WO2018157362A1 - 一种访问控制方法和终端 - Google Patents

一种访问控制方法和终端 Download PDF

Info

Publication number
WO2018157362A1
WO2018157362A1 PCT/CN2017/075492 CN2017075492W WO2018157362A1 WO 2018157362 A1 WO2018157362 A1 WO 2018157362A1 CN 2017075492 W CN2017075492 W CN 2017075492W WO 2018157362 A1 WO2018157362 A1 WO 2018157362A1
Authority
WO
WIPO (PCT)
Prior art keywords
vpn
access request
whitelist
prompt message
lock screen
Prior art date
Application number
PCT/CN2017/075492
Other languages
English (en)
French (fr)
Inventor
廖建强
Original Assignee
廖建强
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 廖建强 filed Critical 廖建强
Priority to PCT/CN2017/075492 priority Critical patent/WO2018157362A1/zh
Publication of WO2018157362A1 publication Critical patent/WO2018157362A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers

Definitions

  • the present invention relates to the field of computers, and in particular, to an access control method and terminal.
  • VPN Virtual Private Network
  • the user pre-registers the VPN account information, logs in to the VPN server through the VPN account information, and forwards the user's access request to the destination server after the VPN server passes the verification.
  • the applicant finds that the current VPN account information is only used. The way to access is not secure enough.
  • the technical problem to be solved by the embodiments of the present invention is to provide an access control method and a terminal. Can improve the security of VPN access.
  • an embodiment of the present invention provides an access control method, including:
  • the VPN access request includes, but is not limited to, HTTP (HyperText Transfer Protocol) access request, FTP (File Transfer Protocol) access request, and UDP ( User Datagram Protocol (User Datagram Protocol) access request
  • the VPN access request may be issued by the application on the terminal after the terminal logs in to the VPN server, and the application includes but is not limited to a browser, an audio player, a video player, and an electronic
  • the VPN access request carries the pre-registered VPN account information
  • the first prompt message prompts the user to input the lock screen password
  • the lock screen password includes but is not limited to the fingerprint password, the digital password, the graphic password, and the first prompt message.
  • the display is located at the top of the current interface; the user inputs a lock screen password according to the prompt of the first prompt message displayed on the terminal.
  • the lock screen password is a fingerprint password
  • the user inputs fingerprint information on the fingerprint sensor;
  • the terminal receives the input lock screen password;
  • the terminal stores the pre-registered lock screen password, and the terminal compares the input lock screen password with the pre-registered lock screen password. If the same, the verification is passed, the terminal will VPN The access request is sent to the corresponding VPN server, and the VPN server verifies the VPN account letter carried in the VPN access request.
  • the VPN access request is sent to the target server, for example, the target server is a web server, a video server, a file server, or an instant messaging server.
  • the terminal when receiving the VPN access request, the terminal prompts the user to input a lock screen password, and after verifying that the lock screen password is passed, sends a VPN access request to the VPN server, thereby providing dual authentication of the terminal and the VPN server, thereby improving VPN access. Security.
  • the terminal presets the VPN account information, and associates the preset lock screen password with the VPN account information.
  • the VPN account information includes the VPN user name and password.
  • the terminal can preset a mapping table. Each entry in the mapping table stores the VPN account information and the lock screen password with the associated relationship.
  • the method further includes:
  • a whitelist is set, and the whitelist includes at least one website.
  • the white list includes the website google.com, so that the next time the user accesses google.com through VPN, the terminal allows the VPN access request to be sent to the VPN server, and the VPN server forwards the VPN access request to the server of google.com.
  • the setting a whitelist further includes:
  • the whitelist After receiving the confirmation command indicating that the whitelist is turned on, the whitelist is started.
  • the second aspect further provides a terminal, including: a prompting module, a receiving module, and a verification module.
  • the prompting module is configured to display a first prompt message when receiving the virtual private network VPN access request, where the VPN access request carries VPN account information, and the first prompt message prompts the user to input a lock screen password;
  • a receiving module configured to receive an input lock screen password
  • the verification module is configured to send the VPN access request to the VPN server after the password of the lock screen is passed.
  • the terminal when receiving the VPN access request, the terminal prompts the user to input a lock screen password, and after verifying that the lock screen password is passed, sends a VPN access request to the VPN server, thereby providing the terminal and the Double authentication of the VPN server to improve the security of VPN access.
  • the method further includes:
  • the association module is configured to set VPN account information, and associate the preset lock screen password with the VPN account information.
  • the method further includes:
  • a determining module configured to determine a website corresponding to the VPN access request
  • the method further includes:
  • the whitelist setting module is configured to set a whitelist, and the whitelist includes at least one website.
  • the whitelist setting module is further configured to:
  • the whitelist After receiving the confirmation command indicating that the whitelist is turned on, the whitelist is started.
  • FIG. 1 is a schematic flow chart of an access control method of the present invention
  • FIG. 2 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 3 is another schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of an access control method according to an embodiment of the present invention.
  • the method includes:
  • the first prompt message is displayed when the virtual private network VPN access request is received.
  • the VPN access request carries the VPN account information, and the first prompt message prompts the user to input the lock screen password.
  • the first prompt message is displayed, and the VPN access request includes, but is not limited to, an HTTP (HyperText Transfer Protocol) access request, and an FTP (File Transfer Protocol) access request.
  • UDP User Datagram Protocol
  • the VPN access request may be sent by the application on the terminal after the terminal logs in to the VPN server, and the application includes but is not limited to a browser, an audio player, or a video player.
  • the VPN access request carries the pre-registered VPN account information, and the first prompt message prompts the user to input a lock screen password.
  • the lock screen password includes but is not limited to a fingerprint password, a digital password, a graphic password, and the like.
  • the display of a prompt message is located at the top level of the current interface.
  • the user inputs a lock screen password according to the prompt of the first prompt message displayed on the terminal.
  • the lock screen password is a fingerprint password
  • the user inputs fingerprint information on the fingerprint sensor
  • the password is a digital password
  • the user enters a numeric password in the input box; the terminal receives the input lock screen password; the terminal stores a pre-registered lock screen password.
  • the terminal compares the input lock screen password with the pre-registered lock screen password. If the same is the same, the terminal passes the VPN access request to the corresponding VPN server, and the VPN server verifies the VPN account carried in the VPN access request. After the information is passed, the VPN access request is sent to the target server, for example, the target server is a web server, a video server, a file server, or an instant messaging server.
  • the target server is a web server, a video server, a file server, or an instant messaging server.
  • the terminal When the terminal receives the VPN access request, the terminal prompts the user to input a lock screen password, and after verifying that the lock screen password is passed, sends a VPN access request to the VPN server, thereby providing dual authentication of the terminal and the VPN server, and improving the VPN. Access security.
  • the method before the receiving the virtual private network VPN access request, before displaying the first prompt message, the method further includes:
  • the terminal presets the VPN account information, and associates the preset lock screen password with the VPN account information.
  • the VPN account information includes the VPN user name and password.
  • the terminal can preset a mapping table. Each entry in the mapping table stores the VPN account information and the lock screen password with the associated relationship.
  • the method further includes:
  • the method further includes:
  • a whitelist is set, which includes at least one website.
  • a whitelist is set, and the whitelist includes at least one website.
  • the white list includes the website google.com, so that the next time the user accesses google.com through VPN, the terminal allows the VPN access request to be sent to the VPN server, and the VPN server forwards the VPN access request to the server of google.com.
  • the setting a whitelist further includes:
  • the whitelist After receiving the confirmation command indicating that the whitelist is turned on, the whitelist is started.
  • FIG. 2 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the terminal in the embodiment of the present invention is used to perform an access control method in FIG. 1 , and the terminology and process involved may refer to the embodiment of FIG. 1 . description.
  • the terminal 2 includes a prompting module 201, a receiving module 202, and a verification module 203.
  • the prompting module 201 is configured to display a first prompt message when receiving the virtual private network VPN access request, where the VPN access request carries the VPN account information, and the first prompt message prompts the user to input the lock screen password.
  • the receiving module 202 is configured to receive the input lock screen password.
  • the verification module 203 is configured to send the VPN access request to the VPN server after verifying that the lock screen password is passed.
  • the terminal when receiving the VPN access request, the terminal prompts the user to input a lock screen password, and after verifying that the lock screen password is passed, sends a VPN access request to the VPN server, thereby providing the terminal and the Double authentication of the VPN server to improve the security of VPN access.
  • the method further includes:
  • the association module is configured to set VPN account information, and associate the preset lock screen password with the VPN account information.
  • the method further includes:
  • a determining module configured to determine a website corresponding to the VPN access request
  • the method further includes:
  • the whitelist setting module is configured to set a whitelist, and the whitelist includes at least one website.
  • the whitelist setting module is further configured to:
  • the whitelist After receiving the confirmation command indicating that the whitelist is turned on, the whitelist is started.
  • FIG. 3 is a schematic diagram of another structure of a terminal according to an embodiment of the present invention.
  • the terminal 3 includes a processor 301, a memory 302, and a transceiver 303.
  • the transceiver 303 is configured to transmit and receive data with and from an external device.
  • the number of processors 301 in the terminal 3 may be one or more.
  • processor 301, memory 302, and transceiver 303 may be connected by a bus system or other means.
  • Terminal 3 can be used to perform the method shown in FIG.
  • the program code is stored in the memory 302.
  • the processor 301 is configured to call program code stored in the memory 302 for performing the following operations:
  • the first prompt message When receiving the virtual private network VPN access request, the first prompt message is displayed; wherein the VPN access request carries VPN account information, and the first prompt message prompts the user to input a lock screen password;
  • the VPN access request is sent to the VPN server.
  • the method before the receiving the virtual private network VPN access request, before displaying the first prompt message, the method further includes:
  • the method further includes:
  • the method further includes:
  • a whitelist is set, which includes at least one website.
  • the setting a whitelist further includes:
  • the whitelist After receiving the confirmation command indicating that the whitelist is turned on, the whitelist is started.
  • the terminal provided by the embodiment of the present invention includes but is not limited to piggybacking Or terminals of other operating systems, such as mobile phones.
  • Other terminals may also be used, such as a laptop or tablet or desktop computer with a touch-sensitive surface (eg, a touch screen display and/or a touch pad).
  • a terminal including a display and a touch-sensitive surface is described. It should be understood, however, that the terminal can include one or more other physical user interface devices, such as a physical keyboard, mouse, and/or joystick.
  • Terminals typically support a variety of applications, such as one or more of the following: a drawing application, a rendering application, a word processing application, a web page creation application, a disk editing application, a spreadsheet application, a gaming application, Telephony applications, video conferencing applications, email applications, instant messaging applications, workout support applications, photo management applications, digital camera applications, digital video camera applications, web browsing applications, digital music player applications Program, and/or digital video player application.
  • applications such as one or more of the following: a drawing application, a rendering application, a word processing application, a web page creation application, a disk editing application, a spreadsheet application, a gaming application, Telephony applications, video conferencing applications, email applications, instant messaging applications, workout support applications, photo management applications, digital camera applications, digital video camera applications, web browsing applications, digital music player applications Program, and/or digital video player application.
  • the various applications that can be executed on the terminal can use at least one shared physical user interface device, such as a touch-sensitive surface.
  • One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal may be adjusted and/or changed from one application to the next and/or adjusted and/or varied within the respective application.
  • the shared physical architecture of the terminal such as a touch-sensitive surface, can support a variety of applications with a user interface that is intuitive to the user.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本申请公开了一种访问控制方法,包括:接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码;接收输入的锁屏密码;验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。本发明实施例还公开了一种终端。采用本发明,能为VPN访问提供双重认证,提高访问安全性。

Description

一种访问控制方法和终端 技术领域
本发明涉及计算机领域,尤其涉及一种访问控制方法和终端。
背景技术
VPN(Virtual Private Network,虚拟专用网络)的作用是在公用网络上建立专用网络,以实现加密通信。在目前的VPN访问方法中,用户预先注册VPN账户信息,通过VPN账户信息登录VPN服务器,VPN服务器验证通过后将用户的访问请求转发到目的服务器,然而申请人发现目前这种仅依靠VPN账户信息进行访问的方式安全性不足。
发明内容
本发明实施例所要解决的技术问题在于,提供一种访问控制方法和终端。能够提高VPN访问的安全性。
第一方面,本发明实施例提供了一种访问控制方法,包括:
终端接收到VPN访问请求时,显示第一提示消息,VPN访问请求包括但不限于HTTP(HyperText Transfer Protocol,超文本传输协议)访问请求、FTP(File Transfer Protocol,文件传输协议)访问请求、UDP(User Datagram Protocol,用户数据报协议)访问请求,VPN访问请求可以是终端登录上VPN服务器后,终端上的应用程序发出的,应用程序包括但不限于浏览器、音频播放器、视频播放器、电子邮箱和即时通信软件等,VPN访问请求携带预先注册的VPN账户信息,第一提示消息用户提示用户输入锁屏密码,锁屏密码包括但不限于指纹密码、数字密码、图形密码,第一提示消息的显示位于可以在当前界面的顶层;用户根据终端上显示的第一提示消息的提示,输入锁屏密码,例如锁屏密码是指纹密码的情况下,用户在指纹传感器上输入指纹信息;输入密码是数字密码的情况下,用户在输入框中输入数字密码;终端接收输入的锁屏密码;终端存储有预先注册的锁屏密码,终端比较输入的锁屏密码和预先注册的锁屏密码是否相同,若相同,确定验证通过,终端将VPN访问请求发送给对应的VPN服务器,VPN服务器验证VPN访问请求中携带的VPN账号信 息通过后,将VPN访问请求发送给目标服务器,例如目标服务器为网页服务器、视频服务器、文件服务器或即时通信服务器等。上述实施例,终端接收到VPN访问请求时,提示用户输入锁屏密码,在验证锁屏密码通过后,再向VPN服务器发送VPN访问请求,由此提供终端和VPN服务器的双重认证,提高VPN访问的安全性。
在本方面的一种可能的实施方式中,终端预先设置VPN账号信息,将预设的锁屏密码与VPN账号信息进行关联。VPN账号信息包括VPN用户名和密码,终端可预先设置一个映射表,映射表的每个表项存放具有关联关系的VPN账户信息和锁屏密码。
在本方面的一种可能的实施方式中,还包括:
确定所述VPN访问请求对应的网站;
判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
在本方面的一种可能的实施方式中,设置白名单,所述白名单中包括至少一个网站。例如:白名单中包括网站google.com,这样用户下次通过VPN方式访问google.com时,终端允许将VPN访问请求发送给VPN服务器,VPN服务器将VPN访问请求转发给google.com的服务器。
在本方面的一种可能的实施方式中,所述设置白名单还包括:
显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
接收到表示开启白名单的确认指令后,开启所述白名单。
相应地,第二方面还提供了一种终端,包括:提示模块、接收模块和验证模块。
提示模块,用于接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码;
接收模块,用于接收输入的锁屏密码;
验证模块,用于验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。
上述实施例,终端接收到VPN访问请求时,提示用户输入锁屏密码,在验证锁屏密码通过后,再向VPN服务器发送VPN访问请求,由此提供终端和 VPN服务器的双重认证,提高VPN访问的安全性。
在本方面的一种可能的实施方式中,还包括:
关联模块,用于设置VPN账号信息,以及将预设的锁屏密码与所述VPN账号信息进行关联。
在本方面的一种可能的实施方式中,还包括:
判断模块,用于确定所述VPN访问请求对应的网站;
判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
在本方面的一种可能的实施方式中,还包括:
白名单设置模块,用于设置白名单,所述白名单中包括至少一个网站。
在本方面的一种可能的实施方式中,所述白名单设置模块还用于:
显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
接收到表示开启白名单的确认指令后,开启所述白名单。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明的一种访问控制方法的流程示意图;
图2是本发明实施例提供的一种终端的结构示意图;
图3是本发明实施例提供的一种终端的另一结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
参见图1,图1是本发明实施例提供的一种访问控制方法的流程示意图, 在本发明实施例中,所述方法包括:
S101、接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码。
具体的,终端接收到VPN访问请求时,显示第一提示消息,VPN访问请求包括但不限于HTTP(HyperText Transfer Protocol,超文本传输协议)访问请求、FTP(File Transfer Protocol,文件传输协议)访问请求、UDP(User Datagram Protocol,用户数据报协议)访问请求,VPN访问请求可以是终端登录上VPN服务器后,终端上的应用程序发出的,应用程序包括但不限于浏览器、音频播放器、视频播放器、电子邮箱和即时通信软件等,VPN访问请求携带预先注册的VPN账户信息,第一提示消息用户提示用户输入锁屏密码,锁屏密码包括但不限于指纹密码、数字密码、图形密码,第一提示消息的显示位于可以在当前界面的顶层。
S102、接收输入的锁屏密码。
具体的,用户根据终端上显示的第一提示消息的提示,输入锁屏密码,例如锁屏密码是指纹密码的情况下,用户在指纹传感器上输入指纹信息;输入密码是数字密码的情况下,用户在输入框中输入数字密码;终端接收输入的锁屏密码;终端存储有预先注册的锁屏密码。
S103、验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。
具体的,终端比较输入的锁屏密码和预先注册的锁屏密码是否相同,若相同,确定验证通过,终端将VPN访问请求发送给对应的VPN服务器,VPN服务器验证VPN访问请求中携带的VPN账号信息通过后,将VPN访问请求发送给目标服务器,例如目标服务器为网页服务器、视频服务器、文件服务器或即时通信服务器等。
实施上述实施例,终端接收到VPN访问请求时,提示用户输入锁屏密码,在验证锁屏密码通过后,再向VPN服务器发送VPN访问请求,由此提供终端和VPN服务器的双重认证,提高VPN访问的安全性。
在一种可能的实施方式中,所述接收虚拟专用网络VPN访问请求时,显示第一提示消息之前,还包括:
设置VPN账号信息,以及将预设的锁屏密码与所述VPN账号信息进行关联。
具体的,终端预先设置VPN账号信息,将预设的锁屏密码与VPN账号信息进行关联。VPN账号信息包括VPN用户名和密码,终端可预先设置一个映射表,映射表的每个表项存放具有关联关系的VPN账户信息和锁屏密码。
在一种可能的实施方式中,还包括:
确定所述VPN访问请求对应的网站;
判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
在一种可能的实施方式中,还包括:
设置白名单,所述白名单中包括至少一个网站。
具体的,设置白名单,所述白名单中包括至少一个网站。例如:白名单中包括网站google.com,这样用户下次通过VPN方式访问google.com时,终端允许将VPN访问请求发送给VPN服务器,VPN服务器将VPN访问请求转发给google.com的服务器。
在一种可能的实施方式中,所述设置白名单还包括:
显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
接收到表示开启白名单的确认指令后,开启所述白名单。
参见图2,为本发明实施例提供的一种终端的结构示意图,本发明实施例的终端用于执行图1中的一种访问控制方法,所涉及的术语和过程可参照图1实施例的描述。终端2包括:提示模块201、接收模块202、验证模块203。
提示模块201,用于接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码。
接收模块202,用于接收输入的锁屏密码。
验证模块203,用于验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。
上述实施例,终端接收到VPN访问请求时,提示用户输入锁屏密码,在验证锁屏密码通过后,再向VPN服务器发送VPN访问请求,由此提供终端和 VPN服务器的双重认证,提高VPN访问的安全性。
在一种可能的实施方式中,还包括:
关联模块,用于设置VPN账号信息,以及将预设的锁屏密码与所述VPN账号信息进行关联。
在一种可能的实施方式中,还包括:
判断模块,用于确定所述VPN访问请求对应的网站;
判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
在一种可能的实施方式中,还包括:
白名单设置模块,用于设置白名单,所述白名单中包括至少一个网站。
在一种可能的实施方式中,所述白名单设置模块还用于:
显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
接收到表示开启白名单的确认指令后,开启所述白名单。
本发明实施例和方法实施例一基于同一构思,其带来的技术效果也相同,具体过程可参照方法实施例一的描述,此处不再赘述。
参见图3,为本发明实施例提供的一种终端的另一结构示意图,在本发明实施例中,终端3包括处理器301、存储器302和收发器303。收发器303用于与外部设备之间收发数据。终端3中的处理器301的数量可以是一个或多个。本发明的一些实施例中,处理器301、存储器302和收发器303可通过总线系统或其他方式连接。终端3可以用于执行图1所示的方法。关于本实施例涉及的术语的含义以及举例,可以参考图1对应的实施例。此处不再赘述。
其中,存储器302中存储程序代码。处理器301用于调用存储器302中存储的程序代码,用于执行以下操作:
接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码;
接收输入的锁屏密码;
验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。
在一种可能的实施方式中,所述接收虚拟专用网络VPN访问请求时,显示第一提示消息之前,还包括:
设置VPN账号信息,以及将预设的锁屏密码与所述VPN账号信息进行关联。
在一种可能的实施方式中,还包括:
确定所述VPN访问请求对应的网站;
判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
在一种可能的实施方式中,还包括:
设置白名单,所述白名单中包括至少一个网站。
在一种可能的实施方式中,所述设置白名单还包括:
显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
接收到表示开启白名单的确认指令后,开启所述白名单。
本发明实施例提供的终端包括但不限于搭载
Figure PCTCN2017075492-appb-000001
或者其它操作系统的终端,诸如移动电话。也可以是其它终端,诸如具有触敏表面(例如,触摸屏显示器和/或触控板)的膝上型计算机或平板电脑或台式计算机。
在下面的讨论中,介绍了一种包括显示器和触敏表面的终端。然而应当理解,终端可以包括一个或多个其他物理用户接口设备,诸如物理键盘、鼠标和/或操作杆。
终端通常支持多种应用程序,诸如以下中的一种或多种:画图应用程序、呈现应用程序、文字处理应用程序、网页创建应用程序、盘编辑应用程序、电子表格应用程序、游戏应用程序、电话应用程序、视频会议应用程序、电子邮件应用程序、即时消息应用程序、锻炼支持应用程序、相片管理应用程序、数字相机应用程序、数字视频摄像机应用程序、网络浏览应用程序、数字音乐播放器应用程序、和/或数字视频播放器应用程序。
可在终端上执行的各种应用程序可使用至少一个共用的物理用户接口设备,诸如触敏表面。触敏表面的一种或多种功能以及显示在终端上的相应信息可从一种应用程序调整和/或变化至下一种应用程序和/或在相应应用程序内被调整和/或变化。这样,终端的共用物理架构(诸如触敏表面)可利用对于用户而言直观清楚的用户界面来支持各种应用程序。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程, 是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
以上所揭露的仅为本发明一种较佳实施例而已,当然不能以此来限定本发明之权利范围,本领域普通技术人员可以理解实现上述实施例的全部或部分流程,并依本发明权利要求所作的等同变化,仍属于发明所涵盖的范围。

Claims (10)

  1. 一种访问控制方法,其特征在于,包括:
    接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码;
    接收输入的锁屏密码;
    验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。
  2. 如权利要求1所述的方法,其特征在于,所述接收虚拟专用网络VPN访问请求时,显示第一提示消息之前,还包括:
    设置VPN账号信息,以及将预设的锁屏密码与所述VPN账号信息进行关联。
  3. 如权利要求1所述的方法,其特征在于,还包括:
    确定所述VPN访问请求对应的网站;
    判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
  4. 如权利要求3所述的方法,其特征在于,还包括:
    设置白名单,所述白名单中包括至少一个网站。
  5. 如权利要求4所述的方法,其特征在于,所述设置白名单还包括:
    显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
    接收到表示开启白名单的确认指令后,开启所述白名单。
  6. 一种终端,其特征在于,包括:
    提示模块,用于接收虚拟专用网络VPN访问请求时,显示第一提示消息;其中,所述VPN访问请求携带VPN账号信息,所述第一提示消息用户提示用户输入锁屏密码;
    接收模块,用于接收输入的锁屏密码;
    验证模块,用于验证所述锁屏密码通过后,将所述VPN访问请求发送给VPN服务器。
  7. 如权利要求6所述的终端,其特征在于,还包括:
    关联模块,用于设置VPN账号信息,以及将预设的锁屏密码与所述VPN账号信息进行关联。
  8. 如权利要求6所述的终端,其特征在于,还包括:
    判断模块,用于确定所述VPN访问请求对应的网站;
    判断所述网站是否位于预设的白名单中,若为是,将所述VPN访问请求发送给VPN服务器。
  9. 如权利要求8所述的终端,其特征在于,还包括:
    白名单设置模块,用于设置白名单,所述白名单中包括至少一个网站。
  10. 如权利要求9所述的终端,其特征在于,所述白名单设置模块还用于:
    显示第二提示消息,所述第二提示消息用户提示用户是否开启白名单;
    接收到表示开启白名单的确认指令后,开启所述白名单。
PCT/CN2017/075492 2017-03-02 2017-03-02 一种访问控制方法和终端 WO2018157362A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/075492 WO2018157362A1 (zh) 2017-03-02 2017-03-02 一种访问控制方法和终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/075492 WO2018157362A1 (zh) 2017-03-02 2017-03-02 一种访问控制方法和终端

Publications (1)

Publication Number Publication Date
WO2018157362A1 true WO2018157362A1 (zh) 2018-09-07

Family

ID=63369690

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/075492 WO2018157362A1 (zh) 2017-03-02 2017-03-02 一种访问控制方法和终端

Country Status (1)

Country Link
WO (1) WO2018157362A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1732452A (zh) * 2002-10-25 2006-02-08 贝蒂纳·埃克斯珀顿 用于自动启动和访问网络地址和应用程序的系统和方法
CN103109510A (zh) * 2012-10-16 2013-05-15 华为技术有限公司 一种资源安全访问方法及装置
US20150089616A1 (en) * 2011-12-30 2015-03-26 Amazon Technologies, Inc. Techniques for user authentication
CN105453524A (zh) * 2013-05-13 2016-03-30 霍约什实验室Ip有限公司 用于授权访问到访问控制环境的系统和方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1732452A (zh) * 2002-10-25 2006-02-08 贝蒂纳·埃克斯珀顿 用于自动启动和访问网络地址和应用程序的系统和方法
US20150089616A1 (en) * 2011-12-30 2015-03-26 Amazon Technologies, Inc. Techniques for user authentication
CN103109510A (zh) * 2012-10-16 2013-05-15 华为技术有限公司 一种资源安全访问方法及装置
CN105453524A (zh) * 2013-05-13 2016-03-30 霍约什实验室Ip有限公司 用于授权访问到访问控制环境的系统和方法

Similar Documents

Publication Publication Date Title
JP7086994B2 (ja) Botユーザのセキュアな認証
CN107111696B (zh) 多租户计算系统以及在其中实现的方法
CN108293045B (zh) 本地和远程系统之间的单点登录身份管理
KR102459199B1 (ko) 멀티-테넌트 컴퓨팅 시스템의 보안 및 허가 아키텍처
US10375053B2 (en) Cross-platform single sign-on accessibility of a productivity application within a software as a service platform
WO2018177124A1 (zh) 业务处理方法、装置、数据共享系统及存储介质
RU2541847C2 (ru) Управление доступом к защищенным функциям приложений с использованием уровней доверия клиента
US9246949B2 (en) Secure capability negotiation between a client and server
EP3061025B1 (en) Method and system for authenticating service
JP6882924B2 (ja) 互いに異なるユーザ識別体系を利用して登録されたユーザを識別するサーバ間のサービス連動方法、システムおよびコンピュータプログラム
US20230186304A1 (en) Transaction Validation Service
US20220100874A1 (en) Data loss protection on secondary displays
WO2021232347A1 (en) Cross device single sign-on
CN112905990A (zh) 一种访问方法、客户端、服务端及访问系统
WO2019114784A1 (zh) 密码重置的方法、请求端和校验端
WO2018157362A1 (zh) 一种访问控制方法和终端
WO2018209462A1 (zh) 一种邮件管理方法和邮件服务器
US20220382430A1 (en) Shortcut keys for virtual keyboards
WO2018145241A1 (zh) 一种基于指纹信息的电子支付方法和装置
WO2015060950A1 (en) Method and system for authenticating service
CN113496027A (zh) 用户终端及其控制方法以及记录介质
US11451635B2 (en) Secure session resume
JP2014085919A (ja) ユーザ認証装置、ユーザ認証方法及びユーザ認証プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17898553

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17898553

Country of ref document: EP

Kind code of ref document: A1