Firewall opening verification method, electronic device, computer equipment and storage medium
A verification method and firewall technology, which is applied in the field of information security, can solve problems such as verification failure, prolonged network connection period, and destination service failure, and achieve the effects of shortening the cycle, improving the efficiency of opening the wall, and increasing the probability of network connection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] The present invention is further illustrated below by means of examples, but the present invention is not limited to the scope of the examples.
[0051] Firstly, the present invention proposes a firewall opening verification method.
[0052] In the first embodiment, if figure 1 As shown, the firewall opening verification method includes the following steps:
[0053] Step 1. The requester sends a task invocation request to the responder;
[0054] The first module of a certain software system and the network connection application program are installed on the requesting end, and the second module of a certain software system and the network connection program are installed on the responding end. When the requesting end uses the first module to perform tasks, it can A task invocation request is sent to the second module at the response end. The task call between the requester and the responder may also include mutual calls between different systems.
[0055] Step 2, ju...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


