CN115250185A - A method, device and related products for acquiring network resources - Google Patents
A method, device and related products for acquiring network resources Download PDFInfo
- Publication number
- CN115250185A CN115250185A CN202110383070.XA CN202110383070A CN115250185A CN 115250185 A CN115250185 A CN 115250185A CN 202110383070 A CN202110383070 A CN 202110383070A CN 115250185 A CN115250185 A CN 115250185A
- Authority
- CN
- China
- Prior art keywords
- request
- network
- service class
- type
- network resource
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 77
- 230000005540 biological transmission Effects 0.000 claims description 24
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 24
- 230000006870 function Effects 0.000 description 17
- 238000005516 engineering process Methods 0.000 description 16
- 238000012545 processing Methods 0.000 description 14
- 238000004891 communication Methods 0.000 description 12
- 238000012986 modification Methods 0.000 description 7
- 230000004048 modification Effects 0.000 description 7
- 238000011161 development Methods 0.000 description 6
- 230000011664 signaling Effects 0.000 description 6
- 230000003993 interaction Effects 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000012905 input function Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本申请实施例公开了一种获取网络资源的方法、装置及相关产品。当启动安全模式后,先对网络资源访问请求进行拦截并解析,以便基于请求访问的资源类型采取针对性的发送路径。根据解析出的数据信息和安全模式下的配置信息,可以确定出所拦截的网络资源请求所要求访问的资源的具体类型。以资源类型决定请求的发送路径,能够提升对于第一类型资源的访问的安全性。通过安全模式的启动,实现对第一类型资源和第二类型资源的安全访问,满足远程获取网络资源的需求。此外,该技术方案不需要专门配置VPN服务器,从而降低了成本。如本申请所公开的获取网络资源的方法、装置、相关产品,其所涉及的服务器可组成为一区块链,而服务器为区块链上的节点。
The embodiments of the present application disclose a method, device and related products for acquiring network resources. When the security mode is activated, the network resource access request is intercepted and parsed first, so as to take a targeted sending path based on the type of resource requested to be accessed. According to the parsed data information and the configuration information in the security mode, the specific type of the resource required to be accessed by the intercepted network resource request can be determined. Determining the sending path of the request based on the resource type can improve the security of the access to the first type of resource. By starting the security mode, secure access to the first type of resources and the second type of resources is realized, and the requirements for remote acquisition of network resources are met. In addition, the technical solution does not require a VPN server to be specially configured, thereby reducing costs. For the method, device, and related products for obtaining network resources disclosed in this application, the servers involved can be formed into a blockchain, and the servers are nodes on the blockchain.
Description
技术领域technical field
本申请涉及安全技术领域,特别是涉及一种获取网络资源的方法、装置及相关产品。The present application relates to the field of security technologies, and in particular, to a method, device and related products for acquiring network resources.
背景技术Background technique
随着网络技术的日益发展和计算机技术的日新月异,信息安全受到的挑战也越来越显著。如今办公方式灵活化,很多企业单位允许员工远程办公,为了保障企业内网资源的安全性,同时不影响员工对企业内网资源的使用,一种常用的解决方案是通过虚拟专用网络(Virtual Private Network,VPN)远程访问技术实现远程办公。VPN简单来说就是在公用网络上建立专用网络,对通讯进行加密来实现远程访问的基础能力。With the increasing development of network technology and the rapid development of computer technology, the challenges to information security are becoming more and more obvious. Nowadays, the office mode is flexible, and many enterprise units allow employees to work remotely. In order to ensure the security of enterprise intranet resources and not affect the use of enterprise intranet resources by employees, a common solution is to use virtual private network (Virtual Private Network). Network, VPN) remote access technology to achieve remote office. Simply put, a VPN is the basic ability to establish a private network on a public network and encrypt communications to achieve remote access.
运用VPN远程访问技术需要在企业内部网络搭建一台VPN服务器。当员工在外地连上互联网后,使用企业帐号信息通过互联网连接VPN服务器,然后通过VPN服务器进入到企业内部网络,获取企业内网资源。应用VPN远程访问技术存在成本较高的问题。To use VPN remote access technology, you need to build a VPN server on the internal network of the enterprise. When employees connect to the Internet in other places, they use the corporate account information to connect to the VPN server through the Internet, and then enter the corporate intranet through the VPN server to obtain corporate intranet resources. The application of VPN remote access technology has the problem of high cost.
成本高主要体现在企业采购成本高和维护成本高。采购成本高,一是因为需要部署一台VPN服务器;二是不同的厂商提供的VPN产品和解决方案总是不兼容,需要采购多个供应商的设备。维护成本高则是因为企业创建和部署VPN线路并不容易,不仅涉及到VPN服务器与VPN终端的链路配置,还需要搭建VPN服务器与内部业务服务器的链路,所以需要额外聘请具有对网络和安全的专业技术人员。因此,为获取网络资源,如何降低成本成为当前领域亟待解决的技术问题。The high cost is mainly reflected in the high procurement cost and high maintenance cost of the enterprise. The procurement cost is high. First, a VPN server needs to be deployed. Second, the VPN products and solutions provided by different manufacturers are always incompatible, and equipment from multiple suppliers needs to be purchased. The high maintenance cost is because it is not easy for enterprises to create and deploy VPN lines. It not only involves the link configuration between the VPN server and the VPN terminal, but also needs to build the link between the VPN server and the internal service server. Safe professional technicians. Therefore, in order to obtain network resources, how to reduce costs has become an urgent technical problem to be solved in the current field.
发明内容SUMMARY OF THE INVENTION
为了解决上述技术问题,本申请提供了一种获取网络资源的方法、装置及相关产品,以降低获取网络资源的成本。In order to solve the above technical problems, the present application provides a method, device and related products for acquiring network resources, so as to reduce the cost of acquiring network resources.
本申请实施例公开了如下技术方案:The embodiments of the present application disclose the following technical solutions:
第一方面,本申请提供了一种获取网络资源的方法,方法包括:In a first aspect, the present application provides a method for acquiring network resources, the method comprising:
启动安全模式后,对网络资源访问请求进行拦截并解析;After starting safe mode, intercept and parse network resource access requests;
当根据安全模式的配置信息和解析出的数据信息确定网络资源访问请求为对第一类型资源的请求时,通过网关向服务器请求网络资源;配置信息包含安全模式下可访问的第一类型资源的信息;When it is determined that the network resource access request is a request for the first type of resource according to the configuration information of the security mode and the parsed data information, the network resource is requested from the server through the gateway; the configuration information includes the information of the first type of resource accessible in the security mode. information;
当根据配置信息和解析出的数据信息确定网络资源访问请求为对第二类型资源的请求时,直接向服务器请求网络资源。When it is determined according to the configuration information and the parsed data information that the network resource access request is a request for the second type of resource, the network resource is directly requested from the server.
第二方面,本申请提供了一种获取网络资源的装置,装置包括:In a second aspect, the present application provides a device for acquiring network resources, the device comprising:
拦截模块,用于在启动安全模式后,对网络资源访问请求进行拦截;The interception module is used to intercept network resource access requests after starting the safe mode;
解析模块,用于对拦截模块拦截的网络资源访问请求进行解析;The parsing module is used to parse the network resource access request intercepted by the intercepting module;
请求类型确定模块,用于根据安全模式的配置信息和解析出的数据信息确定网络资源访问请求的类型;The request type determination module is used to determine the type of the network resource access request according to the configuration information of the security mode and the parsed data information;
发送模块,用于当请求类型确定模块确定网络资源访问请求为对第一类型资源的请求时,通过网关向服务器请求网络资源;配置信息包含安全模式下可访问的第一类型资源的信息;The sending module is used for requesting the network resource from the server through the gateway when the request type determining module determines that the network resource access request is a request for the first type of resource; the configuration information includes the information of the first type of resource accessible in the security mode;
发送模块,还用于当请求类型确定模块确定网络资源访问请求为对第二类型资源的请求时,直接向服务器请求网络资源。The sending module is further configured to directly request the server for network resources when the request type determining module determines that the network resource access request is a request for the second type of resources.
第三方面,本申请提供了一种计算机设备,设备包括处理器以及存储器:In a third aspect, the present application provides a computer device, the device includes a processor and a memory:
存储器用于存储程序代码,并将程序代码传输给处理器;The memory is used to store the program code and transmit the program code to the processor;
处理器用于根据程序代码中的指令执行第一方面提供的获取网络资源方法。The processor is configured to execute the method for acquiring network resources provided by the first aspect according to the instructions in the program code.
如本申请所公开的获取网络资源的方法、装置、相关产品,其所涉及的服务器可组成为一区块链,而服务器为区块链上的节点。For the method, device, and related products for obtaining network resources disclosed in this application, the servers involved can be formed into a blockchain, and the servers are nodes on the blockchain.
第四方面,本申请提供了一种计算机可读存储介质,计算机可读存储介质用于存储计算机程序,计算机程序用于执行第一方面提供的获取网络资源方法。In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and the computer program is used to execute the method for acquiring network resources provided in the first aspect.
由上文描述的本申请技术方案可知,当启动安全模式后,不会任由用户获取网络资源,而是需要先对网络资源访问请求进行拦截并解析,以便基于请求访问的资源类型采取针对性的发送路径。安全模式下的配置信息包含了安全模式下可访问的第一类型资源的信息,根据解析出的数据信息和安全模式下的配置信息,可以确定出所拦截的网络资源请求所要求访问的资源的具体类型。第一类型资源相较于第二类型资源具有更加严苛的安全访问要求,因此当确定网络资源访问请求为对第一类型资源的请求时,需要将网络资源访问请求转发网关以便于网关管控对第一类型资源的访问通道。而当确定网络资源访问请求为对第二类型资源的请求时,则无需将请求转发给网关,直接将网络资源访问请求发送给服务器请求网络资源即可。As can be seen from the technical solutions of the present application described above, when the security mode is activated, the user will not be allowed to obtain network resources, but the network resource access request needs to be intercepted and parsed first, so as to take targeted measures based on the type of resources requested to access. the sending path. The configuration information in the safe mode includes the information of the first type of resources that can be accessed in the safe mode. According to the parsed data information and the configuration information in the safe mode, the specific information of the resource required to be accessed by the intercepted network resource request can be determined. type. The first type of resources has stricter security access requirements than the second type of resources. Therefore, when it is determined that the network resource access request is a request for the first type of resources, the network resource access request needs to be forwarded to the gateway so that the gateway can manage and control the access request. An access channel for the first type of resource. When it is determined that the network resource access request is a request for the second type of resource, the request does not need to be forwarded to the gateway, and the network resource access request can be directly sent to the server to request the network resource.
在本申请技术方案中,通过解析获得网络资源访问信息的数据信息,据此确定请求访问的资源类型,并以资源类型决定请求的发送路径,能够提升对于第一类型资源的访问的安全性。通过安全模式的启动,实现对第一类型资源和第二类型资源的安全访问,满足远程获取网络资源的需求。此外,该技术方案不需要专门配置VPN服务器,从而降低了成本。In the technical solution of the present application, the data information of the network resource access information is obtained by parsing, the resource type requested for access is determined accordingly, and the request sending path is determined based on the resource type, which can improve the security of access to the first type of resources. By starting the security mode, secure access to the first type of resources and the second type of resources is realized, and the requirements for remote acquisition of network resources are met. In addition, the technical solution does not require a VPN server to be specially configured, thereby reducing costs.
