CN111371763A - Network penetration access method and system for pictures, storage medium and electronic equipment - Google Patents
Network penetration access method and system for pictures, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN111371763A CN111371763A CN202010121433.8A CN202010121433A CN111371763A CN 111371763 A CN111371763 A CN 111371763A CN 202010121433 A CN202010121433 A CN 202010121433A CN 111371763 A CN111371763 A CN 111371763A
- Authority
- CN
- China
- Prior art keywords
- network
- intranet
- picture
- access
- browser
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/029—Firewall traversal, e.g. tunnelling or, creating pinholes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
Abstract
The invention provides a network penetration access method, a system, a computer storage medium and electronic equipment for pictures, wherein the method is used for the network penetration access of an outer network browser to inner network pictures, a network gate is arranged between an outer network and an inner network, and the method comprises the following steps: s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate; s2, the network gate forwards the request instruction to the intranet service; s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper; s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper; s5, the gatekeeper forwards the modified access instruction linked with the picture to proxy service; and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
Description
Technical Field
The present invention relates to the field of computer networks, and more particularly, to a network penetration method for accessing pictures, a network penetration system for accessing pictures, a computer storage medium, and an electronic device.
Background
Under the condition that networks are isolated from each other and a gateway exists, picture links generated by an internal network can only be accessed by the internal network, and an external network cannot directly access pictures of the internal network, so that the conventional scheme is that pictures are converted into Base64 character strings and then are transmitted to the external network and then are restored into pictures, the realization is very simple, but one obvious defect is that the Base64 character strings are too large (a small picture of 15KB is converted into a Base64 big appointment which becomes 20KB), the transmission quantity of the networks is greatly increased, and if the pictures are high-definition pictures, the transmission quantity is larger and is amazing, and the access speed of the pictures is seriously influenced.
Disclosure of Invention
In view of the above, the present invention provides a network penetration access method for pictures, a network penetration access system for pictures, a computer storage medium and an electronic device, which can effectively improve the access speed of pictures.
In order to solve the above technical problems, in one aspect, the present invention provides a method for network penetration access of pictures, which is used for network penetration access of an intranet picture by an extranet browser, wherein a gatekeeper is arranged between an extranet and an intranet, and the method includes the following steps: s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate; s2, the gatekeeper forwards the request instruction to an intranet service; s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper; s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper; s5, the gatekeeper forwards the modified access instruction of the picture link to an agent service; and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
According to the network penetration access method of the picture, the intranet service and the proxy service are added, the service identifies the network ip of the accessed browser and then dynamically replaces the picture access address, so that consistent access experience of the intranet and the extranet is achieved, the purpose of the picture network penetration access is achieved, compared with a Base64 character string mode, due to the fact that the layer of Base64 encoding and decoding is omitted, the network transmission amount is greatly reduced, time is not spent on encoding and decoding, the performance is improved, and the access speed is higher.
According to some embodiments of the present invention, in step S3, the intranet service dynamically modifies the picture link of the intranet picture according to the routing rule.
According to some embodiments of the invention, step S3 includes: s31, the intranet service receives the request instruction and analyzes the network ip of the client of the request instruction; s32, judging whether the network ip of the client meets the conversion condition according to the routing rule, and replacing the picture link address of the intranet picture with a target address when the network ip of the client meets the conversion condition to obtain the modified picture link; and S33, sending the modified picture link to the gatekeeper.
According to some embodiments of the invention, the transition condition comprises: starting a route configuration rule to enable the route configuration rule to take effect; the client network ip is consistent with the ip in the configuration or the client network ip is in the configured subnet section.
According to some embodiments of the present invention, in step S6, the proxy service forwards the access instruction to the intranet service according to a path configuration rule.
In a second aspect, an embodiment of the present invention provides a network penetration accessing system for pictures, which is used for a web browser to perform network penetration accessing on pictures in an internal network, wherein a gatekeeper is disposed between an external network and the internal network, and the network penetration accessing system includes: the command acquisition module can acquire a request command of an external network browser for an internal network picture and send the request command to the network gate; the intranet service module can receive the request instruction forwarded by the gatekeeper, dynamically modify the picture link of the intranet picture and send the modified picture link to the gatekeeper, and the gatekeeper returns the modified picture link to the browser and receives and forwards an access instruction for accessing the modified picture link by the browser; and the agent service module can receive the access instruction and forward the access instruction to the intranet service module, and the intranet service module accesses the modified picture link.
According to some embodiments of the present invention, the intranet service module dynamically modifies the picture link of the intranet picture according to a routing rule.
According to some embodiments of the present invention, the proxy service module forwards the access instruction to the intranet service module according to a path configuration rule.
In a third aspect, an embodiment of the present invention provides a computer storage medium including one or more computer instructions, which when executed implement the method according to the above embodiment.
An electronic device according to a fourth aspect of the present invention comprises a memory for storing one or more computer instructions and a processor; the processor is configured to invoke and execute the one or more computer instructions to implement the method according to any of the embodiments described above.
Drawings
Fig. 1 is a flowchart of a method for network-through access of pictures according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a network penetration accessing system for pictures according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the invention.
Reference numerals:
the network penetration access system 100; an outer net 101; an intranet 102; a network gate 103; a browser 200;
an instruction acquisition module 10; an intranet service module 20; a proxy service module 30;
an electronic device 300;
a memory 310; an operating system 311; an application 312;
a processor 320; a network interface 330; an input device 340; a hard disk 350; a display device 360.
Detailed Description
The following detailed description of embodiments of the present invention will be made with reference to the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
First, a network penetration access method for pictures according to an embodiment of the present invention is described in detail with reference to the accompanying drawings.
As shown in fig. 1, the method for network-through access to pictures according to the embodiment of the present invention can be used for network-through access to pictures in an internal network by an external network browser, wherein a gatekeeper is provided between the external network and the internal network, and the method includes the following steps:
s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate;
s2, the gatekeeper forwards the request instruction to an intranet service;
s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper;
s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper;
s5, the gatekeeper forwards the modified access instruction of the picture link to an agent service;
and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
In other words, the method for network penetration access of pictures according to the embodiment of the present invention can be used to implement undifferentiated access of intranet and extranet pictures, when an extranet browser accesses an intranet picture, a request instruction of an intranet picture to be accessed is first forwarded to an intranet through a gatekeeper, an intranet service dynamically modifies a picture link of the intranet picture, replaces an access link address of the intranet picture, and forwards the replaced access link address to a browser through the gatekeeper, the browser initiates an access request after obtaining the replaced access link address of the picture, the access request is forwarded to a proxy service after reaching the gatekeeper, the proxy service forwards the access request to the intranet service according to rules, and the intranet service accesses the modified picture link.
Therefore, according to the network penetration access method of the picture, by adding the intranet service and the proxy service, the service can dynamically replace the picture access address after identifying the network ip of the accessed browser, so that the consistent access experience of the intranet and the extranet is realized, and the purpose of the picture network penetration access is achieved.
According to an embodiment of the present invention, in step S3, the intranet service dynamically modifies the picture link of the intranet picture according to the routing rule. Preferably, step S3 includes:
and S31, the intranet service receives the request instruction and analyzes the network ip of the client of the request instruction.
S32, judging whether the network ip of the client meets the conversion condition according to the routing rule, and replacing the picture link address of the intranet picture with a target address when the network ip meets the conversion condition to obtain the modified picture link.
And S33, sending the modified picture link to the gatekeeper. Wherein the transition condition comprises: starting a route configuration rule to enable the route configuration rule to take effect; the client network ip is consistent with the ip in the configuration or the client network ip is in the configured subnet section.
In some embodiments of the present invention, in step S6, the proxy service forwards the access instruction to the intranet service according to a path configuration rule.
That is to say, according to the network penetration access method for the pictures provided by the embodiment of the invention, the indirect communication of the picture link between the internal network and the external network is mainly realized in a proxy mode and a routing rule forwarding mode, so that the network penetration access of the pictures is realized.
In order to enable the internal and external networks to access, the network penetration access method of the picture adopts a proxy mode, the external network picture request is forwarded to the internal network through a proxy, and in order to enable the external network browser to access the picture normally, the internal network service dynamically replaces the request picture access address according to the route configuration rule, so that the internal network browser returns the internal network access address when accessing, and the external network browser returns the proxy address when accessing, thereby realizing the network penetration access of the picture, and obtaining consistent access experience no matter the internal network or the external network.
After the internal and external networks are isolated by the network gate, the communication can be carried out only through the port opened by the network gate.
Specifically, according to the network penetration access method of the picture, the proxy layer is added in the intranet, the port opened by the main proxy gatekeeper forwards the request instruction to the intranet, and the proxy layer is placed in the intranet, so that the network penetration access method of the picture can be communicated with the intranet.
Agent configuration references are as follows:
according to the network penetration access method of the picture, the configuration of the routing rule is added to the intranet service, when the intranet service receives the request, the intranet service analyzes the network ip of the requested client, judges whether the network ip of the client meets the conversion condition according to the routing rule, and replaces the original picture link address with the target address if the network ip of the client meets the conversion condition. Because the subnet mask is added, the routing rule configuration not only supports the matching of fixed ip, but also supports the matching of network segments, and has higher flexibility.
The route reference configuration is as follows:
finally, the address of the intranet agent service is configured on the gateway agent forwarding layer (the configuration function is provided by the gateway), and the intranet service accesses the modified picture link.
In summary, according to the network penetration access method for pictures in the embodiments of the present invention, through proxy configuration and service routing rules, different accessible addresses can be given by a service according to ip when browsers of an intranet and an intranet access, so that network penetration access of pictures is realized, and an access speed is ensured. According to the method, a large Base64 is replaced in a proxy mode, the network transmission amount is greatly reduced, the Base64 is abandoned, the conversion and reduction processes of the two parties can be reduced, the performance is improved, and because picture links are replaced, the internal network and the external network can obtain consistent experience, access is carried out by taking the picture links, and no difference exists in a browser.
As shown in fig. 2, a system 100 for network-through access of pictures according to an embodiment of the present invention is used for network-through access of an external web browser 200 to internal web pictures, a gateway 103 is provided between an external web 101 and an internal web 102, and the system 100 for network-through access includes: an instruction acquisition module 10, an intranet service module 20 and a proxy service module 30.
Specifically, the instruction obtaining module 10 can obtain a request instruction of an external web browser for an internal web picture, and send the request instruction to the gatekeeper, the internal web service module 20 can receive the request instruction forwarded by the gatekeeper, dynamically modify a picture link of the internal web picture and send the modified picture link to the gatekeeper, the gatekeeper returns the modified picture link to the browser, and receives and forwards an access instruction for the browser to access the modified picture link, and the proxy service module 30 can receive the access instruction and forward the access instruction to the internal web service module 20, and the internal web service module 20 accesses the modified picture link. The intranet service module 20 dynamically modifies the picture link of the intranet picture according to the routing rule, and the proxy service module 30 forwards the access instruction to the intranet service module 20 according to the path configuration rule.
Since the network penetration access method for the picture according to the above embodiment of the present invention has the above technical effects, the network penetration access system 100 for the picture using the above method also has a corresponding technical effect, that is, by adding the intranet service 20 and the proxy service 30, the service identifies the network ip of the browser accessed and then dynamically replaces the picture access address, thereby realizing the consistent access experience of the intranet and the extranet, and achieving the purpose of the penetration access of the picture network.
In addition, the present invention also provides a computer storage medium, which includes one or more computer instructions, and when executed, the one or more computer instructions implement any of the above described network penetration access methods for pictures.
That is, the computer storage medium stores a computer program, which, when executed by a processor, causes the processor to execute any one of the above-described methods of network-penetration access of pictures.
As shown in fig. 3, an embodiment of the present invention provides an electronic device 300, which includes a memory 310 and a processor 320, where the memory 310 is configured to store one or more computer instructions, and the processor 320 is configured to call and execute the one or more computer instructions, so as to implement any one of the methods described above.
That is, the electronic device 300 includes: a processor 320 and a memory 310, in which memory 310 computer program instructions are stored, wherein the computer program instructions, when executed by the processor, cause the processor 320 to perform any of the methods described above.
Further, as shown in fig. 3, the electronic device 300 further includes a network interface 330, an input device 340, a hard disk 350, and a display device 360.
The various interfaces and devices described above may be interconnected by a bus architecture. A bus architecture may be any architecture that may include any number of interconnected buses and bridges. Various circuits of one or more Central Processing Units (CPUs), represented in particular by processor 320, and one or more memories, represented by memory 310, are coupled together. The bus architecture may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like. It will be appreciated that a bus architecture is used to enable communications among the components. The bus architecture includes a power bus, a control bus, and a status signal bus, in addition to a data bus, all of which are well known in the art and therefore will not be described in detail herein.
The network interface 330 may be connected to a network (e.g., the internet, a local area network, etc.), and may obtain relevant data from the network and store the relevant data in the hard disk 350.
The input device 340 may receive various commands input by an operator and send the commands to the processor 320 for execution. The input device 340 may include a keyboard or a pointing device (e.g., a mouse, a trackball, a touch pad, a touch screen, or the like).
The display device 360 may display the result of the instructions executed by the processor 320.
The memory 310 is used for storing programs and data necessary for operating the operating system, and data such as intermediate results in the calculation process of the processor 320.
It will be appreciated that memory 310 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. The memory 310 of the apparatus and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 310 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 311 and application programs 312.
The operating system 311 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs 312 include various application programs, such as a Browser (Browser), and are used for implementing various application services. A program implementing methods of embodiments of the present invention may be included in application 312.
The method disclosed by the above embodiment of the present invention can be applied to the processor 320, or implemented by the processor 320. Processor 320 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 320. The processor 320 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, and may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present invention. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 310, and the processor 320 reads the information in the memory 310 and completes the steps of the method in combination with the hardware.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
In particular, the processor 320 is also configured to read the computer program and execute any of the methods described above.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be physically included alone, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute some steps of the transceiving method according to various embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (10)
1. A network penetration access method of pictures is used for the network penetration access of an outer net browser to pictures of an inner net, a net gate is arranged between the outer net and the inner net, and the method is characterized by comprising the following steps:
s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate;
s2, the gatekeeper forwards the request instruction to an intranet service;
s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper;
s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper;
s5, the gatekeeper forwards the modified access instruction of the picture link to an agent service;
and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
2. The method according to claim 1, wherein in step S3, the intranet service dynamically modifies the picture link of the intranet picture according to routing rules.
3. The method according to claim 2, wherein step S3 includes:
s31, the intranet service receives the request instruction and analyzes the network ip of the client of the request instruction;
s32, judging whether the network ip of the client meets the conversion condition according to the routing rule, and replacing the picture link address of the intranet picture with a target address when the network ip of the client meets the conversion condition to obtain the modified picture link;
and S33, sending the modified picture link to the gatekeeper.
4. The method of claim 3, wherein the transition condition comprises:
starting a route configuration rule to enable the route configuration rule to take effect;
the client network ip is consistent with the ip in the configuration or the client network ip is in the configured subnet section.
5. The method according to claim 1, wherein in step S6, the proxy service forwards the access instruction to the intranet service according to a path configuration rule.
6. A network penetration access system of pictures is used for a network penetration access of an outer net browser to pictures of an inner net, a net gate is arranged between the outer net and the inner net, and the network penetration access system comprises:
the command acquisition module can acquire a request command of an external network browser for an internal network picture and send the request command to the network gate;
the intranet service module can receive the request instruction forwarded by the gatekeeper, dynamically modify the picture link of the intranet picture and send the modified picture link to the gatekeeper, and the gatekeeper returns the modified picture link to the browser and receives and forwards an access instruction for accessing the modified picture link by the browser;
and the agent service module can receive the access instruction and forward the access instruction to the intranet service module, and the intranet service module accesses the modified picture link.
7. The system according to claim 6, wherein the intranet service module dynamically modifies the picture links of the intranet pictures according to routing rules.
8. The system according to claim 6, wherein the proxy service module forwards the access command to the intranet service module according to a path configuration rule.
9. A computer storage medium comprising one or more computer instructions which, when executed, implement the method of any one of claims 1-5.
10. An electronic device comprising a memory and a processor, wherein,
the memory is to store one or more computer instructions;
the processor is configured to invoke and execute the one or more computer instructions to implement the method of any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010121433.8A CN111371763B (en) | 2020-02-26 | 2020-02-26 | Network penetration access method and system for pictures, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010121433.8A CN111371763B (en) | 2020-02-26 | 2020-02-26 | Network penetration access method and system for pictures, storage medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111371763A true CN111371763A (en) | 2020-07-03 |
CN111371763B CN111371763B (en) | 2022-07-05 |
Family
ID=71210113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010121433.8A Active CN111371763B (en) | 2020-02-26 | 2020-02-26 | Network penetration access method and system for pictures, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111371763B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111741017A (en) * | 2020-07-23 | 2020-10-02 | 平安国际智慧城市科技股份有限公司 | Data transmission method between internal network and external network and related equipment |
CN114401119A (en) * | 2021-12-27 | 2022-04-26 | 中国电信股份有限公司 | Method, device and system for detecting interconnection of internal network and external network and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138004A1 (en) * | 2003-12-17 | 2005-06-23 | Microsoft Corporation | Link modification system and method |
WO2007075099A1 (en) * | 2005-12-27 | 2007-07-05 | Siemens Aktiengesellschaft | Automation network, access service proxy for automation network method for transmitting operating between programmable controller remote computer |
CN101175030A (en) * | 2006-10-31 | 2008-05-07 | 中兴通讯股份有限公司 | Method for implementing proxy to multiple isomorphic subnets |
CN104077240A (en) * | 2014-06-26 | 2014-10-01 | 桂林长海发展有限责任公司 | Method and device for calling gate data with internal and external networks being isolated |
CN107277026A (en) * | 2017-06-29 | 2017-10-20 | 福建天泉教育科技有限公司 | A kind of Intranet access method and terminal |
-
2020
- 2020-02-26 CN CN202010121433.8A patent/CN111371763B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050138004A1 (en) * | 2003-12-17 | 2005-06-23 | Microsoft Corporation | Link modification system and method |
WO2007075099A1 (en) * | 2005-12-27 | 2007-07-05 | Siemens Aktiengesellschaft | Automation network, access service proxy for automation network method for transmitting operating between programmable controller remote computer |
CN101175030A (en) * | 2006-10-31 | 2008-05-07 | 中兴通讯股份有限公司 | Method for implementing proxy to multiple isomorphic subnets |
CN104077240A (en) * | 2014-06-26 | 2014-10-01 | 桂林长海发展有限责任公司 | Method and device for calling gate data with internal and external networks being isolated |
CN107277026A (en) * | 2017-06-29 | 2017-10-20 | 福建天泉教育科技有限公司 | A kind of Intranet access method and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111741017A (en) * | 2020-07-23 | 2020-10-02 | 平安国际智慧城市科技股份有限公司 | Data transmission method between internal network and external network and related equipment |
CN114401119A (en) * | 2021-12-27 | 2022-04-26 | 中国电信股份有限公司 | Method, device and system for detecting interconnection of internal network and external network and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN111371763B (en) | 2022-07-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11647096B2 (en) | Method and apparatus for automatically optimizing the loading of images in a cloud-based proxy service | |
CN112637346B (en) | Proxy method, proxy device, proxy server and storage medium | |
US9934065B1 (en) | Servicing I/O requests in an I/O adapter device | |
US6327614B1 (en) | Network server device and file management system using cache associated with network interface processors for redirecting requested information between connection networks | |
US20090271172A1 (en) | Emulating A Computer Run Time Environment | |
US20070280206A1 (en) | Method for consuming heterogeneous services on heterogeneous devices using script plugins | |
CN111371763B (en) | Network penetration access method and system for pictures, storage medium and electronic equipment | |
CN109656637B (en) | Rendering method and device for cross-platform call of OpenGL ES and computer storage medium | |
CN107135249B (en) | Data downloading method and device | |
CN111885172A (en) | Cross-network platform cascading method, computer storage medium and electronic device | |
KR102563165B1 (en) | Memory access request scheduling method, device, apparatus, and storage medium | |
CN112822061B (en) | Method and system for exposing service to outside by edge node | |
CN115225707A (en) | Resource access method and device | |
CN110929128A (en) | Data crawling method, device, equipment and medium | |
CN111712799B (en) | Automatic distribution of models for execution on non-edge devices and edge devices | |
US20230088115A1 (en) | Generating early hints informational responses at an intermediary server | |
CN110677699A (en) | Video stream and/or picture stream data sharing method and device and electronic equipment | |
CN113726855B (en) | Service aggregation method, device, electronic equipment and computer-readable storage medium | |
US20230224302A1 (en) | Techniques for providing hypertext transfer protocol through a secure environment | |
WO2017011021A1 (en) | Systems and methods facilitating reduced latency via stashing in systems on chips | |
CN112910910B (en) | Method, device, equipment and storage medium for processing OPCDA protocol message | |
CN111464429B (en) | WeChat applet multi-item compatible sharing method, system, storage medium and equipment | |
CN109558181B (en) | Method for enabling non-IE browser to be compatible with OCX control, computer storage medium and equipment | |
CN113791777A (en) | Picture display method and device, computer readable storage medium and electronic equipment | |
CN112149016A (en) | Page processing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |