CN102932487B - Data processing method and system - Google Patents
Data processing method and system Download PDFInfo
- Publication number
- CN102932487B CN102932487B CN201210489050.1A CN201210489050A CN102932487B CN 102932487 B CN102932487 B CN 102932487B CN 201210489050 A CN201210489050 A CN 201210489050A CN 102932487 B CN102932487 B CN 102932487B
- Authority
- CN
- China
- Prior art keywords
- trigger
- client
- port numbers
- server
- access request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of data processing method and system.Wherein the method includes: trigger receives the access request that client sends;Trigger is according to the access information creating routing object in access request;Trigger sets up the correspondence between client and trigger according to routing object;Trigger utilizes routing object to extract the reference address in access information, and wherein, reference address points to server;Trigger utilizes the server pointed by routing object access address, and obtains the network data from server;And the network data got is sent to client by trigger according to the correspondence between client and trigger.By data processing method and the system of the application, routing object is created according to access request, then set up the correspondence between client and routing object, achieve server in the network environment have fire wall and to the effect of client callback data, and then the communication efficiency of client and server can be improve.
Description
Technical field
The present invention relates to data processing field, in particular to a kind of data processing method and system.
Background technology
Fire wall is the electron boundary of some file preventing unauthorized user from accessing on network or computer, usually, and can
To provide fire wall by the fire wall code (" host firewall ") on subscriber computer, it is also possible to carry at network edge
Computer interface outside for special fireproof wall mechanism (" perimeter firewall "), perimeter firewall and network has built-in special peace
Full preventive measure, in order to the sensitive document on computer in protection network, namely by outer for network computer user is hidden in limit
The machine protecting a group easygoing management later of boundary's fire wall.The machine arranging perimeter firewall is usually referred to as " gateway " or " special
With gateway ".If being used for protecting network by fire wall, making network not encroached on by the Internet, the machine of configuration fire wall usually claims
For " the Internet gateway device ".
In some enterprise networks, client is in order to send messages to service end, and the fire wall of service end must be opened and configure one
Individual proprietary port.If service end is multiple end points (supporting TCP and SSL) the most simultaneously, service end fire wall just must
A separate port must be opened for each end points, and Client Agent also must configure the publicly-owned end points that need to use service end: clothes
The proprietary port that the host name of business end and fire wall open.Above-mentioned be only in typical network environment single client to service
End sends the problem that request can be potentially encountered, when the number that there is multiple client and multiple service end in network increases, and configuration
Port is by increasingly complex, and the communication between client and server also will become more loaded down with trivial details, so that the efficiency of communication is the lowest.
In order to solve the problems referred to above, prior art mainly has following several method carry out firewall-penetrating:
(1) bounce method.The method utilizes fire wall to connect for inside initiation and limits the strictest feature.Owing to connecting by interior
Portion initiates, and fire wall will be considered that it is a legal connection.For for fire wall restrictive ports, the method also can use portless,
Carry out firewall-penetrating without technology such as process, HTTP tunnel, variable port, but the process employs illegal link and penetrate anti-
Wall with flues.
(2) D.Dos method.For simple IP Filting Firewall, such as router, after being attacked by Dos, substantial amounts of packet
Fire wall can be made to lose original record, thus the packet newly received cannot be made analysis.But, the method can only be to some
Simple fire wall is effective, and the method is not easy to apply in a program.
(3) burst method.The ultimate principle of burst method is, utilizes general first subdivision planning to packet segment of fire wall, right
The strictest in follow-up burst general inspection.So, a legal packet segment can be constructed, after fire wall, then non-
Method data pass through fire wall with burst form, but, the encapsulation of this mode data and the merging of destination are especially complex.
(4) law of agency.In general, the agreement being in protocol stack level the highest is the most complicated, and the strategy that can formulate is the most detailed, with
Time the most easily go wrong.Agency service is the fire wall of the application layer operating in OSI, and it substantially starts two connections,
One be client to agency, another be agency to destination server, if using the method agency to there is strategy leak, hold the most very much
Easily enter internal network through leak so that network is the most dangerous.
For in prior art when client and server communication, during firewall-penetrating, port configuration is complicated and server without
Normal direction client is adjusted back, thus causes the problem that communication efficiency is low, the most not yet proposes effective solution.
Summary of the invention
For correlation technique when client is with server communication, during firewall-penetrating, port configuration is complicated and server cannot
Adjust back to client, thus cause the problem that communication efficiency is low, the most not yet propose effective solution, to this end, the present invention
Main purpose be to provide a kind of data processing method and system, to solve the problems referred to above.
To achieve these goals, according to an aspect of the invention, it is provided a kind of data processing method, the method includes:
Trigger receives the access request that client sends;Trigger is according to the access information creating routing object in access request;Start
Device sets up the correspondence between client and trigger according to routing object;Trigger utilizes routing object to extract in access information
Reference address, wherein, reference address point to server;Trigger utilizes the service pointed by routing object access address
Device, and obtain the network data from server;And trigger will obtain according to the correspondence between client and trigger
The network data arrived sends to client.
Further, trigger includes according to the step accessing information creating routing object in access request: trigger reads visits
Ask the second port numbers of the reference address in information and client;Trigger extracts the first port numbers of server according to reference address;
Trigger sets up the corresponding relation between the first port numbers and the second port numbers;Trigger preserves the first port numbers, the second port numbers
And the corresponding relation that first between port numbers and the second port numbers is to create routing object.
Further, the step that trigger sets up the correspondence between client and trigger according to routing object includes: start
Corresponding relation between first port numbers, the second port numbers and the first port numbers and the second port numbers is sent to client by device;
Client configures route according to the corresponding relation between the first port numbers, the second port numbers and the first port numbers and the second port numbers
Object, and return configuration information with the correspondence setting up between client and trigger.
Further, before trigger receives the access request that client sends, method includes: in trigger search system
Whether there is access request, wherein, in the case of there is access request in systems, receive the access request of client.
Further, trigger utilizes the server pointed by routing object access address, and obtains the net from server
The step of network data includes: trigger utilizes routing object to extract the reference address in access request, and accesses according to reference address
Server;Server obtains network data according to reference address, and network data is returned to trigger;The road that trigger creates
By object acquisition network data.
To achieve these goals, according to an aspect of the invention, it is provided a kind of data handling system, this system includes:
Client, is used for sending access request;Trigger, is connected with client, for receiving the access request that client sends, root
According to the access information creating routing object in access request, and create the communication between client and trigger according to routing object
Relation;Server, is connected with trigger, obtains network data for the access request forwarded according to trigger, and by network
Data return to trigger;Wherein, network data is sent to visitor according to the correspondence between client and trigger by trigger
Family end.
Further, trigger also includes: first processor, whether there is access request in search system, and in system
In there is access request in the case of, receive the access request that sends of client.
Further, trigger is built-in in the server.
Further, system includes: one or more servers, and each server is connected with trigger respectively.
Further, trigger includes: one or more second processors, wherein, each second processor respectively with clothes
Business device connects, for creating routing object in the server corresponding with the second processor according to the access information in access request.
By data processing method and the system of the application, when client request communication, according to port numbers and the request of client
The port numbers of the client accessed creates routing object, and then routing object sets up the correspondence between client and routing object,
Using the application can be that each client creates a routing object, sets up the correspondence of client and routing object, thus
When client is with server communication, routing object realize the client communication to server as bridge firewall-penetrating, and
And routing object has only to an open port, it is not necessary to configure substantial amounts of port and achieve that server returns to the data of client
Adjust, solve in prior art when client is with server communication, port configuration complexity and server during firewall-penetrating
Cannot adjust back to client, thus cause the problem that communication efficiency is low, it is achieved that the port of multi-client to many service ends fire wall
Open and server to the effect of client callback data, and then can improve client in the network environment have fire wall
Communication efficiency with server.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, and the present invention shows
Meaning property embodiment and explanation thereof are used for explaining the present invention, are not intended that inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation of data handling system according to embodiments of the present invention;
Fig. 2 is the detailed construction schematic diagram of data handling system according to embodiments of the present invention;And
Fig. 3 is the flow chart of data processing method according to embodiments of the present invention.
