CN105871677B - Using a method and device for shared VPN service - Google Patents
Using a method and device for shared VPN service Download PDFInfo
- Publication number
- CN105871677B CN105871677B CN201610319066.6A CN201610319066A CN105871677B CN 105871677 B CN105871677 B CN 105871677B CN 201610319066 A CN201610319066 A CN 201610319066A CN 105871677 B CN105871677 B CN 105871677B
- Authority
- CN
- China
- Prior art keywords
- application
- operating system
- vpn
- vpn service
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
- H04L12/4675—Dynamic sharing of VLAN information amongst network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention provides the method and devices that VPN service is shared between a kind of application, this method comprises: the request for the creation VPN service that monitoring current application is initiated to operating system;When monitoring the request, the request is intercepted, and judges whether the VPN service of the operating system is occupied by other application;If the VPN service of the operating system is occupied by the other application, the other application is sent the request to, the VPN service of the operating system authorization is shared into the current application by the other application.The VPN service of operating system authorization can be shared to current application by other application, current application and other application are serviced using VPN simultaneously by the embodiment of the present invention when the VPN of operating system service is occupied by other application.
Description
Technical field
The present invention relates to technical field of internet application, the method and device of VPN service is shared between especially a kind of application.
Background technique
VPN (Virtual Private Network, Virtual Private Network) is connected by an interim safety of internet
It connects, is the tunnel of a safety and stability for passing through chaotic public network, it can safely encrypted transmission data by this tunnel.
The operating system (e.g., Android system etc.) of mobile terminal supports VPN network connection, thus, the APP of mobile terminal
(application) developer can combine the business of oneself with VPN, realize the function of business.For example, " flow bodyguard " creates
One VPN connection is used to monitoring traffic in network, the functions such as network management, advertisement filter may be implemented;" network access great master " creation one
A VPN connection is used to monitoring traffic in network, the functions such as traffic monitoring, traffic statistics may be implemented.
In practical applications, operating system currently can only authorize an APP to have the ability of VPN service (that is, creation VPN
Connection), for example, operating system current grant " flow bodyguard " has the ability of VPN service, so that " flow bodyguard " creates one
VPN connection, if " network access great master " also wants one VPN connection of creation, after " network access great master " initiates request, operating system meeting
Pop-up prompt is carried out, prompts current VPN occupied, " flow bodyguard " is needed to discharge VPN, VPN could be licensed to " network access by system
Great master ".
It can be seen that multiple applications on mobile terminal can not currently be provided simultaneously with VPN service in currently existing scheme
Ability is serviced using VPN, and between applications carry out VPN service switching when, operating system will do it pop-up prompt, to use
Family interferes, and affects user experience.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
That states problem shares the method and corresponding device that VPN is serviced between.
One side according to the present invention provides a kind of method that VPN service is shared between application, comprising:
The request for the creation VPN service that monitoring current application is initiated to operating system;
When monitoring the request, the request is intercepted, and judges that whether the VPN of the operating system services by other
Using occupancy;
If the VPN service of the operating system is occupied by the other application, send the request to it is described other
Using the VPN service of the operating system authorization is shared to the current application by the other application.
Optionally, described shared to the VPN service of the operating system authorization by the other application described is currently answered
With before, the method also includes:
Verify the permission whether current application has the VPN service for sharing the other application;
After through verification, sharing operation is executed.
Optionally, whether the verification current application has the permission for the VPN service for sharing the other application, packet
It includes:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list
With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list
Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
Optionally, described shared to the VPN service of the operating system authorization by the other application described is currently answered
With before, the method also includes:
It verifies the other application and whether has and the VPN service of the operating system authorization is shared into the current application
Permission;
After through verification, sharing operation is executed.
Optionally, whether the verification other application, which has, shares to the VPN service of the operating system authorization
The permission of the current application, comprising:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list
With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization
Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
Optionally, described shared to the VPN service of the operating system authorization by the other application described is currently answered
With, comprising:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application
The current application.
Optionally, described by way of across application communication, by the other application by the VPN of the operating system authorization
Service shares to the current application, comprising:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation
The VPN service of system authorization shares to the corresponding function of the Function Identification.
Optionally, the Function Identification include the corresponding function register of the Function Identification in the operating system when
Between go here and there.
Optionally, described to be by the operation by the other application when the quantity of the current application includes multiple
The VPN service of system authorization shares to the current application, comprising:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization
VPN service shares to the current application.
Optionally, the method also includes:
If the VPN service of the operating system is not occupied by the other application, the behaviour is sent the request to
Make system, the current application as described in the operating system authorization has the permission of creation VPN service, creates for the current application
VPN service.
Optionally, by the other application by the VPN service of the operating system authorization share to the current application it
Afterwards, the method also includes:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create
When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application
With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour
Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority
Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and
Application in the current application in addition to the maximum application of the priority.
Another aspect according to the present invention additionally provides the device that VPN service is shared between a kind of application, comprising:
Monitoring module, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module suitable for when monitoring the request, intercepting the request, and judges the VPN of the operating system
Whether service is occupied by other application;
Sharing module is accounted for if judging that the VPN of the operating system is serviced suitable for the judgment module by the other application
With, then the other application is sent the request to, it is by the other application that the VPN service of the operating system authorization is total
It enjoys to the current application.
