CN116318911A - Domain name access method and device, electronic equipment and storage medium - Google Patents

Domain name access method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116318911A
CN116318911A CN202310185493.XA CN202310185493A CN116318911A CN 116318911 A CN116318911 A CN 116318911A CN 202310185493 A CN202310185493 A CN 202310185493A CN 116318911 A CN116318911 A CN 116318911A
Authority
CN
China
Prior art keywords
domain name
access
rule
terminal
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310185493.XA
Other languages
Chinese (zh)
Inventor
范刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Digital Technology Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310185493.XA priority Critical patent/CN116318911A/en
Publication of CN116318911A publication Critical patent/CN116318911A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Abstract

The application provides a domain name access method, a domain name access device, electronic equipment and a domain name access storage medium, relates to the technical field of communication, and solves the technical problems that a user sets some programs on a terminal on the terminal to prohibit access to a cellular network, the terminal cannot be effectively limited to access to a service, and the accuracy and the effectiveness of limiting the terminal to access the service are reduced. The method comprises the following steps: receiving a domain name access request sent by a terminal, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request; determining a target access rule based on the account identification; and in the case that the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access time period, sending a first domain name access response to the terminal, wherein the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier.

Description

Domain name access method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a domain name access method, a domain name access device, an electronic device, and a storage medium.
Background
Currently, a user may set up on a terminal that certain programs on the terminal prohibit access to the cellular network to enable restricting the terminal from accessing services included in the certain program.
However, the above method may not effectively limit the terminal to access the certain service, for example, the service may be included in other programs, and the terminal may access the service through another program, which reduces the accuracy and effectiveness of limiting the terminal to access the service.
Disclosure of Invention
The application provides a domain name access method, a domain name access device, electronic equipment and a storage medium, which solve the technical problems that a user sets some programs on a terminal on the terminal to prohibit access to a cellular network, the terminal cannot be effectively limited to access to a service, and the accuracy and the effectiveness of limiting the terminal to access the service are reduced.
In a first aspect, the present application provides a domain name access method, including: receiving a domain name access request sent by a terminal, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request; determining a target access rule based on the account identifier, wherein rule configuration information of the target access rule comprises a authorized access domain name and an authorized access time period; and in the case that the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access time period, sending a first domain name access response to the terminal, wherein the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier.
Optionally, the domain name access method further includes: and under the condition that the domain name to be accessed is not included in the authorized access domain name and/or the timestamp is not included in the authorized access time period, sending a second domain name access response to the terminal, wherein the second domain name access response comprises target prompt information which is used for prompting the terminal to prohibit access to the domain name to be accessed.
Optionally, the domain name access method further includes: receiving a rule configuration request sent by the terminal, wherein the rule configuration request comprises the account identifier and rule configuration information of the target access rule; determining the target access rule as an access rule corresponding to the user account; and sending a rule configuration response to the terminal, wherein the rule configuration response is used for notifying that the rule configuration information is configured successfully.
Optionally, the server stores a blacklist, where the blacklist includes at least one domain name, and the determining the target access rule as the access rule corresponding to the user account includes: and under the condition that the at least one domain name does not comprise the authorized access domain name, determining the target access rule as the access rule corresponding to the user account.
In a second aspect, the present application provides a domain name access method, including: sending a domain name access request to a server, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request; receiving a first domain name access response sent by the server, wherein the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier, the first domain name access response is sent by the server when the domain name to be accessed is included in an authorized access domain name and the timestamp is included in an authorized access time period, the authorized access domain name and the authorized access time period are the domain name and the time period included in rule configuration information of a target access rule, and the target access rule has a corresponding relation with the account identifier; accessing the domain name to be accessed based on the account identifier.
Optionally, the domain name access method further includes: receiving a second domain name access response sent by the server, wherein the second domain name access response comprises target prompt information, and the target prompt information is used for prompting the terminal to prohibit access to the domain name to be accessed; and displaying the target prompt information.
Optionally, the domain name access method further includes: sending a rule configuration request to the server, wherein the rule configuration request comprises the account identifier and rule configuration information of a target access rule, the rule configuration information comprises an authorized access domain name and an authorized access time period, and the rule configuration request is used for requesting to configure the access rule for the user account; and receiving a rule configuration response sent by the server, wherein the rule configuration response is used for notifying that the rule configuration information is configured successfully.
In a third aspect, the present application provides a domain name access device, including: the device comprises a receiving module, a determining module and a sending module; the receiving module is used for receiving a domain name access request sent by the terminal, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request; the determining module is used for determining a target access rule based on the account identifier, and rule configuration information of the target access rule comprises an authorized access domain name and an authorized access time period; the sending module is configured to send a first domain name access response to the terminal when the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access time period, where the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier.
Optionally, the sending module is further configured to send a second domain name access response to the terminal when the domain name to be accessed is not included in the authorized access domain name and/or the timestamp is not included in the authorized access time period, where the second domain name access response includes target prompt information, and the target prompt information is used to prompt the terminal to prohibit access to the domain name to be accessed.
Optionally, the receiving module is further configured to receive a rule configuration request sent by the terminal, where the rule configuration request includes the account identifier and rule configuration information of the target access rule; the determining module is further configured to determine the target access rule as an access rule corresponding to the user account; the sending module is further configured to send a rule configuration response to the terminal, where the rule configuration response is used to notify that the rule configuration information is configured successfully.
Optionally, the server stores a blacklist, where the blacklist includes at least one domain name, and the determining module is specifically configured to determine the target access rule as the access rule corresponding to the user account when the at least one domain name does not include the authorized access domain name.
In a fourth aspect, the present application provides a domain name access device, including: the device comprises a sending module, a receiving module and a processing module; the sending module is used for sending a domain name access request to the server, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request; the receiving module is used for receiving a first domain name access response sent by the server, wherein the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier, the first domain name access response is sent by the server when the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access time period, the authorized access domain name and the authorized access time period are the domain name and the time period included in the rule configuration information of the target access rule, and the target access rule has a corresponding relation with the account identifier; the processing module is used for accessing the domain name to be accessed based on the account identifier.
Optionally, the domain name access device further comprises a display module; the receiving module is further configured to receive a second domain name access response sent by the server, where the second domain name access response includes target prompt information, where the target prompt information is used to prompt the terminal to prohibit access to the domain name to be accessed; the display module is used for displaying the target prompt information.
Optionally, the sending module is further configured to send a rule configuration request to the server, where the rule configuration request includes the account identifier and rule configuration information of the target access rule, the rule configuration information includes an authorized access domain name and an authorized access time period, and the rule configuration request is used to request that the access rule be configured for the user account; the receiving module is further configured to receive a rule configuration response sent by the server, where the rule configuration response is used to notify that the rule configuration information is configured successfully.
In a fifth aspect, the present application provides an electronic device, comprising: a processor and a memory configured to store processor-executable instructions; wherein the processor is configured to execute the instructions to implement any of the selectable region name access methods of the first aspect described above, or to implement any of the selectable region name access methods of the second aspect described above.
In a sixth aspect, the present application provides a computer-readable storage medium having instructions stored thereon, which when executed by an electronic device, cause the electronic device to perform any one of the selectable region name access methods of the first aspect or any one of the selectable region name access methods of the second aspect.
According to the domain name access method, the device, the electronic equipment and the storage medium, the terminal can send a domain name access request to the server, the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request, the server can determine the target access rule based on the account identifier after receiving the domain name access request sent by the terminal, rule configuration information of the domain name access rule comprises an authorized access domain name and an authorized access time period, the authorized access domain name comprises the domain name to be accessed, and in the case that the authorized access time period comprises the timestamp, the domain name access request is described to meet the target access rule, the terminal has the authority of accessing the domain name to be accessed at the moment corresponding to the timestamp, at this moment, the server can send a first domain name access response to the terminal, the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier, and then the terminal can access the domain name to be accessed based on the account identifier after receiving the first domain name access response. In the application, the server can accurately determine the access rule of the user account, namely the target access rule, according to the account identifier of the user account, and when the server determines that the domain name access request sent by the terminal meets the target access rule, namely the terminal has the authority to access the domain name to be accessed at the moment corresponding to the time stamp, the first domain name access response is sent to the terminal, and then the terminal can access the domain name to be accessed based on the account identifier, so that the accuracy and the effectiveness of limiting the terminal to access the service can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a schematic diagram of a network architecture of a domain name access system according to an embodiment of the present application;
fig. 2 is a flow chart of a domain name access method according to an embodiment of the present application;
fig. 3 is a flow chart of another domain name access method according to an embodiment of the present application;
fig. 4 is a flow chart of another domain name access method according to an embodiment of the present application;
fig. 5 is a flow chart of another domain name access method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an access setting system according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a background management system according to an embodiment of the present application;
fig. 8 is a flowchart of another domain name access method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a domain name access device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another domain name access device according to the application embodiment;
fig. 11 is a schematic structural diagram of another domain name access device according to the application embodiment;
Fig. 12 is a schematic structural diagram of another domain name access device according to the application embodiment.
Detailed Description
The domain name access method, device, electronic equipment and storage medium provided in the embodiments of the present application will be described in detail below with reference to the accompanying drawings.
The terms "first" and "second" and the like in the description and the drawings of the present application are used for distinguishing between different objects and not for describing a particular order of objects, e.g., a first domain name access response and a second domain name access response and the like are used for distinguishing between different domain name access responses and not for describing a particular order of domain name access responses.
Furthermore, references to the terms "comprising" and "having" and any variations thereof in the description of the present application are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed but may optionally include other steps or elements not listed or inherent to such process, method, article, or apparatus.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
The term "and/or" as used herein includes the use of either or both of these methods.
In the description of the present application, unless otherwise indicated, the meaning of "a plurality" means two or more.
Based on the description in the background art, because in the related art, a user sets some programs on a terminal to prohibit access to a cellular network, access to a service by the terminal cannot be effectively limited, and accuracy and effectiveness of limiting access to the service by the terminal are reduced. Based on this, the embodiment of the application provides a domain name access method, a device, an electronic device and a storage medium, a server can accurately determine an access rule of a user account, namely a target access rule, according to an account identifier of the user account, and when the server determines that a domain name access request sent by the terminal meets the target access rule, namely the terminal has authority to access the domain name to be accessed at a time corresponding to the timestamp, the first domain name access response is sent to the terminal, and then the terminal can access the domain name to be accessed based on the account identifier, so that accuracy and effectiveness of limiting a terminal access service by the server can be improved.
The domain name access method, device, electronic equipment and storage medium provided in the embodiments of the present application may be applied to a domain name access system, as shown in fig. 1, where the domain name access system includes a terminal 101 and a server 102. In general, in practical application, the connection between the above devices may be a wireless connection, and for convenience and intuitionistic representation of the connection relationship between the devices, a solid line is used in fig. 1 to illustrate.
