Encrypted traffic analysis method, device, electronic device, medium and program
A traffic analysis and program technology, applied in the field of information security, can solve the problems of large consumption of computing resources, easy generation of certificate alarms on terminals, etc., and achieve the effect of avoiding certificate alarms and saving computing resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0031] The technical idea of the present invention is briefly described below. The encrypted traffic sent by the network device in the enterprise network can be sent to the external network through the gateway device, and the network device can also receive the encrypted traffic sent by the external network through the gateway device. Most of the existing encrypted traffic analysis solutions create a middleman in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com