Network resource access request processing method and system and computer equipment
A resource access request and access request technology, applied in the field of network security, can solve problems such as poor security, inability to protect network resources, etc., and achieve the effects of preventing data leakage, improving system security, and ensuring user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0088] The request processor 103 is further configured to be able to judge the legality of the resource access request information, and send the extracted user information and target resource information to the access intermediary manager 105 if the resource access request information is legal.
[0089] like image 3 As shown, a method for processing a network resource access request in this embodiment includes:
[0090] 202. Receive a resource access request, and acquire resource access request information.
[0091]In this embodiment, this step is implemented by the request receiver 101 in the foregoing network resource access request processing system. The resource access request comes directly from the user terminal or via a network proxy service; for example, the user requests to visit a certain website by operating the user terminal, and the user terminal generates a corresponding resource access request in response to the aforementioned operation.
[0092] 204. Extract...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