Detailed description of the invention
It should be noted that in the case of not conflicting, the embodiment in the application and the feature in embodiment can be mutually combined.
Describe the present invention below with reference to the accompanying drawings and in conjunction with the embodiments in detail.
Fig. 1 is the structural representation of data handling system according to embodiments of the present invention.Fig. 2 is number according to embodiments of the present invention
Detailed construction schematic diagram according to processing system.
As depicted in figs. 1 and 2, the data handling system of the application includes:
Client 1, is used for sending access request;Trigger 3, is connected with client 1, for receiving the visit that client 1 sends
Ask request, according to the access information creating routing object in access request, and create client 1 according to routing object and start
Correspondence between device 3;Server 5, is connected with trigger 3, obtains for the access request forwarded according to trigger 3
Network data, and network data is returned to trigger;Wherein, trigger is according to the correspondence between client and trigger
Network data is sent to client.
Using the data handling system of the application, the receptor of trigger receives the access request that client sends, trigger root afterwards
According to the access information creating routing object in access request, and create the communication between client and trigger according to routing object
Relation, obtains network data at server according to the access request that trigger forwards, and network data is returned to trigger it
After, network data is sent to client according to the correspondence between client and trigger by trigger.By the number of the application
According to processing system, when client request communication, trigger creates routing object, then utilize routing object set up client with
Correspondence between trigger, and the network data of server is returned by this correspondence, use the application to utilize and open
Dynamic device is that client creates routing object according to the access request of client, utilizes routing object to set up the logical of client and trigger
Gateway system, thus when client is with server communication, routing object realize client to service as bridge firewall-penetrating
The communication of device, and routing object has only to an open port, it is not necessary to configure substantial amounts of port and achieve that server arrives visitor
The data readjustment of family end, solves in prior art when client is with server communication, port configuration during firewall-penetrating
Complicated and server cannot be adjusted back to client, thus causes the problem that communication efficiency is low, it is achieved that multi-client is to many service ends
The open-ended of fire wall and in the network environment have fire wall server can to the effect of client callback data, and then
Improve the communication efficiency of client and server.
Wherein, client can be subscription client, and such as PC etc., server can be the server in LAN, route
Object can be GL router, and above-mentioned data processing method can apply to application program based on C/S framework, by for each
Individual client derives the GL router of corresponding client, and then Client Agent carries out configuring this GL router, to ensure clothes
The data of client are adjusted back and can be smoothed out by business device.As in figure 2 it is shown, allowing the main frame accessing two networks (i.e. to service
Device) on dispose respectively two networks of GL(refer to receive from public network client send request, it is possible to forward the request to
Server in private network).
By above-described embodiment of the application, when client is with server communication, efficiency is higher and safety preferable, contributes to
Enterprise is safeguarded, and the expense of the configuration network port is minimized.
According to above-described embodiment of the application, trigger 3 may include that whether first processor exists visit in search system
Ask request, and in the case of there is access request in systems, receive the access request that client sends.
Specifically, trigger inherits the configuration attribute of GL router, it is possible to according to the access request of client be client derive from
Go out corresponding GL router.After starting trigger, trigger is monitored on known end points, to obtain network
In access request, in the case of there is access request in searching network, trigger according to the access request received for visitor
Family end configuration GL router, in the case of not having access request in a network, trigger continues to search for access request in a network.
In above-described embodiment of the application, trigger 3 is built in server 5.
Specifically, system may include that one or more server 5, each server 5 are connected with trigger 3 respectively.
Specifically, as in figure 2 it is shown, first server 5 is connected with trigger 3 respectively with second server 5.
According to above-described embodiment of the application, trigger 3 may include that one or more second processor, wherein, Mei Ge
Two processors are connected with a server respectively, are used for according to the access information in access request at the clothes corresponding with the second processor
Business device creates routing object.Wherein, routing object can be the GL router shown in Fig. 2.
Specifically, each second processor can process the access request of a client respectively, specific to the trigger in Fig. 3
Can include the first sub-processor and the second sub-processor, the first sub-processor can process the access request of customer end A, such as visitor
The access request of family end A is to access the request of server A, then the first sub-processor creates road according to the access request of customer end A
By object, and setting up the correspondence of customer end A and routing object, customer end A directly with routing object alternately, is passed through afterwards
The access request of customer end A is transmitted to server A by the routing object that trigger 3 creates, and server A obtains according to access request
Network data, and network data is returned to customer end A by the GL router in trigger 3, processed in above-mentioned data
Cheng Zhong, the interface being configured without a lot of alternately of customer end A and server A, and achieve clog-free communication and (i.e. take
The network data of business device A is adjusted back smoothly to customer end A).
Fig. 3 is the flow chart of data processing method according to embodiments of the present invention.
The method comprises the steps: as shown in Figure 3
Step S102, receives the access request that client sends.
Step S104, trigger is according to the access information creating routing object in access request.Wherein, routing object includes request
First port numbers of the server accessed and the second port numbers of client.
Step S106, trigger creates the correspondence between client and trigger according to routing object.
Step S108, trigger utilizes routing object to extract the reference address in access request, and wherein, reference address points to service
Device.
Step S110, trigger utilizes the server pointed by routing object access address, and obtains the net from server
Network data.
Step S112, the network data got is sent to client by trigger according to the correspondence between client and trigger
End.
Using the data processing method of the application, trigger is by receiving the access request that client sends, then according to access request
In access information creating routing object, and create the correspondence between client and trigger according to routing object, afterwards
Utilize routing object to extract the reference address in access request, and the server that access address is pointed to, and obtaining from clothes
After the network data of business device, according to the correspondence between client and trigger, this network data is sent to client.Logical
Crossing the data processing method of the application, when client request communication, trigger creates routing object, then utilizes routing object
Set up the correspondence between client and trigger, and by the network data of this correspondence return server, use this Shen
Trigger please be utilize to create routing object according to the access request of client for client, utilize routing object to set up client
With the correspondence of trigger, thus when client and server communication, routing object realize as bridge firewall-penetrating
Client is to the communication of server, and routing object has only to an open port, it is not necessary to configuring substantial amounts of port just can be real
Existing server is adjusted back to the data of client, solves in prior art when client is with server communication, firewall-penetrating mistake
The configuration of journey middle port is complicated and server cannot be adjusted back to client, thus causes the problem that communication efficiency is low, it is achieved that many clients
Server can be to client callback data to the open-ended of many service ends fire wall and in the network environment have fire wall for end
Effect, and then improve the communication efficiency of client and server.
Wherein, routing object can be GL router, and above-mentioned data processing method can apply to application journey based on C/S framework
Sequence, is the GL router that each client derives corresponding client by trigger, and then Client Agent carries out configuring this
GL router, to ensure that the data of client are adjusted back and can be smoothed out by server.Such as, two networks of access are being allowed
Upper two networks of GL(of disposing of main frame (i.e. server) refer to receive the request of the client transmission from public network, it is possible to turn
Send out the server asked in private network).
By above-described embodiment of the application, when client is with server communication, efficiency is higher and safety preferable, contributes to
Enterprise is safeguarded, and the expense of the configuration network port is minimized.
Specifically, above-described embodiment can be achieved by the steps of:
1) after trigger receives the access request of client, create GL router in systems and (dispose the most in systems
GL router).
2) Client Agent configuration GL is as router, it may be assumed that GL router trigger created is as router.
3) after utilizing GL router to set up the client correspondence with trigger, GL router obtains the access of client
Request.
4) server pointed by reference address in this access request of GL router access.
5) server obtains network data according to this reference address, and uses GL router to answer to client return via trigger
Answer (i.e. network data).
In above-described embodiment of the application, trigger is permissible according to the step accessing information creating routing object in access request
Including: the reference address in trigger reads access information and the second port numbers of client;Visit according to the reference address request of extracting
First port numbers of the server asked;Set up the corresponding relation between the first port numbers and the second port numbers;By the first port numbers,
Corresponding relation between second port numbers and the first port numbers and the second port numbers carries out preserving to create routing object.
