A Passive Service Authentication Method
A business and authenticity verification technology, applied in the field of communication network, can solve the problems of long time-consuming and low quality guarantee effect, and achieve the effect of less investment, long shelf life and cost saving of enterprises
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0078] Before any embodiment of the invention is described in detail, it is to be understood that the invention is not limited in application to the details of construction shown in the following description or in the accompanying drawings. The invention is capable of other embodiments and of being practiced or of being carried out in various ways. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative improvements belong to the protection scope of the present invention.
[0079] A passive service authentication method, such as figure 1 , 2 , 3, 4, and 5, including the following steps:
[0080] S1. Establish an active network port analysis model: obtain the port correlation, use the big data principle to automatically analyze the communication port, and obtain the optical attenuation range of the optical cable communication between the two ports;
[0081] S2. The IP address or network...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com