)Then in the event that ν=1, this indicates that the electronic signatureσ and the data m are both correct, that the electronic signature σ andthe data m have not been re-written following generation of theelectronic signature σ, and that there are been no unauthorizedtampering. In the event that ν=0, this indicates that the either one orboth of the electronic signature σ and the data m are not correct. Theverification key KPa is widely disclosed by a public key informationservice forms which performs services such as operational reports andinformation of public keys, or by general advertisements. The art forforms the signature function SIGN which makes calculation of thesignature key KSa practically impossible even with disclosure of theverification key KPa, is of public knowledge.

Next, the procedure for assigning an electronic signature to the ICSuser frame will be described. The objects of the electronic signatureare the following: a “time/location parameter P1” representingconditions relating to the time or place of providing the electronicsignature, i.e., the year/month/day/hour/minute/second of electronicsigning, the operator of the access control apparatus, or theidentification code of the access control apparatus, and the “signaturefunction parameter P2” representing the signature function SIGN, thetype of the hash function h (m), or the length of the signature key. Ina numerical expression, this is expressed in the following expression(2):σ=SIGN(KSa,h(m))  (3)

wherein m=UF∥P1∥P2.

Now, UF represents the ICS user frame before the ICS encapsulation, orthe ICS user frame restored to the original form after the ICSreverse-encapsulation. The user on the receiving side receives the ICSuser frame UF, the time/location parameter P1, the signature functionparameter P2, and electronic signature σ to the ICS user frame on thereceiving side as UF∥P1∥P2∥σ. This is illustrated in FIG. 69. Further,there is a method wherein the area for writing the parameters P1 and P2,and the electronic signature σ within the ICS user frame UF is leftblank, as shown in FIG. 70. In this case, the electronic signature σ isgenerated such as can be represented as follows, with the open area inthe ICS user frame UF represented by “Data”:σ=SIGN(KSa,h(m))  (4)

wherein m=Data∥P1∥P2.

Verification of the signature is performed as follows:ν=TEST(σ,KPa,h(m))  (5)

wherein m=Data∥P1∥P2.

Further, in the event of the ICS user frame UF is 2048 bytes in length,for example, and the length of UF∥P1∥P2∥σ is 2448 bytes (2048 bytes+400bytes), there arises the necessity to re-write the field representingthe frame length within the control field of the ICS user frame UF(e.g., the total-length field shown in FIG. 3) from 2048 bytes to 2448bytes. Thus, the re-written ICS user frame is represented as UF′. In theevent that such an embodiment is employed, the electronic signature σ isrepresented as follows:σ=SIGN(KSa,h(m))  (6)

wherein m=UF′∥P1∥P2.

Verification of the signature is performed as follows:ν=TEST(σ,KPa,h(m))  (7)

wherein m=UF′∥P1∥P2.

In the present Embodiment-16, UF, P1 and P2 may be re-organizedregarding the order thereof, so as to calculate, e.g., the electronicsignature σ=SIGN (KSa, h (m)) as m=P1∥P2∥UF, and set P1∥P2∥UF∥σ withinthe ICS user frame of the receiving side. In the present embodiment, theencrypting function is represented as y=ENC (K1, x), and the decryptingfunction is represented as x=DEC (K2, y). Here, “x” represents plaintextdata, “y” represents ciphertext data, ENC represents an encryptionfunction, DEC represents a decryption function, K1 represents anencryption key, and K2 represents a decryption key. The art ofelectronic signature is also called digital signature, and is describedin, e.g., “New Direction in Cryptography” (paper by W. Diffie and M. E.Hellman, IEEE IT. Vol. IT-22 No. 6, pp. 644–654, 1976), and “Encryptionand Information Security” (Shigeo Tsujii, 1990, Shokodo, pp. 127–138).

<<Configuration>>

As shown in FIG. 71, the ICS 9000-1 includes access control apparatuses9010-1, 9010-2 and 9010-3, and relay apparatus 9120-1, these apparatusesbeing connected by ICS network communication lines 9030-1, 9030-2 and9030-3 which transfer ICS network frames. The line unit 9011-1, theprocessing device 9012-1, the conversion table 9013-1 and the electronicsignature unit 9017-1 are all provided within the access controlapparatus 9010-1. Provided within the electronic signature unit 9017-1are the following: program modules for realizing the signature key KSa,the verification key KPa, the electronic signature function SIGN and thehash function h (m), the time/location parameter P1, and the signaturefunction parameter P2. Now, the signature key KSa is a secret value heldby the access control apparatus 9010-1, and the electronic signatureunit has the secret signature key therewithin, so there is the necessityto prevent the secret signature key from leaking out. For example, theelectronic key unit may be stored inside a physically strong box,structured such that the signature key cannot be read from the outside.The plurality of ICS logic terminals of the line unit 9011-1 areprovided with the ICS network addresses “7721”, “7722”, “7725”, “7726”,“7727” and “7728”. An example of the conversion table 9013-1 is shown inFIG. 72.

The encryption/decryption means 9018-1 includes encryption functions,and holds the encryption key K1 and the decryption key K2. When an ICSuser frame UF1 is inputted, the ciphertext UF2 is generated as UF2=ENC(K1, UF1), and when the ciphertext UF2 is inputted, the plaintextthereof is obtained as UF1=DEC (K2, UF2).

