CN105871677B - Using a method and device for shared VPN service - Google Patents

Using a method and device for shared VPN service Download PDF

Info

Publication number
CN105871677B
CN105871677B CN201610319066.6A CN201610319066A CN105871677B CN 105871677 B CN105871677 B CN 105871677B CN 201610319066 A CN201610319066 A CN 201610319066A CN 105871677 B CN105871677 B CN 105871677B
Authority
CN
China
Prior art keywords
application
operating system
vpn
vpn service
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610319066.6A
Other languages
Chinese (zh)
Other versions
CN105871677A (en
Inventor
王春雷
徐利军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610319066.6A priority Critical patent/CN105871677B/en
Publication of CN105871677A publication Critical patent/CN105871677A/en
Application granted granted Critical
Publication of CN105871677B publication Critical patent/CN105871677B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • H04L12/4675Dynamic sharing of VLAN information amongst network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides the method and devices that VPN service is shared between a kind of application, this method comprises: the request for the creation VPN service that monitoring current application is initiated to operating system;When monitoring the request, the request is intercepted, and judges whether the VPN service of the operating system is occupied by other application;If the VPN service of the operating system is occupied by the other application, the other application is sent the request to, the VPN service of the operating system authorization is shared into the current application by the other application.The VPN service of operating system authorization can be shared to current application by other application, current application and other application are serviced using VPN simultaneously by the embodiment of the present invention when the VPN of operating system service is occupied by other application.

