CN107277026A - A kind of Intranet access method and terminal - Google Patents
A kind of Intranet access method and terminal Download PDFInfo
- Publication number
- CN107277026A CN107277026A CN201710514423.9A CN201710514423A CN107277026A CN 107277026 A CN107277026 A CN 107277026A CN 201710514423 A CN201710514423 A CN 201710514423A CN 107277026 A CN107277026 A CN 107277026A
- Authority
- CN
- China
- Prior art keywords
- intranet
- access
- pass
- proxy server
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
Abstract
The present invention relates to communication technical field, more particularly to a kind of Intranet access method and terminal, its Intranet access method includes:Build a pass-through proxy server;The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request includes Intranet access link and Intranet accesses the directory address of link correspondence Intranet access;Judge that Intranet accesses whether link is illegal access link;If it is not, then filtering the reference address of lack of competence in the directory address, obtain having permission to access directory address;The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.The present invention alleviates the pressure of Intranet file server by the pass-through proxy server built, and improves the bandwidth and Intranet data in hard disk efficiency of transmission of Intranet file server, and has ensured the security that Intranet is accessed.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of Intranet access method and terminal.
Background technology
With the development of system platform, the server of system Intranet file is directly accessed by outer net, can be by most of visits
Ask that pressure is concentrated on the server, directly influence the bandwidth of current server and the iostream efficiency of hard disk, while its
Access security is not protected.
System Intranet generally will all isolate for security consideration with outer net in the prior art.So in the part text of Intranet
Part will be unable to read in outer network environment.At this stage, the way of conventional O&M is:Thrown the net card using two, a connection Intranet, one
Outer net is connected, allows outer net to be able to access that Intranet file by the program.It has the following disadvantages:Thrown the net card, a company using two
Connect Intranet, a connection outer net;This scheme can cause the All Files of Intranet to be all exposed to outer net, cause information leakage and peace
Full hidden danger, external hackers can even travel through the static file even configuration file on collection Intranet hard disk by digging tool.
The content of the invention
The technical problems to be solved by the invention are:The present invention provides a kind of safely and effectively Intranet access method and end
End.
In order to solve the above-mentioned technical problem, the invention provides a kind of Intranet access method, comprise the following steps:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request
Link is accessed including Intranet and Intranet accesses the directory address that link correspondence Intranet is accessed;
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain with having permission to access catalogue
Location;
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.
Terminal is accessed present invention also offers a kind of Intranet, including memory, processor and is stored on a memory and can
The computer program run on a processor, following steps are realized during the computing device described program:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request
Link is accessed including Intranet and Intranet accesses the directory address that link correspondence Intranet is accessed;
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain with having permission to access catalogue
Location;
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.
Beneficial effects of the present invention are:
The present invention makes outer net could to be visited by the pass-through proxy server by the pass-through proxy server built
Intranet is asked, and link is accessed to the Intranet in Intranet access request and carries out security judgement, the access safety of Intranet has been ensured, together
When access Intranet the corresponding directory address of link and filter, the access directory address that reservation has permission, and its is corresponding
File is forwarded to outer net, this invention ensures that while outer net is able to access that Intranet, will by the pass-through proxy server built
Intranet and outer net are isolated, and outer net can only access the file of Intranet right of possession limit, make the static file on Intranet hard disk
Outer net is not exposed to the vital document such as configuration file, the security of Intranet access, and the pass-through proxy built is improved
Server can also mitigate the pressure of Intranet file server, improve number in the bandwidth and Intranet hard disk of Intranet file server
According to efficiency of transmission.
Brief description of the drawings
Fig. 1 is a kind of key step schematic diagram of Intranet access method according to the embodiment of the present invention;
Fig. 2 is to access terminal structure schematic diagram according to a kind of Intranet of the embodiment of the present invention;
Label declaration:
1st, memory;2nd, processor.
Embodiment
To describe technology contents, the objects and the effects of the present invention in detail, below in conjunction with embodiment and coordinate attached
Figure is explained in detail.
Fig. 1 is refer to, the invention provides a kind of Intranet access method, is comprised the following steps:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request
Link is accessed including Intranet and Intranet accesses the directory address that link correspondence Intranet is accessed;
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain with having permission to access catalogue
Location;
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.
It was found from foregoing description, the present invention makes outer net must be by the transfer by the pass-through proxy server built
Proxy server could access Intranet, and access the Intranet in Intranet access request link progress security judgement, ensure
The access safety of Intranet, filters while accessing Intranet the corresponding directory address of link, retains the access catalogue having permission
Address, and its corresponding file is forwarded to outer net, this invention ensures that while outer net is able to access that Intranet, passing through what is built
Pass-through proxy server is isolated Intranet and outer net, and outer net can only access the file of Intranet right of possession limit, make Intranet
The vital documents such as static file and configuration file on hard disk are not exposed to outer net, improve the security of Intranet access, and
And the pass-through proxy server built can also mitigate the pressure of Intranet file server, improve the band of Intranet file server
Wide and Intranet data in hard disk efficiency of transmission.
Further, described a kind of Intranet access method, in addition to:
Judge the Intranet access request whether be malicious attack access request;
If so, then obtaining the IP address of the corresponding outer net of the Intranet access request, the IP address correspondence outer net is shielded
Access request.
It was found from foregoing description, by the above method by further ensureing the security that Intranet is accessed, shielding malice is attacked
The access request hit.
Further, " judge the Intranet access request whether be malicious attack access request " be specially:
Judge whether the access frequency of the Intranet access request is more than predetermined threshold value, if so, being then the visit of malicious attack
Ask request.
It was found from foregoing description, it can effectively judge whether Intranet access request is malicious attack by the above method
Access request, has ensured the security that Intranet is accessed.
Further, the S4 is specially:
If it is not, then acquiring the permission to access catalogue in the directory address by default regular expression
Address.
It was found from foregoing description, by default regular expression, the directory address that the Intranet of lack of competence can be accessed
Filtered, it is ensured that the security that Intranet is accessed.
Further, the S5 is specially:
According to the permission to access directory address, generation inter access link;
The pass-through proxy server is controlled to be initiated a session request to the main frame of the Intranet, the session request includes
The inter access link, so that after the response of host session request, the main frame obtains the inter access link correspondence
Destination address under the corresponding file stream information of file;
The file stream information in the main frame transmission session object is obtained, and passes through the pass-through proxy server pair
The file stream information carries out temporal cache;
The pass-through proxy server is controlled to send the corresponding binary stream information of the file stream information to outer net.
It was found from foregoing description, by the above method, file is transmitted by binary stream information, text can be avoided
There is coding transcoding transmitting to outer net in part, and mess code occurs in the file for causing outer net to obtain, and asking of can not reading
Topic.
Further, described a kind of Intranet access method, in addition to:
Judge whether the Intranet access request amount on pass-through proxy server is more than default requesting threshold, if being more than,
Increase the spatial cache of pass-through proxy server.
It was found from foregoing description, by the above method, when the visit capacity on transfer proxy server increases, pass through increase
Spatial cache can share access pressure.
Fig. 2, a kind of Intranet access terminal of the invention provided, including memory 1, processor 2 are provided and are stored in
On reservoir 1 and the computer program that can be run on processor 2, the processor 2 realizes following steps when performing described program:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request
Link is accessed including Intranet and Intranet accesses the directory address that link correspondence Intranet is accessed;
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain with having permission to access catalogue
Location;
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.
Further, a kind of described Intranet accesses terminal, and the step of being realized during the computing device described program is also
Including:
Judge the Intranet access request whether be malicious attack access request;
If so, then obtaining the IP address of the corresponding outer net of the Intranet access request, the IP address correspondence outer net is shielded
Access request;
Judge whether the Intranet access request amount on pass-through proxy server is more than default requesting threshold, if being more than,
Increase the spatial cache of pass-through proxy server.
Further, a kind of described Intranet accesses terminal, " judges whether the Intranet access request is malicious attack
Access request " is specially:
Judge whether the access frequency of the Intranet access request is more than predetermined threshold value, if so, being then the visit of malicious attack
Ask request.
Further, a kind of described Intranet accesses terminal, and the S4 is specially:
If it is not, then acquiring the permission to access catalogue in the directory address by default regular expression
Address.
Further, a kind of described Intranet accesses terminal, and the S5 is specially:
According to the permission to access directory address, generation inter access link;
The pass-through proxy server is controlled to be initiated a session request to the main frame of the Intranet, the session request includes
The inter access link, so that after the response of host session request, the main frame obtains the inter access link correspondence
Destination address under the corresponding file stream information of file;
The file stream information in the main frame transmission session object is obtained, and passes through the pass-through proxy server pair
The file stream information carries out temporal cache;
The pass-through proxy server is controlled to send the corresponding binary stream information of the file stream information to outer net.
Further, a kind of described Intranet accesses terminal, and the step of being realized during the computing device described program is also
Including:
Judge whether the Intranet access request amount on pass-through proxy server is more than default requesting threshold, if being more than,
Increase the spatial cache of pass-through proxy server.
Fig. 1 is refer to, embodiments of the invention one are:
A kind of Intranet access method that the present invention is provided, it is characterised in that comprise the following steps:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request
Link is accessed including Intranet and Intranet accesses the directory address that link correspondence Intranet is accessed;
Include after the S2:
Judge the Intranet access request whether be malicious attack access request;
" judge the Intranet access request whether be malicious attack access request " be specially:
Judge whether the access frequency of the Intranet access request is more than predetermined threshold value, if so, being then the visit of malicious attack
Ask request.
If so, then obtaining the IP address of the corresponding outer net of the Intranet access request, the IP address correspondence outer net is shielded
Access request;
If it is not, then performing step S3.
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain with having permission to access catalogue
Location;
The S4 is specially:
If it is not, then acquiring the permission to access catalogue in the directory address by default regular expression
Address.
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net;
The S5 is specially:
According to the permission to access directory address, generation inter access link;
The pass-through proxy server is controlled to be initiated a session request to the main frame of the Intranet, the session request includes
The inter access link, so that after the response of host session request, the main frame obtains the inter access link correspondence
Destination address under the corresponding file stream information of file;
The file stream information in the main frame transmission session object is obtained, and passes through the pass-through proxy server pair
The file stream information carries out temporal cache;
The pass-through proxy server is controlled to send the corresponding binary stream information of the file stream information to outer net.
When performing step S1 to S5, while performing following steps:
Whether the Intranet access request amount on real-time judge pass-through proxy server is more than default requesting threshold, if greatly
In, then increase pass-through proxy server spatial cache.
Embodiments of the invention two are:
Pass-through proxy server is built in fort machine, realizing interface layer by Java code, there is provided used to outer net;
In interface layer parse external user access initiate Intranet access request, the Intranet access request include access link and with visit
Ask link corresponding directory path.
Judge whether the access frequency of Intranet access request is per second more than 8 times, if so, then please for the access of malicious attack
Ask, obtain the IP address of the corresponding outer net of the Intranet access request, shield the access request of the IP address correspondence outer net;
If it is not, then judging to access whether link is illegal access link;It is no to be, then limit its access;If it is not, then passing through
Default regular expression, acquires the permission to access directory address in the directory address;
Initiated a session request by the pass-through proxy server of fort machine to intranet host, the session request includes root
According to the inter access link for having permission to access directory address generation;After the response of host session request, the main frame obtains institute
The corresponding file stream information of file under the corresponding destination address of inter access link is stated, and sends the file stream information to fort
The pass-through proxy server of base machine, temporal cache is carried out by the pass-through proxy server to the file stream information;Control
The pass-through proxy server sends and acts on behalf of session to outer net, described to act on behalf of session and enter including the file stream information corresponding two
Stream information processed, the communication of outer net and Intranet is completed with this;
Whether the Intranet access request amount on real-time judge pass-through proxy server is more than default access in above process
Threshold value is measured, if being more than, increases the spatial cache of pass-through proxy server.
Fig. 2 is refer to, embodiments of the invention three are:
A kind of Intranet that the present invention is provided accesses terminal, including memory, processor and stores on a memory and can be
The computer program run on processor, following steps are realized during the computing device described program:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request
Link is accessed including Intranet and Intranet accesses the directory address that link correspondence Intranet is accessed;
Include after the S2:
Judge the Intranet access request whether be malicious attack access request;
" judge the Intranet access request whether be malicious attack access request " be specially:
Judge whether the access frequency of the Intranet access request is more than predetermined threshold value, if so, being then the visit of malicious attack
Ask request.
If so, then obtaining the IP address of the corresponding outer net of the Intranet access request, the IP address correspondence outer net is shielded
Access request;
If it is not, then performing step S3.
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain with having permission to access catalogue
Location;
The S4 is specially:
If it is not, then acquiring the permission to access catalogue in the directory address by default regular expression
Address.
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net;
The S5 is specially:
According to the permission to access directory address, generation inter access link;
The pass-through proxy server is controlled to be initiated a session request to the main frame of the Intranet, the session request includes
The inter access link, so that after the response of host session request, the main frame obtains the inter access link correspondence
Destination address under the corresponding file stream information of file;
The file stream information in the main frame transmission session object is obtained, and passes through the pass-through proxy server pair
The file stream information carries out temporal cache;
The pass-through proxy server is controlled to send the corresponding binary stream information of the file stream information to outer net.
When performing step S1 to S5, while performing following steps:
Whether the Intranet access request amount on real-time judge pass-through proxy server is more than default requesting threshold, if greatly
In, then increase pass-through proxy server spatial cache.
In summary, the present invention makes outer net to be taken by the pass-through proxy by the pass-through proxy server built
Business device could access Intranet, and access the Intranet in Intranet access request link progress security judgement, ensure Intranet
Access safety, filters while accessing Intranet the corresponding directory address of link, retains the access directory address having permission, and
Its corresponding file is forwarded to outer net, this invention ensures that while outer net is able to access that Intranet, passing through the transfer generation built
Reason server is isolated Intranet and outer net, and outer net can only access the file of Intranet right of possession limit, make on Intranet hard disk
Static file and the vital document such as configuration file be not exposed to outer net, improve the security of Intranet access, and build
Pass-through proxy server can also mitigate the pressure of Intranet file server, improve the bandwidth of Intranet file server and interior
Net data in hard disk efficiency of transmission.
Embodiments of the invention are the foregoing is only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalents that bright specification and accompanying drawing content are made, or other related technical fields are directly or indirectly used in, similarly
It is included within the scope of the present invention.
Claims (12)
1. a kind of Intranet access method, it is characterised in that comprise the following steps:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request includes
Intranet accesses link and Intranet accesses the directory address that link correspondence Intranet is accessed;
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain having permission to access directory address;
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.
2. a kind of Intranet access method according to claim 1, it is characterised in that also include:
Judge the Intranet access request whether be malicious attack access request;
If so, then obtaining the IP address of the corresponding outer net of the Intranet access request, the visit of the IP address correspondence outer net is shielded
Ask request.
3. a kind of Intranet access method according to claim 2, it is characterised in that " judge that the Intranet access request is
The no access request for malicious attack " is specially:
Judge whether the access frequency of the Intranet access request is more than predetermined threshold value, if so, then please for the access of malicious attack
Ask.
4. a kind of Intranet access method according to claim 1, it is characterised in that the S4 is specially:
If it is not, then acquiring the permission to access directory address in the directory address by default regular expression.
5. a kind of Intranet access method according to claim 1, it is characterised in that the S5 is specially:
According to the permission to access directory address, generation inter access link;
The pass-through proxy server is controlled to be initiated a session request to the main frame of the Intranet, the session request includes described
Inter access is linked, so that after the response of host session request, the main frame obtains the inter access and links corresponding mesh
Mark the corresponding file stream information of file under address;
The file stream information in the main frame transmission session object is obtained, and by the pass-through proxy server to described
File stream information carries out temporal cache;
The pass-through proxy server is controlled to send the corresponding binary stream information of the file stream information to outer net.
6. a kind of Intranet access method according to claim 1, it is characterised in that also include:
Judge whether the Intranet access request amount on pass-through proxy server is more than default requesting threshold, if being more than, increase
The spatial cache of pass-through proxy server.
7. a kind of Intranet accesses terminal, including memory, processor and storage can be run on a memory and on a processor
Computer program, it is characterised in that realize following steps during the computing device described program:
S1:Build a pass-through proxy server;
S2:The pass-through proxy server is controlled to obtain the Intranet access request that outer net is sent, the Intranet access request includes
Intranet accesses link and Intranet accesses the directory address that link correspondence Intranet is accessed;
S3:Judge that Intranet accesses whether link is illegal access link;
S4:If it is not, then filtering the reference address of lack of competence in the directory address, obtain having permission to access directory address;
S5:The corresponding fileinfo of the permission to access directory address is obtained, and is forwarded to the outer net.
8. a kind of Intranet according to claim 7 accesses terminal, it is characterised in that during the computing device described program
The step of realizing also includes:
Judge the Intranet access request whether be malicious attack access request;
If so, then obtaining the IP address of the corresponding outer net of the Intranet access request, the visit of the IP address correspondence outer net is shielded
Ask request;
Judge whether the Intranet access request amount on pass-through proxy server is more than default requesting threshold, if being more than, increase
The spatial cache of pass-through proxy server.
9. a kind of Intranet according to claim 8 accesses terminal, it is characterised in that " judge that the Intranet access request is
The no access request for malicious attack " is specially:
Judge whether the access frequency of the Intranet access request is more than predetermined threshold value, if so, then please for the access of malicious attack
Ask.
10. a kind of Intranet according to claim 7 accesses terminal, it is characterised in that the S4 is specially:
If it is not, then acquiring the permission to access directory address in the directory address by default regular expression.
11. a kind of Intranet according to claim 7 accesses terminal, it is characterised in that the S5 is specially:
According to the permission to access directory address, generation inter access link;
The pass-through proxy server is controlled to be initiated a session request to the main frame of the Intranet, the session request includes described
Inter access is linked, so that after the response of host session request, the main frame obtains the inter access and links corresponding mesh
Mark the corresponding file stream information of file under address;
The file stream information in the main frame transmission session object is obtained, and by the pass-through proxy server to described
File stream information carries out temporal cache;
The pass-through proxy server is controlled to send the corresponding binary stream information of the file stream information to outer net.
12. a kind of Intranet according to claim 7 accesses terminal, it is characterised in that the computing device described program
The step of Shi Shixian, also includes:
Judge whether the Intranet access request amount on pass-through proxy server is more than default requesting threshold, if being more than, increase
The spatial cache of pass-through proxy server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710514423.9A CN107277026A (en) | 2017-06-29 | 2017-06-29 | A kind of Intranet access method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710514423.9A CN107277026A (en) | 2017-06-29 | 2017-06-29 | A kind of Intranet access method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107277026A true CN107277026A (en) | 2017-10-20 |
Family
ID=60070891
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710514423.9A Pending CN107277026A (en) | 2017-06-29 | 2017-06-29 | A kind of Intranet access method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107277026A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107846405A (en) * | 2017-10-31 | 2018-03-27 | 北京百悟科技有限公司 | The control system and implementation method that intranet and extranet file is exchanged visits |
CN110473622A (en) * | 2018-05-09 | 2019-11-19 | 上海商汤智能科技有限公司 | Information processing method and device, electronic equipment and storage medium |
CN110535961A (en) * | 2019-09-03 | 2019-12-03 | 中国联合网络通信集团有限公司 | Resource acquiring method, device, electronic equipment and storage medium |
CN110677404A (en) * | 2019-09-25 | 2020-01-10 | 四川新网银行股份有限公司 | User access control method for Linux host |
CN110704066A (en) * | 2019-10-11 | 2020-01-17 | Oppo广东移动通信有限公司 | Code compiling method, device, equipment and storage medium |
CN110838957A (en) * | 2019-11-27 | 2020-02-25 | 深圳开思时代科技有限公司 | API interface debugging method based on server |
CN111064742A (en) * | 2019-12-28 | 2020-04-24 | 杭州安恒信息技术股份有限公司 | Method, device and related equipment for realizing intranet access based on network agent |
CN111355791A (en) * | 2020-02-25 | 2020-06-30 | 腾讯科技(深圳)有限公司 | File transmission method and device, computer equipment and storage medium |
CN111371763A (en) * | 2020-02-26 | 2020-07-03 | 高新兴科技集团股份有限公司 | Network penetration access method and system for pictures, storage medium and electronic equipment |
CN111460460A (en) * | 2020-04-02 | 2020-07-28 | 北京金山云网络技术有限公司 | Task access method, device, proxy server and machine-readable storage medium |
CN112087340A (en) * | 2020-09-18 | 2020-12-15 | 四川长虹电器股份有限公司 | Test method and system for reducing performance test cost in cloud environment |
CN112261055A (en) * | 2020-10-26 | 2021-01-22 | 南京协宏软件技术有限公司 | Method, system and gateway equipment for directionally pushing real-time data |
CN112419520A (en) * | 2020-11-30 | 2021-02-26 | 杭州华云科技有限公司 | 5G cloud SAAS parking lot charging system and method |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859169A (en) * | 2005-12-01 | 2006-11-08 | 华为技术有限公司 | File managing system and method in digital household network |
US20070220154A1 (en) * | 2006-03-17 | 2007-09-20 | Microsoft Corporation | Authentication and authorization of extranet clients to a secure intranet business application in a perimeter network topology |
CN101242336A (en) * | 2008-03-13 | 2008-08-13 | 杭州华三通信技术有限公司 | Method for remote access to intranet Web server and Web proxy server |
CN101753606A (en) * | 2008-12-03 | 2010-06-23 | 北京天融信科技有限公司 | Method for realizing WEB reverse proxy |
CN101969407A (en) * | 2010-11-03 | 2011-02-09 | 中国电信股份有限公司 | Home gateway based storage service method and storage service device |
CN101989974A (en) * | 2009-08-04 | 2011-03-23 | 西安交大捷普网络科技有限公司 | Safety control method for intranet WEB access of security socket layer virtual private network (SSL VPN) |
CN102843437A (en) * | 2012-09-17 | 2012-12-26 | 北京星网锐捷网络技术有限公司 | Conversion method and device for webpage application and network device |
CN103634396A (en) * | 2013-11-28 | 2014-03-12 | 武汉钢铁(集团)公司 | Method, gateway equipment and system for accessing intranet webpage service data |
CN104301385A (en) * | 2014-09-05 | 2015-01-21 | 北京奇虎科技有限公司 | Data acquisition method, calculation equipment, mobile equipment and system |
CN105187430A (en) * | 2015-09-18 | 2015-12-23 | 浪潮通用软件有限公司 | Reverse proxy server, reverse proxy system and reverse proxy method |
-
2017
- 2017-06-29 CN CN201710514423.9A patent/CN107277026A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859169A (en) * | 2005-12-01 | 2006-11-08 | 华为技术有限公司 | File managing system and method in digital household network |
US20070220154A1 (en) * | 2006-03-17 | 2007-09-20 | Microsoft Corporation | Authentication and authorization of extranet clients to a secure intranet business application in a perimeter network topology |
CN101242336A (en) * | 2008-03-13 | 2008-08-13 | 杭州华三通信技术有限公司 | Method for remote access to intranet Web server and Web proxy server |
CN101753606A (en) * | 2008-12-03 | 2010-06-23 | 北京天融信科技有限公司 | Method for realizing WEB reverse proxy |
CN101989974A (en) * | 2009-08-04 | 2011-03-23 | 西安交大捷普网络科技有限公司 | Safety control method for intranet WEB access of security socket layer virtual private network (SSL VPN) |
CN101969407A (en) * | 2010-11-03 | 2011-02-09 | 中国电信股份有限公司 | Home gateway based storage service method and storage service device |
CN102843437A (en) * | 2012-09-17 | 2012-12-26 | 北京星网锐捷网络技术有限公司 | Conversion method and device for webpage application and network device |
CN103634396A (en) * | 2013-11-28 | 2014-03-12 | 武汉钢铁(集团)公司 | Method, gateway equipment and system for accessing intranet webpage service data |
CN104301385A (en) * | 2014-09-05 | 2015-01-21 | 北京奇虎科技有限公司 | Data acquisition method, calculation equipment, mobile equipment and system |
CN105187430A (en) * | 2015-09-18 | 2015-12-23 | 浪潮通用软件有限公司 | Reverse proxy server, reverse proxy system and reverse proxy method |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107846405A (en) * | 2017-10-31 | 2018-03-27 | 北京百悟科技有限公司 | The control system and implementation method that intranet and extranet file is exchanged visits |
CN110473622A (en) * | 2018-05-09 | 2019-11-19 | 上海商汤智能科技有限公司 | Information processing method and device, electronic equipment and storage medium |
CN110473622B (en) * | 2018-05-09 | 2022-10-21 | 上海商汤智能科技有限公司 | Information processing method and device, electronic device and storage medium |
CN110535961B (en) * | 2019-09-03 | 2022-01-28 | 中国联合网络通信集团有限公司 | Resource acquisition method and device, electronic equipment and storage medium |
CN110535961A (en) * | 2019-09-03 | 2019-12-03 | 中国联合网络通信集团有限公司 | Resource acquiring method, device, electronic equipment and storage medium |
CN110677404A (en) * | 2019-09-25 | 2020-01-10 | 四川新网银行股份有限公司 | User access control method for Linux host |
CN110704066A (en) * | 2019-10-11 | 2020-01-17 | Oppo广东移动通信有限公司 | Code compiling method, device, equipment and storage medium |
CN110704066B (en) * | 2019-10-11 | 2023-09-08 | Oppo广东移动通信有限公司 | Code compiling method, device, equipment and storage medium |
CN110838957A (en) * | 2019-11-27 | 2020-02-25 | 深圳开思时代科技有限公司 | API interface debugging method based on server |
CN111064742B (en) * | 2019-12-28 | 2022-07-05 | 杭州安恒信息技术股份有限公司 | Method, device and related equipment for realizing intranet access based on network agent |
CN111064742A (en) * | 2019-12-28 | 2020-04-24 | 杭州安恒信息技术股份有限公司 | Method, device and related equipment for realizing intranet access based on network agent |
CN111355791A (en) * | 2020-02-25 | 2020-06-30 | 腾讯科技(深圳)有限公司 | File transmission method and device, computer equipment and storage medium |
CN111371763B (en) * | 2020-02-26 | 2022-07-05 | 高新兴科技集团股份有限公司 | Network penetration access method and system for pictures, storage medium and electronic equipment |
CN111371763A (en) * | 2020-02-26 | 2020-07-03 | 高新兴科技集团股份有限公司 | Network penetration access method and system for pictures, storage medium and electronic equipment |
CN111460460A (en) * | 2020-04-02 | 2020-07-28 | 北京金山云网络技术有限公司 | Task access method, device, proxy server and machine-readable storage medium |
CN111460460B (en) * | 2020-04-02 | 2023-12-05 | 北京金山云网络技术有限公司 | Task access method, device, proxy server and machine-readable storage medium |
CN112087340A (en) * | 2020-09-18 | 2020-12-15 | 四川长虹电器股份有限公司 | Test method and system for reducing performance test cost in cloud environment |
CN112261055A (en) * | 2020-10-26 | 2021-01-22 | 南京协宏软件技术有限公司 | Method, system and gateway equipment for directionally pushing real-time data |
CN112261055B (en) * | 2020-10-26 | 2023-12-12 | 南京协宏软件技术有限公司 | Method, system and gateway equipment for directional pushing of real-time data |
CN112419520A (en) * | 2020-11-30 | 2021-02-26 | 杭州华云科技有限公司 | 5G cloud SAAS parking lot charging system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107277026A (en) | A kind of Intranet access method and terminal | |
US11797636B2 (en) | Intermediary server for providing secure access to web-based services | |
US9313227B2 (en) | Gateway-based audit log and method for prevention of data leakage | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN104392008B (en) | Web data acquisition methods, browser client and CDN server | |
CN108616490A (en) | A kind of method for network access control, apparatus and system | |
CN106445588B (en) | The update method and device of attribute information | |
JP2003186764A (en) | Communication network with controlled access to web resources | |
CN106161617A (en) | Reverse proxy method based on NODEJS, Reverse Proxy and system | |
CN103634391B (en) | Method and system for realizing conversation sharing | |
JP2014534498A (en) | Apparatus, method and computer readable storage medium for protecting JavaScript | |
CN103095530A (en) | Method and system for sensitive information monitoring and leakage prevention based on front-end gateway | |
JP6666441B2 (en) | IP address obtaining method and apparatus | |
CN111400704A (en) | Method, device and equipment for realizing web access security audit and computer readable medium | |
CN107135249A (en) | Data download method and device | |
CN110276202A (en) | A kind of detection method and device of unserializing loophole | |
CN104008331A (en) | Access method, device and system of malicious web | |
CN109508437A (en) | A kind of search website auditing method, system and gateway and storage medium | |
CN108023921A (en) | The cut-in method and device of a kind of third-party platform | |
CN109450990A (en) | A kind of cloud storage implementation method and electronic equipment based on educational system | |
CN103561076A (en) | Webpage trojan-linking real-time protection method and system based on cloud | |
CN103501292B (en) | Method and system for achieving data safety protection by using standby mobile phone | |
CN106295366B (en) | Sensitive data identification method and device | |
CN112929378A (en) | Cross-domain single-point login service saving and acquiring method, system, device and medium | |
US11128639B2 (en) | Dynamic injection or modification of headers to provide intelligence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171020 |