1.method u0441u043eu0437u0434u0430u043du0438u00a0 secure virtual networks, including the coding of the original ip packet secure virtual network u0441u043eu0441u0442u043eu00a0u0449u0435u0439 of separately u0441u0442u043eu00a0u0449u0438u0445 computers a local area network or part of a computer or computers several local networks with network screens and / or protected u043cu0430u0440u0448u0440u0443u0442u0438u0437u0430u0442u043eu0440u0430u043cu0438, using available of computer software modules and hardware u0448u0438u0444u0440u0430u0442u043eu0440u043eu0432,an exit package incorporating a coded package (u0438u043du043au0430u043fu0441u0443u043bu00a0u0446u0438u044e) in accordance with the protocols IpSec, skip or protocol own development with vc u043bu044eu0447u0435u043du0438u0435u043c identifiers of the source and u043fu043eu043bu0443u0447u0430u0442u0435u043bu00a0 communications u043eu0442u043bu0438u0447u0430u044eu0449u0438u0439u0441u00a0, u0434u043bu00a0 each secure virtual network by computer, which can u0438u0441u043fu043eu043bu044cu0437u043eu0432u0430u0442u044cu0441u00a0 simultaneously in several protected virtual u0441u0435u0442u00a0u0445,u0432u044bu0434u0435u043bu00a0u0435u0442u0441u00a0 separate block long-term u043fu0430u043cu00a0u0442u0438, in which u0437u0430u043fu0438u0441u044bu0432u0430u0435u0442u0441u00a0 u043eu0442u0434u0435u043bu044cu043du0430u00a0 u043eu043fu0435u0440u0430u0446u0438u043eu043du043du0430u00a0 system, with access to the block of long-term u043fu0430u043cu00a0u0442u0438 and loading the operating system of each secure virtual network u0432u044bu043fu043eu043bu043du00a0u0435u0442u0441u00a0 after u043fu0440u0435u0434u044au00a0u0432u043bu0435u043du0438u00a0 user credentials, i.e., identifying key u0438u043du0444u043eu0440u043cu0430u0446 ai and u0432u044bu043fu043eu043bu043du0435u043du0438u00a0 authenticationwith access to the clusters u043fu0430u043cu00a0u0442u0438 each secure virtual network from other virtual networks u0431u043bu043eu043au0438u0440u0443u0435u0442u0441u00a0.;2. method for u043eu0442u043bu0438u0447u0430u044eu0449u0438u0439u0441u00a0 1, so that access to the clusters of long-term u043fu0430u043cu00a0u0442u0438 each secure virtual network from other virtual networks u0431u043bu043eu043au0438u0440u0443u0435u0442u0441u00a0 cpn u0430u043du0438u0435u043c separate key u0448u0438u0444u0440u043eu0432u0430u043du0438u00a0 u0434u043bu00a0 each block so that the recording information in the block, she u0437u0430u0448u0438u0444u0440u043eu0432u044bu0432u0430u0435u0442u0441u00a0 and reading - u0440u0430u0441u0448u0438u0444u0440u043eu0432u044bu0432u0430u0435u0442u0441u00a0.
展开▼