Session keep-alive method and device
A technology for messages and business data, which is applied in the field of session keep-alive and proxy server, and can solve problems such as session keep-alive technology client email content being tampered with
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0103] The embodiment of the present invention provides a method for keeping alive a session. The execution subject of the method is a network device with a proxy server function. Optionally, the network device can be a network firewall, or a dedicated HTTP proxy server, mail proxy server and so on. The mail server includes at least a POP3-based mail proxy server and an IMAP4-based mail proxy server.
[0104] attached figure 1 The proxy server is located at the exit of the LAN border and connected to the bearer network. In addition, the proxy server can also be deployed in front of the real server, that is, between the real server and the Internet, or deployed in other locations. The proxy server communicates with the client (such as figure 1 The client 100, the client 101 and the client 102) establish a session, and simultaneously establish a session with the server. The client and server in this application may be physical devices or application programs running on the ph...
Embodiment 2
[0146] In the embodiment of the present invention, the proxy server is a POP3-based mail proxy server as an example. Figure 5 The shown sequence diagram introduces the session keep-alive method provided by the embodiment of the present invention.
[0147] as attached Figure 5 As shown, the network system includes at least a client, a proxy server and a real mail server (hereinafter referred to as a mail server).
[0148] In step 501, the client sends a mailing list acquisition request, and the payload content carried in the request is "LIST\r\n". The request also carries the identifier of the client.
[0149] Please refer to the relevant standards of the POP3 protocol for the specific setting methods of the payload content in the request message for different purposes, and will not be described in detail here.
[0150] Step 502, the proxy server forwards the mailing list acquisition request to the mail server.
[0151] In step 503, after receiving the request for obtaini...
Embodiment 3
[0188] In the embodiment of the present invention, the proxy server is an IMAP4-based mail proxy server as an example. Figure 6 The shown sequence diagram introduces the session keep-alive method provided by the embodiment of the present invention.
[0189] as attached Figure 6 As shown, the network system includes at least a client, a proxy server and a real mail server. The client needs to obtain an email from the mail server through the proxy server, assuming that the client has logged into the mailbox through authentication.
[0190] In step 601, the client sends an email data acquisition request, specifically carrying a payload of "hmvx UIDFETCH28(UID FLAGS BODY.PEEK[])".
[0191] In step 602, the proxy server forwards the request for acquiring the mail data to the mail server.
[0192] Step 603, the mail server sends a first message, the first message is used to respond to the request for obtaining the mail data, and the first message carries information indicating ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