<<Operation>>

This operation is described with reference to the flowchart shown inFIG. 73. The user 9400-1 sends the ICS user frame F900 with the receiverICS user address “3600” to the ICS logic communication line 9051-1. Theprocessing device 9012-1 of the access control apparatus 9010-1 receivesthe ICS user frame F900 from the ICS logic terminal with the ICS networkaddress “7721” of the line unit 9011-1, and at the same time, obtainsthe ICS network address “7721” (Step S2001) and checks whether the ICSnetwork address “7721” has the request identification thereof registeredin the conversion table 9013-1 as “3” (virtual dedicated lineconnection) or not (Step S2002). In this case, the registration has notbeen made as such, so next, the receiver ICS network address “3600”written in the ICS user frame F900 is obtained in accordance with theICS network address “7721” (Step S2004), and checks whether the ICSnetwork address “3600” has the request identification thereof registeredin the conversion table as “2” (inter-corporation communication) or not(Step S2005). In this case, the registration has been made, so next, thereceiving ICS network address “5522” is obtained from the conversiontable 9013-1 as preparation to perform the ICS encapsulation.

Next, information related to accounting for the speed class and thedegree of priority is obtained from the conversion table 9013-1 (StepS2006). The value “1” is specified in the signature space in theconversion table 9013-1, and also “YES” is recorded in the space forelectronic signature transmission, so the processing device 9012-1 usesthe program modules for realizing the electronic signature function SIGNand the hash function h (m), the time/location parameter P1, and thesignature function parameter P2 stored in the electronic signature unit9017-1, and using the electronic signature method described above,generates an electronic signature for the ICS user frame F900, and formsa new ICS user frame (represented by UF2) (Step S2019). This isrepresented in an expression (8) as follows:UF2=m∥σ  (8)

wherein m F900∥P1∥P2,

-   -   σ=SIGN (KSa, h (m)).        In the above procedures, even if “1” is specified in the        signature space in the conversion table 9013-1, if “NO” is        recorded in the space for electronic signature transmission, the        electronic signature unit 9017-1 does not operate and an        electronic signature is not provided.

Next, since the encryption class is specified as “1”, the ICS user frameUF2 is encrypted by the encryption/decryption means 9018-1 to form a newuser frame UF3 (=ENC (K1, UF2)). In the event that the encryption classis “0”, encryption is not performed.

Next, the ICS encapsulation is performed by generating an ICS networkframe F901 written therein with the speed class, the degree of priorityand the encryption class (Step S2020), which is sent to the ICS networkcommunication line 9030-1 within the ICS 9000-1 (Step S2021). Althoughthe above explanation has been made with regard to the inter-corporationcommunication wherein the request identification of the ICS networkframe is set at “2” (inter-corporation communication), in the event thatthe request identification is “3” (virtual dedicated line connection),the receiving ICS network address, information relating to account andthe like are obtained from the conversion table 9013-1 (Step S2003). Inthe event that the request identification is “1” (intra-corporationcommunication), the receiving ICS network address, information relatingto account and the like are obtained from the conversion table 9013-1(Step S2011), and, in the event that the request identification is “4”(communication to an ICS network server), the receiving ICS networkaddress, information relating to account and the like are obtained fromthe conversion table 9013-1 (Step S2013).

The ICS network frame F901 thus generated by the above proceduresreaches the access control apparatus 9010-2 through the ICS networkcommunication line 9030-1 and the relay apparatus 9120-1, is subjectedto the ICS reverse-encapsulation, becomes the ICS network frame F902,and reaches the user 9400-4 with the ICS user address “3600” via the ICSlogic communication path 9051-3. Here, F902=m∥σ, m=UF1∥P1∥P1∥P2, UF1represents the ICS user frame F900 before sending, P1 is thetime/location parameter, P2 is the electronic signature parameter, σrepresents the electronic signature, with σ=SIGN (KSa, h (m)) holding.

<<Electronic Signature and a Decryption in ICS Reverse-Encapsulation>>

The user 9400-3 sends an ICS user frame F930 with a sender ICS useraddress “3610” and a receiver ICS user address “2510” to the ICS logiccommunication line 9051-4. The access control apparatus 9010-3 receivesthe ICS user frame F930, performs the ICS encapsulation using theinternal conversion table, generates an ICS network frame F931 and sendsit to the ICS network communication line 9030-3. The ICS network frameF931 reaches the access control apparatus 9010-1 through the ICS networkcommunication line 9030-1 and the access control apparatus 9020-1, issubjected to the ICS reverse-encapsulation under administration of theconversion table 9013-1, and becomes the ICS user frame UF1. Since thevalue “1” is specified in the signature space in the conversion table9013-1, the ICS user frame (UF1) obtained by the ICS reverseencapsulation is deciphered using the encryption/decryption means9018-1, thus obtaining an ICS user frame UF1′. Here, UF1′=DEC (K2, UF1)holds, and in the event that the encryption class is “0”, encryption isnot performed.

Next, since the value “1” is specified in the signature space in theconversion table 9013-1, and also “YES” is recorded in the space for theelectronic signature transmission, so the electronic signature unit9017-1 operates, and provides the ICS user frame with the parameters P1and P2 and the electronic signature σ, thus forming a new ICS user frameF932. This is represented as follows:F932=m∥σ,m=UF1∥P1∥P2electronic signatureσ=SIGN(KSa,h(m))  (9)and in the event that the aforementioned encryption has been performed,UF1′ is used instead of UF1. In the above procedures, even if the value“1” is specified in the signature space in the conversion table 9013-1,if “NO” is recorded in the space for electronic signature transmission,an electronic signature is not provided. The ICS user frame F932 reachesthe user 9400-4 with the ICS user address “2510” via the line unit9011-1 and the ICS logic communication path 9051-4.<<In the Case of Signature Request>>

In the event that an ICS user frame F940 with a sender ICS user address“2800” and a receiver ICS user address “3700” is inputted from the lineunit 9011-1, the request identification corresponding to the ICS networkaddress “7728” is “2”, the value “0” is specified in the signature spacein the conversion table 9013-1 corresponding to the receiver ICS useraddress “3700”, and at the same time “YES” is recorded in the space forthe electronic signature transmission. Then, since the value “1” isspecified in the signature request space in the ICS user frame F940, theelectronic signature unit 9017-1 operates, and forms a new ICS userframe provided with the parameters P1 and P2 and the electronicsignature σ.

