Network security defense system and network security defense method based on dynamic transformation
A dynamic transformation, network security technology, applied in the field of network security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0071] The difference between the network security defense system based on dynamic transformation described in the second preferred embodiment of the present invention and the above-mentioned first preferred embodiment is only that, as Figure 7 As shown, the user can set the static feature of wIP in the terminal information table stored in the terminal information storage unit 14 through the management unit 11, that is, the wIP of a specific network terminal accessing the network in the intranet can be set to a static wIP, preferably A flag bit can be set in the terminal information table of the specific network terminal, and a corresponding flag value can be set in the flag bit to distinguish whether the wIP of the specific network terminal is a static wIP. In this way, two network terminals connected to the network in the intranet can communicate not only through the vIP, but also through the statically configured wIP. The reason for such modification is that in the existin...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com