CN107294903A - A kind of network address access method and device - Google Patents
A kind of network address access method and device Download PDFInfo
- Publication number
- CN107294903A CN107294903A CN201610192938.7A CN201610192938A CN107294903A CN 107294903 A CN107294903 A CN 107294903A CN 201610192938 A CN201610192938 A CN 201610192938A CN 107294903 A CN107294903 A CN 107294903A
- Authority
- CN
- China
- Prior art keywords
- network addresses
- destination network
- browser
- access
- function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of network address access method and device.Methods described includes:When receiving access request, destination network addresses to be visited are obtained;Judge destination network addresses whether with allowing access rule to match;When destination network addresses are with allowing access rule to match, access request is responded, to jump to destination network addresses;When destination network addresses are with allowing access rule to mismatch, denied access request, to jump to the default network address.Pass through technical scheme, when receiving network address access request, automatically destination network addresses to be visited are obtained, and judge the destination network addresses whether with allowing access rule to match, with ensure only destination network addresses with allow access rule match the i.e. destination network addresses be allow access network address when, the access request is just responded, effective monitoring is carried out to the network address access request from user so as to realize.
Description
Technical field
The present invention relates to Internet technical field, more particularly to a kind of network address access method and device.
Background technology
At present, internet comes into huge numbers of families, and in correlation technique, user accesses certain network address in request
When, except the network address is sealed off so that user can not be accessed outside the network address, local terminal kimonos in the case of other
Business device is substantially all permission user and accesses the network address, network address can't be accessed and limited, but in fact,
Some network address of restricting user access are sometimes needed, child is such as limited and accesses some game network address, but it is existing
Again without special independent " network log-in management " equipment in technology, and carry " online management equipment "
Router price it is also quite high, thus, very big puzzlement is brought to user.
The content of the invention
The present invention provides a kind of network address access method and device, to receive network address access request
When, destination network addresses to be visited are obtained automatically, and judge the destination network addresses whether with allowing to access
Rule matches, to ensure only in destination network addresses with allowing access rule to match the i.e. objective network
When address is the network address for allowing to access, the access request is just responded, and when destination network addresses and allows to access
It is that the destination network addresses are when forbidding the network address of access, then to refuse the access request that rule, which is mismatched, so that
User can not access the destination network addresses, and jumping to and meeting automatically allows the default network of access rule
Address.
The present invention provides a kind of network address access method, including:When receiving access request, acquisition is treated
The destination network addresses of access;
Judge the destination network addresses whether with allowing access rule to match;
When the destination network addresses match with the permission access rule, the access request is responded,
To jump to the destination network addresses;
When the destination network addresses are mismatched with the permission access rule, refuse the access request,
To jump to the default network address.
In one embodiment, before the access request is received, methods described also includes:
Goal systems file comprising Hook Function is injected in browser process, wherein, the Hook Function
In be pre-stored with the permission access rule.
In one embodiment, it is described when receiving access request, destination network addresses to be visited are obtained,
Including:
When monitoring that the browser process receives the access request, determine that the browser process is adjusted
Browser contiguous function;
The browser contiguous function is modified, the browser contiguous function is jumped to the hook
In function;
After the browser contiguous function jumps to the Hook Function, control the Hook Function according to
Every input parameter in the browser contiguous function, obtains the destination network addresses.
In one embodiment, it is described to judge the destination network addresses whether with allowing access rule phase
Match somebody with somebody, including:
The Hook Function is controlled to judge whether the destination network addresses allow access rule phase with described
Match somebody with somebody.
In one embodiment, methods described also includes:
After jumping to the destination network addresses or jumping to the default network address, cancel to institute
State the modification of browser contiguous function.
The present invention also provides a kind of network address access mechanism, including:
Acquisition module, for when receiving access request, obtaining destination network addresses to be visited;
Judge module, for judging the destination network addresses whether with allowing access rule to match;
First processing module, for when the destination network addresses with it is described permission access rule match when,
The access request is responded, to jump to the destination network addresses;
Second processing module, for when the destination network addresses with it is described permission access rule mismatch when,
Refuse the access request, to jump to the default network address.
In one embodiment, described device also includes:
Injection module, for before the access request is received, by the target system comprising Hook Function
In file injection browser process of uniting, wherein, the permission access rule is pre-stored with the Hook Function.
In one embodiment, the acquisition module includes:
Determination sub-module, for when monitoring that the browser process receives the access request, it is determined that
The browser contiguous function that the browser process is called;
Submodule is changed, for the browser contiguous function to be modified, makes the browser connection letter
Number is jumped in the Hook Function;
Acquisition submodule, for being jumped in the browser contiguous function after the Hook Function, control
Every input parameter of the Hook Function in the browser contiguous function, obtains the objective network
Address.
In one embodiment, the judge module includes:
Control submodule, for controlling the Hook Function to judge whether the destination network addresses permit with described
Perhaps access rule matches.
In one embodiment, described device also includes:
Module is cancelled, for jumping to the destination network addresses or jumping to the default network address
Afterwards, modification of the revocation to the browser contiguous function.
The technical scheme provided by this disclosed embodiment can include the following benefits:
When receiving network address access request, destination network addresses to be visited can be obtained automatically, and judge
Whether the destination network addresses are with allowing access rule to match, to ensure only in destination network addresses with permitting
Perhaps access rule match the i.e. destination network addresses be allow access network address when, just respond the access please
Ask, and when destination network addresses forbid accessing with allowing access rule to mismatch the i.e. destination network addresses
During network address, then refuse the access request so that user can not access the destination network addresses, and redirect automatically
Allow the default network address of access rule to meeting, so as to realize to the network address access request from user
Effective monitoring is carried out, some forbid accessing network address with restricting user access, while allowing user being capable of just frequentation
Ask that some allow to access network address, to ensure the normal requirements for access of user;The visit of some network address can be also saved simultaneously
Ask management and control cost.
Other features and advantages of the present invention will be illustrated in the following description, also, partly from explanation
Become apparent, or understood by implementing the present invention in book.The purpose of the present invention and other advantages can
Realize and obtain by specifically noted structure in the specification, claims and accompanying drawing write
.
Below by drawings and examples, technical scheme is described in further detail.
Brief description of the drawings
Accompanying drawing is used for providing a further understanding of the present invention, and constitutes a part for specification, with this hair
Bright embodiment is used to explain the present invention together, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is a kind of flow chart of network address access method according to an exemplary embodiment.
Fig. 2 is the flow chart of another network address access method according to an exemplary embodiment.
Fig. 3 is a kind of block diagram of network address access mechanism according to an exemplary embodiment.
Fig. 4 is the block diagram of another network address access mechanism according to an exemplary embodiment.
Fig. 5 is the block diagram of another network address access mechanism according to an exemplary embodiment.
Fig. 6 is the block diagram of another network address access mechanism according to an exemplary embodiment.
Fig. 7 is the block diagram of another network address access mechanism according to an exemplary embodiment.
Embodiment
The preferred embodiments of the present invention are illustrated below in conjunction with accompanying drawing, it will be appreciated that described herein
Preferred embodiment is merely to illustrate and explain the present invention, and is not intended to limit the present invention.
In correlation technique, internet comes into huge numbers of families, and in correlation technique, user accesses in request
During certain network address, except the network address is sealed off so that user can not be accessed outside the network address, sheet in the case of other
End and server are substantially all permission user and access the network address, network address can't be accessed and limited, but real
On border, it is sometimes necessary to some network address of restricting user access, such as limit child and access some game network address,
But in the prior art again without special independent " network log-in management " equipment, and carry " online management
The price of the router of equipment " is also quite high, thus, bring very big puzzlement to user.
In order to solve the above-mentioned technical problem, the embodiment of the present disclosure provides a kind of network address access method, should
Method is accessed program, system or device suitable for the network address, and its executive agent can be terminal or clothes
Business device, as shown in figure 1,
Step S101, when receiving access request, obtains destination network addresses to be visited;
The destination network addresses are the access request addresses to be accessed, and can be users in browser window
The URL (Uniform Resource Locator, URL) of input, or it is defeated with user
The corresponding URL of web site name that enters or be URL corresponding with certain website that user clicks on.
Whether step S102, judge the destination network addresses with allowing access rule to match;
The permission access rule have recorded the specific network address or can access that user can access
Network type (such as shopping network, express delivery net, electronic emporium net, the net related to intellectual property), this is permitted
Perhaps access rule can be pre-stored in forms such as form, lists.
Step S103, when the destination network addresses match with the permission access rule, response is described
Access request, to jump to the destination network addresses;
Wherein, it is to allow to send the access request to where the destination network addresses to respond the access request
Server, to agree to that local device can be with the mesh when connecting in the server where the destination network addresses
Server where the mark network address is connected, so as to jump to the destination network addresses;
Step S104, when the destination network addresses are mismatched with the permission access rule, refusal is described
Access request, to jump to the default network address;
Wherein, refuse the access request and refuse to send the access request to service to intercept the access request
Device so that the access request can not be sent to the server where the destination network addresses, that can not connect
The server, and be connected automatically with the server where presetting network address to this, to jump to default net
Network address.
When destination network addresses are with allowing access rule to match, it is to allow to use to illustrate the destination network addresses
The network address that family is accessed, then can respond the access request, it is allowed to connect the destination network addresses, so that user
The network address can normally be accessed;And when destination network addresses are with allowing access rule to mismatch, illustrate the mesh
The mark network address is the network address for forbidding user to access, and is such as probably the game network address, indecency for forbidding user to access
Video network address etc., then can refuse the access request so that user can not access the destination network addresses, and
Automatic jump to meets the default network address (such as Baidu's homepage for allowing user to access for allowing access rule
Www.baidu.com etc.), effective monitoring is carried out to the network address access request from user so as to realize, to limit
User accesses some and forbids accessing network address, while allowing user normally to access some allows to access network address,
To ensure the normal requirements for access of user;Some network address can be also saved simultaneously accesses management and control cost.
In addition, the permission access rule can also vary with each individual, such as when the corresponding user of the access request is small
During child, then the permission access rule can only correspond to some teaching network address;
When the corresponding user of the access request is the adult A of family and the adult A likes some variety shows
When, then the permission access rule can correspond to some variety show network address, can even correspond to some shopping networks
Location etc.;
When the corresponding user of the access request is the adult B of family and the adult B likes some cook-ins
When, the permission access rule can correspond to some cook-in network address, can even correspond to some shopping network address
Deng.
As the corresponding company personnel of the access request, the permission access rule can correspond to some and the said firm
The related network address of business etc..
And when determining the identity of user, the identity information of user when receiving access request, can be obtained such as
Fingerprint, identification card number, address etc..
In one embodiment, before the access request is received, methods described also includes:
Goal systems file comprising Hook Function is injected in browser process, wherein, the Hook Function
In be pre-stored with the permission access rule.
In device power-up, it is possible to which the goal systems file hook.dl injections comprising Hook Function are browsed
In device process explorer.exe, in order to when receiving access request, be wanted using Hook Function interception
The destination network addresses of access, wherein, Hook Function is a part for windows messaging treatment mechanism, is led to
Setting " hook " is crossed, application program can be filtered system-level to all message, event, accessed just
The message that can not be accessed in the case of often.The essence of hook is one section of program to processing system message, is passed through
System is called, and it is linked into system.
As shown in Fig. 2 in one embodiment, above-mentioned steps S101 can be performed as:
In step s 201, when monitoring that the browser process receives the access request, it is determined that
The browser contiguous function that the browser process is called;
, can be by dis-assembling language (by OD when monitoring that browser process receives access request
Instrument) conversed analysis explorer.exe processes (i.e. the browser process), search its contiguous function called
For InternetConnectW (...) (i.e. browser contiguous function), and then, select the browser contiguous function
Carry out hooking up operation as target, in order to obtain the destination network addresses.
In step S202, the browser contiguous function is modified, makes the browser connection letter
Number is jumped in the Hook Function;
By changing the beginning byte of InternetConnectW () function, (also known as release should
The hook of InternetConnectW functions) so that InternetConnectW () function can jump to this
In Hook Function, in order to which Hook Function can carry out follow-up acquisition and judgment step.
In step S203, after the browser contiguous function jumps to the Hook Function, control
Every input parameter of the Hook Function in the browser contiguous function, obtains the objective network
Address.
Due to when generating access request, the destination network addresses be passed into that browser process calls this is clear
Look in device contiguous function, thus, after browser contiguous function jumps to the Hook Function, hook can be made
Every input parameter of the subfunction in the browser contiguous function, obtains the destination network addresses automatically.
In one embodiment, above-mentioned steps S102 can be performed as:
The Hook Function is controlled to judge whether the destination network addresses allow access rule phase with described
Match somebody with somebody.
Hook Function can according to pre-stored permission access rule, automatic decision destination network addresses whether with
The permission access rule matches, and when destination network addresses are with allowing access rule to match, illustrates the mesh
The mark network address is the network address for allowing user to access, then can respond the access request, allow the user to just
The network address is asked in frequentation;And when destination network addresses are with allowing access rule to mismatch, illustrate the objective network
Address is the network address for forbidding user to access, and is such as probably game network address, the indecency video network for forbidding user to access
Location etc., then can refuse the access request so that user can not access the destination network addresses, and jump automatically
Going to and meeting allows the default network address (such as Baidu's homepage for allowing user to access of access rule
Www.baidu.com etc.).
In one embodiment, methods described also includes:
After jumping to the destination network addresses or jumping to the default network address, cancel to institute
State the modification of browser contiguous function.
Calling the browser contiguous function with successfully jumping to the destination network addresses or default network
After location, illustrate that browser can normally access network address, then can cancel the modification to browser contiguous function,
The beginning byte of InternetConnectW functions is reverted to as former state (also known as to the InternetConnectW
Function is carried out plus hook) so that InternetConnectW functions restore to the original state, so that ensure can be from hook
Jumped out in function, can continue to the normal access target network address or the default network address.
As shown in figure 3, the present invention also provides a kind of network address access mechanism, including:
Acquisition module 301, for when receiving access request, obtaining destination network addresses to be visited;
Judge module 302, for judging the destination network addresses whether with allowing access rule to match;
First processing module 303, for matching when the destination network addresses with the permission access rule
When, the access request is responded, to jump to the destination network addresses;
Second processing module 304, for being mismatched when the destination network addresses with the permission access rule
When, refuse the access request, to jump to the default network address.
As shown in figure 4, in one embodiment, described device also includes:
Injection module 401, for before the access request is received, by the target comprising Hook Function
System file injection browser process in, wherein, be pre-stored with the Hook Function it is described allow access advise
Then.
As shown in figure 5, in one embodiment, the acquisition module 301 includes:
Determination sub-module 3011, for when monitoring that the browser process receives the access request,
Determine the browser contiguous function that the browser process is called;
Submodule 3012 is changed, for the browser contiguous function to be modified, connects the browser
Function is connect to jump in the Hook Function;
Acquisition submodule 3013, for being jumped in the browser contiguous function after the Hook Function,
Every input parameter of the Hook Function in the browser contiguous function is controlled, the target is obtained
The network address.
As shown in fig. 6, in one embodiment, the judge module 302 includes:
Control submodule 3021, for control the Hook Function judge the destination network addresses whether with institute
Permission access rule is stated to match.
As shown in fig. 7, in one embodiment, described device also includes:
Module 701 is cancelled, for jumping to the destination network addresses or jumping to the default network
After address, the modification to the browser contiguous function is cancelled.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation relevant
It is described in detail in the embodiment of this method, explanation will be not set forth in detail herein.
Finally, when the network address access mechanism in the present invention is applied to terminal device, the terminal device can
To be mobile phone, computer, digital broadcast terminal, messaging devices, game console, flat board is set
It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot
The form of embodiment in terms of conjunction software and hardware.Wherein wrapped one or more moreover, the present invention can be used
Containing computer usable program code computer-usable storage medium (include but is not limited to magnetic disk storage and
Optical memory etc.) on the form of computer program product implemented.
The present invention is with reference to the production of method according to embodiments of the present invention, equipment (system) and computer program
The flow chart and/or block diagram of product is described.It should be understood that can by computer program instructions implementation process figure and
/ or each flow and/or square frame in block diagram and the flow in flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to all-purpose computer, special-purpose computer, insertion
Formula processor or the processor of other programmable data processing devices are to produce a machine so that pass through and calculate
The instruction of the computing device of machine or other programmable data processing devices is produced for realizing in flow chart one
The device for the function of being specified in individual flow or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or the processing of other programmable datas to set
In the standby computer-readable memory worked in a specific way so that be stored in the computer-readable memory
Instruction produce include the manufacture of command device, the command device realization in one flow or multiple of flow chart
The function of being specified in one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices, made
Obtain and perform series of operation steps on computer or other programmable devices to produce computer implemented place
Reason, so that the instruction performed on computer or other programmable devices is provided for realizing in flow chart one
The step of function of being specified in flow or multiple flows and/or one square frame of block diagram or multiple square frames.
Obviously, those skilled in the art can carry out various changes and modification without departing from this to the present invention
The spirit and scope of invention.So, if these modifications and variations of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to comprising including these changes and modification.
Claims (10)
1. a kind of network address access method, it is characterised in that including:
When receiving access request, destination network addresses to be visited are obtained;
Judge the destination network addresses whether with allowing access rule to match;
When the destination network addresses match with the permission access rule, the access request is responded,
To jump to the destination network addresses;
When the destination network addresses are mismatched with the permission access rule, refuse the access request,
To jump to the default network address.
2. according to the method described in claim 1, it is characterised in that
Before the access request is received, methods described also includes:
Goal systems file comprising Hook Function is injected in browser process, wherein, the Hook Function
In be pre-stored with the permission access rule.
3. method according to claim 2, it is characterised in that
It is described to obtain destination network addresses to be visited when receiving access request, including:
When monitoring that the browser process receives the access request, determine that the browser process is adjusted
Browser contiguous function;
The browser contiguous function is modified, the browser contiguous function is jumped to the hook
In function;
After the browser contiguous function jumps to the Hook Function, control the Hook Function according to
Every input parameter in the browser contiguous function, obtains the destination network addresses.
4. method according to claim 3, it is characterised in that
It is described to judge whether the destination network addresses match with permission access rule, including:
The Hook Function is controlled to judge whether the destination network addresses allow access rule phase with described
Match somebody with somebody.
5. the method according to claim 3 or 4, it is characterised in that methods described also includes:
After jumping to the destination network addresses or jumping to the default network address, cancel to institute
State the modification of browser contiguous function.
6. a kind of network address access mechanism, it is characterised in that including:
Acquisition module, for when receiving access request, obtaining destination network addresses to be visited;
Judge module, for judging the destination network addresses whether with allowing access rule to match;
First processing module, for when the destination network addresses with it is described permission access rule match when,
The access request is responded, to jump to the destination network addresses;
Second processing module, for when the destination network addresses with it is described permission access rule mismatch when,
Refuse the access request, to jump to the default network address.
7. device according to claim 6, it is characterised in that described device also includes:
Injection module, for before the access request is received, by the target system comprising Hook Function
In file injection browser process of uniting, wherein, the permission access rule is pre-stored with the Hook Function.
8. device according to claim 7, it is characterised in that
The acquisition module includes:
Determination sub-module, for when monitoring that the browser process receives the access request, it is determined that
The browser contiguous function that the browser process is called;
Submodule is changed, for the browser contiguous function to be modified, makes the browser connection letter
Number is jumped in the Hook Function;
Acquisition submodule, for being jumped in the browser contiguous function after the Hook Function, control
Every input parameter of the Hook Function in the browser contiguous function, obtains the objective network
Address.
9. device according to claim 8, it is characterised in that
The judge module includes:
Control submodule, for controlling the Hook Function to judge whether the destination network addresses permit with described
Perhaps access rule matches.
10. device according to claim 8 or claim 9, it is characterised in that described device also includes:
Module is cancelled, for jumping to the destination network addresses or jumping to the default network address
Afterwards, modification of the revocation to the browser contiguous function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610192938.7A CN107294903A (en) | 2016-03-30 | 2016-03-30 | A kind of network address access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610192938.7A CN107294903A (en) | 2016-03-30 | 2016-03-30 | A kind of network address access method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107294903A true CN107294903A (en) | 2017-10-24 |
Family
ID=60086557
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610192938.7A Pending CN107294903A (en) | 2016-03-30 | 2016-03-30 | A kind of network address access method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107294903A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110266661A (en) * | 2019-06-04 | 2019-09-20 | 东软集团股份有限公司 | A kind of authorization method, device and equipment |
CN111147425A (en) * | 2018-11-05 | 2020-05-12 | 成都鼎桥通信技术有限公司 | Data access processing method, device, equipment and storage medium |
CN111162956A (en) * | 2018-11-08 | 2020-05-15 | 优信数享(北京)信息技术有限公司 | Log recording method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102833212A (en) * | 2011-06-14 | 2012-12-19 | 阿里巴巴集团控股有限公司 | Webpage visitor identity identification method and system |
CN102957698A (en) * | 2012-10-26 | 2013-03-06 | 北京奇虎科技有限公司 | Method and system for accessing and managing enterprise intranet |
CN103116723A (en) * | 2013-02-06 | 2013-05-22 | 北京奇虎科技有限公司 | Method, device and system of web site interception process |
-
2016
- 2016-03-30 CN CN201610192938.7A patent/CN107294903A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102833212A (en) * | 2011-06-14 | 2012-12-19 | 阿里巴巴集团控股有限公司 | Webpage visitor identity identification method and system |
CN102957698A (en) * | 2012-10-26 | 2013-03-06 | 北京奇虎科技有限公司 | Method and system for accessing and managing enterprise intranet |
CN103116723A (en) * | 2013-02-06 | 2013-05-22 | 北京奇虎科技有限公司 | Method, device and system of web site interception process |
Non-Patent Citations (1)
Title |
---|
ZXWANGHONGYI: ""让局域网内的电脑只能访问一个网页"", 《HTTPS://WWW.52POJIE.CN/FORUM.PHP?MOD=VIEWTHREAD&TID=405507&ARCHIVE=1&EXTRA=PAGE%3D1&PAGE=1》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111147425A (en) * | 2018-11-05 | 2020-05-12 | 成都鼎桥通信技术有限公司 | Data access processing method, device, equipment and storage medium |
CN111162956A (en) * | 2018-11-08 | 2020-05-15 | 优信数享(北京)信息技术有限公司 | Log recording method and device |
CN111162956B (en) * | 2018-11-08 | 2021-07-30 | 优信数享(北京)信息技术有限公司 | Log recording method and device |
CN110266661A (en) * | 2019-06-04 | 2019-09-20 | 东软集团股份有限公司 | A kind of authorization method, device and equipment |
CN110266661B (en) * | 2019-06-04 | 2021-09-14 | 东软集团股份有限公司 | Authorization method, device and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7222036B2 (en) | Model training system and method and storage medium | |
CN107172054B (en) | Authority authentication method, device and system based on CAS | |
CN109104412B (en) | Account authority management method, account authority management system and computer readable storage medium | |
CN108200050A (en) | Single logging-on server, method and computer readable storage medium | |
CN109818937A (en) | For the control method of Android permission, device and storage medium, electronic device | |
US20100319051A1 (en) | Controlling access to resources by hosted entities | |
US9934310B2 (en) | Determining repeat website users via browser uniqueness tracking | |
CN105978933B (en) | A kind of web-page requests and response method, terminal, server and system | |
CN109829286B (en) | User authority management system and method for WEB application | |
CN103716295B (en) | A kind of network system | |
JP2009151723A (en) | Web page safety determination system | |
CN107196951A (en) | The implementation method and firewall system of a kind of HDFS systems fire wall | |
CN102938766B (en) | Maliciously website prompt method and device | |
CN103973635B (en) | Page access control method and relevant apparatus and system | |
US9235693B2 (en) | System and methods thereof for tracking and preventing execution of restricted applications | |
US9280674B2 (en) | Information processing apparatus and method of controlling same | |
CN113591068B (en) | Online login device management method and device and electronic device | |
CN102185830B (en) | A kind of method and system of security filtration of network television browser | |
US9479505B2 (en) | Controlling access to a website | |
CN103888465B (en) | A kind of webpage kidnaps detection method and device | |
CN107294903A (en) | A kind of network address access method and device | |
CN102946391B (en) | The method of prompting malice network address and a kind of browser in a kind of browser | |
CN110955872A (en) | Authority control method, device, terminal and medium | |
CN108509228B (en) | Page loading method, terminal equipment and computer readable storage medium | |
CN109992298B (en) | Examination and approval platform expansion method and device, examination and approval platform and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171024 |