Resource access method and device, terminal and storage medium

A resource access and resource access request technology, which is applied in the fields of terminals, storage media, devices, and resource access methods, can solve problems such as poor resource security, and achieve the effect of improving resource security

Active Publication Date: 2019-09-06
TENCENT CLOUD COMPUTING BEIJING CO LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It can be seen that the current enterprise network access methods are generally border protection methods, that is, identity authentication is performed at the network ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Resource access method and device, terminal and storage medium
  • Resource access method and device, terminal and storage medium
  • Resource access method and device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts fall within the protection scope of the present invention.

[0067] Embodiments of the present invention provide a service access method, device, terminal and storage medium.

[0068] An embodiment of the present invention provides a network system, and the system includes a resource access device suitable for a terminal (referred to as a first resource access device) provided in any embodiment of the present invention and a resource access device suitable for an access control device (referred to as a first resource access device). sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a resource access method and device, a terminal and a storage medium. According to the embodiment of the invention, when resources need to be accessed, an access bill acquisition request is sent to a network access client, an access bill returned by the network access client is received, wherein the access bill is acquired by the network access client fromthe access control equipment based on the access bill acquisition request; a connection establishment request is sent to a gateway device of the network, wherein the connection establishment requestcarries the access bill; when the connection is successfully established, a resource access request is sent to the gateway equipment based on the connection, so that the gateway equipment forwards theresource access request to a resource server in the network; according to the scheme, the resource security can be improved.

Description

technical field [0001] The present invention relates to the field of network technology, in particular to a resource access method, device, terminal and storage medium. Background technique [0002] Traditional enterprise network access relies on boundary walls to isolate internal and external networks, focusing on defense of boundary security. It is not possible to directly connect to the enterprise intranet outside the border, and needs to access enterprise resources through a VPN (Virtual Private Network, virtual private network). Within the boundary, it is assumed that any device is safe and trusted, and identity authentication is only performed once when the device is connected to the network. After the authentication is passed, there is no security measure for the device to access enterprise resources. It is like guarding the security of the city through the city wall, only verifying the identity of the people entering the city at the city gate, assuming that some bad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/02H04L63/10
Inventor 杨哲蔡晨周明辉蒙俊伸陈增萍张华彦李超俊王继超罗靖曹子涵杜闯蔡东赟
Owner TENCENT CLOUD COMPUTING BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products