Network access method, device, system and equipment and storage medium
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology for network access and network access control, applied in the fields of equipment and storage media, systems, devices, and network access methods, can solve problems such as time-out or failure of ticket acquisition, poor availability, frequent network access failures, etc., to improve stability and performance. The effect of usability
Pending Publication Date: 2022-08-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
Then, in the scenario where the network quality is unstable and the network is weak, it is prone to the problem of ticket acquisition timeout or failure, resulting in frequent failures of network access, poor usability, and high network delay
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0050] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described in further detail below with reference to the accompanying drawings. All other embodiments obtained under the premise of creative work fall within the scope of protection of the present application.
[0051] In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" can be the same or a different subset of all possible embodiments, and Can be combined with each other without conflict. Unless otherwise defined, all technical and scientific terms used in the embodiments of the present application have the same meaning as commonly understood by those skilled in the technical field belonging to the embodiments of the present application. The terms used in the embodiments of the present application are only for the purpose of ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
PUM
Login to view more
Abstract
The embodiment of the invention provides a network access method, device and system, equipment and a storage medium, and relates to the field of cloud technology and security. The method comprises the steps that when a network access request sent by any application is intercepted, a terminal obtains process feature information corresponding to the network access request; generating a bill application according to the process feature information, and sending the bill application to a server; when a network request voucher returned by the server based on the bill application is not successfully received within a preset time period, generating a virtual access voucher according to access information corresponding to the network access request; and sending the network access request and the virtual access credential to the server, so that the server authenticates the network access request according to the virtual access credential. According to the invention, the terminal user can obtain continuous, stable and high-quality network access experience, and the stability and availability of the security management system are improved.
Description
technical field [0001] The embodiments of the present application relate to the field of Internet technologies, and relate to, but are not limited to, a network access method, apparatus, system, device, and storage medium. Background technique [0002] A zero-trust security management system (iOA) is a system that grants access rights based on trusted identities, trusted devices, trusted applications, and trusted links, and enforces that all access must be authenticated, authorized, and encrypted, helping enterprises where their workplaces are located. A new "4A office" way to securely access authorized resources to handle any business, anywhere, anytime, and on any device. [0003] At present, in any security management system including the iOA system, for each network access request of the user, a ticket is synchronously applied to the server through the network, that is, the server is requested to return the network request certificate. [0004] However, every time a net...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.