Network system, attack message interception method, device and equipment
A technology for attacking messages and network systems, applied to transmission systems, electrical components, etc., can solve problems such as time-consuming, affecting the normal operation of network servers, and information leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0136] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0137] figure 1 It is a schematic structural diagram of a network system provided by an embodiment of the present invention. see figure 1 , the network system includes:
[0138] A source device 101, a gateway device 102, a control device 103, a security control entity 104, a network server 105, and an information database 106. The information database 106 at least includes device information and corresponding control device identifiers and gatew...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