Description

Using a method and device for shared VPN service
Technical field
The present invention relates to technical field of internet application, the method and device of VPN service is shared between especially a kind of application.
Background technique
VPN (Virtual Private Network, Virtual Private Network) is connected by an interim safety of internet It connects, is the tunnel of a safety and stability for passing through chaotic public network, it can safely encrypted transmission data by this tunnel.
The operating system (e.g., Android system etc.) of mobile terminal supports VPN network connection, thus, the APP of mobile terminal (application) developer can combine the business of oneself with VPN, realize the function of business.For example, " flow bodyguard " creates One VPN connection is used to monitoring traffic in network, the functions such as network management, advertisement filter may be implemented;" network access great master " creation one A VPN connection is used to monitoring traffic in network, the functions such as traffic monitoring, traffic statistics may be implemented.
In practical applications, operating system currently can only authorize an APP to have the ability of VPN service (that is, creation VPN Connection), for example, operating system current grant " flow bodyguard " has the ability of VPN service, so that " flow bodyguard " creates one VPN connection, if " network access great master " also wants one VPN connection of creation, after " network access great master " initiates request, operating system meeting Pop-up prompt is carried out, prompts current VPN occupied, " flow bodyguard " is needed to discharge VPN, VPN could be licensed to " network access by system Great master ".
It can be seen that multiple applications on mobile terminal can not currently be provided simultaneously with VPN service in currently existing scheme Ability is serviced using VPN, and between applications carry out VPN service switching when, operating system will do it pop-up prompt, to use Family interferes, and affects user experience.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind That states problem shares the method and corresponding device that VPN is serviced between.
One side according to the present invention provides a kind of method that VPN service is shared between application, comprising:
The request for the creation VPN service that monitoring current application is initiated to operating system;
When monitoring the request, the request is intercepted, and judges that whether the VPN of the operating system services by other Using occupancy;
If the VPN service of the operating system is occupied by the other application, send the request to it is described other Using the VPN service of the operating system authorization is shared to the current application by the other application.
Optionally, described shared to the VPN service of the operating system authorization by the other application described is currently answered With before, the method also includes:
Verify the permission whether current application has the VPN service for sharing the other application;
After through verification, sharing operation is executed.
Optionally, whether the verification current application has the permission for the VPN service for sharing the other application, packet It includes:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
Optionally, described shared to the VPN service of the operating system authorization by the other application described is currently answered With before, the method also includes:
It verifies the other application and whether has and the VPN service of the operating system authorization is shared into the current application Permission;
After through verification, sharing operation is executed.
Optionally, whether the verification other application, which has, shares to the VPN service of the operating system authorization The permission of the current application, comprising:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
Optionally, described shared to the VPN service of the operating system authorization by the other application described is currently answered With, comprising:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application The current application.
Optionally, described by way of across application communication, by the other application by the VPN of the operating system authorization Service shares to the current application, comprising:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation The VPN service of system authorization shares to the corresponding function of the Function Identification.
Optionally, the Function Identification include the corresponding function register of the Function Identification in the operating system when Between go here and there.
Optionally, described to be by the operation by the other application when the quantity of the current application includes multiple The VPN service of system authorization shares to the current application, comprising:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization VPN service shares to the current application.
Optionally, the method also includes:
If the VPN service of the operating system is not occupied by the other application, the behaviour is sent the request to Make system, the current application as described in the operating system authorization has the permission of creation VPN service, creates for the current application VPN service.
Optionally, by the other application by the VPN service of the operating system authorization share to the current application it Afterwards, the method also includes:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and Application in the current application in addition to the maximum application of the priority.
Another aspect according to the present invention additionally provides the device that VPN service is shared between a kind of application, comprising:
Monitoring module, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module suitable for when monitoring the request, intercepting the request, and judges the VPN of the operating system Whether service is occupied by other application;
Sharing module is accounted for if judging that the VPN of the operating system is serviced suitable for the judgment module by the other application With, then the other application is sent the request to, it is by the other application that the VPN service of the operating system authorization is total It enjoys to the current application.
Optionally, described device further include:
First correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization Before service shares to the current application, verify whether the current application has the VPN service for sharing the other application Permission;After through verification, sharing operation is executed.
Optionally, first correction verification module is further adapted for:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
Optionally, described device further include:
Second correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization Before service shares to the current application, verify whether the other application has the VPN clothes of the operating system authorization Business shares to the permission of the current application;After through verification, sharing operation is executed.
Optionally, second correction verification module is further adapted for:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
Optionally, the sharing module is further adapted for:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application The current application.
Optionally, the sharing module is further adapted for:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation The VPN service of system authorization shares to the corresponding function of the Function Identification.
Optionally, the Function Identification include the corresponding function register of the Function Identification in the operating system when Between go here and there.
Optionally, when the quantity of the current application includes multiple, the sharing module is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization VPN service shares to the current application.
Optionally, described device further include:
Creation module, if judging that the VPN of the operating system is serviced not by the other application suitable for the judgment module It occupies, then sends the request to the operating system, the current application as described in the operating system authorization has creation VPN The permission of service creates VPN service for the current application.
Optionally, the sharing module is further adapted for:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and Application in the current application in addition to the maximum application of the priority.
In embodiments of the present invention, creation current application (application installed in operating system) initiated to operating system VPN service request be monitored, when monitoring the request, intercept the request, and judge operating system VPN service whether It is occupied by other application, if the VPN service of operating system is occupied by other application, sends the request to other application, by The VPN service of operating system authorization is shared to current application by other application.It can be seen that the VPN when operating system services quilt When other application occupies, the VPN service of operating system authorization can be shared to by other application and currently be answered by the embodiment of the present invention With enabling current application and other application to service simultaneously using VPN.Also, the embodiment of the present invention is to from current application Request carried out intercept operation, send the request to other application, serviced the VPN of operating system authorization by other application Current application is shared to, operating system not will do it pop-up prompt, avoid interfering to user, affect user experience.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
According to the following detailed description of specific embodiments of the present invention in conjunction with the accompanying drawings, those skilled in the art will be brighter The above and other objects, advantages and features of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart that the method for VPN service is shared between application according to an embodiment of the invention;
Fig. 2 shows the flow charts for the method that VPN service is shared between application according to another embodiment of the present invention;
Fig. 3 shows the structural schematic diagram that the device of VPN service is shared between application according to an embodiment of the invention;With And
Fig. 4 shows the structural schematic diagram that the device of VPN service is shared between application in accordance with another embodiment of the present invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
In order to solve the above technical problems, the embodiment of the invention provides a kind of method for sharing VPN service between application, the party Method can be applied on mobile terminal (e.g., the terminal devices such as smart phone, tablet computer, smartwatch, intelligent glasses).Fig. 1 Show the flow chart that the method for VPN service is shared between application according to an embodiment of the invention.As shown in Figure 1, this method is extremely S102 be may comprise steps of less to step S106.
Step S102, the request for the creation VPN service that monitoring current application is initiated to operating system.
In this step, the operating system (e.g., Android system etc.) of mobile terminal supports VPN network connection, thus, it is mobile The application developer of terminal can combine the business of oneself with VPN, realize the function of business, such as traffic monitoring, flow The functions such as statistics, network management, advertisement filter.Application developer, will be relevant to VPN network connection when carrying out application and development Program code is written in SDK (Software Development Kit, Software Development Kit), when user is on application interface When the operation of triggering creation VPN service, the request that the creation VPN initiated to operating system is serviced is generated.
In practical applications, local VPN service can be created on mobile terminals, and the operating system of mobile terminal is in order to just It is serviced in using VPN, has opened multiple system interfaces (API), in the case where obtaining user's confirmation, VPN service can be obtained The permission of control and management other application.Specifically, the API provided by call operation system can take the VPN of mobile terminal Business is opened, and when the other application of mobile terminal will access network, passes through local VPN using the network connecting request initiated The processing of service, enables mobile terminal efficiently and safely to access Internet resources.
By taking flow bodyguard application as an example, traffic monitoring (flow generated such as monitoring background application) may be implemented in the application Network connecting request is redirected to local service process firstly, flow bodyguard obtains network connecting request by business, local to take Business process is to be serviced to provide by local VPN.Then, in local service process, judge the application for initiating network connecting request It whether is application in running background.If judge initiate network connecting request application for running background in application, if Prompt information is issued the user with, to prompt user's selection to forbid using the network connection behavior for generating background traffic.In this way, can be with Prevent what some users were of little use generating unnecessary flow from the background in the application program of running background or some Malwares, So as to preferably save flow for user.
Step S104 intercepts the request when monitoring the request, and judges that whether the VPN of operating system services by it He occupies in application.
Step S106 sends the request to other application if the VPN service of operating system is occupied by other application, The VPN service of operating system authorization is shared into current application by other application.
In embodiments of the present invention, creation current application (application installed in operating system) initiated to operating system VPN service request be monitored, when monitoring the request, intercept the request, and judge operating system VPN service whether It is occupied by other application, if the VPN service of operating system is occupied by other application, sends the request to other application, by The VPN service of operating system authorization is shared to current application by other application.It can be seen that the VPN when operating system services quilt When other application occupies, the VPN service of operating system authorization can be shared to by other application and currently be answered by the embodiment of the present invention With enabling current application and other application to service simultaneously using VPN.Also, the embodiment of the present invention is to from current application Request carried out intercept operation, send the request to other application, serviced the VPN of operating system authorization by other application Current application is shared to, operating system not will do it pop-up prompt, avoid interfering to user, affect user experience.
In alternative embodiment of the invention, if above step S104 judges that the VPN of operating system is serviced not by other Using occupancy, then operating system is sent the request to, has the power of creation VPN service by operating system authorization current application Limit creates VPN service for current application.
In alternative embodiment of the invention, in order to improve the safety of shared VPN service, in above step S106 by it Before the VPN service of operating system authorization is shared to current application by his application, need to carry out current application or other application Verification, will describe in detail respectively below.
Situation one needs to verify current application, that is, whether verification current application has shared other application The permission of VPN service executes sharing operation after through verification.Here, the embodiment of the invention provides a kind of optional sides Case can calculate the characteristic information of current application in this scenario, and then according to the characteristic information of current application, answer first With searching whether that there are current applications in authentication list, wherein store one or more in the first application authorization list and have The permission of the VPN service of shared other application using corresponding characteristic information.If being looked into the first application authorization list Find current application, it is determined that pass through verification;Conversely, if not finding current application in the first application authorization list, really It is fixed unverified.The characteristic information that the embodiment of the present invention refers to can be the information such as the packet name of application, signature.
Situation two needs to verify other application, that is, whether verification other application has operating system authorization VPN service shares to the permission of current application, after through verification, executes sharing operation.Here, the embodiment of the invention provides A kind of optional scheme can calculate the characteristic information of other application, and then believe according to the feature of other application in this scenario Breath, searches whether that there are other applications in the second application authorization list, wherein store one in the second application authorization list Or it is multiple have the permission that the VPN service of operating system authorization shares to current application is believed using corresponding feature Breath.If finding other application in the second application authorization list, it is determined that pass through verification.Conversely, if in the second application authorization Other application is not found in list, it is determined that unverified.The characteristic information that the embodiment of the present invention refers to can be application Packet name, the information such as signature.
In alternative embodiment of the invention, two-way verification can also be carried out using in conjunction with above situation one and situation two, Current application and other application are verified, to further increase the safety of shared VPN service.
In alternative embodiment of the invention, above step S106 is serviced the VPN of operating system authorization by other application Current application is shared to, the communication being related between two or more applications, that is, the side across application communication can be passed through The VPN service of operating system authorization is shared to current application by other application by formula.In actual operation, it is available other Using with the respective packet name of current application, and then according to packet name carry out across application communicate.
In across application communication, the communication being related between different processes, in Android system, Binder is between a kind of process Communication mechanism, it is that one kind is similar to COM and CORBA distributed component framework, more popular, is to provide remote process tune in fact With (RPC) function.From the literal upper meaning of English, Binder has the meaning of binder, in the Binder mechanism of Android system In, it is made of a system component, is Client, Server, Service Manager and Binder driver respectively, wherein Client, Server and Service Manager operate in user's space, and Binder driver runs kernel spacing. Binder is exactly a kind of binder that this four components are bonded together, wherein core component is Binder driving journey Sequence, Service Manager provide the function of Added Management, Client and Server exactly in Binder driving and In the infrastructure that Service Manager is provided, the communication between Client-Server is carried out.Service Manager and Binder driving is realized in Android platform, as long as developer realizes Client the and Server group of oneself according to specification Part can.
In alternative embodiment of the invention, current application needs to realize multiple functions, for example, " network access great master " needs reality The functions such as existing traffic monitoring, traffic statistics, the embodiment of the present invention can be bound according to each function of application (e.g., binds The Function Identification etc. of function), the VPN service for realizing fine granularity is shared.That is, operation is by step S106 by other application When the VPN service of system authorization shares to current application, it can determine and the VPN of sharing operation system authorization is needed to take in current application The Function Identification of the function of business, and then according to determining Function Identification, by way of across application communication, it will be grasped by other application The VPN service for making system authorization shares to the corresponding function of Function Identification.Further, in order to distinguish the different function of different application Can, which may include time string of the corresponding function register of Function Identification in operating system, with assurance function mark The uniqueness of knowledge.
In alternative embodiment of the invention, if the quantity of current application includes multiple, that is to say, that there are multiple current Using the request for the creation VPN service initiated to operating system, the request is intercepted, and judges the VPN service quilt of operating system Other application occupies, then sends the request to other application, shared to the VPN service of operating system authorization by other application Current application.
Further, when the VPN service of operating system authorization is shared to current application by other application, the present invention is real It applies example and provides a kind of optional scheme, in this scenario, can determine the priority of multiple current applications, according to multiple current The VPN service of operating system authorization is shared to current application by other application by the priority orders of application.Here, application Priority can be found from the first application authorization list, when application is authenticated, be assigned with priority simultaneously for the application It is documented in the first application authorization list.For example, being each when being authenticated to the application such as " network access great master ", " traffic management " Using distribution priority and it is documented in the first application authorization list.When " network access great master " and " traffic management " is used as current application When the request that the creation VPN initiated simultaneously to operating system is serviced, the request is intercepted, and judges the VPN service of operating system It is occupied by other application, then sends the request to other application, obtain the priority of " network access great master " and " traffic management ", root According to priority orders, the VPN service of operating system authorization is shared into " network access great master " and " traffic management " by other application.
In alternative embodiment of the invention, the VPN service of operating system authorization is shared to by other application and is currently answered With later, when the VPN service fault of other application disconnects, and other application and current application prepare to create VPN when servicing, root According to default construction strategy, the maximum application of priority is chosen from other application and current application.Then, priority is maximum The request of the creation VPN service of application is sent to operating system, has creation by the maximum application of operating system authorization priority The permission of VPN service is that the maximum application of priority creates VPN service.Later, by the maximum application of priority by operating system The VPN service of authorization shares to the application in other application and current application in addition to the maximum application of priority.It can be seen that When the VPN service fault of other application disconnects, and other application and current application prepare to create VPN service, by priority The request of the creation VPN service of maximum application is sent to operating system, not will lead to operating system and carries out multiple pop-up prompts, It avoids interfering to user, while other application and current application being enabled to be provided simultaneously with the ability of VPN service, use VPN service.Here, default construction strategy can be configured according to user demand, for example, setting obtains operating system VPN clothes The highest priority of the application of business authorization, alternatively, priority of the application for the request that the last one initiates creation VPN service is arranged Highest, etc., the invention is not limited in this regard.
The realization that the method for VPN service is shared between application of the invention will be discussed in detail by a specific embodiment below Journey, Fig. 2 shows the flow charts for the method that VPN service is shared between application according to another embodiment of the present invention.As shown in Fig. 2, This method at least may comprise steps of S202 to step S210.
Step S202, the request for the creation VPN service that monitoring current application is initiated to operating system.
In this step, for example, traffic monitoring (flow generated such as monitoring background application) industry may be implemented in current application Network connecting request is redirected to local service process, local service firstly, current application obtains network connecting request by business Process is to be serviced to provide by local VPN.Then, in local service process, after the network connecting request initiated, Determine whether network connection type is with any one in lower network: 2G network, 3G network and 4G network;If it is determined that network connects Connect type be 2G network, 3G network and 4G network in any one, then judge initiate network connecting request application whether be In the application of running background.
Further, judge whether the application for initiating network connecting request belongs to the application recorded in background traffic white list, Background traffic white list record is the application for allowing to generate background traffic.Then, prompt information is issued for prompting user to select Select the network connection behavior for forbidding the application (that is, the application for initiating network connecting request) to generate background traffic.If user selects Allow the application to generate the network connection behavior of background traffic, allows to issue network connecting request to network side, count the application The background traffic of generation.
Specifically, it counts how many flow generated daily from the background for the application, and uploads on vpn server, vpn server The data on flows uploaded to all users is analyzed, and the application for calculating each user is averaged what running background generated daily Flow value is how many, which is returned to current application as preset flow threshold value.If what the application generated daily Background traffic is more than preset flow threshold value, issues prompt information and is used to prompt the background traffic of user's application exception occur, from And user can choose the net for forbidding the application to generate background traffic after abnormal prompt information occurs in platform flow upon receipt Network connects behavior.
In this step, it when triggering the operation of creation VPN service on application interface as user, generates and is sent out to operating system The request of the creation VPN service risen.
Step S204 monitors the request for the creation VPN service that " network access great master " initiates to operating system, intercepts this and ask It asks.
Step S206, judges whether the VPN service of operating system is occupied by other application, if so, continuing to execute step S208;If it is not, then continuing to execute step S210.
The VPN service of step S208, operating system are occupied by " flow bodyguard ", send the request to " flow bodyguard ", The VPN service of operating system authorization is shared into " network access great master " by " flow bodyguard ".
In this step, " flow bodyguard " application has obtained the authorization of operating system, creates VPN connection, has VPN clothes The ability of business.
Further, in order to improve the safety of shared VPN service, by " flow bodyguard " by operating system authorization Before VPN service shares to " network access great master ", need to carry out two-way verification to " flow bodyguard " and " network access great master ", that is, verification " network access great master " whether have shared " flow bodyguard " VPN service permission, meanwhile, verification " flow bodyguard " whether have by The VPN service of operating system authorization shares to the permission of " network access great master ", after through verification, executes sharing operation, specifically may be used With referring to the introduction of previous cases one and situation two, details are not described herein again.
Furthermore, it is possible to which the VPN of operating system authorization is serviced by " flow bodyguard " and is shared by way of across application communication To " network access great master ".Here it is possible to communicate across application according to packet name, can also be carried out according to Function Identification logical across application It interrogates, may include time string of the corresponding function register of Function Identification in operating system in Function Identification, with assurance function mark The uniqueness of knowledge realizes the purpose for distinguishing the different function of different application.
Step S210, sends the request to operating system, has creation VPN clothes by operating system authorization " network access great master " The permission of business creates VPN service for " network access great master ".
The embodiment of the present invention realizes " flow bodyguard " and " network access great master " while using the purpose of VPN service, also, this Inventive embodiments have carried out intercept operation to the request from " network access great master ", send the request to " flow bodyguard ", by " stream Amount bodyguard " shares to the VPN service of operating system authorization " network access great master ", and operating system not will do it pop-up prompt, avoids It interferes, affects user experience to user.
It should be noted that in practical applications, above-mentioned all optional embodiments can be any by the way of combining Combination, forms alternative embodiment of the invention, this is no longer going to repeat them.
Based on the method for sharing VPN service between the application that each embodiment provides above, based on the same inventive concept, this hair Bright embodiment additionally provides the device that VPN service is shared between a kind of application.
Fig. 3 shows the structural schematic diagram that the device of VPN service is shared between application according to an embodiment of the invention.Such as Shown in Fig. 3, which at least may include monitoring module 310, judgment module 320 and sharing module 330.
Now introduce each composition of device that VPN service is shared between the application of the embodiment of the present invention or the function of device and each Connection relationship between part:
Monitoring module 310, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module 320 is coupled with monitoring module 310, suitable for when monitoring request, intercept requests, and judge to grasp Whether the VPN service for making system is occupied by other application;
Sharing module 330 is coupled with judgment module 320, if judging the VPN clothes of operating system suitable for judgment module 320 Business is occupied by other application, then sends the requests to other application, is serviced the VPN of operating system authorization by other application and is shared To current application.
In alternative embodiment of the invention, as shown in figure 4, the device that Fig. 3 is shown can also include:
First correction verification module 340, is coupled with sharing module 330, is suitable for be operated in sharing module 330 by other application Before the VPN service of system authorization shares to current application, whether verification current application has the VPN service of shared other application Permission;After through verification, sharing operation is executed.
In alternative embodiment of the invention, the first correction verification module 340 is further adapted for:
Calculate the characteristic information of current application;
According to the characteristic information of current application, search whether that there are current applications in the first application authorization list, wherein The application that the permission of one or more VPN services for having shared other application is stored in first application authorization list is right with it The characteristic information answered;
If finding current application in the first application authorization list, it is determined that pass through verification.
In alternative embodiment of the invention, as shown in figure 4, the device that Fig. 3 is shown can also include:
Second correction verification module 350, is coupled with sharing module 330, is suitable for be operated in sharing module 330 by other application Before the VPN service of system authorization shares to current application, whether verification other application, which has, takes the VPN of operating system authorization Business shares to the permission of current application;After through verification, sharing operation is executed.
In alternative embodiment of the invention, the second correction verification module 350 is further adapted for:
Calculate the characteristic information of other application;
According to the characteristic information of other application, search whether that there are other applications in the second application authorization list, wherein Stored in second application authorization list it is one or more have the VPN service of operating system authorization is shared into current application Permission using corresponding characteristic information;
If finding other application in the second application authorization list, it is determined that pass through verification.
In alternative embodiment of the invention, sharing module 330 is further adapted for:
By way of across application communication, the VPN service of operating system authorization is shared into current application by other application.
In alternative embodiment of the invention, sharing module 330 is further adapted for:
Determine the Function Identification for the function of needing the VPN of sharing operation system authorization to service in current application;
According to determining Function Identification, by way of across application communication, by other application by the VPN of operating system authorization Service shares to the corresponding function of Function Identification.
In alternative embodiment of the invention, Function Identification includes the corresponding function register of Function Identification in operating system Time string.
In alternative embodiment of the invention, when the quantity of current application includes multiple, sharing module 330 is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, the VPN service of operating system authorization is shared to by other application Current application.
In alternative embodiment of the invention, as shown in figure 4, the device that Fig. 3 is shown can also include:
Creation module 360 is coupled with judgment module 320, if judging the VPN clothes of operating system suitable for judgment module 320 Business is not occupied by other application, then sends the requests to operating system, has creation VPN clothes by operating system authorization current application The permission of business creates VPN service for current application.
In alternative embodiment of the invention, sharing module 330 is further adapted for:
When the VPN service fault of other application disconnects, and other application and current application prepare to create VPN service, According to default construction strategy, the maximum application of priority is chosen from other application and current application;
The creation VPN of the maximum application of the priority request serviced is sent to operating system, it is excellent by operating system authorization The first maximum application of grade has the permission of creation VPN service, is that the maximum application of priority creates VPN service;
The VPN service of operating system authorization is shared in other application and current application by priority maximum application and is removed Application except the maximum application of priority.
According to the combination of any one above-mentioned preferred embodiment or multiple preferred embodiments, the embodiment of the present invention can reach It is following the utility model has the advantages that
In embodiments of the present invention, creation current application (application installed in operating system) initiated to operating system VPN service request be monitored, when monitoring the request, intercept the request, and judge operating system VPN service whether It is occupied by other application, if the VPN service of operating system is occupied by other application, sends the request to other application, by The VPN service of operating system authorization is shared to current application by other application.It can be seen that the VPN when operating system services quilt When other application occupies, the VPN service of operating system authorization can be shared to by other application and currently be answered by the embodiment of the present invention With enabling current application and other application to service simultaneously using VPN.Also, the embodiment of the present invention is to from current application Request carried out intercept operation, send the request to other application, serviced the VPN of operating system authorization by other application Current application is shared to, operating system not will do it pop-up prompt, avoid interfering to user, affect user experience.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in detail in the claims, embodiment claimed it is one of any Can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) share the dress of VPN service between application according to an embodiment of the present invention to realize The some or all functions of some or all components in setting.The present invention is also implemented as described here for executing Method some or all device or device programs (for example, computer program and computer program product).This The program that the realization of sample is of the invention can store on a computer-readable medium, or can have one or more signal Form.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other Form provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
So far, although those skilled in the art will appreciate that present invention has been shown and described in detail herein multiple shows Example property embodiment still without departing from the spirit and scope of the present invention, still can according to the present disclosure directly Determine or deduce out many other variations or modifications consistent with the principles of the invention.Therefore, the scope of the present invention is understood that and recognizes It is set to and covers all such other variations or modifications.
The embodiment of the invention also provides a kind of methods that VPN service is shared between A1, application, comprising:
The request for the creation VPN service that monitoring current application is initiated to operating system;
When monitoring the request, the request is intercepted, and judges that whether the VPN of the operating system services by other Using occupancy;
If the VPN service of the operating system is occupied by the other application, send the request to it is described other Using the VPN service of the operating system authorization is shared to the current application by the other application.
A2, method according to a1, wherein described to be taken the VPN of the operating system authorization by the other application Before business shares to the current application, the method also includes:
Verify the permission whether current application has the VPN service for sharing the other application;
After through verification, sharing operation is executed.
A3, the method according to A2, wherein whether the verification current application, which has, is shared the other application VPN service permission, comprising:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
A4, the method according to any one of A1-A3, wherein it is described by the other application by the operating system Before the VPN service of authorization shares to the current application, the method also includes:
It verifies the other application and whether has and the VPN service of the operating system authorization is shared into the current application Permission;
After through verification, sharing operation is executed.
A5, method according to a4, wherein whether the verification other application, which has, is awarded the operating system The VPN service of power shares to the permission of the current application, comprising:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
A6, the method according to any one of A1-A5, wherein it is described by the other application by the operating system The VPN service of authorization shares to the current application, comprising:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application The current application.
A7, the method according to A6, wherein it is described by way of across application communication, by the other application by institute The VPN service for stating operating system authorization shares to the current application, comprising:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation The VPN service of system authorization shares to the corresponding function of the Function Identification.
A8, the method according to A7, wherein the Function Identification includes that the corresponding function register of the Function Identification exists Time string when the operating system.
A9, the method according to any one of A1-A8, wherein when the quantity of the current application includes multiple, institute It states and the VPN service of the operating system authorization is shared into the current application by the other application, comprising:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization VPN service shares to the current application.
A10, method according to a1, wherein further include:
If the VPN service of the operating system is not occupied by the other application, the behaviour is sent the request to Make system, the current application as described in the operating system authorization has the permission of creation VPN service, creates for the current application VPN service.
A11, the method according to any one of A1-A10, wherein awarded the operating system by the other application After the VPN service of power shares to the current application, the method also includes:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and Application in the current application in addition to the maximum application of the priority.
The embodiment of the invention also provides the devices that VPN service is shared between B12, a kind of application, comprising:
Monitoring module, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module suitable for when monitoring the request, intercepting the request, and judges the VPN of the operating system Whether service is occupied by other application;
Sharing module is accounted for if judging that the VPN of the operating system is serviced suitable for the judgment module by the other application With, then the other application is sent the request to, it is by the other application that the VPN service of the operating system authorization is total It enjoys to the current application.
B13, device according to b12, wherein further include:
First correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization Before service shares to the current application, verify whether the current application has the VPN service for sharing the other application Permission;After through verification, sharing operation is executed.
B14, device according to b13, wherein first correction verification module is further adapted for:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, search whether currently to answer there are described in the first application authorization list With, wherein one or more VPN services for having and sharing the other application are stored in the first application authorization list Permission using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
B15, the device according to any one of B12-B14, wherein further include:
Second correction verification module, suitable in the sharing module by the other application by the VPN of the operating system authorization Before service shares to the current application, verify whether the other application has the VPN clothes of the operating system authorization Business shares to the permission of the current application;After through verification, sharing operation is executed.
B16, the device according to B15, wherein second correction verification module is further adapted for:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, search whether that there are described other answers in the second application authorization list With, wherein one or more is stored in the second application authorization list to be had the VPN service of the operating system authorization Share to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
B17, the device according to any one of B12-B16, wherein the sharing module is further adapted for:
By way of across application communication, the VPN service of the operating system authorization is shared to by the other application The current application.
B18, the device according to B17, wherein the sharing module is further adapted for:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operation The VPN service of system authorization shares to the corresponding function of the Function Identification.
B19, the device according to B18, wherein the Function Identification includes the corresponding function register of the Function Identification Time string in the operating system.
B20, the device according to any one of B12-B19, wherein when the quantity of the current application includes multiple When, the sharing module is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, by the other application by the operating system authorization VPN service shares to the current application.
B21, device according to b12, wherein further include:
Creation module, if judging that the VPN of the operating system is serviced not by the other application suitable for the judgment module It occupies, then sends the request to the operating system, the current application as described in the operating system authorization has creation VPN The permission of service creates VPN service for the current application.
B22, the device according to any one of B12-B21, wherein the sharing module is further adapted for:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create When building VPN service, according to default construction strategy, choose that priority is maximum to answer from the other application and the current application With;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, by the behaviour Make the permission that the maximum application of priority described in system authorization has creation VPN service, is the maximum application wound of the priority Build VPN service;
By the maximum application of the priority by the VPN service of the operating system authorization share to the other application and Application in the current application in addition to the maximum application of the priority.

Claims (22)

1. sharing the method for VPN service between a kind of application, comprising:
The request for the creation VPN service that monitoring current application is initiated to operating system;
When monitoring the request, the request is intercepted, and judges that whether the VPN of the operating system services by other application It occupies;
If the VPN service of the operating system is occupied by the other application, the other application is sent the request to, The VPN service of the operating system authorization is shared into the current application by the other application.
2. according to the method described in claim 1, wherein, it is described by the other application by the VPN of the operating system authorization Before service shares to the current application, the method also includes:
Verify the permission whether current application has the VPN service for sharing the other application;
After through verification, sharing operation is executed.
3. according to the method described in claim 2, wherein, whether the verification current application, which has shared described other, is answered The permission of VPN service, comprising:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, searched whether in the first application authorization list there are the current application, Wherein, the power of one or more VPN services for having and sharing the other application is stored in the first application authorization list Limit using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
4. method according to any one of claim 1-3, wherein it is described by the other application by the operating system Before the VPN service of authorization shares to the current application, the method also includes:
Verify whether the other application has the power that the VPN service of the operating system authorization is shared to the current application Limit;
After through verification, sharing operation is executed.
5. according to the method described in claim 4, wherein, whether the verification other application has the operating system The VPN service of authorization shares to the permission of the current application, comprising:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, searched whether in the second application authorization list there are the other application, Wherein, one or more is stored in the second application authorization list to have the VPN service of the operating system authorization altogether It enjoys to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
6. method according to any one of claim 1-3, wherein it is described by the other application by the operating system The VPN service of authorization shares to the current application, comprising:
By way of across application communication, the VPN service of the operating system authorization shared to by the other application described in Current application.
7. it is described by way of across application communication according to the method described in claim 6, wherein, it will by the other application The VPN service of the operating system authorization shares to the current application, comprising:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operating system The VPN service of authorization shares to the corresponding function of the Function Identification.
8. according to the method described in claim 7, wherein, the Function Identification includes the corresponding function register of the Function Identification Time string in the operating system.
9. method according to any one of claim 1-3, wherein when the quantity of the current application includes multiple, It is described that the VPN service of the operating system authorization is shared into the current application by the other application, comprising:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, the VPN of the operating system authorization is taken by the other application Business shares to the current application.
10. according to the method described in claim 1, wherein, further includes:
If the VPN service of the operating system is not occupied by the other application, the operation system is sent the request to System, the current application as described in the operating system authorization have the permission of creation VPN service, create VPN for the current application Service.
11. method according to any one of claim 1-3, wherein awarded the operating system by the other application After the VPN service of power shares to the current application, the method also includes:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create VPN When service, according to default construction strategy, the maximum application of priority is chosen from the other application and the current application;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, is by the operation System authorizes the maximum application of priority to have the permission of creation VPN service, is that the maximum application of the priority creates VPN Service;
The VPN service of the operating system authorization is shared into the other application and described by the priority maximum application Application in current application in addition to the maximum application of the priority.
12. sharing the device of VPN service between a kind of application, comprising:
Monitoring module, suitable for monitoring the request for the creation VPN service that current application is initiated to operating system;
Judgment module suitable for when monitoring the request, intercepting the request, and judges the VPN service of the operating system Whether occupied by other application;
Sharing module is occupied if judging that the VPN of the operating system is serviced suitable for the judgment module by the other application, The other application is sent the request to, is shared to the VPN service of the operating system authorization by the other application The current application.
13. device according to claim 12, wherein further include:
First correction verification module, suitable for being serviced the VPN of the operating system authorization by the other application in the sharing module Before sharing to the current application, the power whether current application has the VPN service for sharing the other application is verified Limit;After through verification, sharing operation is executed.
14. device according to claim 13, wherein first correction verification module is further adapted for:
Calculate the characteristic information of the current application;
According to the characteristic information of the current application, searched whether in the first application authorization list there are the current application, Wherein, the power of one or more VPN services for having and sharing the other application is stored in the first application authorization list Limit using corresponding characteristic information;
If finding the current application in the first application authorization list, it is determined that pass through verification.
15. device described in any one of 2-14 according to claim 1, wherein further include:
Second correction verification module, suitable for being serviced the VPN of the operating system authorization by the other application in the sharing module Before sharing to the current application, verify whether the other application has the VPN service of the operating system authorization altogether It enjoys to the permission of the current application;After through verification, sharing operation is executed.
16. device according to claim 15, wherein second correction verification module is further adapted for:
Calculate the characteristic information of the other application;
According to the characteristic information of the other application, searched whether in the second application authorization list there are the other application, Wherein, one or more is stored in the second application authorization list to have the VPN service of the operating system authorization altogether It enjoys to the permission of the current application using corresponding characteristic information;
If finding the other application in the second application authorization list, it is determined that pass through verification.
17. device described in any one of 2-14 according to claim 1, wherein the sharing module is further adapted for:
By way of across application communication, the VPN service of the operating system authorization shared to by the other application described in Current application.
18. device according to claim 17, wherein the sharing module is further adapted for:
Determine the Function Identification for needing to share the function of VPN service of the operating system authorization in the current application;
According to the determining Function Identification, by way of across application communication, by the other application by the operating system The VPN service of authorization shares to the corresponding function of the Function Identification.
19. device according to claim 18, wherein the Function Identification includes the corresponding function note of the Function Identification Time string of the volume in the operating system.
20. device described in any one of 2-14 according to claim 1, wherein when the quantity of the current application includes multiple When, the sharing module is further adapted for:
Determine the priority of multiple current applications;
According to the priority orders of multiple current applications, the VPN of the operating system authorization is taken by the other application Business shares to the current application.
21. device according to claim 12, wherein further include:
Creation module, if judging that the VPN service of the operating system is not occupied by the other application suitable for the judgment module, The operating system is then sent the request to, the current application as described in the operating system authorization has creation VPN service Permission, for the current application create VPN service.
22. device described in any one of 2-14 according to claim 1, wherein the sharing module is further adapted for:
When the VPN service fault disconnection of the other application, and the other application and the current application prepare to create VPN When service, according to default construction strategy, the maximum application of priority is chosen from the other application and the current application;
The creation VPN of the maximum application of the priority request serviced is sent to the operating system, is by the operation System authorizes the maximum application of priority to have the permission of creation VPN service, is that the maximum application of the priority creates VPN Service;
The VPN service of the operating system authorization is shared into the other application and described by the priority maximum application Application in current application in addition to the maximum application of the priority.
CN201610319066.6A 2016-05-12 2016-05-12 Using a method and device for shared VPN service Active CN105871677B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610319066.6A CN105871677B (en) 2016-05-12 2016-05-12 Using a method and device for shared VPN service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610319066.6A CN105871677B (en) 2016-05-12 2016-05-12 Using a method and device for shared VPN service

Publications (2)

Publication Number Publication Date
CN105871677A CN105871677A (en) 2016-08-17
CN105871677B true CN105871677B (en) 2019-05-07

Family

ID=56632121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610319066.6A Active CN105871677B (en) 2016-05-12 2016-05-12 Using a method and device for shared VPN service

Country Status (1)

Country Link
CN (1) CN105871677B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108322366B (en) * 2017-01-17 2021-10-01 阿里巴巴集团控股有限公司 Method, device and system for accessing network
CN110825537B (en) * 2019-11-04 2023-03-14 联思智云(北京)科技有限公司 Method, device and equipment for calling remote application based on C/S architecture

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904867A (en) * 2012-05-12 2013-01-30 杭州迪普科技有限公司 VPN (virtual private network) authority control method and device
WO2015023887A1 (en) * 2013-08-15 2015-02-19 Mocana Corporation Gateway device for terminating a large volume of vpn connections
CN104468269A (en) * 2014-12-01 2015-03-25 郭丹 Directional traffic monitoring method based on Android terminal device
CN104869043A (en) * 2015-06-04 2015-08-26 魅族科技(中国)有限公司 Method for establishing VPN (Virtual Private Network) connection and terminal
CN105094522A (en) * 2015-06-12 2015-11-25 北京奇虎科技有限公司 Application event reminding method and apparatus
CN105471872A (en) * 2015-11-26 2016-04-06 国家电网公司 Reinforcement method of application software of intelligent mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904867A (en) * 2012-05-12 2013-01-30 杭州迪普科技有限公司 VPN (virtual private network) authority control method and device
WO2015023887A1 (en) * 2013-08-15 2015-02-19 Mocana Corporation Gateway device for terminating a large volume of vpn connections
CN104468269A (en) * 2014-12-01 2015-03-25 郭丹 Directional traffic monitoring method based on Android terminal device
CN104869043A (en) * 2015-06-04 2015-08-26 魅族科技(中国)有限公司 Method for establishing VPN (Virtual Private Network) connection and terminal
CN105094522A (en) * 2015-06-12 2015-11-25 北京奇虎科技有限公司 Application event reminding method and apparatus
CN105471872A (en) * 2015-11-26 2016-04-06 国家电网公司 Reinforcement method of application software of intelligent mobile terminal

Also Published As

Publication number Publication date
CN105871677A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
US11463447B2 (en) Application platform with flexible permissioning
CN108418795B (en) Data access method, device, system and the computer-readable medium of transregional piece of chain
CA2825153C (en) Strong rights management for computing application functionality
CN109981619A (en) Data capture method, device, medium and electronic equipment
KR101821511B1 (en) Data processing method based on instant messaging or social applications, and device thereof
CN104917721B (en) Authorization method, device and system based on oAuth agreement
CN103038724B (en) Communication control console with component aggregates
WO2019082030A1 (en) Access control in microservice architectures
US8811944B2 (en) Authentication request management
WO2013138954A1 (en) Computer account management system and implementation method thereof
CN107113182A (en) Method for supporting negotiation service at service layer
CN106331003B (en) The access method and device of application door system on a kind of cloud desktop
JP2014534515A5 (en)
CN103577180B (en) Data processing method and device
CN106559389A (en) A kind of Service Source issue, call method, device, system and cloud service platform
CN105871677B (en) Using a method and device for shared VPN service
CN110247857A (en) Current-limiting method and device
CN110881039B (en) Cloud security management system
CN103873439B (en) The method and electronic equipment of a kind of networking
CN110213250A (en) Data processing method and terminal device
CN108696864A (en) Virtual-number is asked and sending method, device and storage medium
CN109447743B (en) E-commerce platform authority management method and system
CN114389868B (en) Cloud resource allocation method, system, device and storage medium
US10193892B2 (en) Resource restriction
CN105871851A (en) SaaS-based identity authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220718

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.