Long information pushing method and device in bypass environment
An information push and environment technology, applied in the field of information network, can solve deployment and other problems, and achieve the effect of saving physical resources and good confidentiality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0063] Example 1:
[0064] Embodiment 1 of the present invention provides a method for pushing long information in a bypass environment, and its system architecture is as follows figure 2 As shown, the client C and the real server S perform TCP interaction, and all the interactive messages can be received by the push server P, and the push server P is transparent to the client C and the real server S. In the embodiment of the present invention, the push server P selectively sends packages to the user C or the real server S. When the push server P sends a package to the user C, the source IP is the real server S. When the push server P sends a package to the real server S, The source IP is user C; the interacting parties are user C and the real server S. If two packets with the same TCP sequence number are received, the one received first shall prevail, and the one received later shall be considered as duplicate information and discarded. Such as image 3 As shown, the methods i...
Example Embodiment
[0084] Example 2:
[0085] Such as Image 6 What is shown is a schematic structural diagram of an apparatus for pushing long information in a bypass environment according to an embodiment of the present invention. The device for pushing long information in a bypass environment in this embodiment includes one or more processors 21 and memories 22. among them, Image 6 Take one processor 21 as an example.
[0086] The processor 21 and the memory 22 can be connected by a bus or other means, Image 6 Take the bus connection as an example.
[0087] The memory 22 is used as a method and device for pushing long information in a bypass environment. A non-volatile computer-readable storage medium can be used to store non-volatile software programs and non-volatile computer-executable programs, as shown in Embodiment 1. The method of pushing long information in the bypass environment in. The processor 21 executes the long information push method in the bypass environment by running the non...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap