Self-adaptive method and system for network security
A network security and user technology, applied in the field of communication, can solve problems such as incomplete authentication, abnormal download of business data, easy loss of signaling, etc., and achieve the effect of reducing occupancy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.
[0032] figure 1 A flow chart of the adaptive method provided by this application, the method includes:
[0033] The sending end obtains the network security data and user identity data, determines the corresponding priority level according to the importance of the transmission service, selects the modulation mode according to the priority order from high to low, and sends an authentication request to the receiving end, and the authentication request carries Network security data and user identity data; the network security data includes business request data;
[0034] Wherein, the selection of the modulation method includes: estimating the first...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

