Abstract:
A first correspondence table in a terminal device stores a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, a second correspondence table stores a second correspondence between an identifier of an application and an identifier of a process created by the application. The terminal device receives an identifier, sent by a network security device, of a first data stream. The terminal device can find, in the first correspondence table, a first record storing the identifier of the first data stream to obtain an identifier of a process. The terminal device can find in the second correspondence table, a second record storing the identifier of the process in the first record to obtain an identifier of an application from the second record. The identifier of the application is then sent to the network security device.
Abstract:
Embodiments of the present invention disclose a method, an apparatus, and a system for increasing network security. The method for increasing network security includes: receiving, by a network management system, a certificate message reported by a network element; generating, by the network management system, a first list; when determining that a certificate corresponding to certificate information in the first list needs to be revoked, generating, by the network management system, a certificate revocation request file according to the certificate information, and removing the certificate information in the first list from the first list; and sending, by the network management system, the certificate revocation request file to a public key infrastructure (PKI) system.
Abstract:
Embodiments of the present invention disclose a lightning protection radio remote unit RRU, which includes a primary circuit, a secondary circuit, and a working circuit, where the primary circuit and the secondary circuit are configured to convert a power supply output by a power supply system into a working power supply to power the working circuit; the shield layer located on the RRU side of the shielded cable and the shield layer located on the power supply system side of the shielded cable are grounded respectively; a surge over-voltage withstand capability between the primary circuit and the earth is not less than a lightning over-voltage; a surge over-voltage withstand capability between each inner conductor in the shielded cable and the shield layer of the shielded cable is not less than the lightning over-voltage.
Abstract:
Embodiments of the present invention disclose a lightning protection radio remote unit RRU, which includes a primary circuit, a secondary circuit, and a working circuit, where the primary circuit and the secondary circuit are configured to convert a power supply output by a power supply system into a working power supply to power the working circuit; the shield layer located on the RRU side of the shielded cable and the shield layer located on the power supply system side of the shielded cable are grounded respectively; a surge over-voltage withstand capability between the primary circuit and the earth is not less than a lightning over-voltage; a surge over-voltage withstand capability between each inner conductor in the shielded cable and the shield layer of the shielded cable is not less than the lightning over-voltage.
Abstract:
A first correspondence table in a terminal device stores a correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process, a second correspondence table stores a second correspondence between an identifier of an application and an identifier of a process created by the application. The terminal device receives an identifier, sent by a network security device, of a first data stream. The terminal device can find, in the first correspondence table, a first record storing the identifier of the first data stream to obtain an identifier of a process. The terminal device can find in the second correspondence table, a second record storing the identifier of the process in the first record to obtain an identifier of an application from the second record. The identifier of the application is then sent to the network security device.
Abstract:
A first correspondence table in a terminal device stores a first correspondence between an identifier of a process running on the terminal device and an identifier of a data stream created by the process. A second correspondence table stores a second correspondence between an identifier of an application and an identifier of a process created by the application. The terminal device receives an identifier of a first data stream from a network security device, finds, in the first correspondence table, a first record where the identifier of the first data stream is stored to obtain an identifier of a process in the first record, finds, in the second correspondence table, a second record where the identifier of the process in the first record is stored to obtain an identifier of an application from the second record, and sends the identifier of the application to the network security device.
Abstract:
The present disclosure relates to electrostatic protection terminals. One example terminal includes a target interface, a protected circuit, a protection unit, a switch unit, and a switch control unit. The protected circuit is configured to suppress an electrostatic discharge (ESD) current or an electrical overstress (EOS) current. A first end of the protection unit is electrically connected to a first pin of the target interface. A second end of the protection unit is electrically connected to a second pin of the protected circuit. The first pin is any pin of the target interface. The second pin is a pin that is in the protected circuit and that needs to be electrically connected to the first pin. The switch unit is connected to the protection unit in parallel. The switch control unit is configured to control the switch unit to be open or closed.
Abstract:
The embodiments of the present invention disclose a certificate acquiring method and device. A virtualized network function manager (VNFM) receives a certificate application proxy message sent by a virtualized network function (VNF) instance. The VNFM uses the authentication information to authenticate the VNF instance, and when the authentication succeeds, sends a certificate application message to a certificate authority (CA). Then the VNFM receives a certificate issued by the CA, and sends the certificate to the VNF instance. In this way, through a trusted link between the VNFM and the certificate authority, the instantiated VNF instance applies for a certificate issued by the certificate authority, thereby effectively ensuring security of a management channel between the VNF instance and the VNFM.