Data processing method and device for boundary security equipment

A security device and data processing technology, applied in the field of network security, can solve problems such as complex management process, third-party application development and maintenance process, and impact on border security device system operation, so as to expand business functions and simplify development and maintenance process , the effect of reducing the difficulty of management

Pending Publication Date: 2021-11-05
HILLSTONE NETWORKS CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Embodiments of the present invention provide a data processing method and device for border security equipment, to at least solve the problem of the need to add third-party applications in border security equipment in rela

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device for boundary security equipment
  • Data processing method and device for boundary security equipment
  • Data processing method and device for boundary security equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0031] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method and device for boundary security equipment. The method comprises the following steps: installing a container engine in the boundary safety equipment; establishing a container through a container engine, and installing a third-party application needing to be installed in the container; setting system resources of the boundary safety equipment which can be used by the container through a container engine; according to the system resources of the boundary safety equipment which can be used by the container, managing the data of the container and the corresponding third-party application, wherein the container is used for operating the third-party application and accessing the boundary safety equipment and the intranet data of the boundary safety equipment through the container engine. According to the method and the device, the technical problems that the system operation of the boundary security equipment is influenced, the management process is complicated, and the development and maintenance processes of the third-party application are complicated because the third-party application needs to be newly added in the boundary security equipment in related arts are solved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a data processing method and device for border security equipment. Background technique [0002] With the advent of the Internet of Things era, everything is interconnected, and a large number of devices are connected to the network. These devices often have no security functions or only have weak security functions, and are easy to be attacked or illegally invaded. The management and security protection of these devices The demand is increasing day by day. [0003] Usually an enterprise (or unit) has a NAT device (firewall or dedicated NAT device) inside the public network and the internal network boundary, responsible for NAT address translation. Multiple branches of an enterprise also deploy networks in a similar manner. [0004] If you want to manage the devices in the intranet through an external server, it is very inconvenient under this network architecture, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F9/455
CPCG06F9/45558G06F2009/45587G06F2009/45595
Inventor 王国盛李家顺尹伟伟张作涛
Owner HILLSTONE NETWORKS CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products