摘要 |
<p><P>PROBLEM TO BE SOLVED: To construct a system for achieving both end-to-end security and traffic visibility. <P>SOLUTION: Both end-to-end security and traffic visibility can be achieved by a system using a controller that derives a cryptographic key that is different for each client based on a derivation key and a client identifier that is conveyed in each data packet. The controller distributes derivation key to information technology monitoring devices and a server to provide traffic visibility. Furthermore, a client key and a client identifier can also be used so that end-to-end security can be achieved. <P>COPYRIGHT: (C)2010,JPO&INPIT</p> |