Passive service verification method and system
A business and authenticity verification technology, applied in the field of communication networks, can solve problems such as low quality assurance effect and long time consumption
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] Before any embodiment of the invention is described in detail, it is to be understood that the invention is not limited in application to the details of construction shown in the following description or in the accompanying drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative improvements belong to the protection scope of the present invention.
[0080] A passive service authentication method, such as figure 1 , 2 , 3, 4, and 5, including the following steps:
[0081] S1. Establish an active network port analysis model: obtain the port correlation, use the big data principle to automatically analyze the communication port, and obtain the optical attenuation range of the optical cable communication between the two ports;
[0082] S2. The IP address or network...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com