Supercharge Your Innovation With Domain-Expert AI Agents!

A method, device and system for controlling access

A technology for user equipment and access requests, applied in the computer field, can solve problems such as the inability to control users to use cache or not to use cache protection, tampered page outflow, and other pages cannot be accessed

Active Publication Date: 2020-10-20
SHANGHAI YUNDUN INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the CDN node obtains the latest web page data from the source server, if the web page has been tampered with, the tampered web page data will be stored in the node, and the CDN node providing services to the outside will cause the tampered page to flow out
[0006] (2) After the source server goes down, the always-on function based on CDN caching technology only provides visitors with a snapshot of the home page, and other pages will not be accessible
Once the CDN cache is enabled to provide services, all visitors will obtain page content from the CDN cache, and it is impossible to control whether users in a certain area use the cache or not.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for controlling access
  • A method, device and system for controlling access
  • A method, device and system for controlling access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The application will be described in further detail below in conjunction with the accompanying drawings.

[0048] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0049] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0050] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The purpose of this application is to provide a method, device and system for controlling access. Compared with the prior art, the network device of the present application acquires the access request about the target address sent by the user equipment, and if the access request meets the condition of a substitute access, sends the access request to the substitute server, and then, the substitute server obtains the access request of the network device An access request about the target address is sent; based on the access request, the data corresponding to the target address is obtained from the storage database, and the data corresponding to the target address is returned to the network device, and then the network device receiving the data corresponding to the target address returned by the substitute server, and returning the data corresponding to the target address to the user device; In this case, instead of the source server responding to the user's access request, to prevent the outflow of tampered pages.

Description

technical field [0001] The present application relates to the computer field, and in particular to a technology for controlling access. Background technique [0002] According to relevant detection statistics, nearly 25,000 websites in my country were tampered with in 2015, of which 898 were tampered with government websites, and some government websites were tampered with many times. Among the tampered government websites, more than 85% of the pages were embedded with links to illegal websites such as gambling and private servers, and nearly 10% of the homepages or login pages of the websites were directly linked to illegal information, causing very bad political and social impact. From this point of view, the rapid restoration of webpage display is particularly important to minimize the negative impact of webpage tampering and damage. [0003] For the situation where the content of the source server is tampered with, destroyed, or even downtime, the existing technology ge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L67/568
Inventor 王晓旭
Owner SHANGHAI YUNDUN INFORMATION TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More