In a case that the signature space in the conversion table 9013-1 iseither “0” or “1” and “NO” is recorded in the space for the electronicsignature transmission, an electronic signature is not provided beforethe ICS encapsulation, even if the value “1” is specified in thesignature request space in the ICS user frame F940. In the same way, ina case that the signature request space in the conversion table 9013-1is either “0” or “1” and “NO” is recorded in the space for theelectronic signature reception of the ICS user frame, an electronicsignature is not provided after the ICS reverse encapsulation, even ifthe value “1” is specified in the signature space in the conversiontable 9013-1.

On the other hand, in the event that the ICS user frame is to receivethe electronic signature at the time of sending by the transmitting sideaccess control apparatus, and further is to receive the electronicsignature by the receiving side access control apparatus, antransmitting electronic signature and a receiving electronic signatureare assigned, as shown in FIG. 74. Also, there are other exampleswherein the value of the verification key KPa is included in thesignature function parameter P2. Thus, the trouble of the ICS user framereceiver obtaining the verification key KPa from the public keyinformation center or the like can be omitted. Further, in the eventthat the contents of the ICS user frame is an electronic bill (orderslip, receipt, etc.), an electronic signature is attached to theelectronic bill, along with the identification code of the accesscontrol apparatus through which the electronic bill has passed. In theevent that either the sender (former) of the electronic bill, of thereceiver (recipient) tampers with the electronic bill, the tampering canbe discovered by means of the electronic signature principle.Accordingly, as long as the electronic signature key is a secret value,i.e., as long as the operator of the access control apparatus whichholds the signature key therein ensures that the signature key is asecret value, the electronic signature can be used as a tamper-proofpublic system.

Embodiment-17 Electronic Signature Server and Encryption Server

As shown in FIG. 71 of Embodiment-16, the electronic signature unit9017-1 and the encryption/decryption means 9018-1 are situated withinthe access control apparatus 9010-1. Conversely, with the presentembodiment, as shown in FIG. 75, the access control apparatuses 9310-1,9310-2, 9310-3 and 9310-4 do not include an electronic signature unittherewithin. Instead, electronic signature servers 9340-1, 9340-2,9340-3 and 9340-4 and ICS network communication lines 9341-1, 9341-2,9341-3 and 9341-4 are connected, respectively. Each electronic signatureserver includes the functions of the electronic signature unit describedin the Embodiment-16, and the manner of operation wherein electronicsignatures are provided before the ICS encapsulation or providingelectronic signature after the ICS reverse encapsulation in cooperationwith the access control apparatus is the same as the function of theelectronic signature unit 9017-1 described in the Embodiment-16, withsignature key, verification key, electronic signature function, programmodule for realizing the hash function, time/location parameter andsignature function parameter. The electronic signature servers 9342-1and 9342-2 are connected to the relay apparatuses 9320-1 and 9320-2 viathe ICS network communication lines 9344-1 and 9344-2, respectively. Theelectronic signature server has an ICS network addresses unique in theentire ICS network, and has the function of communication with otherelectronic signature servers or access control apparatuses using the ICSnetwork server communication function, thereby mutually exchanging theinformation that each has. The electronic signature server 9342-1 is anelectronic signature server representing the VAN 9301-1, whichcommunicates with the electronic signature servers 9340-1 and 9340-2within the VAN 9301-1 using the ICS network server communicationfunction, and is capable of obtaining information held by the electronicsignature servers. Also, the electronic signature server 9340-1 iscapable of obtaining information relating to electronic signature heldby the electronic signature server 9340-2 (such as a verification key),via the electronic signature server 9342-1. The electronic signatureserver 9342-1 is capable of communicating with the electronic signatureserver 9342-2 which represents another VAN 9301-2 using the ICS networkserver communication function, thereby mutually exchanging theinformation relating to electronic signature that each has. Theelectronic signature servers do not exchange information regarding thesecret signature keys held therewithin, and tightly guard the secrecy ofthe signature keys.

Further, with the present embodiment, as shown in FIG. 75, the accesscontrol apparatuses 9310-1, 9310-2, 9310-3 and 9310-4 do not includeencryption/decryption means therein. Instead, a connection is made withthe encryption servers 9343-1, 9343-2, 9343-3 and 9343-4, via respectiveICS network communication lines. Each encryption server has thefunctions of the aforementioned encryption/decryption means 9018-1, andthe manner of operation wherein the encryption of the ICS use frames isprovided before the ICS encapsulation or the decryption of the encryptedICS user frames after the ICS reverse encapsulation in cooperation withthe access control apparatus is the same as the function of theencryption/decryption means 9018-1, with program module for realizingthe encryption function and the decryption function, the encryption keyand the decryption key. The encryption servers 9343-5 and 9343-6 areconnected to the relay apparatuses 9320-1 and 9320-2 via the ICS networkcommunication lines. Each encryption server has an ICS network addressesunique in the entire ICS network, and has the function of communicationwith other encryption servers or the access control apparatuses usingthe ICS network server communication function, thereby mutuallyexchanging the information that each has. The encryption server 9343-5is an encryption server representing the VAN 9301-1, which communicateswith the encryption servers 9343-1 and 9343-2 within the VAN 9301-1using the ICS network server communication function, and is capable ofobtaining the information held by the encryption servers. Also, theencryption server 9343-1 is capable of obtaining the informationrelating to the encryption held by the encryption server 9343-2 (such asan encryption key), via the encryption server 9342-5. The encryptionserver 9343-5 is capable of communicating with the encryption server9343-6 which represents another VAN 9301-2 using the ICS network servercommunication function, thereby mutually exchanging the information thateach has.

Embodiment-18 Open Connection

Description will now be made regarding the ICS open connection, i.e.,preparatory procedures performed by the user and the VAN operatoroperated in order to change the other party and conduct theinter-corporation communication.

<<User Application>>

The user applies to the VAN operator for an ICS name and an ICS useraddress, and at the same time, shows ICS connection conditions, a useridentification and a payment method (address, corporation name, payingbank account, etc.). If there is the ICS user address forintra-corporation communications that the user has decided, this is alsoshown, but not if there is none. The VAN operator follows common rulesdecided upon beforehand with other VAN operators, and decides upon theICS name and the ICS user address and informs the user thereof. Theitems for the ICS connection conditions include ICS name conditions,communication band conditions, accounting conditions, electronicsignature conditions, encryption conditions, open-zone conditions anddynamic conditions, with the contents of these conditions being asdescribe below.

the ICS name conditions specify only the left portion of the ICS name.For example, in the event that the ICS name is“USR#1.ACS#1.DIS#1.VAN#1.JP.AS”, the user specifies only the leftmost“USR#1” (the VAN operator decides upon the remaining right portion). Thecommunication band conditions are speed class and degree of priority.The accounting conditions are determined regarding charges for a fixedamount for a certain time span, charges for network usage (networkaccounting), or charges for the contents of information sent andreceived via electronic communication (information account), in relationto communication band conditions, signature conditions, encryptionconditions, etc. The electronic signature conditions specify whether ornot to provide an electronic signature which can prove with the date andtime the face that the ICS user frame has passed through the accesscontrol apparatus. The encryption conditions specify whether or not theencryption is performed when the ICS user frame is transferred. Theopen-zone conditions specify whether or not to reject at the accesscontrol apparatus, an ICS frame received from an unknown sender notregistered in the conversion table, or whether to form a temporaryconversion table and receive, etc. The dynamic alteration conditionsspecify the functions which can be changed upon request by the user viaICS frames, regarding the above-described conditions. The dynamicalteration conditions are set so that the signature conditions or theencryption conditions can be changed, but items important for VANoperation cannot, such as ICS addresses or accounting.

<<ICS Address Administration Server and ICS Name Server>>

Describing with reference to FIG. 76 and FIG. 77 to show the conversiontable 11113-1, FIG. 78 to show the conversion table template, FIG. 79 toshow the correlation table and FIG. 80 to show the ICS name server,according to the present embodiment, inside the ICS 11000-1 are providedthe following: access control apparatuses 11110-1, 11110-2 and 11110-3,relay apparatus 11116-1, ICS address administration servers 11150-1 and11150-2, ICS name servers 11160-1 and 11160-2, ICS conversion tableservers 11170-1 and 11170-2, and users 11132-1 and 11132-2. The ICSaddress administration server 11150-2 has in the correlation tablecontained therein the ICS network address “8210”, ICS user address“4200”, and user address related information, of the user 11132-2. TheICS name server 11160-2 has in the ICS name conversion table containedtherein the ICS name “USR#3.ACS#3.DIS#3.VAN#3.JP.AS” and the ICS useraddress “4200”, of the user 11132-2. The VAN operator decides upon anICS network address (“7777”) to use in accordance with the ICS useraddress “3333” of the user 11132-1, provides it to the ICS logicterminal 11111-2 of the access control apparatus 11110-1, and connectsthe ICS logic communication path 11133-1 which connects the user 11132-1via the gateway 11000-2. The ICS network address “7777” is anon-disclosed value, so the user is not notified of it.

Next, the VAN operator directly writes the following items in thecorrelation table 11152-1 within the ICS address administration server11150-1, and in the conversion table 11152-1 via the data path 11153-1and the processing device 11151-1: the ICS network address “7777”determined by the method described above, the ICS user address(inter-corporation) “3333”, the ICS user address indicated by the user(intra-corporation) “1111”, and user address related information, i.e.,communication band conditions, account conditions, electronic signatureconditions, encryption conditions, open-zone conditions, dynamicalteration conditions, user identification, payment method, etc. The VANoperator further directly writes the following in the ICS nameconversion table 11162-1 in the ICS name server 11160-1, via the datapath 11163-1 and processing device 11161-1: the ICS name“USR#1.ACS#1.DIS#1.VAN#1.JP.AS” decided as described above, the ICS useraddress “3333”, and type “1” (indicating that the ICS user address“3333” is registered in the ICS name conversion table 11162-1). Theabove results expressed are as shown by the correlation table 11152-1and the ICS name conversion table 11162-1

At the point that the above-described writing of the various types ofinformation to the new user is completed, the ICS address administrationserver 11150-1 and the ICS name server 11160-1 use the ICS network ICScommunication functions to communicate with the respective networkaddresses “8910” and “8920” to notify the ICS conversion table server11170-1 that information has been obtained regarding the ICS address andthe ICS connection conditions of a new user. Now, the ICS conversiontable server 11170-1 is a type of the ICS network server, and in thepresent embodiment has an ICS network address “8100” and an ICS useraddress “2100”.

<<ICS Conversion Table Server>>

The ICS conversion table server 11170-1 reads the information describedin the correlation table 11152-1 of the ICS address administrationserver 11150-1 using the ICS network communication functions, and writesit in the conversion table template 11172-1. That is, “7777” is writtento the space for the transmitting ICS network address(intra-corporation), “1111” is written to the space for the sender ICSuser address (inter-corporation), and “3333” is written to the space forthe sender ICS user address (inter-corporation). In the event that thereis no ICS user address for the intra-corporation communication, thespace for the sender ICS network address (intra-corporation) is leftblank. The request identification number is set at “2” which indicatesinter-corporation communication. The other settings for the presentembodiment are as follows: the communication band conditions are set tothe speed class of “3” and the degree of priority “3”, the electronicsignature conditions are set to “1”, the transmitting signaturespecification is “YES”, the receiving signature specification is “NO”,and the account conditions are accounting class “4”, the presentembodiment using an example of fixed charging system. The encryptionconditions are the encryption class “1”, with the present embodimentbeing arranged so as to specify the encryption of the ICS network frameswithin the ICS. The open-zone class of the present embodiment is “0”.The dynamic alteration class “6” in the present embodiment allows forthe transmitting signature item to be changed upon request by the user.

<<Usage of the ICS Conversion Table Server (User)>>

The user 11132-1 writes “3333” as the sender ICS user address and theICS user address “2100” of the ICS conversion table server 11170-1 asthe receiver ICS user address, and sends the ICS user frame F1200written with the receiver information (receiver ICS user address orreceiver ICS name) written to a user data portion of the ICS user frame.The ICS conversion table server 11170-1 receives the ICS user frameF1200 via the access control apparatus 11110-1, and obtains thereceiving ICS network address for the inter-corporation communicationaccording to whether the receiver information in the user data portionis a receiver ICS user address of a receiver ICS name, using the methoddescribed below. Further, in the event that the receiver ICS name hasbeen specified, the receiver ICS user address is also obtained.

(In the Event there is Specification of Receiver ICS User Address):

In the event that the aforementioned receiver information is thereceiver ICS user address “3800”, the ICS conversion table sever 11170-1by using the ICS network communication function inquires the ICS addressadministration server 11150-1 connected to the access control apparatus11110-1, and obtains the ICS network address “7600” (receiving ICSnetwork address) corresponding to the ICS user address “3800”. Also, inthe event that the receiver ICS user address is not found in thecorrelation table 11152-1 (failure to find the ICS network address), theICS conversion table server 11170-1 receives a “notification of failureto find the ICS network address” from the ICS address administrationserver 11150-1.

(In the Event that the Receiver ICS Name is Specified):

In the event that the above receiver information is the receiver ICSname “USR#3.ACS#3.DIS#3.VAN#3.JP.AS”, the ICS conversion table server11170-1 by using the ICS network communication function sends the ICSname “USR#3.ACS#3.DIS#3.VAN#3.JP.AS” to the ICS name server 11160-1connected to the same access control apparatus 11110-1. The ICS nameserver 11160-1 holds the ICS network addresses of other ICS name serversin a form corresponding to the ICS name (the portion of the ICS nameafter removing the leftmost portion “USR#n”), and in the presentembodiment, the ICS name server 11160-1 searches the ICS name conversiontable 11162-1, finds the ICS network address “8930” of the ICS nameserver 11160-2 administrating “ACS#3.DIS#3.VAN#3.JP.AS” and inquiresregarding the address “8930”, using the ICS network communicationfunctions, and obtains the ICS user address “4200” (receiver ICS useraddress) and the ICS network address “8210” (receiving ICS networkaddress) corresponding to the aforementioned ICS name“USR#3.ACS#3.DIS#3.VAN#3.JP.AS”. In the above procedures, the ICS nameserver 11160-2 has contacted the ICS address administration server11150-2 regarding the ICS network address of the user 11132-2, andobtained the address “8210”.

(Completion of the Conversion Table 11113-1):

In the event that the receiver ICS user address is specified, the ICSconversion table server 11170-1 adds the receiver ICS user address“3800” and the receiving ICS network address “7600” to the conversiontable 11113-1, thus completing the portion of the conversion table11113-1 corresponding to the receiving user. In the event that thereceiver ICS name is specified, the ICS conversion table server 11170-1adds the receiver ICS user address “4200” and the receiving ICS networkaddress “8210” to the conversion table 11113-1, thus completing theportion of the conversion table 11113-1 corresponding to the receivinguser. Also, in the event that a “notification of failure to find the ICSnetwork address” is received from the ICS address administration server11150-1 or the ICS name server 11160-1, the ICS conversion table server11170-1 sends an ICS frame indicating failure to add to the conversiontable, to the requesting user 11132-1.

<<Other Usage of the ICS Conversion Table Server (User)>>

The user 11132-1 requests a notification of the user-specificinformation to the user, by means of sending an ICS user frame writtenwith a request for the notification of the contents of user-specificinformation in the conversion table 11113-1 to the ICS conversion tableserver 11170-1. Further, the user can use a dynamic alteration classwhich has been agreed on beforehand with the VAN operator to re-write apart of the conversion table 11113-1. The dynamic alteration class isdecided upon as 1, 2, . . . , and the contents thereof being as follows:the dynamic alteration class 1 is a specification for increasing theuser-specific degree of priority by “1”, the dynamic alteration class 2is a specification for decreasing the user-specific degree of priorityby “1”, and the dynamic alteration class 3 sets the transmittingsignature to “YES”, and at the same time, specifies changing theencryption class to “2”.

<<Usage of the Conversion Table>>

The method of using the conversion table formed according to the aboveprocedures has been described in the Embodiment-1 and so forth. Althoughin the Embodiment-1, description was made regarding the method offorming a temporary conversion table if there is no conversion table atthe time that the access control apparatus receives the ICS networkframe and is to perform the ICS reverse encapsulation thereof, but withthe present embodiment, the open-zone class of the conversion table willbe used. That is, at the time that the access control apparatus receivesthe ICS network frame and is to perform the ICS reverse encapsulationthereof, in the event that the received “pair of receiving ICS networkaddress and tansmitting ICS network address contained in the networkcontrol field of the ICS network frame” has not been registered in theconversion table as a “pair of transmitting ICS network address andreceiving ICS network address”, a temporary conversion table is set inthe same manner as with the aforementioned embodiment in the event thatthe open-zone class is set to “2”, but in the event that the open-zoneclass is set to “1”, a temporary conversion table is not set. Further,in the event that the open-zone class is set to “0”, not only is atemporary conversion table not set, but the received ICS network frameis discarded. In this case, the ICS user frame is not delivered to theuser. That is, in the event that the open-zone class is set to “0”,reception of an unknown sender not registered in the conversion table isrejected, thus realizing what is called a “closed connection”.Incidentally, in the above, in the event that the request identificationis “4”, the open-zone class is always handled as being set to “1”, i.e.,a temporary conversion table is not set.

<<Variations of the Embodiment>>

The method for the VAN operator to use the data path 11153-1 and thedata path 11163-1 to input the ICS addresses, the ICS connectionconditions and the like to the ICS address administration server 11150-1and the ICS name server 11160-1 has been described with regard to theabove embodiment. Instead, the arrangement may be such that the VANoperator does not use these data paths, but rather forms a special ICSnetwork server within the ICS 11000-1, so as to directly input the ICSaddresses, the ICS connection conditions and the like to the ICS addressadministration server 11150-1 and the ICS name server 11160-1, using theICS network communication function, thus re-writing the contents of theconversion table 11152-1 and the ICS name conversion table.

Embodiment-19 Separation of Functions of the Access Control Apparatus

As shown in FIG. 76 of the Embodiment-18, the ICS address administrationserver 11150-1, the ICS name server 11160-1, and the ICS conversiontable server 11170-1 are each connected to the access control apparatus11110-1, with the ICS encapsulation and the ICS reverse encapsulationbeing performed within the access control apparatus 11110-1 using theconversion table 11113-1. Conversely, with the present embodiment, thefunctions of the access control apparatus 11110-1 are separated into anaggregation access control apparatus 14110-1 and a plurality ofsimplified access control apparatuses 14210-1, 14210-2 and 14210-3. Thatis, as shown in FIG. 81, the access control apparatus 11110-1 isconnected to the simplified access control apparatuses 14210-1, 14210-2and 14210-3, via respective ICS network communication lines 14190-1,14190-2 and 14190-3. The ICS address administration server 14150-1, theICS name server 14160-1, the ICS conversion table server 14170-1, theICS accounting server 14180-1, the electronic signature server 14181-1,the encryption server 14182-1, the operation administration server14183-1 and the ICS network server 14184-1 are connected with theaggregation access control apparatus 14110-1 via the respective ICSnetwork communication lines 14191-1, 14191-2, 14191-3, 14191-4, 14191-5,14191-6, 14191-7 and 14191-8. Further, the conversion table 11113-1within the access control apparatus 11110-1 is separated into anaggregation conversion table 14113-1 and a plurality of simplifiedconversion tables 14213-1, 14213-2 and 14213-3. An example of theaggregation conversion table 14113-1 is shown in FIG. 82 and an exampleof the simplified conversion table 14213-1 is shown in FIG. 83.

However, part of the aggregation conversion table and simplifiedconversion tables overlap. That is, the following four items arecontained in both conversion tables: transmitting ICS network address,request identification, speed class and degree of priority. There is nofundamental difference between the temporary partial conversion table14214-1 with the temporary conversion table described with theEmbodiment-1 and otherwise, with the items contained in the temporarypartial conversion table 14214-1 being the same as the items containedin the simplified conversion table 14213-1. The line unit 14211-1 withinthe simplified access control apparatus 14210-1 has the same functionsas the line unit 11111-1 within the access control apparatuses 11110-1.

The simplified access control apparatus 14210-1 uses the simplifiedconversion table 14213-1 to perform the ICS encapsulation at a time ofsending and the ICS reverse encapsulation at a time of receiving, andthe aggregation access control apparatus 14110-1 uses the aggregationconversion table 14113-1 to perform processing relating to theelectronic signature and the account, as described above. Also, by meansof the plurality of simplified access control apparatuses 14210-1,14210-2 and 14210-3 functioning together with the aggregation accesscontrol apparatus 14110-1, the combined functions are the same as thoseof the access control apparatus 11110-1. The user 14132-1 sends an ICSuser frame F1300 with a sender ICS user address “3333” and a receiverICS user address “4200” to the ICS logic communication line 14133-1. Asshown in the flowchart in FIG. 84, the processing device 14212-1 of thesimplified access control apparatuses 14210-1 receives the ICS userframe F1300 from the ICS logic terminal within ICS network address“7777” of the line unit 14211-1, and at the same time obtains the ICSnetwork address “7777” (Step S2501), and checks whether or not theaddress “7777” is registered in the simplified conversion table 14213-1with the request identification thereof being “3”, indicating a virtualdedicated line connection (Step S2502). In this case, the registrationhas not been made, so the receiver ICS user address “4200” written onthe ICS user frame F1300 is obtained corresponding to the ICS networkaddress “7777” (Step S2504), and it is further checked whether theaddress “4200” is registered in the simplified conversion table 14213-1with the request identification thereof being “2”, indicatinginter-corporation communication (Step S2505). In this case, theregistration has been made, so in preparation for the ICS encapsulation,the receiving ICS network address “8210” is obtained from the simplifiedconversion table 14213-1 (Step S2506).

The simplified access control apparatus 14210-1 next performs the ICSencapsulation by means of generating in the ICS network frame an ICSnetwork frame F1301 inscribed with the speed class and the degree ofpriority obtained from the simplified conversion table 14213-1 (StepS2520), and sending it to the aggregation access control apparatus (StepS2521). Now, as described above, the speed class “3”, the degree ofpriority “3” and the encryption class “0” which are items of thesimplified conversion table 14213-1 are written to the expansion portionof the ICS network-controlling unit.

The aggregation access control apparatus 14110-1 receives the ICSnetwork frame F1301 from the simplified access control apparatus14210-1, and based on the face that the ICS network frame F1301 passesthrough the aggregation access control apparatus 14110-1, forms anaccount information frame FK01 and sends it to the accounting server14180-1. The information such as the request identification, the speedclass, the degree of priority, the account class and the encryptionclass which are registered in the aggregation conversion table 14113-1are referred to in order to form the account information frame FK01. Thesignature, transmitting signature and receiving signature of theaggregation conversion table 14113-1 items are used for providing theelectronic signature, and as described in other embodiments, theelectronic signing is performed by applying for the electronic signatureto the electronic signature server 14181-1. In the same way, in theevent that the encryption class specification is “1” which indicates theencryption, the encryption is performed by applying the encryption tothe encryption server 14182-1. Once the above processing has beencompleted, the aggregation access control apparatus 14110-1 sends theICS network frame F1302 to another access control apparatus 14110-2 andother aggregation access control apparatuses, via the ICS networkcommunication line 14190-4. Incidentally, the format of the ICS 1network frame F1302 changes in content in the event that the electronicsignature server or the encryption server operate, due to an addition ofthe electronic signatures or a conversion to the ciphertext as describedabove, but if neither the electronic signature server nor the encryptionserver have operated, the ICS network frame F1302 is the same as the ICSnetwork frame F1301. Not only can the simplified access controlapparatus 14210-1 be realized with practically no changes to theexisting router, but there are other economic advantages such as thenumber of users contained in the simplified access control apparatus14210-1 not being great, and in the event that the users are scatteredover a wide geographic area, the total number of each of ICS addressadministration servers, ICS name servers, ICS conversion table servers,account severs, electronic signature severs and encryption servers canbe reduced.

The operating administration server 14183-1 is provided with an ICSnetwork address, is connected to the aggregation access controlapparatus 14110-1 and the relay apparatuses, and performs exchange withother operation administration servers, access control apparatuses, ICSaddress administration servers, etc. regarding information regardingcommunication conditions within the ICS (communication traffic, etc.) ortrouble, using the ICS network communication functions.

Now, the item open-zone class included in the simplified conversiontable 14213-1 of the simplified access control apparatus 14210-1 is usedfor the same processing as the processing of the open-zone classregistered in the conversion table of the access control apparatus, asdescribed above. That is, at the time that the simplified access controlapparatus 14210-1 receives the ICS network frame and is to perform theICS reverse encapsulation thereof, in the event that the received “pairof receiving ICS network address and transmitting ICS network addresscontained in the network control field of the ICS network frame” has notbeen registered in the simplified conversion table 14213-1 as a “pair oftransmitting ICS network address and the receiving ICS network address”,a temporary partial conversion table 14214-1 is set in theaforementioned manner in the event that the open-zone class is set to“2”, but in the event that the open-zone class is set to “1”, atemporary partial conversion table is not set. Further, in the eventthat the open-zone class is set to “0”, not only is a temporary partialconversion table not set, but the received ICS network frame isdiscarded. In this case, the ICS user frame is not delivered to theuser. In this arrangement, “0” indicates that reception of an unknownsender not registered in the conversion table is to be rejected, thusrealizing what is called a “closed connection”.

As described in the above embodiment, the ICS address administrationserver and ICS name server may be integrated into a single ICS addressname administration server, with the aggregation access controlapparatus being used being connected to the ICS address nameadministration server and ICS network communication line. Also, anarrangement may be employed in the above embodiment wherein items of thespeed class and the degree of priority are not provided in thesimplified conversion table 14213-1, with a “0” being written at thepoint of the ICS encapsulation to the expansion portion of the ICSnetwork controlling unit for the speed class and the degree of priority,indicating that there is no specification. In the same way, anarrangement may be employed wherein specification of the open-zone classis not provided in the simplified conversion table 14213-1, with a “0”being written to the expansion portion of the ICS network controllingunit for the speed class and the degree of priority, indicating thatthere is no specification.

Thus, according to the present invention, administration of informationcommunication is performed with a unified address system, and variousservices can be provided, without using dedicated lines or the Internet,thus enabling structuring a large-scale communication system with highsecurity and with relatively low costs. Also, inter-corporationcommunication can be performed between individual corporations(including government organizations, universities, and so forth) whichhad conventionally been services separately with practically no changeto the address system for computer communications. Further, since thenetwork administrator holds the network control authority, the overalladministration of the network becomes clear, increasing ease of securingreliability and also markedly improving security.

1. An integrated information communication system (ICS), wherein: an ICSnetwork address for discriminating an ICS logic terminal is assigned toan ICS logic terminal of a terminal in a user communication line; when aset of ICS logic terminal discrimination information and a receiver ICSuser address is decided, an ICS network communication line to transferan ICS network frame between an access control apparatus at a sendingside and an access control apparatus at a receiving side is uniquelydecided; an ICS network address to decide a destination of the ICSnetwork frame to specify the ICS network communication line is definedby said access control apparatus at the sending side, an external ICSuser frame having a unique ICS user address system ADX is inputted tosaid access control apparatus at the sending side from the usercommunication line via the ICS logic terminal; when ICS logic terminaldiscrimination information is inputted by the ICS user frame, the senderICS user address and the receiver ICS user address in the ICS user frameare found to be registered in a conversion table in said access controlapparatus at the sending side; the ICS user frame is converted to aninternal ICS network frame having an ICS network address system ADS; theICS network frame includes a network control field which is operable tostore at least the ICS network address to specify the ICS networkcommunication line; a destination of the ICS network frame is judged,under a rule of the ICS network address system ADS, by said accesscontrol apparatus of the sending side, and the ICS network frame is thentransferred in the ICS network communication line; and when the ICSnetwork frame is reached at said access control apparatus at thereceiving side, the ICS user frame is restored from the ICS networkframe, is transferred in another user communication line via an ICSlogic terminal of said access control apparatus at the receiving side,and is reached at an external information communication equipment.
 2. Anintegrated information communication system according to claim 1,wherein the conversion table includes a priority degree, the ICS networkframe includes a priority degree obtained from the conversion table, andthe ICS network frame is sent under the priority degree of the ICSnetwork frame.
 3. An integrated information communication systemaccording to claim 1, wherein the conversion table includes two or morerecords, a set of the ICS network address for specifying the receiverICS user address and the ICS network communication line are respectivelydifferent for each record to a same set of the ICS logic terminaldiscrimination information and sender ICS user address, and adestination of the ICS user frame is changeable by changing the receiverICS user address.
 4. An integrated information communication systemaccording to claim 1, wherein an intra-corporation communication and aninter-corporation communication are enabled in correspondence that thesender ICS user address and receiver ICS user address registered in theconversion table are an intra-corporation communication address or aninter-corporation communication address.
 5. An integrated informationcommunication system (ICS) comprising at least one access controlapparatus each including a conversion table, wherein: said accesscontrol apparatus is operable to convert an external ICS user framehaving a unique ICS user address system ADX into an inner ICS networkframe having an ICS network address system ADS based on anadministration of the conversion table in said access control apparatusthe ICS network frame comprises a network control field and a networkdata field; the network control field is operable to store addressesaccording to the ICS network address system ADS, and the network datafield includes the ICS user frame; said access control apparatus isoperable to send the ICS network frame inside said integratedinformation communication system according to a rule of the ICS networkaddress system ADS; said access control apparatus is operable to restorethe ICS user frame from the ICS network frame transfer the restored ICSuser frame to another external information communication equipment; aninternal address system is defined regardless of an external addresssystem; the ICS network address is assigned to an ICS logic terminal; areceiving ICS network address is registered as a record in theconversion table so as to settle automatically when a group of ICS logicterminal discriminating information, a sender ICS user address and areceiver ICS user address is determined; and said access controlapparatus is operable to convert the ICS user frame into the ICS networkframe upon determining that all of the ICS logic terminals inputted fromthe ICS user frame, the sender ICS user address in the ICS user frameand the receiver ICS user address are registered in the conversiontable.
 6. An integrated information communication system according toclaim 5, wherein the ICS user frame is operable to store a digitalizedtelephone voice.
 7. An integrated information communication systemaccording to claim 5, wherein an IP telephone is connected with saidintegrated information communication system, and a digitalized telephonevoice is transferred therein.
 8. An integrated information communicationsystem comprising an access control apparatus and a receiver, wherein:said access control apparatus is operable to receive a transmission ICSuser frame from an ICS logical terminal of said access control apparatusat a termination of a user communication line, and determine an ICSnetwork address of an internal ICS network frame based on an ICS useraddress given to an ICS logical terminal at a transmitting side and anexternal transmission ICS user frame, and determine an ICS logicalterminal at a receiving side to which a transmission ICS network frameis to be transmitted based on the determined ICS network address; andsaid receiver of said integrated information communication system isoperable to embed, in a roaming terminal, an ICS domain name and an ICSuser address of a roaming terminal user, a special roaming specialservice number for the roaming terminal, an ICS user address of aconnection server, and a code function and code related data, and whenthe roaming terminal is connected to another access control apparatusand starts inter-company communication, the ICS domain name, the coderoaming special service number, the ICS user address of the connectionserver, the code function, and the code related data are used.
 9. Anintegrated information communication system comprising an access controldevice at a transmitting side, an access control device at a receivingside, and a receiver, wherein: said access control device at thetransmitting side is operable to receive a transmission ICS user frameinputted from an ICS logical terminal at a termination of a usercommunication line, determine a set of ICS logical terminalidentification information of a transmitting side and a receiver ICSuser address in a transmission ICS user frame is determined, anddetermine an ICS network communication line in which an ICS networkframe is transferred between said access control apparatus at thetransmitting side and said access control apparatus at the receivingside; and said receiver of said integrated information communicationsystem is operable to embed, in a roaming terminal, an ICS domain nameand an ICS user address of a roaming terminal user, a special roamingspecial service number for the roaming terminal, an ICS user address ofa connection server, and a code function and code related data, and whenthe roaming terminal is connected to another access control apparatusand starts an inter-company communication, the ICS domain name, the coderoaming special service number, the ICS user address of the connectionserver, the code function, and the code related data are used.