[go: up one dir, main page]

WO2023040983A1 - Access request processing method, electronic apparatus, electronic device, and medium - Google Patents

Access request processing method, electronic apparatus, electronic device, and medium Download PDF

Info

Publication number
WO2023040983A1
WO2023040983A1 PCT/CN2022/119101 CN2022119101W WO2023040983A1 WO 2023040983 A1 WO2023040983 A1 WO 2023040983A1 CN 2022119101 W CN2022119101 W CN 2022119101W WO 2023040983 A1 WO2023040983 A1 WO 2023040983A1
Authority
WO
WIPO (PCT)
Prior art keywords
access request
user terminal
access
terminal device
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2022/119101
Other languages
French (fr)
Chinese (zh)
Inventor
李健富
苗辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guizhou Baishancloud Technology Co Ltd
Original Assignee
Guizhou Baishancloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guizhou Baishancloud Technology Co Ltd filed Critical Guizhou Baishancloud Technology Co Ltd
Publication of WO2023040983A1 publication Critical patent/WO2023040983A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • Embodiments of the present disclosure relate to but are not limited to a method for processing an access request, an electronic device, an electronic device, and a medium.
  • a firewall or security software is installed to avoid network attacks.
  • the installation process of the firewall or security software is relatively cumbersome, and sometimes needs to be installed on multiple devices.
  • the firewall or security software needs to be maintained by professionals, resulting in high labor and economic costs.
  • the present disclosure provides an access request processing method, an electronic device, an electronic device, and a medium to solve the problems in the related art that the user's network access is prone to security risks and the cost of maintaining various security devices is high.
  • a method for processing an access request is provided, which is applied to a user terminal device, and the method includes:
  • the risk type corresponding to the access request is a high risk type, directing the access request to a corresponding target node, so that the target node processes and responds to the access request;
  • the target node Receiving response information returned by the target node, and sending the response information to the target terminal, the response information including at least part of the file data stream rendered by the target node.
  • a method for processing an access request is provided, which is applied to a distributed node in a distributed network, and the method includes:
  • the data to be rendered corresponding to the access request is obtained, and the access request is diverted by the user terminal device according to a pre-configured security access policy;
  • a method for processing an access request is provided, which is applied to a target terminal, and the method includes:
  • the response information including at least part of the file data stream rendered by the target node
  • the resource corresponding to the access request is displayed.
  • an access request processing electronic device is provided, which is applied to a user terminal device, including:
  • the first receiving module is configured to receive the access request sent by the target terminal
  • a determination module configured to determine a risk type corresponding to the access request based on the access request and a preconfigured security access policy, where the risk type is used to describe the degree of security risk corresponding to the access request;
  • a processing module configured to divert the access request to a corresponding target node if the risk type corresponding to the access request is a high risk type, so that the target node processes and responds to the access request;
  • a first sending module configured to receive response information returned by the target node, and send the response information to the target terminal, the response information including at least part of the file data stream rendered by the target node .
  • an access request processing electronic device is provided, which is applied to distributed nodes in a distributed network, including:
  • the obtaining module is configured to obtain the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, and the access request is drained by the user terminal device according to a pre-configured security access policy;
  • a generating module configured to render at least part of the data to obtain a corresponding file data stream
  • the response module is configured to send the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal.
  • an access request processing electronic device is provided, which is applied to a target terminal, including:
  • the second sending module is configured to send an access request to a user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy;
  • the second receiving module is configured to receive response information sent by the user terminal device, where the response information includes at least part of the file data stream rendered by the target node;
  • the display module is configured to display the resource corresponding to the access request according to the file data stream.
  • an electronic device including:
  • a memory configured to store executable instructions
  • a display configured to be displayed with the memory to execute the executable instructions so as to complete the operation of any one of the access request processing methods described above.
  • a computer-readable storage medium configured to store computer-readable instructions, and when the instructions are executed, operations of the access request processing method described in any one of the above aspects are performed.
  • the user terminal device may receive the access request sent by the target terminal, and based on the pre-configured security access policy, determine the risk type corresponding to the access request and used to describe the degree of security risk. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node.
  • the access request initiated by the end user can be diverted to a specific node in the distributed network through the user terminal device according to the pre-configured security access policy, so that the node can process the access request And return the response data to the end user through the user terminal equipment.
  • the node can process the access request And return the response data to the end user through the user terminal equipment.
  • Fig. 1 is a schematic diagram of a method for processing an access request according to an exemplary embodiment
  • Fig. 2 is a schematic diagram showing another access request processing method according to an exemplary embodiment
  • Fig. 3 is a schematic diagram showing another access request processing method according to an exemplary embodiment
  • FIGS. 4-5 are schematic flowcharts of a method for processing an access request according to an exemplary embodiment
  • 6-8 are schematic diagrams of an electronic device for processing an access request according to an exemplary embodiment
  • Fig. 9 is a schematic diagram of an electronic device for processing an access request according to an exemplary embodiment.
  • Fig. 1 is a schematic flowchart of a method for processing an access request according to an exemplary embodiment. As shown in Figure 1, the method is applied to user terminal equipment, including:
  • the user terminal device may be a device close to the user side on the network location, the user terminal device may receive the data flow sent by the mobile terminal, and perform certain processing based on the received data flow, such as security access control, data leakage prevention and so on, and then send the data flow to the corresponding target network or target device.
  • the user terminal equipment may be a CPE (Customer Premise Equipment, user front equipment), a wireless router, a firewall, a server, an optical modem, a portable computer or a desktop computer, and the like.
  • the user terminal equipment in the exemplary embodiments of the present disclosure can be applied in various network environments, for example, including various local area networks, metropolitan area networks, and wide area networks.
  • user terminal equipment can be applied in SD-WAN (Software Defined Wide Area Network, software-defined wide area network), which can also be applied in distributed networks, such as content distribution networks or edge computing networks, etc. , which is not specifically limited in the present disclosure.
  • SD-WAN Software Defined Wide Area Network, software-defined wide area network
  • the user terminal device may also provide functions provided by the above-mentioned user terminal device, such as security access control, data leakage prevention, and the like.
  • the target terminal may determine the risk type of the access request based on the access request, and if the risk type is a high risk type, send the access request to the corresponding target node for subsequent processing.
  • the user terminal device may support network access of one or more mobile terminals.
  • the user terminal device may receive one access request at a time for processing, or it may receive multiple access requests at a time, and separately Process each access request, etc.
  • the access request may be sent by the target terminal to request access to the information of the corresponding resource.
  • the resource may be various types of resources.
  • the resource may include but not limited to web page resources, video resources, pictures resources, audio resources or text resources, etc.
  • the access request may also be information requesting access to cloud resources, such as cloud games, cloud desktops, and the like.
  • the user may generate an access request by clicking on a specific area (such as an "access” button or a "game start” button, etc.) on the display interface of the target terminal.
  • the target terminal may send the access request to the user terminal device.
  • the user terminal device may perform subsequent processing based on the access request.
  • the target terminal may send the access request to the user terminal device corresponding to the IP address based on the IP address of the user terminal device.
  • a diversion tunnel may be pre-established between the target terminal and the user terminal device, and the target terminal may send an access request to the user terminal device based on the diversion tunnel.
  • the tunneling protocol for establishing the diversion tunnel may include but not limited to GRE, IPsec, or PAC, etc., and it may also be any other tunneling protocol that the target terminal and user terminal equipment can support. limited.
  • the security access policy may be policy information used to perform security access control on the access requests received by the user terminal equipment, so as to ensure the user's network security and avoid potential data security risks caused by accessing dangerous websites.
  • the user terminal device may determine whether it is a high-risk access request based on a pre-stored security access policy.
  • the pre-stored security access policy may be configured in advance by the user (for example, the user using the target terminal or the management user of the business platform that provides the service, etc.) and configured on the user terminal on the device.
  • the present disclosure does not specifically limit how to determine the risk type corresponding to the access request according to the security access policy.
  • the address information corresponding to the access request can be matched with the high-risk addresses contained in the pre-stored risk address set, so as to determine the potential risk corresponding to the access request according to whether the address information is in the risk address set.
  • the domain name information corresponding to the access request can also be matched with the high-risk domain names contained in the pre-stored risky domain name set, so as to determine the hidden risk corresponding to the access request according to whether the domain name information is in the risky domain name set.
  • the protocol type corresponding to the access request can also be matched with the high-risk protocols contained in the pre-stored risk protocol type set, so as to determine the potential risk corresponding to the access request according to whether the protocol type is in the risk protocol type set .
  • the above are merely exemplary embodiments, and the present disclosure does not make any special limitation thereto.
  • the risk type corresponding to the access request is a high risk type, divert the access request to a corresponding target node, so that the target node processes and responds to the access request.
  • the user terminal device determines that the access request is of a high-risk type, then in order to avoid the problem of potential safety hazards in user data caused by directly sending the access request to a risky website in the related art.
  • the user terminal device can send the access request to a distributed node in the distributed network, and use the distributed node (ie, the target node) to process the access request accordingly, so as to ensure that the subsequent response data returned to the user terminal
  • the content of is rendered by the target node.
  • the target node may be any one or more nodes in the CDN distributed network, and the nodes may be edge nodes or non-edge nodes.
  • the target node is a distributed node in the CDN network
  • the distributed node can first forward the diverted access request to the CDN service. If the data resource corresponding to the access request is found at the current node, at least part of the data can be rendered, and the corresponding file data stream can be obtained and sent to the user terminal device.
  • the distributed node does not find the data resource corresponding to the access request on the current node, it can perform the back-to-source operation, and after receiving the data resource from the source server or the upper node, start the rendering instance on the distributed node.
  • each access request can establish a corresponding rendering instance to render webpage content, elements or other resources, convert it into a safe file data stream, and then return it to the user terminal device.
  • the target node may be an edge node in an edge cloud network, which may be a cloud computing platform based on the core of cloud computing technology and edge computing capabilities, built on edge infrastructure , to form an elastic cloud platform with comprehensive computing, network, storage, security and other capabilities at the edge.
  • the edge cloud network may include multiple edge nodes (that is, distributed nodes). After the edge node receives the high-risk type of access request diverted, it can perform the back-to-source operation, and after receiving the data resource corresponding to the access request from the source server, start the rendering instance on the edge node.
  • each access request can establish a corresponding rendering instance to render webpage content, elements or other resources, convert it into a safe file data stream, and then return it to the user terminal device.
  • Exemplary embodiments of the present disclosure can divert high-risk access requests to CDN edge nodes through the default routing gateway, that is, predetermine the correspondence between user terminal equipment and target nodes, and when the access request is determined to be high-risk type, the access request can be sent to the corresponding target node, so that the access request can be processed by the target node.
  • the user terminal device may send the access request to the corresponding target device or target network, for example, the access request is For a request to visit www.A.com, after determining that the risk type of the access request is a low-risk type, indicating that www.A.com is a safe destination address, the user terminal device can send the access request to www.A.com. com's source server.
  • S104 Receive response information returned by the target node, and send the response information to the target terminal, where the response information includes at least part of the file data stream rendered by the target node.
  • the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node.
  • the access request initiated by the end user can be diverted to a specific node in the distributed network through the user terminal device, so that the node processes the access request and sends the response data through the user terminal device returned to the end user.
  • the disadvantages of bringing hidden dangers to user data security caused by the access request initiated by the end user directly reaching the malicious website are avoided.
  • the response information further includes a control data flow for instructing the target terminal to render the unrendered data.
  • the target node may render all the data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device. Therefore, if there is unrendered data that needs to be returned to the target terminal, the response information may further include a control data flow for instructing the target terminal to render the unrendered data.
  • control data stream may carry unrendered data for the target terminal to acquire, thus, the target terminal does not need to acquire additionally, which not only improves the processing efficiency of the target terminal, but also This prevents the target terminal from accessing malicious websites, thereby ensuring the data security of the target terminal.
  • the target node can be determined according to the dynamic and static types of the data to be rendered corresponding to the access request.
  • the data of the dynamic type is processed by the target node, and the data of the static type is rendered by the target terminal, etc.; the target node can also be determined according to the access request
  • the size of the corresponding data to be rendered is determined, for example, the data whose size exceeds a certain threshold is rendered by the target node, and the data whose size is smaller than the threshold is rendered by the target terminal, and so on.
  • determining the risk type corresponding to the access request includes;
  • the protocol type, URL, or requested data type of the access request, and the pre-configured security access policy determine the risk type corresponding to the access request.
  • determining the risk type corresponding to the access request includes:
  • the risk type of the access request may be determined according to whether the address information corresponding to the access request is in the risk address set.
  • the address information corresponding to the access request may be matched with a pre-stored risk address set, so as to determine the hidden risk corresponding to the access request according to whether the address information is in the risk address set.
  • the address information corresponding to the access request exists in the risk address set, it may be determined that the access request corresponds to a high risk type. Otherwise, it is determined that the access request corresponds to a non-high risk category.
  • the risk type corresponding to the access request can be determined based on various information carried in the access request, which can ensure the effectiveness of determining the risk type, thereby ensuring the security of the user's network access.
  • determining the risk type corresponding to the access request includes:
  • the address information includes at least one of a target access address, a source address, or a static route corresponding to the access request.
  • the target access address corresponding to the access request can be matched with a pre-stored risk address set, so as to determine the potential risk corresponding to the access request according to whether the target access address is in the risk address set.
  • the source address corresponding to the access request can also be matched with the pre-stored risk domain name set, so as to determine the potential risk corresponding to the access request according to whether the source address is in the risk domain name set.
  • the static routing information corresponding to the access request can also be matched with the pre-stored risk static routing information set, so as to determine the potential risk corresponding to the access request according to whether the static routing information is in the risk static routing information set.
  • the static route may be a predetermined transmission route of the access request of the target terminal, and if the address of a certain hop in the transmission route is in the risk address set, it means that the transmission route has a security risk , therefore, the risk type of the access request may be determined as a high risk type.
  • the method before determining the risk type corresponding to the access request based on the access request and the pre-configured security access policy, the method further includes:
  • the previously stored security access policy is updated according to the update information.
  • the pre-configured security access policy in the present disclosure may be updated periodically, and the present disclosure does not specifically limit the subject or period of generating update information.
  • the distributed node may update the security access policy according to a certain update cycle to generate update information
  • the security management platform may update the security access policy according to a certain update cycle to generate update information.
  • the user terminal device when the user terminal device detects that there is currently updated information, it can update and upgrade the currently acquired security access policy according to the updated information. So as to ensure the best security access policy for access requests.
  • directing the access request to the corresponding target node includes:
  • the access request is sent to the corresponding target node using a private communication protocol, GRE, IPsec or PAC.
  • the access request may be sent through various transmission methods. For example, use a private communication protocol to send an access request, or send an access request through a GRE (General Routing Encapsulation, general routing encapsulation) channel. Access requests can also be sent through IPsec (Security Architecture for IP network IP layer protocol security structure). Or, access requests can be sent through PAC (Programmable Automation Controller proxy automatic configuration) rules and so on.
  • GRE General Routing Encapsulation, general routing encapsulation
  • IPsec Security Architecture for IP network IP layer protocol security structure
  • PAC Programmable Automation Controller proxy automatic configuration
  • the user terminal device may send a scheduling request for the target access address to a scheduling node in the distributed network according to the target access address included in the access request, so that the scheduling The node assigns a target node for processing the access request to the scheduling request of the target access address according to preset rules.
  • the preset rule can be that the scheduling node determines the area information of the corresponding target terminal or the area information of the source station according to the access request, and selects the area information of the terminal or the area information of the source station from multiple distributed nodes according to the load balancing algorithm. The nodes whose parameters such as area information match are taken as the target nodes.
  • a distributed node may include multiple servers, such as a scheduling server, a configuration server, at least one distributed server, and the like.
  • the user terminal device may send a scheduling request for the access request to the scheduling server (that is, the scheduling node), and the scheduling server may select one of at least one distributed server according to a preset scheduling rule or a load balancing algorithm as the access request.
  • the scheduling server may select one of at least one distributed server according to a preset scheduling rule or a load balancing algorithm as the access request.
  • Access the requested target node and return the address information of the target node to the user terminal device, so that the user terminal device can send the access request to the corresponding target node for subsequent processing according to the address information.
  • the user terminal device after the user terminal device receives the address information of the target node fed back by the scheduling node, it can use a private protocol to send the access request to the address information of the target node through a pre-allocated channel and transmission mode , so that the target node will subsequently process and respond to the access request.
  • a private protocol Through the setting of the private protocol, it is not easy to be maliciously cracked or intercepted by others, which ensures the security of data transmission.
  • Fig. 2 is a schematic flowchart of a method for processing an access request according to an exemplary embodiment. As shown in Figure 2, the method distributes distributed nodes in the network, including:
  • the user terminal device when the user terminal device determines that the access request is of a high-risk type, then in order to avoid the problem of potential safety hazards in user data caused by directly sending the access request to a risky website in the related art.
  • the user terminal device can send the access request to a distributed node in the distributed network, and use the distributed node (ie, the target node) to process the access request accordingly, so as to ensure that the subsequent response data returned to the user terminal
  • the content of is rendered by the target node.
  • the distributed nodes (ie target nodes) in the distributed network in the present disclosure may be determined by the scheduling nodes in the scheduling server.
  • the distributed node may be a distributed node randomly or pre-designated by the scheduling node from multiple distributed nodes as the target node.
  • the scheduling node can also select from multiple Among the distributed nodes, a distributed node that matches the terminal area information; and/or, the source station area information is selected as the target node.
  • the distributed nodes (that is, the target nodes) in the distributed network in the present disclosure may also be determined in other ways, such as pre-allocation, etc., which are not specifically limited in the present disclosure.
  • the distributed network in the exemplary embodiment of the present disclosure may be a CDN (Content Delivery Network, content distribution network) network, and the CDN network may include multiple distributed nodes.
  • the distributed network can also be a server cluster composed of multiple servers according to the distributed architecture, and the distributed node is any server in the server cluster.
  • the distributed network can also be an edge cloud network, which can be based on the core of cloud computing technology and edge computing capabilities, and a cloud computing platform built on edge infrastructure to form An elastic cloud platform with comprehensive computing, network, storage, and security capabilities at the edge.
  • the edge cloud network may include multiple edge nodes (that is, distributed nodes), so as to provide services on the edge of the network closer to the terminal. It should be noted that the exemplary embodiments of the present disclosure do not limit what kind of network the distributed network is, and a network with a distributed architecture composed of any number of computing devices is applicable to the present disclosure.
  • the target node is a distributed node in the CDN network
  • the distributed node can first forward the diverted access request to the CDN service. If the data resource corresponding to the access request is found at the current node, at least part of the data can be rendered, and the corresponding file data stream can be obtained and sent to the user terminal device.
  • the distributed node does not find the data resource corresponding to the access request on the node, it can perform the back-to-source operation, and after receiving the data resource from the source server or the upper node, start the rendering instance on the distributed node.
  • each access request can establish a corresponding rendering instance to render webpage content, elements or other types of resources, and convert it into a safe file data stream and return it to the user terminal device.
  • the distributed nodes in the present disclosure may render all the data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device . This disclosure does not limit it.
  • the rendering application instance in some exemplary embodiments of the present disclosure may include multiple pre-configured plug-ins, for example, flash plug-ins. In this way, subsequent page rendering can be realized without temporarily loading or installing corresponding plug-ins, which helps to improve rendering efficiency and save storage resources of the target terminal.