Specifically, the reference address in trigger reads access information and the second port numbers of client, and carry according to reference address
Take the first port numbers of the server that request accesses, then set up the corresponding relation between the first port numbers and the second port numbers, it
After the corresponding relation between the first port numbers, the second port numbers and the first port numbers and the second port numbers is preserved, with wound
Build routing object.From the foregoing, it will be observed that the GL router created carries the port number information of configuration service device and client, and clothes
Business device and the corresponding relation of client.
According to above-described embodiment of the application, trigger sets up correspondence between client and trigger according to routing object
Step may include that corresponding by between the first port numbers, the second port numbers and the first port numbers with the second port numbers of trigger
Relation is sent to client;Client is according between the first port numbers, the second port numbers and the first port numbers and the second port numbers
Corresponding relation configuration routing object, and return configuration information with the correspondence setting up between client and trigger.
Specifically, by said method, trigger derives a GL router in-stance, and the agency of this GL router
(agency at this includes: the first port numbers, the second port numbers and first port numbers corresponding relation between the second port numbers)
Returning to client, the information that client returns according to GL router carries out suitable configuration the agency of client, will GL
Router is as router.Wherein it is possible to all agency's static state created for certain communicator carry out such configuration, it is possible to
To carry out configuring (agency carrying out being configured so that is called the agency of route) for specific agency in a program.
After client configures, the GL router that client just directly creates with trigger interacts, when client calls
When having the operation on the agency of route, client can be connected to the corresponding client port of GL router, and access request is sent
On GL router, the server that then GL router points to according to the reference address access address in access request.
It addition, in Network Programming Technology field, but as long as the configuration to Client Agent may have multiple implementation without departing from this
The basis of invention, all should be considered as the scope of protection of the invention.
According to above-described embodiment of the application, before trigger receives the access request that client sends, method can also be wrapped
Include: whether trigger search system exists access request, wherein, in the case of there is access request in systems, receive visitor
The access request of family end, in the case of there is not access request, continues search for whether there is access request in system.
Specifically, in order to carry out readjustment to devise trigger, trigger inherits the configuration attribute of GL router, it is possible to root
It is that client derives corresponding GL router according to the access request of client.After starting trigger, trigger is in week
Monitor on the end points known, to obtain the access request in network, in the case of there is access request in searching network,
Trigger is that client configures GL router according to the access request received, and in the case of not having access request in a network, opens
Dynamic device continues to search for access request in a network.
According to above-described embodiment of the application, trigger utilizes the server pointed by routing object access address, and obtains
Step from the network data of server includes: trigger utilizes routing object to extract the reference address in access request, and root
Server is accessed according to reference address;Server obtains network data according to reference address, and network data is returned to trigger;
The routing object that trigger creates obtains network data.
Specifically, routing object (i.e. GL router) is set up a client leading to given server and is connected, and by client
Access request is transmitted to the client of correspondence, more specifically, before routing object forwards access request, routing object is accessing
The parameter of request increases the callback object pointing to client, so that server returns should the network data of client.
In the above-mentioned methods, service end obtains network data according to reference address and adjusts back, and the agency of callback object contains road
Network data is transmitted to client by the GL router created via trigger by the endpoint server of device.
It should be noted that can be at the computer of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing
System performs, and, although show logical order in flow charts, but in some cases, can be to be different from this
The step shown or described by order execution at place.
As can be seen from the above description, present invention achieves following technique effect: by the data processing method of the application,
When client request communication, according to the port numbers establishment routing object of the client that port numbers and the request of client access, so
Rear routing object sets up the correspondence between client and routing object, and using the application can be that each client creates one
Routing object, sets up the correspondence of client and routing object, thus when client is with server communication, by routing object
Realize the client communication to server as bridge firewall-penetrating, and routing object has only to an open port, is not required to
Configure substantial amounts of port and achieve that server arrives the data readjustment of client, solve in prior art in client and service
During device communication, during firewall-penetrating, port configuration is complicated and server cannot be adjusted back to client, thus causes communication efficiency
Low problem, it is achieved that the open-ended of multi-client to many service ends fire wall and service in the network environment have fire wall
Device to the effect of client callback data, and then can improve the communication efficiency of client and server.
Obviously, those skilled in the art should be understood that each module of the above-mentioned present invention or each step can be with general calculating
Device realizes, and they can concentrate on single calculating device, or is distributed on the network that multiple calculating device is formed,
Alternatively, they can realize with calculating the executable program code of device, it is thus possible to be stored in storing device
In perform by calculating device, or they are fabricated to respectively each integrated circuit modules, or by the multiple modules in them
Or step is fabricated to single integrated circuit module and realizes.So, the present invention is not restricted to the combination of any specific hardware and software.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for those skilled in the art
For, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of being made, etc.
With replacement, improvement etc., should be included within the scope of the present invention.
Claims (6)
1. a data processing method, it is characterised in that including:
Trigger receives the access request that client sends, and wherein, receives what described client sent in described trigger
Before described access request, whether described trigger search system exists described access request, wherein, in described system
In there is described access request in the case of, receive the described access request of described client;
Described trigger is according to the access information creating routing object in described access request;
Described trigger sets up the correspondence between described client and described trigger according to described routing object;
Described trigger utilizes described routing object to extract the reference address in described access information, wherein, described access
Server is pointed in location;
Described trigger utilizes described routing object to access described server pointed by described reference address, and obtain from
The network data of described server;And
The network data got is sent by described trigger according to the correspondence between described client and described trigger
To described client;
Described trigger includes according to the step accessing information creating routing object in described access request: described trigger
Read the second port numbers of the reference address in described access information and described client;Described trigger is according to described access
First port numbers of server described in address extraction;Described trigger sets up described first port numbers and described second port numbers
Between corresponding relation;Described trigger preserves described first port numbers, described second port numbers and described first port
Number and described second port numbers between corresponding relation to create described routing object;
Described trigger sets up the step of correspondence between described client and described trigger according to described routing object
Including: described trigger is by described first port numbers, described second port numbers and described first port numbers and described second
Corresponding relation between port numbers is sent to described client;Described client according to described first port numbers, described second
Corresponding relation between port numbers and described first port numbers and described second port numbers configures described routing object, and returns
Return configuration information to set up the correspondence between described client and described trigger.
Method the most according to claim 1, it is characterised in that described trigger utilizes described routing object to access described access
Described server pointed by address, and obtain the step from the network data of described server and include:
Described trigger utilizes described routing object to extract the reference address in described access request, and according to described access
Location accesses server;
Described server obtains described network data according to described reference address, and opens described in described network data being returned to
Dynamic device;
The described routing object that described trigger creates obtains described network data.
3. a data handling system, it is characterised in that including:
Client, is used for sending access request;
Trigger, is connected with described client, for receiving the described access request that described client sends, according to described
Access information creating routing object in access request, and create described client according to described routing object and open with described
Correspondence between dynamic device;
Server, is connected with described trigger, obtains network for the described access request forwarded according to described trigger
Data, and described network data is returned to described trigger;
Wherein, described network data is sent out by described trigger according to the correspondence between described client and described trigger
Deliver to described client;
Described trigger also includes: first processor, whether there is described access request in search system, and in institute
State in the case of system exists described access request, receive the described access request that described client sends,
Wherein, described trigger includes according to the access information creating routing object in described access request: described trigger
Read the second port numbers of the reference address in described access information and described client;Described trigger is according to described access
First port numbers of server described in address extraction;Described trigger sets up described first port numbers and described second port numbers
Between corresponding relation;Described trigger preserves described first port numbers, described second port numbers and described first port
Number and described second port numbers between corresponding relation to create described routing object;
The correspondence that described trigger is set up between described client and described trigger according to described routing object includes:
Described trigger is by described first port numbers, described second port numbers and described first port numbers and described second port numbers
Between corresponding relation be sent to described client;Described client is according to described first port numbers, described second port numbers
And the corresponding relation between described first port numbers and described second port numbers configures described routing object, and return configuration
Information is to set up the correspondence between described client and described trigger.
System the most according to claim 3, it is characterised in that described trigger is built in described server.
System the most according to claim 4, it is characterised in that described system includes: one or more servers, Mei Gesuo
State server to be connected with described trigger respectively.
System the most according to claim 5, it is characterised in that described trigger includes: one or more second processors,
Wherein, each described second processor is connected with a described server respectively, for according to the visit in described access request
Information of asking creates routing object in the server corresponding with described second processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210489050.1A CN102932487B (en) | 2012-11-26 | 2012-11-26 | Data processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210489050.1A CN102932487B (en) | 2012-11-26 | 2012-11-26 | Data processing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102932487A CN102932487A (en) | 2013-02-13 |
CN102932487B true CN102932487B (en) | 2016-09-14 |
Family
ID=47647183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210489050.1A Active CN102932487B (en) | 2012-11-26 | 2012-11-26 | Data processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102932487B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104023049A (en) * | 2014-05-16 | 2014-09-03 | 中国科学院计算技术研究所 | Method and system for mapping HTTP service to information center network |
CN113542135B (en) * | 2021-08-04 | 2023-04-07 | 湖南快乐阳光互动娱乐传媒有限公司 | CDN communication method, system, client and server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1941738A (en) * | 2005-09-29 | 2007-04-04 | 腾讯科技(深圳)有限公司 | Device and method for telecommunicating between customer end application component and object server |
US7349993B2 (en) * | 2000-03-02 | 2008-03-25 | Sony Corporation | Communication network system, gateway, data communication method and program providing medium |
CN101465844A (en) * | 2007-12-18 | 2009-06-24 | 华为技术有限公司 | Method, system and equipment for traversing firewall |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159657A (en) * | 2007-10-16 | 2008-04-09 | 华为技术有限公司 | Method, equipment and server of implementing private network cross-over |
-
2012
- 2012-11-26 CN CN201210489050.1A patent/CN102932487B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7349993B2 (en) * | 2000-03-02 | 2008-03-25 | Sony Corporation | Communication network system, gateway, data communication method and program providing medium |
CN1941738A (en) * | 2005-09-29 | 2007-04-04 | 腾讯科技(深圳)有限公司 | Device and method for telecommunicating between customer end application component and object server |
CN101465844A (en) * | 2007-12-18 | 2009-06-24 | 华为技术有限公司 | Method, system and equipment for traversing firewall |
Also Published As
Publication number | Publication date |
---|---|
CN102932487A (en) | 2013-02-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102316153B (en) | VPN network client for mobile device having dynamically constructed display for native access to web mail | |
CN102316092B (en) | VPN network client for mobile device having fast reconnect | |
CN103327025B (en) | Method for network access control and device | |
CN102333075B (en) | VPN network client for mobile device having fast reconnect | |
CN102333110B (en) | VPN network client for mobile device having fast reconnect | |
RU2533063C2 (en) | Method to establish connection (versions), method to transfer data packet and system of remote access | |
CN102316093B (en) | Dual-Mode Multi-Service VPN Network Client for Mobile Device | |
CN102333306B (en) | Multi-service vpn network client for mobile device having integrated acceleration | |
US8560833B2 (en) | Automatic secure client access | |
CN102316094B (en) | Multi-service VPN network client for mobile device having integrated acceleration | |
US20150156183A1 (en) | System and method for filtering network communications | |
CN109271776A (en) | Micro services system single-point logging method, server and computer readable storage medium | |
TW200951757A (en) | Malware detection system and method | |
CN105743878A (en) | Dynamic service handling using a honeypot | |
CN106063229A (en) | Methods and systems for forwarding data | |
CN105049413A (en) | Authentication method for free wireless Internet access | |
US20190327208A1 (en) | Network traffic mangling application | |
CN110099129A (en) | A kind of data transmission method and equipment | |
CN104994113B (en) | A kind of ADSL wireless routers and the method and system for realizing forced gate under bridge mode using the router | |
CN102932487B (en) | Data processing method and system | |
CN108781367A (en) | The method for reducing Cookie injection and Cookie Replay Attacks | |
CN106941527A (en) | Shifting method and its system in a kind of data transfer | |
CN110995763B (en) | Data processing method and device, electronic equipment and computer storage medium | |
CN107786536B (en) | TCP reverse port penetration method and system thereof | |
US9207953B1 (en) | Method and apparatus for managing a proxy autoconfiguration in SSL VPN |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PP01 | Preservation of patent right | ||
PP01 | Preservation of patent right |
Effective date of registration: 20220816 Granted publication date: 20160914 |