附图说明Description of drawings
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following briefly introduces the accompanying drawings required for the description of the embodiments or the prior art. Obviously, the drawings in the following description are only These are some embodiments of the present application. For those of ordinary skill in the art, other drawings can also be obtained based on these drawings without any creative effort.
图1A为本申请实施例提供的一种获取网络资源的方法的应用场景示意图;1A is a schematic diagram of an application scenario of a method for acquiring network resources provided by an embodiment of the present application;
图1B为本申请实施例提供的另一种获取网络资源的方法的应用场景示意图;FIG. 1B is a schematic diagram of an application scenario of another method for acquiring network resources provided by an embodiment of the present application;
图2为本申请实施例提供的安全模式关闭状态下终端设备的示例性界面示意图;FIG. 2 is a schematic interface diagram of an exemplary interface of a terminal device in a security mode off state provided by an embodiment of the present application;
图3为本申请实施例提供的安全模式开启状态下终端设备的示例性界面示意图;3 is a schematic diagram of an exemplary interface of a terminal device in a state where the security mode is enabled according to an embodiment of the present application;
图4为本申请实施例提供的安全模式关闭状态下终端设备100执行访问后的示例性界面示意图;FIG. 4 is a schematic diagram of an exemplary interface after the
图5为本申请实施例提供的安全模式开启状态下终端设备100执行访问后的示例性界面示意图;FIG. 5 is a schematic diagram of an exemplary interface after the
图6为本申请实施例提供的一种获取网络资源的方法的流程示意图;6 is a schematic flowchart of a method for acquiring network resources provided by an embodiment of the present application;
图7为本申请实施例提供的一种启动安全模式的信令交互图;FIG. 7 is a signaling interaction diagram for starting a security mode according to an embodiment of the present application;
图8为本申请实施例提供的一种进行网络资源访问的信令交互图;FIG. 8 is a signaling interaction diagram for network resource access provided by an embodiment of the present application;
图9A为本申请实施例提供的一种Android VPNService的工作原理图;FIG. 9A is a working principle diagram of an Android VPNService provided by an embodiment of the present application;
图9B为本申请实施例提供的一种获取网络资源的装置的结构示意图;9B is a schematic structural diagram of an apparatus for acquiring network resources according to an embodiment of the present application;
图10为本申请实施例提供的服务器的结构示意图;10 is a schematic structural diagram of a server provided by an embodiment of the present application;
图11为本申请实施例提供的终端设备的结构示意图。FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
具体实施方式Detailed ways
下面结合附图,对本申请的实施例进行描述。The embodiments of the present application will be described below with reference to the accompanying drawings.
鉴于相关技术中运用VPN远程访问技术时,布设VPN服务器及相关线路存在成本高的问题,本申请实施例提供一种获取网络资源的方法、装置及相关产品,以节省成本。本申请提供的获取网络资源的方法可以应用于具有数据处理能力的获取网络资源的设备上,如终端设备。其中,终端设备具体可以为智能手机、台式计算机、笔记本电脑、平板电脑、智能音箱、智能手表等,但并不局限于此。为了便于理解本申请的技术方案,下面结合实际应用场景对本申请实施例提供的获取网络资源的方法进行介绍。In view of the high cost of deploying a VPN server and related lines when using the VPN remote access technology in the related art, the embodiments of the present application provide a method, device and related products for obtaining network resources to save costs. The method for acquiring network resources provided by this application can be applied to a device having data processing capability for acquiring network resources, such as a terminal device. Wherein, the terminal device may specifically be a smart phone, a desktop computer, a notebook computer, a tablet computer, a smart speaker, a smart watch, etc., but is not limited thereto. In order to facilitate understanding of the technical solutions of the present application, the following describes the method for acquiring network resources provided by the embodiments of the present application in combination with actual application scenarios.
参见图1A,图1A为本申请实施例提供的一种获取网络资源的方法的应用场景示意图。在图1A所示的应用场景中,包括终端设备100和服务器200。其中,终端设备100与服务器200可以通过有线或无线通信方式进行直接或间接地连接,本申请在此不做限制。Referring to FIG. 1A , FIG. 1A is a schematic diagram of an application scenario of a method for acquiring network resources provided by an embodiment of the present application. In the application scenario shown in FIG. 1A , the
终端设备100包括显示屏,以显示屏显示用户界面(User Interface,UI)。用户通过显示屏可以看到界面展示的控制按钮,用户通过对该按钮施加预设类型的操作,便可以实现安全模式的启动或关闭。实际应用中,预设类型的操作可以根据需求进行设定,例如点击、滑动等,此处不做限制。此外,用以启动安全模式的操作类型和操作时间与用以关闭安全模式的操作类型和操作时间可以相同,也可以不同。The
图2和图3分别为本申请实施例提供的安全模式关闭和开启状态下终端设备100的示例性界面示意图。如图2所示,当安全模式处于关闭状态时,界面上展示安全模式关闭的状态,参见图2中区域2a,并在按钮所在区域2b显示“启动”字样,以提示用户通过触发该按钮可以随时启动终端设备100的安全模式。如图3所示,当安全模式处于开启状态时,界面上展示安全模式开启的状态,参见图3中区域3a,并在按钮所在区域3b显示“关闭”字样,以提示用户通过触发该按钮可以随时关闭终端设备100的安全模式。FIG. 2 and FIG. 3 are schematic diagrams of exemplary interfaces of the
图1A所示的场景中,服务器200部署有网关201和业务服务模块202。安全模式关闭主要用以约束终端设备100访问服务器200所能提供的第一类型资源,而安全模式启动则是用以保障终端设备100访问服务器200所能提供的第一类型资源的安全性。第二类型资源的访问则不受安全模式启动或关闭的限制。此处,第一类型资源为相较于第二类型资源具有更高的安全性要求的资源。作为示例,第一类型资源为企业内网资源,例如企业邮箱、企业员工名录、企业培训视频、会议预定入口等。作为示例,第二类型资源为企业内网资源以外的其他资源,例如微信、QQ邮箱、新闻页面等非办公用途的资源(也可统称为娱乐资源)。本申请实施例中,对于第一类型资源和第二类型资源均不加以限制。In the scenario shown in FIG. 1A , a
图4和图5分别展示了安全模式关闭和开启状态下终端设备100执行访问后的示例性界面示意图。如图4所示,当安全模式关闭时,用户在终端设备100上使用浏览器等应用访问娱乐网址https://xw.qq.com/时,是可以访问的,并会将网址相应的内容显式在界面上,页面4a展示了正常显示的第二类型资源。当访问企业内部地址http://172.17.0.10:81时,是访问不成功的,界面会展示错误信息,参见页面4b,即第一类型资源是无法访问。如图5所示,当安全模式启动后,员工使用浏览器等应用访问娱乐网址https://xw.qq.com/或者企业内部地址http://172.17.0.10:81时,都是可以访问的,并会将网址相应的内容显示在界面上,分别参见页面5a和页面5b,即第二类型资源和第一类型资源均可正常访问。FIG. 4 and FIG. 5 respectively show exemplary interface diagrams after the
在图1A所示的应用场景中,终端设备100面向用户提供了UI界面,能够展示与安全模式相关的控制按钮以及对网络资源的访问结果。此外,终端设备100还起到了诸多作用,包括在开启安全模式后,对网络资源访问请求进行拦截并解析。其中,网络资源访问请求可以是基于终端设备100的用户的操作而生成的。例如,用户通过操控终端设备100,在网址搜索栏键入了预期打开的网址;或者,根据设置,用户通过打开浏览器自动跳转到默认网址等。本申请实施例中对于网络资源访问请求的生成方式不做限制。In the application scenario shown in FIG. 1A , the
终端设备100通过拦截网络资源访问请求,并对所拦截的网络资源访问请求进行解析,可以解析获得多种该网络资源访问请求相关的数据信息,例如:网络资源访问请求的协议类型、源IP、源端口、目的IP和目的端口等。而在启动安全模式之前,则在服务器200预先配置了该安全模式的配置信息。需要说明的是,安全模式所提及的安全性,在服务器200部分,主要通过网关201实现。By intercepting the network resource access request and analyzing the intercepted network resource access request, the
在本申请实施例中,服务器200中部署的网关201是预先建立好的,用以在终端设备100发送对第一类型资源的访问请求时,对其进行合法性校验。网关201有权限根据合法性校验结果,向服务器200的业务模块202请求业务服务,或者是中止前述访问请求。也就是说,当访问请求具体为对第一类型资源的请求时,网关201作为终端设备100和业务服务模块202之间的中转站。当业务服务模块202返回业务处理结果(例如终端设备100需求的第一类型资源)时,网关201会率先接收到,并通过网关201转发给终端设备100。需要说明的是,本申请实施例中对于网关201的数量不进行限制。In this embodiment of the present application, the
上述配置信息是终端设备100应用程序判断企业员工访问第一类型资源或者第二类型资源的基础数据,也是终端设备100应用程序与网关201的通信基础。下表1对配置信息中的字段名及含义做出说明。The above configuration information is the basic data for the application of the
表1配置信息的字段名及相应含义的列表Table 1 List of field names and corresponding meanings of configuration information
安全模式的配置信息,包含了终端设备100与服务器200中网关201之间通信连接相关的信息,例如上表1中字段名为host、port的信息;包含了与终端设备100及服务器200之间用于校验请求合法性的信息,例如上表1中字段名为token的信息;包含了需要通过网关201实现第一类型资源的访问的限制信息,例如上表1中字段名为whiteList的信息,下文中简称为白名单。白名单包含了安全模式下该终端设备100通过网关201可以间接访问的第一类型资源的信息,具体可以通过列表的方式呈现。The configuration information of the security mode includes information related to the communication connection between the
此处需要说明的是,如果终端设备100是通过IP地址获取网络资源,则无需dns解析;而如果终端设备100是通过域名获取网络资源,则还需要首先将域名进行dns解析转化为IP地址,再通过转化得到的IP地址进行网络资源访问。因为一般而言,企业内部的资源的域名是互联网无法解析的,所以需要由终端设备100的应用程序在终端设备100的本地进行解析。It should be noted here that if the
上文中提到了白名单,对于以IP地址获取网络资源的请求,终端设备100通过解析可以获得目的IP,而白名单中包含的是安全模式下该终端设备100可访问的第一类型资源的信息(域名或IP),因此,终端设备100可以根据安全模式的配置信息和解析出的数据信息确定出网络资源访问请求是否是对第一类型资源的请求。作为示例,如果解析出的目的IP位于白名单中,与白名单中的某一IP匹配,则可以确定出该请求是对第一类型资源的请求。而反之,如果目的IP并没有在白名单中,无法从白名单中查询到与目的IP匹配的IP,则可以确定出该请求并非对第一类型资源的请求,而是对第二类型资源的请求,例如具体为对于某种娱乐资源的请求。The whitelist is mentioned above. For a request to obtain network resources by IP address, the
对于以域名获取网络资源的请求,终端设备100可以通过解析该请求获得请求所使用的域名。其后,在终端设备100本地对请求所使用的域名进行dns解析获得目的IP。接着,在确定请求的资源类型时,将dns解析出的目的IP与白名单进行匹配。如果白名单中仅包含资源的域名而非IP,为了避免匹配失误,在安全模式的配置信息中还可以进一步包含有解析白名单内的域名的域名系统地址的列表,参见上表1中字段名为dnsList的信息。通过dnsList可以将白名单中的域名转化为地址信息,从而便利于结合目的IP和转换出的地址信息确定请求的资源类型。作为示例,如果解析出的目的IP与通过dnsList获得的地址信息匹配,则表示目的IP与白名单匹配成功,确定出该请求是对第一类型资源的请求。而反之,如果解析出的目的IP与通过dnsList获得的地址信息不匹配,则表示目的IP与白名单匹配失败,确定出该请求是对第二类型资源的请求。For a request for obtaining network resources by using a domain name, the
在本实施例场景中,基于终端设备100所确定出的网络资源访问请求指向的资源类型不同,网络资源访问请求的发送路径以及资源的返回路径也是不同的。参见图1A所示场景中,服务器200包含前述的网关201,还包含业务服务模块202。业务服务模块202指的是处理业务的服务。当访问第二类型资源时,业务服务即是处理第二类型资源的业务逻辑的服务。当通过网关201访问第一类型资源(例如企业内网资源)时,业务服务也可以指处理访问企业内网资源的业务逻辑的服务。在服务器200中,业务服务模块202可以兼具处理多种类型资源的业务逻辑的服务,如图1所示;此外,服务器200中还可以包括多个业务服务模块202,不同的业务服务模块202分别用来处理不同类型资源的业务逻辑的服务。In the scenario of this embodiment, based on the different types of resources to which the network resource access request determined by the
图1A中,终端设备100与服务器200中业务服务模块202之间实线所示路径①表示了终端设备100与业务服务模块202之间关于第二类型资源的通信方式。图1A中,终端设备100与网关201之间的虚线所示路径②以及网关201与业务服务模块202之间的虚线所示路径③则共同表示了关于第一类型资源的通信方式。In FIG. 1A , the
由上文描述的场景可知,当启动安全模式后,不会任由用户获取网络资源,而是需要先对网络资源访问请求进行拦截并解析,以便基于请求访问的资源类型采取针对性的发送路径。资源的返回路径与前述的发送路径相反。安全模式下的配置信息包含了安全模式下可访问的第一类型资源的信息,根据解析出的数据信息和安全模式下的配置信息,可以确定出所拦截的网络资源请求所要求访问的资源的具体类型。第一类型资源相较于第二类型资源具有更加严苛的安全访问要求,因此当确定网络资源访问请求为对第一类型资源的请求时,需要将网络资源访问请求转发给服务器200的网关201以便于网关201管控对第一类型资源的访问通道。而当确定网络资源访问请求为对第二类型资源的请求时,则无需将请求转发给网关201,直接将网络资源访问请求发送给业务服务模块202请求网络资源即可。As can be seen from the scenarios described above, when the security mode is enabled, users will not be allowed to obtain network resources, but network resource access requests need to be intercepted and parsed first, so that targeted sending paths can be taken based on the type of resources requested to be accessed. . The return path of the resource is the opposite of the previous send path. The configuration information in the safe mode includes the information of the first type of resources that can be accessed in the safe mode. According to the parsed data information and the configuration information in the safe mode, the specific information of the resource required to be accessed by the intercepted network resource request can be determined. type. The first type of resource has more stringent security access requirements than the second type of resource, so when it is determined that the network resource access request is a request for the first type of resource, the network resource access request needs to be forwarded to the
在本申请技术方案中,通过解析获得网络资源访问信息的数据信息,据此确定请求访问的资源类型,并以资源类型决定请求的发送路径(参见图1A所示的路径①与路径②+③),能够提升对于第一类型资源的访问的安全性。一旦安全模式启动,便可实现对第一类型资源和第二类型资源的安全访问,满足远程获取网络资源的需求。此外,该技术方案不需要专门配置VPN服务器,只需要终端设备100与后台服务器200便可以实现网络资源访问,从而降低了成本。In the technical solution of the present application, the data information of the network resource access information is obtained by parsing, and the resource type requested to be accessed is determined accordingly, and the transmission path of the request is determined by the resource type (see
在图1所示的场景中,网关201和业务服务模块202部署在同一服务器200。本申请还提供了另一种获取网络资源的方法的应用场景,如图1B所示为另一种获取网络资源的方法的应用场景示意图。在图1B所示应用场景中,区别于图1A中的服务器200,上述网关201和业务服务模块202的功能分别由不同的服务器实现,如图1B所示的网关服务器301和业务服务器302。In the scenario shown in FIG. 1 , the
在前面的介绍中,对于终端设备100的功能进行了较详细的介绍,此处不再赘述,仅对于与图1A所示的应用场景的区别进行描述。当需要获取的是第一类型资源,则终端设备100向网关服务器301转发网络资源访问请求,由网关服务器301对网络资源访问请求进行合法性校验,在合法性校验通过时,网关服务器301向业务服务器302请求网络资源。当需要获取的是第二类型资源,则终端设备100向业务服务器302发送网络资源访问请求以请求网络资源,网络资源的请求和转发不再经过网关服务器301。在图1B所示场景中,配置信息包含了与终端设备100及网关服务器301之间用于校验请求合法性的鉴权信息。通过解析获得网络资源访问信息的数据信息,据此确定请求访问的资源类型,并以资源类型决定请求的发送路径(参见图1B所示的路径①请求第二类型资源与路径②+③请求第一类型资源),能够提升对于第一类型资源的访问的安全性。In the foregoing introduction, the functions of the
在后文的介绍中,以图1A所示的场景为例介绍获取网络资源的方法。而以图1B所示的场景实现网络资源的获取与图1A类似,可结合后文描述以及服务器的部署差异进行对应的理解和实施。In the following introduction, a method for acquiring network resources is introduced by taking the scenario shown in FIG. 1A as an example. The acquisition of network resources in the scenario shown in FIG. 1B is similar to that in FIG. 1A , and the corresponding understanding and implementation can be carried out in combination with the following description and differences in server deployment.
图6为本申请实施例提供的一种获取网络资源的方法的流程示意图,该获取网络资源的方法可以应用在图1A所示场景中的终端设备上。如图6所示,该方法包括:FIG. 6 is a schematic flowchart of a method for acquiring network resources provided by an embodiment of the present application, and the method for acquiring network resources may be applied to the terminal device in the scenario shown in FIG. 1A . As shown in Figure 6, the method includes:
S601:开启安全模式。S601: Turn on the safe mode.
在本申请实施例提供的获取网络资源的方法中,S601并非每次获取网络资源都必须要执行的操作。具体而言,在执行一次S601后,如果用户不操作关闭安全模式,则终端设备在开机状态下持续处于安全模式,因此每一次获取网络资源的均是在该模式生效状态下发生的。也就是说,不需要重复执行对安全模式的启动操作便可以多次实现后续S602~S605。In the method for acquiring network resources provided by the embodiments of the present application, S601 is not an operation that must be performed every time a network resource is acquired. Specifically, after performing S601 once, if the user does not operate to turn off the safe mode, the terminal device will continue to be in the safe mode in the power-on state, so each acquisition of network resources occurs when the mode is in effect. That is to say, subsequent steps S602 to S605 can be implemented multiple times without repeatedly performing the startup operation for the safe mode.
S602:对网络资源访问请求进行拦截并解析。S602: Intercept and analyze the network resource access request.
解析网络资源访问请求的目的是获得目的IP等与该网络资源访问请求相关的数据信息。上文已对解析出的数据信息做出了示例介绍,此处不再赘述。解析获得目的IP后即可用以结合安全模式的配置信息来判断要访问的网络资源是否属于第一类型资源。即,确定是否要转发给网关或者直发给业务服务模块。具体地,对于第一类型资源的请求,需要先转发给网关;而非第一类型资源的请求,例如第二类型资源的请求,则可以直接发送给业务服务模块。The purpose of parsing the network resource access request is to obtain data information related to the network resource access request, such as the destination IP. The parsed data information has been introduced as an example above, and will not be repeated here. After the destination IP is obtained through parsing, it can be used to determine whether the network resource to be accessed belongs to the first type resource in combination with the configuration information of the security mode. That is, it is determined whether to forward to the gateway or directly to the business service module. Specifically, requests for resources of the first type need to be forwarded to the gateway first; requests other than resources of the first type, such as requests for resources of the second type, can be directly sent to the business service module.
S603:根据安全模式的配置信息和解析出的数据信息判断网络资源访问请求是否为对第一类型资源的请求,如果是,进入S604;如果否,进入S605。S603: Determine whether the network resource access request is a request for the first type of resources according to the configuration information of the security mode and the parsed data information, if yes, go to S604; if not, go to S605.
具体而言,当解析出的数据信息与配置信息匹配成功时,可以确定网络资源访问请求为对第一类型资源的请求。当解析出的数据信息与配置信息匹配不成功时,可以确定网络资源访问请求为对第二类型资源的请求。配置信息包含安全模式下可访问的第一类型资源的信息,可参见上文介绍过的白名单。Specifically, when the parsed data information is successfully matched with the configuration information, it may be determined that the network resource access request is a request for the first type of resource. When the parsed data information does not match the configuration information successfully, it may be determined that the network resource access request is a request for the second type of resource. The configuration information includes information about the first type of resources that can be accessed in safe mode. For details, see the whitelist introduced above.
S604:将网络资源访问请求转发给服务器的网关,以使网关向服务器的业务服务模块请求网络资源。S604: Forward the network resource access request to the gateway of the server, so that the gateway requests network resources from the service service module of the server.
S605:确定网络资源访问请求为对第二类型资源的请求,将网络资源访问请求发送给业务服务模块以直接向业务服务模块请求网络资源。S605: Determine that the network resource access request is a request for the second type of resources, and send the network resource access request to the service service module to directly request the service service module for network resources.
结合S604~S605,本申请实施例提供的获取网络资源的方法中,对于第二类型资源的访问请求不做处理,而对第一类型资源(例如企业内网资源)的访问请求,需要经过网关进行合法性校验,从而保证该请求的合法性和安全性,避免第一类型资源遭到非法窃取。前面提到,配置信息包括token字段的鉴权信息,是终端设备与服务器预先互通约定的,该鉴权信息可以封装到转发给网关的网络资源访问请求的请求头中,以便于服务器中网关在接收到该请求后基于鉴权信息进行合法性校验。当网关对网络资源访问请求的合法性校验通过时,才向所述业务服务模块请求网络资源。如果网关校验出网络资源访问请求不合法,便可以中止该访问请求,不再进一步请求业务服务模块的服务。In combination with S604 to S605, in the method for acquiring network resources provided by the embodiments of the present application, the access request for the second type of resource is not processed, and the access request for the first type of resource (for example, the enterprise intranet resource) needs to go through the gateway Validity verification is performed to ensure the validity and security of the request and prevent the first type of resources from being illegally stolen. As mentioned above, the configuration information includes the authentication information of the token field, which is agreed in advance by the terminal device and the server. The authentication information can be encapsulated into the request header of the network resource access request forwarded to the gateway, so that the gateway in the server can After receiving the request, the validity is checked based on the authentication information. Only when the validity check of the network resource access request is passed by the gateway, the network resource is requested from the business service module. If the gateway verifies that the network resource access request is illegal, it can abort the access request without further requesting the service of the business service module.
