CN112583779B - Network resource access method and device - Google Patents

Network resource access method and device Download PDF

Info

Publication number
CN112583779B
CN112583779B CN201910945805.6A CN201910945805A CN112583779B CN 112583779 B CN112583779 B CN 112583779B CN 201910945805 A CN201910945805 A CN 201910945805A CN 112583779 B CN112583779 B CN 112583779B
Authority
CN
China
Prior art keywords
network
identifier
access
target device
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910945805.6A
Other languages
Chinese (zh)
Other versions
CN112583779A (en
Inventor
李明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201910945805.6A priority Critical patent/CN112583779B/en
Publication of CN112583779A publication Critical patent/CN112583779A/en
Application granted granted Critical
Publication of CN112583779B publication Critical patent/CN112583779B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a network resource access method and device. Wherein, the method comprises the following steps: receiving an access instruction triggered by target equipment; acquiring a network authority identifier corresponding to the target equipment based on the access instruction; and judging whether the network authority identifier corresponding to the target equipment is a first identifier, if so, allowing the target equipment to access a preset network. The method and the device solve the technical problems that in the prior art, when the user accesses the public network resources, the user is examined and approved manually, complexity is high, and efficiency is low.

Description

Network resource access method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for accessing network resources.
Background
In the prior art, a user needs to submit an access work order in an existing asset system in advance when accessing public network resources, and can access public network resources after a series of operations such as work order examination, work order processing and the like are carried out by a special person, so that the efficiency of accessing the public network resources by the user is low, and the complexity is high.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the application provides a network resource access method and device, and the method and device at least solve the technical problems that in the prior art, when a user accesses a public network resource, the user is manually approved, the complexity is high, and the efficiency is low.
According to an aspect of an embodiment of the present application, there is provided a network resource access method, including: receiving an access instruction triggered by target equipment; acquiring a network authority identifier corresponding to the target equipment based on the access instruction; and judging whether the network authority identifier corresponding to the target equipment is a first identifier, if so, allowing the target equipment to access a preset network.
Optionally, before receiving an access instruction triggered by the target device, the method further includes: acquiring a network opening instruction of target equipment; adding a strategy for allowing the target equipment to access a preset network based on the network opening instruction and storing the strategy; and setting the network permission identifier as the first identifier based on the policy.
Optionally, after setting the network permission identifier to the first identifier based on the policy, the method further includes: storing first time information in which the network permission identifier is set as the first identifier.
Optionally, after adding a policy that allows the target device to access a preset network based on the network provisioning instruction and storing the policy, the method further includes: performing a network connectivity test on the target device, wherein the network connectivity test is used for detecting whether the target device can successfully access the preset network; and acquiring a detection result of the network connectivity test, starting a program for setting the network authority identifier as the first identifier based on the strategy if the detection result indicates that the target device can successfully access the preset network, and setting the network authority identifier as a second identifier if the detection result indicates that the target device cannot successfully access the preset network, wherein the second identifier is used for prompting that the network connectivity of the target device is abnormal.
Optionally, the method further comprises: receiving a deleting instruction of the target equipment; deleting the policy based on the delete instruction.
Optionally, after deleting the policy based on the deletion instruction, the method further includes: and setting the network authority identifier as a third identifier, wherein the third identifier is used for indicating that the policy does not exist.
Optionally, before the network permission identifier is set to be the third identifier, the method further includes: performing the network connectivity test on the target device; and acquiring a detection result of the network connectivity test, starting a program for setting the network authority identifier as a third identifier if the detection result indicates that the target device cannot successfully access the preset network, and setting the network authority identifier as a fourth identifier if the detection result indicates that the target device can successfully access the preset network.
Optionally, after the network permission identifier is set to the third identifier, the method further includes: and storing second time information in which the network permission identifier is set as a third identifier.
According to an aspect of an embodiment of the present application, there is provided a network resource access apparatus, including: the receiving module is used for receiving an access instruction triggered by the target equipment; the acquisition module is used for acquiring the network authority identification corresponding to the target equipment based on the access instruction; and the judging module is used for judging whether the network authority identifier corresponding to the target equipment is a first identifier or not, and if so, allowing the target equipment to access a preset network.
According to an aspect of an embodiment of the present application, there is provided an electronic device including at least one processor, and at least one memory connected with the processor, a bus; the processor and the memory complete mutual communication through a bus; the processor is used for calling the program instructions in the memory to execute the network resource access method.
In the embodiment of the application, an access instruction triggered by a receiving target device is adopted; acquiring a network authority identifier corresponding to the target equipment based on the access instruction; judging whether the network authority identifier corresponding to the target equipment is a first identifier, if so, allowing the target equipment to access the preset network, and automatically determining whether the target equipment is allowed to access the preset network according to the network authority identifier, so that the technical effects of saving the time of a user for accessing the preset network and improving the efficiency of the user for accessing the network are achieved, and the technical problems of high complexity and low efficiency caused by manual approval when the user accesses public network resources in the prior art are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow diagram illustrating an alternative network resource access method according to an embodiment of the application;
fig. 2 is a schematic structural diagram of an alternative network resource access device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an alternative electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present application, there is provided a network resource access method embodiment, it should be noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
Fig. 1 is a schematic flowchart of a network resource access method according to an embodiment of the present application, and as shown in fig. 1, the method at least includes the following steps:
step S102, receiving an access instruction triggered by target equipment;
in some optional embodiments of the present application, the target device may be a user computer, and the access instruction is used to request access to a predetermined network, and the predetermined network in the present application may be an external public network.
Step S104, acquiring a network authority identifier corresponding to the target device based on the access instruction;
optionally, the access instruction may include a device identifier of the target device, and the device identifier may have a corresponding relationship with the network authority identifier. Wherein, the device identifier may be an IP address of the target device.
In some optional embodiments of the application, a one-key public network opening button may be added to the asset management system by front-end research and development personnel, a pre-configured automatic opening script is triggered, and the button color is marked as "green" through a detection function after the opening is completed, so that the research and development personnel can check the state by themselves. The network permission identifier may be a button color corresponding to the target device.
Step S106, judging whether the network authority identifier corresponding to the target device is a first identifier, if so, allowing the target device to access a preset network.
Alternatively, the first indication may indicate that the color of the button is green.
Optionally, before receiving an access instruction triggered by the target device, the method further needs to perform the following steps: acquiring a network opening instruction of target equipment; adding a strategy for allowing the target equipment to access a preset network based on the network opening instruction and storing the strategy; and setting the network permission identifier as the first identifier based on the policy.
Optionally, the user can trigger the switch at any time as required, the switch is immediately switched on and off, and the background records the log. The user triggers a button of 'one key opening public network' to be provided with two modules of an opening module and a deleting module, correspondingly, the background script work flow comprises an opening flow and a deleting flow, wherein:
opening a flow, which may refer to obtaining a network opening instruction of the target device;
specifically, after receiving a network opening instruction, the background server may add a policy that allows the target device to access a preset network based on the network opening instruction and store the policy; specifically, whether the current button of 'one key opening the public network' is a third identifier can be judged, the third identifier can be grey, if yes, the network attribution of the IP address of the target device is judged, a background server is logged in, a strategy allowing the IP of the target device to access the public network resources is added, and the strategy/or a configuration corresponding to the strategy is saved.
Optionally, after adding a policy that allows the target device to access a preset network based on the network provisioning instruction and storing the policy, the method further needs to perform the following steps:
performing a network connectivity test on the target device, where the network connectivity test is used to detect whether the target device can successfully access the preset network; and acquiring a detection result of the network connectivity test, if the detection result indicates that the target device can successfully access the preset network, starting a program for setting the network permission identifier as the first identifier based on the strategy, and if the detection result indicates that the target device cannot successfully access the preset network, setting the network permission identifier as a second identifier for prompting the network connectivity abnormality of the target device. Wherein the first mark may be green and the second mark may be red.
Specifically, the IP of the target device can be logged in and a public network resource connectivity test can be performed, if the function of the background server is verified to be normal according to a fixed return code of "time = XXXms", it indicates that the target device can successfully access the preset network, and if the code is not consistent, it is determined to be failed, that is, if the code is not consistent, it indicates that the network connectivity of the target device is abnormal.
Secondly, when the background server returns according to the fixed time = XXXms, the button of 'one key on public network' is marked as 'green', wherein the first mark is green. When the code return is failed, namely the background server does not return the code of 'time = XXXms', a 'one-key public network opening' button in the asset system is marked to be red, the network opening failure is prompted, and a professional is required to be contacted to solve the problem.
Optionally, the method further needs to perform the following steps: receiving a deleting instruction of the target equipment; deleting the policy based on the delete instruction.
Optionally, the deleting process in the background script workflow may be a process in which the background server receives a deleting instruction of the target device and deletes the policy.
Optionally, the background server needs to determine the current color state of "turning on the public network by one key", and if the color state is "green" or "red", the background server determines that the target device IP address belongs to the network, logs in the background server, deletes the policy allowing the target device IP to access the public network resource, and stores the configuration.
Optionally, after deleting the policy based on the delete instruction, the method further needs to perform the following steps: and setting the network authority identifier as a third identifier, wherein the third identifier is used for indicating that the policy does not exist.
Optionally, before setting the network permission identifier as the third identifier, the method further needs to perform the following steps: performing the network connectivity test on the target device; and acquiring a detection result of the network connectivity test, starting a program for setting the network authority identifier as a third identifier if the detection result indicates that the target device cannot successfully access the preset network, and setting the network authority identifier as a fourth identifier if the detection result indicates that the target device can successfully access the preset network.
Optionally, a target device IP can be logged in and a public network resource connectivity test can be performed, and a non-time = XXXms code is returned fixedly to verify that the function is normal, that is, the strategy is successfully deleted; if "time = XXXms" this code consistently considers failure, i.e., the delete policy failed, it needs to be reviewed by a contact professional.
Optionally, after the policy is deleted, the "one-key-on public network" button needs to be marked with gray and marked with the third identifier in the asset management system.
The IP field and the time field of the deletion record are recorded in the "open log".
The "one-key open public network" button is marked in grey at the asset system according to the return code in step C.
Optionally, after setting the network permission identifier as the first identifier based on the policy, the method further needs to perform the following steps: storing first time information in which the network permission identifier is set to the first identifier.
Optionally, after the network permission identifier is set to the first identifier based on the policy, an IP field and a time field of the opening record may be recorded in an "opening log".
Optionally, after the network permission identifier is set as the third identifier, the method further needs to perform the following steps: and storing second time information in which the network permission identifier is set as a third identifier.
Alternatively, after the network permission identifier is set to the third identifier, the IP field and the time field of the deletion record may be recorded in the "open log".
According to the scheme, the user can log in the asset management system to check own resources, the user can adjust the network resource state at any time according to the requirement, the user requirement is rapidly solved and used, the working efficiency is increased, the timeliness work of processing work orders by auditors is reduced, and public network resources can be conveniently and rapidly accessed through the device.
In the embodiment of the application, an access instruction triggered by a receiving target device is adopted; acquiring a network authority identifier corresponding to the target equipment based on the access instruction; judging whether the network authority identifier corresponding to the target equipment is a first identifier, if so, allowing the target equipment to access the preset network, and automatically determining whether the target equipment is allowed to access the preset network according to the network authority identifier, so that the technical effects of saving the time of a user for accessing the preset network and improving the efficiency of the user for accessing the network are achieved, and the technical problems of high complexity and low efficiency caused by manual approval when the user accesses public network resources in the prior art are solved.
According to an embodiment of the present application, there is also provided a network resource access apparatus for implementing the network resource access method, as shown in fig. 2, the apparatus includes: a receiving module 22, an obtaining module 24, and a judging module 26; wherein:
a receiving module 22, configured to receive an access instruction triggered by a target device;
an obtaining module 24, configured to obtain, based on the access instruction, a network permission identifier corresponding to the target device;
a determining module 26, configured to determine whether the network permission identifier corresponding to the target device is a first identifier, and if yes, allow the target device to access a preset network.
Optionally, before receiving the target device-triggered access instruction, the apparatus is further configured to: acquiring a network opening instruction of target equipment; adding a strategy for allowing the target equipment to access a preset network based on the network opening instruction and storing the strategy; and setting the network permission identifier as the first identifier based on the policy.
Optionally, after setting the network permission identifier to the first identifier based on the policy, the apparatus is further configured to: storing first time information in which the network permission identifier is set as the first identifier.
Optionally, after adding a policy that allows the target device to access a preset network based on the network provisioning instruction and storing the policy, the apparatus is further configured to: performing a network connectivity test on the target device, wherein the network connectivity test is used for detecting whether the target device can successfully access the preset network; and acquiring a detection result of the network connectivity test, starting a program for setting the network authority identifier as the first identifier based on the strategy if the detection result indicates that the target device can successfully access the preset network, and setting the network authority identifier as a second identifier if the detection result indicates that the target device cannot successfully access the preset network, wherein the second identifier is used for prompting that the network connectivity of the target device is abnormal.
Optionally, the apparatus is further configured to: receiving a deleting instruction of the target equipment; deleting the policy based on the delete instruction.
Optionally, after deleting the policy based on the deletion instruction, the apparatus is further configured to: and setting the network authority identifier as a third identifier, wherein the third identifier is used for indicating that the policy does not exist.
Optionally, before setting the network permission identifier to be the third identifier, the apparatus is further configured to: performing the network connectivity test on the target device; and acquiring a detection result of the network connectivity test, starting a program for setting the network authority identifier as a third identifier if the detection result indicates that the target device cannot successfully access the preset network, and setting the network authority identifier as a fourth identifier if the detection result indicates that the target device can successfully access the preset network.
Optionally, after setting the network permission identifier to be a third identifier, the apparatus is further configured to: and storing second time information in which the network permission identifier is set as a third identifier.
It should be noted that, reference may be made to the description related to the embodiment shown in fig. 1 for a preferred implementation of the embodiment shown in fig. 2, and details are not repeated here.
The network resource access device comprises a processor and a memory, wherein the receiving module 22, the obtaining module 24, the judging module 26 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the technical problems of high complexity and low efficiency caused by manual approval when a user accesses public network resources in the prior art are solved by adjusting kernel parameters.
An embodiment of the present application provides a storage medium on which a program is stored, which when executed by a processor implements the network resource access method.
The embodiment of the application provides a processor, wherein the processor is used for running a program, and the network resource access method is executed when the program runs.
An embodiment of the present application provides a structure diagram of an electronic device, as shown in fig. 3, the electronic device includes at least one processor 301, and at least one memory 302 and a bus 303 connected to the processor 301; the processor 301 and the memory 302 complete communication with each other through the bus 303; processor 301 is operative to call program instructions in memory 302 to perform the network resource access method described above. The electronic device 30 herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device: receiving an access instruction triggered by target equipment; acquiring a network authority identifier corresponding to the target equipment based on the access instruction; and judging whether the network authority identifier corresponding to the target equipment is a first identifier, if so, allowing the target equipment to access a preset network.
Optionally, before receiving an access instruction triggered by the target device, acquiring a network opening instruction of the target device; adding a strategy for allowing the target equipment to access a preset network based on the network opening instruction and storing the strategy; and setting the network permission identifier as the first identifier based on the policy.
Optionally, after the network permission flag is set to the first flag based on the policy, first time information in which the network permission flag is set to the first flag is stored.
Optionally, after adding a policy that allows the target device to access a preset network based on the network provisioning instruction and storing the policy, performing a network connectivity test on the target device, where the network connectivity test is used to detect whether the target device can successfully access the preset network; and acquiring a detection result of the network connectivity test, if the detection result indicates that the target device can successfully access the preset network, starting a program for setting the network permission identifier as the first identifier based on the strategy, and if the detection result indicates that the target device cannot successfully access the preset network, setting the network permission identifier as a second identifier for prompting the network connectivity abnormality of the target device.
Optionally, receiving a deletion instruction of the target device; deleting the policy based on the delete instruction.
Optionally, after deleting the policy based on the deletion instruction, the network permission identifier is set to a third identifier, where the third identifier is used to indicate that the policy does not exist.
Optionally, before the network permission identifier is set as a third identifier, performing the network connectivity test on the target device; and acquiring a detection result of the network connectivity test, if the detection result indicates that the target device cannot successfully access the preset network, starting a program for setting the network permission identifier as a third identifier, and if the detection result indicates that the target device can successfully access the preset network, setting the network permission identifier as a fourth identifier.
Optionally, after the network permission identifier is set as the third identifier, second time information in which the network permission identifier is set as the third identifier is stored.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a device includes one or more processors (CPUs), memory, and a bus. The device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (trans-entity media) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (7)

1. A method for accessing network resources, comprising:
receiving an access instruction triggered by target equipment;
acquiring a network authority identifier corresponding to the target equipment based on the access instruction;
judging whether the network authority identifier corresponding to the target equipment is a first identifier or not, and if so, allowing the target equipment to access a preset network;
receiving a deleting instruction of the target equipment; deleting a policy based on the delete instruction; performing network connectivity test on the target equipment; and obtaining a detection result of the network connectivity test, setting the network authority identifier as a third identifier if the detection result indicates that the target device cannot successfully access the preset network, and setting the network authority identifier as a fourth identifier if the detection result indicates that the target device can successfully access the preset network, wherein the third identifier is used for indicating that the strategy does not exist, and the strategy is a strategy for allowing the target device to access the preset network.
2. The method of claim 1, wherein prior to receiving the target device triggered access instruction, the method further comprises:
acquiring a network opening instruction of target equipment;
adding a strategy for allowing the target equipment to access a preset network based on the network opening instruction and storing the strategy;
and setting the network permission identifier as the first identifier based on the policy.
3. The method of claim 2, wherein after setting the network permission identifier to the first identifier based on the policy, the method further comprises:
storing first time information in which the network permission identifier is set as the first identifier.
4. The method of claim 3, wherein after adding a policy allowing the target device to access a preset network based on the open network instruction and storing the policy, the method further comprises:
performing a network connectivity test on the target device, wherein the network connectivity test is used for detecting whether the target device can successfully access the preset network;
and acquiring a detection result of the network connectivity test, starting a program for setting the network authority identifier as the first identifier based on the strategy if the detection result indicates that the target device can successfully access the preset network, and setting the network authority identifier as a second identifier if the detection result indicates that the target device cannot successfully access the preset network, wherein the second identifier is used for prompting that the network connectivity of the target device is abnormal.
5. The method of claim 1, wherein after setting the network permission identifier to a third identifier, the method further comprises:
and storing second time information with the network authority identification set as a third identification.
6. A network resource access device, comprising:
the receiving module is used for receiving an access instruction triggered by the target equipment;
the acquisition module is used for acquiring the network authority identification corresponding to the target equipment based on the access instruction;
the judging module is used for judging whether the network authority identification corresponding to the target equipment is a first identification or not, and if so, allowing the target equipment to access a preset network;
the apparatus is further configured to: receiving a deleting instruction of the target equipment; deleting a policy based on the delete instruction; performing network connectivity test on the target equipment; and obtaining a detection result of the network connectivity test, setting the network authority identifier as a third identifier if the detection result indicates that the target device cannot successfully access the preset network, and setting the network authority identifier as a fourth identifier if the detection result indicates that the target device can successfully access the preset network, wherein the third identifier is used for indicating that the strategy does not exist, and the strategy is a strategy for allowing the target device to access the preset network.
7. An electronic device comprising at least one processor, and at least one memory connected to the processor, a bus; the processor and the memory complete mutual communication through a bus; the processor is configured to invoke program instructions in the memory to perform the network resource access method of any one of claims 1 to 5.
CN201910945805.6A 2019-09-30 2019-09-30 Network resource access method and device Active CN112583779B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910945805.6A CN112583779B (en) 2019-09-30 2019-09-30 Network resource access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910945805.6A CN112583779B (en) 2019-09-30 2019-09-30 Network resource access method and device

Publications (2)

Publication Number Publication Date
CN112583779A CN112583779A (en) 2021-03-30
CN112583779B true CN112583779B (en) 2023-04-18

Family

ID=75117078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910945805.6A Active CN112583779B (en) 2019-09-30 2019-09-30 Network resource access method and device

Country Status (1)

Country Link
CN (1) CN112583779B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102271136A (en) * 2011-08-16 2011-12-07 赛尔网络有限公司 Access control method and equipment under NAT (Network Address Translation) network environment
CN102281337A (en) * 2011-07-29 2011-12-14 赛尔网络有限公司 destination address access control method and system
CN104580252A (en) * 2015-01-29 2015-04-29 小米科技有限责任公司 Network access control method and device
CN105592066A (en) * 2015-11-05 2016-05-18 杭州华三通信技术有限公司 Resource access control method and device
CN106060041A (en) * 2016-05-30 2016-10-26 北京琵琶行科技有限公司 Enterprises network access authority control method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102281337A (en) * 2011-07-29 2011-12-14 赛尔网络有限公司 destination address access control method and system
CN102271136A (en) * 2011-08-16 2011-12-07 赛尔网络有限公司 Access control method and equipment under NAT (Network Address Translation) network environment
CN104580252A (en) * 2015-01-29 2015-04-29 小米科技有限责任公司 Network access control method and device
CN105592066A (en) * 2015-11-05 2016-05-18 杭州华三通信技术有限公司 Resource access control method and device
CN106060041A (en) * 2016-05-30 2016-10-26 北京琵琶行科技有限公司 Enterprises network access authority control method and device

Also Published As

Publication number Publication date
CN112583779A (en) 2021-03-30

Similar Documents

Publication Publication Date Title
US20180365085A1 (en) Method and apparatus for monitoring client applications
US20120167095A1 (en) Utilizing user-defined workflow policies to automate changes made to composite workflows
CN114077525A (en) Abnormal log processing method and device, terminal equipment, cloud server and system
CN107102928A (en) Application crash information reporting method and device
CN111222592B (en) Method and device for acquiring two-dimensional code of equipment
CN110971571A (en) Website domain name verification method and related device
CN110941632A (en) Database auditing method, device and equipment
CN112328363B (en) Cloud hard disk mounting method and device
CN113987401A (en) Recording method and device of network general log, storage medium and processor
CN112583779B (en) Network resource access method and device
CN109784051A (en) Protecting information safety method, device and equipment
CN108647102A (en) Service request processing method, device and the electronic equipment of heterogeneous system
CN111324583B (en) Service log classification method and device
CN111241547B (en) Method, device and system for detecting override vulnerability
CN106940647B (en) Code management method and device
CN115757318A (en) Log query method and device, storage medium and electronic equipment
CN113849836A (en) Information prompting method, device and equipment
CN112579189A (en) Configuration file updating method and device
CN107678905B (en) Monitoring method and device
CN111049671A (en) System integration method and device
CN110912900A (en) Boundary intelligent security monitoring method, device and equipment based on Internet of things
CN106301983A (en) A kind of website based on fictitious host computer detection method and device
CN111225075A (en) Configuration method and device for Internet of things directional access service
CN113742664B (en) Monitoring and auditing method, equipment and system
CN114827172B (en) Data migration method and device based on Internet of things and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant