Safety method for accessing and protecting network device
A technology of network equipment and equipment, which is applied in the direction of network connection, data exchange network, public key for secure communication, etc., and can solve problems such as theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015] Embodiments of the present invention will be specifically described below. It should be understood that although the following description of the present invention is made in conjunction with examples, the present invention is not limited to these examples. On the contrary, the invention covers all alternatives, modifications and equivalents which may fall within the scope of the invention as defined by the appended claims.
[0016] In addition, many details are given below to illustrate the embodiments of the present invention in detail, and those skilled in the art should understand that the present invention can also be implemented without using these details. In some other examples, well-known methods, procedures, components and circuits are not described in detail to highlight the gist of the present invention.
[0017] FIG. 1 shows a network device 110 for protecting data from being accessed according to the present invention. For example, the network device 110...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com