CN112637034A - Method and device for accessing application program - Google Patents
Method and device for accessing application program Download PDFInfo
- Publication number
- CN112637034A CN112637034A CN202011510699.8A CN202011510699A CN112637034A CN 112637034 A CN112637034 A CN 112637034A CN 202011510699 A CN202011510699 A CN 202011510699A CN 112637034 A CN112637034 A CN 112637034A
- Authority
- CN
- China
- Prior art keywords
- vpn
- module
- accessing
- functional module
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a method and a device for accessing an application program.A user device for installing a first application program firstly receives a first request sent by a user, the first application program is the application program which the user wants to access, the first request is used for accessing a first function module of the first application program, then, the user does not need to determine whether the first function module needs to use a VPN for accessing, the user device determines whether the first function module needs to use the VPN for accessing, if so, when the VPN is in a closed state, the user device automatically opens the VPN, and then, the VPN is used for accessing the first function module. Therefore, the user can access the first functional module needing to use the VPN without manually determining whether the first functional module needs to use the VPN or not and manually opening the VPN.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an apparatus for accessing an application.
Background
Currently, when an enterprise employee connects an enterprise internal server in a non-enterprise internal Network environment and accesses a related function module with a higher requirement on security level in a certain application, a Virtual Private Network (VPN) is usually adopted to establish a communication link for further access; for some functional modules with low requirements on security level, a VPN (virtual private network) is not needed, and employees can directly access an enterprise internal server from the external Internet. For the function that can be accessed without adopting a VPN, an employee must ensure that the VPN can be accessed through the internet after being closed, so that when accessing enterprise applications, the employee needs to determine whether the function module to be accessed needs to be connected with the VPN or not first, and can access the function module after manually establishing or closing the VPN, which is not only complicated in operation, but also seriously affects the working efficiency, and the user experience is not good.
Therefore, a solution to solve the above problems is urgently needed.
Disclosure of Invention
The technical problem to be solved by the application is to provide a method for accessing an application program, so as to solve the problems that when a user accesses an internal application of an enterprise, whether a function module to be accessed needs to be connected with a VPN (virtual private network) needs to be determined at first, and the access can be performed only after the VPN is manually established or closed, so that the operation is complex and the working efficiency is seriously affected.
In a first aspect, an embodiment of the present application provides a method for accessing an application program, where the method includes:
receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
when the VPN is in a closed state, opening the VPN;
and accessing the first functional module by using the VPN.
Optionally, the determining that the virtual private network VPN is required to be used for accessing the first functional module includes:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
Optionally, the method further includes:
and when the first functional module is quitted from being accessed, the VPN is closed.
Optionally, the method further includes:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
Optionally, the method further includes:
receiving a second request for requesting access to a second function module of the first application;
determining that access to the second functional module does not require use of the VPN;
when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
In a second aspect, an embodiment of the present application provides an apparatus for accessing an application, where the apparatus includes:
a first receiving module to: receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
a first determination module to: determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
an opening module for: when the VPN is in a closed state, opening the VPN;
a first access module to: and accessing the first functional module by using the VPN.
Optionally, the first determining module is configured to:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
Optionally, the apparatus further comprises a closing module, configured to:
and when the first functional module is quitted from being accessed, the VPN is closed.
Optionally, the apparatus further includes a second determining module, configured to:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
Optionally, the apparatus further comprises:
a second receiving module to: receiving a second request for requesting access to a second function module of the first application;
a third determination module to: determining that access to the second functional module does not require use of the VPN;
a second access module to: when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
Compared with the prior art, the embodiment of the application has the following advantages:
in the embodiment of the application, a user device for installing a first application program first receives a first request sent by a user, the first application program is an application program which the user wants to access, the first request is used for accessing a first function module of the first application program, then, the user device determines whether the first function module needs to be accessed by using a VPN or not without determining whether the first function module needs to be accessed by the user, if so, when the VPN is in a closed state, the user device automatically opens the VPN, and then, the first function module is accessed by using the VPN. Therefore, the user can access the first functional module needing to use the VPN without manually determining whether the first functional module needs to use the VPN or not and manually opening the VPN. By adopting the scheme, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic flow chart illustrating a method for accessing an application according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an application accessing device in an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The inventor of the application discovers that currently, when enterprise employees are connected with an enterprise internal server in a non-enterprise internal network environment and access a related function module with higher requirement on security level in a certain application, a communication link is generally established by using a VPN (virtual private network), and then access is performed; for some functional modules with low requirements on security level, a VPN (virtual private network) is not needed, and employees can directly access an enterprise internal server from the external Internet. For the function that can be accessed without adopting a VPN, an employee must ensure that the VPN can be accessed through the internet after being closed, so that when accessing enterprise applications, the employee needs to determine whether the function module to be accessed needs to be connected with the VPN or not first, and can access the function module after manually establishing or closing the VPN, which is not only complicated in operation, but also seriously affects the working efficiency, and the user experience is not good.
