Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for realizing bypass mode based on software

A bypass mode, a software-implemented technology, applied in the field of network security, can solve problems such as network freeze or even disconnection, bypass mode cannot be triggered, and traditional bypass mode cannot be used to achieve the effect of network interruption

Inactive Publication Date: 2020-02-14
HANGZHOU DPTECH TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for other occasions where the network must be guaranteed to be uninterrupted, the traditional bypass mode cannot be triggered, and its functions cannot be realized
For example, when there is a sudden increase in network traffic, due to the large amount of data, the network security device reaches the upper limit of processing performance, which will also cause network freezes or even disconnection. However, this situation may not involve power outages or crashes. Traditional Bypass mode does not perform its function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing bypass mode based on software
  • Method and device for realizing bypass mode based on software
  • Method and device for realizing bypass mode based on software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0022] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for realizing a bypass mode based on software. A method for realizing a bypass mode based on software is applied to network security equipment, and comprises the following steps: receiving a data packet in a network, and determining a to-be-processed data packet from the data packet; judging whether a packet receiving queue corresponding to the to-be-processed data packet is full or not; under the condition that the packet receiving queue is not full, sending data packets to be processed into the packet receiving queue according to a preset rule; and under the condition that the packet receiving queue is full, forwarding the to-be-processed data packet from a pre-packaged operation interface in a software bypass mode. Compared with the prior art, the bypass mode can be achieved through software, and network interruption is avoided.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method and device for realizing a bypass mode based on software. Background technique [0002] In order to ensure network security, communication between different networks generally requires the use of network security devices. The network security device analyzes the data packets communicated between the networks to determine whether there is a threat, and then forwards the data packets that are confirmed to be safe after analysis. Therefore, once a certain network security device fails, all networks connected through this device will lose contact with each other, resulting in network interruption. In this case, if you want to ensure that the network is not interrupted, you can rely on the bypass mode (bypass) to achieve. [0003] In the bypass mode, through a specific trigger state, the data packets transmitted between the networks can be forwarded directly from t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/26H04L12/863
CPCH04L41/0663H04L41/0681H04L43/0894H04L43/16H04L47/6245
Inventor 沈忱孙军伟任红军
Owner HANGZHOU DPTECH TECH