Port hiding method, device and equipment mixed with authentication signal
An authentication and port technology, which is applied in the hidden field of ports mixed with authentication signals, can solve the problems of no active defense capabilities, and achieve the effect of eliminating man-in-the-middle attacks and eavesdropping
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0056] Various exemplary embodiments, features, and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. The same reference numbers in the figures indicate functionally identical or similar elements. While various aspects of the embodiments are shown in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
[0057] In addition, the terms "first" and "second" are used for descriptive purposes only, and cannot be interpreted as indicating or implying relative importance or implicitly specifying the quantity of indicated technical features. Thus, a feature defined as "first" and "second" may explicitly or implicitly include one or more of these features. In the description of the present invention, "plurality" means two or more, unless otherwise specifically defined.
[0058] The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration." ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