In order to solve the above problem, in this embodiment of the application, a user device that installs a first application program first receives a first request sent by a user, where the first application program is an application program that the user wants to access, the first request is used to access a first function module of the first application program, then, the user device determines whether to use a VPN for access without determining whether the first function module needs to use the VPN, and if so, when the VPN is in a closed state, the user device automatically opens the VPN, and then, the user device accesses the first function module by using the VPN. Therefore, the user can access the first functional module needing to use the VPN without manually determining whether the first functional module needs to use the VPN or not and manually opening the VPN. By adopting the scheme, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
Various non-limiting embodiments of the present application are described in detail below with reference to the accompanying drawings.
Exemplary method
Referring to fig. 1, a flowchart illustrating a method for accessing an application program in an embodiment of the present application is shown. The method illustrated in FIG. 1, in one implementation, may be performed by a user device that installs a first application.
In the present embodiment, the method shown in FIG. 1 can be implemented, for example, by the following steps S101-S104.
S101: a first request is received, the first request requesting access to a first function module of a first application.
In this embodiment, when a user wishes to access a first function module of a first application, a corresponding operation is first triggered on a user device, for example, an icon of the first function module is clicked, and after the user triggers the operation, the user device may receive the request. The user equipment may be, for example, a mobile phone or a tablet computer, and it is assumed that a request received by the user equipment is a first request, where the first request is used to request access to a first function module of the first application program, and the first function module may be, for example, an editing document module, a mail receiving and sending module, an enterprise forum module, or an employee training module.
S102: determining that accessing the first functional module requires use of a Virtual Private Network (VPN).
And after receiving the first request, the user equipment determines the first function module which is requested to be accessed by the user according to the first request. After determining the first functional module to which the user requests to access, in order to access the first functional module, it is further determined whether to use the VPN for accessing the first functional module. In an example, a correspondence between each functional module in the first application and whether the VPN needs to be used for access may be pre-saved, and whether the VPN needs to be used for access to the first functional module may be determined by querying the pre-saved correspondence.
In another example, it may also be determined whether accessing the first functional module requires use of the VPN based on a privacy level of the first functional module. For example, for functional modules with high security levels, such as an editing document module, a mail sending and receiving module, etc., it can be preset that the VPN is required to be used for accessing the functional modules with high security levels, and the security requirements of the functions with high security levels are met by performing encrypted communication through the VPN. When the user equipment receives the first request of the user for accessing the 'editing document module', after the 'editing document module' is determined to be in a high security level, the VPN is required to be used when the user equipment can be determined to access the 'editing document module' in the high security level; on the other hand, for functional modules with low security level, such as an enterprise forum module or an employee training module, because the security requirement is low, the VPN does not need to be used for encrypted communication, so that the VPN does not need to be used when the functions with low security level are preset to be accessed. When the user equipment receives the first request of the user for accessing the enterprise forum module, after the enterprise forum module is determined to be in the low security level, the VPN does not need to be used when the user equipment can be determined to access the enterprise forum module in the low security level.
S103: and when the VPN is in a closed state, opening the VPN.
S104: and accessing the first functional module by using the VPN.
In this embodiment, after determining that the VPN is required to be used for accessing the first functional module, the user equipment may open the VPN, so that the user may access the first functional module. It is to be understood that when the VPN is in the off state, the user equipment turns on the VPN; when the VPN is in an open state, the user can directly use the VPN to access the first functional module.
Therefore, when the user accesses the first functional module, it is not necessary to judge whether to use the VPN for accessing the first functional module, and when the user accesses the first functional module, it is not necessary to manually open the VPN, the user only sends the first request to the user equipment, and the user equipment may judge whether to use the VPN for accessing the first functional module according to the first request, and when the user equipment needs to use the VPN, the user equipment automatically opens the VPN. By adopting the scheme, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
Considering that the user equipment cannot receive internet information when the VPN is opened, in one example, when the user equipment exits from accessing the first functional module, the VPN may be closed so that the user equipment can receive internet messages instantly. In this example, the VPN may be shut down by the user device without the user manually shutting down. It can be understood that, when the user finishes accessing the first functional module, the VPN can be closed after the user equipment exits from the first functional module, so that the user equipment can normally receive internet messages.
It is understood that the user device may determine to quit accessing the first functional module when receiving the first instruction sent by the user. The first instruction may be used to lock a screen, or may be used to return to a main interface of the first application program, or may be used to switch the first application program to a background operation.
It should be noted that, for a functional module, such as a second functional module, that is accessible without using the VPN in the first application, the user equipment may determine whether the VPN is in a closed state after determining that the second functional module does not need to be accessed. The second function module may be, for example, a function module with a low security level, such as an enterprise forum module or an employee training module, and the user equipment may determine that the VPN is not needed to be used for accessing the second function module after receiving a second request, where the second request is used for requesting to access the second function module of the first application. When the VPN is in a closed state, the user equipment directly accesses the second functional module through the Internet; or when the VPN is in an open state, the user equipment closes the VPN, and then accesses the second functional module through the Internet. In other words, for the access, a function module of the VPN is not needed, and the user does not need to manually close the VPN, and the user equipment can automatically close the VPN after receiving the access request of the user, thereby improving the user experience.
Exemplary device
Based on the method provided by the above embodiment, the embodiment of the present application further provides an apparatus, which is described below with reference to the accompanying drawings.
Referring to fig. 2, a schematic structural diagram of an access application device in the embodiment of the present application is shown. The apparatus may specifically include, for example:
the first receiving module 201: the first request is used for requesting to access a first function module of a first application program;
the first determination module 202: means for determining that access to the first functional module requires use of a Virtual Private Network (VPN);
the start module 203: when the VPN is in a closed state, the VPN is opened;
the first access module 204: for accessing the first functional module using the VPN.
Through the device, the user operation during the access of the first functional module is simplified, the working efficiency can be obviously improved, and the user experience is improved.
In one implementation, the first determining module is configured to:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
In one implementation, the apparatus further includes a shutdown module to:
and when the first functional module is quitted from being accessed, the VPN is closed.
In one implementation, the apparatus further includes a second determining module configured to:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
In one implementation, the apparatus further comprises:
a second receiving module to: receiving a second request for requesting access to a second function module of the first application;
a third determination module to: determining that access to the second functional module does not require use of the VPN;
a second access module to: when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
Since the apparatus 200 is an apparatus corresponding to the method provided in the above method embodiment, and the specific implementation of each unit of the apparatus 200 is the same as that of the above method embodiment, for the specific implementation of each unit of the apparatus 200, reference may be made to the description part of the above method embodiment, and details are not repeated here.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice in the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the attached claims
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.
Claims (10)
1. A method for accessing an application, the method comprising:
receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
when the VPN is in a closed state, opening the VPN;
and accessing the first functional module by using the VPN.
2. The method of claim 1, wherein determining that accessing the first functional module requires use of a Virtual Private Network (VPN) comprises:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
3. The method of claim 1, further comprising:
and when the first functional module is quitted from being accessed, the VPN is closed.
4. The method of claim 3, further comprising:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
5. The method of claim 1, further comprising:
receiving a second request for requesting access to a second function module of the first application;
determining that access to the second functional module does not require use of the VPN;
when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
6. An apparatus for accessing an application, the apparatus comprising:
a first receiving module to: receiving a first request, wherein the first request is used for requesting to access a first function module of a first application program;
a first determination module to: determining that accessing the first functional module requires the use of a Virtual Private Network (VPN);
an opening module for: when the VPN is in a closed state, opening the VPN;
a first access module to: and accessing the first functional module by using the VPN.
7. The apparatus of claim 6, wherein the first determining module is configured to:
determining a security level of the first functional module;
and determining that the VPN is required to be used for accessing the first functional module according to the security level of the first functional module.
8. The apparatus of claim 6, further comprising a shutdown module to:
and when the first functional module is quitted from being accessed, the VPN is closed.
9. The apparatus of claim 8, further comprising a second determining module configured to:
when a first instruction is received, determining to quit accessing the first functional module;
wherein:
the first instruction is used for locking a screen, or the first instruction is used for returning to a main interface of the first application program, or the first instruction is used for switching the first application program to a background to run.
10. The apparatus of claim 6, further comprising:
a second receiving module to: receiving a second request for requesting access to a second function module of the first application;
a third determination module to: determining that access to the second functional module does not require use of the VPN;
a second access module to: when the VPN is in a closed state, accessing the second functional module through the Internet; or when the VPN is in an open state, closing the VPN and accessing the second functional module through the Internet.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011510699.8A CN112637034A (en) | 2020-12-18 | 2020-12-18 | Method and device for accessing application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011510699.8A CN112637034A (en) | 2020-12-18 | 2020-12-18 | Method and device for accessing application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112637034A true CN112637034A (en) | 2021-04-09 |
Family
ID=75317656
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011510699.8A Pending CN112637034A (en) | 2020-12-18 | 2020-12-18 | Method and device for accessing application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112637034A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725683A (en) * | 2004-07-22 | 2006-01-25 | 乐金电子(惠州)有限公司 | Privacy method for vehicle information terminal equipment |
US20100161960A1 (en) * | 2008-12-17 | 2010-06-24 | Nortel Networks Limited | Secure Remote Access Public Communication Environment |
CN102158385A (en) * | 2010-11-23 | 2011-08-17 | 东莞宇龙通信科技有限公司 | Data information transmission device and method applied to mobile terminal |
CN105722189A (en) * | 2016-03-31 | 2016-06-29 | 北京金山安全软件有限公司 | Control method and device of data network |
CN107579966A (en) * | 2017-08-28 | 2018-01-12 | 新华三技术有限公司 | Control method, device, system and the terminal device of remote access to intranet |
CN110990798A (en) * | 2019-12-02 | 2020-04-10 | 珠海格力电器股份有限公司 | Application program permission configuration method and device, electronic equipment and storage medium |
CN111355720A (en) * | 2020-02-25 | 2020-06-30 | 深信服科技股份有限公司 | Method, system and equipment for accessing intranet by application and computer storage medium |
-
2020
- 2020-12-18 CN CN202011510699.8A patent/CN112637034A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1725683A (en) * | 2004-07-22 | 2006-01-25 | 乐金电子(惠州)有限公司 | Privacy method for vehicle information terminal equipment |
US20100161960A1 (en) * | 2008-12-17 | 2010-06-24 | Nortel Networks Limited | Secure Remote Access Public Communication Environment |
CN102158385A (en) * | 2010-11-23 | 2011-08-17 | 东莞宇龙通信科技有限公司 | Data information transmission device and method applied to mobile terminal |
CN105722189A (en) * | 2016-03-31 | 2016-06-29 | 北京金山安全软件有限公司 | Control method and device of data network |
CN107579966A (en) * | 2017-08-28 | 2018-01-12 | 新华三技术有限公司 | Control method, device, system and the terminal device of remote access to intranet |
CN110990798A (en) * | 2019-12-02 | 2020-04-10 | 珠海格力电器股份有限公司 | Application program permission configuration method and device, electronic equipment and storage medium |
CN111355720A (en) * | 2020-02-25 | 2020-06-30 | 深信服科技股份有限公司 | Method, system and equipment for accessing intranet by application and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8584231B2 (en) | Service opening method and system, and service opening server | |
US9240977B2 (en) | Techniques for protecting mobile applications | |
CN103916296B (en) | A kind of communication system for merging LAN | |
US11088931B2 (en) | Network speed detection | |
CN109862196A (en) | A kind of online customer service remote interaction method and system | |
US20220229920A1 (en) | Secure link sharing | |
US20200100234A1 (en) | Method and Apparatus for Implementing Mobile Broadband Device Service | |
KR101306844B1 (en) | Method and Apparatus for Searching and Intercepting Web Browsing Action of Smartphone | |
CN112637034A (en) | Method and device for accessing application program | |
CN101770553B (en) | Mobile terminal and calling method for root certificate in mobile terminal | |
CN103428357A (en) | Method and apparatus for realizing local service sharing of mobile terminal operating system | |
US9609586B2 (en) | Controlling access to a network | |
CN110929269B (en) | System authority management method, device, medium and electronic equipment | |
CN103916857A (en) | Device and method for controlling wireless access | |
CN111757326B (en) | Vulnerability prevention and control method, vulnerability prevention and control device, mobile terminal and computer readable storage medium | |
US20240143319A1 (en) | Contextual application delivery | |
US11467848B2 (en) | Portable operating system and portable user data | |
WO2023230035A1 (en) | Techniques for providing security-related information | |
JP5751172B2 (en) | COMMUNICATION CONTROL DEVICE, COMMUNICATION CONTROL METHOD, COMMUNICATION CONTROL PROGRAM STORAGE MEDIUM | |
CN114065256A (en) | Permission-based page browsing method, service system and electronic equipment | |
CN117750365A (en) | Authentication method, device and system for multi-access edge computing application | |
CN115550059A (en) | WEB access control and redirection system, method and storage medium | |
CN114205806A (en) | Method and device for dynamically controlling virtual SIM card to access core network | |
CN118019002A (en) | Method, device, equipment and storage medium for remotely accessing campus network | |
CN115277095A (en) | Data security access method and device based on API gateway |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210409 |