Method and system for access controlling, and equipment

An access control and access technology, applied in the transmission system, electrical components, etc., can solve the problems of increasing terminal load, increasing the cost and workload of software maintenance and upgrading such as virus database and firewall, etc., so as to reduce load and save Cost and Effort Effects

Active Publication Date: 2013-12-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, installing software such as virus databases and firewalls on terminals will increase the load on terminals, and increase the cost and workload of maintaining and upgrading software such as virus databases and firewalls, especially for storage capacity and event processing capabilities such as mobile phones. For limited terminals, the above problems will be more significant

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for access controlling, and equipment
  • Method and system for access controlling, and equipment
  • Method and system for access controlling, and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] On the one hand, the embodiment of the present invention provides an access control method, see Figure 1a , the method includes:

[0037] Step 101a: receiving the URL sent by the terminal;

[0038] Step 102a: Determine the trust degree of the domain name corresponding to the website address, the trust degree is used to indicate the security degree of the domain name;

[0039] Step 103a: Send the trust degree to the terminal, so that the terminal accesses the website when determining that the trust degree is not less than a preset threshold.

[0040] The beneficial effects brought by the technical solution provided by the embodiment of the present invention are: receiving the website sent by the terminal; determining the trust degree of the domain name corresponding to the website, and sending the trust degree to the terminal, wherein the trust degree It is used to indicate the security level of the domain name; so that the terminal can access the website when it is de...

Embodiment 2

[0047] As a realizable embodiment, the embodiment of the present invention provides an access control method, see figure 2 , the method may specifically include the following operations:

[0048] Step 201: The user sends a request to the terminal to access a website. In the embodiment of the present invention, the website may be a download address or a web page address;

[0049] Specifically, the user can send a request to visit the website through the web browser installed on the terminal;

[0050] Step 202: When the terminal receives a request to access a website, send the website to the cloud server;

[0051] Step 203: The cloud server receives the website address sent by the terminal, and determines the trust degree of the domain name corresponding to the website address;

[0052] In the embodiment of the present invention, the trust degree of the domain name is used to indicate the security degree of the domain name, and the higher the trust degree of the domain name i...

Embodiment 3

[0127] see Figure 4 , the embodiment of the present invention provides a server, and the server may be specifically the same as the cloud server described in the second method embodiment, including: a receiving module 401, a first determining module 402, and a first sending module 403;

[0128] A receiving module 401, configured to receive the URL sent by the terminal;

[0129] The first determination module 402 is configured to determine the trust degree of the domain name corresponding to the website, and the trust degree is used to indicate the security degree of the domain name;

[0130] The first sending module 403 is configured to send the trust degree to the terminal, so that the terminal accesses the website when determining that the trust degree is not less than a preset threshold.

[0131] Wherein, the first determining module 402 is specifically configured to extract the trust information of the domain name corresponding to the website, and calculate the trust deg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, which belongs to the field of the network content security technology, discloses a method and system for access controlling, and equipment. The method comprises the following steps that: a web address sent by a terminal is received; credibility of a domain name corresponding to the web address is determined; and the credibility is sent to the terminal, so that the web address access is realized when the terminal determines that the credibility is not less than a preset threshold value. Therefore, the terminal can carry out security early warning on an unknown web address effectively and there is no need for a secure and complicated virus database and firewall software to carry out security early warning on the unknown web address, thereby reducing the load of the terminal and saving the cost and the workload for installation and upgrading of the virus database and the firewall software. In addition, because the threshold value is preset by the terminal, the individuation demand of the user can be satisfied, thereby improving the user experience.

Description

technical field [0001] The invention relates to the technical field of network content security, in particular to an access control method, device and system. Background technique [0002] With the development of Internet technology, more and more content is transmitted and accessed through the Internet. At present, the B / S (Browser / Server, browser / server) application mode is commonly used to realize the transmission and access of content on the Internet. Specifically, the content is stored in the form of files on the Web (a hypertext transmission based on HTTP) protocol platform) on the server, and transmitted to the terminal through the HTTP (Hyper Text Transfer Protocol, Hypertext Transfer Protocol) protocol, after being processed by the terminal browser, the content is displayed on the terminal. [0003] However, the endless viruses and Trojan horses make the security of content transmission and access in the network very poor. The commonly used solution at present is:...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张辉
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products