Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of network security and conversion method, applied in the field of network security equipment, can solve the problems of large size of the security router, no dustproof, anti-collision, damage to the security router, etc.
Pending Publication Date: 2021-07-27
江苏趣牛智能科技有限公司
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0003] The security router used by the company is relatively large in size, so it needs to be placed and installed layer by layer on a shelf. Will cause damage to the security router installed in
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0032] The following is attached Figure 1-4 The principles and features of the present invention are described, and the examples given are only used to explain the present invention, and are not used to limit the scope of the present invention. In the following paragraphs the invention is described more specifically by way of example with reference to the accompanying drawings. Advantages and features of the present invention will be apparent from the following description and claims. It should be noted that all the drawings are in a very simplified form and use imprecise scales, and are only used to facilitate and clearly assist the purpose of illustrating the embodiments of the present invention.
[0033] It should be noted that when a component is said to be "fixed" to another component, it can be directly on the other component or there can also be an intervening component. When a component is said to be "connected" to another component, it may be directly connected to ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The invention relates to network security equipment based on an NAT method, which comprises a box body, a moving rod and a sleeve rod, third shaft seats are fixedly mounted on two sides of the middle in the box body, a rotating shaft is connected and mounted in the third shaft seats, the sleeve rod is connected and mounted on the surface of the rotating shaft, and an inner rod is inserted into the sleeve rod; one end of the inner rod is connected and mounted in a second shaft seat, the second shaft seat is fixedly mounted on the middle surface of a moving rod, one end of the moving rod is rotatably connected in a fourth shaft seat, the fourth shaft seat is fixedly mounted on the surface of one side of a clamping plate, and a cushion is fixedly mounted on the surface of the other side of the clamping plate; a network safety equipment body is attached to the surface of the cushion and placed on the surface of the partition plate, and hollow holes are formed in the partition plate in a penetrating mode. According to the invention, the box body is used for installing the network security equipment in the box body, and the telescopic clamping plates are used for clamping and fixing the network security equipment, so that the network security equipment with different sizes can be fixedly installed and protected.
Description
technical field [0001] The invention relates to the technical field of network security equipment, in particular to a network security equipment based on a NAT conversion method. Background technique [0002] Network security equipment includes IP protocol cipher machines, security routers, line cipher machines, firewalls, etc. In addition to the above-mentioned equipment, information security equipment in a broad sense also includes cryptographic chips, encryption cards, identification cards, telephone cipher machines, fax cipher machines, Asynchronous data encryption machine, security server, security encryption suite, financial encryption machine / card, security middleware, public key infrastructure (PKI) system, certificate of authority (CA) system, security operating system, anti-virus software, network / system Scanning system, intrusion detection system, network security early warning and auditing system, etc. [0003] The security router used by the company is relative...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.