  • the distributed nodes may process based on the access request and feed back response information. For example, if the access request is an access request for a web page, the distributed node can obtain the page elements and components corresponding to the web page, and perform at least partial rendering according to the page elements and components to obtain the corresponding file data stream. The file data stream is sent to the user terminal device as response information, and then the user terminal device sends it to the target terminal.
  • the distributed node generates the corresponding file data stream based on the rendered data, which can avoid carrying malicious code or virus before the data is rendered, and as the response information is returned to the target terminal, it ensures that the target terminal data security.
  • Some exemplary embodiments of the present disclosure may further include a step of establishing a general-purpose rendering application instance.
  • a common rendering application instance may be used to render page content of target terminals with different attribute information, such as target terminals with different screen sizes and/or target terminals with different resolutions. Therefore, by establishing a common rendering application instance, the tedious establishment of multiple times can be avoided, and a single rendering application instance can be adapted to target terminals with different attribute information, thereby improving rendering efficiency.
  • the present disclosure can generate a general rendering application instance according to preset rules, for example, a general rendering application instance is generated for the first received access request every day, every week, or every month, so as to utilize the general rendering application instance for subsequent Access requests are processed expeditiously. For example, processing multiple access requests at the same time or sorting multiple access requests.
  • the present disclosure can delete or release the relevant rendering data corresponding to the current rendering task each time after the current rendering task is completed, so as to avoid the leakage of user privacy data caused by other people's acquisition and improve the information of the present disclosure. safety.
  • At least part of the rendering described in this disclosure may be that the target node renders all the data resources corresponding to the access request and returns them to the user terminal device, or it may be that the distributed node only renders part of the data resources and returns them to the user terminal device. user terminal equipment. This disclosure does not limit it.
  • the data to be rendered during the process of determining the data to be rendered, it can be obtained by acquiring attribute information of the target terminal used to describe the task processing capability of the target terminal. In an exemplary embodiment, if the task processing capability of the target terminal is poor, no or less data rendered by it may be allocated, and if the task processing capability of the target terminal is stronger, more data rendered by it may be allocated , thus saving the computing resources of the target node.
  • the task processing capability attribute information may include at least one of computing resource occupancy information, network status information, and processor performance information of the target terminal.
  • the file data stream can be sent to the corresponding user terminal device as the response information of the access request, and then forwarded by the user terminal device to the corresponding target terminal.
  • the security risk of the target terminal's network access can be reduced, and the security of the target terminal can be guaranteed.
  • sending the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal includes:
  • For the unrendered data generate a control data flow for instructing the target terminal to render the unrendered data
  • the distributed node may render all data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device. Therefore, if there is unrendered data that needs to be returned to the target terminal, the response information may further include a control data flow for instructing the target terminal to render the unrendered data. So that the subsequent distributed nodes can send the control data flow and the file data flow to the user terminal equipment as response information.
  • the present disclosure does not specifically limit how to determine the data to be rendered by the target node.
  • the target node may determine which data to be rendered is rendered by itself and which data to be rendered is rendered by the target terminal according to the dynamic and static content types of the requested page corresponding to the access request. Thus rendering only for data rendered by itself.
  • in the process of determining the data to be rendered it may also be obtained by acquiring the attribute information of the target terminal used to describe the task processing capability of the target terminal. The details are as described above, which will not be repeated in this disclosure.
  • the target terminal After the target terminal receives the response information containing the control data flow and the file data flow, it can render the unrendered data based on the control data flow, and update the file data flow, so as to obtain the completed resources, according to The resource is displayed in the interface.
  • the method before obtaining the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, the method further includes:
  • the update information is sent to the user terminal equipment, so that the user terminal equipment can update the security access policy according to the update information.
  • distributed nodes can identify risky addresses, thereby adding high-risk addresses in the network to the risky address set, and generating update information for security access policies, for example, adding the existing risky address set Add high-risk addresses not included in the list, or delete high-risk addresses that have been released from the existing risk address set, etc. Therefore, the distributed node can send the update information to the user terminal device, so that the user terminal device can update the existing security access policy according to the update information, so as to ensure the timeliness of the security access policy.
  • the pre-configured security access policy mentioned above in the present disclosure may be updated regularly, and the present disclosure does not specifically limit the subject or period of generating update information.
  • the distributed nodes can update the security access policy according to a certain update cycle to generate update information
  • the security management platform can update the security access policy according to a certain update cycle to generate update information, which can be based on a fixed cycle
  • the update may be performed without a fixed later period, which is not particularly limited in the present disclosure.
  • the access request includes attribute information of the target terminal, and the attribute information is used to describe the page display characteristics of the target terminal;
  • Render at least part of the data to obtain the corresponding file data stream including:
  • At least part of the data is rendered by using a rendering application instance to obtain a corresponding file data stream.
  • the attribute information used to describe the page display characteristics of the target terminal may be at least one of screen size information, resolution information, and operating platform environment information of the target terminal.
  • the target terminal may carry attribute information describing its own page display characteristics on the access request during the process of sending the access request. After the distributed node receives the access request, it can directly read the attribute information carried in the access request, thereby improving the subsequent processing efficiency of the target node.
  • the target terminal can be, for example, a desktop computer, a notebook computer, a smart phone, a tablet computer, a smart watch, a smart bracelet, smart glasses, a smart speaker, a car computer, an AR device, and a VR device, etc., which have data access and data storage functions. one or more of the devices.
  • the distributed node can establish a rendering application instance corresponding to it, and execute the rendering application instance to obtain and process the corresponding Access the data to be rendered corresponding to the request, thereby saving the computing resources of the target node, avoiding the situation that the general rendering application instance does not match the target terminal, and the computing capacity is excessive or too small.
  • the page display characteristics of the user terminal may be determined through an operating electronic device and/or screen display parameters of the user terminal.
  • the operating electronic device may include an Android operating electronic device, an IOS operating electronic device, a Win operating electronic device, and the like.
  • the screen display parameters may correspond to screen size, screen resolution, and so on.
  • the corresponding rendering application instance is opened, which can ensure the pertinence of the rendering application instance and save target The computing resources of the node.
  • At least part of the data is rendered to obtain a corresponding file data stream, including:
  • the access request sending an acquisition request for the attribute information of the target terminal to the target terminal, where the attribute information is used to describe the page display characteristics of the target terminal;
  • At least part of the data is rendered by using a rendering application instance to obtain a corresponding file data stream.
  • the distributed node may send an acquisition request for acquiring attribute information to the target terminal that generates the access request.
  • a corresponding rendering application instance can be specifically established for it.
  • the target node sends an acquisition request for attribute information to the target terminal, so that the target terminal can perceive the processing process of the target node, so that it can perform corresponding operations under unexpected circumstances (such as current node failure or slow response, etc.) , such as re-initiating access requests or sending processing progress queries.
  • obtaining the data to be rendered corresponding to the access request includes:
  • the access request sent by the user terminal device determine the data to be rendered corresponding to the access request
  • the distributed node may first check whether there is data to be rendered corresponding to the access request stored in the current node. If it is stored, find the data resource corresponding to the access request from the current node and render at least part of the data, and get the corresponding file data stream and send it to the user terminal device
  • the distributed node can get the page content from other nodes than the current node, central cloud, data center or source server. And after receiving the data resource subsequently, start the rendering instance on the edge node. That is, render according to the content and elements of the webpage requested by the access request, so as to convert it into a secure file data stream and return it to the user terminal device as a response message.
  • Fig. 3 is a schematic flowchart of a method for processing an access request according to an exemplary embodiment. As shown in Figure 3, this method is applied to the target terminal, including:
  • S301 Send an access request to a user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy.
  • the user terminal device can receive the access request sent by the target terminal device, so that the user terminal device can subsequently send the access request to the distributed node, and the distributed node can pull the request from the target object corresponding to the access request The corresponding data to be rendered.
  • the user terminal device sends it back to the target terminal.
  • the target terminal after the target terminal receives the file data stream rendered by the target node, it can display the resource corresponding to the access request on its own display screen for viewing by the user according to the file data stream.
  • the access request initiated by the end user can be diverted to a specific node in the distributed network through the user terminal device, so that the node processes the access request and sends the response data through the user terminal device returned to the end user.
  • the disadvantage of bringing user data security risks caused by the access request initiated by the end user directly reaching the malicious website is avoided.
  • the response information further includes a control data flow for instructing the current terminal to render the unrendered data
  • display the resource corresponding to the access request including:
  • the resource corresponding to the access request is displayed.
  • the response information may further include a control data flow for instructing the target terminal to render the unrendered data.
  • the subsequent target terminal can update the file data stream according to the control data stream and unrendered data, that is, the target terminal can render the unrendered data based on the control data stream and
  • the file data stream is updated, so that after preset processing is performed on the updated file data stream, the resource corresponding to the access request is displayed on its own display screen for viewing and feedback by the user.
  • the target terminal can directly display the resource corresponding to the access request on its own display screen based on the file data stream for the user to view and feedback.
  • Fig. 4 is an overall flowchart of a method for processing an access request according to an exemplary embodiment. Specifically include:
  • the user terminal device can receive the access request sent by the target terminal, and based on the pre-configured security access policy, after determining that the risk type corresponding to the access request is a high risk type, the access request will be diverted to the corresponding distributed node, so that the distributed The distributed node processes and responds to the access request, and finally receives the response information returned by the distributed node including the file data stream for rendering at least part of the data, and sends the response information to the target terminal.
  • Fig. 5 is an overall flow chart showing a method for processing an access request according to an exemplary embodiment. Specifically include:
  • the target terminal sends an access request to the user terminal device; and the user terminal device determines the risk type corresponding to the access request to describe the degree of security risk corresponding to the access request based on the access request and the pre-configured security access policy, and determines the access request After the risk type corresponding to the request is a high risk type, the high risk type access request is sent to the target node.
  • the target node after the target node receives a high-risk type of access request, it can obtain the data to be rendered corresponding to the access request from the current node or the original server, and render at least part of the data to obtain the corresponding file data stream, and, for the unrendered data, after generating the control data stream for instructing the target terminal to render the unrendered data, the control data stream and the file data stream can be sent to the user terminal device as response information , so that the user terminal device sends the response information to the target terminal.
  • the target terminal can display the resource corresponding to the access request according to the control data flow and the file data flow.
  • Fig. 6 shows an electronic device for processing an access request according to an exemplary embodiment.
  • a first receiving module 401 including a determining module 402, a processing module 403, and a first sending module 404, which are applied to user terminal equipment, including:
  • the first receiving module 401 is configured to receive an access request sent by a target terminal
  • the determining module 402 is configured to determine a risk type corresponding to the access request based on the access request and a pre-configured security access policy, where the risk type is used to describe the security risk degree corresponding to the access request;
  • the processing module 403 is configured to divert the access request to a corresponding target node if the risk type corresponding to the access request is a high risk type, so that the target node processes and responds to the access request;
  • the first sending module 404 is configured to receive response information returned by the target node, and send the response information to the target terminal, the response information including at least part of the file data rendered by the target node flow.
  • the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node.
  • the response information further includes a control data flow for instructing the target terminal to render data that has not been rendered.
  • the determining module 402 further includes:
  • the determination module 402 is configured to determine the risk type corresponding to the access request according to the protocol type, URL, or requested data type of the access request, and a pre-configured security access policy.
  • the determining module 402 further includes:
  • a determining module 402 configured to determine address information corresponding to the access request
  • the determining module 402 is configured to determine a risk type corresponding to the access request based on the address information and a pre-configured security access policy.
  • the determining module 402 further includes:
  • the determination module 402 is configured to match the address information with a preset high-risk address set, where the high-risk address set includes at least one high-risk address;
  • the determining module 402 is configured to determine that the risk type corresponding to the access request is a high risk type if the address information exists in the high risk address set.
  • the address information includes at least one of a target access address, a source address, or a static route corresponding to the access request.
  • the determining module 402 further includes:
  • the determination module 402 is configured to receive update information for the security access policy sent by the distributed node or the security management platform;
  • the determining module 402 is configured to update the previously stored security access policy according to the update information.
  • the determining module 402 further includes:
  • the determining module 402 is configured to send the access request to the corresponding target node by using a private communication protocol, GRE, IPsec or PAC.
  • Fig. 7 shows an electronic device for processing an access request according to an exemplary embodiment.
  • an acquisition module 405 including an acquisition module 405, a generation module 406, and a response module 407, which are applied to distributed nodes in a distributed network, including:
  • the obtaining module 405 is configured to obtain the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, and the access request is diverted by the user terminal device according to a pre-configured security access policy;
  • the generating module 406 is configured to render at least part of the data to obtain a corresponding file data stream
  • the response module 407 is configured to send the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal.
  • the generating module 406 further includes:
  • a generating module 406, configured to generate a control data stream for instructing the target terminal to render the unrendered data for the unrendered data;
  • the generating module 406 is configured to send the control data stream and the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal.
  • the generating module 406 further includes:
  • the generating module 406 is configured to identify high-risk addresses and obtain update information for security access policies
  • the generating module 406 is configured to send the update information to the user terminal device, so that the user terminal device can update the security access policy according to the update information.
  • the generating module 406 further includes:
  • the generation module 406 is configured to render at least part of the data to obtain a corresponding file data stream, including:
  • the generating module 406 is configured to read the attribute information of the target terminal according to the access request;
  • the generating module 406 is configured to create a rendering application instance corresponding to the attribute information according to the attribute information;
  • the generating module 406 is configured to use the rendering application instance to render at least part of the data to obtain a corresponding file data stream.
  • the generating module 406 further includes:
  • the generating module 406 is configured to send to the target terminal an acquisition request for attribute information of the target terminal according to the access request, where the attribute information is used to describe the page display characteristics of the target terminal;
  • the generating module 406 is configured to create a rendering application instance corresponding to the attribute information based on the attribute information fed back by the target terminal according to the acquisition request;
  • the generating module 406 is configured to use the rendering application instance to render at least part of the data to obtain a corresponding file data stream.
  • the generating module 406 further includes:
  • the generating module 406 is configured to determine the data to be rendered corresponding to the access request according to the access request sent by the user terminal device;
  • a generating module 406 configured to detect whether the current node stores the data
  • a generating module 406, configured to obtain the data from the current node, if any;
  • the generating module 406 is configured to obtain the data from the original server if there is no data.
  • Fig. 8 shows an electronic device for processing an access request according to an exemplary embodiment. Among them, including the second sending module 408, the second receiving module 409, and the display module 410, applied to the target terminal, including:
  • the second sending module 408 is configured to send an access request to the user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy;
  • the second receiving module 409 is configured to receive response information sent by the user terminal device, where the response information includes at least part of the file data stream rendered by the target node;
  • the display module 410 is configured to display the resource corresponding to the access request according to the file data stream.
  • the second receiving module 409 further includes:
  • the second receiving module 409 is configured to display the resource corresponding to the access request according to the file data stream, including:
  • the second receiving module 409 is configured to update the file data stream according to the control data stream and the unrendered data
  • the second receiving module 409 is configured to display the resource corresponding to the access request according to the updated file data stream.
  • Fig. 9 is a logical structural block diagram of an electronic device according to an exemplary embodiment.
  • the electronic device 500 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.
  • a non-transitory computer-readable storage medium including instructions, such as a memory including instructions, the instructions can be executed by a processor of an electronic device to complete the above-mentioned network monitoring method, the method includes:
  • the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy.
  • the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node.
  • the above instructions may also be executed by the processor of the electronic device to complete other steps involved in the above exemplary embodiments.
  • the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
  • an application program/computer program product including one or more instructions, the one or more instructions can be executed by a processor of an electronic device, so as to complete the above-mentioned network monitoring method, the The method includes: in this disclosure, the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy.
  • the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node.
  • the above instructions may also be executed by the processor of the electronic device to complete other steps involved in the above exemplary embodiments.
  • FIG. 9 is an example diagram of a computer device 50 .
  • the schematic diagram 9 is only an example of the computer device 50, and does not constitute a limitation to the computer device 50, and may include more or less components than those shown in the figure, or combine certain components, or different components , for example, the computer device 50 may also include an input and output device, a network access device, a bus, and the like.
  • the so-called processor 502 may be a central processing unit (Central Processing Unit, CPU), and may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor can be a microprocessor or the processor 502 can also be any conventional processor, etc.
  • the processor 502 is the control center of the computer device 50 and uses various interfaces and lines to connect various parts of the entire computer device 50 .
  • the memory 501 can be used to store computer-readable instructions 503 , and the processor 502 implements various functions of the computer device 50 by running or executing computer-readable instructions or modules stored in the memory 501 and calling data stored in the memory 501 .
  • the memory 501 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.); Data created using the computer device 50 and the like.
  • the memory 501 can include a hard disk, a memory, a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, a flash memory card (Flash Card), at least one magnetic disk storage device, a flash memory device, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), or other non-volatile/volatile storage devices.
  • a hard disk a memory
  • a plug-in hard disk a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, a flash memory card (Flash Card), at least one magnetic disk storage device, a flash memory device, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), or other non-volatile/volatile storage devices.
  • a smart memory card Smart Media Card, SMC
  • the integrated modules of the computer device 50 are realized in the form of software function modules and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, all or part of the procedures in the methods of the above exemplary embodiments in the present disclosure can also be completed by instructing related hardware through computer-readable instructions, and the computer-readable instructions can be stored in a computer-readable storage medium In this example, when the computer readable instructions are executed by the processor, the steps of the above exemplary method embodiments can be realized.
  • the access request initiated by the terminal user is diverted to a specific node in the distributed network through the user terminal device according to the pre-configured security access policy , so that the node processes the access request and returns the response data to the terminal user through the user terminal device.
  • the node processes the access request and returns the response data to the terminal user through the user terminal device.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The present disclosure relates to an access request processing method, an electronic apparatus, an electronic device, and a medium. In the present disclosure, a user terminal device may receive an access request sent by a target terminal, and determine, on the basis of a pre-configured security access policy, a risk type that is for describing a security risk degree and that corresponds to the access request. After determining that the risk type corresponding to the access request is a high risk type, the access request is directed to a corresponding target node such that the target node processes and responds to the access request. Finally, response information returned by the target node is received and sent to the target terminal, wherein the response information comprises at least part of a file data stream rendered by the target node.

Description

访问请求的处理方法、电子装置、电子设备以及介质Access request processing method, electronic device, electronic equipment, and medium

本公开基于2021年9月18日提交中国专利局、申请号为202111112491.5,发明名称为“访问请求的处理方法、电子装置、电子设备以及介质”的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本公开作为参考。This disclosure is based on the Chinese patent application submitted to the China Patent Office on September 18, 2021, with the application number 202111112491.5, and the title of the invention is "Access Request Processing Method, Electronic Device, Electronic Equipment, and Medium", and requires the Chinese patent application Priority, the entire content of the Chinese patent application is hereby incorporated by reference into this disclosure.

技术领域technical field

本公开实施例涉及但不限于一种访问请求的处理方法、电子装置、电子设备以及介质。Embodiments of the present disclosure relate to but are not limited to a method for processing an access request, an electronic device, an electronic device, and a medium.

背景技术Background technique

随着互联网技术的发展,网络攻击的规模和速度在不断增加,网络安全所面临的挑战日益严峻。With the development of Internet technology, the scale and speed of network attacks are increasing, and the challenges faced by network security are becoming increasingly severe.

在相关技术中,一般采用安装防火墙或者安全软件的方式以避免遭受网络攻击。然而,防火墙或者安全软件的安装过程较为繁琐,且有时也需要在多个设备进行安装,同时防火墙或者安全软件需要专业人员进行维护,由此造成人工成本和经济成本较高。In related technologies, generally, a firewall or security software is installed to avoid network attacks. However, the installation process of the firewall or security software is relatively cumbersome, and sometimes needs to be installed on multiple devices. At the same time, the firewall or security software needs to be maintained by professionals, resulting in high labor and economic costs.

因此,如何确保用户的网络安全,并降低各种维护安全设备的成本成为了亟需解决的技术问题。Therefore, how to ensure the network security of users and reduce the cost of maintaining various security devices has become a technical problem that needs to be solved urgently.

发明内容Contents of the invention

以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics described in detail in this article. This summary is not intended to limit the scope of the claims.

本公开提供一种访问请求的处理方法、电子装置、电子设备以及介质,用以解决相关技术中存在的用户的网络访问容易存在安全隐患,并且维护各种安全设备的成本较高的问题。The present disclosure provides an access request processing method, an electronic device, an electronic device, and a medium to solve the problems in the related art that the user's network access is prone to security risks and the cost of maintaining various security devices is high.

根据本公开的第一方面,提供的一种访问请求的处理方法,应用于用户终端设备,该方法包括:According to the first aspect of the present disclosure, a method for processing an access request is provided, which is applied to a user terminal device, and the method includes:

接收由目标终端发送的访问请求;receiving an access request sent by the target terminal;

基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,所述风险类型用于描述所述访问请求对应的安全风险程度;Determine a risk type corresponding to the access request based on the access request and a pre-configured security access policy, where the risk type is used to describe the security risk degree corresponding to the access request;

若所述访问请求对应的风险类型为高风险类型,则将所述访问请求引流至对应的目标节点,以使所述目标节点处理并响应所述访问请求;If the risk type corresponding to the access request is a high risk type, directing the access request to a corresponding target node, so that the target node processes and responds to the access request;

接收由所述目标节点返回的响应信息,并将所述响应信息向所述目标终端进行发送,所 述响应信息包括至少部分由所述目标节点渲染的文件数据流。Receiving response information returned by the target node, and sending the response information to the target terminal, the response information including at least part of the file data stream rendered by the target node.

根据本公开的第二方面,提供的一种访问请求的处理方法,应用于分布式网络中的分布式节点,该方法包括:According to the second aspect of the present disclosure, a method for processing an access request is provided, which is applied to a distributed node in a distributed network, and the method includes:

根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据,所述访问请求由所述用户终端设备根据预先配置的安全访问策略进行引流;According to the access request sent by the user terminal device, the data to be rendered corresponding to the access request is obtained, and the access request is diverted by the user terminal device according to a pre-configured security access policy;

对至少部分所述数据进行渲染,得到对应的文件数据流;Rendering at least part of the data to obtain a corresponding file data stream;

将所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。Sending the file data stream as response information to the user terminal device, so that the user terminal device sends the response information to the target terminal.

根据本公开的第三方面,提供的一种访问请求的处理方法,应用于目标终端,该方法包括:According to a third aspect of the present disclosure, a method for processing an access request is provided, which is applied to a target terminal, and the method includes:

向用户终端设备发送访问请求,以使所述用户终端设备根据预先配置的安全访问策略对所述访问请求进行访问控制;Sending an access request to the user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy;

接收由所述用户终端设备发送的响应信息,所述响应信息包括至少部分由目标节点渲染的文件数据流;receiving response information sent by the user terminal device, the response information including at least part of the file data stream rendered by the target node;

根据所述文件数据流,显示所述访问请求对应的资源。According to the file data stream, the resource corresponding to the access request is displayed.

根据本公开的第四方面,提供的一种访问请求的处理电子装置,应用于用户终端设备,包括:According to a fourth aspect of the present disclosure, an access request processing electronic device is provided, which is applied to a user terminal device, including:

第一接收模块,被配置为接收由目标终端发送的访问请求;The first receiving module is configured to receive the access request sent by the target terminal;

确定模块,被配置为基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,所述风险类型用于描述所述访问请求对应的安全风险程度;A determination module configured to determine a risk type corresponding to the access request based on the access request and a preconfigured security access policy, where the risk type is used to describe the degree of security risk corresponding to the access request;

处理模块,被配置为若所述访问请求对应的风险类型为高风险类型,则将所述访问请求引流至对应的目标节点,以使所述目标节点处理并响应所述访问请求;A processing module configured to divert the access request to a corresponding target node if the risk type corresponding to the access request is a high risk type, so that the target node processes and responds to the access request;

第一发送模块,被配置为接收由所述目标节点返回的响应信息,并将所述响应信息向所述目标终端进行发送,所述响应信息包括至少部分由所述目标节点渲染的文件数据流。A first sending module, configured to receive response information returned by the target node, and send the response information to the target terminal, the response information including at least part of the file data stream rendered by the target node .

其中,根据本公开的第五方面,提供的一种访问请求的处理电子装置,应用于分布式网络中的分布式节点,包括:Wherein, according to the fifth aspect of the present disclosure, an access request processing electronic device is provided, which is applied to distributed nodes in a distributed network, including:

获取模块,被配置为根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据,所述访问请求由所述用户终端设备根据预先配置的安全访问策略进行引流;The obtaining module is configured to obtain the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, and the access request is drained by the user terminal device according to a pre-configured security access policy;

生成模块,被配置为对至少部分所述数据进行渲染,得到对应的文件数据流;A generating module configured to render at least part of the data to obtain a corresponding file data stream;

响应模块,被配置为将所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。The response module is configured to send the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal.

其中,根据本公开的第六方面,提供的一种访问请求的处理电子装置,应用于目标终端,包括:Among them, according to the sixth aspect of the present disclosure, an access request processing electronic device is provided, which is applied to a target terminal, including:

第二发送模块,被配置为向用户终端设备发送访问请求,以使所述用户终端设备根据预先配置的安全访问策略对所述访问请求进行访问控制;The second sending module is configured to send an access request to a user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy;

第二接收模块,被配置为接收由所述用户终端设备发送的响应信息,所述响应信息包括至少部分由目标节点渲染的文件数据流;The second receiving module is configured to receive response information sent by the user terminal device, where the response information includes at least part of the file data stream rendered by the target node;

显示模块,被配置为根据所述文件数据流,显示所述访问请求对应的资源。The display module is configured to display the resource corresponding to the access request according to the file data stream.

根据本公开的第七方面,提供的一种电子设备,包括:According to a seventh aspect of the present disclosure, an electronic device is provided, including:

存储器,设置为存储可执行指令;以及a memory configured to store executable instructions; and

显示器,设置为与所述存储器显示以执行所述可执行指令从而完成上述任一所述访问请求的处理方法的操作。A display configured to be displayed with the memory to execute the executable instructions so as to complete the operation of any one of the access request processing methods described above.

根据本公开的第八方面,提供的一种计算机可读存储介质,设置为存储计算机可读取的指令,所述指令被执行时执行上述任一方面所述的访问请求的处理方法的操作。According to an eighth aspect of the present disclosure, there is provided a computer-readable storage medium configured to store computer-readable instructions, and when the instructions are executed, operations of the access request processing method described in any one of the above aspects are performed.

在本公开中,可以由用户终端设备接收由目标终端发送的访问请求,并基于预先配置的安全访问策略,确定访问请求对应的用于描述安全风险程度的风险类型。并在确定访问请求对应的风险类型为高风险类型后,将访问请求引流至对应的目标节点,以使目标节点处理并响应访问请求,最后接收由目标节点返回的响应信息,并将响应信息向目标终端进行发送,其中响应信息包括至少部分由目标节点渲染的文件数据流。通过应用本公开的技术方案,可以通过用户终端设备根据预先配置的安全访问策略来将终端用户发起的访问请求引流至分布式网络中的特定节点处,以使该节点对该访问请求进行处理后并将响应数据通过用户终端设备返回给终端用户。从而避免终端用户发起的访问请求直接到达恶意网站处所导致的带给用户数据安全隐患的弊端,保证了用户的网络安全,同时也无需用户维护多个安全设备,降低了维护成本。In the present disclosure, the user terminal device may receive the access request sent by the target terminal, and based on the pre-configured security access policy, determine the risk type corresponding to the access request and used to describe the degree of security risk. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node. By applying the technical solution of the present disclosure, the access request initiated by the end user can be diverted to a specific node in the distributed network through the user terminal device according to the pre-configured security access policy, so that the node can process the access request And return the response data to the end user through the user terminal equipment. In this way, it avoids the disadvantages of bringing user data security risks caused by the access request initiated by the end user directly to the malicious website, ensures the user's network security, and also does not require the user to maintain multiple security devices, reducing maintenance costs.

下面通过附图和示例性实施例,对本公开的技术方案做进一步的详细描述。The technical solutions of the present disclosure will be described in further detail below with reference to the accompanying drawings and exemplary embodiments.

应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。在阅读并理解了附图和详细描述后,可以明白其他方面。It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure. Other aspects will be apparent to others upon reading and understanding the drawings and detailed description.

附图说明Description of drawings

构成本公开的一部分的附图用来提供对本公开的进一步理解,本公开的示例性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。在附图中:The accompanying drawings constituting a part of the present disclosure are used to provide a further understanding of the present disclosure, and the exemplary embodiments and descriptions of the present disclosure are used to explain the present disclosure, and do not constitute an improper limitation of the present disclosure. In the attached picture:

图1是根据一示例性实施例示出的一种访问请求的处理方法示意图;Fig. 1 is a schematic diagram of a method for processing an access request according to an exemplary embodiment;

图2是根据一示例性实施例示出的又一种访问请求的处理方法示意图;Fig. 2 is a schematic diagram showing another access request processing method according to an exemplary embodiment;

图3是根据一示例性实施例示出的又一种访问请求的处理方法示意图;Fig. 3 is a schematic diagram showing another access request processing method according to an exemplary embodiment;

图4-图5是根据一示例性实施例示出的一种访问请求的处理方法流程示意图;4-5 are schematic flowcharts of a method for processing an access request according to an exemplary embodiment;

图6-图8是根据一示例性实施例示出的一种访问请求的处理电子装置示意图;6-8 are schematic diagrams of an electronic device for processing an access request according to an exemplary embodiment;

图9是根据一示例性实施例示出的一种访问请求的处理电子设备示意图。Fig. 9 is a schematic diagram of an electronic device for processing an access request according to an exemplary embodiment.

具体实施方式Detailed ways

现在将参照附图来详细描述本公开的各种示例性实施例。应注意到:除非另外具体说明,否则在这些实施例中阐述的部件和步骤的相对布置、数字表达式和数值不限制本公开的范围。Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that relative arrangements of components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

同时,应当明白,为了便于描述,附图中所示出的各个部分的尺寸并不是按照实际的比例关系绘制的。At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

以下对至少一个示例性实施例的描述实际上仅仅是说明性的,不作为对本公开及其应用或使用的任何限制。The following description of at least one exemplary embodiment is merely illustrative in nature and not intended as any limitation of the disclosure, its application or uses.

对于相关领域普通技术人员已知的技术、方法和设备可能不作详细讨论,但在适当情况下,所述技术、方法和设备应当被视为说明书的一部分。Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the description.

应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步讨论。It should be noted that like numerals and letters denote like items in the following figures, therefore, once an item is defined in one figure, it does not require further discussion in subsequent figures.

另外,本公开各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本公开要求的保护范围之内。In addition, the technical solutions of the various embodiments of the present disclosure can be combined with each other, but it must be based on the realization of those skilled in the art. When the combination of technical solutions is contradictory or cannot be realized, it should be considered as a combination of technical solutions. Does not exist, nor is it within the scope of protection claimed by the present disclosure.

需要说明的是,本公开实施例中所有方向性指示(诸如上、下、左、右、前、后……)仅用于解释在某一特定姿态(如附图所示)下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变。It should be noted that all directional indications (such as up, down, left, right, front, back...) in the embodiments of the present disclosure are only used to explain the relationship between the components in a certain posture (as shown in the drawing). If the specific posture changes, the directional indication will also change accordingly.

下面结合图1-图5来描述根据本公开示例性实施方式的用于进行访问请求的处理方法。需要注意的是,下述应用场景仅是为了便于理解本公开的精神和原理而示出,本公开的实施 方式在此方面不受任何限制。相反,本公开的实施方式可以应用于适用的任何场景。The method for processing an access request according to an exemplary embodiment of the present disclosure will be described below with reference to FIGS. 1-5 . It should be noted that the following application scenarios are only shown to facilitate understanding of the spirit and principles of the present disclosure, and the implementation manners of the present disclosure are not limited in this regard. On the contrary, the embodiments of the present disclosure can be applied to any applicable scene.

图1是根据一示例性实施例示出的一种访问请求的处理方法的流程示意图。如图1所示,该方法应用于用户终端设备,包括:Fig. 1 is a schematic flowchart of a method for processing an access request according to an exemplary embodiment. As shown in Figure 1, the method is applied to user terminal equipment, including:

S101,接收由目标终端发送的访问请求。S101. Receive an access request sent by a target terminal.

其中,用户终端设备可以是网络位置上靠近用户侧的设备,该用户终端设备可以接收移动终端所发送的数据流量,并基于所接收到的数据流量进行一定处理,例如安全访问控制、数据防泄漏等等,再将该数据流量发送至对应的目标网络或者目标设备中。例如该用户终端设备可以是CPE(Customer Premise Equipment,用户前置设备)、无线路由器、防火墙、服务器、光猫、便携式计算机或者台式计算机、等等。Wherein, the user terminal device may be a device close to the user side on the network location, the user terminal device may receive the data flow sent by the mobile terminal, and perform certain processing based on the received data flow, such as security access control, data leakage prevention and so on, and then send the data flow to the corresponding target network or target device. For example, the user terminal equipment may be a CPE (Customer Premise Equipment, user front equipment), a wireless router, a firewall, a server, an optical modem, a portable computer or a desktop computer, and the like.

本公开示例性实施例中的用户终端设备可以应用在多种网络环境下,例如包括各类的局域网、城域网以及广域网中。在一些示例性实施例中,用户终端设备可以应用在SD-WAN(Software Defined Wide Area Network,软件定义广域网)中,其也可以应用在分布式网络中,例如内容分发网络或者边缘计算网络等等,本公开对此不作特殊限定。The user terminal equipment in the exemplary embodiments of the present disclosure can be applied in various network environments, for example, including various local area networks, metropolitan area networks, and wide area networks. In some exemplary embodiments, user terminal equipment can be applied in SD-WAN (Software Defined Wide Area Network, software-defined wide area network), which can also be applied in distributed networks, such as content distribution networks or edge computing networks, etc. , which is not specifically limited in the present disclosure.

在示例性实施例中,用户终端设备也可以提供上述用户终端设备所提供的的功能,例如安全访问控制、数据防泄漏等。例如,目标终端可以基于访问请求,确定该访问请求的风险类型,若该风险类型为高风险类型,则将该访问请求发送至对应的目标节点处进行后续处理。In an exemplary embodiment, the user terminal device may also provide functions provided by the above-mentioned user terminal device, such as security access control, data leakage prevention, and the like. For example, the target terminal may determine the risk type of the access request based on the access request, and if the risk type is a high risk type, send the access request to the corresponding target node for subsequent processing.

在示例性实施例中,用户终端设备可以支持一个或多个移动终端的网络访问,例如用户终端设备可以一次性接收一个访问请求进行处理,其也可以是一次性接收多个访问请求,并分别对各个访问请求进行处理等。In an exemplary embodiment, the user terminal device may support network access of one or more mobile terminals. For example, the user terminal device may receive one access request at a time for processing, or it may receive multiple access requests at a time, and separately Process each access request, etc.

访问请求可以是由目标终端发送,用以请求访问对应资源的信息,在示例性实施例中,该资源可以是各种类型的资源,例如该资源可以包括但不限于网页资源、视频资源、图片资源、音频资源或者文字资源等等。在一示例性实施例中,该访问请求也可以是请求访问云端资源的信息,例如云游戏、云桌面等等。The access request may be sent by the target terminal to request access to the information of the corresponding resource. In an exemplary embodiment, the resource may be various types of resources. For example, the resource may include but not limited to web page resources, video resources, pictures resources, audio resources or text resources, etc. In an exemplary embodiment, the access request may also be information requesting access to cloud resources, such as cloud games, cloud desktops, and the like.

在本公开一示例性实施例中,用户可以通过点击目标终端显示界面上的特定区域(例如“访问”按键或者“游戏开始”按键等)以生成访问请求。目标终端可以将该访问请求向用户终端设备进行发送。用户终端设备在接收到该访问请求后,则可以基于该访问请求进行后续处理。In an exemplary embodiment of the present disclosure, the user may generate an access request by clicking on a specific area (such as an "access" button or a "game start" button, etc.) on the display interface of the target terminal. The target terminal may send the access request to the user terminal device. After receiving the access request, the user terminal device may perform subsequent processing based on the access request.

在一示例性实施例中,目标终端可以基于用户终端设备的IP地址,将该访问请求发送至该IP地址对应的用户终端设备中。在另一示例性实施例中,目标终端与用户终端设备之间可以预先建立引流隧道,目标终端可以基于该引流隧道将访问请求发送至用户终端设备。在示 例性实施例中,建立该引流隧道的隧道协议可以包括但不限于GRE、IPsec或PAC等,其也可以是其他任意目标终端和用户终端设备可支持的隧道协议,本公开对此不作特殊限定。In an exemplary embodiment, the target terminal may send the access request to the user terminal device corresponding to the IP address based on the IP address of the user terminal device. In another exemplary embodiment, a diversion tunnel may be pre-established between the target terminal and the user terminal device, and the target terminal may send an access request to the user terminal device based on the diversion tunnel. In an exemplary embodiment, the tunneling protocol for establishing the diversion tunnel may include but not limited to GRE, IPsec, or PAC, etc., and it may also be any other tunneling protocol that the target terminal and user terminal equipment can support. limited.

S102,基于访问请求以及预先配置的安全访问策略,确定访问请求对应的风险类型,风险类型用于描述访问请求对应的安全风险程度。S102. Based on the access request and the preconfigured security access policy, determine a risk type corresponding to the access request, where the risk type is used to describe a security risk degree corresponding to the access request.

其中,安全访问策略可以是用以对用户终端设备所接收到的访问请求进行安全访问控制的策略信息,以保证用户的网络安全,避免其因访问危险网站而造成数据安全隐患。Wherein, the security access policy may be policy information used to perform security access control on the access requests received by the user terminal equipment, so as to ensure the user's network security and avoid potential data security risks caused by accessing dangerous websites.

在本公开一示例性实施例中,用户终端设备可以在接收到访问请求之后,由用户终端设备基于预存的安全访问策略在确定其是否为高风险的访问请求。In an exemplary embodiment of the present disclosure, after receiving an access request, the user terminal device may determine whether it is a high-risk access request based on a pre-stored security access policy.

在示例性实施例中,对于预存的安全访问策略的来说,其可以为由用户(例如为使用目标终端的用户或者提供服务的业务平台的管理用户等)提前配置并将其配置在用户终端设备上。In an exemplary embodiment, for the pre-stored security access policy, it may be configured in advance by the user (for example, the user using the target terminal or the management user of the business platform that provides the service, etc.) and configured on the user terminal on the device.

其中,本公开不对如何根据安全访问策略来确定访问请求对应的风险类型进行具体限定。例如可以将访问请求对应的地址信息与预存的风险地址集合中包含的高风险地址相匹配,从而根据该地址信息是否位于风险地址集合的方式来确定该访问请求对应的风险隐患。又或,也可以将访问请求对应的域名信息与预存的风险域名集合中包含的高风险域名相匹配,从而根据该域名信息是否位于风险域名集合的方式来确定该访问请求对应的风险隐患。还或,也可以将访问请求对应的协议类型与预存的风险协议类型集合中包含的高风险协议相匹配,从而根据该协议类型是否位于风险协议类型集合的方式来确定该访问请求对应的风险隐患。以上仅为示例性实施例,本公开对此不作特殊限定。Wherein, the present disclosure does not specifically limit how to determine the risk type corresponding to the access request according to the security access policy. For example, the address information corresponding to the access request can be matched with the high-risk addresses contained in the pre-stored risk address set, so as to determine the potential risk corresponding to the access request according to whether the address information is in the risk address set. Alternatively, the domain name information corresponding to the access request can also be matched with the high-risk domain names contained in the pre-stored risky domain name set, so as to determine the hidden risk corresponding to the access request according to whether the domain name information is in the risky domain name set. Alternatively, the protocol type corresponding to the access request can also be matched with the high-risk protocols contained in the pre-stored risk protocol type set, so as to determine the potential risk corresponding to the access request according to whether the protocol type is in the risk protocol type set . The above are merely exemplary embodiments, and the present disclosure does not make any special limitation thereto.

S103,若访问请求对应的风险类型为高风险类型,则将访问请求引流至对应的目标节点,以使目标节点处理并响应访问请求。S103. If the risk type corresponding to the access request is a high risk type, divert the access request to a corresponding target node, so that the target node processes and responds to the access request.

一种示例性实施方式中,在当用户终端设备确定访问请求为高风险类型时,那么为了避免相关技术中存在的直接将访问请求发送到风险网站所导致的用户数据出现安全隐患的问题。用户终端设备即可以将该访问请求发送至分布式网络中的一个分布式节点,利用该分布式节点(即目标节点)对该访问请求进行对应处理,从而保证后续在返回给用户终端的响应数据的内容是由该目标节点所渲染生成的。进而避免相关技术中存在的,在用户终端渲染数据所导致的容易造成用户数据安全隐患的问题。In an exemplary implementation manner, when the user terminal device determines that the access request is of a high-risk type, then in order to avoid the problem of potential safety hazards in user data caused by directly sending the access request to a risky website in the related art. The user terminal device can send the access request to a distributed node in the distributed network, and use the distributed node (ie, the target node) to process the access request accordingly, so as to ensure that the subsequent response data returned to the user terminal The content of is rendered by the target node. In order to avoid the problem existing in the related technology, which is caused by rendering data at the user terminal, which may easily lead to hidden dangers of user data security.

一种示例性实施方式中,该目标节点可以为CDN分布式网络中的任意一个或多个节点,且该节点可以为边缘节点也可以为非边缘节点。In an exemplary embodiment, the target node may be any one or more nodes in the CDN distributed network, and the nodes may be edge nodes or non-edge nodes.

例如对于目标节点为CDN网络中的分布式节点来说,分布式节点在接收到引流过来的高 风险类型的访问请求之后,可以首先将引流过来的访问请求转发CDN服务。如果在当前节点找到访问请求对应的数据资源则可以对其中至少部分的数据进行渲染,得到对应的文件数据流后发送给用户终端设备。而当分布式节点未在当前节点找到访问请求对应的数据资源时,则可以进行回源操作,并在后续从源服务器或者上层节点接收到数据资源后,在该分布式节点开启渲染实例。其中在示例性实施例中,每个访问请求都可以建立对应的渲染实例以实现将网页内容、元素或者其他资源进行渲染,并转成安全的文件数据流后返回给用户终端设备。For example, if the target node is a distributed node in the CDN network, after the distributed node receives the high-risk access request diverted, it can first forward the diverted access request to the CDN service. If the data resource corresponding to the access request is found at the current node, at least part of the data can be rendered, and the corresponding file data stream can be obtained and sent to the user terminal device. When the distributed node does not find the data resource corresponding to the access request on the current node, it can perform the back-to-source operation, and after receiving the data resource from the source server or the upper node, start the rendering instance on the distributed node. In an exemplary embodiment, each access request can establish a corresponding rendering instance to render webpage content, elements or other resources, convert it into a safe file data stream, and then return it to the user terminal device.

在另一示例性实施例中,目标节点可以为边缘云网络中的边缘节点,该边缘云网络可以是基于云计算技术的核心和边缘计算的能力,构筑在边缘基础设施之上的云计算平台,以形成边缘位置的计算、网络、存储、安全等能力全面的弹性云平台。该边缘云网络中可以包括多个边缘节点(即分布式节点)。边缘节点在接收到引流过来的高风险类型的访问请求之后,可以进行回源操作,从源服务器接收到该访问请求对应的数据资源后,在该边缘节点开启渲染实例。其中在示例性实施例中,每个访问请求都可以建立对应的渲染实例以实现将网页内容、元素或者其他资源进行渲染,并转成安全的文件数据流后返回给用户终端设备。In another exemplary embodiment, the target node may be an edge node in an edge cloud network, which may be a cloud computing platform based on the core of cloud computing technology and edge computing capabilities, built on edge infrastructure , to form an elastic cloud platform with comprehensive computing, network, storage, security and other capabilities at the edge. The edge cloud network may include multiple edge nodes (that is, distributed nodes). After the edge node receives the high-risk type of access request diverted, it can perform the back-to-source operation, and after receiving the data resource corresponding to the access request from the source server, start the rendering instance on the edge node. In an exemplary embodiment, each access request can establish a corresponding rendering instance to render webpage content, elements or other resources, convert it into a safe file data stream, and then return it to the user terminal device.

本公开示例性实施例可以通过默认路由网关的方式,将高风险类型的访问请求引流至CDN边缘节点中,即预先确定用户终端设备与目标节点之间的对应关系,当确定访问请求为高风险类型时,即可以将该访问请求发送至对应的目标节点,以由该目标节点对访问请求进行处理。Exemplary embodiments of the present disclosure can divert high-risk access requests to CDN edge nodes through the default routing gateway, that is, predetermine the correspondence between user terminal equipment and target nodes, and when the access request is determined to be high-risk type, the access request can be sent to the corresponding target node, so that the access request can be processed by the target node.

在本公开一示例性实施例中,若确定该访问请求对应的风险类型为低风险类型时,则用户终端设备可以将该访问请求向对应的目标设备或目标网络进行发送,例如该访问请求为访问www.A.com的请求,在确定该访问请求的风险类型为低风险类型后,表明www.A.com为安全的目的地址,则用户终端设备可以将该访问请求发送至www.A.com的源服务器处。In an exemplary embodiment of the present disclosure, if it is determined that the risk type corresponding to the access request is a low risk type, the user terminal device may send the access request to the corresponding target device or target network, for example, the access request is For a request to visit www.A.com, after determining that the risk type of the access request is a low-risk type, indicating that www.A.com is a safe destination address, the user terminal device can send the access request to www.A.com. com's source server.

S104,接收由目标节点返回的响应信息,并将响应信息向目标终端进行发送,响应信息包括至少部分由目标节点渲染的文件数据流。S104. Receive response information returned by the target node, and send the response information to the target terminal, where the response information includes at least part of the file data stream rendered by the target node.

本公开中,可以由用户终端设备接收由目标终端发送的访问请求,并基于预先配置的安全访问策略,确定访问请求对应的用于描述安全风险程度的风险类型。并在确定访问请求对应的风险类型为高风险类型后,将访问请求引流至对应的目标节点,以使目标节点处理并响应访问请求,最后接收由目标节点返回的响应信息,并将响应信息向目标终端进行发送,其中响应信息包括至少部分由目标节点渲染的文件数据流。通过应用本公开的技术方案,可以通过用户终端设备来将终端用户发起的访问请求引流至分布式网络中的特定节点处,以使该节点对该访问请求进行处理后将响应数据通过用户终端设备返回给终端用户。从而避免终端 用户发起的访问请求直接到达恶意网站处所导致的带给用户数据安全隐患的弊端。In the present disclosure, the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node. By applying the technical solution of the present disclosure, the access request initiated by the end user can be diverted to a specific node in the distributed network through the user terminal device, so that the node processes the access request and sends the response data through the user terminal device returned to the end user. In this way, the disadvantages of bringing hidden dangers to user data security caused by the access request initiated by the end user directly reaching the malicious website are avoided.

在一些示例性的实施例中,响应信息还包括用于指示目标终端对未被渲染的数据进行渲染的控制数据流。In some exemplary embodiments, the response information further includes a control data flow for instructing the target terminal to render the unrendered data.

一种示例性实施方式中,由于目标节点可以将访问请求对应的数据资源全部进行渲染后返回给用户终端设备,也可以只渲染其中部分的数据资源后返回给用户终端设备。因此,如果存在有需要返回给目标终端的未被渲染的数据,则响应信息中还可以包括有用于指示目标终端对未被渲染的数据进行渲染的控制数据流。In an exemplary embodiment, since the target node may render all the data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device. Therefore, if there is unrendered data that needs to be returned to the target terminal, the response information may further include a control data flow for instructing the target terminal to render the unrendered data.

在一示例性实施例中,该控制数据流中可以携带未被渲染的数据,以供目标终端进行获取,由此,目标终端无需额外再进行获取,既提高了目标终端的处理效率,同时也避免了目标终端再去访问恶意网站,从而保证目标终端的数据的安全性。In an exemplary embodiment, the control data stream may carry unrendered data for the target terminal to acquire, thus, the target terminal does not need to acquire additionally, which not only improves the processing efficiency of the target terminal, but also This prevents the target terminal from accessing malicious websites, thereby ensuring the data security of the target terminal.

本公开的示例性实施例不对如何确定目标节点需要渲染的数据的方式进行具体限定。例如目标节点可以根据访问请求对应的待渲染的数据的动静态类型进行确定,例如,动态类型的数据由目标节点进行数据,静态类型的数据由目标终端进行渲染等;目标节点也可以根据访问请求对应的待渲染的数据的大小进行确定,例如大小超过一定阈值的数据由目标节点进行渲染,大小小于该阈值的数据由目标终端进行渲染等等。Exemplary embodiments of the present disclosure do not specifically limit the manner of how to determine the data to be rendered by the target node. For example, the target node can be determined according to the dynamic and static types of the data to be rendered corresponding to the access request. For example, the data of the dynamic type is processed by the target node, and the data of the static type is rendered by the target terminal, etc.; the target node can also be determined according to the access request The size of the corresponding data to be rendered is determined, for example, the data whose size exceeds a certain threshold is rendered by the target node, and the data whose size is smaller than the threshold is rendered by the target terminal, and so on.

在一些示例性的实施例中,基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,包括;In some exemplary embodiments, based on the access request and a pre-configured security access policy, determining the risk type corresponding to the access request includes;

根据访问请求的协议类型、URL、或所请求的数据类型,以及预先配置的安全访问策略,确定访问请求对应的风险类型。According to the protocol type, URL, or requested data type of the access request, and the pre-configured security access policy, determine the risk type corresponding to the access request.

在一些示例性的实施例中,基于访问请求以及预先配置的安全访问策略,确定访问请求对应的风险类型,包括:In some exemplary embodiments, based on the access request and the pre-configured security access policy, determining the risk type corresponding to the access request includes:

确定访问请求对应的地址信息;Determine the address information corresponding to the access request;

基于地址信息以及预先配置的安全访问策略,确定访问请求对应的风险类型。Based on the address information and the pre-configured security access policy, determine the risk type corresponding to the access request.

一种示例性实施例中,可以根据访问请求对应的地址信息是否在风险地址集合中来确定该访问请求的风险类型。In an exemplary embodiment, the risk type of the access request may be determined according to whether the address information corresponding to the access request is in the risk address set.

具体的,例如可以将访问请求对应的地址信息与预存的风险地址集合相匹配,从而根据该地址信息是否位于风险地址集合的方式来确定该访问请求对应的风险隐患。在示例性的实施例中,如果该访问请求对应的地址信息存在于风险地址集合中,则可以确定访问请求对应于高风险类型。否则确定访问请求对应于非高风险类型。Specifically, for example, the address information corresponding to the access request may be matched with a pre-stored risk address set, so as to determine the hidden risk corresponding to the access request according to whether the address information is in the risk address set. In an exemplary embodiment, if the address information corresponding to the access request exists in the risk address set, it may be determined that the access request corresponds to a high risk type. Otherwise, it is determined that the access request corresponds to a non-high risk category.

在另一示例性实施例中,还可以根据访问请求中的协议类型、URL、或所请求的数据类型中的至少一种以及预先配置的安全访问策略,确定该访问请求对应的风险类型,确定方式可以参考上文所述,本公开在此不再赘述。由此,可以基于访问请求中携带的多种信息,确定该访问请求的风险类型,可以保证风险类型确定的有效性,进而保证了用户的网络访问的安全性。In another exemplary embodiment, it is also possible to determine the risk type corresponding to the access request according to at least one of the protocol type, URL, or requested data type in the access request and the pre-configured security access policy, and determine For the manner, reference may be made to the above description, and the present disclosure will not repeat them here. Thus, the risk type of the access request can be determined based on various information carried in the access request, which can ensure the effectiveness of determining the risk type, thereby ensuring the security of the user's network access.

在一些示例性的实施例中,基于地址信息以及预先配置的安全访问策略,确定访问请求对应的风险类型,包括:In some exemplary embodiments, based on the address information and the pre-configured security access policy, determining the risk type corresponding to the access request includes:

将地址信息与预先设定的高风险地址集合进行匹配,高风险地址集合中包括至少一个高风险地址;Matching the address information with a preset high-risk address set, where at least one high-risk address is included in the high-risk address set;

若地址信息存在于高风险地址集合中,确定访问请求对应的风险类型为高风险类型。If the address information exists in the high-risk address set, determine that the risk type corresponding to the access request is a high-risk type.

其中,地址信息包括访问请求对应的目标访问地址、源地址或静态路由中的至少一种。Wherein, the address information includes at least one of a target access address, a source address, or a static route corresponding to the access request.

一种示例性实施方式中,可以将访问请求对应的目标访问地址与预存的风险地址集合相匹配,从而根据该目标访问地址是否位于风险地址集合的方式来确定该访问请求对应的风险隐患。又或,也可以将访问请求对应的源地址与预存的风险域名集合相匹配,从而根据该源地址是否位于风险域名集合的方式来确定该访问请求对应的风险隐患。还或,也可以将访问请求对应的静态路由信息与预存的风险静态路由信息集合相匹配,从而根据该静态路由信息是否位于风险静态路由信息集合的方式来确定该访问请求对应的风险隐患。在示例性的实施例中,该静态路由可以是预先确定的该目标终端的访问请求的传输路由,若该传输路由中某一跳的地址位于风险地址集合中,则表示该传输路由具有安全风险,因此,可以将该访问请求的风险类型确定为高风险类型。In an exemplary embodiment, the target access address corresponding to the access request can be matched with a pre-stored risk address set, so as to determine the potential risk corresponding to the access request according to whether the target access address is in the risk address set. Alternatively, the source address corresponding to the access request can also be matched with the pre-stored risk domain name set, so as to determine the potential risk corresponding to the access request according to whether the source address is in the risk domain name set. Alternatively, the static routing information corresponding to the access request can also be matched with the pre-stored risk static routing information set, so as to determine the potential risk corresponding to the access request according to whether the static routing information is in the risk static routing information set. In an exemplary embodiment, the static route may be a predetermined transmission route of the access request of the target terminal, and if the address of a certain hop in the transmission route is in the risk address set, it means that the transmission route has a security risk , therefore, the risk type of the access request may be determined as a high risk type.

在一些示例性的实施例中,在基于访问请求以及预先配置的安全访问策略,确定访问请求对应的风险类型之前,还包括:In some exemplary embodiments, before determining the risk type corresponding to the access request based on the access request and the pre-configured security access policy, the method further includes:

接收由分布式节点或安全管理平台发送的针对安全访问策略的更新信息;Receive updated information on security access policies sent by distributed nodes or security management platforms;

根据更新信息对在先存储的安全访问策略进行更新。The previously stored security access policy is updated according to the update information.

一种示例性的实施方式中,本公开中的预先配置的安全访问策略可以定期对其进行更新,其中本公开不对生成更新信息的主体或周期进行具体限定。例如可以为由分布式节点按照一定的更新周期对安全访问策略进行更新以生成更新信息,也可以由安全管理平台按照一定的更新周期对安全访问策略进行更新以生成更新信息。In an exemplary implementation manner, the pre-configured security access policy in the present disclosure may be updated periodically, and the present disclosure does not specifically limit the subject or period of generating update information. For example, the distributed node may update the security access policy according to a certain update cycle to generate update information, or the security management platform may update the security access policy according to a certain update cycle to generate update information.

在示例性的实施例中,当用户终端设备检测到当前存在有更新信息时,即可以按照该更新信息将当前已经获取的安全访问策略进行更新升级。从而保证最佳的访问请求的安全访问 策略。In an exemplary embodiment, when the user terminal device detects that there is currently updated information, it can update and upgrade the currently acquired security access policy according to the updated information. So as to ensure the best security access policy for access requests.

在一些示例性的实施例中,将访问请求引流至对应的目标节点,包括:In some exemplary embodiments, directing the access request to the corresponding target node includes:

采用私有通信协议、GRE、IPsec或PAC将访问请求发送至对应的目标节点。The access request is sent to the corresponding target node using a private communication protocol, GRE, IPsec or PAC.

一种示例性实施方式中,本公开在将访问请求引流至对应的目标节点的过程中,可以通过多种传输方式发送访问请求。例如利用私有通信协议发送访问请求,也可以通过GRE(General Routing Encapsulation,通用路由封装)通道发送访问请求。还可以通过IPsec(Security Architecture for IP network IP层协议安全结构)发送访问请求。又或,可以通过PAC(Programmable Automation Controller代理自动配置)规则发送访问请求等等。In an exemplary implementation manner, in the process of diverting the access request to the corresponding target node in the present disclosure, the access request may be sent through various transmission methods. For example, use a private communication protocol to send an access request, or send an access request through a GRE (General Routing Encapsulation, general routing encapsulation) channel. Access requests can also be sent through IPsec (Security Architecture for IP network IP layer protocol security structure). Or, access requests can be sent through PAC (Programmable Automation Controller proxy automatic configuration) rules and so on.

一种示例性实施方式中,用户终端设备在接收到访问请求后,可以根据访问请求中包含的目标访问地址,向分布式网络中的调度节点发送针对该目标访问地址的调度请求,以使调度节点根据预设规则,为该目标访问地址的调度请求分配一个用于处理访问请求的目标节点。其中,该预设规则可以为调度节点根据访问请求确定对应目标终端的区域信息或源站区域信息等参数,并根据负载均衡算法,从多个分布式节点中选取与终端的区域信息或源站区域信息等参数相匹配的节点作为目标节点。In an exemplary embodiment, after receiving an access request, the user terminal device may send a scheduling request for the target access address to a scheduling node in the distributed network according to the target access address included in the access request, so that the scheduling The node assigns a target node for processing the access request to the scheduling request of the target access address according to preset rules. Among them, the preset rule can be that the scheduling node determines the area information of the corresponding target terminal or the area information of the source station according to the access request, and selects the area information of the terminal or the area information of the source station from multiple distributed nodes according to the load balancing algorithm. The nodes whose parameters such as area information match are taken as the target nodes.

在一示例性实施例中,分布式节点中可以包含多个服务器,例如调度服务器、配置服务器以及至少一个分布式服务器等等。用户终端设备可以向调度服务器(即调度节点)发送针对该访问请求的调度请求,调度服务器则可以根据预设的调度规则或者负载均衡算法,从至少一个分布式服务器中选择其中之一,作为该访问请求的目标节点,并将该目标节点的地址信息返回给用户终端设备,以供用户终端设备根据该地址信息将该访问请求发送至对应的目标节点处进行后续处理。In an exemplary embodiment, a distributed node may include multiple servers, such as a scheduling server, a configuration server, at least one distributed server, and the like. The user terminal device may send a scheduling request for the access request to the scheduling server (that is, the scheduling node), and the scheduling server may select one of at least one distributed server according to a preset scheduling rule or a load balancing algorithm as the access request. Access the requested target node, and return the address information of the target node to the user terminal device, so that the user terminal device can send the access request to the corresponding target node for subsequent processing according to the address information.

一种示例性实施方式中,在用户终端设备接收由调度节点反馈的目标节点的地址信息后,即可以利用私有协议,将该访问请求通过预先分配的通道以及传输方式发送到目标节点的地址信息处,以使后续由该目标节点处理并响应该访问请求。通过私有协议的设置,其不容易被他人恶意破解或者截取信息,保证了数据传输的安全性。In an exemplary embodiment, after the user terminal device receives the address information of the target node fed back by the scheduling node, it can use a private protocol to send the access request to the address information of the target node through a pre-allocated channel and transmission mode , so that the target node will subsequently process and respond to the access request. Through the setting of the private protocol, it is not easy to be maliciously cracked or intercepted by others, which ensures the security of data transmission.

图2是根据一示例性实施例示出的一种访问请求的处理方法的流程示意图。如图2所示,该方法分布式网络中的分布式节点,包括:Fig. 2 is a schematic flowchart of a method for processing an access request according to an exemplary embodiment. As shown in Figure 2, the method distributes distributed nodes in the network, including:

S201,根据由用户终端设备发送的访问请求,获取访问请求对应的待渲染的数据,访问请求由用户终端设备根据预先配置的安全访问策略进行引流。S201. Obtain data to be rendered corresponding to the access request according to the access request sent by the user terminal device, and the access request is diverted by the user terminal device according to a pre-configured security access policy.

一种示例性实施方式中,在当用户终端设备确定访问请求为高风险类型时,那么为了避免相关技术中存在的直接将访问请求发送到风险网站所导致的用户数据出现安全隐患的问 题。用户终端设备即可以将该访问请求发送至分布式网络中的一个分布式节点,利用该分布式节点(即目标节点)对该访问请求进行对应处理,从而保证后续在返回给用户终端的响应数据的内容是由该目标节点所渲染生成的。进而避免相关技术中存在的,在用户终端渲染数据所导致的容易造成用户数据安全隐患的问题。In an exemplary implementation, when the user terminal device determines that the access request is of a high-risk type, then in order to avoid the problem of potential safety hazards in user data caused by directly sending the access request to a risky website in the related art. The user terminal device can send the access request to a distributed node in the distributed network, and use the distributed node (ie, the target node) to process the access request accordingly, so as to ensure that the subsequent response data returned to the user terminal The content of is rendered by the target node. In order to avoid the problem existing in the related technology, which is caused by rendering data at the user terminal, which may easily lead to hidden dangers of user data security.

在示例性的实施例中,本公开中的分布式网络中的分布式节点(即目标节点)可以由调度服务器中的调度节点所确定。In an exemplary embodiment, the distributed nodes (ie target nodes) in the distributed network in the present disclosure may be determined by the scheduling nodes in the scheduling server.

一种示例性实施方式中,分布式节点可以由调度节点从多个分布式节点中随机或指定预先分配的一个分布式节点作为目标节点。另外一种示例性实施方式中,也可以由调度节点根据访问请求对应的访问参数(例如用户终端区域信息、源站区域信息、访问数据信息类型等参数),再根据负载均衡算法,从多个分布式节点中选取与终端区域信息;和/或,源站区域信息相匹配的分布式节点作为目标节点。In an exemplary implementation manner, the distributed node may be a distributed node randomly or pre-designated by the scheduling node from multiple distributed nodes as the target node. In another exemplary embodiment, the scheduling node can also select from multiple Among the distributed nodes, a distributed node that matches the terminal area information; and/or, the source station area information is selected as the target node.

当然,本公开中的分布式网络中的分布式节点(即目标节点)也可以由其他方式进行确定,例如预先分配等,本公开对此不作特殊限定。Certainly, the distributed nodes (that is, the target nodes) in the distributed network in the present disclosure may also be determined in other ways, such as pre-allocation, etc., which are not specifically limited in the present disclosure.

其中,本公开示例性实施例中的分布式网络可以为CDN(Content Delivery Network,内容分发网络)网络,该CDN网络中可以包括多个分布式节点。除CDN网络以外,分布式网络也可以为多台服务器按照分布式架构组成的服务器集群,分布式节点为该服务器集群中的任一服务器。Wherein, the distributed network in the exemplary embodiment of the present disclosure may be a CDN (Content Delivery Network, content distribution network) network, and the CDN network may include multiple distributed nodes. In addition to the CDN network, the distributed network can also be a server cluster composed of multiple servers according to the distributed architecture, and the distributed node is any server in the server cluster.

在示例性的实施例中,分布式网络也可以为边缘云网络,该边缘云网络可以是基于云计算技术的核心和边缘计算的能力,构筑在边缘基础设施之上的云计算平台,以形成边缘位置的计算、网络、存储、安全等能力全面的弹性云平台。该边缘云网络中可以包括多个边缘节点(即分布式节点),从而在更靠近终端的网络边缘上提供服务。应该注意的是,本公开示例性实施例并不限制分布式网络具体为何种网络,任意多台计算设备组成的分布式架构的网络均适用于本公开。In an exemplary embodiment, the distributed network can also be an edge cloud network, which can be based on the core of cloud computing technology and edge computing capabilities, and a cloud computing platform built on edge infrastructure to form An elastic cloud platform with comprehensive computing, network, storage, and security capabilities at the edge. The edge cloud network may include multiple edge nodes (that is, distributed nodes), so as to provide services on the edge of the network closer to the terminal. It should be noted that the exemplary embodiments of the present disclosure do not limit what kind of network the distributed network is, and a network with a distributed architecture composed of any number of computing devices is applicable to the present disclosure.

例如对于目标节点为CDN网络中的分布式节点来说,分布式节点在接收到引流过来的高风险类型的访问请求之后,可以首先将引流过来的访问请求转发CDN服务。如果在当前节点找到访问请求对应的数据资源则可以对其中至少部分的数据进行渲染,得到对应的文件数据流后发送给用户终端设备。而当分布式节点未在节点找到访问请求对应的数据资源时,则可以进行回源操作,并在后续从源服务器或者上层节点接收到数据资源后,在该分布式节点开启渲染实例。其中在示例性实施例中,每个访问请求都可以建立对应的渲染实例以实现将网页内容、元素或其他类型的资源进行渲染,并转成安全的文件数据流后返回给用户终端设备。For example, if the target node is a distributed node in the CDN network, after the distributed node receives the diverted high-risk access request, it can first forward the diverted access request to the CDN service. If the data resource corresponding to the access request is found at the current node, at least part of the data can be rendered, and the corresponding file data stream can be obtained and sent to the user terminal device. When the distributed node does not find the data resource corresponding to the access request on the node, it can perform the back-to-source operation, and after receiving the data resource from the source server or the upper node, start the rendering instance on the distributed node. In an exemplary embodiment, each access request can establish a corresponding rendering instance to render webpage content, elements or other types of resources, and convert it into a safe file data stream and return it to the user terminal device.

S202,对至少部分数据进行渲染,得到对应的文件数据流。S202. Render at least part of the data to obtain a corresponding file data stream.

在本公开一示例性实施例中,本公开中的分布式节点可以将访问请求对应的数据资源全部进行渲染后返回给用户终端设备,也可以只渲染其中部分的数据资源后返回给用户终端设备。本公开对此不作限定。In an exemplary embodiment of the present disclosure, the distributed nodes in the present disclosure may render all the data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device . This disclosure does not limit it.

本公开的一些示例性实施例中的渲染应用实例可以包含多个预先配置的插件,例如,flash插件等。通过该方式无需临时加载或安装相应插件即可实现后续的页面渲染工作,有助于提高渲染效率和节省目标终端的存储资源。The rendering application instance in some exemplary embodiments of the present disclosure may include multiple pre-configured plug-ins, for example, flash plug-ins. In this way, subsequent page rendering can be realized without temporarily loading or installing corresponding plug-ins, which helps to improve rendering efficiency and save storage resources of the target terminal.

在本公开一示例性实施例中,分布式节点在接收到该访问请求后,可以基于该访问请求进行处理并反馈响应信息。例如该访问请求为针对网络页面的访问请求,则分布式节点可以获取该网络页面对应的页面元素和组件,并根据该页面元素和组件进行至少部分渲染后,得到对应的文件数据流。将该文件数据流作为响应信息向用户终端设备进行发送,再由用户终端设备向该目标终端进行发送。In an exemplary embodiment of the present disclosure, after receiving the access request, the distributed nodes may process based on the access request and feed back response information. For example, if the access request is an access request for a web page, the distributed node can obtain the page elements and components corresponding to the web page, and perform at least partial rendering according to the page elements and components to obtain the corresponding file data stream. The file data stream is sent to the user terminal device as response information, and then the user terminal device sends it to the target terminal.

在示例性的实施例中,分布式节点基于渲染后的数据生成对应的文件数据流,可以避免数据未被渲染之前携带恶意代码或者病毒,随着响应信息返回至目标终端处,保证了目标终端的数据的安全性。In an exemplary embodiment, the distributed node generates the corresponding file data stream based on the rendered data, which can avoid carrying malicious code or virus before the data is rendered, and as the response information is returned to the target terminal, it ensures that the target terminal data security.

本公开的一些示例性实施例还可包括建立通用的渲染应用实例的步骤。在示例性实施例中,通用的渲染应用实例可以用于渲染不同属性信息的目标终端的页面内容,例如不同屏幕大小的目标终端和/或不同分辨率的目标终端等。由此,通过建立通用的渲染应用实例,可以避免多次建立的繁琐,单个渲染应用实例即可适配具有不同属性信息的目标终端,提高了渲染效率。Some exemplary embodiments of the present disclosure may further include a step of establishing a general-purpose rendering application instance. In an exemplary embodiment, a common rendering application instance may be used to render page content of target terminals with different attribute information, such as target terminals with different screen sizes and/or target terminals with different resolutions. Therefore, by establishing a common rendering application instance, the tedious establishment of multiple times can be avoided, and a single rendering application instance can be adapted to target terminals with different attribute information, thereby improving rendering efficiency.

具体地,本公开能够根据预先设置的规则生成通用的渲染应用实例,例如每天或每周或每月等首次接收到的访问请求生成通用的渲染应用实例,以利用该通用的渲染应用实例对后续访问请求进行快速处理。例如同时处理多个访问请求或者对多个访问请求进行排序处理等。在示例性实施例中,本公开每次在当前渲染任务完成后能够删除或者释放当前渲染任务所对应的相关渲染数据,以避免他人获取而造成的用户隐私数据泄露的问题,提高本公开的信息安全性。Specifically, the present disclosure can generate a general rendering application instance according to preset rules, for example, a general rendering application instance is generated for the first received access request every day, every week, or every month, so as to utilize the general rendering application instance for subsequent Access requests are processed expeditiously. For example, processing multiple access requests at the same time or sorting multiple access requests. In an exemplary embodiment, the present disclosure can delete or release the relevant rendering data corresponding to the current rendering task each time after the current rendering task is completed, so as to avoid the leakage of user privacy data caused by other people's acquisition and improve the information of the present disclosure. safety.

另外,本公开所述的至少部分渲染可以是由该目标节点可以将访问请求对应的数据资源全部进行渲染后返回给用户终端设备,也可以是分布式节点只渲染其中部分的数据资源后返回给用户终端设备。本公开对此不作限定。In addition, at least part of the rendering described in this disclosure may be that the target node renders all the data resources corresponding to the access request and returns them to the user terminal device, or it may be that the distributed node only renders part of the data resources and returns them to the user terminal device. user terminal equipment. This disclosure does not limit it.

本示例性实施例在确定待渲染数据的过程中,可以通过获取目标终端的用于描述目标终 端的任务处理能力属性信息来得到。在示例性实施例中,若目标终端的任务处理能力较差,则可以不分配或者少分配由其渲染的数据,若目标终端的任务处理能力较强,则可以分配较多由其渲染的数据,从而节省目标节点的计算资源。In this exemplary embodiment, during the process of determining the data to be rendered, it can be obtained by acquiring attribute information of the target terminal used to describe the task processing capability of the target terminal. In an exemplary embodiment, if the task processing capability of the target terminal is poor, no or less data rendered by it may be allocated, and if the task processing capability of the target terminal is stronger, more data rendered by it may be allocated , thus saving the computing resources of the target node.

更为具体地,任务处理能力属性信息可以包括目标终端的计算资源占用信息、网络状态信息及处理器性能信息中的至少一种。More specifically, the task processing capability attribute information may include at least one of computing resource occupancy information, network status information, and processor performance information of the target terminal.

S203,将文件数据流作为响应信息发送给用户终端设备,以使用户终端设备将响应信息向目标终端进行发送。S203. Send the file data stream as response information to the user terminal device, so that the user terminal device sends the response information to the target terminal.

在该示例性实施例中,当目标节点生成渲染后的文件数据流后,可以将该文件数据流作为该访问请求的响应信息发送给对应的用户终端设备,再由该用户终端设备转发至对应的目标终端。In this exemplary embodiment, after the target node generates the rendered file data stream, the file data stream can be sent to the corresponding user terminal device as the response information of the access request, and then forwarded by the user terminal device to the corresponding target terminal.

由此,通过目标节点对待渲染的数据进行至少部分渲染,可以降低目标终端的网络访问的安全风险,保证了目标终端的安全。Therefore, by performing at least partial rendering on the data to be rendered by the target node, the security risk of the target terminal's network access can be reduced, and the security of the target terminal can be guaranteed.

在一些示例性的实施例中,将文件数据流作为响应信息发送给用户终端设备,以使用户终端设备将响应信息向目标终端进行发送,包括:In some exemplary embodiments, sending the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal, includes:

针对未被渲染的数据,生成用于指示目标终端对未被渲染的数据进行渲染的控制数据流;For the unrendered data, generate a control data flow for instructing the target terminal to render the unrendered data;

将控制数据流以及文件数据流作为响应信息发送给用户终端设备,以使用户终端设备将响应信息向目标终端进行发送。Send the control data stream and the file data stream as response information to the user terminal device, so that the user terminal device sends the response information to the target terminal.

一种示例性实施方式中,由于分布式节点可以将访问请求对应的数据资源全部进行渲染后返回给用户终端设备,也可以只渲染其中部分的数据资源后返回给用户终端设备。因此,如果存在有需要返回给目标终端的未被渲染的数据,则响应信息中还可以包括有用于指示目标终端对未被渲染的数据进行渲染的控制数据流。以使后续分布式节点可以将控制数据流以及文件数据流作为响应信息发送给用户终端设备。In an exemplary embodiment, since the distributed node may render all data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device. Therefore, if there is unrendered data that needs to be returned to the target terminal, the response information may further include a control data flow for instructing the target terminal to render the unrendered data. So that the subsequent distributed nodes can send the control data flow and the file data flow to the user terminal equipment as response information.

同样的,本公开不对如何确定目标节点需要渲染的数据的方式进行具体限定。例如目标节点可以根据访问请求对应的请求页面的动静态内容类型,来确定哪些待渲染数据是由自身渲染,哪些待渲染数据是由目标终端进行渲染。从而只针对由自身渲染的数据进行渲染。本示例性实施例在确定待渲染数据的过程中,也可以通过获取目标终端的用于描述目标终端的任务处理能力属性信息来得到,具体如上所述,本公开在此不再赘述。Likewise, the present disclosure does not specifically limit how to determine the data to be rendered by the target node. For example, the target node may determine which data to be rendered is rendered by itself and which data to be rendered is rendered by the target terminal according to the dynamic and static content types of the requested page corresponding to the access request. Thus rendering only for data rendered by itself. In this exemplary embodiment, in the process of determining the data to be rendered, it may also be obtained by acquiring the attribute information of the target terminal used to describe the task processing capability of the target terminal. The details are as described above, which will not be repeated in this disclosure.

目标终端在接收到包含控制数据流和文件数据流的响应信息之后,可以基于该控制数据流,对未渲染的数据进行渲染,并对该文件数据流进行更新,从而得到完成的资源,以根据 该资源在界面中进行显示。After the target terminal receives the response information containing the control data flow and the file data flow, it can render the unrendered data based on the control data flow, and update the file data flow, so as to obtain the completed resources, according to The resource is displayed in the interface.

在一些示例性的实施例中,在根据由用户终端设备发送的访问请求,获取访问请求对应的待渲染的数据之前,还包括:In some exemplary embodiments, before obtaining the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, the method further includes:

进行高风险地址识别,得到针对安全访问策略的更新信息;Identify high-risk addresses and obtain updated information on security access policies;

将更新信息向用户终端设备进行发送,以供用户终端设备根据更新信息对安全访问策略进行更新。The update information is sent to the user terminal equipment, so that the user terminal equipment can update the security access policy according to the update information.

在该示例性实施例中,分布式节点可以进行风险地址识别,从而将网络中的高风险地址添加至风险地址集合中,并生成针对安全访问策略的更新信息,例如将现有的风险地址集合中未包含的高风险地址进行添加,或者将现有的风险地址集合中已解除风险的高风险地址进行删除等等。由此,分布式节点可以将该更新信息向用户终端设备进行发送,以使用户终端设备根据该更新信息对已存的安全访问策略进行更新,保证安全访问策略的时效性。In this exemplary embodiment, distributed nodes can identify risky addresses, thereby adding high-risk addresses in the network to the risky address set, and generating update information for security access policies, for example, adding the existing risky address set Add high-risk addresses not included in the list, or delete high-risk addresses that have been released from the existing risk address set, etc. Therefore, the distributed node can send the update information to the user terminal device, so that the user terminal device can update the existing security access policy according to the update information, so as to ensure the timeliness of the security access policy.

其中,本公开中上述提及的预先配置的安全访问策略可以定期对其进行更新,其中本公开不对生成更新信息的主体或周期进行具体限定。例如可以为由分布式节点按照一定的更新周期对安全访问策略进行更新以生成更新信息,也可以由安全管理平台按照一定的更新周期对安全访问策略进行更新以生成更新信息,其可以按照固定周期进行更新,也可以不按固定后期进行更新,本公开对此不作特殊限定。Wherein, the pre-configured security access policy mentioned above in the present disclosure may be updated regularly, and the present disclosure does not specifically limit the subject or period of generating update information. For example, the distributed nodes can update the security access policy according to a certain update cycle to generate update information, or the security management platform can update the security access policy according to a certain update cycle to generate update information, which can be based on a fixed cycle The update may be performed without a fixed later period, which is not particularly limited in the present disclosure.

在一些示例性的实施例中,访问请求包括所述目标终端的属性信息,属性信息用于描述目标终端的页面显示特征;In some exemplary embodiments, the access request includes attribute information of the target terminal, and the attribute information is used to describe the page display characteristics of the target terminal;

对至少部分数据进行渲染,得到对应的文件数据流,包括:Render at least part of the data to obtain the corresponding file data stream, including:

根据访问请求,读取目标终端的属性信息;According to the access request, read the attribute information of the target terminal;

根据属性信息,建立与属性信息对应的渲染应用实例;According to the attribute information, establish a rendering application instance corresponding to the attribute information;

采用渲染应用实例对至少部分数据进行渲染,得到对应的文件数据流。At least part of the data is rendered by using a rendering application instance to obtain a corresponding file data stream.

一种示例性实施方式中,用于描述目标终端的页面显示特征的属性信息可以为目标终端的屏幕尺寸信息、分辨率信息、运行平台环境信息中的至少一种。In an exemplary embodiment, the attribute information used to describe the page display characteristics of the target terminal may be at least one of screen size information, resolution information, and operating platform environment information of the target terminal.

对于获取属性信息的方式而言,可以由目标终端在发送访问请求的过程中,由目标终端将用于描述自身页面显示特征的属性信息携带在访问请求上。以使后续在分布式节点接收到访问请求后,直接读取该访问请求中携带的属性信息,从而提高目标节点的后续处理效率。Regarding the manner of acquiring attribute information, the target terminal may carry attribute information describing its own page display characteristics on the access request during the process of sending the access request. After the distributed node receives the access request, it can directly read the attribute information carried in the access request, thereby improving the subsequent processing efficiency of the target node.

其中,目标终端例如可以是台式机、笔记本电脑、智能手机、平板电脑、智能手表、智能手环、智能眼镜、智能音箱、车载电脑、AR设备以及VR设备等具有数据访问和数据存储功能的终端设备中的一种或多种。Among them, the target terminal can be, for example, a desktop computer, a notebook computer, a smart phone, a tablet computer, a smart watch, a smart bracelet, smart glasses, a smart speaker, a car computer, an AR device, and a VR device, etc., which have data access and data storage functions. one or more of the devices.

本公开示例性实施例可由分布式节点基于由目标终端生成的用于表征目标终端的页面显示特征的属性信息,建立与其相对应的渲染应用实例,并执行该渲染应用实例,以获取和处理与访问请求对应的待渲染的数据,从而节省目标节点的计算资源,避免通用的渲染应用实例与目标终端不适配,计算能力过剩或者过小的情况发生。In the exemplary embodiment of the present disclosure, based on the attribute information generated by the target terminal to characterize the page display characteristics of the target terminal, the distributed node can establish a rendering application instance corresponding to it, and execute the rendering application instance to obtain and process the corresponding Access the data to be rendered corresponding to the request, thereby saving the computing resources of the target node, avoiding the situation that the general rendering application instance does not match the target terminal, and the computing capacity is excessive or too small.

具体的,本公开示例性实施例中可以通过用户终端的操作电子装置和/或屏幕显示参数来确定用户终端的页面显示特征。其中,例如操作电子装置可以包括安卓操作电子装置,IOS操作电子装置,win操作电子装置等等。而对于屏幕显示参数可以对应于屏幕大小,屏幕分辨率等等。在示例性实施例中,对于不同的操作电子装置和/或不同的屏幕显示参数,为了适配目标终端的页面特征,开启对应的渲染应用实例,可以保证该渲染应用实例的针对性,节省目标节点的计算资源。Specifically, in the exemplary embodiments of the present disclosure, the page display characteristics of the user terminal may be determined through an operating electronic device and/or screen display parameters of the user terminal. Wherein, for example, the operating electronic device may include an Android operating electronic device, an IOS operating electronic device, a Win operating electronic device, and the like. The screen display parameters may correspond to screen size, screen resolution, and so on. In an exemplary embodiment, for different operating electronic devices and/or different screen display parameters, in order to adapt to the page characteristics of the target terminal, the corresponding rendering application instance is opened, which can ensure the pertinence of the rendering application instance and save target The computing resources of the node.

在一些示例性的实施例中,对至少部分数据进行渲染,得到对应的文件数据流,包括:In some exemplary embodiments, at least part of the data is rendered to obtain a corresponding file data stream, including:

根据访问请求,向目标终端发送针对该目标终端的属性信息的获取请求,属性信息用于描述目标终端的页面显示特征;According to the access request, sending an acquisition request for the attribute information of the target terminal to the target terminal, where the attribute information is used to describe the page display characteristics of the target terminal;

基于由目标终端根据获取请求反馈的属性信息,建立与属性信息相对应的渲染应用实例;Based on the attribute information fed back by the target terminal according to the acquisition request, a rendering application instance corresponding to the attribute information is established;

采用渲染应用实例对至少部分数据进行渲染,得到对应的文件数据流。At least part of the data is rendered by using a rendering application instance to obtain a corresponding file data stream.

对于获取属性信息的方式而言,还可以由分布式节点在接收到用户终端设备发送的访问请求之后,向生成该访问请求的目标终端发送一个用于获取属性信息的获取请求。以使后续在接收到目标终端反馈的该属性信息后,可以针对性的为其建立相对应的渲染应用实例。由此,目标节点向目标终端发送针对属性信息的获取请求,以使目标终端目标终端能够感知目标节点的处理过程,从而能够在意外情况(如当前节点故障或响应较慢等)下进行对应操作,例如重新发起访问请求或者发送处理进度查询等操作。Regarding the manner of acquiring attribute information, after receiving the access request sent by the user terminal device, the distributed node may send an acquisition request for acquiring attribute information to the target terminal that generates the access request. In this way, after receiving the attribute information fed back by the target terminal, a corresponding rendering application instance can be specifically established for it. Thus, the target node sends an acquisition request for attribute information to the target terminal, so that the target terminal can perceive the processing process of the target node, so that it can perform corresponding operations under unexpected circumstances (such as current node failure or slow response, etc.) , such as re-initiating access requests or sending processing progress queries.

在一些示例性的实施例中,根据由用户终端设备发送的访问请求,获取访问请求对应的待渲染的数据,包括:In some exemplary embodiments, according to the access request sent by the user terminal device, obtaining the data to be rendered corresponding to the access request includes:

根据由用户终端设备发送的访问请求,确定与访问请求对应的待渲染的数据;According to the access request sent by the user terminal device, determine the data to be rendered corresponding to the access request;

检测当前节点是否存储有数据;Detect whether the current node has data stored;

若有,则从当前节点获取数据;If so, get the data from the current node;

若无,则从原始服务器获取数据。If not, get the data from the original server.

一种示例性实施方式中,分布式节点在接收到引流过来的高风险类型的访问请求之后,可以首先在当前节点中是否存储有与访问请求对应的待渲染的数据。如果存储有,则从当前节点中找到访问请求对应的数据资源并可以对其中至少部分的数据进行渲染,并得到对应的 文件数据流后发送给用户终端设备In an exemplary implementation, after the distributed node receives the diverted high-risk type of access request, it may first check whether there is data to be rendered corresponding to the access request stored in the current node. If it is stored, find the data resource corresponding to the access request from the current node and render at least part of the data, and get the corresponding file data stream and send it to the user terminal device

如果未找到,则分布式节点可以从除当前节点以外的其他节点、中心云、数据中心或源服务器获取页面内容。并在后续接收到数据资源后,在该边缘节点开启渲染实例。即按照访问请求所请求的网页内容和元素进行渲染,从而转换成安全的文件数据流并作为响应信息返回给用户终端设备。If not found, the distributed node can get the page content from other nodes than the current node, central cloud, data center or source server. And after receiving the data resource subsequently, start the rendering instance on the edge node. That is, render according to the content and elements of the webpage requested by the access request, so as to convert it into a secure file data stream and return it to the user terminal device as a response message.

图3是根据一示例性实施例示出的一种访问请求的处理方法的流程示意图。如图3所示,该方法应用于目标终端,包括:Fig. 3 is a schematic flowchart of a method for processing an access request according to an exemplary embodiment. As shown in Figure 3, this method is applied to the target terminal, including:

S301,向用户终端设备发送访问请求,以使用户终端设备根据预先配置的安全访问策略对访问请求进行访问控制。S301. Send an access request to a user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy.

S302,接收由用户终端设备发送的响应信息,响应信息包括至少部分由目标节点渲染的文件数据流。S302. Receive response information sent by the user terminal device, where the response information includes at least part of the file data stream rendered by the target node.

一种示例性实施方式中,为了避免相关技术中存在的直接将用户使用的目标终端生成的访问请求直接发送到风险网站所导致的用户数据出现安全隐患的问题。本公开可以由用户终端设备接收目标终端设备发送的访问请求,以使后续由用户终端设备将该访问请求发送到分布式节点中,并由分布式节点从访问请求对应的目标对象处拉取请求对应的待渲染数据。以使后续将待渲染数据进行渲染以生成文件数据流后返回给用户终端设备,并由用户终端设备发送回目标终端。In an exemplary implementation manner, in order to avoid the problem of potential safety hazards in user data caused by directly sending an access request generated by a target terminal used by a user to a risky website in the related art. In this disclosure, the user terminal device can receive the access request sent by the target terminal device, so that the user terminal device can subsequently send the access request to the distributed node, and the distributed node can pull the request from the target object corresponding to the access request The corresponding data to be rendered. In order to render the data to be rendered subsequently to generate a file data stream and return it to the user terminal device, and the user terminal device sends it back to the target terminal.

S303,根据文件数据流,显示访问请求对应的资源。S303. Display resources corresponding to the access request according to the file data flow.

在示例性实施例中,当目标终端接收到由目标节点渲染的文件数据流后,即可以根据该文件数据流,在自身的显示屏幕上显示访问请求对应的资源以供用户查看。In an exemplary embodiment, after the target terminal receives the file data stream rendered by the target node, it can display the resource corresponding to the access request on its own display screen for viewing by the user according to the file data stream.

通过应用本公开的技术方案,可以通过用户终端设备来将终端用户发起的访问请求引流至分布式网络中的特定节点处,以使该节点对该访问请求进行处理后将响应数据通过用户终端设备返回给终端用户。从而避免终端用户发起的访问请求直接到达恶意网站处所导致的带给用户数据安全隐患的弊端。By applying the technical solution of the present disclosure, the access request initiated by the end user can be diverted to a specific node in the distributed network through the user terminal device, so that the node processes the access request and sends the response data through the user terminal device returned to the end user. In this way, the disadvantage of bringing user data security risks caused by the access request initiated by the end user directly reaching the malicious website is avoided.

在一些示例性的实施例中,响应信息还包括用于指示对当前终端对未被渲染的数据进行渲染的控制数据流;In some exemplary embodiments, the response information further includes a control data flow for instructing the current terminal to render the unrendered data;

根据文件数据流,显示访问请求对应的资源,包括:According to the file data flow, display the resource corresponding to the access request, including:

根据控制数据流以及未被渲染的数据,对文件数据流进行更新;Update the file data stream according to the control data stream and unrendered data;

根据更新后的文件数据流,显示访问请求对应的资源。According to the updated file data flow, the resource corresponding to the access request is displayed.

一种示例性实施方式中,由于分布式节点可以将访问请求对应的数据资源全部进行渲染后返回给用户终端设备,也可以只渲染其中部分的数据资源后返回给用户终端设备。因此,如果存在有需要返回给目标终端的未被渲染的数据,则响应信息中还可以包括有一个用于指示目标终端对未被渲染的数据进行渲染的控制数据流。以使后续目标终端在接收到控制数据流后,可以根据控制数据流以及未被渲染的数据,对文件数据流进行更新,即目标终端可以基于该控制数据流将未被渲染的数据进行渲染并对该文件数据流进行更新,从而在后续对更新后的文件数据流进行预设处理后,在自身的显示屏幕上显示访问请求对应的资源以供用户查看和反馈。在示例性实施例中,若目标节点对所有数据进行了渲染得到了文件数据流,则目标终端可以直接基于该文件数据流,在自身的显示屏幕上显示访问请求对应的资源以供用户查看和反馈。In an exemplary embodiment, since the distributed node may render all data resources corresponding to the access request and return them to the user terminal device, or may render only part of the data resources and return them to the user terminal device. Therefore, if there is unrendered data that needs to be returned to the target terminal, the response information may further include a control data flow for instructing the target terminal to render the unrendered data. After receiving the control data stream, the subsequent target terminal can update the file data stream according to the control data stream and unrendered data, that is, the target terminal can render the unrendered data based on the control data stream and The file data stream is updated, so that after preset processing is performed on the updated file data stream, the resource corresponding to the access request is displayed on its own display screen for viewing and feedback by the user. In an exemplary embodiment, if the target node renders all the data to obtain the file data stream, the target terminal can directly display the resource corresponding to the access request on its own display screen based on the file data stream for the user to view and feedback.

图4是根据一示例性实施例示出的一种访问请求的处理方法的整体流程图。具体包括:Fig. 4 is an overall flowchart of a method for processing an access request according to an exemplary embodiment. Specifically include:

可以由用户终端设备接收由目标终端发送的访问请求,并基于预先配置的安全访问策略,确定访问请求对应的风险类型为高风险类型后,将访问请求引流至对应的分布式节点,以使分布式节点处理并响应访问请求,最后接收由分布式节点返回的包括至少对部分数据进行渲染的文件数据流的响应信息,并将响应信息向目标终端进行发送。The user terminal device can receive the access request sent by the target terminal, and based on the pre-configured security access policy, after determining that the risk type corresponding to the access request is a high risk type, the access request will be diverted to the corresponding distributed node, so that the distributed The distributed node processes and responds to the access request, and finally receives the response information returned by the distributed node including the file data stream for rendering at least part of the data, and sends the response information to the target terminal.

图5是根据一示例性实施例示出的一种访问请求的处理方法的整体流程图。具体包括:Fig. 5 is an overall flow chart showing a method for processing an access request according to an exemplary embodiment. Specifically include:

由目标终端向用户终端设备发送访问请求;并由用户终端设备基于访问请求以及预先配置的安全访问策略,确定访问请求对应的用于描述访问请求对应的安全风险程度的风险类型,并在确定访问请求对应的风险类型为高风险类型后,将高风险类型的访问请求发送到目标节点。The target terminal sends an access request to the user terminal device; and the user terminal device determines the risk type corresponding to the access request to describe the degree of security risk corresponding to the access request based on the access request and the pre-configured security access policy, and determines the access request After the risk type corresponding to the request is a high risk type, the high risk type access request is sent to the target node.

一种示例性实施方式中,目标节点接收到高风险类型的访问请求后,可以从当前节点获取或者原始服务器处获取访问请求对应的待渲染数据,并对至少部分数据进行渲染,得到对应的文件数据流,以及,针对未被渲染的数据,生成用于指示目标终端对未被渲染的数据进行渲染的控制数据流后,即可以将控制数据流以及文件数据流作为响应信息发送给用户终端设备,以使用户终端设备将响应信息向目标终端进行发送。In an exemplary implementation, after the target node receives a high-risk type of access request, it can obtain the data to be rendered corresponding to the access request from the current node or the original server, and render at least part of the data to obtain the corresponding file data stream, and, for the unrendered data, after generating the control data stream for instructing the target terminal to render the unrendered data, the control data stream and the file data stream can be sent to the user terminal device as response information , so that the user terminal device sends the response information to the target terminal.

最后,目标终端接收到控制数据流以及文件数据流的响应信息后,即可以根据控制数据流以及文件数据流,显示访问请求对应的资源。Finally, after receiving the response information of the control data flow and the file data flow, the target terminal can display the resource corresponding to the access request according to the control data flow and the file data flow.

图6是根据一示例性实施例示出的一种访问请求的处理电子装置。其中,包括第一接收 模块401,确定模块402,处理模块403,第一发送模块404,应用于用户终端设备,包括:Fig. 6 shows an electronic device for processing an access request according to an exemplary embodiment. Among them, including a first receiving module 401, a determining module 402, a processing module 403, and a first sending module 404, which are applied to user terminal equipment, including:

第一接收模块401,被配置为接收由目标终端发送的访问请求;The first receiving module 401 is configured to receive an access request sent by a target terminal;

确定模块402,被配置为基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,所述风险类型用于描述所述访问请求对应的安全风险程度;The determining module 402 is configured to determine a risk type corresponding to the access request based on the access request and a pre-configured security access policy, where the risk type is used to describe the security risk degree corresponding to the access request;

处理模块403,被配置为若所述访问请求对应的风险类型为高风险类型,则将所述访问请求引流至对应的目标节点,以使所述目标节点处理并响应所述访问请求;The processing module 403 is configured to divert the access request to a corresponding target node if the risk type corresponding to the access request is a high risk type, so that the target node processes and responds to the access request;

第一发送模块404,被配置为接收由所述目标节点返回的响应信息,并将所述响应信息向所述目标终端进行发送,所述响应信息包括至少部分由所述目标节点渲染的文件数据流。The first sending module 404 is configured to receive response information returned by the target node, and send the response information to the target terminal, the response information including at least part of the file data rendered by the target node flow.

本公开中,可以由用户终端设备接收由目标终端发送的访问请求,并基于预先配置的安全访问策略,确定访问请求对应的用于描述安全风险程度的风险类型。并在确定访问请求对应的风险类型为高风险类型后,将访问请求引流至对应的目标节点,以使目标节点处理并响应访问请求,最后接收由目标节点返回的响应信息,并将响应信息向目标终端进行发送,其中响应信息包括至少部分由目标节点渲染的文件数据流。In the present disclosure, the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node.

在本公开的另外一种示例性实施方式中,还包括:所述响应信息还包括用于指示所述目标终端对未被渲染的数据进行渲染的控制数据流。In another exemplary implementation manner of the present disclosure, it further includes: the response information further includes a control data flow for instructing the target terminal to render data that has not been rendered.

在本公开的另外一种示例性实施方式中,确定模块402,还包括:In another exemplary implementation manner of the present disclosure, the determining module 402 further includes:

确定模块402,被配置为根据所述访问请求的协议类型、URL、或所请求的数据类型,以及预先配置的安全访问策略,确定所述访问请求对应的风险类型。The determination module 402 is configured to determine the risk type corresponding to the access request according to the protocol type, URL, or requested data type of the access request, and a pre-configured security access policy.

在本公开的另外一种示例性实施方式中,确定模块402,还包括:In another exemplary implementation manner of the present disclosure, the determining module 402 further includes:

确定模块402,被配置为确定所述访问请求对应的地址信息;A determining module 402 configured to determine address information corresponding to the access request;

确定模块402,被配置为基于所述地址信息以及预先配置的安全访问策略,确定所述访问请求对应的风险类型。The determining module 402 is configured to determine a risk type corresponding to the access request based on the address information and a pre-configured security access policy.

在本公开的另外一种示例性实施方式中,确定模块402,还包括:In another exemplary implementation manner of the present disclosure, the determining module 402 further includes:

确定模块402,被配置为将所述地址信息与预先设定的高风险地址集合进行匹配,所述高风险地址集合中包括至少一个高风险地址;The determination module 402 is configured to match the address information with a preset high-risk address set, where the high-risk address set includes at least one high-risk address;

确定模块402,被配置为若所述地址信息存在于所述高风险地址集合中,确定所述访问请求对应的风险类型为高风险类型。The determining module 402 is configured to determine that the risk type corresponding to the access request is a high risk type if the address information exists in the high risk address set.

在本公开的另外一种示例性实施方式中,还包括:所述地址信息包括访问请求对应的目标访问地址、源地址或静态路由中的至少一种。In another exemplary implementation manner of the present disclosure, it further includes: the address information includes at least one of a target access address, a source address, or a static route corresponding to the access request.

在本公开的另外一种示例性实施方式中,确定模块402,还包括:In another exemplary implementation manner of the present disclosure, the determining module 402 further includes:

确定模块402,被配置为接收由分布式节点或安全管理平台发送的针对所述安全访问策略的更新信息;The determination module 402 is configured to receive update information for the security access policy sent by the distributed node or the security management platform;

确定模块402,被配置为根据所述更新信息对在先存储的安全访问策略进行更新。The determining module 402 is configured to update the previously stored security access policy according to the update information.

在本公开的另外一种示例性实施方式中,确定模块402,还包括:In another exemplary implementation manner of the present disclosure, the determining module 402 further includes:

确定模块402,被配置为采用私有通信协议、GRE、IPsec或PAC将所述访问请求发送至对应的目标节点。The determining module 402 is configured to send the access request to the corresponding target node by using a private communication protocol, GRE, IPsec or PAC.

图7是根据一示例性实施例示出的一种访问请求的处理电子装置。其中,包括获取模块405,生成模块406,响应模块407,应用于分布式网络中的分布式节点,包括:Fig. 7 shows an electronic device for processing an access request according to an exemplary embodiment. Among them, including an acquisition module 405, a generation module 406, and a response module 407, which are applied to distributed nodes in a distributed network, including:

获取模块405,被配置为根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据,所述访问请求由所述用户终端设备根据预先配置的安全访问策略进行引流;The obtaining module 405 is configured to obtain the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, and the access request is diverted by the user terminal device according to a pre-configured security access policy;

生成模块406,被配置为对至少部分所述数据进行渲染,得到对应的文件数据流;The generating module 406 is configured to render at least part of the data to obtain a corresponding file data stream;

响应模块407,被配置为将所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。The response module 407 is configured to send the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal.

在本公开的另外一种示例性实施方式中,生成模块406,还包括:In another exemplary implementation manner of the present disclosure, the generating module 406 further includes:

生成模块406,被配置为针对未被渲染的数据,生成用于指示所述目标终端对所述未被渲染的数据进行渲染的控制数据流;A generating module 406, configured to generate a control data stream for instructing the target terminal to render the unrendered data for the unrendered data;

生成模块406,被配置为将所述控制数据流以及所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。The generating module 406 is configured to send the control data stream and the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal.

在本公开的另外一种示例性实施方式中,生成模块406,还包括:In another exemplary implementation manner of the present disclosure, the generating module 406 further includes:

生成模块406,被配置为进行高风险地址识别,得到针对安全访问策略的更新信息;The generating module 406 is configured to identify high-risk addresses and obtain update information for security access policies;

生成模块406,被配置为将所述更新信息向所述用户终端设备进行发送,以供所述用户终端设备根据所述更新信息对所述安全访问策略进行更新。The generating module 406 is configured to send the update information to the user terminal device, so that the user terminal device can update the security access policy according to the update information.

在本公开的另外一种示例性实施方式中,生成模块406,还包括:In another exemplary implementation manner of the present disclosure, the generating module 406 further includes:

生成模块406,被配置为对至少部分所述数据进行渲染,得到对应的文件数据流,包括:The generation module 406 is configured to render at least part of the data to obtain a corresponding file data stream, including:

生成模块406,被配置为根据所述访问请求,读取所述目标终端的属性信息;The generating module 406 is configured to read the attribute information of the target terminal according to the access request;

生成模块406,被配置为根据所述属性信息,建立与所述属性信息对应的渲染应用实例;The generating module 406 is configured to create a rendering application instance corresponding to the attribute information according to the attribute information;

生成模块406,被配置为采用所述渲染应用实例对至少部分所述数据进行渲染,得到对应的文件数据流。The generating module 406 is configured to use the rendering application instance to render at least part of the data to obtain a corresponding file data stream.

在本公开的另外一种示例性实施方式中,生成模块406,还包括:In another exemplary implementation manner of the present disclosure, the generating module 406 further includes:

生成模块406,被配置为根据所述访问请求,向所述目标终端发送针对该目标终端的属性信息的获取请求,所述属性信息用于描述所述目标终端的页面显示特征;The generating module 406 is configured to send to the target terminal an acquisition request for attribute information of the target terminal according to the access request, where the attribute information is used to describe the page display characteristics of the target terminal;

生成模块406,被配置为基于由所述目标终端根据所述获取请求反馈的属性信息,建立与所述属性信息相对应的渲染应用实例;The generating module 406 is configured to create a rendering application instance corresponding to the attribute information based on the attribute information fed back by the target terminal according to the acquisition request;

生成模块406,被配置为采用所述渲染应用实例对至少部分所述数据进行渲染,得到对应的文件数据流。The generating module 406 is configured to use the rendering application instance to render at least part of the data to obtain a corresponding file data stream.

在本公开的另外一种示例性实施方式中,生成模块406,还包括:In another exemplary implementation manner of the present disclosure, the generating module 406 further includes:

生成模块406,被配置为根据由用户终端设备发送的访问请求,确定与所述访问请求对应的待渲染的数据;The generating module 406 is configured to determine the data to be rendered corresponding to the access request according to the access request sent by the user terminal device;

生成模块406,被配置为检测当前节点是否存储有所述数据;A generating module 406 configured to detect whether the current node stores the data;

生成模块406,被配置为若有,则从所述当前节点获取所述数据;A generating module 406, configured to obtain the data from the current node, if any;

生成模块406,被配置为若无,则从原始服务器获取所述数据。The generating module 406 is configured to obtain the data from the original server if there is no data.

图8是根据一示例性实施例示出的一种访问请求的处理电子装置。其中,包括第二发送模块408,第二接收模块409,显示模块410,应用于目标终端,包括:Fig. 8 shows an electronic device for processing an access request according to an exemplary embodiment. Among them, including the second sending module 408, the second receiving module 409, and the display module 410, applied to the target terminal, including:

第二发送模块408,被配置为向用户终端设备发送访问请求,以使所述用户终端设备根据预先配置的安全访问策略对所述访问请求进行访问控制;The second sending module 408 is configured to send an access request to the user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy;

第二接收模块409,被配置为接收由所述用户终端设备发送的响应信息,所述响应信息包括至少部分由目标节点渲染的文件数据流;The second receiving module 409 is configured to receive response information sent by the user terminal device, where the response information includes at least part of the file data stream rendered by the target node;

显示模块410,被配置为根据所述文件数据流,显示所述访问请求对应的资源。The display module 410 is configured to display the resource corresponding to the access request according to the file data stream.

在本公开的另外一种示例性实施方式中,第二接收模块409,还包括:In another exemplary implementation manner of the present disclosure, the second receiving module 409 further includes:

第二接收模块409,被配置为根据所述文件数据流,显示所述访问请求对应的资源,包括:The second receiving module 409 is configured to display the resource corresponding to the access request according to the file data stream, including:

第二接收模块409,被配置为根据所述控制数据流以及所述未被渲染的数据,对所述文件数据流进行更新;The second receiving module 409 is configured to update the file data stream according to the control data stream and the unrendered data;

第二接收模块409,被配置为根据更新后的所述文件数据流,显示所述访问请求对应的资源。The second receiving module 409 is configured to display the resource corresponding to the access request according to the updated file data stream.

图9是根据一示例性实施例示出的一种电子设备的逻辑结构框图。例如,电子设备500可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设 备,健身设备,个人数字助理等。Fig. 9 is a logical structural block diagram of an electronic device according to an exemplary embodiment. For example, the electronic device 500 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and the like.

在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器,上述指令可由电子设备处理器执行以完成上述网络监控的方法,该方法包括:本公开中,可以由用户终端设备接收由目标终端发送的访问请求,并基于预先配置的安全访问策略,确定访问请求对应的用于描述安全风险程度的风险类型。并在确定访问请求对应的风险类型为高风险类型后,将访问请求引流至对应的目标节点,以使目标节点处理并响应访问请求,最后接收由目标节点返回的响应信息,并将响应信息向目标终端进行发送,其中响应信息包括至少部分由目标节点渲染的文件数据流。上述指令还可以由电子设备的处理器执行以完成上述示例性实施例中所涉及的其他步骤。例如,非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。In an exemplary embodiment, there is also provided a non-transitory computer-readable storage medium including instructions, such as a memory including instructions, the instructions can be executed by a processor of an electronic device to complete the above-mentioned network monitoring method, the method includes: In the present disclosure, the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node. The above instructions may also be executed by the processor of the electronic device to complete other steps involved in the above exemplary embodiments. For example, the non-transitory computer readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.

在示例性实施例中,还提供了一种应用程序/计算机程序产品,包括一条或多条指令,该一条或多条指令可以由电子设备的处理器执行,以完成上述网络监控的方法,该方法包括:本公开中,可以由用户终端设备接收由目标终端发送的访问请求,并基于预先配置的安全访问策略,确定访问请求对应的用于描述安全风险程度的风险类型。并在确定访问请求对应的风险类型为高风险类型后,将访问请求引流至对应的目标节点,以使目标节点处理并响应访问请求,最后接收由目标节点返回的响应信息,并将响应信息向目标终端进行发送,其中响应信息包括至少部分由目标节点渲染的文件数据流。上述指令还可以由电子设备的处理器执行以完成上述示例性实施例中所涉及的其他步骤。In an exemplary embodiment, an application program/computer program product is also provided, including one or more instructions, the one or more instructions can be executed by a processor of an electronic device, so as to complete the above-mentioned network monitoring method, the The method includes: in this disclosure, the user terminal device may receive the access request sent by the target terminal, and determine the risk type corresponding to the access request for describing the degree of security risk based on the pre-configured security access policy. And after determining that the risk type corresponding to the access request is a high risk type, the access request is diverted to the corresponding target node, so that the target node processes and responds to the access request, and finally receives the response information returned by the target node, and sends the response information to the The target terminal sends, wherein the response information includes at least part of the file data stream rendered by the target node. The above instructions may also be executed by the processor of the electronic device to complete other steps involved in the above exemplary embodiments.

图9为计算机设备50的示例图。本领域技术人员可以理解,示意图9仅仅是计算机设备50的示例,并不构成对计算机设备50的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件,例如计算机设备50还可以包括输入输出设备、网络接入设备、总线等。FIG. 9 is an example diagram of a computer device 50 . Those skilled in the art can understand that the schematic diagram 9 is only an example of the computer device 50, and does not constitute a limitation to the computer device 50, and may include more or less components than those shown in the figure, or combine certain components, or different components , for example, the computer device 50 may also include an input and output device, a network access device, a bus, and the like.

所称处理器502可以是中央处理单元(Central Processing Unit,CPU),还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。通用处理器可以是微处理器或者该处理器502也可以是任何常规的处理器等,处理器502是计算机设备50的控制中心,利用各种接口和线路连接整个计算机设备50的各个部分。The so-called processor 502 may be a central processing unit (Central Processing Unit, CPU), and may also be other general-purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. The general-purpose processor can be a microprocessor or the processor 502 can also be any conventional processor, etc. The processor 502 is the control center of the computer device 50 and uses various interfaces and lines to connect various parts of the entire computer device 50 .

存储器501可用于存储计算机可读指令503,处理器502通过运行或执行存储在存储器501内的计算机可读指令或模块,以及调用存储在存储器501内的数据,实现计算机设备50 的各种功能。存储器501可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据计算机设备50的使用所创建的数据等。此外,存储器501可以包括硬盘、内存、插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)、至少一个磁盘存储器件、闪存器件、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)或其他非易失性/易失性存储器件。The memory 501 can be used to store computer-readable instructions 503 , and the processor 502 implements various functions of the computer device 50 by running or executing computer-readable instructions or modules stored in the memory 501 and calling data stored in the memory 501 . The memory 501 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.); Data created using the computer device 50 and the like. In addition, the memory 501 can include a hard disk, a memory, a plug-in hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital, SD) card, a flash memory card (Flash Card), at least one magnetic disk storage device, a flash memory device, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), or other non-volatile/volatile storage devices.

计算机设备50集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本公开实现上述示例性实施例方法中的全部或部分流程,也可以通过计算机可读指令来指令相关的硬件来完成,该计算机可读指令可存储于一计算机可读存储介质中,该计算机可读指令在被处理器执行时,可实现上述各个示例性的方法实施例的步骤。If the integrated modules of the computer device 50 are realized in the form of software function modules and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on this understanding, all or part of the procedures in the methods of the above exemplary embodiments in the present disclosure can also be completed by instructing related hardware through computer-readable instructions, and the computer-readable instructions can be stored in a computer-readable storage medium In this example, when the computer readable instructions are executed by the processor, the steps of the above exemplary method embodiments can be realized.

本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本公开旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。Other embodiments of the present disclosure will be readily apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The present disclosure is intended to cover any modification, use or adaptation of the present disclosure. These modifications, uses or adaptations follow the general principles of the present disclosure and include common knowledge or conventional technical means in the technical field not disclosed in the present disclosure. . The specification and examples are to be considered exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。It should be understood that the present disclosure is not limited to the precise constructions which have been described above and shown in the drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

工业实用性Industrial Applicability

本公开提供的一种访问请求的处理方法、电子装置、电子设备及介质中,通过用户终端设备根据预先配置的安全访问策略来将终端用户发起的访问请求引流至分布式网络中的特定节点处,以使该节点对该访问请求进行处理后并将响应数据通过用户终端设备返回给终端用户。从而避免终端用户发起的访问请求直接到达恶意网站处所导致的带给用户数据安全隐患的弊端,保证了用户的网络安全,同时也无需用户维护多个安全设备,降低了维护成本。In the access request processing method, electronic device, electronic equipment and medium provided by the present disclosure, the access request initiated by the terminal user is diverted to a specific node in the distributed network through the user terminal device according to the pre-configured security access policy , so that the node processes the access request and returns the response data to the terminal user through the user terminal device. In this way, it avoids the disadvantages of bringing user data security risks caused by the access request initiated by the end user directly to the malicious website, ensures the user's network security, and also does not require the user to maintain multiple security devices, reducing maintenance costs.

Claims (21)

一种访问请求的处理方法,应用于用户终端设备,包括:A method for processing an access request, applied to a user terminal device, comprising: 接收由目标终端发送的访问请求;receiving an access request sent by the target terminal; 基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,所述风险类型用于描述所述访问请求对应的安全风险程度;Determine a risk type corresponding to the access request based on the access request and a pre-configured security access policy, where the risk type is used to describe the security risk degree corresponding to the access request; 若所述访问请求对应的风险类型为高风险类型,则将所述访问请求引流至对应的目标节点,以使所述目标节点处理并响应所述访问请求;If the risk type corresponding to the access request is a high risk type, directing the access request to a corresponding target node, so that the target node processes and responds to the access request; 接收由所述目标节点返回的响应信息,并将所述响应信息向所述目标终端进行发送,所述响应信息包括至少部分由所述目标节点渲染的文件数据流。Receiving response information returned by the target node, and sending the response information to the target terminal, where the response information includes at least part of the file data stream rendered by the target node. 根据权利要求1所述的方法,其中,所述响应信息还包括用于指示所述目标终端对未被渲染的数据进行渲染的控制数据流。The method according to claim 1, wherein the response information further includes a control data flow for instructing the target terminal to render the unrendered data. 根据权利要求1所述的方法,其中,基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,包括:The method according to claim 1, wherein, based on the access request and a pre-configured security access policy, determining the risk type corresponding to the access request includes: 根据所述访问请求的协议类型、URL、或所请求的数据类型,以及预先配置的安全访问策略,确定所述访问请求对应的风险类型。The risk type corresponding to the access request is determined according to the protocol type, the URL, or the requested data type of the access request, and a pre-configured security access policy. 根据权利要求1所述的方法,其中,基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,包括:The method according to claim 1, wherein, based on the access request and a pre-configured security access policy, determining the risk type corresponding to the access request comprises: 确定所述访问请求对应的地址信息;determining address information corresponding to the access request; 基于所述地址信息以及预先配置的安全访问策略,确定所述访问请求对应的风险类型。Based on the address information and the pre-configured security access policy, determine the risk type corresponding to the access request. 根据权利要求4所述的方法,其中,基于所述地址信息以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,包括:The method according to claim 4, wherein, based on the address information and a pre-configured security access policy, determining the risk type corresponding to the access request includes: 将所述地址信息与预先设定的高风险地址集合进行匹配,所述高风险地址集合中包括至少一个高风险地址;matching the address information with a preset high-risk address set, where the high-risk address set includes at least one high-risk address; 若所述地址信息存在于所述高风险地址集合中,确定所述访问请求对应的风险类型为高风险类型。If the address information exists in the high-risk address set, determine that the risk type corresponding to the access request is a high-risk type. 根据权利要求4所述的方法,其中,所述地址信息包括访问请求对应的目标访问地址、源地址或静态路由中的至少一种。The method according to claim 4, wherein the address information includes at least one of a target access address, a source address, or a static route corresponding to the access request. 根据权利要求1所述的方法,其中,在基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型之前,还包括:The method according to claim 1, wherein, before determining the risk type corresponding to the access request based on the access request and the pre-configured security access policy, further comprising: 接收由分布式节点或安全管理平台发送的针对所述安全访问策略的更新信息;Receive update information for the security access policy sent by the distributed nodes or the security management platform; 根据所述更新信息对在先存储的安全访问策略进行更新。The previously stored security access policy is updated according to the update information. 根据权利要求1所述的方法,其中,所述将所述访问请求引流至对应的目标节点,包括:The method according to claim 1, wherein said directing said access request to a corresponding target node comprises: 采用私有通信协议、GRE、IPsec或PAC将所述访问请求发送至对应的目标节点。The access request is sent to the corresponding target node by using a private communication protocol, GRE, IPsec or PAC. 一种访问请求的处理方法,应用于分布式网络中的分布式节点,包括:A method for processing access requests, applied to distributed nodes in a distributed network, comprising: 根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据,所述访问请求由所述用户终端设备根据预先配置的安全访问策略进行引流;According to the access request sent by the user terminal device, the data to be rendered corresponding to the access request is obtained, and the access request is diverted by the user terminal device according to a pre-configured security access policy; 对至少部分所述数据进行渲染,得到对应的文件数据流;Rendering at least part of the data to obtain a corresponding file data stream; 将所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。Sending the file data stream as response information to the user terminal device, so that the user terminal device sends the response information to the target terminal. 根据权利要求9所述的方法,其中,将所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送,包括:The method according to claim 9, wherein sending the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal, comprises: 针对未被渲染的数据,生成用于指示所述目标终端对所述未被渲染的数据进行渲染的控制数据流;For the unrendered data, generate a control data stream for instructing the target terminal to render the unrendered data; 将所述控制数据流以及所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。Sending the control data stream and the file data stream as response information to the user terminal device, so that the user terminal device sends the response information to the target terminal. 根据权利要求9所述的方法,其中,在根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据之前,还包括:The method according to claim 9, wherein, before obtaining the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, further comprising: 进行高风险地址识别,得到针对安全访问策略的更新信息;Identify high-risk addresses and obtain updated information on security access policies; 将所述更新信息向所述用户终端设备进行发送,以供所述用户终端设备根据所述更新信息对所述安全访问策略进行更新。Sending the update information to the user terminal equipment, so that the user terminal equipment can update the security access policy according to the update information. 根据权利要求9所述的方法,其中,所述访问请求包括所述目标终端的属性信息,所述属性信息用于描述所述目标终端的页面显示特征;The method according to claim 9, wherein the access request includes attribute information of the target terminal, and the attribute information is used to describe the page display characteristics of the target terminal; 对至少部分所述数据进行渲染,得到对应的文件数据流,包括:Render at least part of the data to obtain a corresponding file data stream, including: 根据所述访问请求,读取所述目标终端的属性信息;According to the access request, read the attribute information of the target terminal; 根据所述属性信息,建立与所述属性信息对应的渲染应用实例;Establish a rendering application instance corresponding to the attribute information according to the attribute information; 采用所述渲染应用实例对至少部分所述数据进行渲染,得到对应的文件数据流。Render at least part of the data by using the rendering application instance to obtain a corresponding file data stream. 根据权利要求9所述的方法,其中,对至少部分所述数据进行渲染,得到对应的文件数据流,包括:The method according to claim 9, wherein rendering at least part of the data to obtain a corresponding file data stream comprises: 根据所述访问请求,向所述目标终端发送针对该目标终端的属性信息的获取请求,所述属性信息用于描述所述目标终端的页面显示特征;According to the access request, sending an acquisition request for attribute information of the target terminal to the target terminal, where the attribute information is used to describe the page display characteristics of the target terminal; 基于由所述目标终端根据所述获取请求反馈的属性信息,建立与所述属性信息相对应的渲染应用实例;Establishing a rendering application instance corresponding to the attribute information based on the attribute information fed back by the target terminal according to the acquisition request; 采用所述渲染应用实例对至少部分所述数据进行渲染,得到对应的文件数据流。Render at least part of the data by using the rendering application instance to obtain a corresponding file data stream. 如权利要求9所述的方法,其中,所述根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据,包括:The method according to claim 9, wherein said obtaining the data to be rendered corresponding to the access request according to the access request sent by the user terminal device comprises: 根据由用户终端设备发送的访问请求,确定与所述访问请求对应的待渲染的数据;According to the access request sent by the user terminal device, determine the data to be rendered corresponding to the access request; 检测当前节点是否存储有所述数据;Detect whether the current node stores the data; 若有,则从所述当前节点获取所述数据;If yes, obtaining the data from the current node; 若无,则从原始服务器获取所述数据。If not, get the data from the original server. 一种访问请求的处理方法,应用于目标终端,包括:A method for processing an access request, applied to a target terminal, comprising: 向用户终端设备发送访问请求,以使所述用户终端设备根据预先配置的安全访问策略对所述访问请求进行访问控制;Sending an access request to the user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy; 接收由所述用户终端设备发送的响应信息,所述响应信息包括至少部分由目标节点渲染的文件数据流;receiving response information sent by the user terminal device, the response information including at least part of the file data stream rendered by the target node; 根据所述文件数据流,显示所述访问请求对应的资源。According to the file data stream, the resource corresponding to the access request is displayed. 根据权利要求15所述的方法,其中,所述响应信息还包括用于指示对当前终端对未被渲染的数据进行渲染的控制数据流;The method according to claim 15, wherein the response information further includes a control data flow for instructing the current terminal to render the unrendered data; 根据所述文件数据流,显示所述访问请求对应的资源,包括:According to the file data flow, display the resource corresponding to the access request, including: 根据所述控制数据流以及所述未被渲染的数据,对所述文件数据流进行更新;updating the file data stream according to the control data stream and the unrendered data; 根据更新后的所述文件数据流,显示所述访问请求对应的资源。According to the updated file data stream, the resource corresponding to the access request is displayed. 一种访问请求的处理电子装置,应用于用户终端设备,包括:An electronic device for processing access requests, applied to user terminal equipment, including: 第一接收模块,被配置为接收由目标终端发送的访问请求;The first receiving module is configured to receive the access request sent by the target terminal; 确定模块,被配置为基于所述访问请求以及预先配置的安全访问策略,确定所述访问请求对应的风险类型,所述风险类型用于描述所述访问请求对应的安全风险程度;A determination module configured to determine a risk type corresponding to the access request based on the access request and a preconfigured security access policy, where the risk type is used to describe the degree of security risk corresponding to the access request; 处理模块,被配置为若所述访问请求对应的风险类型为高风险类型,则将所述访问请求引流至对应的目标节点,以使所述目标节点处理并响应所述访问请求;A processing module configured to divert the access request to a corresponding target node if the risk type corresponding to the access request is a high risk type, so that the target node processes and responds to the access request; 第一发送模块,被配置为接收由所述目标节点返回的响应信息,并将所述响应信息向所述目标终端进行发送,所述响应信息包括至少部分由所述目标节点渲染的文件数据流。A first sending module, configured to receive response information returned by the target node, and send the response information to the target terminal, the response information including at least part of the file data stream rendered by the target node . 一种访问请求的处理电子装置,应用于分布式网络中的分布式节点,包括:An access request processing electronic device, applied to distributed nodes in a distributed network, comprising: 获取模块,被配置为根据由用户终端设备发送的访问请求,获取所述访问请求对应的待渲染的数据,所述访问请求由所述用户终端设备根据预先配置的安全访问策略进行引流;The obtaining module is configured to obtain the data to be rendered corresponding to the access request according to the access request sent by the user terminal device, and the access request is drained by the user terminal device according to a pre-configured security access policy; 生成模块,被配置为对至少部分所述数据进行渲染,得到对应的文件数据流;A generating module configured to render at least part of the data to obtain a corresponding file data stream; 响应模块,被配置为将所述文件数据流作为响应信息发送给所述用户终端设备,以使所述用户终端设备将所述响应信息向目标终端进行发送。The response module is configured to send the file data stream to the user terminal device as response information, so that the user terminal device sends the response information to the target terminal. 一种访问请求的处理电子装置,应用于目标终端,包括:An electronic device for processing an access request, applied to a target terminal, comprising: 第二发送模块,被配置为向用户终端设备发送访问请求,以使所述用户终端设备根据预先配置的安全访问策略对所述访问请求进行访问控制;The second sending module is configured to send an access request to a user terminal device, so that the user terminal device performs access control on the access request according to a pre-configured security access policy; 第二接收模块,被配置为接收由所述用户终端设备发送的响应信息,所述响应信息包括至少部分由目标节点渲染的文件数据流;The second receiving module is configured to receive response information sent by the user terminal device, where the response information includes at least part of the file data stream rendered by the target node; 显示模块,被配置为根据所述文件数据流,显示所述访问请求对应的资源。The display module is configured to display the resource corresponding to the access request according to the file data stream. 一种电子设备,包括:An electronic device comprising: 存储器,设置为存储可执行指令;以及,a memory configured to store executable instructions; and, 处理器,设置为与所述存储器显示以执行所述可执行指令从而完成权利要求1-16中任一所述访问请求的处理方法的操作。A processor configured to be displayed with the memory to execute the executable instructions so as to complete the operations of the access request processing method in any one of claims 1-16. 一种计算机可读存储介质,设置为存储计算机可读取的指令,其中,所述指令被执行时执行权利要求1-16中任一所述访问请求的处理方法的操作。A computer-readable storage medium configured to store computer-readable instructions, wherein, when the instructions are executed, the operations of the access request processing method in any one of claims 1-16 are performed.
PCT/CN2022/119101 2021-09-18 2022-09-15 Access request processing method, electronic apparatus, electronic device, and medium Ceased WO2023040983A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111112491.5A CN115842641A (en) 2021-09-18 2021-09-18 Access request processing method, electronic device, and medium
CN202111112491.5 2021-09-18

Publications (1)

Publication Number Publication Date
WO2023040983A1 true WO2023040983A1 (en) 2023-03-23

Family

ID=85574545

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/119101 Ceased WO2023040983A1 (en) 2021-09-18 2022-09-15 Access request processing method, electronic apparatus, electronic device, and medium

Country Status (2)

Country Link
CN (1) CN115842641A (en)
WO (1) WO2023040983A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116546028A (en) * 2023-05-15 2023-08-04 中国工商银行股份有限公司 Service request processing method and device, storage medium and electronic equipment
CN117098134A (en) * 2023-10-17 2023-11-21 湖北星纪魅族集团有限公司 Security control method, terminal and non-transitory computer-readable storage medium
CN119358769A (en) * 2024-12-23 2025-01-24 成都车晓科技有限公司 Risk control information processing method and system based on Internet of Vehicles
CN120281581A (en) * 2025-06-09 2025-07-08 山东征途信息科技股份有限公司 Data security management method and system for information creation terminal environment

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120567577B (en) * 2025-07-30 2025-10-24 深圳市润迅通投资有限公司 Method, device, equipment and medium for monitoring leakage prevention of network sensitive data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140059649A1 (en) * 2011-03-23 2014-02-27 Peng Hu Apparatus, system and method for accessing internet webpage
CN105991580A (en) * 2015-02-12 2016-10-05 腾讯科技(深圳)有限公司 Method and device for detecting website security
CN111372205A (en) * 2020-02-28 2020-07-03 维沃移动通信有限公司 Information prompting method and electronic equipment
CN111641701A (en) * 2020-05-25 2020-09-08 深信服科技股份有限公司 Data protection method and device, equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10375020B2 (en) * 2017-01-18 2019-08-06 Cisco Technology, Inc. Security policy for HTTPS using DNS
CN112351009B (en) * 2020-10-27 2022-07-22 杭州安恒信息技术股份有限公司 A network security protection method, device, electronic device and readable storage medium
CN113411637B (en) * 2021-07-05 2022-06-24 北京海誉动想科技股份有限公司 Picture processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140059649A1 (en) * 2011-03-23 2014-02-27 Peng Hu Apparatus, system and method for accessing internet webpage
CN105991580A (en) * 2015-02-12 2016-10-05 腾讯科技(深圳)有限公司 Method and device for detecting website security
CN111372205A (en) * 2020-02-28 2020-07-03 维沃移动通信有限公司 Information prompting method and electronic equipment
CN111641701A (en) * 2020-05-25 2020-09-08 深信服科技股份有限公司 Data protection method and device, equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116546028A (en) * 2023-05-15 2023-08-04 中国工商银行股份有限公司 Service request processing method and device, storage medium and electronic equipment
CN117098134A (en) * 2023-10-17 2023-11-21 湖北星纪魅族集团有限公司 Security control method, terminal and non-transitory computer-readable storage medium
CN117098134B (en) * 2023-10-17 2024-01-26 湖北星纪魅族集团有限公司 Security control method, terminal, and non-transitory computer-readable storage medium
CN119358769A (en) * 2024-12-23 2025-01-24 成都车晓科技有限公司 Risk control information processing method and system based on Internet of Vehicles
CN120281581A (en) * 2025-06-09 2025-07-08 山东征途信息科技股份有限公司 Data security management method and system for information creation terminal environment

Also Published As

Publication number Publication date
CN115842641A (en) 2023-03-24

Similar Documents

Publication Publication Date Title
WO2023040983A1 (en) Access request processing method, electronic apparatus, electronic device, and medium
US11463418B2 (en) Systems and methods of enforcing communications semantics on a private network
US11546170B2 (en) Systems and methods of collaborative application on a private network
US12348584B2 (en) Distributed network security system providing isolation of customer data
US9992107B2 (en) Processing data packets using a policy based network path
US10574771B2 (en) Methods and systems for rewriting scripts to redirect web requests
US9118718B2 (en) Techniques to monitor connection paths on networked devices
CN107979520B (en) Message processing method and message processing device
US8914510B2 (en) Methods, systems, and computer program products for enhancing internet security for network subscribers
CN111629030B (en) Communication processing method, device, medium and equipment based on edge computing platform
US11818200B2 (en) Hybrid cloud computing network management with synchronization features across different cloud service providers
JP2018528507A (en) Method and system for installing an application version via near field communication
WO2017177767A1 (en) Service access, and control method and apparatus therefor
CN103888508B (en) Method and system for data connection diversification and storage medium thereof
US10630800B2 (en) Methods and systems for handling requests regarding zero-rating
CN106899549A (en) A kind of network security detection method and device
CN112202744A (en) Multi-system data communication method and device
CN113422772B (en) Private network terminal access processing method, device and electronic equipment
US11949707B1 (en) Isolating suspicious links in email messages
CN114401502B (en) Configuration method, device, electronic device and storage medium
CN111866100A (en) Method, device and system for controlling data transmission rate
WO2023109045A1 (en) Webrtc connection method and system
CN112905814B (en) Picture processing method and device, storage medium and electronic equipment
CN111770121B (en) Method and device for service access based on directional flow
US20250063067A1 (en) Content security method and system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22869351

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22869351

Country of ref document: EP

Kind code of ref document: A1