CN112637034A - Method and device for accessing application program - Google Patents

Method and device for accessing application program Download PDF

Info

Publication number
CN112637034A
CN112637034A CN202011510699.8A CN202011510699A CN112637034A CN 112637034 A CN112637034 A CN 112637034A CN 202011510699 A CN202011510699 A CN 202011510699A CN 112637034 A CN112637034 A CN 112637034A
Authority
CN
China
Prior art keywords
vpn
module
accessing
functional module
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011510699.8A
Other languages
Chinese (zh)
Inventor
张学鹏
刘畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202011510699.8A priority Critical patent/CN112637034A/en
Publication of CN112637034A publication Critical patent/CN112637034A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a method and a device for accessing an application program.A user device for installing a first application program firstly receives a first request sent by a user, the first application program is the application program which the user wants to access, the first request is used for accessing a first function module of the first application program, then, the user does not need to determine whether the first function module needs to use a VPN for accessing, the user device determines whether the first function module needs to use the VPN for accessing, if so, when the VPN is in a closed state, the user device automatically opens the VPN, and then, the VPN is used for accessing the first function module. Therefore, the user can access the first functional module needing to use the VPN without manually determining whether the first functional module needs to use the VPN or not and manually opening the VPN.

Description

Method and device for accessing application program
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for accessing an application.
Background
Currently, when an enterprise employee connects an enterprise internal server in a non-enterprise internal Network environment and accesses a related function module with a higher requirement on security level in a certain application, a Virtual Private Network (VPN) is usually adopted to establish a communication link for further access; for some functional modules with low requirements on security level, a VPN (virtual private network) is not needed, and employees can directly access an enterprise internal server from the external Internet. For the function that can be accessed without adopting a VPN, an employee must ensure that the VPN can be accessed through the internet after being closed, so that when accessing enterprise applications, the employee needs to determine whether the function module to be accessed needs to be connected with the VPN or not first, and can access the function module after manually establishing or closing the VPN, which is not only complicated in operation, but also seriously affects the working efficiency, and the user experience is not good.
Therefore, a solution to solve the above problems is urgently needed.
Disclosure of Invention
The technical problem to be solved by the application is to provide a method for accessing an application program, so as to solve the problems that when a user accesses an internal application of an enterprise, whether a function module to be accessed needs to be connected with a VPN (virtual private network) needs to be determined at first, and the access can be performed only after the VPN is manually established or closed, so that the operation is complex and the working efficiency is seriously affected.
In a first aspect, an embodiment of the present application provides a method for accessing an application program, where the method includes:
receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
when the VPN is in a closed state, opening the VPN;
and accessing the first functional module by using the VPN.
Optionally, the determining that the virtual private network VPN is required to be used for accessing the first functional module includes:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
Optionally, the method further includes:
and when the first functional module is quitted from being accessed, the VPN is closed.
Optionally, the method further includes:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
Optionally, the method further includes:
receiving a second request for requesting access to a second function module of the first application;
determining that access to the second functional module does not require use of the VPN;
when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
In a second aspect, an embodiment of the present application provides an apparatus for accessing an application, where the apparatus includes:
a first receiving module to: receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
a first determination module to: determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
an opening module for: when the VPN is in a closed state, opening the VPN;
a first access module to: and accessing the first functional module by using the VPN.
Optionally, the first determining module is configured to:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
Optionally, the apparatus further comprises a closing module, configured to:
and when the first functional module is quitted from being accessed, the VPN is closed.
Optionally, the apparatus further includes a second determining module, configured to:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
Optionally, the apparatus further comprises:
a second receiving module to: receiving a second request for requesting access to a second function module of the first application;
a third determination module to: determining that access to the second functional module does not require use of the VPN;
a second access module to: when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
Compared with the prior art, the embodiment of the application has the following advantages:
in the embodiment of the application, a user device for installing a first application program first receives a first request sent by a user, the first application program is an application program which the user wants to access, the first request is used for accessing a first function module of the first application program, then, the user device determines whether the first function module needs to be accessed by using a VPN or not without determining whether the first function module needs to be accessed by the user, if so, when the VPN is in a closed state, the user device automatically opens the VPN, and then, the first function module is accessed by using the VPN. Therefore, the user can access the first functional module needing to use the VPN without manually determining whether the first functional module needs to use the VPN or not and manually opening the VPN. By adopting the scheme, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic flow chart illustrating a method for accessing an application according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an application accessing device in an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The inventor of the application discovers that currently, when enterprise employees are connected with an enterprise internal server in a non-enterprise internal network environment and access a related function module with higher requirement on security level in a certain application, a communication link is generally established by using a VPN (virtual private network), and then access is performed; for some functional modules with low requirements on security level, a VPN (virtual private network) is not needed, and employees can directly access an enterprise internal server from the external Internet. For the function that can be accessed without adopting a VPN, an employee must ensure that the VPN can be accessed through the internet after being closed, so that when accessing enterprise applications, the employee needs to determine whether the function module to be accessed needs to be connected with the VPN or not first, and can access the function module after manually establishing or closing the VPN, which is not only complicated in operation, but also seriously affects the working efficiency, and the user experience is not good.
In order to solve the above problem, in this embodiment of the application, a user device that installs a first application program first receives a first request sent by a user, where the first application program is an application program that the user wants to access, the first request is used to access a first function module of the first application program, then, the user device determines whether to use a VPN for access without determining whether the first function module needs to use the VPN, and if so, when the VPN is in a closed state, the user device automatically opens the VPN, and then, the user device accesses the first function module by using the VPN. Therefore, the user can access the first functional module needing to use the VPN without manually determining whether the first functional module needs to use the VPN or not and manually opening the VPN. By adopting the scheme, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
Various non-limiting embodiments of the present application are described in detail below with reference to the accompanying drawings.
Exemplary method
Referring to fig. 1, a flowchart illustrating a method for accessing an application program in an embodiment of the present application is shown. The method illustrated in FIG. 1, in one implementation, may be performed by a user device that installs a first application.
In the present embodiment, the method shown in FIG. 1 can be implemented, for example, by the following steps S101-S104.
S101: a first request is received, the first request requesting access to a first function module of a first application.
In this embodiment, when a user wishes to access a first function module of a first application, a corresponding operation is first triggered on a user device, for example, an icon of the first function module is clicked, and after the user triggers the operation, the user device may receive the request. The user equipment may be, for example, a mobile phone or a tablet computer, and it is assumed that a request received by the user equipment is a first request, where the first request is used to request access to a first function module of the first application program, and the first function module may be, for example, an editing document module, a mail receiving and sending module, an enterprise forum module, or an employee training module.
S102: determining that accessing the first functional module requires use of a Virtual Private Network (VPN).
And after receiving the first request, the user equipment determines the first function module which is requested to be accessed by the user according to the first request. After determining the first functional module to which the user requests to access, in order to access the first functional module, it is further determined whether to use the VPN for accessing the first functional module. In an example, a correspondence between each functional module in the first application and whether the VPN needs to be used for access may be pre-saved, and whether the VPN needs to be used for access to the first functional module may be determined by querying the pre-saved correspondence.
In another example, it may also be determined whether accessing the first functional module requires use of the VPN based on a privacy level of the first functional module. For example, for functional modules with high security levels, such as an editing document module, a mail sending and receiving module, etc., it can be preset that the VPN is required to be used for accessing the functional modules with high security levels, and the security requirements of the functions with high security levels are met by performing encrypted communication through the VPN. When the user equipment receives the first request of the user for accessing the 'editing document module', after the 'editing document module' is determined to be in a high security level, the VPN is required to be used when the user equipment can be determined to access the 'editing document module' in the high security level; on the other hand, for functional modules with low security level, such as an enterprise forum module or an employee training module, because the security requirement is low, the VPN does not need to be used for encrypted communication, so that the VPN does not need to be used when the functions with low security level are preset to be accessed. When the user equipment receives the first request of the user for accessing the enterprise forum module, after the enterprise forum module is determined to be in the low security level, the VPN does not need to be used when the user equipment can be determined to access the enterprise forum module in the low security level.
S103: and when the VPN is in a closed state, opening the VPN.
S104: and accessing the first functional module by using the VPN.
In this embodiment, after determining that the VPN is required to be used for accessing the first functional module, the user equipment may open the VPN, so that the user may access the first functional module. It is to be understood that when the VPN is in the off state, the user equipment turns on the VPN; when the VPN is in an open state, the user can directly use the VPN to access the first functional module.
Therefore, when the user accesses the first functional module, it is not necessary to judge whether to use the VPN for accessing the first functional module, and when the user accesses the first functional module, it is not necessary to manually open the VPN, the user only sends the first request to the user equipment, and the user equipment may judge whether to use the VPN for accessing the first functional module according to the first request, and when the user equipment needs to use the VPN, the user equipment automatically opens the VPN. By adopting the scheme, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
Considering that the user equipment cannot receive internet information when the VPN is opened, in one example, when the user equipment exits from accessing the first functional module, the VPN may be closed so that the user equipment can receive internet messages instantly. In this example, the VPN may be shut down by the user device without the user manually shutting down. It can be understood that, when the user finishes accessing the first functional module, the VPN can be closed after the user equipment exits from the first functional module, so that the user equipment can normally receive internet messages.
It is understood that the user device may determine to quit accessing the first functional module when receiving the first instruction sent by the user. The first instruction may be used to lock a screen, or may be used to return to a main interface of the first application program, or may be used to switch the first application program to a background operation.
It should be noted that, for a functional module, such as a second functional module, that is accessible without using the VPN in the first application, the user equipment may determine whether the VPN is in a closed state after determining that the second functional module does not need to be accessed. The second function module may be, for example, a function module with a low security level, such as an enterprise forum module or an employee training module, and the user equipment may determine that the VPN is not needed to be used for accessing the second function module after receiving a second request, where the second request is used for requesting to access the second function module of the first application. When the VPN is in a closed state, the user equipment directly accesses the second functional module through the Internet; or when the VPN is in an open state, the user equipment closes the VPN, and then accesses the second functional module through the Internet. In other words, for the access, a function module of the VPN is not needed, and the user does not need to manually close the VPN, and the user equipment can automatically close the VPN after receiving the access request of the user, thereby improving the user experience.
Exemplary device
Based on the method provided by the above embodiment, the embodiment of the present application further provides an apparatus, which is described below with reference to the accompanying drawings.
Referring to fig. 2, a schematic structural diagram of an access application device in the embodiment of the present application is shown. The apparatus may specifically include, for example:
the first receiving module 201: the first request is used for requesting to access a first function module of a first application program;
the first determination module 202: means for determining that access to the first functional module requires use of a Virtual Private Network (VPN);
the start module 203: when the VPN is in a closed state, the VPN is opened;
the first access module 204: for accessing the first functional module using the VPN.
Through the device, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
In one implementation, the first determining module is configured to:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
In one implementation, the apparatus further includes a shutdown module to:
and when the first functional module is quitted from being accessed, the VPN is closed.
In one implementation, the apparatus further includes a second determining module configured to:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
In one implementation, the apparatus further comprises:
a second receiving module to: receiving a second request for requesting access to a second function module of the first application;
a third determination module to: determining that access to the second functional module does not require use of the VPN;
a second access module to: when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
Since the apparatus 200 is an apparatus corresponding to the method provided in the above method embodiment, and the specific implementation of each unit of the apparatus 200 is the same as that of the above method embodiment, for the specific implementation of each unit of the apparatus 200, reference may be made to the description part of the above method embodiment, and details are not repeated here.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice in the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the attached claims
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A method for accessing an application, the method comprising:
receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
when the VPN is in a closed state, opening the VPN;
and accessing the first functional module by using the VPN.
2. The method of claim 1, wherein determining that accessing the first functional module requires use of a Virtual Private Network (VPN) comprises:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
3. The method of claim 1, further comprising:
and when the first functional module is quitted from being accessed, the VPN is closed.
4. The method of claim 3, further comprising:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
5. The method of claim 1, further comprising:
receiving a second request for requesting access to a second function module of the first application;
determining that access to the second functional module does not require use of the VPN;
when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
6. An apparatus for accessing an application, the apparatus comprising:
a first receiving module to: receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
a first determination module to: determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
an opening module for: when the VPN is in a closed state, opening the VPN;
a first access module to: and accessing the first functional module by using the VPN.
7. The apparatus of claim 6, wherein the first determining module is configured to:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
8. The apparatus of claim 6, further comprising a shutdown module to:
and when the first functional module is quitted from being accessed, the VPN is closed.
9. The apparatus of claim 8, further comprising a second determining module configured to:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
10. The apparatus of claim 6, further comprising:
a second receiving module to: receiving a second request for requesting access to a second function module of the first application;
a third determination module to: determining that access to the second functional module does not require use of the VPN;
a second access module to: when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
CN202011510699.8A 2020-12-18 2020-12-18 Method and device for accessing application program Pending CN112637034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011510699.8A CN112637034A (en) 2020-12-18 2020-12-18 Method and device for accessing application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011510699.8A CN112637034A (en) 2020-12-18 2020-12-18 Method and device for accessing application program

Publications (1)

Publication Number Publication Date
CN112637034A true CN112637034A (en) 2021-04-09

Family

ID=75317656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011510699.8A Pending CN112637034A (en) 2020-12-18 2020-12-18 Method and device for accessing application program

Country Status (1)

Country Link
CN (1) CN112637034A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725683A (en) * 2004-07-22 2006-01-25 乐金电子(惠州)有限公司 Privacy method for vehicle information terminal equipment
US20100161960A1 (en) * 2008-12-17 2010-06-24 Nortel Networks Limited Secure Remote Access Public Communication Environment
CN102158385A (en) * 2010-11-23 2011-08-17 东莞宇龙通信科技有限公司 Data information transmission device and method applied to mobile terminal
CN105722189A (en) * 2016-03-31 2016-06-29 北京金山安全软件有限公司 Control method and device of data network
CN107579966A (en) * 2017-08-28 2018-01-12 新华三技术有限公司 Control method, device, system and the terminal device of remote access to intranet
CN110990798A (en) * 2019-12-02 2020-04-10 珠海格力电器股份有限公司 Application program permission configuration method and device, electronic equipment and storage medium
CN111355720A (en) * 2020-02-25 2020-06-30 深信服科技股份有限公司 Method, system and equipment for accessing intranet by application and computer storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1725683A (en) * 2004-07-22 2006-01-25 乐金电子(惠州)有限公司 Privacy method for vehicle information terminal equipment
US20100161960A1 (en) * 2008-12-17 2010-06-24 Nortel Networks Limited Secure Remote Access Public Communication Environment
CN102158385A (en) * 2010-11-23 2011-08-17 东莞宇龙通信科技有限公司 Data information transmission device and method applied to mobile terminal
CN105722189A (en) * 2016-03-31 2016-06-29 北京金山安全软件有限公司 Control method and device of data network
CN107579966A (en) * 2017-08-28 2018-01-12 新华三技术有限公司 Control method, device, system and the terminal device of remote access to intranet
CN110990798A (en) * 2019-12-02 2020-04-10 珠海格力电器股份有限公司 Application program permission configuration method and device, electronic equipment and storage medium
CN111355720A (en) * 2020-02-25 2020-06-30 深信服科技股份有限公司 Method, system and equipment for accessing intranet by application and computer storage medium

Similar Documents

Publication Publication Date Title
US8584231B2 (en) Service opening method and system, and service opening server
US9240977B2 (en) Techniques for protecting mobile applications
CN103916296B (en) A kind of communication system for merging LAN
US11088931B2 (en) Network speed detection
CN109862196A (en) A kind of online customer service remote interaction method and system
US20220229920A1 (en) Secure link sharing
US20200100234A1 (en) Method and Apparatus for Implementing Mobile Broadband Device Service
KR101306844B1 (en) Method and Apparatus for Searching and Intercepting Web Browsing Action of Smartphone
CN112637034A (en) Method and device for accessing application program
CN101770553B (en) Mobile terminal and calling method for root certificate in mobile terminal
CN103428357A (en) Method and apparatus for realizing local service sharing of mobile terminal operating system
US9609586B2 (en) Controlling access to a network
CN110929269B (en) System authority management method, device, medium and electronic equipment
CN103916857A (en) Device and method for controlling wireless access
CN111757326B (en) Vulnerability prevention and control method, vulnerability prevention and control device, mobile terminal and computer readable storage medium
US20240143319A1 (en) Contextual application delivery
US11467848B2 (en) Portable operating system and portable user data
WO2023230035A1 (en) Techniques for providing security-related information
JP5751172B2 (en) COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL METHOD, COMMUNICATION CONTROL PROGRAM STORAGE MEDIUM
CN114065256A (en) Permission-based page browsing method, service system and electronic equipment
CN117750365A (en) Authentication method, device and system for multi-access edge computing application
CN115550059A (en) WEB access control and redirection system, method and storage medium
CN114205806A (en) Method and device for dynamically controlling virtual SIM card to access core network
CN118019002A (en) Method, device, equipment and storage medium for remotely accessing campus network
CN115277095A (en) Data security access method and device based on API gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210409