Supercharge Your Innovation With Domain-Expert AI Agents!

Proxy connection method and device

A proxy connection and connection request technology, which is applied in the field of computer networks, can solve problems such as long implementation period, complex implementation of centralized proxy, and large amount of adaptation protocol coding, so as to meet individual needs, shorten upgrade time, and shorten development cycle Effect

Active Publication Date: 2021-10-22
BEIJING MATARNET TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Due to the protocols involved in login and remote terminals, the existing centralized proxy implementation is relatively complicated, and its shortcomings are mainly manifested in the following aspects: Based on the development of languages ​​​​closer to the protocol layer such as C / C++, each protocol needs to be individually adapted , currently only Telnet and ssh are adapted, and ssh does not support every encryption method, the adaptation protocol has a large amount of coding, and it is difficult to maintain in the later stage; a large number of protocol libraries are referenced, once the reference library is upgraded to solve the vulnerability, it is used to implement the agent The connected program also needs to be upgraded accordingly, requiring a lot of coding work, and the implementation period is too long; it is difficult to remove control characters, judge the leading character, and judge the completion of instruction execution; the timeout control mechanism is complicated to implement; realize the data interaction with the client alone Encryption and decryption are more difficult, and currently there are few encryption applications; it is difficult to customize the interaction protocol according to the project customer, and the customization is mainly to redevelop this part of the code
[0009] Therefore, the maintenance of the existing centralized proxy technology is difficult, the cost of the adaptation protocol is too high, the secure transmission needs to be customized, the implementation of the timeout control mechanism is complicated, and it is difficult to customize the personalized interaction protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy connection method and device
  • Proxy connection method and device
  • Proxy connection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The embodiments of the present invention and all other embodiments obtained by persons of ordinary skill in the art without creative efforts all belong to the protection scope of the present invention.

[0028] In order to overcome the above-mentioned problems in the prior art, an embodiment of the present invention provides a proxy connection method and device. The inventive idea is to simplify the complex code writing work to the configuration of a few configuration items in the interactive tool, thereby reducing the number of centralized proxy serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a proxy connection method and device. Wherein, the proxy connection method includes: receiving the proxy connection request sent by the client through the first Socat tool, decrypting the proxy connection request, obtaining the information of the target device and the communication protocol used by the login target device; , call the program based on the communication protocol to log in the target device. The proxy connection method and device provided by the embodiment of the present invention are based on Socat to implement SSL encryption and decryption between the client and the server in a non-code manner, and call the built-in communication protocol-based program to log in to the target device through the pre-configured expect script, with a clear structure , security is guaranteed, it can shorten the development cycle, reduce the investment cost of R&D and maintenance, shorten the time-consuming upgrade, make maintenance simpler and more convenient, and can meet the individual needs of centralized agents for user or project customization.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of computer networks, and in particular to a proxy connection method and device. Background technique [0002] A proxy (Proxy), also known as a network proxy, is a special network service that allows a network terminal (generally a client) to make an indirect connection with another network terminal (generally a server) through this service. Some network devices such as gateways and routers have network proxy functions. It is generally believed that the proxy service is conducive to ensuring the privacy or security of network terminals and preventing attacks. A computer system or other type of network terminal that provides proxy services is called a proxy server (ProxyServer). [0003] A complete proxy request process is: the client first establishes a connection with the proxy server, and then requests to establish a connection to the target device or obtain a specified resource...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08
CPCH04L67/141H04L67/56
Inventor 谢杰福韩全磊
Owner BEIJING MATARNET TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More