CN102724189B - A kind of method and device controlling user URL access - Google Patents

A kind of method and device controlling user URL access Download PDF

Info

Publication number
CN102724189B
CN102724189B CN201210189285.9A CN201210189285A CN102724189B CN 102724189 B CN102724189 B CN 102724189B CN 201210189285 A CN201210189285 A CN 201210189285A CN 102724189 B CN102724189 B CN 102724189B
Authority
CN
China
Prior art keywords
url
user terminal
address
access
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210189285.9A
Other languages
Chinese (zh)
Other versions
CN102724189A (en
Inventor
张立占
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201210189285.9A priority Critical patent/CN102724189B/en
Publication of CN102724189A publication Critical patent/CN102724189A/en
Application granted granted Critical
Publication of CN102724189B publication Critical patent/CN102724189B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides control method and the device that a kind of URL accesses. By the access strategy of prior configure user URL on URL server, then by the access policy distribution of the user URL of described configuration to user terminal, control user URL by the described user URL access strategy issued and access. The access controlling user URL due to the present invention does not need to rely on the network equipment, and only needing configure user URL on URL server to access strategy can realize, and thus safeguards simple, flexible.

Description

A kind of method and device controlling user URL access
Technical field
The present invention relates to network communication field, particularly relate to a kind of user URL that controls in terminal and access and prevent user from accessing method and the device of illegal URL by distorting Hosts file.
Background technology
Along with Personal Computer and the rapid of internet are popularized, the application of network in the work and life of people is more and more extensive. In a lot of occasion especially working environment, employee, in order to protect the information security of self, is used the restriction of internet to require more and more higher by enterprises and institutions, and the control of the network access rights of employee is also more and more stricter. In a lot of working environment, it is often necessary to different clerical workforces is given different Web vector graphic authorities.
At present, the scheme controlling user's URL access rights the most common has following four kinds:
Scheme 1:MAC address filtering. The MAC address list allowing access by configuring on network devices, carrys out control terminal access authority. But this scheme defect is: the MAC address of each network equipment in the necessary clear and definite network of mac address filter technical requirements, and according to control strategy, the mac address filter table of each port of the network equipment is configured. If the network interface card of the network equipment changes, or physical location change, or then need to reconfigure when having new user terminal to join in network, so network management burden is quite heavy, and the continuous expansion along with network equipment quantity, maintenance workload also strengthens thereupon. And MAC address reconfigures to have had network interface card to support now, thus can construct legal MAC address to obtain access rights, i.e. MAC address " deception ". The most important thing is, the authority that terminal user accesses URL only can and can not two kinds, delineation of power is too single, cannot realize multi-level access control strategy.
Scheme 2:VLAN isolates. By VLAN technology, the numerous network equipments in a network system are divided into some virtual " working groups ". The network equipment between group and group is isolated mutually on two layers, forms different broadcast territories. But the defect of this scheme is: VLAN isolation scheme require must the MAC address of equipment that connects of each physical port on clear and definite exchange board or IP address, divide different working groups according to demand and exchange board configured. When certain terminal network interface card, IP address or physical location change, it is necessary to being reconfigured by the relevant network equipment multiple in whole network system, maintenance workload is very big.In addition, VLAN isolation scheme is the division carried out for company's Intranet, and the access of outer net, for the authority of limiting terminal user at the access URL of Intranet, cannot be controlled by it.
Scheme 3:ACL ACL. Based on the traffic organising technology of packet filtering, by using fundamental element as packet inspection of source address, object address and port numbers, determining whether allow passing through of data packet. The defect of this scheme is: uses ACL ACL, it is necessary to the clearly IP subnet at each main frame and workstation place, and confirms the access relation between them. In the network that terminal quantity is huge, a lot of IP address resources can be wasted, simultaneously huge network terminal quantity to realize access control, the complexity and difficulties of management can be made equally to become very high.
