CN110677506B - Network access method, device, computer equipment and storage medium - Google Patents

Network access method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110677506B
CN110677506B CN201910775793.7A CN201910775793A CN110677506B CN 110677506 B CN110677506 B CN 110677506B CN 201910775793 A CN201910775793 A CN 201910775793A CN 110677506 B CN110677506 B CN 110677506B
Authority
CN
China
Prior art keywords
domain name
list
address
name information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910775793.7A
Other languages
Chinese (zh)
Other versions
CN110677506A (en
Inventor
杭强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN201910775793.7A priority Critical patent/CN110677506B/en
Publication of CN110677506A publication Critical patent/CN110677506A/en
Application granted granted Critical
Publication of CN110677506B publication Critical patent/CN110677506B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

The embodiment of the application belongs to the field of information security, and relates to a network access method, a network access device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring domain name information; selecting a first target IP address corresponding to the domain name information from a pre-configured first IP list for access according to the domain name information, wherein the first IP list is an IP list issued by a server; if the first target IP address fails to be accessed, selecting a second target IP address corresponding to the domain name information in a pre-configured second IP list for accessing, wherein the second IP list is an IP list obtained by domain name pre-resolution; and if the second target IP address fails to be accessed, selecting a pre-written fixed IP address for accessing, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time. According to the method and the device, the first IP list is configured in the server in advance, so that the success rate of network access is improved.

Description

Network access method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of information security, and in particular, to a network access method, apparatus, computer device, and storage medium.
Background
At present, network access is achieved by directly accessing a server through a domain name input by a user terminal, that is, the domain name server resolves the domain name input by the user terminal, and after resolution, the domain name server issues an IP address to the user terminal, and the user terminal can access the server by using the IP address. However, when the Domain Name Server (DNS) resolves the Domain Name, the Domain Name Server is easily hijacked by a hacker, and the Domain Name Server resolves an incorrect IP address, so that the user end fails to access the Server. Such network access methods have not been successful.
Disclosure of Invention
The embodiment of the application aims to provide a network access method, a network access device, computer equipment and a storage medium, so as to improve the success rate of network access.
In order to solve the foregoing technical problem, an embodiment of the present application provides a network access method, which adopts the following technical solutions:
the method comprises the following steps:
acquiring domain name information;
selecting a first target IP address corresponding to the domain name information from a pre-configured first IP list for access according to the domain name information, wherein the first IP list is an IP list issued by a server and comprises at least one first target IP address corresponding to the domain name information;
if the first target IP address fails to be accessed, selecting a second target IP address corresponding to the domain name information in a pre-configured second IP list for accessing, wherein the second IP list is an IP list obtained by domain name pre-resolution, and the second IP list comprises at least one second target IP address corresponding to the domain name information;
and if the second target IP address fails to be accessed, selecting a pre-written fixed IP address for accessing, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time.
Further, the step of selecting a first target IP address corresponding to the domain name information in a preconfigured first IP list for access according to the domain name information specifically includes:
matching the acquired domain name information with a first IP list, wherein the first IP list further comprises domain name information for matching;
and if the domain name information is successfully matched with the first IP list, selecting a first target IP address corresponding to the domain name information for access based on the successfully matched first IP list.
Further, the step of selecting a first target IP address corresponding to the domain name information from a preconfigured first IP list for access according to the domain name information further includes:
if the matching of the domain name information and the first IP list fails, defining a matching result as a first target IP address access failure, and selecting a second target IP address corresponding to the domain name information in a second preset IP list for access;
if the access of the first target IP address fails, the step of selecting the resolution IP address corresponding to the domain name information in the second IP list for access specifically comprises the following steps:
matching the acquired domain name information with a second IP list, wherein the second IP list further comprises domain name information for matching;
and if the domain name information is successfully matched with the second IP list, selecting a second target IP address corresponding to the domain name information for access based on the successfully matched second IP list.
Further, if the access of the first target IP address fails, the step of selecting a second target IP address corresponding to the domain name information in a second IP list for access specifically includes:
and if the matching of the domain name information and the second IP list fails, defining the matching result as the access failure of a second target IP address, and selecting a pre-written fixed IP address for access.
Further, the step of pre-configuring the first IP list includes:
detecting network conditions in real time or on a regular basis;
and if the change of the network condition is detected, requesting an IP list corresponding to each domain name from a server to obtain a first IP list under the current network condition.
Further, the step of pre-configuring the second IP list includes:
detecting network conditions in real time or on a regular basis;
and if the change of the network condition is detected, sending the domain name to be analyzed to a domain name server according to a preset sequence for domain name analysis, and writing the IP address returned by the domain name server into a second IP list.
Further, after the fixed IP address that is written to death in advance is selected for access, the method further includes the following steps:
if the fixed IP address fails to be accessed, acquiring the times of the fixed IP address failure;
if the fixed IP address access failure times are one time, sequentially selecting the IP addresses or the fixed IP addresses in the first IP list or the second IP list again for access;
if the fixed IP address fails to be accessed twice, the IP address or the fixed IP address in the first IP list or the second IP list is selected to be accessed, the domain name information is sent to a domain name server to be analyzed, and the domain name server is used for analyzing the IP address in real time to access.
