Information transmission method and device, electronic equipment and computer readable medium

A technology of information transmission and computer programs, which is applied in the computer field, can solve problems such as information leakage, and achieve the effect of improving security and preventing information leakage

Active Publication Date: 2019-06-07
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF11 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This may cause security issue

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information transmission method and device, electronic equipment and computer readable medium
  • Information transmission method and device, electronic equipment and computer readable medium
  • Information transmission method and device, electronic equipment and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0025] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0026] figure 1 An exemplary system architecture 100 to which the information transmission method or information transmission device of the embodiment of the present application can be applied is shown.

[0027] Such as figure 1 As shown, the system architecture 100 may in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an information transmission method and device, electronic equipment and a computer readable medium. A specific embodiment of the method comprises the following steps: authenticating an access request sent by a client according to a secure file transfer protocol SFTP; In response to determining that the access request passes the authentication, sending a connection request to a file transfer protocol FTP server; And in response to determining that the connection request passes the authentication, realizing information transmission between the client andthe FTP server according to an operation request sent by the client. According to the embodiment, the FTP transmission protocol with the client is converted into the SFTP transmission protocol, so that encrypted transmission of information can be realized. In this way, the safety of information transmission is improved, and information leakage is prevented.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technology, and in particular, to an information transmission method, device, electronic device, and computer-readable medium. Background technique [0002] The bastion host is usually an operation and maintenance security audit product for operation and maintenance users. That is, in a specific network environment, in order to protect the network and data from intrusion and damage from external and internal users, various technical means are used to collect and monitor the system status, security events, Network activities for centralized reporting, timely processing, and auditing and accountability. [0003] From the perspective of technical implementation, it generally cuts off the terminal computer's direct access to network and server resources. And adopt the way of agreement agent, have taken over the access of terminal computer to network and server resource. The curre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
Inventor 纪建芳
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products