Optionally, described device further include:
First correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization
Before service shares to the current application, verify whether the current application has the VPN service for sharing the other application
Permission;After through verification, sharing operation is executed.
Optionally, first correction verification module is further adapted for:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list
With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list
Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
Optionally, described device further include:
Second correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization
Before service shares to the current application, verify whether the other application has the VPN clothes of the operating system authorization
Business shares to the permission of the current application;After through verification, sharing operation is executed.
Optionally, second correction verification module is further adapted for:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list
With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization
Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
Optionally, the sharing module is further adapted for:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application
The current application.
Optionally, the sharing module is further adapted for:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation
The VPN service of system authorization shares to the corresponding function of the Function Identification.
Optionally, the Function Identification include the corresponding function register of the Function Identification in the operating system when
Between go here and there.
Optionally, when the quantity of the current application includes multiple, the sharing module is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization
VPN service shares to the current application.
Optionally, described device further include:
Creation module, if judging that the VPN of the operating system is serviced not by the other application suitable for the judgment module
It occupies, then sends the request to the operating system, the current application as described in the operating system authorization has creation VPN
The permission of service creates VPN service for the current application.
Optionally, the sharing module is further adapted for:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create
When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application
With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour
Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority
Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and
Application in the current application in addition to the maximum application of the priority.
In embodiments of the present invention, creation current application (application installed in operating system) initiated to operating system
VPN service request be monitored, when monitoring the request, intercept the request, and judge operating system VPN service whether
It is occupied by other application, if the VPN service of operating system is occupied by other application, sends the request to other application, by
The VPN service of operating system authorization is shared to current application by other application.It can be seen that the VPN when operating system services quilt
When other application occupies, the VPN service of operating system authorization can be shared to by other application and currently be answered by the embodiment of the present invention
With enabling current application and other application to service simultaneously using VPN.Also, the embodiment of the present invention is to from current application
Request carried out intercept operation, send the request to other application, serviced the VPN of operating system authorization by other application
Current application is shared to, operating system not will do it pop-up prompt, avoid interfering to user, affect user experience.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
According to the following detailed description of specific embodiments of the present invention in conjunction with the accompanying drawings, those skilled in the art will be brighter
The above and other objects, advantages and features of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart that the method for VPN service is shared between application according to an embodiment of the invention;
Fig. 2 shows the flow charts for the method that VPN service is shared between application according to another embodiment of the present invention;
Fig. 3 shows the structural schematic diagram that the device of VPN service is shared between application according to an embodiment of the invention;With
And
Fig. 4 shows the structural schematic diagram that the device of VPN service is shared between application in accordance with another embodiment of the present invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
In order to solve the above technical problems, the embodiment of the invention provides a kind of method for sharing VPN service between application, the party
Method can be applied on mobile terminal (e.g., the terminal devices such as smart phone, tablet computer, smartwatch, intelligent glasses).Fig. 1
Show the flow chart that the method for VPN service is shared between application according to an embodiment of the invention.As shown in Figure 1, this method is extremely
S102 be may comprise steps of less to step S106.
Step S102, the request for the creation VPN service that monitoring current application is initiated to operating system.
In this step, the operating system (e.g., Android system etc.) of mobile terminal supports VPN network connection, thus, it is mobile
The application developer of terminal can combine the business of oneself with VPN, realize the function of business, such as traffic monitoring, flow
The functions such as statistics, network management, advertisement filter.Application developer, will be relevant to VPN network connection when carrying out application and development
Program code is written in SDK (Software Development Kit, Software Development Kit), when user is on application interface
When the operation of triggering creation VPN service, the request that the creation VPN initiated to operating system is serviced is generated.
In practical applications, local VPN service can be created on mobile terminals, and the operating system of mobile terminal is in order to just
It is serviced in using VPN, has opened multiple system interfaces (API), in the case where obtaining user's confirmation, VPN service can be obtained
The permission of control and management other application.Specifically, the API provided by call operation system can take the VPN of mobile terminal
Business is opened, and when the other application of mobile terminal will access network, passes through local VPN using the network connecting request initiated
The processing of service, enables mobile terminal efficiently and safely to access Internet resources.
By taking flow bodyguard application as an example, traffic monitoring (flow generated such as monitoring background application) may be implemented in the application
Network connecting request is redirected to local service process firstly, flow bodyguard obtains network connecting request by business, local to take
Business process is to be serviced to provide by local VPN.Then, in local service process, judge the application for initiating network connecting request
It whether is application in running background.If judge initiate network connecting request application for running background in application, if
Prompt information is issued the user with, to prompt user's selection to forbid using the network connection behavior for generating background traffic.In this way, can be with
Prevent what some users were of little use generating unnecessary flow from the background in the application program of running background or some Malwares,
So as to preferably save flow for user.
Step S104 intercepts the request when monitoring the request, and judges that whether the VPN of operating system services by it
He occupies in application.
Step S106 sends the request to other application if the VPN service of operating system is occupied by other application,
The VPN service of operating system authorization is shared into current application by other application.
