Network access method, device, system and equipment and storage medium

A technology for network access and network access control, applied in the fields of equipment and storage media, systems, devices, and network access methods, can solve problems such as time-out or failure of ticket acquisition, poor availability, frequent network access failures, etc., to improve stability and performance. The effect of usability

Pending Publication Date: 2022-08-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then, in the scenario where the network quality is unstable and the network is weak, it is prone to the problem of ticket acquisition timeout or failure, resulting in frequent failures of network access, poor usability, and high network delay

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method, device, system and equipment and storage medium
  • Network access method, device, system and equipment and storage medium
  • Network access method, device, system and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail below with reference to the accompanying drawings. All other embodiments obtained under the premise of creative work fall within the scope of protection of the present application.

[0051] In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" can be the same or a different subset of all possible embodiments, and Can be combined with each other without conflict. Unless otherwise defined, all technical and scientific terms used in the embodiments of the present application have the same meaning as commonly understood by those skilled in the technical field belonging to the embodiments of the present application. The terms used in the embodiments of the present application are only for the purpose of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a network access method, device and system, equipment and a storage medium, and relates to the field of cloud technology and security. The method comprises the steps that when a network access request sent by any application is intercepted, a terminal obtains process feature information corresponding to the network access request; generating a bill application according to the process feature information, and sending the bill application to a server; when a network request voucher returned by the server based on the bill application is not successfully received within a preset time period, generating a virtual access voucher according to access information corresponding to the network access request; and sending the network access request and the virtual access credential to the server, so that the server authenticates the network access request according to the virtual access credential. According to the invention, the terminal user can obtain continuous, stable and high-quality network access experience, and the stability and availability of the security management system are improved.

Description

technical field [0001] The embodiments of the present application relate to the field of Internet technologies, and relate to, but are not limited to, a network access method, apparatus, system, device, and storage medium. Background technique [0002] A zero-trust security management system (iOA) is a system that grants access rights based on trusted identities, trusted devices, trusted applications, and trusted links, and enforces that all access must be authenticated, authorized, and encrypted, helping enterprises where their workplaces are located. A new "4A office" way to securely access authorized resources to handle any business, anywhere, anytime, and on any device. [0003] At present, in any security management system including the iOA system, for each network access request of the user, a ticket is synchronously applied to the server through the network, that is, the server is requested to return the network request certificate. [0004] However, every time a net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/083H04L63/0807H04L63/10H04L63/20H04L63/12H04L63/1408H04L63/1416
Inventor 吴岳廷
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products