In order to solve the foregoing technical problem, an embodiment of the present application further provides a network access apparatus, which adopts the following technical solutions:
the network access device comprises:
the acquisition module is used for acquiring domain name information;
the first selecting module is used for selecting a target IP address corresponding to the domain name information from a pre-configured first IP list to access according to the domain name information, wherein the first IP list is an IP list issued by a server and comprises at least one first target IP address corresponding to the domain name information;
a second selecting module, configured to select a second target IP address corresponding to the domain name information from a second pre-configured IP list for access if the access of the first target IP address fails, where the second IP list is an IP list obtained by domain name pre-resolution, and the second IP list includes at least one second target IP address corresponding to the domain name information;
and the third selecting module is used for selecting a pre-written fixed IP address for accessing if the second target IP address fails to access, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which adopts the following technical solutions:
the computer device includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the network access method when executing the computer program.
In order to solve the foregoing technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions:
the computer readable storage medium has a computer program stored thereon, and the computer program, when executed by a processor, implements the steps of the network access method of any one of the embodiments of the present application.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects: acquiring domain name information; selecting a first target IP address corresponding to the domain name information from a pre-configured first IP list for access according to the domain name information, wherein the first IP list is an IP list issued by a server and comprises at least one first target IP address corresponding to the domain name information; if the first target IP address fails to be accessed, selecting a second target IP address corresponding to the domain name information in a pre-configured second IP list for accessing, wherein the second IP list is an IP list obtained by domain name pre-resolution, and the second IP list comprises at least one second target IP address corresponding to the domain name information; and if the second target IP address fails to be accessed, selecting a pre-written fixed IP address for accessing, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time. The first target IP address corresponding to the domain name information is selected from a first IP list configured in advance by the server for access, so that the domain name resolution by using a domain name server can be reduced or avoided, the risk of hijacking by a hacker when the domain name is resolved by the domain name server is reduced, and the success rate of network access is improved; meanwhile, by pre-configuring a target IP list, a pre-analyzed IP list and a pre-written fixed IP address, the number of IP addresses capable of being accessed is increased, and the success rate of network access can also be improved.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings needed for describing the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram to which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a network access method according to the present application;
FIG. 3 is a flowchart of one embodiment of step S202 in FIG. 2;
FIG. 4 is a flow diagram of another embodiment of step S202 of FIG. 2;
FIG. 5 is a flowchart of one embodiment of step S203 of FIG. 2;
FIG. 6 is a flow diagram of another embodiment of step S202 in FIG. 2;
FIG. 7 is a flowchart of another embodiment of step S203 in FIG. 2;
FIG. 8 is a flowchart of one embodiment of step S204 of FIG. 2;
FIG. 9 is a block diagram of one embodiment of a network access device of the present application;
FIG. 10 is a block diagram illustrating one embodiment of a first selection module of FIG. 9;
FIG. 11 is a schematic block diagram of another embodiment of the first selection module of FIG. 9;
FIG. 12 is a block diagram of another embodiment of the network access device of FIG. 9;
FIG. 13 is a schematic diagram of a structure of one embodiment of a third pick module shown in FIG. 9;
FIG. 14 is a block diagram of one embodiment of a computer device of the present application;
fig. 15 is a schematic diagram illustrating the determination of the access flow of the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof in the description and claims of this application and the description of the figures above, are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, motion Picture Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion Picture Experts compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server that provides various services, and may be, for example, a server that provides an IP address to a page displayed on the terminal apparatus 101, 102, 103.
It should be noted that the network access method provided by the embodiment of the present application may be implemented byServer/terminal deviceImplementation, accordingly, the network access device may be arranged atServer/terminal deviceIn (1).
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for an implementation.
With continued reference to fig. 2, a flow diagram of one embodiment of a network access method in accordance with the present application is shown. The network access method comprises the following steps:
step 201, domain name information is obtained.
In this embodiment, the electronic device (e.g., the server/terminal device shown in fig. 1) on which the network access method operates may input the domain name through a wired connection or a wireless connection. It is noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, and other now known or later developed wireless connection means.
The domain name included in the domain name information may refer to the name of a computer or a group of computers on the internet, and is used to identify the electronic position (sometimes referred to as the geographical location) of the computer during data transmission. The domain name may be composed of a string of names separated by dots, usually including an organization name, and always include suffixes of two to three letters to indicate the type of organization or the country or region where the domain is located, for example, www.baidu.com, www.souhu.com, www.xinlang.com, etc. are relatively common domain names, and the domain name information may be obtained by uploading by a terminal device and obtaining the domain name information by inputting the domain name in a website column of a browser by a user on the terminal device, or by clicking a corresponding network navigation, such as clicking a link of a certain web page on the terminal device, or by opening a corresponding application by the user, such as opening an APP of a certain mobile device or a shortcut created on the mobile device.
In addition, the user mentioned above may be a registered user generated according to the identity information of the user, or may be an electronic device with a unique identification code, and the like.
Step 202, according to the domain name information, selecting a first target IP address corresponding to the domain name information from a preconfigured first IP list for access, where the first IP list is an IP list issued by a server, and the first IP list includes at least one first target IP address corresponding to the domain name information.