In embodiments of the present invention, creation current application (application installed in operating system) initiated to operating system
VPN service request be monitored, when monitoring the request, intercept the request, and judge operating system VPN service whether
It is occupied by other application, if the VPN service of operating system is occupied by other application, sends the request to other application, by
The VPN service of operating system authorization is shared to current application by other application.It can be seen that the VPN when operating system services quilt
When other application occupies, the VPN service of operating system authorization can be shared to by other application and currently be answered by the embodiment of the present invention
With enabling current application and other application to service simultaneously using VPN.Also, the embodiment of the present invention is to from current application
Request carried out intercept operation, send the request to other application, serviced the VPN of operating system authorization by other application
Current application is shared to, operating system not will do it pop-up prompt, avoid interfering to user, affect user experience.
In alternative embodiment of the invention, if above step S104 judges that the VPN of operating system is serviced not by other
Using occupancy, then operating system is sent the request to, has the power of creation VPN service by operating system authorization current application
Limit creates VPN service for current application.
In alternative embodiment of the invention, in order to improve the safety of shared VPN service, in above step S106 by it
Before the VPN service of operating system authorization is shared to current application by his application, need to carry out current application or other application
Verification, will describe in detail respectively below.
Situation one needs to verify current application, that is, whether verification current application has shared other application
The permission of VPN service executes sharing operation after through verification.Here, the embodiment of the invention provides a kind of optional sides
Case can calculate the characteristic information of current application in this scenario, and then according to the characteristic information of current application, answer first
With searching whether that there are current applications in authentication list, wherein store one or more in the first application authorization list and have
The permission of the VPN service of shared other application using corresponding characteristic information.If being looked into the first application authorization list
Find current application, it is determined that pass through verification;Conversely, if not finding current application in the first application authorization list, really
It is fixed unverified.The characteristic information that the embodiment of the present invention refers to can be the information such as the packet name of application, signature.
Situation two needs to verify other application, that is, whether verification other application has operating system authorization
VPN service shares to the permission of current application, after through verification, executes sharing operation.Here, the embodiment of the invention provides
A kind of optional scheme can calculate the characteristic information of other application, and then believe according to the feature of other application in this scenario
Breath, searches whether that there are other applications in the second application authorization list, wherein store one in the second application authorization list
Or it is multiple have the permission that the VPN service of operating system authorization shares to current application is believed using corresponding feature
Breath.If finding other application in the second application authorization list, it is determined that pass through verification.Conversely, if in the second application authorization
Other application is not found in list, it is determined that unverified.The characteristic information that the embodiment of the present invention refers to can be application
Packet name, the information such as signature.
In alternative embodiment of the invention, two-way verification can also be carried out using in conjunction with above situation one and situation two,
Current application and other application are verified, to further increase the safety of shared VPN service.
In alternative embodiment of the invention, above step S106 is serviced the VPN of operating system authorization by other application
Current application is shared to, the communication being related between two or more applications, that is, the side across application communication can be passed through
The VPN service of operating system authorization is shared to current application by other application by formula.In actual operation, it is available other
Using with the respective packet name of current application, and then according to packet name carry out across application communicate.
In across application communication, the communication being related between different processes, in Android system, Binder is between a kind of process
Communication mechanism, it is that one kind is similar to COM and CORBA distributed component framework, more popular, is to provide remote process tune in fact
With (RPC) function.From the literal upper meaning of English, Binder has the meaning of binder, in the Binder mechanism of Android system
In, it is made of a system component, is Client, Server, Service Manager and Binder driver respectively, wherein
Client, Server and Service Manager operate in user's space, and Binder driver runs kernel spacing.
Binder is exactly a kind of binder that this four components are bonded together, wherein core component is Binder driving journey
Sequence, Service Manager provide the function of Added Management, Client and Server exactly in Binder driving and
In the infrastructure that Service Manager is provided, the communication between Client-Server is carried out.Service Manager and
Binder driving is realized in Android platform, as long as developer realizes Client the and Server group of oneself according to specification
Part can.
In alternative embodiment of the invention, current application needs to realize multiple functions, for example, " network access great master " needs reality
The functions such as existing traffic monitoring, traffic statistics, the embodiment of the present invention can be bound according to each function of application (e.g., binds
The Function Identification etc. of function), the VPN service for realizing fine granularity is shared.That is, operation is by step S106 by other application
When the VPN service of system authorization shares to current application, it can determine and the VPN of sharing operation system authorization is needed to take in current application
The Function Identification of the function of business, and then according to determining Function Identification, by way of across application communication, it will be grasped by other application
The VPN service for making system authorization shares to the corresponding function of Function Identification.Further, in order to distinguish the different function of different application
Can, which may include time string of the corresponding function register of Function Identification in operating system, with assurance function mark
The uniqueness of knowledge.
In alternative embodiment of the invention, if the quantity of current application includes multiple, that is to say, that there are multiple current
Using the request for the creation VPN service initiated to operating system, the request is intercepted, and judges the VPN service quilt of operating system
Other application occupies, then sends the request to other application, shared to the VPN service of operating system authorization by other application
Current application.
Further, when the VPN service of operating system authorization is shared to current application by other application, the present invention is real
It applies example and provides a kind of optional scheme, in this scenario, can determine the priority of multiple current applications, according to multiple current
The VPN service of operating system authorization is shared to current application by other application by the priority orders of application.Here, application
Priority can be found from the first application authorization list, when application is authenticated, be assigned with priority simultaneously for the application
It is documented in the first application authorization list.For example, being each when being authenticated to the application such as " network access great master ", " traffic management "
Using distribution priority and it is documented in the first application authorization list.When " network access great master " and " traffic management " is used as current application
When the request that the creation VPN initiated simultaneously to operating system is serviced, the request is intercepted, and judges the VPN service of operating system
It is occupied by other application, then sends the request to other application, obtain the priority of " network access great master " and " traffic management ", root
According to priority orders, the VPN service of operating system authorization is shared into " network access great master " and " traffic management " by other application.
In alternative embodiment of the invention, the VPN service of operating system authorization is shared to by other application and is currently answered
With later, when the VPN service fault of other application disconnects, and other application and current application prepare to create VPN when servicing, root
According to default construction strategy, the maximum application of priority is chosen from other application and current application.Then, priority is maximum
The request of the creation VPN service of application is sent to operating system, has creation by the maximum application of operating system authorization priority
The permission of VPN service is that the maximum application of priority creates VPN service.Later, by the maximum application of priority by operating system
The VPN service of authorization shares to the application in other application and current application in addition to the maximum application of priority.It can be seen that
When the VPN service fault of other application disconnects, and other application and current application prepare to create VPN service, by priority
The request of the creation VPN service of maximum application is sent to operating system, not will lead to operating system and carries out multiple pop-up prompts,
It avoids interfering to user, while other application and current application being enabled to be provided simultaneously with the ability of VPN service, use
VPN service.Here, default construction strategy can be configured according to user demand, for example, setting obtains operating system VPN clothes
The highest priority of the application of business authorization, alternatively, priority of the application for the request that the last one initiates creation VPN service is arranged
Highest, etc., the invention is not limited in this regard.
The realization that the method for VPN service is shared between application of the invention will be discussed in detail by a specific embodiment below
Journey, Fig. 2 shows the flow charts for the method that VPN service is shared between application according to another embodiment of the present invention.As shown in Fig. 2,
This method at least may comprise steps of S202 to step S210.
Step S202, the request for the creation VPN service that monitoring current application is initiated to operating system.
In this step, for example, traffic monitoring (flow generated such as monitoring background application) industry may be implemented in current application
Network connecting request is redirected to local service process, local service firstly, current application obtains network connecting request by business
Process is to be serviced to provide by local VPN.Then, in local service process, after the network connecting request initiated,
Determine whether network connection type is with any one in lower network: 2G network, 3G network and 4G network;If it is determined that network connects
Connect type be 2G network, 3G network and 4G network in any one, then judge initiate network connecting request application whether be
In the application of running background.
Further, judge whether the application for initiating network connecting request belongs to the application recorded in background traffic white list,
Background traffic white list record is the application for allowing to generate background traffic.Then, prompt information is issued for prompting user to select
Select the network connection behavior for forbidding the application (that is, the application for initiating network connecting request) to generate background traffic.If user selects
Allow the application to generate the network connection behavior of background traffic, allows to issue network connecting request to network side, count the application
The background traffic of generation.
Specifically, it counts how many flow generated daily from the background for the application, and uploads on vpn server, vpn server
The data on flows uploaded to all users is analyzed, and the application for calculating each user is averaged what running background generated daily
Flow value is how many, which is returned to current application as preset flow threshold value.If what the application generated daily
Background traffic is more than preset flow threshold value, issues prompt information and is used to prompt the background traffic of user's application exception occur, from
And user can choose the net for forbidding the application to generate background traffic after abnormal prompt information occurs in platform flow upon receipt
Network connects behavior.
In this step, it when triggering the operation of creation VPN service on application interface as user, generates and is sent out to operating system
The request of the creation VPN service risen.
Step S204 monitors the request for the creation VPN service that " network access great master " initiates to operating system, intercepts this and ask
It asks.
Step S206, judges whether the VPN service of operating system is occupied by other application, if so, continuing to execute step
S208;If it is not, then continuing to execute step S210.
The VPN service of step S208, operating system are occupied by " flow bodyguard ", send the request to " flow bodyguard ",
The VPN service of operating system authorization is shared into " network access great master " by " flow bodyguard ".
In this step, " flow bodyguard " application has obtained the authorization of operating system, creates VPN connection, has VPN clothes
The ability of business.
Further, in order to improve the safety of shared VPN service, by " flow bodyguard " by operating system authorization
Before VPN service shares to " network access great master ", need to carry out two-way verification to " flow bodyguard " and " network access great master ", that is, verification
" network access great master " whether have shared " flow bodyguard " VPN service permission, meanwhile, verification " flow bodyguard " whether have by
The VPN service of operating system authorization shares to the permission of " network access great master ", after through verification, executes sharing operation, specifically may be used
With referring to the introduction of previous cases one and situation two, details are not described herein again.
Furthermore, it is possible to which the VPN of operating system authorization is serviced by " flow bodyguard " and is shared by way of across application communication
To " network access great master ".Here it is possible to communicate across application according to packet name, can also be carried out according to Function Identification logical across application
It interrogates, may include time string of the corresponding function register of Function Identification in operating system in Function Identification, with assurance function mark
The uniqueness of knowledge realizes the purpose for distinguishing the different function of different application.
Step S210, sends the request to operating system, has creation VPN clothes by operating system authorization " network access great master "
The permission of business creates VPN service for " network access great master ".
The embodiment of the present invention realizes " flow bodyguard " and " network access great master " while using the purpose of VPN service, also, this
Inventive embodiments have carried out intercept operation to the request from " network access great master ", send the request to " flow bodyguard ", by " stream
Amount bodyguard " shares to the VPN service of operating system authorization " network access great master ", and operating system not will do it pop-up prompt, avoids
It interferes, affects user experience to user.
It should be noted that in practical applications, above-mentioned all optional embodiments can be any by the way of combining
Combination, forms alternative embodiment of the invention, this is no longer going to repeat them.
Based on the method for sharing VPN service between the application that each embodiment provides above, based on the same inventive concept, this hair
Bright embodiment additionally provides the device that VPN service is shared between a kind of application.
Fig. 3 shows the structural schematic diagram that the device of VPN service is shared between application according to an embodiment of the invention.Such as
Shown in Fig. 3, which at least may include monitoring module 310, judgment module 320 and sharing module 330.
Now introduce each composition of device that VPN service is shared between the application of the embodiment of the present invention or the function of device and each
Connection relationship between part:
Monitoring module 310, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module 320 is coupled with monitoring module 310, suitable for when monitoring request, intercept requests, and judge to grasp
Whether the VPN service for making system is occupied by other application;
Sharing module 330 is coupled with judgment module 320, if judging the VPN clothes of operating system suitable for judgment module 320
Business is occupied by other application, then sends the requests to other application, is serviced the VPN of operating system authorization by other application and is shared
To current application.
In alternative embodiment of the invention, as shown in figure 4, the device that Fig. 3 is shown can also include:
First correction verification module 340, is coupled with sharing module 330, is suitable for be operated in sharing module 330 by other application
Before the VPN service of system authorization shares to current application, whether verification current application has the VPN service of shared other application
Permission;After through verification, sharing operation is executed.
In alternative embodiment of the invention, the first correction verification module 340 is further adapted for:
Calculate the characteristic information of current application;
According to the characteristic information of current application, search whether that there are current applications in the first application authorization list, wherein
The application that the permission of one or more VPN services for having shared other application is stored in first application authorization list is right with it
The characteristic information answered;
If finding current application in the first application authorization list, it is determined that pass through verification.
In alternative embodiment of the invention, as shown in figure 4, the device that Fig. 3 is shown can also include:
Second correction verification module 350, is coupled with sharing module 330, is suitable for be operated in sharing module 330 by other application
Before the VPN service of system authorization shares to current application, whether verification other application, which has, takes the VPN of operating system authorization
Business shares to the permission of current application;After through verification, sharing operation is executed.
In alternative embodiment of the invention, the second correction verification module 350 is further adapted for:
Calculate the characteristic information of other application;
According to the characteristic information of other application, search whether that there are other applications in the second application authorization list, wherein
Stored in second application authorization list it is one or more have the VPN service of operating system authorization is shared into current application
Permission using corresponding characteristic information;
If finding other application in the second application authorization list, it is determined that pass through verification.
In alternative embodiment of the invention, sharing module 330 is further adapted for:
By way of across application communication, the VPN service of operating system authorization is shared into current application by other application.
In alternative embodiment of the invention, sharing module 330 is further adapted for:
Determine the Function Identification for the function of needing the VPN of sharing operation system authorization to service in current application;
According to determining Function Identification, by way of across application communication, by other application by the VPN of operating system authorization
Service shares to the corresponding function of Function Identification.
In alternative embodiment of the invention, Function Identification includes the corresponding function register of Function Identification in operating system
Time string.
In alternative embodiment of the invention, when the quantity of current application includes multiple, sharing module 330 is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, the VPN service of operating system authorization is shared to by other application
Current application.
In alternative embodiment of the invention, as shown in figure 4, the device that Fig. 3 is shown can also include:
Creation module 360 is coupled with judgment module 320, if judging the VPN clothes of operating system suitable for judgment module 320
Business is not occupied by other application, then sends the requests to operating system, has creation VPN clothes by operating system authorization current application
The permission of business creates VPN service for current application.
In alternative embodiment of the invention, sharing module 330 is further adapted for:
When the VPN service fault of other application disconnects, and other application and current application prepare to create VPN service,
According to default construction strategy, the maximum application of priority is chosen from other application and current application;
The creation VPN of the maximum application of the priority request serviced is sent to operating system, it is excellent by operating system authorization
The first maximum application of grade has the permission of creation VPN service, is that the maximum application of priority creates VPN service;
The VPN service of operating system authorization is shared in other application and current application by priority maximum application and is removed
Application except the maximum application of priority.
According to the combination of any one above-mentioned preferred embodiment or multiple preferred embodiments, the embodiment of the present invention can reach
It is following the utility model has the advantages that
In embodiments of the present invention, creation current application (application installed in operating system) initiated to operating system
VPN service request be monitored, when monitoring the request, intercept the request, and judge operating system VPN service whether
It is occupied by other application, if the VPN service of operating system is occupied by other application, sends the request to other application, by
The VPN service of operating system authorization is shared to current application by other application.It can be seen that the VPN when operating system services quilt
When other application occupies, the VPN service of operating system authorization can be shared to by other application and currently be answered by the embodiment of the present invention
With enabling current application and other application to service simultaneously using VPN.Also, the embodiment of the present invention is to from current application
Request carried out intercept operation, send the request to other application, serviced the VPN of operating system authorization by other application
Current application is shared to, operating system not will do it pop-up prompt, avoid interfering to user, affect user experience.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any
Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) share the dress of VPN service between application according to an embodiment of the present invention to realize
The some or all functions of some or all components in setting.The present invention is also implemented as described here for executing
Method some or all device or device programs (for example, computer program and computer program product).This
The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other
Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
So far, although those skilled in the art will appreciate that present invention has been shown and described in detail herein multiple shows
Example property embodiment still without departing from the spirit and scope of the present invention, still can according to the present disclosure directly
Determine or deduce out many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is understood that and recognizes
It is set to and covers all such other variations or modifications.
The embodiment of the invention also provides a kind of methods that VPN service is shared between A1, application, comprising:
The request for the creation VPN service that monitoring current application is initiated to operating system;
When monitoring the request, the request is intercepted, and judges that whether the VPN of the operating system services by other
Using occupancy;
If the VPN service of the operating system is occupied by the other application, send the request to it is described other
Using the VPN service of the operating system authorization is shared to the current application by the other application.
A2, method according to a1, wherein described to be taken the VPN of the operating system authorization by the other application
Before business shares to the current application, the method also includes:
Verify the permission whether current application has the VPN service for sharing the other application;
After through verification, sharing operation is executed.
A3, the method according to A2, wherein whether the verification current application, which has, is shared the other application
VPN service permission, comprising:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list
With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list
Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
A4, the method according to any one of A1-A3, wherein it is described by the other application by the operating system
Before the VPN service of authorization shares to the current application, the method also includes:
It verifies the other application and whether has and the VPN service of the operating system authorization is shared into the current application
Permission;
After through verification, sharing operation is executed.
A5, method according to a4, wherein whether the verification other application, which has, is awarded the operating system
The VPN service of power shares to the permission of the current application, comprising:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list
With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization
Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
A6, the method according to any one of A1-A5, wherein it is described by the other application by the operating system
The VPN service of authorization shares to the current application, comprising:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application
The current application.
A7, the method according to A6, wherein it is described by way of across application communication, by the other application by institute
The VPN service for stating operating system authorization shares to the current application, comprising:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation
The VPN service of system authorization shares to the corresponding function of the Function Identification.
A8, the method according to A7, wherein the Function Identification includes that the corresponding function register of the Function Identification exists
Time string when the operating system.
A9, the method according to any one of A1-A8, wherein when the quantity of the current application includes multiple, institute
It states and the VPN service of the operating system authorization is shared into the current application by the other application, comprising:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization
VPN service shares to the current application.
A10, method according to a1, wherein further include:
If the VPN service of the operating system is not occupied by the other application, the behaviour is sent the request to
Make system, the current application as described in the operating system authorization has the permission of creation VPN service, creates for the current application
VPN service.
A11, the method according to any one of A1-A10, wherein awarded the operating system by the other application
After the VPN service of power shares to the current application, the method also includes:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create
When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application
With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour
Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority
Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and
Application in the current application in addition to the maximum application of the priority.
The embodiment of the invention also provides the devices that VPN service is shared between B12, a kind of application, comprising:
Monitoring module, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module suitable for when monitoring the request, intercepting the request, and judges the VPN of the operating system
Whether service is occupied by other application;
Sharing module is accounted for if judging that the VPN of the operating system is serviced suitable for the judgment module by the other application
With, then the other application is sent the request to, it is by the other application that the VPN service of the operating system authorization is total
It enjoys to the current application.
B13, device according to b12, wherein further include:
First correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization
Before service shares to the current application, verify whether the current application has the VPN service for sharing the other application
Permission;After through verification, sharing operation is executed.
B14, device according to b13, wherein first correction verification module is further adapted for:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list
With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list
Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
B15, the device according to any one of B12-B14, wherein further include:
Second correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization
Before service shares to the current application, verify whether the other application has the VPN clothes of the operating system authorization
Business shares to the permission of the current application;After through verification, sharing operation is executed.
B16, the device according to B15, wherein second correction verification module is further adapted for:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list
With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization
Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
B17, the device according to any one of B12-B16, wherein the sharing module is further adapted for:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application
The current application.
B18, the device according to B17, wherein the sharing module is further adapted for:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation
The VPN service of system authorization shares to the corresponding function of the Function Identification.
B19, the device according to B18, wherein the Function Identification includes the corresponding function register of the Function Identification
Time string in the operating system.
B20, the device according to any one of B12-B19, wherein when the quantity of the current application includes multiple
When, the sharing module is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization
VPN service shares to the current application.
B21, device according to b12, wherein further include:
Creation module, if judging that the VPN of the operating system is serviced not by the other application suitable for the judgment module
It occupies, then sends the request to the operating system, the current application as described in the operating system authorization has creation VPN
The permission of service creates VPN service for the current application.
B22, the device according to any one of B12-B21, wherein the sharing module is further adapted for:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create
When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application
With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour
Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority
Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and
Application in the current application in addition to the maximum application of the priority.
Claims (22)
1. sharing the method for VPN service between a kind of application, comprising:
The request for the creation VPN service that monitoring current application is initiated to operating system;
When monitoring the request, the request is intercepted, and judges that whether the VPN of the operating system services by other application
It occupies;
If the VPN service of the operating system is occupied by the other application, the other application is sent the request to,
The VPN service of the operating system authorization is shared into the current application by the other application.
2. according to the method described in claim 1, wherein, it is described by the other application by the VPN of the operating system authorization
Before service shares to the current application, the method also includes:
Verify the permission whether current application has the VPN service for sharing the other application;
After through verification, sharing operation is executed.
3. according to the method described in claim 2, wherein, whether the verification current application, which has shared described other, is answered
The permission of VPN service, comprising:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, searched whether in the first application authorization list there are the current application,
Wherein, the power of one or more VPN services for having and sharing the other application is stored in the first application authorization list
Limit using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
4. method according to any one of claim 1-3, wherein it is described by the other application by the operating system
Before the VPN service of authorization shares to the current application, the method also includes:
Verify whether the other application has the power that the VPN service of the operating system authorization is shared to the current application
Limit;
After through verification, sharing operation is executed.
5. according to the method described in claim 4, wherein, whether the verification other application has the operating system
The VPN service of authorization shares to the permission of the current application, comprising:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, searched whether in the second application authorization list there are the other application,
Wherein, one or more is stored in the second application authorization list to have the VPN service of the operating system authorization altogether
It enjoys to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
6. method according to any one of claim 1-3, wherein it is described by the other application by the operating system
The VPN service of authorization shares to the current application, comprising:
By way of across application communication, the VPN service of the operating system authorization shared to by the other application described in
Current application.
7. it is described by way of across application communication according to the method described in claim 6, wherein, it will by the other application
The VPN service of the operating system authorization shares to the current application, comprising:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operating system
The VPN service of authorization shares to the corresponding function of the Function Identification.
8. according to the method described in claim 7, wherein, the Function Identification includes the corresponding function register of the Function Identification
Time string in the operating system.
9. method according to any one of claim 1-3, wherein when the quantity of the current application includes multiple,
It is described that the VPN service of the operating system authorization is shared into the current application by the other application, comprising:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, the VPN of the operating system authorization is taken by the other application
Business shares to the current application.
10. according to the method described in claim 1, wherein, further includes:
If the VPN service of the operating system is not occupied by the other application, the operation system is sent the request to
System, the current application as described in the operating system authorization have the permission of creation VPN service, create VPN for the current application
Service.
11. method according to any one of claim 1-3, wherein awarded the operating system by the other application
After the VPN service of power shares to the current application, the method also includes:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create VPN
When service, according to default construction strategy, the maximum application of priority is chosen from the other application and the current application;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, is by the operation
System authorizes the maximum application of priority to have the permission of creation VPN service, is that the maximum application of the priority creates VPN
Service;
The VPN service of the operating system authorization is shared into the other application and described by the priority maximum application
Application in current application in addition to the maximum application of the priority.
12. sharing the device of VPN service between a kind of application, comprising:
Monitoring module, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module suitable for when monitoring the request, intercepting the request, and judges the VPN service of the operating system
Whether occupied by other application;
Sharing module is occupied if judging that the VPN of the operating system is serviced suitable for the judgment module by the other application,
The other application is sent the request to, is shared to the VPN service of the operating system authorization by the other application
The current application.
13. device according to claim 12, wherein further include:
First correction verification module, suitable for being serviced the VPN of the operating system authorization by the other application in the sharing module
Before sharing to the current application, the power whether current application has the VPN service for sharing the other application is verified
Limit;After through verification, sharing operation is executed.
14. device according to claim 13, wherein first correction verification module is further adapted for:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, searched whether in the first application authorization list there are the current application,
Wherein, the power of one or more VPN services for having and sharing the other application is stored in the first application authorization list
Limit using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
15. device described in any one of 2-14 according to claim 1, wherein further include:
Second correction verification module, suitable for being serviced the VPN of the operating system authorization by the other application in the sharing module
Before sharing to the current application, verify whether the other application has the VPN service of the operating system authorization altogether
It enjoys to the permission of the current application;After through verification, sharing operation is executed.
16. device according to claim 15, wherein second correction verification module is further adapted for:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, searched whether in the second application authorization list there are the other application,
Wherein, one or more is stored in the second application authorization list to have the VPN service of the operating system authorization altogether
It enjoys to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
17. device described in any one of 2-14 according to claim 1, wherein the sharing module is further adapted for:
By way of across application communication, the VPN service of the operating system authorization shared to by the other application described in
Current application.
18. device according to claim 17, wherein the sharing module is further adapted for:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operating system
The VPN service of authorization shares to the corresponding function of the Function Identification.
19. device according to claim 18, wherein the Function Identification includes the corresponding function note of the Function Identification
Time string of the volume in the operating system.
20. device described in any one of 2-14 according to claim 1, wherein when the quantity of the current application includes multiple
When, the sharing module is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, the VPN of the operating system authorization is taken by the other application
Business shares to the current application.
21. device according to claim 12, wherein further include:
Creation module, if judging that the VPN service of the operating system is not occupied by the other application suitable for the judgment module,
The operating system is then sent the request to, the current application as described in the operating system authorization has creation VPN service
Permission, for the current application create VPN service.
22. device described in any one of 2-14 according to claim 1, wherein the sharing module is further adapted for:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create VPN
When service, according to default construction strategy, the maximum application of priority is chosen from the other application and the current application;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, is by the operation
System authorizes the maximum application of priority to have the permission of creation VPN service, is that the maximum application of the priority creates VPN
Service;
The VPN service of the operating system authorization is shared into the other application and described by the priority maximum application
Application in current application in addition to the maximum application of the priority.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610319066.6A CN105871677B (en) | 2016-05-12 | 2016-05-12 | Using a method and device for shared VPN service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610319066.6A CN105871677B (en) | 2016-05-12 | 2016-05-12 | Using a method and device for shared VPN service |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105871677A CN105871677A (en) | 2016-08-17 |
CN105871677B true CN105871677B (en) | 2019-05-07 |
Family
ID=56632121
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610319066.6A Active CN105871677B (en) | 2016-05-12 | 2016-05-12 | Using a method and device for shared VPN service |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871677B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108322366B (en) * | 2017-01-17 | 2021-10-01 | 阿里巴巴集团控股有限公司 | Method, device and system for accessing network |
CN110825537B (en) * | 2019-11-04 | 2023-03-14 | 联思智云(北京)科技有限公司 | Method, device and equipment for calling remote application based on C/S architecture |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904867A (en) * | 2012-05-12 | 2013-01-30 | 杭州迪普科技有限公司 | VPN (virtual private network) authority control method and device |
WO2015023887A1 (en) * | 2013-08-15 | 2015-02-19 | Mocana Corporation | Gateway device for terminating a large volume of vpn connections |
CN104468269A (en) * | 2014-12-01 | 2015-03-25 | 郭丹 | Directional traffic monitoring method based on Android terminal device |
CN104869043A (en) * | 2015-06-04 | 2015-08-26 | 魅族科技(中国)有限公司 | Method for establishing VPN (Virtual Private Network) connection and terminal |
CN105094522A (en) * | 2015-06-12 | 2015-11-25 | 北京奇虎科技有限公司 | Application event reminding method and apparatus |
CN105471872A (en) * | 2015-11-26 | 2016-04-06 | 国家电网公司 | Reinforcement method of application software of intelligent mobile terminal |
-
2016
- 2016-05-12 CN CN201610319066.6A patent/CN105871677B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904867A (en) * | 2012-05-12 | 2013-01-30 | 杭州迪普科技有限公司 | VPN (virtual private network) authority control method and device |
WO2015023887A1 (en) * | 2013-08-15 | 2015-02-19 | Mocana Corporation | Gateway device for terminating a large volume of vpn connections |
CN104468269A (en) * | 2014-12-01 | 2015-03-25 | 郭丹 | Directional traffic monitoring method based on Android terminal device |
CN104869043A (en) * | 2015-06-04 | 2015-08-26 | 魅族科技(中国)有限公司 | Method for establishing VPN (Virtual Private Network) connection and terminal |
CN105094522A (en) * | 2015-06-12 | 2015-11-25 | 北京奇虎科技有限公司 | Application event reminding method and apparatus |
CN105471872A (en) * | 2015-11-26 | 2016-04-06 | 国家电网公司 | Reinforcement method of application software of intelligent mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105871677A (en) | 2016-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108418795B (en) | Data access method, device, system and the computer-readable medium of transregional piece of chain | |
CN103309653B (en) | The method and system of application execution is driven for cloud | |
EP2689324B1 (en) | Strong rights management for computing application functionality | |
CN109981619A (en) | Data capture method, device, medium and electronic equipment | |
CN103038724B (en) | Communication control console with component aggregates | |
WO2019082030A1 (en) | Access control in microservice architectures | |
CN103246533B (en) | A kind of method for adding plug-in unit in address list, device and equipment | |
US8811944B2 (en) | Authentication request management | |
CN102387023A (en) | Charging method and system used for cloud computing | |
CN110189013A (en) | A kind of determination method, apparatus, equipment and the medium of operation flow | |
KR20160077131A (en) | Data processing method based on instant messaging or social applications, and device thereof | |
CN106331003B (en) | The access method and device of application door system on a kind of cloud desktop | |
CN108846263B (en) | Software authorization processing and running method and device and electronic equipment | |
JP2014534515A5 (en) | ||
CN103577180B (en) | Data processing method and device | |
CN105871677B (en) | Using a method and device for shared VPN service | |
CN103873439B (en) | The method and electronic equipment of a kind of networking | |
CN110247857A (en) | Current-limiting method and device | |
CN104506368B (en) | A kind of method and apparatus for being managed collectively switch device | |
CN103607374A (en) | Network-resource-access control method based on identity authentication and data-packet filtering technology | |
CN110881039A (en) | Cloud security management system | |
CN110472391A (en) | Data access method and device, storage medium, electronic device | |
CN110213250A (en) | Data processing method and terminal device | |
CN110134480A (en) | Processing method, device, electronic equipment and the storage medium of user's trigger action | |
CN108696864A (en) | Virtual-number is asked and sending method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220718 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |