Strategy centralized configuration system and method for network security equipment
A centralized configuration and network security technology, applied in the field of network security, can solve problems such as incomplete solutions and no implementation methods
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.
[0036] The technical principle involved in the present invention will be described first.
[0037] REST is an architecture for organizing Web services. Its goal is to create a distributed system with good scalability. It proposes a series of architectures and constraints: clients and servers communicate with each other through a unified interface; clients and It will not deal with a server in a fixed manner; the client is required to maintain its own state and provide the information necessary to process the request stored by itself each time it sends a request; the system needs to be able to properly cache the request to minimize server-side Information transmission between the client and the client to improve performance; use a unified interface to complete the interaction between subsystems and between services and users....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