In this embodiment, the first IP list may be pre-configured in the server, and after the server acquires the domain name information, the server may issue the first IP list corresponding to the domain name in the domain name information to the terminal device used by the user. The terminal device used by the user acquires the corresponding first IP list, and may be acquired by the server according to the proximity principle and the load balancing principle. The first IP list has at least one first target IP address, and the first IP address can be directly used as the first target IP address and accessed if the first IP list only has one IP address; second, if there is more than one IP address in the first IP list, it is necessary to select one IP address from the multiple IP addresses in the first IP list as a first target IP address and perform access, and when selecting an IP address in the first IP list, the selection may be performed according to the arrangement order of the IP addresses in the first IP list.
Further, when only one IP address is in the first IP list, if the network access to the IP address is successful, the server is accessed, and if the network access to the IP address is failed, the following step 203 is executed; when there are multiple IP addresses in the first IP list, if the access to the selected first target IP address fails, the other IP addresses in the first IP list may be sequentially accessed, if there is an IP address that succeeds in accessing the network in the multiple IP addresses in the first IP list, the access to the server is completed, and if the access to all the multiple IP addresses in the first IP list fails, the following step 203 is executed. By using the IP addresses in the first IP list for network access, on one hand, the risk of hijacking when a domain name server is used for analyzing the domain name can be effectively avoided, and on the other hand, the number of the accessible IP addresses can be increased so as to improve the success rate of network access.
Step 203, if the access of the first target IP address fails, selecting a second target IP address corresponding to the domain name information from a pre-configured second IP list for access, where the second IP list is an IP list obtained by domain name pre-resolution, and the second IP list includes at least one second target IP address corresponding to the domain name information.
In this embodiment, the step 203 is executed on the premise that the first destination IP address in the step 202 fails to access the network, and if the first destination IP address in the step 202 succeeds in accessing the network, the step 203 is not executed. When the network access through the first target IP address fails, a second target IP address in a second IP list may be selected to access, and the second IP list also has at least one IP address, the second IP list may be obtained through domain name server pre-resolution, and the domain name server pre-resolution may be resolving a domain name in the first IP list through a domain name server, or resolving a domain name in the domain name information through a domain name server.
Further, selecting a second target IP address in a second IP list for access, which may be divided into two cases, namely a first case, and if only one IP address exists in the second IP list, directly taking the IP address as the second target IP address and performing access; second, if there is more than one IP address in the second IP list, one IP address needs to be selected from the multiple IP addresses in the second IP list as the second target IP address and accessed, and when the IP address in the second IP list is selected, the selection can be performed according to the order of the IP addresses in the second IP list. In addition, when only one IP address is in the first IP list, if the network access is successful through the IP address, the access to the server is completed, and if the access to the IP address is failed, the following step 204 is executed; when there are multiple IP addresses in the second IP list, if the access to the selected second target IP address fails, the other IP addresses in the second IP list may be sequentially accessed, if there is an IP address that succeeds in accessing the network in the multiple IP addresses in the second IP list, the access to the server is completed, and if the access to all the multiple IP addresses in the second IP list fails, the following step 204 is executed. By selecting the IP addresses in the second IP list for network access, the number of the IP addresses can be increased, and the success rate of the network access can be improved.
And 204, if the second target IP address fails to be accessed, selecting a pre-written fixed IP address for accessing, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time.
In this embodiment, the step 204 is executed on the premise that the second target IP address in the step 203 fails to access the network, and if the second target IP address in the step 203 successfully accesses the network, the step 204 is not executed. When the second target IP address fails to access the network, a pre-written fixed IP address can be selected for access, wherein the pre-written fixed IP address is an IP address which is allocated to a computer or network equipment for a long time, and the domain name server can analyze the domain name and can access the network through the fixed IP address after the domain name server fails to hijack the access network. In addition, the failure of access to the second target IP address in the second IP list pre-resolved by the domain name server may be that the IP address resolved by the domain name server is a false IP address or the domain name request fails to respond because the domain name request uploaded to the server is hijacked by a hacker.
In addition, in a possible implementation manner, when accessing the second target IP address in the second IP list, in order to avoid a loss to the user end due to the access of the false IP address, the verification may be performed on the second target IP address accessed in the second IP list, and the access is not performed if the verification is passed by performing the access of the IP address, so that the false IP address in the second IP list may be removed, and the access success rate of the second target IP address in the second IP list may be improved.
In the embodiment, domain name information is acquired; selecting a first target IP address corresponding to the domain name information from a pre-configured first IP list for accessing according to the domain name information, wherein the first IP list is an IP list issued by a server and comprises at least one first target IP address corresponding to the domain name information; if the first target IP address fails to be accessed, selecting a second target IP address corresponding to the domain name information in a pre-configured second IP list for accessing, wherein the second IP list is an IP list obtained by domain name pre-resolution, and the second IP list comprises at least one second target IP address corresponding to the domain name information; and if the second target IP address fails to be accessed, selecting a pre-written fixed IP address for accessing, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time. The method has the advantages that the target IP list, the pre-resolved analysis IP list and the pre-written fixed IP address which are pre-configured in the server are used for avoiding the domain name from being hijacked by hackers when the local domain name server resolves the domain name, and meanwhile, the number of the IP addresses which can be accessed is increased through the target IP list, the pre-resolved analysis IP list and the pre-written fixed IP address, so that the success of network access is improved.