Scheme 4: hardware firewall. The hardware firewall equipment of specialty is used to carry out net control access. But the defect of this scheme is: the price of hardware firewall is all higher usually, adopts this scheme that operation cost of enterprises will be caused big.
In addition, above-mentioned all schemes are all rely on the network equipment to realize, and thus seem underaction, convenience when control terminal user accesses URL.
Summary of the invention
In view of this, the present invention proposes a kind of method and the device that control user URL access, by by the access policy distribution of configured in advance user URL on URL server to user terminal, according to the described URL user access policies issued control user URL access.
The present invention proposes a kind of method controlling user URL and accessing, be applied in the network system being made up of user terminal and URL server, wherein, described method comprises the steps:
Step 1, on URL server, configuration needs the URL access resources of management;
Step 2, the access strategy of configure user URL on URL server;
Step 3, when user terminal is by URL server network break-in, URL server is by the access policy distribution of the user URL of configuration to user terminal, and user's URL access subsequently, judges whether to allow user to carry out URL access by accessing strategy according to the described URL issued.
Further, described method also comprises:
Steps A, the rule of IP address in configure user terminal to report hosts file on URL server;
Step B, when user terminal is by URL server network break-in, URL server issues the rule of IP address in user terminal to send up hosts file, and reports the IP address in local hosts file according to described rule;
Step C, URL server receives the IP address in the hosts file of user terminal to send up, it is mated with the IP address scope existed in the permission user terminal hosts file himself retained, if coupling, user terminal is then allowed to continue access URL resource, otherwise disconnect the connection of itself and URL server, make it no longer to access any network resource.
Further, in described steps A configure user terminal to report hosts file, the rule of IP address is specially, length and number of retries when length, time-out during the interval of IP address in configure user terminal to report hosts file on URL server.
During the interval of further, described configuration, when length, time-out, length and number of retries should be limited to: " during time-out length " × " number of retries+1 " < when interval " report length ".
Further, not receiving URL server response behind IP address in user terminal to send up hosts file, it is believed that user terminal and URL server connection failure, user terminal disconnects the connection with server, makes it no longer to access any network resource.
The device being applied to the control user URL of aforesaid method and accessing provided by the invention, is specially the URL server that control user URL accesses, and wherein, described device comprises:
Configuration module, for configuring the URL access resources needing management and the strategy of control user URL access;
Matching module, it, after URL server receives the IP address in the hosts file of user terminal to send up, is mated by user with the IP address scope existed in the permission user terminal hosts file himself retained;
Processing module, for when the result mated is consistent, allowing user terminal to continue access URL resource, otherwise disconnect the connection of itself and URL server, it may also be useful to family terminal no longer accesses any network resource.
Further, described matching module is used for the rule of IP address in configure user terminal to report hosts file.
Further, in described configure user terminal to report hosts file, the rule of IP address is specially: length and number of retries when length, time-out during the interval of IP address in configure user terminal to report hosts file.
During the interval of further, described configuration, when length, time-out, length and number of retries should be limited to: " during time-out length " × " number of retries+1 " < when interval " report length ".
Further, described processing module also for when user terminal is by URL server network break-in, by URL server by the access strategy of described user URL of configuration and user terminal to send up hosts file the rule of IP address be handed down to user terminal.
Compared with prior art, technical solution of the present invention is configured with the access strategy of user URL in advance on URL server, then by the access policy distribution of described user URL to user terminal, the URL being controlled user by the described URL user access policies issued accesses behavior. Do not need to rely on the network equipment due to technical solution of the present invention, only need to access strategy at URL server configure user terminal URL and can realize the control that user URL accesses, thus safeguard simple, flexible.
Accompanying drawing explanation
Fig. 1 is the method flow diagram that control user URL provided by the invention accesses.
Fig. 2 is that the present invention sets domain name URL classification schematic diagram at URL server side.
Fig. 3 is that the present invention needs the domain name URL schematic diagram of management in the setting of URL server side.
Fig. 4 is that the present invention sets IP address URL classification schematic diagram at URL server side.
Fig. 5 is that the present invention needs the IP address URL schematic diagram of management in the setting of URL server side.
Fig. 6 is that the present invention accesses the schematic diagram of strategy at URL server side configure user URL.
Fig. 7 is that the present invention prevents terminal user from distorting the schema of hosts file.
Fig. 8 is the IP address scope that under certain application-specific scene, the present invention allows user terminal access URL in server side configuration.
Long schematic diagram when Fig. 9 is the timed interval, number of retries and the time-out that under certain application-specific scene, the present invention reports at server side configure user terminal hosts file.
Figure 10 is IP address schematic diagram corresponding in the host file of user terminal to send up of the present invention under certain application-specific scene.
Figure 11 is the device schematic diagram that control user URL provided by the invention accesses.
Embodiment
In order to realize the object of the invention, the present invention needs in two in addition Improvement and perfection: user's URL access control and prevent terminal user from distorting hosts file. In order to make the present invention clearly understand, before the detail embodiment of the present invention, first introduce two key concepts.
URL: unified resource location symbol (abbreviation of English UniformResourceLocator), is also referred to as web page address, is the address of the resource of standard on Internet. Utilize it, it is possible to what realize between web page address with IP address well is corresponding, is convenient to people and accesses the network resource on specific IP address.
Hosts file: hosts be in Windows system one there is no the system file of extension name, set up one for the IP address that the network address domain name that some are conventional is corresponding with it to associate " database ", when user inputs the network address that needs login in a browser, system can find corresponding IP address first automatically from hosts file, once find, system can open corresponding webpage immediately, if do not found, then network address can be submitted to DNS domain name analysis server to carry out the parsing of IP address by system again.
Below in conjunction with specific embodiment respectively from user's URL access control with prevent terminal user from distorting hosts file two aspects so that technical solution of the present invention to be described.
One, user URL access control
In order to practicality controls flexibly to user URL access is convenient, in embodiments of the present invention, by the access strategy of prior configure user URL on URL server and by this access policy distribution to user terminal, when user terminal is when accessing specific URL network address, judge whether to allow this URL to access according to the access strategy of the user URL received by terminal software. If this URL accesses the network address allowing access in the access strategy belonging to user URL, then directly conducted interviews by URL server; Otherwise, URL server is refused this URL and is accessed.
Shown below is concrete grammar and application example that a control user URL accesses.
The URL access resources of step 1, configuration needs management on URL server
URL access is divided into domain name URL access and IP address URL access two big classes usually, according to this before the access strategy of the present invention configure user URL on URL server, it is necessary in advance the domain name URL access and IP address URL access resources needing management is classified respectively.
Specifically, when arranging the domain name URL access resources needing management, proceed as follows:
First, URL server increases domain name URL classification list
Such as: when domain name URL access resources is specifically divided into buy on behalf website, shopping class website, stock securities information, development technique website, news category website, movie & TV download, these classifications of game forum time, then by increasing, revise, delete or refresh foundation or the amendment that instruction completes above-mentioned domain name URL classification in domain name URL classification list, specifically as shown in Figure 2.
Then, under each domain name URL classification of aforementioned setting, the concrete domain name URL resource needing management is increased.
Such as: under aforementioned shopping class website, the concrete domain address such as www.gouwu.com.cn, www.360buy.com, www.amazon.com are increased. Specifically as shown in Figure 3.
When arranging the IP address URL access resources needing management, also need to carry out similar operations:
First, URL server increases IP address URL tabulation
Such as: on URL server, specifically increase the IP address URL classifications such as company service device group, stock securities information, movie & TV download, mailbox/news/microblogging, specifically as shown in Figure 4.
Then, under each IP address URL classification of above-mentioned setting, the IP address URL resource of concrete needs management is increased.
Such as, under mailbox/news/microblogging IP address URL classification, the IP address of increase Tengxun mailbox server, Tengxun's NEWS SERVER, Tengxun's client downloads server and end IP address etc., specifically as shown in Figure 5.
Step 2, on URL server the access strategy of configure user URL
Specifically, by the URL access resources of the needs of setting in abovementioned steps 1 management being refused or allow access to arrange, and the priority of each URL access resources is configured, it is possible to be combined into abundant and comprehensive URL access control strategy, specifically as shown in Figure 6.
Step 3, when user terminal by URL server network break-in time, URL server by the access policy distribution of user URL of configuration to user terminal, user's URL access subsequently, judges whether to allow user to carry out URL access by accessing strategy according to the described URL issued.
Hereafter, terminal user is when accessing URL, and user terminal can according to the access strategy of the user URL that URL server issues to process the URL access of user. Such as, according to the URL access strategy of the user of configuration shown in Fig. 6, when user accesses this URL of http://www.amazon.com:
User terminal in advance according to Fig. 6 setting user URL access strategy " Office Strategies " in domain name URL classification from high to low priority orders traversal domain name URL classification, find coupling rule;
The rule that have found coupling in domain name URL classification " shopping class website ", " shopping class website " is sorted in " Office Strategies " the process action arranged is " refusal ", then terminal can refuse this visit;
If terminal peace priority orders from high to low can not find the rule of coupling, then refuses this visit according to the setting " refusal " of " domain name URL default-action " after having traveled through all domain name URL classification; Process and said process to the access of IP address URL are similar, are not repeated herein.
Two, prevent terminal user from distorting hosts file
For preventing terminal user from distorting hosts file, it is handled as follows further in the present invention, specifically as shown in Figure 7:
Steps A rule of IP address in configure user terminal to report hosts file on URL server, specific as follows:
Step a1, long during the interval of IP address in configure user terminal to report hosts file on URL server;
Step a2, long during IP address overtime in configure user terminal to report hosts file on URL server;
Specifically, behind the IP address in user terminal to send up host file, URL server can be given to respond after receiving the IP address of user terminal to send up; If user terminal does not receive response after waiting for a period of time, then can again report, this parameter be specially arrange that user terminal reports that IP address waits again time long.
Step a3, on URL server the number of retries of IP address in configure user terminal to report hosts file.
If user terminal after reporting the IP address in hosts file when time-out in length user terminal do not receive the response of URL server, user terminal needs the IP address again reported in hosts file, and this parameter determines that user terminal reports the number of times of IP address in hosts file again.
It should be noted that, three parameter values of aforementioned arrangements must be limited to: when time-out " length " × " number of retries+1 " < when interval " report length ", with ensure the time that user terminal reports maximum number of times of the IP address in hosts file to need again add the time awaited a response can not cross over report interval time long.
When step B user terminal is by URL server network break-in, URL server issues the rule of IP address in user terminal to send up hosts file, and described user terminal reports the IP address in local hosts file according to described rule.
Specifically, length and number of retries when length when the rule issued described in refers to that URL server issues the interval of IP address in user terminal to send up hosts file, time-out. Subsequently, user terminal will read local hosts file by the timed interval issuing in rule setting, parse IP address wherein and report URL server. If user terminal to send up hosts file does not receive URL server response behind IP address, then also should again report IP address in hosts file by the number of retries arranged in described rule, if when not receiving the response of URL server yet, then think user terminal and URL server connection failure, user terminal disconnects the connection with server, makes it no longer to access any network resource.
Step CURL server receives the IP address in the hosts file of user terminal to send up, by it with himself retain permission user terminal hosts file in exist IP address scope mate, if coupling, user terminal is then allowed to continue access URL resource, otherwise disconnect the connection of itself and URL server, make it no longer to access any network resource.
URL server receives the IP address in the hosts file of user terminal to send up, and response to after user terminal, by the IP address in the host file of user terminal to send up and himself this locality retain permission user terminal hosts file in exist IP address scope mate, if there is the IP address situation that can not mate, the message disconnected then is issued to user terminal, user terminal automatically disconnects after receiving this message and the linking of URL server, any network resource can not be accessed again, if situation about can not mate does not occur, then do not do any action, user terminal is allowed to carry out network resource accession.
It should be understood that when network is congested, likely when URL server issues the message disconnected to user terminal, user terminal is not because receiving the response of URL server in time and be automatically disconnected and the connection of URL server after reporting the IP address in hosts file, but this is little to safety effects. In addition, it is noted that this IP address of 127.0.0.1 in the local hosts file of user terminal does not report.
Prevent terminal user from distorting the application example of hosts file under shown below is certain application-specific scene. Specific as follows:
First, URL server allows the IP address scope existed in configure user terminal hosts file, it is assumed that the IP address scope that its permission user URL accesses is as shown in Figure 8.
Then, long when length, number of retries, time-out during the interval of IP address in configure user terminal to report hosts file on URL server, it is assumed that during the interval of its configuration, when length, number of retries, time-out, length is as shown in Figure 9.
Subsequently, when user terminal is by URL server network break-in, above-mentioned configuration file is issued on user terminal by URL server.
According to configuration interval time shown in Fig. 9, user terminal resolved local hosts file once every 10 minutes, and IP address wherein is reported URL server. According to the file content shown in Figure 10, report these two IP addresses of 1.1.1.10,10.153.128.15.
Again, after URL server receives the IP address in the hosts file of user terminal to send up, the IP address existed is allowed to mate by local to described IP address and its user terminal hosts file retained, owing to the IP address 1.1.1.10 in the hosts file that terminal user reports is not within the scope of the IP address that this user terminal host file of URL server configuration allows, then issuing to user terminal and disconnect message, informing user terminal disconnects the connection with server.
Finally, user terminal is after receiving the message that URL server disconnects, and the connection between disconnection and URL server, can not access any network resource again.
The effect preventing terminal user from distorting hosts file is, stop terminal user in hosts file by corresponding with a legal domain name for an illegal IP address, reach the object of access illegal IP address URL by accessing this legal domain name, it is perfect to URL access control strategy function.
As shown in figure 11, the device being applied to the control user URL of aforesaid method and accessing provided by the invention, is specially the URL server that control user URL accesses, and wherein, described device comprises:
Configuration module, for configuring the URL access resources needing management and the strategy of configure user URL access;
Matching module, user after URL server receives the IP address in the hosts file of user terminal to send up, by it with himself retain permission user terminal hosts file in exist IP address scope mate;
Processing module, for when the result mated is consistent, allowing user terminal to continue access URL resource, otherwise disconnect the connection of itself and URL server, it may also be useful to family terminal no longer accesses any network resource.
Further, described matching module is used for the rule of IP address in configure user terminal to report hosts file.
Further, in described configure user terminal to report hosts file, the rule of IP address is specially: length and number of retries when length, time-out during the interval of IP address in configure user terminal to report hosts file.
During the interval of further, described configuration, when length, time-out, length and number of retries should be limited to: " during time-out length " × " number of retries+1 " < when interval " report length ".
Further, described processing module is also for when user terminal is by URL server network break-in, being handed down to user terminal by the rule of IP address in the access strategy of the described user URL configured at URL server and user terminal to send up hosts file.
By the present invention's this kind of implementation, on URL server, set the access rule of user in advance, then the access rule of described user is directly issued to user terminal, accesses rule by the described user issued and control user URL and access. Do not need to rely on the network equipment due to technical solution of the present invention, thus can more easily on control terminal the URL of user access behavior.
The above is only the present invention's preferably implementation, and any equivalent amendment made based on the present invention's spirit all should be covered by the right of the present invention.

Claims (8)

1. control the method that user URL accesses, it be applied in the network system being made up of user terminal and URL server, it is characterised in that, described method comprises the steps:
Step 1, on URL server, configuration needs the URL access resources of management;
Step 2, the access strategy of configure user URL on URL server;
Step 3, when user terminal is by URL server network break-in, URL server is by the access policy distribution of the user URL of configuration to user terminal, and user's URL access subsequently, judges whether to allow user to carry out URL access by accessing strategy according to the described URL issued;
Described method comprises further:
Steps A, the rule of IP address in configure user terminal to report hosts file on URL server;
Step B, when user terminal is by URL server network break-in, URL server issues the rule of IP address in user terminal to send up hosts file, and reports the IP address in local hosts file according to described rule;
Step C, URL server receives the IP address in the hosts file of user terminal to send up, it is mated with the IP address scope existed in the permission user terminal hosts file himself retained, if coupling, user terminal is then allowed to continue access URL resource, otherwise disconnect the connection of itself and URL server, make it no longer to access any network resource.
2. the method for claim 1, it is characterized in that: in described steps A configure user terminal to report hosts file, the rule of IP address is specially, length and number of retries when length, time-out during the interval of IP address in configure user terminal to report hosts file on URL server.
3. method as claimed in claim 2, it is characterised in that: during the interval of described configuration, when length, time-out, length and number of retries should be limited to: " during time-out length " × " number of retries+1 " < when interval " report length ".
4. method as claimed in claim 3, it is characterized in that: user terminal to send up hosts file does not receive URL server response behind IP address, think and make it user terminal and URL server connection failure, user terminal disconnection and the connection of server no longer to access any network resource.
5. control the device that user URL accesses, it be specially the URL server that control user URL accesses, it is characterised in that, described device comprises:
Configuration module, for configuring the URL access resources needing management and the strategy of configure user URL access;
Matching module, after URL server receives the IP address in the hosts file of user terminal to send up, mates it with the IP address scope existed in the permission user terminal hosts file himself retained;
Processing module, for when the result mated is consistent, allowing user terminal to continue access URL resource, otherwise disconnect the connection of itself and URL server, it may also be useful to family terminal no longer accesses any network resource;
Wherein, described matching module is further used for the rule of IP address in configure user terminal to report hosts file.
6. the device that control user URL as claimed in claim 5 accesses, it is characterized in that, in described configure user terminal to report hosts file, the rule of IP address is specially: length and number of retries when length, time-out during the interval of IP address in configure user terminal to report hosts file.
7. device as claimed in claim 6, it is characterised in that: during the interval of described configuration, when length, time-out, length and number of retries should be limited to: " during time-out length " × " number of retries+1 " < when interval " report length ".
8. device as claimed in claim 5, it is characterized in that: described processing module is further used for when user terminal is by URL server network break-in, the rule of IP address in the access strategy of the described user URL configured at URL server and user terminal to send up hosts file is handed down to user terminal.
CN201210189285.9A 2012-06-06 2012-06-06 A kind of method and device controlling user URL access Active CN102724189B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210189285.9A CN102724189B (en) 2012-06-06 2012-06-06 A kind of method and device controlling user URL access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210189285.9A CN102724189B (en) 2012-06-06 2012-06-06 A kind of method and device controlling user URL access

Publications (2)

Publication Number Publication Date
CN102724189A CN102724189A (en) 2012-10-10
CN102724189B true CN102724189B (en) 2016-06-15

Family

ID=46949852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210189285.9A Active CN102724189B (en) 2012-06-06 2012-06-06 A kind of method and device controlling user URL access

Country Status (1)

Country Link
CN (1) CN102724189B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103002070B (en) * 2012-12-25 2015-05-20 上海牙木通讯技术有限公司 Domain name resolution method and device
CN104079528A (en) * 2013-03-26 2014-10-01 北大方正集团有限公司 Method and system of safety protection of Web application
CN103309986B (en) * 2013-06-18 2016-05-25 阔地教育科技有限公司 A kind of Webpage access control method and system
CN103327017B (en) * 2013-06-18 2015-12-23 阔地教育科技有限公司 A kind of web page access processing method and system
CN103327018B (en) * 2013-06-18 2015-12-09 阔地教育科技有限公司 The implementation method that a kind of web page access controls and system
CN103366134A (en) * 2013-07-12 2013-10-23 浙江吉利汽车研究院有限公司杭州分公司 Network connection management system and method
CN103425940A (en) * 2013-08-16 2013-12-04 广东电网公司中山供电局 Database safety reinforcing method and device
CN104980409A (en) * 2014-04-11 2015-10-14 中兴通讯股份有限公司 Internet behavior management method and device
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
CN104202444B (en) * 2014-09-26 2017-11-28 上海斐讯数据通信技术有限公司 A kind of outside access control method, gateway and dns server
CN104702623B (en) * 2015-03-27 2019-01-08 上海携程商务有限公司 IP blockage method and system
US9992255B2 (en) * 2015-07-09 2018-06-05 Acer Incorporated Apparatuses and methods for application-specific congestion control for data communication (ACDC), and storage medium thereof
CN105187439A (en) * 2015-09-25 2015-12-23 北京奇虎科技有限公司 Phishing website detection method and device
CN105808990B (en) * 2016-02-23 2019-01-18 平安科技(深圳)有限公司 Method and apparatus based on the control URL access of IOS system
CN107222507A (en) * 2017-07-13 2017-09-29 广州西麦科技股份有限公司 A kind of home-network content access control method and device
CN111030970B (en) * 2019-03-21 2023-04-18 安天科技集团股份有限公司 Distributed access control method and device and storage equipment
CN110784351A (en) * 2019-10-25 2020-02-11 上海燕汐软件信息科技有限公司 Data access control method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1705270A (en) * 2004-05-26 2005-12-07 华为技术有限公司 System and method for controlling network access
CN101163336A (en) * 2007-11-15 2008-04-16 中兴通讯股份有限公司 Method of implementing mobile phone terminal access authority authentication
CN101808114A (en) * 2010-02-09 2010-08-18 深圳市同洲电子股份有限公司 Method and system for realizing website access and front-end server
CN102340493A (en) * 2010-07-21 2012-02-01 中兴通讯股份有限公司 Access control method and gateway

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1705270A (en) * 2004-05-26 2005-12-07 华为技术有限公司 System and method for controlling network access
CN101163336A (en) * 2007-11-15 2008-04-16 中兴通讯股份有限公司 Method of implementing mobile phone terminal access authority authentication
CN101808114A (en) * 2010-02-09 2010-08-18 深圳市同洲电子股份有限公司 Method and system for realizing website access and front-end server
CN102340493A (en) * 2010-07-21 2012-02-01 中兴通讯股份有限公司 Access control method and gateway

Also Published As

Publication number Publication date
CN102724189A (en) 2012-10-10

Similar Documents

Publication Publication Date Title
CN102724189B (en) A kind of method and device controlling user URL access
US11658971B1 (en) Virtual firewalls for multi-tenant distributed services
EP3304824B1 (en) Policy-driven compliance
CN100464518C (en) Green internet-accessing system based on concentrated management and dictributed control, and method therefor
CA3099355C (en) System and method for providing customized response messages based on requested website
CN102984159B (en) Based on secure accessing logic control method and the Platform Server of terminal access behavior
US8548998B2 (en) Methods and systems for securing and protecting repositories and directories
WO2010111914A1 (en) Method, apparatus and system for network authorization management
CN104158767B (en) A kind of network admittance device and method
KR101230500B1 (en) Network resource management system and method
CN104158824A (en) Method and system of network real name authentication
CN105592052A (en) Method and device for configuring firewall rules
CN109413080B (en) Cross-domain dynamic authority control method and system
CN105490831A (en) Internet data center/Internet service provider (IDC/ISP) information security management system and information management method thereof
CN103905395A (en) WEB access control method and system based on redirection
US10192262B2 (en) System for periodically updating backings for resource requests
CN101674232A (en) Server, method and system of access control
US10013237B2 (en) Automated approval
CN105187380A (en) Secure access method and system
WO2015123990A1 (en) Page push method, device, server and system
CN201657204U (en) System for realizing network video monitoring off internet platform
CN103457934B (en) Virus defense method based on gateway device, gateway device and server
CN202309766U (en) Online service system based on activity catalog verification
CN113973006A (en) Intranet data access management method and system
US9609586B2 (en) Controlling access to a network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 310052 Binjiang District Changhe Road, Zhejiang, China, No. 466, No.

Patentee after: Xinhua three Technology Co., Ltd.

Address before: 310053 Hangzhou science and Technology Development Zone, Zhejiang high tech park, No. six and road, No. 310

Patentee before: Huasan Communication Technology Co., Ltd.