Proxy access method, control network equipment and proxy access system
A technology for controlling network and intermediate network equipment, applied in the field of proxy access method and proxy access system, which can solve the problems of strong networking limitations and failure to realize normal communication, so as to improve security and reduce the risk of being stolen chance, effect of removing barriers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] This embodiment is aimed at a proxy access system in which a management device actively initiates an access type. Fig. 3 shows a schematic structural diagram of the proxy access system in this embodiment. Referring to Fig. 3, the system includes: a management device, a control network device, an intermediate network device and a terminal device. The management device and the control network device have fixed IP addresses; the management device indicates the identity of the terminal device to be accessed when initiating access, and the control network device converts the information of the management device to the intermediate network device before forwarding the information to The format of the network protocol that the intermediate network device and the terminal device can recognize, and modify the source IP address to its own IP address. In this way, in this embodiment, in addition to ensuring the normal communication between the management device, the intermediate ...
Embodiment 2
[0114] This embodiment is aimed at a proxy access system in which a terminal device actively initiates an access type. This embodiment can still adopt the structure of the proxy access system shown in FIG. 3 . Referring to Fig. 3, the system includes: a management device, a control network device, an intermediate network device and a terminal device. The management device and the control network device have fixed IP addresses; the terminal device first initiates access through the intermediate network device, and the control network device converts the information into a network protocol that the management device can recognize before forwarding the information from the intermediate network device Change the source IP address to its own IP address. In this way, this embodiment can not only ensure the normal communication of each device, but also improve the security of the access process.
[0115] Correspondingly, when performing access in this embodiment, after the control ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com