Further, as shown in fig. 3, the step 202 may include:
step 301, matching the obtained domain name information with a first target IP list, where the first IP list further includes domain name information for matching.
In this step, IP lists corresponding to various kinds of domain name information are preconfigured in the server, and after the domain name information is obtained, a first IP list matching the domain name information needs to be queried in the IP list preconfigured in the server according to the obtained domain name information, so that the first IP list also includes the domain name information for matching, for example, the input domain name information includes hundred-degree identifiers, and if one of the IP lists preconfigured in the server has domain name information corresponding to the hundred-degree identifiers, it can be considered that the domain name information matches the IP list.
Step 302, if the domain name information is successfully matched with the first IP list, selecting a first target IP address corresponding to the domain name information for access based on the successfully matched first IP list.
In this step, if the domain name information is successfully matched with the first IP list, it indicates that a first IP list corresponding to the acquired domain name information exists in an IP list configured in advance by the server, and at this time, a first target IP address corresponding to the domain name information may be selected from IP addresses in the first IP list for access. When the first target IP address is selected from the first IP list, it can be understood that the domain name in the domain name information has a corresponding relationship with the IP address in the first IP list, that is, one domain name may correspond to multiple IP addresses or one IP address may correspond to multiple domain names. In addition, when a first IP list corresponding to the domain name information is queried in a plurality of IP lists configured in advance by the server, the query can be performed in a character string matching mode, namely, a character string of the domain name in the domain name information input by the user is obtained, and is subjected to traversing comparison with a domain name character string in the IP list, so that a matching result is obtained.
In this embodiment, the obtained domain name information is matched with the first target IP list, and the first target IP address corresponding to the domain name information is selected for access based on the first IP list successfully matched, so that hijacking during domain name resolution by the domain name resolution server can be avoided, and security and success rate of network access can be improved.
Further, as shown in fig. 4, the step 202 may further include:
step 401, if the matching between the domain name information and the first IP list fails, defining the matching result as a first target IP address access failure, and entering step 203;
step 402, matching the obtained domain name information with a second IP list, wherein the second IP list further includes domain name information for matching;
step 403, if the domain name information is successfully matched with the second IP list, selecting a second target IP address corresponding to the domain name information for access based on the successfully matched second IP list.
As for step 401, in combination with step 202 described above, it can be understood that step 401 is another case of step 202, that is, the first IP list matching the domain name information is not searched in the IP list pre-stored in the server, and since the first IP list is not matched, the first target IP address in the first IP list cannot be obtained, it can be understood that the first target IP address cannot be obtained, and the matching result of the domain name information and the first IP list that failed to match is defined as the first target IP address that failed to access, so as to perform matching on the second IP list.
For step 402, in combination with step 203 above, it may be understood that the second IP list may be obtained by analyzing a domain name through a domain name server, that is, obtaining domain name information in advance, sending the domain name information to the domain name server for analysis, and then forming a second IP list by using an IP address analyzed by the domain name server. And when the service acquires that the first IP list is unsuccessfully matched or the first target IP addresses in the first IP list are unsuccessfully accessed, matching a corresponding second IP list through the domain name information.
For step 403, in step 402, if the domain name information is successfully matched with the second IP list, in step 403, a second target IP address corresponding to the domain name information may be selected from the second IP list acquired in step 402 to access.
In this embodiment, if the matching of the first IP list fails, the result of the failed matching is defined as the failure of accessing the first target IP address, so that step 203 may be entered, that is, the second IP list may be matched, and the second target IP address corresponding to the domain name information is selected from the second IP list, which may improve the success rate of network access. When the matching of the domain name information and the first IP list fails, the state of the matching failure is defined as the access failure, the processing thread of the matching failure is not required to be additionally added, and the number of the threads can be reduced.
Still further, as shown in fig. 5, on the basis of the embodiment in fig. 4, the step 203 may further include:
step 501, if the matching between the domain name information and the second IP list fails, defining the matching result as a second target IP address access failure, and then entering step 204.
For step 501, it can be understood that the description of another case of step 203 is described above, in step 203, two cases may be divided, and in the first case, as described in the embodiment of fig. 4, if the domain name information is successfully matched with the second IP list, the second target IP list may be selected from the second IP list for access; the second case is the case described in step 501, that is, if the matching of the second IP list fails, the second target IP address cannot be selected for access if the matching of the second IP list fails, which is equal to the access failure of the second target IP address, so that the matching failure can be defined as the access failure, so as to reduce the processing threads of the matching failure. It can be understood that, after the second IP list fails to be matched, or the second IP list is successfully matched but the second target IP address fails to be accessed, step 204 needs to be performed, that is, a pre-killed fixed IP address is selected for access, so that the success rate of network access is improved.
In this embodiment, if the matching of the second IP list fails, the result of the matching failure is defined as the access failure of the second target IP address, so that step 204 may be performed, that is, the fixed IP address that is pre-killed may be selected for access, and the success rate of network access may be increased. In addition, when the matching of the domain name information and the second IP list fails, the state of the matching failure is defined as the access failure, the processing thread of the matching failure does not need to be additionally added, and the number of the processing threads can be reduced.
Further, as shown in fig. 6, the step of pre-configuring the first IP list includes:
step 601, detecting network conditions in real time or at regular time;
step 602, if it is detected that the network condition is changed, requesting an IP list corresponding to each domain name from a server to obtain a first IP list under the current network condition.
For the network condition in step 601 including the mobile network or the wifi network, since the network condition of the user end may change, for example, the network condition may be changed from the mobile network to the wifi network, or the network condition may be changed from the wifi network to the mobile network, or the network condition may be changed from one wifi network to another wifi network, etc., the first IP list needs to be obtained again to access the first target IP address, so that the network condition of the user end needs to be detected in real time or at regular time.
For step 602, when it is detected that the network condition of the user side changes, an IP list corresponding to each domain name may be requested from the server to obtain a first IP list under the current network condition, and the first IP list under the current network condition may be obtained according to an exit IP of the current network of the user side terminal device, so as to select a corresponding IP address from the first IP list for network access, for example, before the network condition of the user side changes, the IP address in the first IP list is accessed to the hundred-degree server, and after the network condition of the user side changes, the first IP list may be newly obtained by requesting, and the IP address is selected from the obtained first IP list for access, so that the hundred-degree server may be accessed again.
In this embodiment, when accessing the network through the first target IP address in the first IP list, if it is detected that the network condition of the user side changes, the first IP list may be newly obtained, and the IP address is selected to perform network access again.
Further, as shown in fig. 7, the step of pre-configuring the second IP list includes:
step 701, detecting network conditions in real time or at regular time;
step 702, if the change of the network condition is detected, sending the domain name to be analyzed to the domain name server according to a preset sequence for domain name analysis, and writing the IP address returned by the domain name server into the second IP list.
As for the network condition in step 701, the network condition may be a mobile network or a wifi network, and since the network condition of the user side may be changed when performing network access, for example, the network condition may be changed from the mobile network to the wifi network, or the network condition may be changed from the wifi network to the mobile network, or the network condition may be changed from one wifi network to another wifi network, etc., the second IP list needs to be obtained again to perform access to the second target IP address, so that the network condition of the user side needs to be detected in real time or at regular time.
The domain name to be resolved in step 702 may be a domain name in the input domain name information, or may be a corresponding domain name in the first IP list, and therefore the domain name to be resolved needs to be sent to the domain name server for resolution in a preset order, the domain name server may obtain a resolved IP address after resolving the domain name, and write the resolved IP address into the second IP list to complete network access, for example, before a network condition of the user side changes, the IP address in the second IP list is accessed to the hundred degree server, and after the network condition of the user side changes, the IP address obtained by resolving the domain name by the domain name server may be used to access the hundred degree server again.
In this embodiment, when accessing the network through the second target IP address in the second IP list, if it is detected that the network condition of the user side is changed, the second target IP address written in the second IP list through domain name service area resolution may be reselected, and network access may be performed again through the second target IP address.
Further, as shown in fig. 8, step 204 may include the following steps:
step 801, if the access of the fixed IP address fails, acquiring the number of times of the access failure of the fixed IP address;
step 802, if the number of times of access failure of the fixed IP address is one, selecting the IP addresses or the fixed IP addresses in the first IP list or the second IP list again in sequence to access;
step 803, if the number of times of access failure of the fixed IP address is two, ending selecting the IP address or the fixed IP address in the first IP list or the second IP list for access, sending the domain name information to a domain name resolution server for resolution, and accessing through the IP address resolved by the domain name resolution server in real time.
In step 801, there may be two cases, that is, the network access through the fixed IP address fails or the network access through the fixed IP address succeeds, if the network access through the fixed IP address fails, the number of times of the network access failure needs to be obtained, and step 802 or step 803 is selectively executed according to the number of times of the network access failure through the fixed IP address.
In step 802, in the case that the number of times of access failure of the fixed IP address is one, the IP addresses in the first IP list that are successfully matched may be accessed again, if the IP addresses in the first IP list fail to be accessed again, the IP addresses in the second IP list that are analyzed in advance may be accessed again, and if the IP addresses in the second IP list fail to be accessed again, the fixed IP addresses that are written dead in advance may be accessed again.
For step 803, if it is failed to access the fixed IP address again in step 802, selecting the IP address in the first IP list or the second IP list and accessing the fixed IP address may be finished, and after the second access of the fixed IP address fails, the domain name information may be sent to the domain name resolution server for resolution, and the domain name resolution server performs real-time resolution on the domain name information to obtain the IP address resolved in real time and access the IP address. Referring to fig. 15, when a user accesses a network through a terminal device at a user end, in order to improve a success rate of the user accessing the network, the following access operations are performed on IP addresses in a first IP list, IP addresses in a second IP list, and a fixed IP address in sequence according to the sequence shown in fig. 2, for example:
in the first case: and accessing the IP addresses in the pre-configured first IP list, finishing accessing the IP addresses and the fixed IP addresses in the second IP list if the access is successful, and executing the access to the IP addresses in the second IP list if the access is failed.
In the second case: and after the access of the IP address in the first IP list fails, the IP address in the second IP list can be accessed, the fixed IP address is accessed after the access is successful, and the fixed IP address is accessed after the access fails.