The terminal 101 may receive a first domain name access response sent by the server 102, where the first domain name access response is used to instruct the terminal 101 to access a domain name to be accessed based on an account identifier of a user account, and then the terminal 101 may access the domain name to be accessed based on the account identifier of the user account.
In this embodiment of the present application, the server 102 may receive a domain name access request sent by the terminal 101, where the domain name access request includes a domain name to be accessed, an account identifier of a user account, and a timestamp of the domain name access request, and the server 102 may include a case where the domain name to be accessed is authorized to access the domain name.
By way of example, the terminal 101 may be a cell phone, tablet, desktop, laptop, handheld computer, notebook, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook, and cellular phone, personal digital assistant (personal digital assistant, PDA), augmented reality (augmented reality, AR) \virtual reality (VR) device, etc., without particular limitation to the specific form of the terminal 101. The system can perform man-machine interaction with a user through one or more modes of a keyboard, a touch pad, a touch screen, a remote controller, voice interaction or handwriting equipment and the like.
The server 102 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, network acceleration services (content delivery network, CDN), basic cloud computing services such as big data and artificial intelligence platforms, and the like.
The domain name access method, the device, the electronic equipment and the storage medium provided by the embodiment of the application are applied to the application scene of domain name access, when a terminal accesses a domain name to be accessed, a domain name access request can be sent to a server, the domain name access request comprises the domain name to be accessed, an account identifier of a user account and a time stamp of the domain name access request, then a first domain name access response sent by the server is received by the terminal, and the first domain name access response is used for indicating that the terminal accesses the domain name to be accessed based on the account identifier.
As shown in fig. 2, the domain name access method provided in the embodiment of the present application may include S101-S106.
S101, the terminal sends a domain name access request to a server.
Wherein the domain name access request includes a domain name to be accessed, an account identification of the user account, and a timestamp of the domain name access request.
It should be appreciated that the domain name access request is for requesting access to the domain name to be accessed based on the account identification of the user account.
Alternatively, the account identification of the user account may be the mobile user directory number MDN of the user account.
Alternatively, the timestamp of the domain name access request may be the generation time of the domain name access request, or may be the sending time of the domain name access request.
S102, the server receives a domain name access request sent by the terminal.
It will be appreciated that the domain name access request includes the domain name to be accessed, the account identification of the user account, and a timestamp of the domain name access request.
S103, the server determines a target access rule based on the account identifier.
The rule configuration information of the target access rule comprises a domain name authorized to be accessed and a time period authorized to be accessed.
It should be appreciated that the server may store account identifiers for a plurality of user accounts and access rules corresponding to the account identifiers for each of the plurality of user accounts, and the server may determine the access rules corresponding to the user accounts based on the account identifiers for the user accounts.
It can be understood that the target access rule is an access rule corresponding to the user account, and the target access rule is used for characterizing a rule that needs to be satisfied when the terminal accesses the domain name based on the account identifier of the user account.
It should be appreciated that since the rule configuration information of the target access rule includes a domain name authorized to be accessed and a time period authorized to be accessed, the target access rule may be that the domain name authorized to be accessed at the terminal during the time period authorized to be accessed.
It can be understood that the domain name authorized to access is a domain name allowing the user account to access, and when the domain name to be accessed is the domain name authorized to access, the terminal is indicated to have the authority to access the domain name to be accessed.
It should be understood that the authorized access period is a period of time in which access to the user account is allowed, and when the time corresponding to the time stamp is a time included in the authorized access period, it is indicated that the terminal has a right to access the network at the time.
In this embodiment of the present application, the authorized access domain name may be one or more, and the authorized access period may be one or more.
Illustratively, the authorized access period may be 8:00-12:00.
S104, in the case that the domain name to be accessed is included in the authorized access domain name, and the timestamp of the domain name access request is included in the authorized access time period, the server sends a first domain name access response to the terminal.
The first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier of the user account.
It should be understood that, in the case that the domain name to be accessed is included in the authorized access domain name, and the timestamp of the domain name access request is included in the authorized access period, it is explained that the domain name access request satisfies the target access rule, the terminal has the authority to access the domain name to be accessed based on the account identifier at the current time (i.e., the time corresponding to the timestamp of the domain name access request), at this time, the server may determine that the terminal may access the domain name to be accessed, and provide the network service for the terminal based on the account identifier, so that the terminal may access the domain name to be accessed at the current time based on the account identifier.
It will be appreciated that the server may also send the first domain name access response to the terminal.
In an optional implementation manner, the domain name access request may further include a first time period, where the first time period is a time period when the terminal requests to access the domain name to be accessed, and in a case where the domain name to be accessed is included in the authorized access domain name and the first time period is included in the authorized time period, the server may also provide network services for the terminal in the first time period based on the account identifier, and the terminal sends the first domain name access response, so that the terminal may access the domain name to be accessed based on the account identifier in the first time period.
In another alternative implementation, the rule configuration information may further include a target rate, and in a case that the domain name to be accessed is included in the authorized access domain name and a timestamp of the domain name access request is included in the authorized access period, the server may provide the network service for the terminal based on the target rate.
Optionally, the target access rule may further include one or more of a domain name authorized to be accessed, an authorized access period, and a target rate, where the rule configuration information includes, and the server may determine whether the terminal may access the domain name to be accessed based on the target access rule.
Illustratively, the target access rule may be that the terminal may access the authorized access domain name based on the account identification and a target rate.
For example, the rule configuration information may include a domain name a, a domain name B, a time period 1 and a time period 2, and the target access rule may also be that the terminal may access the domain name a in the time period 1 or access the domain name B in the time period 2. Assuming that the domain name to be accessed is domain name a and the timestamp is the time included in the period 1, the server may determine to send a first domain name access response to the terminal.
S105, the terminal receives a first domain name access response sent by the server.
It should be understood that, the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier, the first domain name access response is sent by the server when the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access time period, the authorized access domain name and the authorized access time period are the domain name and the time period included in the rule configuration information of the target access rule, and the target access rule has a corresponding relationship with the account identifier.
S106, the terminal accesses the domain name to be accessed based on the account identifier.
In connection with the description of the above embodiments, it should be understood that, since the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier, the terminal can access the domain name to be accessed based on the account identifier.
The technical scheme provided by the embodiment at least has the following beneficial effects: as known from S101-S106, the terminal may send a domain name access request to the server, where the domain name access request includes a domain name to be accessed, an account identifier of a user account, and a timestamp of the domain name access request, the server may determine, after receiving the domain name access request sent by the terminal, the target access rule based on the account identifier, rule configuration information of the domain name access rule includes a domain name authorized to be accessed and an authorized access time period, where the authorized access domain name includes the domain name to be accessed, and where the authorized access time period includes the timestamp, indicate that the domain name access request satisfies the target access rule, and at this time, the server may send a first domain name access response to the terminal, where the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier, and then the terminal may access the domain name to be accessed based on the account identifier after receiving the first domain name access response. In the embodiment of the application, the server can accurately determine the access rule of the user account, namely the target access rule, according to the account identifier of the user account, and when the server determines that the domain name access request sent by the terminal meets the target access rule, namely the terminal has the authority of accessing the domain name to be accessed at the moment corresponding to the time stamp, the first domain name access response is sent to the terminal, and then the terminal can access the domain name to be accessed based on the account identifier, so that the accuracy and the effectiveness of limiting the terminal to access the service by the server can be improved.
Referring to fig. 2, as shown in fig. 3, the domain name access method provided in the embodiment of the present application further includes S107 to S109.
And S107, the server sends a second domain name access response to the terminal under the condition that the domain name to be accessed is not included in the authorized access domain name and/or the timestamp of the domain name access request is not included in the authorized access time period.
The second domain name access response comprises target prompt information, and the target prompt information is used for prompting prohibition of access to the domain name to be accessed.
It should be understood that, in the case where the domain name to be accessed is not included in the authorized-access domain name, and/or the timestamp of the domain name access request is not included in the authorized-access period, it is indicated that the domain name access request does not satisfy the target access rule, the terminal may not have the right to access the domain name to be accessed, and/or the terminal may not have the right to access the network at the current time (i.e., the time corresponding to the timestamp of the domain name access request), at which time the server may determine to prohibit the terminal from accessing the domain name to be accessed based on the account identifier, and access the response to the second domain name.
Optionally, the server may prohibit the terminal from accessing the domain name to be accessed based on the account identifier by restricting the terminal from accessing the network based on the account identifier.
Optionally, the target prompt information may be text information or an identifier.
The target cue may be, for example, a red exclamation mark.
Optionally, the target prompt information may further include an account identifier of the user account.
S108, the terminal receives a second domain name access response sent by the server.
The second domain name access response comprises target prompt information, and the target prompt information is used for prompting prohibition of access to the domain name to be accessed.
It will be appreciated that the terminal may receive a second domain name access response sent by the server after sending the domain name access request to the server.
S109, the terminal displays target prompt information.
It should be understood that, since the target prompt information is used to prompt to prohibit access to the domain name to be accessed, after the terminal receives the second domain name access response, it may be determined that the terminal cannot access the domain name to be accessed, and the terminal may display the target prompt information.
Referring to fig. 2, as shown in fig. 4, the domain name access method provided in the embodiment of the present application further includes S110 to S114.
S110, the terminal sends a rule configuration request to the server.
The rule configuration request comprises account identification and rule configuration information of target access rules, the rule configuration information comprises an authorized access domain name and an authorized access time period, and the rule configuration request is used for requesting to configure the access rules for the user account.
It can be understood that the terminal can request the server to configure the access rule for the account identifier of the user account based on the rule configuration information of the target access rule, and when the terminal sends a domain name access request to the server, the server can determine whether the terminal has the authority to access the domain name to be accessed based on the access rule of the user account.
It should be appreciated that the target access rule may consist of one or more of the rule configuration information, the target access rule also being included in the rule configuration request.
In this embodiment of the present application, the authorized access domain name may be one or more, the authorized access domain name may also be understood as a domain name white list, and the rule configuration information may also include a prohibited access domain name, where the prohibited access domain name may also be understood as a domain name black list, and the prohibited access domain name is used to represent a domain name that is prohibited from being accessed by the terminal based on the account identifier.
Optionally, the rule configuration information may further include a target access rate, where the target access rate is a rate at which the terminal requests data transmission when accessing the domain name based on the account identifier.
It should be noted that, the terminal sending the domain name access request to the server and the terminal sending the rule configuration request to the server may be the same or different, the server may perform identity verification on the account identifier of the user account, and in case of successful verification, the terminal may send the rule configuration request to the server, and further the server may configure the access rule for the user account based on the rule configuration information.
It should be understood that when the terminal sending the domain name access request to the server is different from the terminal sending the rule configuration request to the server, the server can remotely limit other terminals to access the domain name based on the account identifier, so that the flexibility of the server in limiting the terminal to access the service is improved.
Illustratively, the server may authenticate the user account by way of an authentication code.
S111, the server receives a rule configuration request sent by the terminal.
It will be appreciated that the rule configuration request includes the account identification and rule configuration information for the target access rule.
S112, the server determines the target access rule as the access rule corresponding to the user account.
It may be appreciated that the rule configuration request includes the target access rule, and the server may determine the target access as the access rule corresponding to the user account.
It should be understood that after the server determines the target access rule as an access rule corresponding to the user account, the account identifier of the user account and the corresponding relationship between the target access rules may be stored, and then after the server receives the domain name access request sent by the terminal, the target access rule may be determined based on the account identifier.
Optionally, the server may further combine rule configuration information of the target access rule to generate an access rule corresponding to the user account.
In an implementation manner of the embodiment of the present application, the server may store access rules of multiple user accounts, then determine the number of times that the certain access rule is used, and when the number of times that the certain access rule is used is greater than or equal to the number threshold, the server may recommend the certain access rule to the terminal, and further the terminal may determine the certain access rule as a target access rule, thereby improving efficiency of determining the target access rule by the terminal.
Optionally, the server may further determine the number of authorized-access domain names included in the plurality of rule configuration information, and when the number of authorized-access domain names is greater than or equal to the number threshold, the server may recommend the certain authorized-access domain name to the terminal, and then the terminal may determine the rule configuration information according to the authorized-access domain name recommended by the server.
S113, the server sends a rule configuration response to the terminal.
Wherein the rule configuration response is used to inform the rule configuration information that the configuration was successful.
Optionally, the rule configuration response may include a first hint information, where the first hint information is used to hint that the target access rule configuration is successful.
Optionally, the rule configuration response may further include the target access rule, and the terminal may display the target access rule after receiving the rule configuration response, so that the user account may view the target access rule based on the terminal.
S114, the terminal receives the rule configuration response sent by the server.
It should be appreciated that the rule configuration response is used to inform the rule configuration information that the configuration was successful.
It should be appreciated that the terminal may also send a second rule configuration request to the server after receiving the rule configuration response sent by the server, the second rule configuration request being for requesting updating of the access rule of the user account.
In an optional implementation manner, after determining the target access rule, the server may further issue the target access rule to a terminal corresponding to the account identifier, and then the terminal may store the target access rule, so that when the terminal accesses the domain name to be accessed, the terminal may perform rule verification on the domain name access request, without sending the domain name access request to the server, thereby improving efficiency of limiting access service of the terminal.
In an implementation manner of the embodiment of the present application, a blacklist is stored in the server, where the blacklist includes at least one domain name, and in connection with fig. 4, as shown in fig. 5, the server determines the target access rule as an access rule corresponding to the user account, and specifically includes S1121.
S1121, determining the target access rule as the access rule corresponding to the user account by the server under the condition that at least one domain name does not comprise the authorized access domain name.
It should be understood that the blacklist is a list of domain names that the server prohibits the terminal from accessing, and in a case where the at least one domain name does not include the authorized access domain name, it indicates that the terminal may access the authorized access domain name, at which time the server may determine the target access rule as an access rule corresponding to the user account.
It should be understood that the blacklist is a list of domain names that the server is prohibited from accessing, where the blacklist is used to characterize a list of domain names that the server is prohibited from accessing by all terminals.
It may be appreciated that in the case that the at least one domain name does not include the authorized access domain name, the authorized access domain name is described as the domain name that the server allows the terminal to access, and at this time, the server may determine the target access rule as the access rule corresponding to the user account.
In one implementation manner of the embodiment of the present application, in a case where the at least one domain name includes an authorized access domain name, the authorized access domain name indicates that the server prohibits the domain name that the terminal accesses, at this time, the server determines that the access rule configuration of the user account fails, and sends a second rule configuration response to the terminal, where the second rule configuration response is used to notify that the rule configuration information configuration fails, and then the terminal may receive the second rule configuration response.
Optionally, the authorized access domain name may also be included in the second rule configuration response, and the second rule configuration response may also be used to notify the authorized access domain name of the anomaly.
The domain name access method provided in the present application is described below as an example.
The domain name access system claimed in the application comprises a terminal A, an access setting system and a background management system.
As shown in fig. 6, the access setting system 20 includes an account management module 201, a white list management module 202, a black list management module 203, an access duration management module 204, an access rate management module 205, and a cloud computing module 206, where the account management module 201 is configured to manage a user account corresponding to the terminal, the white list management module 202 is configured to manage an authorized access domain name input by a user, the black list management module 203 is configured to manage an prohibited access domain name input by the user, the access duration management module 204 is configured to manage an authorized access duration, the access rate management module 205 is configured to manage a target rate, and the cloud computing module 206 is configured to manage data generated in the domain name access system.
As shown in fig. 7, the background management system includes a user management module 301, a setting statistics module 302, a setting recommendation module 303, a setting auditing module 304, and a cloud computing module 305, where the user management module 301 is configured to manage access rules of a plurality of user accounts, the setting statistics module 302 is configured to count access rules set by the plurality of user accounts, the setting recommendation module 303 is configured to recommend access rules with a number of times greater than a number of times threshold to the terminal, the setting auditing module 304 is configured to audit the target access rules, and the setting auditing module 304 is configured to audit whether the at least one domain name includes the authorized access domain name, and the cloud computing module 305 is configured to manage data generated in the background management system.
As shown in fig. 8, the domain name access method provided in the embodiment of the present application includes: s201, logging in a user; specifically, the user account may log into the access setting system based on an account identifier of the user account; s202, user authentication; specifically, the access setting system performs identity verification on the user account, and if the verification fails, S201 is executed again, and if the verification succeeds, S203 is executed; s203, accessing the setting; specifically, the terminal may determine the target access rule and rule configuration information of the target access rule; s204, special setting; specifically, the terminal may set a blacklist corresponding to the account identifier of the user account; s205, access submission, specifically, the access setting system can send a rule configuration request to the background management system, wherein the rule configuration request comprises rule configuration information of a target access rule, and the rule configuration information comprises an authorized access domain name and an authorized access time period; s206, logging in by a user; specifically, the user is the background manager, and the background manager can approve the access setting submitted by the access setting system; s207, user authentication; specifically, the background management system verifies the identity of the background manager, and executes S207 if the verification fails, and executes S208 if the verification succeeds; s208, setting approval; specifically, the background management system may determine whether the blacklist stored in the background management system includes the authorized access domain name; when the blacklist stored in the background management system does not include the authorized access domain name, describing that the approval passes, and executing S209 when the approval passes; in the case of approval failure, S203 is performed.
Continuing to show in FIG. 8, S209, save; specifically, the access setting system stores the target access rule; s210, generating an access rule; specifically, the access setting system may generate an access rule of the user account based on rule configuration information of the target access rule; s211, using a cellular network; specifically, terminal a may use a cellular network; s212, network connection detection; specifically, the terminal a may determine whether the terminal a has a network connection, execute S211 if the network connection of the terminal a fails, and execute S213 if the network connection of the terminal a succeeds; s213, accessing the cellular network; specifically, the terminal a may send a domain name access request to the access setting system, where the domain name access request includes a domain name to be accessed, an account identifier of a user account, and a timestamp of the domain name access request, where the domain name access request is used to request access to the domain name to be accessed; s214, access restriction verification; specifically, the access setting system may determine the target access rule based on the account identifier, and determine whether the domain name access request satisfies the target access rule, and in case the verification is passed, the terminal a may perform S215; s215, accessing a cellular network; specifically, the terminal may access the domain name to be accessed.
The embodiment of the present application may divide functional modules of an electronic device or the like according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
In the case of dividing the respective functional modules with the respective functions, fig. 9 shows a schematic diagram of one possible configuration of the domain name accessing apparatus involved in the above-described embodiment, and as shown in fig. 9, the domain name accessing apparatus 40 may include: a receiving module 401, a determining module 402 and a transmitting module 403.
The receiving module 401 is configured to receive a domain name access request sent by a terminal, where the domain name access request includes a domain name to be accessed, an account identifier of a user account, and a timestamp of the domain name access request.
A determining module 402, configured to determine a target access rule based on the account identifier, where rule configuration information of the target access rule includes a domain name authorized to access and a time period authorized to access.
A sending module 403, configured to send, when the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access period, a first domain name access response to the terminal, where the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier.
Optionally, the sending module 403 is further configured to send a second domain name access response to the terminal, where the second domain name access response includes target prompt information, where the target prompt information is used to prompt the terminal to prohibit access to the domain name to be accessed, where the domain name to be accessed is not included in the authorized access domain name, and/or the timestamp is not included in the authorized access period.
Optionally, the receiving module 401 is further configured to receive a rule configuration request sent by the terminal, where the rule configuration request includes the account identifier and rule configuration information of the target access rule.
The determining module 402 is further configured to determine the target access rule as an access rule corresponding to the user account.
The sending module 403 is further configured to send a rule configuration response to the terminal, where the rule configuration response is used to notify that the rule configuration information is configured successfully.
Optionally, a blacklist is stored in the server, and the blacklist includes at least one domain name.
The determining module is specifically configured to determine the target access rule as an access rule corresponding to the user account when the at least one domain name does not include the authorized access domain name.
In case of using an integrated unit, fig. 10 shows a schematic diagram of one possible structure of the domain name access device involved in the above-described embodiment. As shown in fig. 10, the domain name access device 50 may include: a processing module 501 and a communication module 502. The processing module 501 may be configured to control and manage the actions of the domain name access device 50. The communication module 502 may be used to support communication of the domain name access device 50 with other entities. Optionally, as shown in fig. 10, the domain name access device 50 may further include a storage module 503 for storing program codes and data of the domain name access device 50.
Wherein the processing module 501 may be a processor or a controller. The communication module 502 may be a transceiver, a transceiver circuit, a communication interface, or the like. The storage module 503 may be a memory.
Where the processing module 501 is a processor, the communication module 502 is a transceiver, and the storage module 503 is a memory, the processor, the transceiver, and the memory may be connected by a bus. The bus may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus or an extended industry standard architecture (extended industry standard architecture, EISA) bus, or the like. The buses may be divided into address buses, data buses, control buses, etc.
In the case of dividing the respective functional modules with the respective functions, fig. 11 shows a schematic diagram of one possible configuration of the domain name accessing apparatus involved in the above-described embodiment, and as shown in fig. 11, the domain name accessing apparatus 60 may include: a transmitting module 601, a receiving module 602, and a processing module 603.
The sending module 601 is configured to send a domain name access request to a server, where the domain name access request includes a domain name to be accessed, an account identifier of a user account, and a timestamp of the domain name access request.
The receiving module 602 is configured to receive a first domain name access response sent by the server, where the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier, where the first domain name access response is sent by the server when the server includes the domain name to be accessed in a domain name authorized to be accessed and the timestamp is included in a time slot authorized to be accessed, where the domain name authorized to be accessed and the time slot authorized to be accessed are domain names and time slots included in rule configuration information of a target access rule, and the target access rule has a corresponding relationship with the account identifier.
A processing module 603, configured to access the domain name to be accessed based on the account identifier.
Optionally, the domain name access device further includes a display module 604.
The receiving module 602 is further configured to receive a second domain name access response sent by the server, where the second domain name access response includes target prompt information, and the target prompt information is used to prompt the terminal to prohibit access to the domain name to be accessed.
And the display module 604 is used for displaying the target prompt information.
Optionally, the sending module 601 is further configured to send a rule configuration request to the server, where the rule configuration request includes the account identifier and rule configuration information of the target access rule, where the rule configuration information includes an authorized access domain name and an authorized access period, and the rule configuration request is used to request that the access rule be configured for the user account.
The receiving module 602 is further configured to receive a rule configuration response sent by the server, where the rule configuration response is used to notify that the rule configuration information is configured successfully.
In case of using an integrated unit, fig. 12 shows a schematic diagram of one possible structure of the domain name access device involved in the above embodiment. As shown in fig. 12, the domain name access device 70 may include: a processing module 701 and a communication module 702. The processing module 701 may be configured to control and manage the actions of the domain name access device 70. The communication module 702 may be used to support communication of the domain name access device 70 with other entities. Optionally, as shown in fig. 12, the domain name access device 70 may further include a storage module 703 for storing program codes and data of the domain name access device 70.
Wherein the processing module 701 may be a processor or a controller. The communication module 702 may be a transceiver, transceiver circuitry, or a communication interface, among others. The memory module 703 may be a memory.
When the processing module 701 is a processor, the communication module 702 is a transceiver, and the storage module 703 is a memory, the processor, the transceiver and the memory may be connected through a bus. The bus may be a PCI bus or an EISA bus, etc. The buses may be divided into address buses, data buses, control buses, etc.
It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented using a software program, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber terminal line (Digital Subscriber Line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means. The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device including one or more servers, data centers, etc. that can be integrated with the medium. The usable medium may be a magnetic medium (e.g., a floppy Disk, a hard Disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), or the like.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (16)

1. A domain name access method, applied to a server, the method comprising:
receiving a domain name access request sent by a terminal, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request;
determining a target access rule based on the account identifier, wherein rule configuration information of the target access rule comprises an authorized access domain name and an authorized access time period;
and in the case that the domain name to be accessed is included in the authorized access domain name and the timestamp is included in the authorized access time period, sending a first domain name access response to the terminal, wherein the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identification.
2. The domain name access method according to claim 1, wherein the method further comprises:
and under the condition that the domain name to be accessed is not included in the authorized access domain name and/or the timestamp is not included in the authorized access time period, sending a second domain name access response to the terminal, wherein the second domain name access response comprises target prompt information, and the target prompt information is used for prompting the terminal to prohibit access to the domain name to be accessed.
3. The domain name access method according to claim 1 or 2, characterized in that the method further comprises:
receiving a rule configuration request sent by the terminal, wherein the rule configuration request comprises the account identifier and rule configuration information of the target access rule;
determining the target access rule as an access rule corresponding to the user account;
and sending a rule configuration response to the terminal, wherein the rule configuration response is used for notifying that the rule configuration information is successfully configured.
4. A domain name access method according to claim 3, wherein a blacklist is stored in the server, the blacklist includes at least one domain name, and the determining the target access rule as the access rule corresponding to the user account includes:
And under the condition that the at least one domain name does not comprise the authorized access domain name, determining the target access rule as the access rule corresponding to the user account.
5. A domain name access method, applied to a terminal, the method comprising:
sending a domain name access request to a server, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request;
receiving a first domain name access response sent by the server, wherein the first domain name access response is used for indicating the terminal to access the domain name to be accessed based on the account identifier, the first domain name access response is sent by the server when the server includes the domain name to be accessed in a authorized access domain name and the timestamp is included in an authorized access time period, the authorized access domain name and the authorized access time period are domain names and time periods included in rule configuration information of a target access rule, and the target access rule has a corresponding relation with the account identifier;
and accessing the domain name to be accessed based on the account identifier.
6. The domain name access method according to claim 5, wherein the method further comprises:
Receiving a second domain name access response sent by the server, wherein the second domain name access response comprises target prompt information, and the target prompt information is used for prompting the terminal to prohibit access to the domain name to be accessed;
and displaying the target prompt information.
7. The domain name access method according to claim 5 or 6, wherein the method further comprises:
sending a rule configuration request to the server, wherein the rule configuration request comprises the account identifier and rule configuration information of a target access rule, the rule configuration information comprises an authorized access domain name and an authorized access time period, and the rule configuration request is used for requesting to configure the access rule for the user account;
and receiving a rule configuration response sent by the server, wherein the rule configuration response is used for notifying that the rule configuration information is successfully configured.
8. A domain name access device, applied to a server, comprising: the device comprises a receiving module, a determining module and a sending module;
the receiving module is used for receiving a domain name access request sent by the terminal, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request;
The determining module is used for determining a target access rule based on the account identifier, and rule configuration information of the target access rule comprises an authorized access domain name and an authorized access time period;
the sending module is configured to send a first domain name access response to the terminal, where the domain name to be accessed is included in the authorized access domain name, and the authorized access time period includes the timestamp, and the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier.
9. The domain name access device according to claim 8, wherein,
the sending module is further configured to send a second domain name access response to the terminal when the domain name to be accessed is not included in the authorized access domain name and/or the timestamp is not included in the authorized access time period, where the second domain name access response includes target prompt information, and the target prompt information is used to prompt the terminal to prohibit access to the domain name to be accessed.
10. The domain name access device according to claim 8 or 9, characterized in that,
the receiving module is further configured to receive a rule configuration request sent by the terminal, where the rule configuration request includes the account identifier and rule configuration information of the target access rule;
The determining module is further configured to determine the target access rule as an access rule corresponding to the user account;
the sending module is further configured to send a rule configuration response to the terminal, where the rule configuration response is used to notify that the rule configuration information is configured successfully.
11. The domain name access device according to claim 10, wherein the server has a blacklist stored therein, the blacklist including at least one domain name,
the determining module is specifically configured to determine, when the at least one domain name does not include the authorized access domain name, the target access rule as an access rule corresponding to the user account.
12. A domain name access device, applied to a terminal, comprising: the device comprises a sending module, a receiving module and a processing module;
the sending module is used for sending a domain name access request to the server, wherein the domain name access request comprises a domain name to be accessed, an account identifier of a user account and a timestamp of the domain name access request;
the receiving module is configured to receive a first domain name access response sent by the server, where the first domain name access response is used to instruct the terminal to access the domain name to be accessed based on the account identifier, the first domain name access response is sent by the server when the server includes the domain name to be accessed in an authorized access domain name and the authorized access time period includes the timestamp, the authorized access domain name and the authorized access time period are domain names and time periods included in rule configuration information of a target access rule, and the target access rule has a corresponding relationship with the account identifier;
And the processing module is used for accessing the domain name to be accessed based on the account identifier.
13. The domain name access device of claim 12, wherein the domain name access device further comprises a display module;
the receiving module is further configured to receive a second domain name access response sent by the server, where the second domain name access response includes target prompt information, and the target prompt information is used to prompt the terminal to prohibit access to the domain name to be accessed;
the display module is used for displaying the target prompt information.
14. The domain name access device according to claim 12 or 13, characterized in that,
the sending module is further configured to send a rule configuration request to the server, where the rule configuration request includes the account identifier and rule configuration information of a target access rule, the rule configuration information includes an authorized access domain name and an authorized access time period, and the rule configuration request is used to request configuration of an access rule for the user account;
the receiving module is further configured to receive a rule configuration response sent by the server, where the rule configuration response is used to notify that the rule configuration information is configured successfully.
15. An electronic device, the electronic device comprising:
a processor;
a memory configured to store the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the domain name access method of any of claims 1-4 or to implement the domain name access method of any of claims 5-7.
16. A computer readable storage medium having instructions stored thereon, which, when executed by an electronic device, cause the electronic device to perform the domain name access method of any of claims 1-4 or to perform the domain name access method of any of claims 5-7.
CN202310185493.XA 2023-03-01 2023-03-01 Domain name access method and device, electronic equipment and storage medium Pending CN116318911A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310185493.XA CN116318911A (en) 2023-03-01 2023-03-01 Domain name access method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310185493.XA CN116318911A (en) 2023-03-01 2023-03-01 Domain name access method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116318911A true CN116318911A (en) 2023-06-23

Family

ID=86780923

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310185493.XA Pending CN116318911A (en) 2023-03-01 2023-03-01 Domain name access method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116318911A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723172A (en) * 2023-08-07 2023-09-08 北京安迪盟科技有限责任公司 Domain name access control method and device, computer storage medium and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116723172A (en) * 2023-08-07 2023-09-08 北京安迪盟科技有限责任公司 Domain name access control method and device, computer storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US10110578B1 (en) Source-inclusive credential verification
CN112637214A (en) Resource access method and device and electronic equipment
CN103516718A (en) Identity risk score generation and implementation
CN106878250B (en) Cross-application single-state login method and device
CN110365684B (en) Access control method and device for application cluster and electronic equipment
CN107819743B (en) Resource access control method and terminal equipment
CN107248995B (en) Account verification method and device
CN110430167B (en) Temporary account management method, electronic device, management terminal and storage medium
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
CN112672357A (en) Method and device for processing user account in business system and computer equipment
CN111885043B (en) Internet account login method, system, equipment and storage medium
CN116248351A (en) Resource access method and device, electronic equipment and storage medium
CN112887284A (en) Access authentication method and device
CN108718323A (en) A kind of identity identifying method and system
CN116318911A (en) Domain name access method and device, electronic equipment and storage medium
CN113010238A (en) Permission determination method, device and system for micro application call interface
CN106341379B (en) Information processing method, device and system
CN111030997A (en) Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN113365272B (en) Method and system for preventing network from being rubbed
CN113114623B (en) Data connection method, device, terminal equipment and computer readable storage medium
CN114039779A (en) Method and device for safely accessing network, electronic equipment and storage medium
JP2023521901A (en) Mobile application forgery/falsification detection method, computer program, computer-readable recording medium and computer device using user identifier and signature collection
JP2021152816A (en) Information processing system, information processing device, and program
CN112688943B (en) Dynamic password generation method, server, terminal device and storage medium
CN111918224B (en) Short message verification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination