Unlock instant, AI-driven research and patent intelligence for your innovation.

An information processing method and network security device

An information processing method and network security technology, which are applied in the field of information processing methods and network security equipment, can solve problems such as system forwarding performance discounts and system forwarding performance waste, and achieve the effects of improving user experience, efficiency, and network applicability

Active Publication Date: 2022-07-12
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, due to the abundance of applications and the popularity of the Internet, people have higher and higher requirements for the performance of network security equipment and network stability. In order to meet the current needs of people, existing network security products have also developed related functions. , such as the common high-availability cluster (High Available, referred to as: HA), however, although the high-availability cluster can greatly reduce the risk of network interruption caused by network equipment and network security equipment when the corresponding software fails, it still has The device does not perform forwarding, resulting in a situation where the forwarding performance of the system is greatly reduced. At the same time, when there is no network failure, most of the forwarding performance of the system will be greatly wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method and network security device
  • An information processing method and network security device
  • An information processing method and network security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make those skilled in the art better understand the technical solutions of the present application, the present application will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0044] Various aspects and features of the present application are described herein with reference to the accompanying drawings.

[0045] These and other features of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the accompanying drawings.

[0046] It is also to be understood that although the application has been described with reference to some specific examples, those skilled in the art will be able to implement many other equivalents of the application with certainty, which have the features as claimed in the claims and are therefore located in the places hereby recited. within the limited scope of protection.

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide an information processing method and a network security device. The method is applied to a network security device, and includes: acquiring a receiving instruction; receiving first communication information, wherein the first communication information is sent by a first electronic sent by the device; based on the first communication information, obtain the first outbound interface information of the first communication information; based on the first outbound interface information, forward the first communication information to the second electronic device; wherein, the The network security device is communicatively connected to another network security device, and the other network security device is used for receiving and forwarding second communication information, wherein the second communication information is the second electronic device based on the first The communication information is fed back to the information of the first electronic device. The network security device and the other network security device that are connected in communication are both in a state of being able to receive and forward communication information, thereby improving use efficiency and network applicability.

Description

technical field [0001] The present application relates to the field of network communication security, in particular to an information processing method and a network security device. Background technique [0002] At present, due to the richness of applications and the popularization of the network, people have higher and higher requirements for the performance of network security equipment and network stability. In order to meet the current needs of people, the existing network security products have also developed related functions. , such as the common high availability cluster (High Available, referred to as: HA). However, although the high availability cluster can greatly reduce the risk of network interruption caused by the failure of network equipment and network security equipment when the corresponding software fails, it will still have backup due to backup. If the device does not forward, the forwarding performance of the system is greatly reduced. At the same time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L41/0663H04L67/1008H04L67/141
Inventor 范鸿雷晏尉
Owner BEIJING TOPSEC NETWORK SECURITY TECH