In the third case: and after the access to the IP address in the second IP list fails, the fixed IP address can be accessed, the access is finished successfully, and the access failure needs to acquire the number of times of the access failure of the fixed IP address. If the fixed IP address access failure times are one time, the IP addresses in the first IP list, the IP addresses in the second IP list and the fixed IP addresses are accessed in sequence again; if the number of times of access failure of the fixed IP address is two, returning the information of access failure of the fixed IP address for two times to the server so that the domain name server can analyze the domain name in real time to obtain a new IP address and access the new IP address.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless otherwise indicated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 9, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a network access apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices.
As shown in fig. 9, the network access apparatus 900 according to this embodiment includes: an obtaining module 901, a first selecting module 902, a second selecting module 903, and a third selecting module 904. Wherein:
the obtaining module 901 is configured to obtain domain name information;
the first selecting module 902 is configured to select, according to the domain name information, a target IP address corresponding to the domain name information in a preconfigured first IP list for access, where the first IP list is an IP list issued by a server, and the first IP list includes at least one first target IP address corresponding to the domain name information;
the second selecting module 903 is configured to select a second target IP address corresponding to the domain name information from a second pre-configured IP list for access if the access of the first target IP address fails, where the second IP list is an IP list obtained by domain name pre-resolution, and the second IP list includes at least one second target IP address corresponding to the domain name information;
the third selecting module 904 is configured to select a pre-killed fixed IP address for access if the access of the second target IP address fails, where the pre-killed fixed IP address is an IP address that is allocated to the domain name information for a long time.
Referring to fig. 10, which is a schematic diagram illustrating a structure of an embodiment of the first selecting module 902, the first selecting module 902 further includes: a first matching submodule 9021 and a first judging submodule 9022.
The first matching sub-module 9021 is configured to match the acquired domain name information with a first IP list, where the first IP list further includes domain name information used for matching;
the first determining sub-module 9022 is configured to, if the domain name information is successfully matched with the first IP list, select, based on the successfully matched first IP list, a first target IP address corresponding to the domain name information for access.
Referring to fig. 11, which is a schematic structural diagram of an embodiment of the first selecting module 902, the first selecting module 902 further includes: a first definition sub-module 9023, a second matching sub-module 9024, and a second judgment sub-module 9025.
The first defining submodule 9023 is configured to define, if matching between the domain name information and the first IP list fails, a matching result as a first target IP address access failure, and perform the next step;
the second matching sub-module 9024 is configured to match the acquired domain name information with a second IP list, where the second IP list further includes domain name information used for matching;
the second judgment sub-module 9025 is configured to, if the domain name information is successfully matched with the second IP list, select a second target IP address corresponding to the domain name information for access based on the successfully matched second IP list.
Further, the second judgment sub-module 9025 may be further configured to define the matching result as a second target IP address access failure if the matching between the domain name information and the second IP list fails, and perform the next step.
Referring to fig. 12, which is a schematic structural diagram of an embodiment of the network access apparatus 900, the network access apparatus 900 may further include: a detection submodule 905 and a request submodule 906.
The detection submodule 905 is used for detecting the network condition in real time or at regular time;
the requesting sub-module 906 is configured to, if it is detected that the network condition is changed, request the server for an IP list corresponding to each domain name to obtain a first IP list under the current network condition.
Further, the request sub-module 906 may be further configured to, if a change in network conditions is detected, send the domain name to be resolved to the domain name resolution server in a preset order for domain name resolution, and write the IP address returned by the domain name resolution server into the second IP list.
Referring to fig. 13, which is a schematic diagram illustrating a structure of an embodiment of the third selecting module 904, the third selecting module 904 may include: a number detection submodule 9041, a first execution submodule 9042, and a second execution submodule 9043.
The number detection submodule 9041 is configured to, if the access to the fixed IP address fails, obtain the number of times of the access failure to the fixed IP address;
the first execution sub-module 9042 is configured to select the IP addresses or the fixed IP addresses in the first IP list or the second IP list again in sequence for access if the number of times of access failure of the fixed IP address is one;
the second execution sub-module 9043 is configured to, if the number of times of access failure of the fixed IP address is two, end selecting an IP address or a fixed IP address in the first IP list or the second IP list for access, send the domain name information to the domain name resolution server for resolution, and perform access through an IP address resolved by the domain name resolution server in real time.
It should be noted that the above apparatus may be applied to a network access device, for example: computers, servers, mobile phones, etc. may be network accessible devices.
The network access device provided in the embodiment of the present application can implement each implementation manner in the method embodiments of fig. 2 to fig. 8, and corresponding beneficial effects, and are not described here again to avoid repetition.
In order to solve the technical problem, an embodiment of the present application further provides a computer device. Referring to fig. 14, fig. 14 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 14 includes a memory 141, a processor 142, and a network interface 143 communicatively coupled to each other via a system bus. It is noted that only computer device 14 having components 141-143 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to instructions set or stored in advance, and the hardware thereof includes but is not limited to a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 141 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 141 may be an internal storage unit of the computer device 14, such as a hard disk or a memory of the computer device 14. In other embodiments, the memory 141 may also be an external storage device of the computer device 14, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, provided on the computer device 14. Of course, the memory 141 may also include both internal and external storage devices of the computer device 14. In this embodiment, the memory 141 is generally used for storing an operating system installed in the computer device 14 and various application software, such as program codes of a network access method. In addition, the memory 141 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 142 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 142 is generally operative to control overall operation of the computer device 14. In this embodiment, the processor 142 is configured to execute the program code stored in the memory 141 or process data, for example, execute the program code of the network access method.
The network interface 143 may include a wireless network interface or a wired network interface, and the network interface 143 is generally used to establish a communication connection between the computer device 14 and other electronic devices.
The present application further provides another embodiment, which is to provide a computer-readable storage medium storing a network access program, which is executable by at least one processor to cause the at least one processor to perform the steps of the network access method as described above.
Through the description of the foregoing embodiments, it is clear to those skilled in the art that the method of the foregoing embodiments may be implemented by software plus a necessary general hardware platform, and certainly may also be implemented by hardware, but in many cases, the former is a better implementation. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and the embodiments are provided so that this disclosure will be thorough and complete. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields, and all the equivalent structures are within the protection scope of the present application.

Claims (10)

1. A network access method, comprising the steps of:
acquiring domain name information;
selecting a first target IP address corresponding to the domain name information from a pre-configured first IP list for accessing according to the domain name information, wherein after the server acquires the domain name information, the first IP list corresponding to the domain name in the domain name information is issued to terminal equipment used by a user, and the first IP list comprises at least one first target IP address corresponding to the domain name information; the first IP list is updated in real time according to the network condition of the terminal, and when the network condition is changed, the IP list corresponding to each domain name is requested to the server to obtain the first IP list under the current network condition;
if the access of the first target IP address fails, selecting a second target IP address corresponding to the domain name information in a pre-configured second IP list for access, wherein the second IP list is obtained by analyzing a domain name in the first IP list in advance for a domain name server or analyzing the domain name in the domain name information, and the second IP list comprises at least one second target IP address corresponding to the domain name information; the second IP list is updated in real time according to the network conditions of the terminal, and when the network conditions are changed, the domain name to be analyzed is sent to the domain name server for domain name analysis to obtain a second IP list;
and if the second target IP address fails to be accessed, selecting a pre-written fixed IP address for accessing, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time.
2. The network access method according to claim 1, wherein the step of selecting, according to the domain name information, a first target IP address corresponding to the domain name information in a preconfigured first IP list for access specifically comprises:
matching the acquired domain name information with a first IP list, wherein the first IP list further comprises domain name information for matching;
and if the domain name information is successfully matched with the first IP list, selecting a first target IP address corresponding to the domain name information for access based on the successfully matched first IP list.
3. The method according to claim 2, wherein the step of selecting a first target IP address corresponding to the domain name information from a preconfigured first IP list for access according to the domain name information further comprises:
if the matching of the domain name information and the first IP list fails, defining a matching result as a first target IP address access failure, and selecting a second target IP address corresponding to the domain name information in a second preset IP list for access;
if the access of the first target IP address fails, the step of selecting the resolution IP address corresponding to the domain name information in the second IP list for access specifically comprises the following steps:
matching the acquired domain name information with a second IP list, wherein the second IP list further comprises domain name information for matching;
and if the domain name information is successfully matched with the second IP list, selecting a second target IP address corresponding to the domain name information for access based on the successfully matched second IP list.
4. The network access method according to claim 3, wherein the step of selecting the second target IP address corresponding to the domain name information in the second IP list for access if the first target IP address fails to be accessed further comprises:
if the matching between the domain name information and the second IP list fails, defining the matching result as the access failure of a second target IP address, and selecting a pre-written fixed IP address for access.
5. The network access method of claim 1, wherein the step of pre-configuring the first IP list comprises:
detecting network conditions in real time or on a timed basis;
and if the change of the network condition is detected, requesting an IP list corresponding to each domain name from the server to obtain a first IP list under the current network condition.
6. The network access method of claim 5, wherein the step of pre-configuring the second IP list comprises:
detecting network conditions in real time or on a regular basis;
and if the change of the network condition is detected, sending the domain name to be analyzed to a domain name server according to a preset sequence for domain name analysis, and writing the IP address returned by the domain name server into a second IP list.
7. The method according to any of claims 1 to 6, wherein after said selecting a pre-died fixed IP address for access, said method further comprises the steps of:
if the fixed IP address fails to be accessed, acquiring the times of the fixed IP address failure;
if the fixed IP address access failure times are one time, sequentially selecting the IP addresses or the fixed IP addresses in the first IP list or the second IP list again for access;
if the fixed IP address fails to be accessed twice, the IP address or the fixed IP address in the first IP list or the second IP list is selected to be accessed, the domain name information is sent to a domain name server to be analyzed, and the domain name server is used for analyzing the IP address in real time to access.
8. A network access device, comprising:
the acquisition module is used for acquiring domain name information;
the first selecting module is used for selecting a first target IP address corresponding to the domain name information in a pre-configured first IP list according to the domain name information for access, wherein after the server acquires the domain name information, the first IP list corresponding to the domain name in the domain name information is issued to terminal equipment used by a user, and the first IP list comprises at least one first target IP address corresponding to the domain name information; the first IP list is updated in real time according to the network condition of the terminal, and when the network condition is changed, the IP list corresponding to each domain name is requested to the server to obtain the first IP list under the current network condition;
a second selecting module, configured to select a second target IP address corresponding to the domain name information from a second pre-configured IP list for access if the access of the first target IP address fails, where the second IP list is obtained by a domain name server resolving a domain name in the first IP list in advance, or resolving a domain name in the domain name information, and the second IP list includes at least one second target IP address corresponding to the domain name information; the second IP list is updated in real time according to the network conditions of the terminal, and when the network conditions are changed, the domain name to be analyzed is sent to the domain name server for domain name analysis to obtain a second IP list;
and the third selecting module is used for selecting a pre-written fixed IP address for accessing if the second target IP address fails to access, wherein the pre-written fixed IP address is an IP address which is allocated to the domain name information for a long time.
9. A computer arrangement, characterized by a memory in which a computer program is stored and a processor which, when executing the computer program, carries out the steps of the network access method according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of the network access method according to any one of claims 1 to 7.
CN201910775793.7A 2019-08-21 2019-08-21 Network access method, device, computer equipment and storage medium Active CN110677506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910775793.7A CN110677506B (en) 2019-08-21 2019-08-21 Network access method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910775793.7A CN110677506B (en) 2019-08-21 2019-08-21 Network access method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110677506A CN110677506A (en) 2020-01-10
CN110677506B true CN110677506B (en) 2022-10-11

Family

ID=69075421

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910775793.7A Active CN110677506B (en) 2019-08-21 2019-08-21 Network access method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110677506B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422475A (en) * 2020-10-10 2022-04-29 北京金山云网络技术有限公司 IP address switching method and device based on object storage and computer equipment
CN114928588B (en) * 2022-05-11 2024-02-13 上海移远通信技术股份有限公司 Server connection method, internet of things equipment, domain name server and regional server
CN116708459A (en) * 2023-07-20 2023-09-05 广州东瑞科技有限公司 Service access automatic switching method, system, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092787A (en) * 2014-06-24 2014-10-08 腾讯科技(深圳)有限公司 Network access method and system based on DNS
CN105450787A (en) * 2014-08-20 2016-03-30 阿里巴巴集团控股有限公司 Network-address-mapping method, device, and system
CN105991797A (en) * 2016-07-01 2016-10-05 北京奇虎科技有限公司 Method and device for network access by mobile terminal
CN106506715A (en) * 2016-10-14 2017-03-15 乐视控股(北京)有限公司 Domain name analytic method and device
CN108737582A (en) * 2017-04-18 2018-11-02 艺龙网信息技术(北京)有限公司 The method and device of domain name mapping

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581351B (en) * 2012-07-27 2019-07-12 腾讯科技(深圳)有限公司 The method and apparatus of network access
CN107395783B (en) * 2017-07-25 2020-08-28 北京奇艺世纪科技有限公司 IP address processing method, system, device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092787A (en) * 2014-06-24 2014-10-08 腾讯科技(深圳)有限公司 Network access method and system based on DNS
CN105450787A (en) * 2014-08-20 2016-03-30 阿里巴巴集团控股有限公司 Network-address-mapping method, device, and system
CN105991797A (en) * 2016-07-01 2016-10-05 北京奇虎科技有限公司 Method and device for network access by mobile terminal
CN106506715A (en) * 2016-10-14 2017-03-15 乐视控股(北京)有限公司 Domain name analytic method and device
CN108737582A (en) * 2017-04-18 2018-11-02 艺龙网信息技术(北京)有限公司 The method and device of domain name mapping

Also Published As

Publication number Publication date
CN110677506A (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN110519401B (en) Method, device, equipment and storage medium for improving network access success rate
CN108427705B (en) Electronic device, distributed system log query method and storage medium
CN110677506B (en) Network access method, device, computer equipment and storage medium
US20150234927A1 (en) Application search method, apparatus, and terminal
TWI647583B (en) Prompt method and prompting device for login account
US10999721B2 (en) Communication identifier binding processing method and terminal
WO2018149292A1 (en) Object clustering method and apparatus
CN111414407A (en) Data query method and device of database, computer equipment and storage medium
CN110086658B (en) Interface switching method and device and computer readable storage medium
CN106599017B (en) Scanning analytic method, device and the mobile terminal of installation kit
CN106790262B (en) Authentication method and device
US20170372180A1 (en) Smart card read/write method and apparatus
CN108418797B (en) Webpage access method and device, computer equipment and storage medium
CN108959384B (en) Webpage data acquisition method and device, computer equipment and storage medium
CN110134869B (en) Information pushing method, device, equipment and storage medium
CN110704476A (en) Data processing method, device, equipment and storage medium
CN113242331B (en) Different types of address conversion method, device, computer equipment and storage medium
CN113259342A (en) Login verification method, device, computer equipment and medium
CN114095567A (en) Data access request processing method and device, computer equipment and medium
CN112953962A (en) Domain name access method and device
CN111142799A (en) Distributed storage method and device, network node and storage medium
CN113487328A (en) Service identity switching method and device
CN111193804A (en) Distributed storage method and device, network node and storage medium
CN114124883B (en) Data access method and device based on cloud storage address, computer equipment and medium
CN113839944B (en) Method, device, electronic equipment and medium for coping with network attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant