Unlock instant, AI-driven research and patent intelligence for your innovation.

High-security network security equipment

A network security and high-security technology, applied in the field of network security equipment, can solve problems such as antenna damage, dust-collecting interfaces, and moisture, so as to improve performance and stability, ensure safety and stability, and ensure signal stable effect

Pending Publication Date: 2021-03-05
深圳市必易网络科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Network security equipment includes IP protocol cipher machines, security routers, line cipher machines, firewalls, etc. In addition to the above-mentioned equipment, information security equipment in a broad sense also includes cryptographic chips, encryption cards, identification cards, telephone cipher machines, etc. The virus and malicious code filtering protection system has high security performance and is convenient for users to use network services safely. When the existing enterprise security routers are in use, because the current routers have a rectangular structure, the receiving antenna installed on them It exposes the outside of the router, which is vulnerable to external impact, causing damage to the antenna, which in turn leads to unstable signal of the network security equipment, and the interface on the existing router is exposed to the outside of the router, which is easy to collect dust and easy Let the interface get wet, resulting in poor contact of the router, thereby reducing the performance and stability of the router

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-security network security equipment
  • High-security network security equipment
  • High-security network security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on The embodiments of the present invention and all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] see Figure 1-6 , the present invention provides a technical solution:

[0026] A high-security network security device, comprising a network security device shell 1, a power control button 2 is arranged on the end face of the network security device shell 1, and an upper annular elastic silicone ring 3 is sleeved on the end edge of the network security device shell 1 , the bottom of the network security device shell 1 is connected with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security equipment, in particular to high-security network security equipment which comprises a network security equipment shell, a power supplycontrol button is arranged on the end face of the network security equipment shell, and an upper annular elastic silica gel ring is connected to the edge of the end of the network security equipmentshell in a sleeving mode. According to the network security equipment, the antenna and the antenna mounting base are oppositely folded, and the end part of the antenna is close to the supporting sleeve, so that the antenna is relatively hidden at the bottom of the network security equipment shell, and the effect of hiding the antenna is achieved; according to the router provided by the utility model, the antenna is protected, the problem that the existing router is of a rectangular structure, so that the receiving antenna mounted on the router is exposed outside the router and is easily subjected to external impact force is solved, the antenna is prevented from being damaged, and the signal stability of the network security equipment is ensured.

Description

technical field [0001] The invention relates to the technical field of network security equipment, in particular to a high-security network security equipment. Background technique [0002] Network security equipment includes IP protocol cipher machines, security routers, line cipher machines, firewalls, etc. In addition to the above-mentioned equipment, information security equipment in a broad sense also includes cryptographic chips, encryption cards, identification cards, telephone cipher machines, etc. The virus and malicious code filtering protection system has high security performance and is convenient for users to use network services safely. When the existing enterprise security routers are in use, because the current routers have a rectangular structure, the receiving antenna installed on them It exposes the outside of the router, which is vulnerable to external impact, causing damage to the antenna, which in turn leads to unstable signal of the network security eq...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/02H04Q1/02
CPCH04L12/02H04Q1/035
Inventor 王亭亭李斌
Owner 深圳市必易网络科技有限公司