CN111897534B - Method, device, electronic equipment and storage medium for accessing SSLVPN - Google Patents

Method, device, electronic equipment and storage medium for accessing SSLVPN Download PDF

Info

Publication number
CN111897534B
CN111897534B CN202010573846.XA CN202010573846A CN111897534B CN 111897534 B CN111897534 B CN 111897534B CN 202010573846 A CN202010573846 A CN 202010573846A CN 111897534 B CN111897534 B CN 111897534B
Authority
CN
China
Prior art keywords
sslvpn
accessing
user terminal
instruction
library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010573846.XA
Other languages
Chinese (zh)
Other versions
CN111897534A (en
Inventor
徐福鹤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202010573846.XA priority Critical patent/CN111897534B/en
Publication of CN111897534A publication Critical patent/CN111897534A/en
Application granted granted Critical
Publication of CN111897534B publication Critical patent/CN111897534B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure relates to a method, an apparatus, an electronic device, and a storage medium for accessing an SSLVPN, where the method for accessing the SSLVPN includes: acquiring an instruction for starting a port on a user terminal for accessing SSLVPN; based on the instruction, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN. The embodiment of the disclosure essentially combines the functions of the wxWidgets built-in webview browser and the independent client, realizes a novel cross-platform SSLVPN client compatible with a main stream browser, solves the problems that the existing mode for accessing SSLVPN or browser control development and maintenance cost is high or one client needs to be independently developed for each operating system, wastes manpower and is not easy to maintain, and achieves the purposes of reducing development and maintenance cost and maintenance difficulty and enabling a user to effectively access SSLVPN.

Description

Method, device, electronic equipment and storage medium for accessing SSLVPN
Technical Field
The disclosure relates to the field of SSLVPN access technologies, and in particular, to a method, a device, an electronic device and a storage medium for accessing SSLVPN.
Background
With the wide application of cloud office technology, a user accesses a Virtual Private Network (VPN) to become a common office mode, and the office mode has the advantages that as long as the computing capability of a computer can meet the computing requirement of the virtual machine on one computer, multi-platform office can be realized on one computer, and the cloud office also provides significant contribution on the information security problem, namely, the working content finished on the virtual machine or the internal data of a company group stored on the virtual machine cannot be stored on a local computer, and the problem of information disclosure cannot be related because of copying on the local computer.
The SSLVPN provides access control for the intranet application based on the web, allows an authorized user to access the web application which is only opened to the intranet, and achieves the VPN function. In the existing VPN login mode, access is often needed through a browser or an independent client, and then disconnection is achieved through means of actively disconnecting the VPN or enabling a computer to be shut down and dormant.
The access to the SSLVPN through the browser is realized in a browser control mode, and in order to be compatible with each browser, a control needs to be independently developed, so that the development and maintenance cost is high.
By accessing the SSLVPN through independent clients, one client needs to be developed for each operating system independently in consideration of the need of compatibility with various operating systems, which wastes manpower and is not easy to maintain.
Disclosure of Invention
In order to solve the technical problems described above, or at least partially solve the technical problems described above, the present disclosure provides a method, an apparatus, an electronic device, and a storage medium for accessing SSLVPN.
In a first aspect, an embodiment of the present disclosure proposes a method for accessing SSLVPN, including:
acquiring an instruction for starting a port on a user terminal for accessing SSLVPN;
based on the instruction, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN.
Further, script files required for accessing the SSLVPN are stored on the user terminal.
Further, before the instruction for starting the port on the user terminal for accessing the SSLVPN is acquired, the method further includes:
and installing a wxWidgets library on the user terminal, and compiling the source codes of the wxWidgets library so that the SSLVPN can be accessed based on a built-in webview browser of the wxWidgets library.
Further, before the calling the built-in webview browser of the wxWidgets library installed on the user terminal to access the SSLVPN based on the instruction, the method further includes:
detecting the webview browser running environment;
and if the webview browser running environment is not abnormal, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
Further, the detecting the webview browser running environment includes:
checking whether the port accessing the SSLVPN is abnormal or not; and/or
And checking whether the configuration of the user terminal is correct.
Further, the method further comprises the following steps:
if the webview browser operating environment is abnormal, repairing the webview browser operating environment;
and after the restoration, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
Further, the method further comprises the following steps:
acquiring the corresponding relation between the abnormal condition and the repair scheme;
if the webview browser operating environment is abnormal, repairing the webview browser operating environment comprises the following steps:
if the webview browser operating environment is abnormal, repairing the webview browser operating environment based on the corresponding relation between the abnormal condition and the repairing scheme.
In a second aspect, an embodiment of the present disclosure further proposes an apparatus for accessing SSLVPN, including:
the instruction acquisition module is used for acquiring an instruction for starting a port on the user terminal for accessing the SSLVPN;
and the access module is used for calling a built-in webview browser of the wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
In a third aspect, an embodiment of the present disclosure further proposes an electronic device, including: a processor and a memory;
the processor is operable to perform the steps of any of the methods described above by invoking a program or instruction stored in the memory.
In a fourth aspect, the disclosed embodiments also provide a computer-readable storage medium storing a program or instructions that cause a computer to perform the steps of any of the methods described above.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
the method comprises the steps that an instruction for starting a port on a user terminal for accessing SSLVPN is obtained; based on the instruction, the built-in webview browser of the wxWidgets library installed on the user terminal is called to access the SSLVPN, and the functions of the built-in webview browser of the wxWidgets and the independent client are combined together, so that a novel cross-platform SSLVPN client compatible with a main stream browser is realized, the problems that the existing mode for accessing the SSLVPN or browser control development and maintenance cost is high or one client needs to be independently developed for each operating system, labor is wasted and maintenance is poor are solved, the development and maintenance cost and maintenance difficulty are reduced, and meanwhile, a user can effectively perform SSLVPN access.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments of the present disclosure or the solutions in the prior art, the drawings that are required for the description of the embodiments or the prior art will be briefly described below, and it will be obvious to those skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flow chart of a method of accessing SSLVPN provided by an embodiment of the present disclosure;
fig. 2 is a block diagram of an apparatus for accessing SSLVPN according to an embodiment of the present disclosure;
fig. 3 is a schematic hardware structure of an electronic device according to an embodiment of the disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, a further description of aspects of the present disclosure will be provided below. It should be noted that, without conflict, the embodiments of the present disclosure and features in the embodiments may be combined with each other.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced otherwise than as described herein; it will be apparent that the embodiments in the specification are only some, but not all, embodiments of the disclosure.
Fig. 1 is a flowchart of a method of accessing SSLVPN provided by an embodiment of the present disclosure. Referring to fig. 1, the method of accessing SSLVPN may be performed by a user terminal. Specifically, the method comprises the following steps:
s110, acquiring an instruction for starting a port on the user terminal for accessing the SSLVPN.
The port for accessing the SSLVPN is a novel client which is manufactured by utilizing the wxWidgets and used for accessing the SSLVPN, or a shortcut which is manufactured by utilizing the wxWidgets and used for accessing the SSLVPN.
wxWidgets is a cross-platform software development kit that can develop user interfaces for common desktop programs and mobile device programs. wxWidges support all versions of Windows, unix and MacOS with GTK+ or Motif.
In this step, the instruction for starting the port on the user terminal for accessing the SSLVPN may be generated according to the operation of the user on the user terminal, or the operation of the user on the user terminal may be directly used as the instruction for starting the port on the user terminal for accessing the SSLVPN. Illustratively, detecting that the user double clicks on the shortcut for accessing the SSLVPN is an instruction to acquire a port for starting up the port on the user terminal for accessing the SSLVPN.
S120, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
The essence of the technical scheme is that the wxWidges built-in webview browser and the independent client function are combined together to form the novel cross-platform SSLVPN client compatible with the main stream browser. The novel SSLVPN client is utilized for SSLVPN access, a control is not required to be independently developed, and development and maintenance costs can be reduced.
In addition, since wxWidgets supports all versions of Windows, unix and MacOS with GTK+ or Motif. The SSLVPN is accessed by utilizing the wxWidgets built-in webview browser, so that the method is applicable to various operating systems at the same time, a client does not need to be independently developed for each operating system, the investment in manpower and material resources can be reduced, and the method is easy to maintain.
In addition, because the scheme is based on using a browser for SSLVPN access, the scheme has the advantage of browser access, namely, a User Interface (UI) is attractive.
On the basis of the technical scheme, optionally, script files required for accessing the SSLVPN are stored on the user terminal. By the arrangement, when the SSLVPN is accessed, the front-end script file does not need to be loaded from the server, but the script file stored on the user terminal is directly called, so that the page skip rate of the webview browser can be improved when the SSLVPN is accessed, and the user experience is improved.
On the basis of the above technical solution, optionally, before S110, the method further includes: and installing a wxWidgets library on the user terminal, and compiling the source codes of the wxWidgets library so that the SSLVPN can be accessed based on a built-in webview browser of the wxWidgets library. The aim of the setting is to combine the functions of the wxWidgets built-in webview browser and the independent client to form a novel cross-platform SSLVPN client compatible with the main stream browser, so that the subsequent access to the SSLVPN by the webview browser is ensured
Optionally, on the basis of the above technical solutions, the method for accessing SSLVPN further includes, before executing S120, detecting a webview browser running environment; if the webview browser running environment is not abnormal, S120 is executed. The setting can ensure that the wxWidgets built-in webview browser and the functions of the independent client are combined together, the formed novel SSLVPN client can normally realize the SSLVPN access function, the data interaction between the user terminal and the SSLVPN server can be effectively performed, and the user experience is improved.
Wherein, detecting the webview browser running environment may include: checking whether the port accessing the SSLVPN is abnormal or not; and/or checking whether the user terminal configuration is correct.
In practice, there are various methods for detecting the webview browser running environment, and for example, detection can be performed by checking and checking related configuration parameters; alternatively, the detection is performed by transmitting test information and receiving response information. Alternatively, detecting the webview browser running environment may be implemented using a webview class creation tool.
If the webview browser operating environment is abnormal, repairing the webview browser operating environment; after repair, S120 is performed. The setting can enable the novel SSLVPN client to always normally operate in the whole process of accessing the SSLVPN by a user.
Further, the method for accessing SSLVPN further comprises the following steps: acquiring the corresponding relation between the abnormal condition and the repair scheme; if the webview browser operating environment is abnormal, repairing the webview browser operating environment comprises the following steps: if the webview browser operating environment is abnormal, repairing the webview browser operating environment based on the corresponding relation between the abnormal condition and the repairing scheme. The essence of the arrangement is that the repair scheme corresponding to the abnormal condition is predetermined, so that the repair scheme is put in the repair process, and the repair efficiency is improved.
It should be noted that, in practice, the detection of the webview browser running environment may occur before the wxWidgets library is installed on the user terminal and the wxWidgets library source code is compiled, or may occur after the wxWidgets library is installed on the user terminal and the wxWidgets library source code is compiled, which is not limited in the present application. Optionally, a wxWidgets library is installed on the user terminal, and operations for detecting the webview browser running environment are performed before and after compiling the source codes of the wxWidgets library. That is, before the wxWidgets library is installed and in the process of using the wxWidgets library after the wxWidgets library is installed, the webview browser running environment is always detected, so that the interaction capability and the user experience are further improved.
Fig. 2 is a block diagram of an apparatus for accessing SSLVPN according to an embodiment of the present disclosure. Referring to fig. 2, the device for accessing SSLVPN includes:
an instruction obtaining module 210, configured to obtain an instruction for starting a port on the user terminal for accessing the SSLVPN;
and the access module 220 is used for calling a built-in webview browser of the wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
Further, script files required for accessing the SSLVPN are stored on the user terminal.
Further, the device for accessing SSLVPN further includes: and the installation and debugging module is used for installing a wxWidgets library on the user terminal before the instruction for starting the port used for accessing the SSLVPN on the user terminal is acquired, and compiling the source codes of the wxWidgets library so that the SSLVPN can be accessed based on a built-in webview browser of the wxWidgets library.
Further, the device for accessing SSLVPN further includes: the environment detection module is used for detecting the running environment of the webview browser before the built-in webview browser of the wxWidgets library installed on the user terminal is called to access the SSLVPN based on the instruction; and if the webview browser running environment is not abnormal, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
Further, the environment detection module is used for checking whether the port accessing the SSLVPN is abnormal or not; and/or
And checking whether the configuration of the user terminal is correct.
Further, the environment detection module is used for repairing the webview browser running environment if the webview browser running environment is abnormal;
and the access module 220 is used for calling a built-in webview browser of the wxWidgets library installed on the user terminal to access the SSLVPN based on the instruction after repairing.
Further, the environment detection module is used for acquiring the corresponding relation between the abnormal condition and the repair scheme; if the webview browser operating environment is abnormal, repairing the webview browser operating environment based on the corresponding relation between the abnormal condition and the repairing scheme.
The device disclosed in the above embodiment can implement the flow of the method disclosed in the above method embodiments, and has the same or corresponding beneficial effects, and in order to avoid repetition, the description is omitted here.
Fig. 3 is a schematic hardware structure of an electronic device provided by an embodiment of the present disclosure, where, as shown in fig. 3, the electronic device may include an intelligent terminal such as a mobile phone, a PAD, a computer, and the electronic device includes:
one or more processors 301, one processor 301 being illustrated in fig. 3;
a memory 302;
the electronic device may further include: an input device 303 and an output device 304.
The processor 301, the memory 302, the input means 303 and the output means 304 in the electronic device may be connected by a bus or by other means, in fig. 3 by way of example.
Memory 302 serves as a non-transitory computer readable storage medium that may be used to store software programs, computer executable programs, and modules, such as program instructions/modules (e.g., instruction fetch module 210 and access module 220 shown in fig. 2) corresponding to the method of accessing SSLVPN in embodiments of the disclosure. The processor 301 executes various functional applications of the server and data processing, that is, implements the method of accessing SSLVPN of the above-described method embodiment, by running software programs, instructions, and modules stored in the memory 302.
Memory 302 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created according to the use of the electronic device, etc. In addition, memory 302 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 302 may optionally include memory located remotely from processor 301, which may be connected to the terminal device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input means 303 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the electronic device. The output device 304 may include a display device such as a display screen.
The disclosed embodiments also provide a computer-readable storage medium storing a program or instructions that when executed by a computer cause the computer to perform a method of accessing SSLVPN, the method comprising:
acquiring an instruction for starting a port on a user terminal for accessing SSLVPN;
based on the instruction, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN.
Optionally, the computer executable instructions, when executed by the computer processor, may also be used to perform the technical solution of the method of accessing SSLVPN provided by any embodiment of the disclosure.
From the above description of embodiments, it will be apparent to those skilled in the art that the present disclosure may be implemented by means of software and necessary general purpose hardware, but may of course also be implemented by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present disclosure may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk, or an optical disk of a computer, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in the embodiments of the present disclosure.
It should be noted that in this document, relational terms such as "first" and "second" and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing is merely a specific embodiment of the disclosure to enable one skilled in the art to understand or practice the disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown and described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (9)

1. A method of accessing SSLVPN, comprising:
acquiring an instruction for starting a port on a user terminal for accessing SSLVPN;
based on the instruction, calling a built-in webview browser of a wxWidgets library installed on the user terminal to access the SSLVPN;
before the instruction for starting the port for accessing the SSLVPN on the user terminal is acquired, the method further comprises the following steps:
and installing a wxWidgets library on the user terminal, and compiling the source codes of the wxWidgets library so that a built-in webview browser based on the wxWidgets library accesses the SSLVPN.
2. The method of accessing an SSLVPN of claim 1,
script files required for accessing SSLVPN are stored on the user terminal.
3. The method according to claim 1, wherein before the calling the built-in webview browser of the wxWidgets library installed on the user terminal to access the SSLVPN based on the instruction, the method further comprises:
detecting the webview browser running environment;
and if the webview browser running environment is not abnormal, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
4. The method for accessing SSLVPN of claim 3, wherein said detecting a webview browser running environment comprises:
checking whether the port accessing the SSLVPN is abnormal or not; and/or
And checking whether the configuration of the user terminal is correct.
5. The method of accessing SSLVPN of claim 4, further comprising:
if the webview browser operating environment is abnormal, repairing the webview browser operating environment;
and after the restoration, calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction.
6. The method of accessing SSLVPN of claim 5, further comprising:
acquiring the corresponding relation between the abnormal condition and the repair scheme;
if the webview browser operating environment is abnormal, repairing the webview browser operating environment comprises the following steps:
if the webview browser operating environment is abnormal, repairing the webview browser operating environment based on the corresponding relation between the abnormal condition and the repairing scheme.
7. An apparatus for accessing SSLVPN, comprising:
the instruction acquisition module is used for acquiring an instruction for starting a port on the user terminal for accessing the SSLVPN;
the access module is used for calling a built-in webview browser of a wxWidges library installed on the user terminal to access the SSLVPN based on the instruction;
and the installation and debugging module is used for installing a wxWidgets library on the user terminal before the instruction for starting the port used for accessing the SSLVPN on the user terminal is acquired, and compiling the source codes of the wxWidgets library so as to enable a built-in webview browser based on the wxWidgets library to access the SSLVPN.
8. An electronic device, comprising: a processor and a memory;
the processor is adapted to perform the steps of the method according to any of claims 1 to 6 by invoking a program or instruction stored in the memory.
9. A computer readable storage medium storing a program or instructions for causing a computer to perform the steps of the method according to any one of claims 1 to 6.
CN202010573846.XA 2020-06-22 2020-06-22 Method, device, electronic equipment and storage medium for accessing SSLVPN Active CN111897534B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010573846.XA CN111897534B (en) 2020-06-22 2020-06-22 Method, device, electronic equipment and storage medium for accessing SSLVPN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010573846.XA CN111897534B (en) 2020-06-22 2020-06-22 Method, device, electronic equipment and storage medium for accessing SSLVPN

Publications (2)

Publication Number Publication Date
CN111897534A CN111897534A (en) 2020-11-06
CN111897534B true CN111897534B (en) 2023-11-10

Family

ID=73207729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010573846.XA Active CN111897534B (en) 2020-06-22 2020-06-22 Method, device, electronic equipment and storage medium for accessing SSLVPN

Country Status (1)

Country Link
CN (1) CN111897534B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072108A (en) * 2007-07-17 2007-11-14 杭州华三通信技术有限公司 SSL VPN client end safety inspection method, system and device
CN106789535A (en) * 2016-12-29 2017-05-31 杭州迪普科技股份有限公司 The IP cut-in methods and device of SSL VPN
CN106803822A (en) * 2015-11-26 2017-06-06 北京网御星云信息技术有限公司 The safety access method and device of network application
CN110221830A (en) * 2019-06-12 2019-09-10 苏州亿歌网络科技有限公司 A kind of method and system loading WebView on PC

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072108A (en) * 2007-07-17 2007-11-14 杭州华三通信技术有限公司 SSL VPN client end safety inspection method, system and device
CN106803822A (en) * 2015-11-26 2017-06-06 北京网御星云信息技术有限公司 The safety access method and device of network application
CN106789535A (en) * 2016-12-29 2017-05-31 杭州迪普科技股份有限公司 The IP cut-in methods and device of SSL VPN
CN110221830A (en) * 2019-06-12 2019-09-10 苏州亿歌网络科技有限公司 A kind of method and system loading WebView on PC

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
应用SSL VPN实现安全移动办公;蔡加柳;;科技创新导报(第30期);第21页 *
跨平台技术在数字图书馆的应用研究;李玉海;舒昌俊;;图书馆学研究(第08期);第21-24页 *

Also Published As

Publication number Publication date
CN111897534A (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN110808897A (en) Proxy access method, user equipment, storage medium, device and system
US10268566B2 (en) Debugging in a private cloud environment
CN107528858B (en) Login method, device and equipment based on webpage and storage medium
CN107688529B (en) Component debugging method and device
CN102254113A (en) Method and system for detecting and intercepting malicious code of mobile terminal
WO2018108041A1 (en) Remote debugging method and device, and computer storage medium
US20220129256A1 (en) Android penetration method and device for implementing silent installation based on accessibility services
US20130046878A1 (en) Asynchronous request interception for testing a request life-cycle
CN103064738A (en) Method and system for embedding local application program window into browser in Linux
US20140317537A1 (en) Browser based application program extension method and device
US20120089875A1 (en) Multi-user test framework
CN110716720A (en) Method and device for realizing application hot deployment
CN114826749A (en) Interface access control method, device and medium
US20130325960A1 (en) Client-side sharing of event information
CN102156650B (en) Method and device capable of implementing automatic analysis of patch
CN111078424A (en) Information interaction method and device, computer equipment and storage medium
CN110321507B (en) Browser cross-domain communication method and device
CN108509228B (en) Page loading method, terminal equipment and computer readable storage medium
CN107798244B (en) Method and device for detecting remote code execution vulnerability
CN111897534B (en) Method, device, electronic equipment and storage medium for accessing SSLVPN
CN107766068A (en) Application system patch installation, device, computer equipment and storage medium
CN110825622A (en) Software testing method, device, equipment and computer readable medium
CN112491940A (en) Request forwarding method and device of proxy server, storage medium and electronic equipment
CN113031964B (en) Big data application management method, device, equipment and storage medium
CN115374083A (en) Data source switching method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant