Unlock instant, AI-driven research and patent intelligence for your innovation.

Network resource access request processing method and system and computer equipment

A resource access request and access request technology, applied in the field of network security, can solve problems such as poor security, inability to protect network resources, etc., and achieve the effects of preventing data leakage, improving system security, and ensuring user experience

Active Publication Date: 2021-03-16
HANGZHOU JINDOUTENGYUN TECH CO LTD
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this solution, the user terminal and network resources are connected through a gateway, that is, there is always an access path between the two. Once the gateway fails, has a loophole, or is destroyed by hacker attacks, it will not be able to provide protection for the network resources. Poor sex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network resource access request processing method and system and computer equipment
  • Network resource access request processing method and system and computer equipment
  • Network resource access request processing method and system and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0088] The request processor 103 is further configured to be able to judge the legality of the resource access request information, and send the extracted user information and target resource information to the access intermediary manager 105 if the resource access request information is legal.

[0089] like image 3 As shown, a method for processing a network resource access request in this embodiment includes:

[0090] 202. Receive a resource access request, and acquire resource access request information.

[0091]In this embodiment, this step is implemented by the request receiver 101 in the foregoing network resource access request processing system. The resource access request comes directly from the user terminal or via a network proxy service; for example, the user requests to visit a certain website by operating the user terminal, and the user terminal generates a corresponding resource access request in response to the aforementioned operation.

[0092] 204. Extract...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network resource access request processing method, which comprises the following steps of: receiving a resource access request, and acquiring resource access request information; extracting user information and target resource information from the resource access request information, and requesting to create a corresponding access intermediary instance according to the user information and the target resource information; creating the access intermediary instance; and correspondingly initiating access to the target resource by utilizing the access intermediary instance according to the received resource access request information, so that the network security can be greatly improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a processing method, system and computer equipment for a network resource access request. Background technique [0002] Currently, in existing network resource access systems, network resource access methods are mostly: users access network resources through user terminals through access gateways. In this solution, the user terminal and network resources are connected through a gateway, that is, there is always an access path between the two. Once the gateway fails, has a loophole, or is destroyed by hacker attacks, it will not be able to provide protection for the network resources. Sex is poor. Contents of the invention [0003] The object of the present invention is to address the above existing problems, and provide a processing method, system and computer equipment for network resource access requests, so as to improve network security. [0004] In order to achi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/10H04L63/1441H04L41/0843H04L41/0803H04L63/205
Inventor 杨洋
Owner HANGZHOU JINDOUTENGYUN TECH CO LTD