可见,在本申请实施例中,通过网关的设置和管控,增强了获取网络资源的安全性,尤其是增强了访问第一类型资源的安全性,降低了第一类型资源被非法窃取的风险。此外,通过配置信息的设置,约束了高安全访问要求的资源的域名或IP地址,便利于明确是否需要转发获取网络资源的请求。因此,配置信息成为了除网关以外提升资源访问安全性的另一道关卡。It can be seen that, in the embodiment of the present application, through the setting and control of the gateway, the security of acquiring network resources is enhanced, especially the security of accessing the first type of resources is enhanced, and the risk of the first type of resources being illegally stolen is reduced. In addition, through the setting of the configuration information, the domain name or IP address of the resource required for high security access is restricted, which facilitates the determination of whether the request for obtaining the network resource needs to be forwarded. Therefore, configuration information has become another checkpoint in addition to the gateway to improve the security of resource access.
在通过VPN服务器实现远程访问的相关技术中,企业通常难以精细化管理员工访问企业内部的资源权限:只要员工有VPN的帐号信息,就能访问企业内部的所有资源信息,容易造成企业内部数据泄漏等安全问题。而在本申请实施例中,则不存在此问题,原因如下:In the related technologies of remote access through VPN servers, it is often difficult for enterprises to finely manage the rights of employees to access resources within the enterprise: as long as employees have VPN account information, they can access all resource information within the enterprise, which may easily lead to data leakage within the enterprise. and other security issues. However, in the embodiment of the present application, this problem does not exist, and the reasons are as follows:
以第一类型资源是企业内部资源为示例,结合表1所示,当企业内部资源的地址在这个whiteList列表内,则表明员工可以访问这个企业内部资源。这个whiteList列表的配置是在企业管理后台完成,支持针对每一个员工进行配置,即不同的企业员工登录终端设备100后,终端设备100拉取到的配置信息是不一样,取决于企业员工的身份。如此,可以做到对员工访问企业内部资源的精细化管理。也就是说,在本申请实施例中,服务器中的配置信息可以具体依据用户身份进行配置,同时体现了个性化配置,减少安全隐患。Taking the first type of resource as an example of an enterprise internal resource, as shown in Table 1, when the address of the internal enterprise resource is in the whiteList list, it indicates that the employee can access the internal enterprise resource. The configuration of this whiteList list is completed in the enterprise management background, and supports configuration for each employee. That is, after different enterprise employees log in to the
例如:员工A是人事部的,whiteList配置是人力资源相关的内部资源,在访问请求与白名单匹配的条件下,员工A就可以访问人力资源相关的内部资源;员工B是技术部的,whiteList配置是技术开发相关的内部资源,在访问请求与白名单匹配的条件下,员工B就可以访问技术开发相关的内部资源。由于没有对员工A配置技术开发相关的内部资源,员工A是不能访问其公司技术开发相关的内部资源。同理,假如企业管理员没有对员工B配置人力资源相关内部资源,员工B也不能访问人力资源相关内部资源。For example, employee A belongs to the HR department, and the whiteList configuration is the internal resources related to human resources. If the access request matches the whitelist, employee A can access the internal resources related to human resources; employee B belongs to the technical department, and the whiteList Configuration is an internal resource related to technology development. If the access request matches the whitelist, employee B can access internal resources related to technology development. Since employee A has not allocated internal resources related to technology development, employee A cannot access the internal resources related to technology development of his company. Similarly, if the enterprise administrator does not configure HR-related internal resources for employee B, employee B cannot access HR-related internal resources either.
从用户体验的角度而言,在以往技术中,出于安全考虑,企业会提供一个VPN连接的专属VPN终端应用程序。该应用程序一般操作体验都会很差。员工每次远程访问企业内部网络时,都需要输入VPN帐号信息。当员工开启企业内部资源访问时,若此时需要使用微信、新闻等娱乐时,还需要再去主动关闭企业内部资源访问的通道。导致切换操作复杂,获取网络资源的过程不流畅。From the perspective of user experience, in the past technology, for security reasons, enterprises will provide an exclusive VPN terminal application for VPN connection. The general operating experience of this application will be very poor. Employees need to enter VPN account information every time they remotely access the internal network of the enterprise. When employees open the access to internal resources of the enterprise, if they need to use WeChat, news and other entertainment at this time, they also need to actively close the channel for accessing internal resources of the enterprise. As a result, the switching operation is complicated, and the process of acquiring network resources is not smooth.
如果应用VPN服务器相关技术访问网络资源存在安全性问题。其一,企业一般都采购第三方公司的VPN服务,不能直接控制VPN的可靠性和性能,容易出现安全风险;其二,企业内部网络部署的VPN服务器容易被黑客攻击。本申请实施例技术方案的实现可以封装在一个软件定义边界(Software Defined Perimeter,SDP)软件开发工具包(SoftwareDevelopment Kit,SDK)中。SDP是有国际云安全联盟CSA于2013年提出的基于零信任(ZeroTrust)理念的新一代网络安全技术架构。鉴于SDP架构的安全性,基于SDP软件开发工具包实现对网络资源的获取,相比于部署VPN服务器具有更高的安全性,能够降低获取内网资源的安全风险。本申请实施例中在此架构的基础上做出了创新,形成了一款新的SDP SDK,为便于区分,后文中对此工具包简称为TSDP SDK。其中,T作为区分于相关技术中的SDP SDK的标识。If you use VPN server-related technologies to access network resources, there are security issues. First, enterprises generally purchase VPN services from third-party companies and cannot directly control the reliability and performance of the VPN, which is prone to security risks; second, the VPN servers deployed on the enterprise's internal network are easily attacked by hackers. The implementation of the technical solutions in the embodiments of the present application may be encapsulated in a software defined boundary (Software Defined Perimeter, SDP) software development kit (Software Development Kit, SDK). SDP is a new generation of network security technology architecture based on the concept of Zero Trust proposed by the International Cloud Security Alliance CSA in 2013. In view of the security of the SDP architecture, the acquisition of network resources based on the SDP software development kit has higher security than deploying a VPN server, and can reduce the security risk of acquiring intranet resources. In the embodiment of the present application, innovation is made on the basis of this architecture, and a new SDP SDK is formed. For the convenience of distinction, this toolkit is hereinafter referred to as TSDP SDK for short. Wherein, T is used as an identifier that is different from the SDP SDK in the related art.
TSDP SDK内,以SDK的方式提供给终端应用使用。目前腾讯提供的内部集成TSDPSDK的产品有T-Sec SDP。T-Sec SDP产品是基于Android平台的VPNService服务基础上实现了流量拦截,然后根据拦截的流量信息与后端服务器提供的配置信息进行匹配,从而实现了企业员工休闲娱乐和安全办公无缝切换的功能。VPNService服务是Android平台下应用程序扩展和构建VPN解决方案的基础能力。通常会创建一个虚拟网络接口,配置地址和路由规则,然后将文件描述符返回给应用程序。基于VPNService服务,每个应用程序都可以通过在隧道上与远程服务器进行处理和交换数据包来实现远程访问的功能。T-Sec SDP产品能够实现:In the TSDP SDK, it is provided to terminal applications in the form of SDK. At present, Tencent's products that integrate TSDPSDK internally include T-Sec SDP. The T-Sec SDP product implements traffic interception based on the VPNService service of the Android platform, and then matches the intercepted traffic information with the configuration information provided by the back-end server, thus realizing seamless switching between enterprise employees' leisure and entertainment and secure office work. Function. VPNService is the basic capability for application extension and VPN solution construction under the Android platform. Typically a virtual network interface is created, addresses and routing rules are configured, and the file descriptor is returned to the application. Based on the VPNService service, each application can realize the function of remote access by processing and exchanging data packets with the remote server on the tunnel. T-Sec SDP products enable:
1)企业员工(即终端设备的用户)可以主动控制安全模式的开关,参见图2和图3。当启动安全模式后,可以做到休闲娱乐和安全办公的无缝切换,全程无感知,不再存有访问不同类型资源时不流畅的问题。当关闭安全模式后,只能访问娱乐资源,不能访问企业内部办公资源。1) Enterprise employees (ie, users of terminal devices) can actively control the switch of the security mode, see Figure 2 and Figure 3 . When the safe mode is activated, the seamless switching between leisure and entertainment and safe office can be achieved without any perception in the whole process, and there is no longer the problem of unsmooth access to different types of resources. When the safe mode is turned off, only entertainment resources can be accessed, and internal office resources of the enterprise cannot be accessed.
2)企业可以在企业管理后台配置信息实现对企业内部访问资源的精细化管理,终端设备会根据企业管理后台配置的信息进行匹配处理。2) The enterprise can configure the information in the enterprise management background to realize the refined management of the internal access resources of the enterprise, and the terminal device will perform matching processing according to the information configured in the enterprise management background.
可见,在较低的成本下,企业能够通过T-Sec SDP产品或者其它集成有TSDP SDK的产品,保证员工通过终端设备远程访问企业内部资源的安全性。员工只需要使用安装有上述产品的终端设备就能做到娱乐和办公无缝切换,不同类型资源的切换访问及同时访问的流畅度大大提升,从而使用户体验得到提升。It can be seen that at a lower cost, enterprises can use T-Sec SDP products or other products integrated with TSDP SDK to ensure the security of employees' remote access to internal resources of the enterprise through terminal devices. Employees only need to use terminal devices equipped with the above products to seamlessly switch between entertainment and work. The switching access to different types of resources and the fluency of simultaneous access are greatly improved, thereby improving user experience.
需要说明的是,本申请实施例提供的技术方案中提到的拦截、解析和转发等操作的实现不局限于Android平台终端设备,还可以针对其它平台的终端设备提供远程访问功能,保障多类型资源的流畅切换、流畅访问,并保障重要资源的访问安全性。由于该技术方案中的流量拦截和流量转发等核心功能封装在TSDP SDK中,可以提供给第三方公司使用,因此具有通用性。It should be noted that the implementation of operations such as interception, parsing, and forwarding mentioned in the technical solutions provided in the embodiments of the present application are not limited to terminal devices on the Android platform, and can also provide remote access functions for terminal devices on other platforms to ensure multiple types of The smooth switching of resources, smooth access, and ensuring the access security of important resources. Since the core functions such as traffic interception and traffic forwarding in this technical solution are encapsulated in the TSDP SDK and can be provided to third-party companies, it is universal.
实现两种类型资源的切换访问的技术方案是全面且复杂的,具体涉及到终端设备和服务器。为便于理解,以下结合信令图描述本实施例提供的获取网络资源的实现过程,主要包括:启动安全模式的流程(参见图7)和进行网络资源访问的流程(参见图8)。其中,启动安全模式的过程又可以称为初始化该安全模式的过程。The technical solution for realizing the switching access of the two types of resources is comprehensive and complex, and specifically involves the terminal device and the server. For ease of understanding, the implementation process of acquiring network resources provided by this embodiment is described below with reference to a signaling diagram, which mainly includes: a process of starting the security mode (see FIG. 7 ) and a process of accessing network resources (see FIG. 8 ). The process of starting the safe mode may also be referred to as a process of initializing the safe mode.
终端设备包括:业务模块和TSDP SDK模块;业务模块包括UI层,TSDP SDK模块包括:软件定义边界服务类(简称:TSDP服务类)、虚拟专用网络服务类(简称:TVPNService服务类)、传输控制协议代理服务类(简称:TcpProxyServer服务类)和域名系统代理服务类(简称:DnsProxy服务类)。其中,TSDP服务类和TVPNService服务类得名称最前端字母“T”的作用类似TSDP SDK中字母“T”的作用,分别用以区分于相关技术中描述的软件定义边界SDP服务类和虚拟专用网络VPNService服务类。后台服务器内分为网关和业务服务模块。Terminal equipment includes: business module and TSDP SDK module; business module includes UI layer, TSDP SDK module includes: software-defined boundary service class (abbreviation: TSDP service class), virtual private network service class (abbreviation: TVPNService service class), transmission control Protocol proxy service class (abbreviation: TcpProxyServer service class) and domain name system proxy service class (abbreviation: DnsProxy service class). Among them, the function of the letter "T" at the front of the name of the TSDP service class and the TVPNService service class is similar to that of the letter "T" in the TSDP SDK, which are used to distinguish the software-defined boundary SDP service class and the virtual private network described in the related art VPNService service class. The background server is divided into gateway and business service module.
下面介绍TSDP服务类、TVPNService服务类、TcpProxyServer服务类和DnsProxy服务类。TSDP服务类对外提供了接口,允许UI层调用,可以拉取配置并将配置信息存入内存。各种请求在底层实现上为数据包,TVPNService服务类用于解析数据包。TcpProxyServer服务类用于监听本地网络的套接字socket请求,数据包读取写入socket操作,还可以用于转发数据包。DnsProxy服务类用于解析网络资源访问请求的域名。The following introduces the TSDP service class, the TVPNService service class, the TcpProxyServer service class and the DnsProxy service class. The TSDP service class provides an external interface, allows UI layer calls, can pull the configuration and store the configuration information in the memory. Various requests are data packets in the underlying implementation, and the TVPNService service class is used to parse the data packets. The TcpProxyServer service class is used to monitor socket socket requests on the local network, read and write data packets to socket operations, and can also be used to forward data packets. The DnsProxy service class is used to resolve the domain name of network resource access requests.
结合图7所示的信令交互图,在启动安全模式的过程中包含如下操作:Combined with the signaling interaction diagram shown in Figure 7, the process of starting the security mode includes the following operations:
S701:依据用户在终端设备上对按钮的触发操作,在UI界面上开启安全模式。S701: According to a user's triggering operation of a button on a terminal device, enable a security mode on a UI interface.
S702:调用TSDP SDK的TSDP服务类,对TSDP服务类进行初始化工作。S702: Call the TSDP service class of the TSDP SDK to initialize the TSDP service class.
S703:TSDP服务类拉取安全模式的配置信息。S703: The TSDP service class pulls the configuration information of the security mode.
配置信息内容参见表1及相关描述,此处不做赘述。需要说明的是,服务器处的安全模式的配置信息早已在启动安全模式之前便已经被拉取到了终端设备本地。本步骤中,TSDP服务类具体是从本地拉取到来自服务器的配置信息。See Table 1 and related descriptions for the content of the configuration information, which is not repeated here. It should be noted that the configuration information of the safe mode at the server has already been pulled to the local terminal device before the safe mode is started. In this step, the TSDP service class specifically pulls the configuration information from the server locally.
S704:拉取配置信息成功后,根据配置信息开启TVPNService服务类,对TVPNService服务类进行初始化工作。S704: After the configuration information is successfully pulled, start the TVPNService service class according to the configuration information, and initialize the TVPNService service class.
其中,对TVPNService服务类进行初始化工作包括但不限于:设置网关的IP、Port、DNS和拦截应用等信息。Among them, initializing the TVPNService service class includes but is not limited to: setting the gateway's IP, Port, DNS, and intercepting applications and other information.
S705:TVPNService服务类启动成功后,会开启TcpProxyServer服务类。S705: After the TVPNService service class is successfully started, the TcpProxyServer service class is started.
S706:TcpProxyServer服务类成功后,会开启DnsProxy服务类。S706: After the TcpProxyServer service class succeeds, the DnsProxy service class will be enabled.
S707:所有服务类开启成功后,通过接口通知给UI层,以使UI层根据所有服务类开启成功结果进行UI视图展示。S707: After all the service classes are successfully opened, the UI layer is notified through the interface, so that the UI layer can display the UI view according to the successful opening of all the service classes.
作为S707的一种示例实现方式,可以在图3中所示的区域3a中展示安全模式开启的状态。As an example implementation of S707, the state where the security mode is turned on can be displayed in the
结合图8所示的信令交互图,在获取网络资源的过程中包含如下操作,其中S801~S806的执行不区分访问请求指向的具体资源类型,S807~S813是执行S806后对第一类型资源进行访问的具体操作,S814~S818是执行S806后对第二类型资源进行访问的具体操作。在图8中,以终端设备各组成部分和服务器各组成部分的信令交互方式进行介绍。With reference to the signaling interaction diagram shown in FIG. 8 , the process of acquiring network resources includes the following operations. The execution of S801 to S806 does not distinguish the specific resource type pointed to by the access request, and S807 to S813 are for the first type of resources after S806 is executed. The specific operations for accessing, S814 to S818 are specific operations for accessing the second type of resources after S806 is executed. In FIG. 8 , an introduction is made in the signaling interaction mode of each component of the terminal device and each component of the server.
S801:生成网络资源访问请求。S801: Generate a network resource access request.
结合前文的描述,网络资源访问请求具体可以是根据用户在终端设备上的操作而生成的。例如:键入域名进行搜索的操作,或者触发特定按钮进行网页跳转的操作等,此处不进行限制。With reference to the foregoing description, the network resource access request may be specifically generated according to the user's operation on the terminal device. For example, the operation of entering a domain name to search, or the operation of triggering a specific button to jump to a webpage, etc., are not limited here.
S802:TVPNService服务类对网络资源访问请求进行拦截并解析该请求的数据包。S802: The TVPNService service class intercepts the network resource access request and parses the data packet of the request.
解析出的数据信息包括但不限于:网络资源访问请求的协议类型、源IP、源端口、目的IP和目的端口。The parsed data information includes but is not limited to: the protocol type, source IP, source port, destination IP and destination port of the network resource access request.
此处需要特别说明的是,如果对网络资源的访问是通过IP请求的,则S802可以直接解析出目的IP。而如果对网络资源的访问具体是通过域名请求的,则还需要执行S803~S804,通过对域名的dns解析获得目的IP。It should be noted here that, if the access to the network resource is requested through IP, S802 can directly resolve the destination IP. However, if the access to the network resource is specifically requested through a domain name, S803 to S804 need to be executed to obtain the destination IP through DNS resolution of the domain name.
S803:TVPNService服务类判断数据包为用户数据包协议(User DatagramProtocol,UDP)包,且所述UDP包对应的端口号为53时,确定所述网络资源访问请求为dns解析请求,通过DnsProxy服务类进行dns解析。S803: When the TVPNService service class determines that the data packet is a User Datagram Protocol (UDP) packet, and the port number corresponding to the UDP packet is 53, determine that the network resource access request is a dns resolution request, and use the DnsProxy service class Perform dns resolution.
如果数据包为UDP包且端口号为53,则表示是通过域名获取网络资源。为此,需要执行S803,由DnsProxy服务类进行dns解析得到请求的IP地址,即目的IP。解析过程中可以遍历配置信息中的dnsList数据,通过匹配dnsList中获得匹配结果。其后,便可执行S804,由DnsProxy服务类将解析出的目的IP返给TVPNService服务类。If the data packet is a UDP packet and the port number is 53, it means that the network resource is obtained through the domain name. To this end, S803 needs to be executed, and the DnsProxy service class performs dns analysis to obtain the requested IP address, that is, the destination IP. During the parsing process, the dnsList data in the configuration information can be traversed, and the matching result can be obtained by matching the dnsList. After that, S804 can be executed, and the DnsProxy service class returns the parsed destination IP to the TVPNService service class.
S804:DnsProxy服务类向TVPNService服务类返回解析出的该网络资源访问请求的域名对应的IP地址作为请求的目的IP。S804: The DnsProxy service class returns the resolved IP address corresponding to the domain name of the network resource access request to the TVPNService service class as the destination IP of the request.
结合上文描述,如果是通过IP地址来获取网络资源,则S803~S804是不需要执行的。也就是说,S803~S804的执行与否与访问方式相关,而非每次网络资源请求被拦截后必需执行的环节。In combination with the above description, if the network resource is obtained through the IP address, S803 to S804 do not need to be executed. That is to say, whether the execution of S803 to S804 is related to the access mode, rather than a link that must be executed every time a network resource request is intercepted.
为了便于TcpProxyServer服务类的监听以及终端设备与网关之间的通信,需要TVPNService服务类先将数据包先发送给TcpProxyServer服务类。而原本目的端口和目的IP并非指向TcpProxyServer服务类,因此需要执行S805对目的端口和目的IP进行修改,以便将数据包成功发送给TcpProxyServer服务类。In order to facilitate the monitoring of the TcpProxyServer service class and the communication between the terminal device and the gateway, the TVPNService service class needs to first send the data packets to the TcpProxyServer service class. The original destination port and destination IP do not point to the TcpProxyServer service class. Therefore, S805 needs to be performed to modify the destination port and destination IP so that the data packet can be successfully sent to the TcpProxyServer service class.
S805:TVPNService服务类确定网络资源访问请求的数据包为传输控制协议(Transmission Control Protocol,TCP)上行包,修改目的IP和目的端口,创建本地socket链接将网络资源访问请求转发给TcpProxyServer服务类。S805: The TVPNService service class determines that the data packet of the network resource access request is a Transmission Control Protocol (TCP) uplink packet, modifies the destination IP and destination port, and creates a local socket link to forward the network resource access request to the TcpProxyServer service class.
S806:TcpProxyServer服务类监听到TVPNService服务类提供的socket转发请求后,从中获取目的IP,以利用目的IP确定与配置信息是否匹配。S806: After the TcpProxyServer service class monitors the socket forwarding request provided by the TVPNService service class, it obtains the destination IP from it, so as to use the destination IP to determine whether it matches the configuration information.
需要说明的是,初始化流程中TSDP服务类拉取到配置信息,其它几个服务类例如TcpProxyServer服务类和DnsProxy服务类也可以获取到配置信息。It should be noted that, in the initialization process, the TSDP service class pulls the configuration information, and several other service classes such as the TcpProxyServer service class and the DnsProxy service class can also obtain the configuration information.
下面结合S807~S813介绍S806执行后对第一类型资源进行访问的流程。The following describes the process of accessing the first type of resource after S806 is executed in conjunction with S807-S813.
S807:对网络资源访问请求解析出的数据信息与配置信息匹配成功,创建一次全新的网络请求,请求头会封装目标IP和目标端口,以及配置信息中的token数据,然后发送到配置信息的host和port对应的网关。S807: The data information parsed from the network resource access request is successfully matched with the configuration information, and a new network request is created. The request header will encapsulate the target IP and target port, as well as the token data in the configuration information, and then send it to the host of the configuration information. The gateway corresponding to the port.
TcpProxyServer服务类与网关之间也是通过网络请求建立通信,不能复用S801描述的网络资源访问请求,为此,需要创建一次新的网络请求。创建全新的网络请求的方式可以是HTTP CONNECT方式。一对host和port对应一个网关。封装的token数据,即鉴权信息,可以用于网关进行合法性校验。Communication between the TcpProxyServer service class and the gateway is also established through network requests, and the network resource access request described in S801 cannot be reused. Therefore, a new network request needs to be created. The way to create a new network request can be the HTTP CONNECT way. A pair of host and port corresponds to a gateway. The encapsulated token data, that is, the authentication information, can be used by the gateway to verify the validity.
需要说明的是,新的网络请求与此前描述的网络资源访问请求所请求访问的资源类型和资源内容一致。It should be noted that the new network request is consistent with the resource type and resource content requested by the previously described network resource access request.
S808:网关对TcpProxyServer服务类发送的网络请求合法性校验通过,继而向业务服务模块请求业务服务。S808: The gateway passes the validity check of the network request sent by the TcpProxyServer service class, and then requests the business service module for the business service.
S809:业务服务模块向网关返回业务服务的结果。S809: The business service module returns the result of the business service to the gateway.
S810:网关向TcpProxyServer服务类返回业务服务模块的业务服务结果。S810: The gateway returns the business service result of the business service module to the TcpProxyServer service class.
S811:TcpProxyServer服务类监听网关返回的socket网络资源数据,确定其为TCP下行包,将TCP下行包的源IP和源端口分别修改为前述网络资源访问请求的目的IP和目的端口。S811: The TcpProxyServer service class monitors the socket network resource data returned by the gateway, determines that it is a TCP downlink packet, and modifies the source IP and source port of the TCP downlink packet to the destination IP and destination port of the aforementioned network resource access request, respectively.
本步骤的修改操作与S805的修改操作相互对应。如果不执行本步骤的修改操作,数据从TcpProxyServer服务类返回给TVPNService服务类,由TVPNService服务类所创建的虚拟网卡将判定此数据并不是此前其发送出去的数据对应的返回结果。因此将最终导致数据不能返回给UI层。通过修改TCP下行包的源IP和源端口为前述网络资源访问请求的目的IP和目的端口,使TVPNService服务类能够接受源IP和源端口改后的TCP下行包,从而完成资源数据的顺利返回。The modification operation in this step corresponds to the modification operation in S805. If the modification operation in this step is not performed, the data is returned from the TcpProxyServer service class to the TVPNService service class, and the virtual network card created by the TVPNService service class will determine that the data is not the return result corresponding to the data sent before. Therefore, it will eventually lead to data not being returned to the UI layer. By modifying the source IP and source port of the TCP downlink packet to the destination IP and destination port of the aforementioned network resource access request, the TVPNService service class can accept the TCP downlink packet with the changed source IP and source port, thereby completing the smooth return of resource data.
S812:TcpProxyServer服务类将改后的TCP下行包返回给TVPNService服务类。S812: The TcpProxyServer service class returns the modified TCP downlink packet to the TVPNService service class.
S813:TVPNService服务类将改后的TCP下行包返回给UI层。S813: The TVPNService service class returns the modified TCP downlink packet to the UI layer.
本步骤在具体实现时,可以先发送给TSDP服务类,再从TSDP服务类发送回UI层。When this step is specifically implemented, it can be sent to the TSDP service class first, and then sent back to the UI layer from the TSDP service class.
下面结合S814~S818介绍S806执行后对第二类型资源进行访问的流程。The following describes the process of accessing the second type of resources after S806 is executed in conjunction with S814 to S818.
S814:TcpProxyServer服务类对网络资源访问请求解析出的数据信息与配置信息匹配失败,将网络资源访问请求发送到业务服务模块。S814: The TcpProxyServer service class fails to match the data information parsed by the network resource access request with the configuration information, and sends the network resource access request to the business service module.
S815:业务服务模块向TcpProxyServer服务类返回业务服务的结果。S815: The business service module returns the result of the business service to the TcpProxyServer service class.
S816:TcpProxyServer服务类监听到业务服务模块返回的socket网络资源数据,确定其为TCP下行包,将TCP下行包的源IP和源端口分别修改为前述网络资源访问请求的目的IP和目的端口。S816: The TcpProxyServer service class monitors the socket network resource data returned by the business service module, determines that it is a TCP downlink packet, and modifies the source IP and source port of the TCP downlink packet to the destination IP and destination port of the aforementioned network resource access request.
本步骤的执行理由与S811基本相同,故此处不再赘述,请参照上文中S811的相关解释和说明。The execution reason of this step is basically the same as that of S811, so it will not be repeated here. Please refer to the relevant explanation and description of S811 above.
S817:TcpProxyServer服务类将改后的TCP下行包返回给TVPNService服务类。S817: The TcpProxyServer service class returns the modified TCP downlink packet to the TVPNService service class.
S818:TVPNService服务类将改后的TCP下行包返回给UI层。S818: The TVPNService service class returns the modified TCP downlink packet to the UI layer.
本步骤在具体实现时,可以先发送给TSDP服务类,再从TSDP服务类发送回UI层。When this step is specifically implemented, it can be sent to the TSDP service class first, and then sent back to the UI layer from the TSDP service class.
最终UI层能够通过终端设备屏幕显示的UI界面展示服务器提供的网络资源,该网络资源与前面提及的网络资源访问请求相匹配。The final UI layer can display the network resources provided by the server through the UI interface displayed on the screen of the terminal device, and the network resources match the network resource access request mentioned above.
在上文介绍的实施例中提及到对于网络资源访问请求的拦截操作。下面示例性地描述拦截过程的实现。该示例中,网络资源访问请求的拦截方案是基于AndroidVPNService服务的基础上扩展开发的。主要功能是实现对终端应用的网络请求进行管控。Android VPNService的工作原理图如图9A所示。In the above-described embodiments, the interception operation for network resource access requests is mentioned. The implementation of the interception process is exemplarily described below. In this example, the interception scheme for network resource access requests is developed based on the AndroidVPNService service. The main function is to manage and control the network request of the terminal application. The working principle diagram of Android VPNService is shown in Figure 9A.
应用程序(Application,APP)发送网络请求到VPN gateway(网关)和网关返回数据给APP的流程其实是互逆的,所以将以APP发送网络请求到网关为例说明AndroidVPNService的工作流程:The process of the application (Application, APP) sending network requests to the VPN gateway (gateway) and the gateway returning data to the APP are actually reciprocal, so the workflow of AndroidVPNService will be explained by taking the APP sending network requests to the gateway as an example:
1)App使用套接字socket,将相应的数据包发送到终端设备的真实的网络Systemnetwork上。1) The App uses the socket socket to send the corresponding data packet to the real network Systemnetwork of the terminal device.
2)Android系统通过iptables(一种与Linux内核集成的IP信息包过滤系统),使用网络地址转换(Network Address Translation,NAT)将所有的数据包转发到Local TUNinterface虚拟网络设备上去;2) The Android system forwards all data packets to the Local TUNinterface virtual network device through iptables (an IP packet filtering system integrated with the Linux kernel) using Network Address Translation (NAT);
3)个人App的VPNService服务通过打开/dev/tun设备,并读取该设备上的数据,可以获得所有转发到Local TUN interface虚拟网络设备上的IP包;3) The VPNService service of the personal App can obtain all IP packets forwarded to the Local TUN interface virtual network device by opening the /dev/tun device and reading the data on the device;
4)个人App的VPNService服务可以对数据做一些处理,然后将处理过后的数据包,使用Protected Socket方法通过真实的网络设备发送出去,最终发送的目标为VPNgateway,即后台服务器的网关。4) The VPNService service of the personal App can do some processing on the data, and then send the processed data packets through the real network device using the Protected Socket method. The final destination is VPNgateway, that is, the gateway of the background server.
从上述描述得知,APP所有网络请求数据包或者网络返回数据包都会经过AndroidVPNService服务,所以只要基于Android VpnService服务基础上将数据包进行拦截和解析,就能实现网络流量的拦截。From the above description, all network request data packets or network return data packets of APP will pass through the Android VPNService service, so as long as the data packets are intercepted and parsed based on the Android VpnService service, the network traffic can be intercepted.
在前述实施例提供的获取网络资源的方法基础上,相应地,本申请还提供了一种获取网络资源的装置。该装置可以在图1A和图1B所示场景中的终端设备100上实现。以下结合附图和实施例对该装置的实现方式进行介绍和说明。On the basis of the method for acquiring network resources provided by the foregoing embodiments, correspondingly, the present application also provides an apparatus for acquiring network resources. The apparatus may be implemented on the
参见图9B,该图为本申请实施例提供的一种获取网络资源的装置的结构示意图。如图9B所示,获取网络资源的装置900包括:Referring to FIG. 9B , this figure is a schematic structural diagram of an apparatus for acquiring network resources provided by an embodiment of the present application. As shown in FIG. 9B, the
拦截模块901,用于在启动安全模式后,对网络资源访问请求进行拦截;An
解析模块902,用于对所述拦截模块901拦截的所述网络资源访问请求进行解析;A
请求类型确定模块903,用于根据所述安全模式的配置信息和解析出的数据信息确定所述网络资源访问请求的类型;A request
发送模块904,用于当所述请求类型确定模块903确定所述网络资源访问请求为对第一类型资源的请求时,通过网关向服务器请求网络资源;所述配置信息包含所述安全模式下可访问的第一类型资源的信息;The sending
所述发送模块904,还用于当所述请求类型确定模块903确定所述网络资源访问请求为对第二类型资源的请求时,向服务器请求网络资源。The sending
该装置通过解析获得网络资源访问信息的数据信息,据此确定请求访问的资源类型,并以资源类型决定请求的发送路径,能够提升对于第一类型资源的访问的安全性。一旦安全模式启动,便可实现对第一类型资源和第二类型资源的安全访问,满足远程获取网络资源的需求。此外,该技术方案不需要专门配置VPN服务器,从而降低了成本。The device obtains the data information of the network resource access information through analysis, determines the resource type requested to be accessed, and determines the request sending path based on the resource type, which can improve the security of access to the first type of resources. Once the security mode is activated, secure access to the first type of resources and the second type of resources can be implemented to meet the requirements for remote acquisition of network resources. In addition, the technical solution does not require a VPN server to be specially configured, thereby reducing costs.
作为一种可能的实现方式,请求类型确定模块包括:As a possible implementation, the request type determination module includes:
第一确定单元,用于当所述解析出的数据信息与所述配置信息匹配成功时,确定所述网络资源访问请求为对第一类型资源的请求;a first determining unit, configured to determine that the network resource access request is a request for a first type of resource when the parsed data information is successfully matched with the configuration information;
第二确定单元,用于当所述解析出的数据信息与所述配置信息匹配不成功时,确定所述网络资源访问请求为对第二类型资源的请求。A second determining unit, configured to determine that the network resource access request is a request for a second type of resource when the parsed data information does not match the configuration information successfully.
基于解析出的数据信息和预先获取的配置信息进行匹配来确定请求的资源类型,能够提升确定出的资源类型的准确性,从而保障访问的安全性。此外,配置信息可以依据用户身份进行设置,因此更加灵活,适用于不同身份用户的个性化访问,进一步提升了资源访问的安全性。The requested resource type is determined based on the matching between the parsed data information and the pre-acquired configuration information, which can improve the accuracy of the determined resource type, thereby ensuring access security. In addition, the configuration information can be set according to the user's identity, so it is more flexible, suitable for personalized access of users with different identities, and further improves the security of resource access.
作为一种可能的实现方式,所述配置信息还包括:所述网络资源访问请求与所述服务器的鉴权信息;As a possible implementation manner, the configuration information further includes: the network resource access request and the authentication information of the server;
所述发送模块904,包括:第一发送单元,用于当所述请求类型确定模块确定所述网络资源访问请求为对第一类型资源的请求时,根据所述解析出的数据信息创建新的网络资源访问请求,并在所述新的网络资源访问请求的请求头中封装所述鉴权信息,以使所述网关根据所述鉴权信息对所述网络资源访问请求进行合法性校验;The sending
所述网关用于当所述网关对所述网络资源访问请求的合法性校验通过时,向服务器请求网络资源。The gateway is configured to request the network resource from the server when the validity check of the network resource access request by the gateway is passed.
通过鉴权信息的配置,网关能够有效实现合法性校验,避免基于不合法的请求来请求业务服务。如此,提升了获取网络资源的安全性。Through the configuration of authentication information, the gateway can effectively verify the validity and avoid requesting business services based on illegal requests. In this way, the security of acquiring network resources is improved.
作为一种可能的实现方式,获取网络资源的装置900通过软件定义边界软件开发工具包TSDP SDK实现;所述TSDP SDK包括:软件定义边界服务类、虚拟专用网络服务类、传输控制协议代理服务类和域名系统代理服务类;As a possible implementation manner, the
获取网络资源的装置900还包括:初始化模块,用于启动安全模式。初始化模块包括:The
第一初始化单元,用于调用所述软件定义边界服务类进行初始化,并通过所述软件定义边界服务类拉取所述配置信息;a first initialization unit, configured to call the software-defined boundary service class for initialization, and pull the configuration information through the software-defined boundary service class;
第二初始化单元,用于根据所述配置信息开启所述虚拟专用网络服务类,对所述虚拟专用网络服务类进行初始化;a second initialization unit, configured to enable the virtual private network service class according to the configuration information, and initialize the virtual private network service class;
第三初始化单元,用于开启所述传输控制协议代理服务类;a third initialization unit, configured to start the transmission control protocol proxy service class;
第四初始化单元,用于开启所述域名系统代理服务类。The fourth initialization unit is used to start the domain name system proxy service class.
利用该初始化模块,能够在访问请求到来之前,调整终端设备处于安全模式,使各个服务类处于可工作状态。Using the initialization module, before the access request arrives, the terminal device can be adjusted to be in the safe mode, so that each service class is in a workable state.
作为一种可能的实现方式,获取网络资源的装置900的初始化模块还包括:As a possible implementation manner, the initialization module of the
发送单元,用于将所述软件定义边界服务类、所述虚拟专用网络服务类、所述传输控制协议代理服务类和所述域名系统代理服务类成功开启的结果发送至用户界面UI层,以使所述UI层在界面上展示所述安全模式已启动的结果。A sending unit, configured to send the result of the successful opening of the software-defined boundary service class, the virtual private network service class, the transmission control protocol proxy service class, and the domain name system proxy service class to the user interface UI layer, so as to The UI layer is caused to display on the interface the result that the safe mode has been activated.
通过通知UI层,可以使用户能够在终端设备的显示屏上观察到安全模式已启动的结果,从而用户可以在获知该结果的基础上实时发起请求,提升用户访问第一类型资源的效率。By notifying the UI layer, the user can observe the result that the security mode has been activated on the display screen of the terminal device, so that the user can initiate a request in real time on the basis of knowing the result, improving the efficiency of the user accessing the first type of resources.
作为一种可能的实现方式,所述解析出的数据信息包括:所述网络资源访问请求的协议类型、源IP、源端口、目的IP和目的端口。As a possible implementation manner, the parsed data information includes: a protocol type, source IP, source port, destination IP, and destination port of the network resource access request.
作为一种可能的实现方式,获取网络资源的装置900还包括:As a possible implementation manner, the
第一修改模块,用于在将所述解析出的数据信息与所述配置信息进行匹配之前,当所述虚拟专用网络服务类确定所述网络资源访问请求的数据包为传输控制协议TCP上行包时,通过所述虚拟专用网络服务类修改所述目的IP和所述目的端口;The first modification module is configured to, before matching the parsed data information with the configuration information, when the virtual private network service class determines that the data packet of the network resource access request is a transmission control protocol TCP uplink packet When , modify the destination IP and the destination port through the virtual private network service class;
链接创建模块,用于根据所述第一修改模块修改的目的IP和目的端口创建本地socket链接;A link creation module for creating a local socket link according to the destination IP and destination port modified by the first modification module;
转发模块,用于将链接创建模块创建的所述网络资源访问请求转发给所述传输控制协议代理服务类;a forwarding module, configured to forward the network resource access request created by the link creation module to the transmission control protocol proxy service class;
监听模块,用于监听到所述虚拟专用网络服务类提供的socket转发请求后,从中获取所述目的IP,以利用所述目的IP确定与所述配置信息是否匹配。The monitoring module is configured to obtain the destination IP from the socket forwarding request provided by the virtual private network service class, so as to use the destination IP to determine whether it matches the configuration information.
通过修改目的IP和目的端口,可以将访问请求转给传输控制协议代理服务类,从而便于该传输控制协议代理服务类实行与该请求相关的监听工作。By modifying the destination IP and destination port, the access request can be forwarded to the transmission control protocol proxy service class, thereby facilitating the transmission control protocol proxy service class to perform monitoring work related to the request.
作为一种可能的实现方式,获取网络资源的装置900的监听模块还用于监听所述网关或所述业务服务模块返回的socket网络资源数据(对于图1B所示场景则是监听网关服务器或业务服务器返回的socket网络资源数据);As a possible implementation manner, the monitoring module of the
获取网络资源的装置900还包括:The
第二修改模块,用于当所述传输控制协议代理服务类确定所述socket网络资源数据为TCP下行包时,将所述TCP下行包的源IP和源端口修改为所述目的IP和所述目的端口;A second modification module, configured to modify the source IP and source port of the TCP downlink packet to the destination IP and the source port when the transmission control protocol proxy service class determines that the socket network resource data is a TCP downlink packet destination port;
第一返回模块,用于所述传输控制协议代理服务类将修改后的TCP下行包返回给所述虚拟专用网络服务类,以通过虚拟专用网络服务类返回给所述软件定义边界服务类,再从所述软件定义边界服务类返回至用户界面UI层,以使所述UI层在界面展示所述服务器提供的网络资源。The first return module is used for the transmission control protocol proxy service class to return the modified TCP downlink packet to the virtual private network service class, so as to return to the software-defined boundary service class through the virtual private network service class, and then Return from the software-defined boundary service class to the UI layer of the user interface, so that the UI layer displays the network resources provided by the server on the interface.
通过第二模块的修改,避免虚拟专用网络服务类对返回结果的不认可。保证所请求的数据资源的顺利传输。Through the modification of the second module, the disapproval of the returned result by the virtual private network service class is avoided. Ensure the smooth transmission of the requested data resources.
作为一种可能的实现方式,所述配置信息还包括:域名系统列表,所述域名系统列表中包含所述安全模式下可访问的第一类型资源的域名对应的IP地址;As a possible implementation manner, the configuration information further includes: a domain name system list, where the domain name system list includes IP addresses corresponding to domain names of the first type of resources accessible in the security mode;
获取网络资源的装置900的解析模块902包括:The
解析确定单元,用于当所述虚拟专用网络服务类解析确定所述网络资源访问请求的数据包为用户数据包协议UDP包,且所述UDP包对应的端口号为53时,确定所述网络资源访问请求为域名系统解析请求;A parsing and determining unit, configured to determine the network when the virtual private network service class parsing determines that the data packet of the network resource access request is a user data packet protocol UDP packet, and the port number corresponding to the UDP packet is 53 The resource access request is a DNS resolution request;
遍历单元,用于所述域名系统代理服务类根据所述UDP包遍历所述域名系统列表;a traversal unit, used for the domain name system proxy service class to traverse the domain name system list according to the UDP packet;
返回单元,用于当遍历单元查找到所述网络资源访问请求的域名对应的IP地址后,将该IP地址作为所述目的IP返回给所述虚拟专用网络服务类。The returning unit is configured to return the IP address to the virtual private network service class as the destination IP after the traversing unit finds the IP address corresponding to the domain name of the network resource access request.
作为一种可能的实现方式,所述第一类型资源为企业内网资源,所述第二类型资源为所述企业内网资源以外的其他资源。As a possible implementation manner, the first type of resource is an enterprise intranet resource, and the second type of resource is another resource other than the enterprise intranet resource.
在该实现方式中,保障了对企业内网资源的访问安全性,两种类型的资源可以切换访问,也可以同时访问,操作更加流畅,提升了用户的使用体验。In this implementation manner, the access security to the intranet resources of the enterprise is guaranteed, and the two types of resources can be accessed by switching or at the same time, the operation is smoother, and the user experience is improved.
作为一种可能的实现方式,获取网络资源的装置900还包括:As a possible implementation manner, the
拒绝访问模块,用于当所述安全模式关闭后,拒绝对第一类型资源的访问。The access denial module is used to deny access to the first type of resources when the security mode is turned off.
作为一种可能的实现方式,所述安全模式的启动和关闭均通过用户界面UI层在界面上展示的按钮实现。便于用户查看和控制。As a possible implementation manner, the startup and shutdown of the safe mode are implemented through buttons displayed on the interface by the UI layer of the user interface. User-friendly viewing and control.
本申请实施例还提供了一种计算机设备,下面将从硬件实体化的角度对本申请实施例提供的计算机设备进行介绍。The embodiment of the present application further provides a computer device, and the computer device provided by the embodiment of the present application will be introduced below from the perspective of hardware materialization.
参见图10,图10是本申请实施例提供的一种服务器结构示意图,该服务器1400可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上中央处理器(centralprocessing units,CPU)1422(例如,一个或一个以上处理器)和存储器1432,一个或一个以上存储应用程序1442或数据1444的存储介质1430(例如一个或一个以上海量存储设备)。其中,存储器1432和存储介质1430可以是短暂存储或持久存储。存储在存储介质1430的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对服务器中的一系列指令操作。更进一步地,中央处理器1422可以设置为与存储介质1430通信,在服务器1400上执行存储介质1430中的一系列指令操作。Referring to FIG. 10, FIG. 10 is a schematic structural diagram of a server provided by an embodiment of the present application. The
服务器1400还可以包括一个或一个以上电源1426,一个或一个以上有线或无线网络接口1450,一个或一个以上输入输出接口1458,和/或,一个或一个以上操作系统1441,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。
上述实施例中由服务器所执行的步骤可以基于该图10所示的服务器结构。该服务器可以是图1A所示的服务器200也可以是图1B所示的网关服务器301。下面以图1A所示场景对服务器中1422执行的操作进行描述。The steps performed by the server in the above embodiment may be based on the server structure shown in FIG. 10 . The server may be the
其中,CPU 1422用于执行如下步骤:Among them, the
当终端设备发送的网络资源访问请求为对第一类型资源的请求时,通过网关对网络资源访问请求进行合法性校验;当合法性校验通过,则向业务服务模块请求业务服务;通过网关接收业务服务模块返回的结果,并将该结果返回给终端设备。When the network resource access request sent by the terminal device is a request for the first type of resources, the network resource access request is checked for validity through the gateway; when the validity check is passed, the business service module is requested for business services; through the gateway Receive the result returned by the business service module, and return the result to the terminal device.
CPU 1422还用于执行如下步骤:The
当终端设备发送的网络资源访问请求为对第二类型资源的请求时,以业务服务模块对该请求进行处理,并将处理的结果返回给终端设备。When the network resource access request sent by the terminal device is a request for resources of the second type, the request is processed by the service service module, and the processing result is returned to the terminal device.
针对上文描述的获取网络资源的方法,本申请实施例还提供了一种用于获取网络资源的终端设备,以使上述获取网络资源的方法在实际中实现以及应用。For the method for obtaining network resources described above, the embodiments of the present application further provide a terminal device for obtaining network resources, so that the above method for obtaining network resources can be implemented and applied in practice.
参见图11,图11为本申请实施例提供的一种终端设备的结构示意图。为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端设备可以为包括手机、平板电脑、个人数字助理(Personal DigitalAssistant,简称PDA)等任意终端设备,以终端设备为手机为例:Referring to FIG. 11 , FIG. 11 is a schematic structural diagram of a terminal device provided by an embodiment of the present application. For the convenience of description, only the parts related to the embodiments of the present application are shown, and the specific technical details are not disclosed, please refer to the method part of the embodiments of the present application. The terminal device can be any terminal device including a mobile phone, a tablet computer, a personal digital assistant (Personal Digital Assistant, PDA for short), etc. The terminal device is a mobile phone as an example:
图11示出的是与本申请实施例提供的终端设备相关的手机的部分结构的框图。参考图11,该手机包括:射频(Radio Frequency,简称RF)电路1510、存储器1520、输入单元1530、显示单元1540、传感器1550、音频电路1560、无线保真(wireless fidelity,简称WiFi)模块1570、处理器1580、以及电源1590等部件。本领域技术人员可以理解,图11中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 11 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present application. Referring to FIG. 11 , the mobile phone includes: a radio frequency (Radio Frequency, RF for short)
下面结合图11对手机的各个构成部件进行具体的介绍:The following describes the various components of the mobile phone in detail with reference to Figure 11:
RF电路1510可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1580处理;另外,将设计上行的数据发送给基站。通常,RF电路1510包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low NoiseAmplifier,简称LNA)、双工器等。此外,RF电路1510还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,简称GSM)、通用分组无线服务(GeneralPacket Radio Service,简称GPRS)、码分多址(Code Division Multiple Access,简称CDMA)、宽带码分多址(Wideband Code Division Multiple Access,简称WCDMA)、长期演进(Long TermEvolution,简称LTE)、电子邮件、短消息服务(Short Messaging Service,简称SMS)等。The
存储器1520可用于存储软件程序以及模块,处理器1580通过运行存储在存储器1520的软件程序以及模块,从而实现手机的各种功能应用以及数据处理。存储器1520可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1520可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The
输入单元1530可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。具体地,输入单元1530可包括触控面板1531以及其他输入设备1532。触控面板1531,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1531上或在触控面板1531附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1531可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1580,并能接收处理器1580发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1531。除了触控面板1531,输入单元1530还可以包括其他输入设备1532。具体地,其他输入设备1532可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The
显示单元1540可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元1540可包括显示面板1541,可选的,可以采用液晶显示器(LiquidCrystal Display,简称LCD)、有机发光二极管(Organic Light-Emitting Diode,简称OLED)等形式来配置显示面板1541。进一步的,触控面板1531可覆盖显示面板1541,当触控面板1531检测到在其上或附近的触摸操作后,传送给处理器1580以确定触摸事件的类型,随后处理器1580根据触摸事件的类型在显示面板1541上提供相应的视觉输出。虽然在图11中,触控面板1531与显示面板1541是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1531与显示面板1541集成而实现手机的输入和输出功能。The
手机还可包括至少一种传感器1550,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1541的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1541和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The cell phone may also include at least one
音频电路1560、扬声器1561,传声器1562可提供用户与手机之间的音频接口。音频电路1560可将接收到的音频数据转换后的电信号,传输到扬声器1561,由扬声器1561转换为声音信号输出;另一方面,传声器1562将收集的声音信号转换为电信号,由音频电路1560接收后转换为音频数据,再将音频数据输出处理器1580处理后,经RF电路1510以发送给比如另一手机,或者将音频数据输出至存储器1520以便进一步处理。The
WiFi属于短距离无线传输技术,手机通过WiFi模块1570可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图11示出了WiFi模块1570,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变发明的本质的范围内而省略。WiFi is a short-distance wireless transmission technology. The mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the
处理器1580是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1520内的软件程序和/或模块,以及调用存储在存储器1520内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1580可包括一个或多个处理单元;优选的,处理器1580可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1580中。The
手机还包括给各个部件供电的电源1590(比如电池),优选的,电源可以通过电源管理系统与处理器1580逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 1590 (such as a battery) that supplies power to various components. Preferably, the power supply can be logically connected to the
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may also include a camera, a Bluetooth module, and the like, which will not be repeated here.
在本申请实施例中,该手机所包括的存储器1520可以存储程序代码,并将所述程序代码传输给所述处理器。In this embodiment of the present application, the
该手机所包括的处理器1580可以根据所述程序代码中的指令执行上述实施例提供的获取网络资源的方法。The
如本申请所公开的获取网络资源的方法、装置、相关产品,其所涉及的服务器可组成为一区块链,而服务器为区块链上的节点。For the method, device, and related products for obtaining network resources disclosed in this application, the servers involved can be formed into a blockchain, and the servers are nodes on the blockchain.
本申请实施例还提供一种计算机可读存储介质,用于存储计算机程序,该计算机程序用于执行上述实施例提供的获取网络资源的方法。Embodiments of the present application further provide a computer-readable storage medium for storing a computer program, where the computer program is used to execute the method for acquiring network resources provided by the foregoing embodiments.
本申请实施例还提供了一种计算机程序产品或计算机程序,该计算机程序产品或计算机程序包括计算机指令,该计算机指令存储在计算机可读存储介质中。计算机设备的处理器从计算机可读存储介质读取该计算机指令,处理器执行该计算机指令,使得该计算机设备执行上述方面的各种可选实现方式中提供的获取网络资源的方法。Embodiments of the present application also provide a computer program product or computer program, where the computer program product or computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method for acquiring network resources provided in various optional implementation manners of the foregoing aspects.
本领域普通技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成,前述程序可以存储于一计算机可读取存储介质中,该程序在执行时,执行包括上述方法实施例的步骤;而前述的存储介质可以是下述介质中的至少一种:只读存储器(英文:read-only memory,缩写:ROM)、RAM、磁碟或者光盘等各种可以存储程序代码的介质。Those of ordinary skill in the art can understand that all or part of the steps of implementing the above method embodiments can be completed by program instructions related to hardware, and the aforementioned program can be stored in a computer-readable storage medium. When the program is executed, the execution includes: The steps of the above method embodiment; and the aforementioned storage medium may be at least one of the following media: read-only memory (English: read-only memory, abbreviation: ROM), RAM, magnetic disk or optical disk and other various storage media medium of program code.
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于设备及系统实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。以上所描述的设备及系统实施例仅仅是示意性的,其中作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。It should be noted that each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. place. In particular, for the device and system embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for related parts. The device and system embodiments described above are only schematic, wherein the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in One place, or it can be distributed over multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment. Those of ordinary skill in the art can understand and implement it without creative effort.
以上所述,仅为本申请的一种具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应该以权利要求的保护范围为准。The above is only a specific embodiment of the present application, but the protection scope of the present application is not limited to this. Substitutions should be covered within the protection scope of this application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110383070.XA CN115250185A (en) | 2021-04-09 | 2021-04-09 | A method, device and related products for acquiring network resources |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110383070.XA CN115250185A (en) | 2021-04-09 | 2021-04-09 | A method, device and related products for acquiring network resources |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115250185A true CN115250185A (en) | 2022-10-28 |
Family
ID=83696806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110383070.XA Pending CN115250185A (en) | 2021-04-09 | 2021-04-09 | A method, device and related products for acquiring network resources |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115250185A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116192597A (en) * | 2022-12-27 | 2023-05-30 | 中国联合网络通信集团有限公司 | Backbone network capability opening system, method, server and medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102769618A (en) * | 2012-07-18 | 2012-11-07 | 北京星网锐捷网络技术有限公司 | WEB access processing method, network device and communication system |
CN103023867A (en) * | 2011-09-30 | 2013-04-03 | 卡巴斯基实验室封闭式股份公司 | Portable security device and methods for dynamically configuring network security settings |
CN106105139A (en) * | 2014-03-07 | 2016-11-09 | 微软技术许可有限责任公司 | The automatic detection of the authentication method being carried out by gateway |
CN111200633A (en) * | 2019-11-28 | 2020-05-26 | 云深互联(北京)科技有限公司 | Indirect access method and system for business system |
-
2021
- 2021-04-09 CN CN202110383070.XA patent/CN115250185A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103023867A (en) * | 2011-09-30 | 2013-04-03 | 卡巴斯基实验室封闭式股份公司 | Portable security device and methods for dynamically configuring network security settings |
CN102769618A (en) * | 2012-07-18 | 2012-11-07 | 北京星网锐捷网络技术有限公司 | WEB access processing method, network device and communication system |
CN106105139A (en) * | 2014-03-07 | 2016-11-09 | 微软技术许可有限责任公司 | The automatic detection of the authentication method being carried out by gateway |
CN111200633A (en) * | 2019-11-28 | 2020-05-26 | 云深互联(北京)科技有限公司 | Indirect access method and system for business system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116192597A (en) * | 2022-12-27 | 2023-05-30 | 中国联合网络通信集团有限公司 | Backbone network capability opening system, method, server and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12149406B2 (en) | Managing network connected devices | |
KR101724811B1 (en) | Method, device, system, program and storage medium for controlling access to router | |
US10637724B2 (en) | Managing network connected devices | |
EP2997466B1 (en) | Context aware virtual desktop | |
US9712486B2 (en) | Techniques for the deployment and management of network connected devices | |
US8752140B1 (en) | System and methods for trusted internet domain networking | |
KR102435780B1 (en) | Control method and related device for node in distributed system | |
CN110198301B (en) | Service data acquisition method, device and equipment | |
JP2020520009A (en) | Secure authentication of BOT users | |
CN103716793B (en) | Access point information sharing method and device | |
US9819679B1 (en) | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers | |
CN108881103B (en) | Network access method and device | |
US11916897B2 (en) | Isolating networks and credentials using on-demand port forwarding | |
CN108965103A (en) | Electronic equipment, server and its method of conversation content are provided | |
US20170323115A1 (en) | Method and apparatus for remotely deleting information | |
US9686819B2 (en) | Methods, devices and systems for router access control | |
WO2017113119A1 (en) | Method and device for associating application with biological characteristic, and mobile terminal | |
WO2017054585A1 (en) | Network access method, device, and system | |
CN107577933A (en) | Application login method and device, computer equipment, computer-readable storage medium | |
CN115250185A (en) | A method, device and related products for acquiring network resources | |
CN117313131A (en) | Configurable interface encryption method, system, device and medium based on polymorphism | |
WO2015062326A1 (en) | Page access control method, device and system | |
CN106792671A (en) | Data encryption method, device and terminal equipment | |
CN114374563A (en) | Network connection method, device, storage medium and electronic equipment | |
HK40021396B (en) | Method, device, system and storage medium for testing page |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |