CN112165480B - Information acquisition method and device and electronic equipment - Google Patents

Information acquisition method and device and electronic equipment Download PDF

Info

Publication number
CN112165480B
CN112165480B CN202011005365.5A CN202011005365A CN112165480B CN 112165480 B CN112165480 B CN 112165480B CN 202011005365 A CN202011005365 A CN 202011005365A CN 112165480 B CN112165480 B CN 112165480B
Authority
CN
China
Prior art keywords
request
target server
server
information
intermediate server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011005365.5A
Other languages
Chinese (zh)
Other versions
CN112165480A (en
Inventor
宋增宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zitiao Network Technology Co Ltd
Original Assignee
Beijing Zitiao Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zitiao Network Technology Co Ltd filed Critical Beijing Zitiao Network Technology Co Ltd
Priority to CN202011005365.5A priority Critical patent/CN112165480B/en
Publication of CN112165480A publication Critical patent/CN112165480A/en
Application granted granted Critical
Publication of CN112165480B publication Critical patent/CN112165480B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Abstract

The embodiment of the disclosure discloses an information acquisition method, an information acquisition device and electronic equipment. The method comprises the following steps: generating a first request conforming to a second communication protocol in response to receiving an information acquisition instruction sent by a user; the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; sending the first request to the target server through the intermediate server; and receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire the information indicated by the information acquisition request from the target server. The client and the target server which cannot establish communication connection through the first communication protocol can provide a safe path for information communication based on the second communication protocol, and the client is assisted to penetrate through a firewall to establish communication connection with the target server.

Description

Information acquisition method and device and electronic equipment
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an information obtaining method and apparatus, and an electronic device.
Background
The communication network is a link for physically connecting each isolated device to realize information exchange between people, between people and computers, and between computers, thereby achieving the purpose of resource sharing and communication.
Before the client communicates with the target server to obtain the corresponding information, a dedicated channel for transmitting the information needs to be established depending on a communication network. That is, after the client establishes communication connection with the target server, information exchange and transmission can be performed through the established transmission path, so that the user can acquire corresponding information.
Disclosure of Invention
This disclosure is provided to introduce concepts in a simplified form that are further described below in the detailed description. This disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The embodiment of the disclosure provides an information acquisition method, an information acquisition device and electronic equipment.
In a first aspect, an embodiment of the present disclosure provides an information obtaining method, where the method includes: generating a first request which accords with a second communication protocol in response to receiving an information acquisition instruction sent by a user; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; sending the first request to a target server through an intermediate server; the target server and the intermediate server establish a second communication connection through the second communication protocol in advance; the target server provides information service through the first communication protocol, the client acquires information through the first communication protocol, and the target server and the client cannot establish communication connection through the first communication protocol; and receiving first feedback information which is forwarded by the intermediate server and fed back by the target server and succeeds in establishing the first communication connection, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire information indicated by the information acquisition request from the target server.
In a second aspect, an embodiment of the present disclosure provides an information acquiring apparatus, including: the generating module is used for responding to the received information acquisition instruction sent by the user and generating a first request conforming to a second communication protocol; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; the first sending module is used for sending the first request to a target server through an intermediate server; the target server and the intermediate server establish a second communication connection through the second communication protocol in advance; the target server provides information service through the first communication protocol, the client acquires information through the first communication protocol, and the target server and the client cannot establish communication connection through the first communication protocol; and the second sending module is used for receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire the information indicated by the information acquisition request from the target server.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including: one or more processors; a storage device having one or more programs stored thereon, which when executed by the one or more processors, cause the one or more processors to implement the information acquisition method of the first aspect.
In a fourth aspect, the disclosed embodiments provide a computer-readable medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the information acquisition method according to the first aspect.
According to the information acquisition method, the information acquisition device and the electronic equipment, the first request conforming to the second communication protocol is generated by responding to the received information acquisition instruction sent by the user; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; then, the first request is sent to a target server through an intermediate server; the target server establishes a second communication connection with the intermediate server in advance through the second communication protocol, the target server provides information service through the first communication protocol, the client acquires information through the first communication protocol, and the target server cannot establish communication connection with the client through the first communication protocol; and finally, receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire the information indicated by the information acquisition request from the target server. By encapsulating a first communication connection establishment request conforming to a first communication protocol in a first request conforming to a second communication protocol and by means of the intermediate server instead of forwarding the information of the request to and from or responding to the information, the client and the target server which cannot establish communication connection through the first communication protocol can provide a safe path for information to and from based on the second communication protocol, and assist the client to penetrate through a firewall to establish communication connection with the target server so as to acquire information corresponding to the information acquisition instruction.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow diagram of one embodiment of an information acquisition method according to the present disclosure;
FIG. 2 is a schematic structural diagram of one embodiment of an information acquisition device according to the present disclosure;
FIG. 3 is an exemplary system architecture in which the information acquisition method of one embodiment of the present disclosure may be applied;
fig. 4 is a schematic diagram of a basic structure of an electronic device provided according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and the embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "including" and variations thereof as used herein is intended to be open-ended, i.e., "including but not limited to". The term "based on" is "based at least in part on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, a flow chart of an embodiment of an information acquisition method according to the present disclosure is shown, which may be applied to a client. As shown in fig. 1, the information acquisition method includes the following steps 101 to 103.
Step 101, responding to a received information acquisition instruction sent by a user, and generating a first request conforming to a second communication protocol; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol.
In practice, before the client and the target server perform information transmission, a communication connection is required to be performed so as to establish a transmission path for transmitting information.
The client may include an application installed on a terminal device, such as a chat client, a news browsing client, and the like, capable of executing the information acquisition method. The terminal device may include, but is not limited to, a mobile phone, a computer, a tablet, etc. The user can trigger a preset control for information acquisition on the client so as to send an information acquisition instruction to the client. The target server may provide an information service for the client. For example, after receiving an information acquisition instruction sent by a client, information corresponding to the information acquisition instruction may be sent to the client. The information acquisition instruction here may include, for example, an instruction to acquire file information, an instruction to acquire video information, and the like. The second communication Protocol may include, for example, a HyperText Transfer Protocol (HTTP), a Transmission Control Protocol (TCP), and the like, and the first communication Protocol may include, for example, a File Transfer Protocol (FTP), and the like.
After receiving the information acquisition instruction, the client may generate a first request conforming to the second communication protocol, so as to establish a communication connection with the corresponding target server. Here, the client may encapsulate a first communication connection request conforming to the first communication protocol in a payload part of the first request, so that the first communication connection establishment request may be transmitted by the first request conforming to the second communication protocol. The first request may include, for example, an information request characterizing "request to establish a communication connection conforming to a first communication protocol".
In practice, the encapsulation process may be implemented using a tunneling protocol (a protocol of one network layer is used to transport a protocol of another network layer, whose basic functions are encapsulation and encryption, and which is mainly implemented using a network tunnel). That is, the first communication connection establishment request may be encapsulated in the first request by using the tunneling protocol, so that the client and the target server that cannot establish a communication connection through the first communication protocol establish a communication connection based on the second communication protocol.
Step 102, sending a first request to a target server through an intermediate server; the target server and the intermediate server establish a second communication connection through a second communication protocol in advance; the target server provides information service through a first communication protocol, and the client acquires information through the first communication protocol; the target server and the client can not establish communication connection through the first communication protocol.
In some application scenarios, if a client needs to obtain information from a target server in an extranet environment in an intranet environment, the client needs to cross a firewall between the intranet and the extranet to exchange information. The intermediate server and the intranet client can perform data communication based on intranet connection, and the intermediate server and the target server can perform data communication based on public network connection. Thus, the intermediate server can be used for the purpose of surmounting the firewall.
In the application scenario, data communication between the client and the target server can be realized by using the intermediate server in a forward proxy manner. That is, to establish a communication connection with a target server, the client may send the first request to the intermediate server and instruct the intermediate server to send the first request to the corresponding target server. After receiving the first request, the intermediate server may forward the first request to the target server.
Before sending the first request, the intermediate server may establish the second communication connection with the target server in advance. That is, the first request may be transmitted on the premise that the second communication connection is successfully established. For example, before sending the first request conforming to the TCP protocol, the intermediate server may previously establish a TCP connection with the target server, and after the TCP connection is successfully established, the first request conforming to the TCP protocol may be sent through the established TCP transmission channel.
Step 103, receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and conforms to the first communication protocol to the target server through the intermediate server so as to acquire information indicated by the information acquisition request from the target server.
After receiving the first request, the target server may send the first feedback information if it is determined that the first communication connection with the client may be established. At this time, the target server sends the first feedback information to the intermediate server and instructs the intermediate server to forward the first feedback information to the client. And after receiving the first feedback information, the client determines that the first communication connection is successfully established. The information acquisition request corresponding to the information acquisition instruction may be sent to the intermediate server based on the first communication protocol, and forwarded to the target server via the intermediate server. After receiving the information acquisition request, the target server may return the corresponding information to the intermediate server and return the information to the client via the intermediate server. And then, information exchange between the client and the target server is realized. For example, after receiving the first feedback information fed back by the target server, the client may send a file information obtaining request, which is generated by the received file information obtaining instruction and conforms to the first communication protocol, to the intermediate server, and instruct the intermediate server to forward the file information obtaining request to the target server. After receiving the file information acquisition request, the target server may forward the corresponding file to the client via the intermediate server based on the established first communication connection, and then the client may present information content corresponding to the file information to the user. The first feedback information may include, for example, text information that literally makes the client know that the first communication connection is successfully established, such as "first communication connection is successfully established", "first communication connection is established", or digital content that is agreed between the client and the target server, such as "134" and "125", and makes the client know that the first communication connection is successfully established.
In the prior art, under the condition that a firewall exists between a client and a target server, if a secure channel is not established by using other protocols (for example, a secure shell protocol, a transmission control protocol, and the like) when the client and the target server perform information transmission, normal communication of information is difficult to achieve.
In the embodiment, a first request conforming to a second communication protocol is generated by first responding to a received information acquisition instruction sent by a user; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; then, sending the first request to a target server through an intermediate server; the target server establishes a second communication connection with the intermediate server through a second communication protocol in advance; the target server provides information service through a first communication protocol, and the client acquires information through the first communication protocol; the target server and the client cannot establish communication connection through a first communication protocol; and finally, receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire the information indicated by the information acquisition request from the target server. By encapsulating a first communication connection establishment request conforming to a first communication protocol in a first request conforming to a second communication protocol and by using an intermediate server instead of a mode of forwarding the information of a current request or response information, a client and a target server which cannot establish communication connection through the first communication protocol can provide a safe path for information current and current based on the second communication protocol, and assist the client to penetrate through a firewall to establish communication connection with the target server so as to acquire information corresponding to an information acquisition instruction.
In some alternative implementations, the first request includes a control request encapsulating a control link establishment request and a data request encapsulating a data link establishment request. That is, the first communication connection establishment request may include a control link establishment request and a data link establishment request. After receiving an information acquisition instruction sent by a user, the client may package the control link establishment request and the data link establishment request respectively to obtain corresponding control requests and data requests, so as to establish a first communication connection with the target server through the first request.
After the first request includes the control request and the data request, the step 102 may be implemented based on the following sub-steps.
Sub-step 1021, sends the control request to the intermediate server and instructs the intermediate server to send the control request to the target server to establish a control link with the target server.
In some application scenarios, establishing the first communication connection requires establishing a control link to enable communication of control commands between the client and the target server. At this time, the client may send a control request to the intermediate server, and forward the control request to the target server through the intermediate server to request establishment of a control link with the target server.
Sub-step 1022, receiving the second feedback information forwarded by the intermediate server and fed back by the target server, that the control link is successfully established, sending the data request to the intermediate server, and instructing the intermediate server to send the data request to the target server, so as to establish the data link with the target server.
After receiving the control request, the target server may respond to the control request. That is, if the target server determines to establish the control link with the client, the target server may generate the second feedback information, send the second feedback information to the intermediate server, and forward the second feedback information to the client via the intermediate server. After receiving the second feedback information, the client may determine that the control link establishment is successful. At this time, a data link may be requested to be established to enable uploading or downloading of corresponding data information. That is, the client may send the data request to the intermediate server, and forward the data request to the target server via the intermediate server to request to establish a data link with the target server. The second feedback information may include, for example, text information that literally makes the client know that the control link is successfully established, such as "control link is successfully established", "control link is established already", or digital content that makes the client know that the control link is successfully established, such as "110" or "112", and is agreed between the client and the target server.
After the sub-steps are performed, the step 103 may include: and in response to receiving third feedback information which is forwarded by the intermediate server and fed back by the target server and is successfully established, determining to receive the first feedback information.
The target server, after receiving the data request, may respond to the data request. That is, if the target server determines to establish the data link with the client, the target server may generate the third feedback information, send the third feedback information to the intermediate server, and forward the third feedback information to the client via the intermediate server. After receiving the third feedback information, the client may determine that the data link is successfully established. After the control link and the data link are successfully established, it may be considered that the first communication connection is successfully established, that is, when the client receives the third feedback information, it may be considered that the first feedback information is received. The third feedback information here may include, for example, literal information that the client may know the successful establishment of the data link by literal meaning, such as "successful establishment of the data link", "established data link" and the like, or digital content that the client may know the successful establishment of the data link and is agreed by the client and the target server, such as "111", "115" and the like.
In some optional implementations, before sending the data request to the intermediate server, the information obtaining method may further include the following steps 1 and 2.
Step 1, sending an identity authentication request to an intermediate server, and instructing the intermediate server to send the identity authentication request to a target server.
That is, after the client and the target server successfully establish the control link, identity authentication is required to be performed to implement validity check between the client and the target server, and then it is determined whether the client can establish the first communication connection with the target server.
The client may send an authentication request and forward to the target server via the intermediate server. After receiving the identity authentication request, the target server may determine whether the identity information corresponding to the identity authentication request is legal. In some application scenarios, after a control link between a client and a target server is successfully established, the target server may store identity information of the client, and when validity check is performed, the target server may determine whether the identity information is valid by whether the identity information corresponding to an identity authentication request can be queried; in other application scenarios, if the target server does not inquire the corresponding identity information, whether the identity information is legal or not can be judged in a key verification manner. That is, the client may send the key agreed with the target server to the target server, and the target server may determine whether the identity information is legal by determining whether the key information can be queried.
And step 2, responding to the received fourth feedback information of successful identity authentication, and sending the data request to the intermediate server.
And after receiving the identity authentication request, the target server authenticates the identity information corresponding to the identity authentication request, and if the identity information is determined to be legal, the target server can generate the fourth feedback information, send the fourth feedback information, and forward the fourth feedback information to the corresponding client through the intermediate server. The fourth feedback information here may include, for example, text information that literally allows the client to know that the validity check is successful, such as "successful authentication" and "correct identity information", or digital content that allows the client to know that the validity check is successful, which is agreed by the client and the target server, such as "123" and "234".
In some optional implementations, the identity authentication request may include a user name authentication request and a user password authentication request, and step 1 may include the following steps:
firstly, a user name authentication request is sent to the intermediate server, and the intermediate server is instructed to send the corresponding user name information to the target server.
That is to say, when the client sends the identity authentication request, the client may first send a user name authentication request, and when the target server receives the user name authentication request, the target server may query whether the user name corresponding to the user name authentication request is stored in the target server, and then determine whether the user name can pass authentication. For example, the client may send a user name authentication request with a user name of "zhang san", and after receiving the user name authentication request, the target server may query whether the client corresponding to the user name is in a white list in which a control link is successfully established, and if it is determined that "zhang san" is in the white list, it may be determined that the user name authentication is successful.
And secondly, responding to the received first identity feedback information of successful user name authentication, sending a user password authentication request, and instructing an intermediate server to send corresponding user password information to a target server.
After the target server determines that the user name authentication is successful, the target server may send the first identity feedback information to the intermediate server, and forward the first identity feedback information to the client via the intermediate server. After receiving the first identity feedback information, the client may send a user password authentication request corresponding to the user name, and after receiving the user password authentication request, the target server may determine whether password information corresponding to the user password authentication request corresponds to the user name. The user password information may be information data that the client has agreed with the target server in advance for identity authentication. For example, for the client corresponding to the user name "zhangsan", the corresponding user password information may be "123". The first identity feedback information may include, for example, text information that literally allows the client to know that the user name authentication is successful, such as "correct user name", "successful user name authentication", and the like, or digital content that allows the client to know that the user name authentication is successful, which is agreed between the client and the target server, such as "220", "330", and the like.
After the client performs the above steps, step 2 may include: and responding to the received second identity feedback information of successful user password authentication, and sending the data request to the intermediate server.
And after the target server determines that the user name authentication is successful and the corresponding user password authentication is successful, the target server can send the second identity feedback information to the intermediate server and forwards the second identity feedback information to the client through the intermediate server. After receiving the second identity feedback information, the client may send a data request to establish a corresponding data link. The second identity feedback information may include, for example, text information that literally enables the client to know that the user password authentication succeeds, such as "the user password is correct" and "the user password authentication succeeds", or digital content that the client and the target server agree to enable the client to know that the user name authentication succeeds, such as "230" and "350".
In some optional implementations, before sending the data request to the intermediate server, the information obtaining method further includes the following steps:
firstly, a passive working mode of a first communication protocol is established, and transmission port information is obtained based on the passive working mode.
In some application scenarios, the first communication protocol may include an active operation mode (PORT mode) and a passive operation mode (PASV mode). The passive mode of operation and the active mode of operation here differ in that: in the active working mode, a target server providing information service through a first communication protocol is actively connected with a data port of a corresponding client; in the passive working mode, the target server passively waits for the client to connect with the data port of the target server.
In some application scenarios, the first communication protocol of the passive operating mode may be used in the case where a client located behind a firewall accesses a target server in an extranet. Because in this case the firewall is typically configured not to allow the extranet access to clients behind the firewall, but only to allow communication connection requests initiated by clients behind the firewall to pass through. Thus, in this case the passive mode of operation can be selected. After the passive working mode of the client is successfully established, the transmission port information can be obtained from the target server.
Secondly, based on the transmission port information, the transmission port allocated by the target server is determined, so as to obtain the information indicated by the information obtaining request through the transmission port.
The transmission port information may include a character string representing port information, and after receiving the character string, the client may calculate a corresponding port number (port) according to a preset calculation manner based on the character string. For example, the client receives 20 character string 1 (port 1) and 1 character string 2 (port 2), and the preset calculation manner may be port = portPart1 +portpart2. That is, when port1=20,2 =1, the corresponding port number can be calculated to be 5121 (port =20 × 256+1= 5121). When the transmission port is determined, the information can be transmitted through the transmission port.
In some optional implementations, the first communication protocol includes an FTP protocol and the second communication protocol includes a TCP protocol.
In some application scenarios, the first communication protocol may be an FTP protocol (i.e., a file transfer protocol), and since the FTP protocol is a layer 7 protocol, there is no existing solution for file transfer based on an intermediate server and the layer 7 FTP protocol in the prior art, and then the file transfer may be implemented based on a layer 4 TCP protocol. That is, the second communication protocol may be a TCP protocol (i.e., a transmission control protocol). That is, the client and the target server may include an FTP client and an FTP target server that perform file transfer by an FTP protocol.
In some application scenarios, the FTP client may generate a first request conforming to the TCP protocol when receiving a file acquisition request sent by a user. The first request here encapsulates a FTP communication connection establishment request conforming to the FTP protocol. The first request is then sent to the intermediate server and the intermediate server is instructed to send the first request to the FTP target server. The FTP target server here establishes a TCP connection with the intermediate server in advance via the TCP protocol.
After receiving the first request, the FTP target server may determine that the FTP connection is successfully established, and then may send first feedback information that the FTP connection is successfully established to the FTP client. After receiving the first feedback information, the FTP client may send a file acquisition request conforming to the FTP protocol, generated by the file acquisition instruction, to the intermediate server, and forward the file acquisition request to the FTP target server via the intermediate server, so as to acquire a corresponding file from the FTP target server.
Because the FTP protocol establishes a data path, the FTP target server may allocate an arbitrary port, and in modern network architecture, for security reasons and other reasons, the firewall of the intranet, except the internationally recognized ports such as 80/21/443, must not establish connection communication with the intranet at will. Therefore, if the FTP client and the FTP target server are not transmitting through the internationally recognized ports 80/21/443, the communication and interaction may not be completed normally under the firewall.
The prior art provides a way (SFTP for short) based on secure shell protocol (SSH) to assist FTP clients in traversing firewalls. That is, it is a de facto standard that the application layer FTP protocol runs on top of SSH, that SSH provides 22 ports as default ports, and that any firewall will drop 22 ports by default. Under SFTP, both the FTP client and the FTP target server would first communicate through the SSH's 22 ports, and in fact, the SSH assists in completing the task of communicating across the firewall.
The embodiment provides a solution for an FTP server that does not support SFTP. That is, by encapsulating the FTP protocol in the payload portion of the TCP protocol, the FTP connection can then be completed with the assistance of the TCP protocol to enable file transfer.
Referring to fig. 2, which shows a schematic structural diagram of an embodiment of an information acquisition apparatus according to the present disclosure, as shown in fig. 2, the information acquisition apparatus includes a generating module 201, a first sending module 202, and a second sending module 203. The generating module 201 is configured to generate a first request conforming to a second communication protocol in response to receiving an information acquisition instruction sent by a user; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; a first sending module 202, configured to send the first request to the target server through the intermediate server; the target server and the intermediate server establish a second communication connection through a second communication protocol in advance; the target server provides information service through a first communication protocol, and the client acquires information through the first communication protocol; the target server and the client cannot establish communication connection through a first communication protocol; the second sending module 203 is configured to receive first feedback information that is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and send an information obtaining request that is generated according to the information obtaining instruction and conforms to the first communication protocol to the target server through the intermediate server, so as to obtain information indicated by the information obtaining request from the target server.
It should be noted that specific processing of the generation module 201, the first sending module 202, and the second sending module 203 of the information obtaining apparatus and technical effects thereof may refer to related descriptions of step 101 to step 103 in the corresponding embodiment of fig. 1, and are not described herein again.
In some optional implementations of this embodiment, the first request includes a control request encapsulating a control link establishment request and a data request encapsulating a data link establishment request, and the first sending module 202 is further configured to: sending the control request to an intermediate server and instructing the intermediate server to send the control request to a target server so as to establish a control link with the target server; receiving second feedback information which is forwarded by the intermediate server and is successfully established by the control link fed back by the target server, sending the data request to the intermediate server, and instructing the intermediate server to send the data request to the target server so as to establish a data link with the target server; and the second sending module 203 is further configured to: and in response to receiving third feedback information which is forwarded by the intermediate server and is successfully established by the data link fed back by the target server, determining to receive the first feedback information.
In some optional implementation manners of this embodiment, the information obtaining apparatus further includes a third sending module, where the third sending module is configured to: before sending the data request to the intermediate server, sending an identity authentication request to the intermediate server, and instructing the intermediate server to send the identity authentication request to the target server; and responding to the received fourth feedback information of successful identity authentication, and sending the data request to the intermediate server.
In some optional implementations of this embodiment, the identity authentication request includes a username authentication request and a user password authentication request, and the third sending module is further configured to: sending a user name authentication request to an intermediate server, and indicating the intermediate server to send corresponding user name information to a target server; responding to the received first identity feedback information of successful user name authentication, sending a user password authentication request, and instructing an intermediate server to send corresponding user password information to a target server; and responding to the received second identity feedback information of the successful user password authentication, and sending the data request to the intermediate server.
In some optional implementation manners of this embodiment, the information obtaining apparatus may further include a transmission port determining module, where the transmission port determining module is configured to: before sending the data request to the intermediate server, establishing a passive working mode of a first communication protocol, and acquiring transmission port information based on the passive working mode; and determining a transmission port allocated by the target server based on the transmission port information so as to acquire the information indicated by the information acquisition request through the transmission port.
In some optional implementations of this embodiment, the first communication protocol includes an FTP protocol, and the second communication protocol includes a TCP protocol.
Referring to fig. 3, an exemplary system architecture to which the information acquisition method of one embodiment of the present disclosure may be applied is shown.
As shown in fig. 3, the system architecture may include terminal devices 301, 302, 303, a network 304, and a server 305. Network 304 is the medium used to provide communication links between terminal devices 301, 302, 303 and server 305. Network 304 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The terminal devices and servers described above may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The terminal devices 301, 302, 303 may interact with a server 305 over a network 304 to receive or send messages or the like. The terminal devices 301, 302, 303 may have various client applications installed thereon, such as a video distribution application, a search-type application, and a news-information-type application.
The terminal devices 301, 302, 303 may be hardware or software. When the terminal devices 301, 302, 303 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like. When the terminal device 301, 302, 303 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., software or software modules used to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 305 may be a server that can provide various services, for example, receives an information acquisition request transmitted by the terminal devices 301, 302, 303, performs analysis processing on the information acquisition request, and transmits the analysis processing result (for example, information data corresponding to the above-described acquisition request) to the terminal devices 301, 302, 303.
It should be noted that the information obtaining method provided by the embodiment of the present disclosure may be executed by a terminal device, and accordingly, the information obtaining apparatus may be disposed in the terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 3 are merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to fig. 4, shown is a schematic diagram of an electronic device (e.g., the terminal device of fig. 3) suitable for use in implementing embodiments of the present disclosure. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the electronic device may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 401 that may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 402 or a program loaded from a storage means 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the electronic apparatus are also stored. The processing device 401, the ROM 402, and the RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 408 including, for example, tape, hard disk, etc.; and a communication device 409. The communication means 409 may allow the electronic device to communicate with other devices wirelessly or by wire to exchange data. While fig. 4 illustrates an electronic device having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication device 409, or from the storage device 408, or from the ROM 402. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 401.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: generating a first request conforming to a second communication protocol in response to receiving an information acquisition instruction sent by a user; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol; sending the first request to the target server through the intermediate server; the target server and the intermediate server establish a second communication connection through a second communication protocol in advance; the target server provides information service through a first communication protocol, and the client acquires information through the first communication protocol; the target server and the client cannot establish communication connection through a first communication protocol; and receiving first feedback information which is forwarded by the intermediate server and fed back by the target server and succeeds in establishing the first communication connection, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with a first communication protocol to the target server through the intermediate server so as to acquire information indicated by the information acquisition request from the target server.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of the module does not constitute a limitation on the unit itself in some cases, for example, the generating module 201 may also be described as "a module that generates a first request conforming to the second communication protocol in response to receiving an information acquisition instruction issued by a user".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and the technical features disclosed in the present disclosure (but not limited to) having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (9)

1. An information acquisition method is applied to a client, and is characterized by comprising the following steps:
generating a first request conforming to a second communication protocol in response to receiving an information acquisition instruction sent by a user; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol;
sending the first request to a target server through an intermediate server; the target server and the intermediate server establish a second communication connection through the second communication protocol in advance; the target server provides information service through the first communication protocol, the client acquires information through the first communication protocol, and the target server and the client cannot establish communication connection through the first communication protocol;
and receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire the information indicated by the information acquisition request from the target server.
2. The method of claim 1, wherein the first request comprises a control request encapsulating a control link setup request and a data request encapsulating a data link setup request, and
the sending the first request to a target server through an intermediate server includes:
sending the control request to the intermediate server and instructing the intermediate server to send the control request to the target server to establish a control link with the target server; and
receiving second feedback information which is forwarded by the intermediate server and is successfully established by the control link fed back by the target server, sending the data request to the intermediate server, and instructing the intermediate server to send the data request to the target server so as to establish a data link with the target server; and
the receiving first feedback information that the first communication connection fed back by the target server and forwarded by the intermediate server is successfully established includes:
and in response to receiving third feedback information which is forwarded by the intermediate server and is successfully established by the data link fed back by the target server, determining to receive the first feedback information.
3. The method of claim 2, wherein prior to said sending the data request to the intermediate server, the method further comprises:
sending an identity authentication request to the intermediate server, and instructing the intermediate server to send the identity authentication request to the target server; and
and responding to the received fourth feedback information of successful identity authentication, and sending the data request to the intermediate server.
4. The method of claim 3, wherein the identity authentication request comprises a username authentication request and a user password authentication request, and
the sending an identity authentication request to the intermediate server and instructing the intermediate server to send the identity authentication request to the target server includes:
sending the user name authentication request to the intermediate server, and indicating the intermediate server to send corresponding user name information to the target server;
responding to the received first identity feedback information of successful user name authentication, sending the user password authentication request, and instructing the intermediate server to send corresponding user password information to the target server; and
the sending the data request to the intermediate server in response to receiving the fourth feedback information that the identity authentication is successful includes:
and responding to the received second identity feedback information of successful user password authentication, and sending the data request to the intermediate server.
5. The method of claim 2, wherein prior to said sending the data request to the intermediate server, the method further comprises:
establishing a passive working mode of the first communication protocol, and acquiring transmission port information based on the passive working mode; and
and determining a transmission port allocated by the target server based on the transmission port information so as to acquire the information indicated by the information acquisition request through the transmission port.
6. The method of claim 1, wherein the first communication protocol comprises an FTP protocol and the second communication protocol comprises a TCP protocol.
7. An information acquisition device is applied to a client, and is characterized by comprising:
the generating module is used for responding to the received information acquisition instruction sent by the user and generating a first request conforming to a second communication protocol; wherein the first request encapsulates a first communication connection establishment request conforming to a first communication protocol;
the first sending module is used for sending the first request to the target server through the intermediate server; the target server and the intermediate server establish a second communication connection through the second communication protocol in advance; the target server provides information service through the first communication protocol, the client acquires information through the first communication protocol, and the target server and the client cannot establish communication connection through the first communication protocol;
and the second sending module is used for receiving first feedback information which is forwarded by the intermediate server and is successfully established by the first communication connection fed back by the target server, and sending an information acquisition request which is generated according to the information acquisition instruction and accords with the first communication protocol to the target server through the intermediate server so as to acquire the information indicated by the information acquisition request from the target server.
8. An electronic device, comprising:
one or more processors;
storage means having one or more programs stored thereon which, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-6.
9. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN202011005365.5A 2020-09-22 2020-09-22 Information acquisition method and device and electronic equipment Active CN112165480B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011005365.5A CN112165480B (en) 2020-09-22 2020-09-22 Information acquisition method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011005365.5A CN112165480B (en) 2020-09-22 2020-09-22 Information acquisition method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112165480A CN112165480A (en) 2021-01-01
CN112165480B true CN112165480B (en) 2022-11-11

Family

ID=73863305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011005365.5A Active CN112165480B (en) 2020-09-22 2020-09-22 Information acquisition method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112165480B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887275B (en) * 2021-01-12 2022-08-30 苏州国科综合数据中心有限公司 Data processing method, device and storage medium
EP4297305A4 (en) * 2021-03-15 2024-01-24 Huawei Tech Co Ltd Data transmission method, apparatus and system
CN115150642B (en) * 2021-03-31 2023-09-22 阿里巴巴新加坡控股有限公司 Communication method, server, electronic device, and storage medium
CN114826754A (en) * 2022-05-06 2022-07-29 中国光大银行股份有限公司 Communication method and system among different networks, storage medium and electronic device
CN117440410B (en) * 2023-12-21 2024-03-12 广州通则康威科技股份有限公司 FTP protocol-based debugging control method and debugging controller

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1665239A (en) * 2004-03-03 2005-09-07 联想(北京)有限公司 A method for implementing information transmission between equipments of different communication protocols
CN102428665A (en) * 2009-03-16 2012-04-25 苹果公司 Accessory and mobile computing device communication using application communication protocol

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7461150B1 (en) * 2000-07-19 2008-12-02 International Business Machines Corporation Technique for sending TCP messages through HTTP systems
US7562146B2 (en) * 2003-10-10 2009-07-14 Citrix Systems, Inc. Encapsulating protocol for session persistence and reliability
US7984157B2 (en) * 2002-02-26 2011-07-19 Citrix Systems, Inc. Persistent and reliable session securely traversing network components using an encapsulating protocol
US20050160161A1 (en) * 2003-12-29 2005-07-21 Nokia, Inc. System and method for managing a proxy request over a secure network using inherited security attributes
US8504818B2 (en) * 2010-04-15 2013-08-06 Microsoft Corporation Method and system for reliable protocol tunneling over HTTP
CN104168322B (en) * 2014-08-25 2018-07-13 百度在线网络技术(北京)有限公司 Car-mounted terminal data transmission method, application server, client and user terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1665239A (en) * 2004-03-03 2005-09-07 联想(北京)有限公司 A method for implementing information transmission between equipments of different communication protocols
CN102428665A (en) * 2009-03-16 2012-04-25 苹果公司 Accessory and mobile computing device communication using application communication protocol

Also Published As

Publication number Publication date
CN112165480A (en) 2021-01-01

Similar Documents

Publication Publication Date Title
CN112165480B (en) Information acquisition method and device and electronic equipment
JP5933827B2 (en) Communication session transfer between devices
US11140162B2 (en) Response method and system in virtual network computing authentication, and proxy server
US10210030B2 (en) Securely operating remote cloud-based applications
US11700262B2 (en) System and method to securely execute datacenter management operations remotely
CN111930709B (en) Data storage method, apparatus, electronic device, and computer readable medium
KR20150003192A (en) Enabling web clients to provide web services
CN113905030B (en) Intranet and extranet communication method and device, intranet terminal, proxy server and storage medium
CN110177128B (en) Data transmission system and method for establishing VPN connection, terminal and VPN proxy thereof
CN110430292B (en) Method and device for inviting login of network platform, electronic equipment and readable medium
CN112866385B (en) Interface calling method and device, electronic equipment and storage medium
US20220377064A1 (en) Method and system for managing a web security protocol
US11831631B2 (en) Single sign-on for mobile applications using direct brokering for identity authentication
CN111726328B (en) Method, system and related device for remotely accessing a first device
CN116489621A (en) Vehicle key sharing method, device, equipment and medium
CN112257039B (en) Identity attribute adding method and device and electronic equipment
CN114238928A (en) Method and device for remote server management
CN112929453A (en) Method and device for sharing session data
CN113763646A (en) Device control method, device, electronic device and computer readable medium
CN113297588A (en) Password processing device, and control method and device of password processing device
CN113112640A (en) Unmanned aerial vehicle flight log uploading method and device, unmanned aerial vehicle and storage medium
CN114301968B (en) Access method, system, equipment and storage medium of server
US20230048931A1 (en) Split input and output remote access
US20240031358A1 (en) System and method for providing a web based rdp service through a zero trust cloud environment
US20230388296A1 (en) System and method for providing rdp client based rdp services through a zero trust cloud environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant