Information transmission method, apparatus, electronic device and computer readable medium

A technology of information transmission and electronic equipment, which is applied in the computer field, can solve problems such as information leakage, and achieve the effect of improving security and preventing information leakage

Active Publication Date: 2022-07-12
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This may cause security issues such as information leakage.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information transmission method, apparatus, electronic device and computer readable medium
  • Information transmission method, apparatus, electronic device and computer readable medium
  • Information transmission method, apparatus, electronic device and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present application will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the related invention, but not to limit the invention. In addition, it should be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0025] It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict. The present application will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.

[0026] figure 1 An exemplary system architecture 100 to which the information transmission method or information transmission apparatus of the embodiments of the present application can be applied is shown.

[0027] like figure 1 As sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the present application disclose an information transmission method, an apparatus, an electronic device, and a computer-readable medium. A specific implementation of the method includes: authenticating the access request sent by the client according to the secure file transfer protocol SFTP; in response to determining that the access request is authenticated, sending a connection request to the file transfer protocol FTP server; in response to determining that the connection request is authenticated Through, according to the operation request sent by the client, the information transmission between the client and the FTP server is realized. In this embodiment, the encrypted transmission of information can be realized by converting the FTP transmission protocol with the client to the SFTP transmission protocol. This helps to improve the security of information transmission and prevent information leakage.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technologies, and in particular, to information transmission methods, apparatuses, electronic devices, and computer-readable media. Background technique [0002] The bastion machine is usually an operation and maintenance security audit product for operation and maintenance users. That is, in a specific network environment, in order to protect the network and data from intrusion and damage from external and internal users, various technical means are used to collect and monitor the system status, security events, Network activities for centralized alarming, timely processing, and auditing and accountability. [0003] From the perspective of technical implementation, it is generally by cutting off the direct access of the terminal computer to the network and server resources. The protocol proxy method takes over the terminal computer's access to the network and server resources...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/06H04L67/14H04L69/08H04L9/40
Inventor 纪建芳
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products