CN111371763A - Network penetration access method and system for pictures, storage medium and electronic equipment - Google Patents

Network penetration access method and system for pictures, storage medium and electronic equipment Download PDF

Info

Publication number
CN111371763A
CN111371763A CN202010121433.8A CN202010121433A CN111371763A CN 111371763 A CN111371763 A CN 111371763A CN 202010121433 A CN202010121433 A CN 202010121433A CN 111371763 A CN111371763 A CN 111371763A
Authority
CN
China
Prior art keywords
network
intranet
picture
access
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010121433.8A
Other languages
Chinese (zh)
Other versions
CN111371763B (en
Inventor
胡伟健
徐昌伟
刘双广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gosuncn Technology Group Co Ltd
Original Assignee
Gosuncn Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gosuncn Technology Group Co Ltd filed Critical Gosuncn Technology Group Co Ltd
Priority to CN202010121433.8A priority Critical patent/CN111371763B/en
Publication of CN111371763A publication Critical patent/CN111371763A/en
Application granted granted Critical
Publication of CN111371763B publication Critical patent/CN111371763B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/029Firewall traversal, e.g. tunnelling or, creating pinholes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Abstract

The invention provides a network penetration access method, a system, a computer storage medium and electronic equipment for pictures, wherein the method is used for the network penetration access of an outer network browser to inner network pictures, a network gate is arranged between an outer network and an inner network, and the method comprises the following steps: s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate; s2, the network gate forwards the request instruction to the intranet service; s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper; s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper; s5, the gatekeeper forwards the modified access instruction linked with the picture to proxy service; and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.

Description

Network penetration access method and system for pictures, storage medium and electronic equipment
Technical Field
The present invention relates to the field of computer networks, and more particularly, to a network penetration method for accessing pictures, a network penetration system for accessing pictures, a computer storage medium, and an electronic device.
Background
Under the condition that networks are isolated from each other and a gateway exists, picture links generated by an internal network can only be accessed by the internal network, and an external network cannot directly access pictures of the internal network, so that the conventional scheme is that pictures are converted into Base64 character strings and then are transmitted to the external network and then are restored into pictures, the realization is very simple, but one obvious defect is that the Base64 character strings are too large (a small picture of 15KB is converted into a Base64 big appointment which becomes 20KB), the transmission quantity of the networks is greatly increased, and if the pictures are high-definition pictures, the transmission quantity is larger and is amazing, and the access speed of the pictures is seriously influenced.
Disclosure of Invention
In view of the above, the present invention provides a network penetration access method for pictures, a network penetration access system for pictures, a computer storage medium and an electronic device, which can effectively improve the access speed of pictures.
In order to solve the above technical problems, in one aspect, the present invention provides a method for network penetration access of pictures, which is used for network penetration access of an intranet picture by an extranet browser, wherein a gatekeeper is arranged between an extranet and an intranet, and the method includes the following steps: s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate; s2, the gatekeeper forwards the request instruction to an intranet service; s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper; s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper; s5, the gatekeeper forwards the modified access instruction of the picture link to an agent service; and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
According to the network penetration access method of the picture, the intranet service and the proxy service are added, the service identifies the network ip of the accessed browser and then dynamically replaces the picture access address, so that consistent access experience of the intranet and the extranet is achieved, the purpose of the picture network penetration access is achieved, compared with a Base64 character string mode, due to the fact that the layer of Base64 encoding and decoding is omitted, the network transmission amount is greatly reduced, time is not spent on encoding and decoding, the performance is improved, and the access speed is higher.
According to some embodiments of the present invention, in step S3, the intranet service dynamically modifies the picture link of the intranet picture according to the routing rule.
According to some embodiments of the invention, step S3 includes: s31, the intranet service receives the request instruction and analyzes the network ip of the client of the request instruction; s32, judging whether the network ip of the client meets the conversion condition according to the routing rule, and replacing the picture link address of the intranet picture with a target address when the network ip of the client meets the conversion condition to obtain the modified picture link; and S33, sending the modified picture link to the gatekeeper.
According to some embodiments of the invention, the transition condition comprises: starting a route configuration rule to enable the route configuration rule to take effect; the client network ip is consistent with the ip in the configuration or the client network ip is in the configured subnet section.
According to some embodiments of the present invention, in step S6, the proxy service forwards the access instruction to the intranet service according to a path configuration rule.
In a second aspect, an embodiment of the present invention provides a network penetration accessing system for pictures, which is used for a web browser to perform network penetration accessing on pictures in an internal network, wherein a gatekeeper is disposed between an external network and the internal network, and the network penetration accessing system includes: the command acquisition module can acquire a request command of an external network browser for an internal network picture and send the request command to the network gate; the intranet service module can receive the request instruction forwarded by the gatekeeper, dynamically modify the picture link of the intranet picture and send the modified picture link to the gatekeeper, and the gatekeeper returns the modified picture link to the browser and receives and forwards an access instruction for accessing the modified picture link by the browser; and the agent service module can receive the access instruction and forward the access instruction to the intranet service module, and the intranet service module accesses the modified picture link.
According to some embodiments of the present invention, the intranet service module dynamically modifies the picture link of the intranet picture according to a routing rule.
According to some embodiments of the present invention, the proxy service module forwards the access instruction to the intranet service module according to a path configuration rule.
In a third aspect, an embodiment of the present invention provides a computer storage medium including one or more computer instructions, which when executed implement the method according to the above embodiment.
An electronic device according to a fourth aspect of the present invention comprises a memory for storing one or more computer instructions and a processor; the processor is configured to invoke and execute the one or more computer instructions to implement the method according to any of the embodiments described above.
Drawings
Fig. 1 is a flowchart of a method for network-through access of pictures according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a network penetration accessing system for pictures according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an electronic device according to an embodiment of the invention.
Reference numerals:
the network penetration access system 100; an outer net 101; an intranet 102; a network gate 103; a browser 200;
an instruction acquisition module 10; an intranet service module 20; a proxy service module 30;
an electronic device 300;
a memory 310; an operating system 311; an application 312;
a processor 320; a network interface 330; an input device 340; a hard disk 350; a display device 360.
Detailed Description
The following detailed description of embodiments of the present invention will be made with reference to the accompanying drawings and examples. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
First, a network penetration access method for pictures according to an embodiment of the present invention is described in detail with reference to the accompanying drawings.
As shown in fig. 1, the method for network-through access to pictures according to the embodiment of the present invention can be used for network-through access to pictures in an internal network by an external network browser, wherein a gatekeeper is provided between the external network and the internal network, and the method includes the following steps:
s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate;
s2, the gatekeeper forwards the request instruction to an intranet service;
s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper;
s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper;
s5, the gatekeeper forwards the modified access instruction of the picture link to an agent service;
and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
In other words, the method for network penetration access of pictures according to the embodiment of the present invention can be used to implement undifferentiated access of intranet and extranet pictures, when an extranet browser accesses an intranet picture, a request instruction of an intranet picture to be accessed is first forwarded to an intranet through a gatekeeper, an intranet service dynamically modifies a picture link of the intranet picture, replaces an access link address of the intranet picture, and forwards the replaced access link address to a browser through the gatekeeper, the browser initiates an access request after obtaining the replaced access link address of the picture, the access request is forwarded to a proxy service after reaching the gatekeeper, the proxy service forwards the access request to the intranet service according to rules, and the intranet service accesses the modified picture link.
Therefore, according to the network penetration access method of the picture, by adding the intranet service and the proxy service, the service can dynamically replace the picture access address after identifying the network ip of the accessed browser, so that the consistent access experience of the intranet and the extranet is realized, and the purpose of the picture network penetration access is achieved.
According to an embodiment of the present invention, in step S3, the intranet service dynamically modifies the picture link of the intranet picture according to the routing rule. Preferably, step S3 includes:
and S31, the intranet service receives the request instruction and analyzes the network ip of the client of the request instruction.
S32, judging whether the network ip of the client meets the conversion condition according to the routing rule, and replacing the picture link address of the intranet picture with a target address when the network ip meets the conversion condition to obtain the modified picture link.
And S33, sending the modified picture link to the gatekeeper. Wherein the transition condition comprises: starting a route configuration rule to enable the route configuration rule to take effect; the client network ip is consistent with the ip in the configuration or the client network ip is in the configured subnet section.
In some embodiments of the present invention, in step S6, the proxy service forwards the access instruction to the intranet service according to a path configuration rule.
That is to say, according to the network penetration access method for the pictures provided by the embodiment of the invention, the indirect communication of the picture link between the internal network and the external network is mainly realized in a proxy mode and a routing rule forwarding mode, so that the network penetration access of the pictures is realized.
In order to enable the internal and external networks to access, the network penetration access method of the picture adopts a proxy mode, the external network picture request is forwarded to the internal network through a proxy, and in order to enable the external network browser to access the picture normally, the internal network service dynamically replaces the request picture access address according to the route configuration rule, so that the internal network browser returns the internal network access address when accessing, and the external network browser returns the proxy address when accessing, thereby realizing the network penetration access of the picture, and obtaining consistent access experience no matter the internal network or the external network.
After the internal and external networks are isolated by the network gate, the communication can be carried out only through the port opened by the network gate.
Specifically, according to the network penetration access method of the picture, the proxy layer is added in the intranet, the port opened by the main proxy gatekeeper forwards the request instruction to the intranet, and the proxy layer is placed in the intranet, so that the network penetration access method of the picture can be communicated with the intranet.
Agent configuration references are as follows:
Figure BDA0002393095250000051
according to the network penetration access method of the picture, the configuration of the routing rule is added to the intranet service, when the intranet service receives the request, the intranet service analyzes the network ip of the requested client, judges whether the network ip of the client meets the conversion condition according to the routing rule, and replaces the original picture link address with the target address if the network ip of the client meets the conversion condition. Because the subnet mask is added, the routing rule configuration not only supports the matching of fixed ip, but also supports the matching of network segments, and has higher flexibility.
The route reference configuration is as follows:
Figure BDA0002393095250000061
finally, the address of the intranet agent service is configured on the gateway agent forwarding layer (the configuration function is provided by the gateway), and the intranet service accesses the modified picture link.
In summary, according to the network penetration access method for pictures in the embodiments of the present invention, through proxy configuration and service routing rules, different accessible addresses can be given by a service according to ip when browsers of an intranet and an intranet access, so that network penetration access of pictures is realized, and an access speed is ensured. According to the method, a large Base64 is replaced in a proxy mode, the network transmission amount is greatly reduced, the Base64 is abandoned, the conversion and reduction processes of the two parties can be reduced, the performance is improved, and because picture links are replaced, the internal network and the external network can obtain consistent experience, access is carried out by taking the picture links, and no difference exists in a browser.
As shown in fig. 2, a system 100 for network-through access of pictures according to an embodiment of the present invention is used for network-through access of an external web browser 200 to internal web pictures, a gateway 103 is provided between an external web 101 and an internal web 102, and the system 100 for network-through access includes: an instruction acquisition module 10, an intranet service module 20 and a proxy service module 30.
Specifically, the instruction obtaining module 10 can obtain a request instruction of an external web browser for an internal web picture, and send the request instruction to the gatekeeper, the internal web service module 20 can receive the request instruction forwarded by the gatekeeper, dynamically modify a picture link of the internal web picture and send the modified picture link to the gatekeeper, the gatekeeper returns the modified picture link to the browser, and receives and forwards an access instruction for the browser to access the modified picture link, and the proxy service module 30 can receive the access instruction and forward the access instruction to the internal web service module 20, and the internal web service module 20 accesses the modified picture link. The intranet service module 20 dynamically modifies the picture link of the intranet picture according to the routing rule, and the proxy service module 30 forwards the access instruction to the intranet service module 20 according to the path configuration rule.
Since the network penetration access method for the picture according to the above embodiment of the present invention has the above technical effects, the network penetration access system 100 for the picture using the above method also has a corresponding technical effect, that is, by adding the intranet service 20 and the proxy service 30, the service identifies the network ip of the browser accessed and then dynamically replaces the picture access address, thereby realizing the consistent access experience of the intranet and the extranet, and achieving the purpose of the penetration access of the picture network.
In addition, the present invention also provides a computer storage medium, which includes one or more computer instructions, and when executed, the one or more computer instructions implement any of the above described network penetration access methods for pictures.
That is, the computer storage medium stores a computer program, which, when executed by a processor, causes the processor to execute any one of the above-described methods of network-penetration access of pictures.
As shown in fig. 3, an embodiment of the present invention provides an electronic device 300, which includes a memory 310 and a processor 320, where the memory 310 is configured to store one or more computer instructions, and the processor 320 is configured to call and execute the one or more computer instructions, so as to implement any one of the methods described above.
That is, the electronic device 300 includes: a processor 320 and a memory 310, in which memory 310 computer program instructions are stored, wherein the computer program instructions, when executed by the processor, cause the processor 320 to perform any of the methods described above.
Further, as shown in fig. 3, the electronic device 300 further includes a network interface 330, an input device 340, a hard disk 350, and a display device 360.
The various interfaces and devices described above may be interconnected by a bus architecture. A bus architecture may be any architecture that may include any number of interconnected buses and bridges. Various circuits of one or more Central Processing Units (CPUs), represented in particular by processor 320, and one or more memories, represented by memory 310, are coupled together. The bus architecture may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like. It will be appreciated that a bus architecture is used to enable communications among the components. The bus architecture includes a power bus, a control bus, and a status signal bus, in addition to a data bus, all of which are well known in the art and therefore will not be described in detail herein.
The network interface 330 may be connected to a network (e.g., the internet, a local area network, etc.), and may obtain relevant data from the network and store the relevant data in the hard disk 350.
The input device 340 may receive various commands input by an operator and send the commands to the processor 320 for execution. The input device 340 may include a keyboard or a pointing device (e.g., a mouse, a trackball, a touch pad, a touch screen, or the like).
The display device 360 may display the result of the instructions executed by the processor 320.
The memory 310 is used for storing programs and data necessary for operating the operating system, and data such as intermediate results in the calculation process of the processor 320.
It will be appreciated that memory 310 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. The memory 310 of the apparatus and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 310 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 311 and application programs 312.
The operating system 311 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs 312 include various application programs, such as a Browser (Browser), and are used for implementing various application services. A program implementing methods of embodiments of the present invention may be included in application 312.
The method disclosed by the above embodiment of the present invention can be applied to the processor 320, or implemented by the processor 320. Processor 320 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 320. The processor 320 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, and may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present invention. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 310, and the processor 320 reads the information in the memory 310 and completes the steps of the method in combination with the hardware.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
In particular, the processor 320 is also configured to read the computer program and execute any of the methods described above.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be physically included alone, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute some steps of the transceiving method according to various embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A network penetration access method of pictures is used for the network penetration access of an outer net browser to pictures of an inner net, a net gate is arranged between the outer net and the inner net, and the method is characterized by comprising the following steps:
s1, acquiring a request instruction of an intranet picture to be accessed by an extranet browser, and sending the request instruction to a network gate;
s2, the gatekeeper forwards the request instruction to an intranet service;
s3, dynamically modifying the picture link of the intranet picture by the intranet service and sending the modified picture link to the gatekeeper;
s4, the gatekeeper returns the modified picture link to the browser, and the browser sends an access instruction for accessing the modified picture link to the gatekeeper;
s5, the gatekeeper forwards the modified access instruction of the picture link to an agent service;
and S6, the proxy service forwards the access instruction to the intranet service, and the intranet service accesses the modified picture link to realize the network penetration access of the intranet picture by the intranet browser.
2. The method according to claim 1, wherein in step S3, the intranet service dynamically modifies the picture link of the intranet picture according to routing rules.
3. The method according to claim 2, wherein step S3 includes:
s31, the intranet service receives the request instruction and analyzes the network ip of the client of the request instruction;
s32, judging whether the network ip of the client meets the conversion condition according to the routing rule, and replacing the picture link address of the intranet picture with a target address when the network ip of the client meets the conversion condition to obtain the modified picture link;
and S33, sending the modified picture link to the gatekeeper.
4. The method of claim 3, wherein the transition condition comprises:
starting a route configuration rule to enable the route configuration rule to take effect;
the client network ip is consistent with the ip in the configuration or the client network ip is in the configured subnet section.
5. The method according to claim 1, wherein in step S6, the proxy service forwards the access instruction to the intranet service according to a path configuration rule.
6. A network penetration access system of pictures is used for a network penetration access of an outer net browser to pictures of an inner net, a net gate is arranged between the outer net and the inner net, and the network penetration access system comprises:
the command acquisition module can acquire a request command of an external network browser for an internal network picture and send the request command to the network gate;
the intranet service module can receive the request instruction forwarded by the gatekeeper, dynamically modify the picture link of the intranet picture and send the modified picture link to the gatekeeper, and the gatekeeper returns the modified picture link to the browser and receives and forwards an access instruction for accessing the modified picture link by the browser;
and the agent service module can receive the access instruction and forward the access instruction to the intranet service module, and the intranet service module accesses the modified picture link.
7. The system according to claim 6, wherein the intranet service module dynamically modifies the picture links of the intranet pictures according to routing rules.
8. The system according to claim 6, wherein the proxy service module forwards the access command to the intranet service module according to a path configuration rule.
9. A computer storage medium comprising one or more computer instructions which, when executed, implement the method of any one of claims 1-5.
10. An electronic device comprising a memory and a processor, wherein,
the memory is to store one or more computer instructions;
the processor is configured to invoke and execute the one or more computer instructions to implement the method of any one of claims 1-5.
CN202010121433.8A 2020-02-26 2020-02-26 Network penetration access method and system for pictures, storage medium and electronic equipment Active CN111371763B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010121433.8A CN111371763B (en) 2020-02-26 2020-02-26 Network penetration access method and system for pictures, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010121433.8A CN111371763B (en) 2020-02-26 2020-02-26 Network penetration access method and system for pictures, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN111371763A true CN111371763A (en) 2020-07-03
CN111371763B CN111371763B (en) 2022-07-05

Family

ID=71210113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010121433.8A Active CN111371763B (en) 2020-02-26 2020-02-26 Network penetration access method and system for pictures, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN111371763B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741017A (en) * 2020-07-23 2020-10-02 平安国际智慧城市科技股份有限公司 Data transmission method between internal network and external network and related equipment
CN114401119A (en) * 2021-12-27 2022-04-26 中国电信股份有限公司 Method, device and system for detecting interconnection of internal network and external network and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050138004A1 (en) * 2003-12-17 2005-06-23 Microsoft Corporation Link modification system and method
WO2007075099A1 (en) * 2005-12-27 2007-07-05 Siemens Aktiengesellschaft Automation network, access service proxy for automation network method for transmitting operating between programmable controller remote computer
CN101175030A (en) * 2006-10-31 2008-05-07 中兴通讯股份有限公司 Method for implementing proxy to multiple isomorphic subnets
CN104077240A (en) * 2014-06-26 2014-10-01 桂林长海发展有限责任公司 Method and device for calling gate data with internal and external networks being isolated
CN107277026A (en) * 2017-06-29 2017-10-20 福建天泉教育科技有限公司 A kind of Intranet access method and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050138004A1 (en) * 2003-12-17 2005-06-23 Microsoft Corporation Link modification system and method
WO2007075099A1 (en) * 2005-12-27 2007-07-05 Siemens Aktiengesellschaft Automation network, access service proxy for automation network method for transmitting operating between programmable controller remote computer
CN101175030A (en) * 2006-10-31 2008-05-07 中兴通讯股份有限公司 Method for implementing proxy to multiple isomorphic subnets
CN104077240A (en) * 2014-06-26 2014-10-01 桂林长海发展有限责任公司 Method and device for calling gate data with internal and external networks being isolated
CN107277026A (en) * 2017-06-29 2017-10-20 福建天泉教育科技有限公司 A kind of Intranet access method and terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111741017A (en) * 2020-07-23 2020-10-02 平安国际智慧城市科技股份有限公司 Data transmission method between internal network and external network and related equipment
CN114401119A (en) * 2021-12-27 2022-04-26 中国电信股份有限公司 Method, device and system for detecting interconnection of internal network and external network and readable storage medium

Also Published As

Publication number Publication date
CN111371763B (en) 2022-07-05

Similar Documents

Publication Publication Date Title
US11647096B2 (en) Method and apparatus for automatically optimizing the loading of images in a cloud-based proxy service
CN112637346B (en) Proxy method, proxy device, proxy server and storage medium
US9934065B1 (en) Servicing I/O requests in an I/O adapter device
US6327614B1 (en) Network server device and file management system using cache associated with network interface processors for redirecting requested information between connection networks
US20090271172A1 (en) Emulating A Computer Run Time Environment
US20070280206A1 (en) Method for consuming heterogeneous services on heterogeneous devices using script plugins
CN111371763B (en) Network penetration access method and system for pictures, storage medium and electronic equipment
CN109656637B (en) Rendering method and device for cross-platform call of OpenGL ES and computer storage medium
CN107135249B (en) Data downloading method and device
CN111885172A (en) Cross-network platform cascading method, computer storage medium and electronic device
KR102563165B1 (en) Memory access request scheduling method, device, apparatus, and storage medium
CN112822061B (en) Method and system for exposing service to outside by edge node
CN115225707A (en) Resource access method and device
CN110929128A (en) Data crawling method, device, equipment and medium
CN111712799B (en) Automatic distribution of models for execution on non-edge devices and edge devices
US20230088115A1 (en) Generating early hints informational responses at an intermediary server
CN110677699A (en) Video stream and/or picture stream data sharing method and device and electronic equipment
CN113726855B (en) Service aggregation method, device, electronic equipment and computer-readable storage medium
US20230224302A1 (en) Techniques for providing hypertext transfer protocol through a secure environment
WO2017011021A1 (en) Systems and methods facilitating reduced latency via stashing in systems on chips
CN112910910B (en) Method, device, equipment and storage medium for processing OPCDA protocol message
CN111464429B (en) WeChat applet multi-item compatible sharing method, system, storage medium and equipment
CN109558181B (en) Method for enabling non-IE browser to be compatible with OCX control, computer storage medium and equipment
CN113791777A (en) Picture display method and device, computer readable storage medium and electronic equipment
CN112149016A (en) Page processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant