Abstract:
A blockchain-based data processing method, device, and a computer-readable storage medium are provided. A first resource acquisition request of an object identification is transmitted for a target virtual resource to a blockchain network to make the blockchain network query a target ticket identification associated with the object identification and the target virtual resource based on the first resource acquisition request. Metadata is acquired having a binding relationship with the target ticket identification. The target ticket identification is used for characterizing that the object identification has ownership of the target virtual resource. The target virtual resource is acquired according to the metadata returned by the blockchain network. The target virtual resource is controlled to perform an interaction output in response to a triggering operation for interacting with the target virtual resource.
Abstract:
A data download method, performed by a computer device. The method includes querying fog node information of a fog node corresponding to target data upon receiving a data download request for the target data, the fog node information comprising a communication protocol type of the fog node; identifying a target fog node from the fog node based on the fog node information; slicing the target data to be downloaded according to the communication protocol type of the target fog node to obtain slice information of a data slice to be downloaded; transmitting a slice download request to the target fog node corresponding to the data slice to be downloaded based on the slice information of the data slice to be downloaded; and obtaining the target data by combining the data slice returned by each target fog node in response to the corresponding slice download request.
Abstract:
A cloud based method and apparatus for monitoring internet usage are provided. The method comprises: receiving a website inquiry instruction sent by a client, wherein the instruction comprises a website identifier; determining whether the website is a website to be monitored; and if the website is a website to be monitored, processing the website inquiry instruction in accordance with a security policy pre-stored in a server, wherein the security policy is set by the client. Since the security policy is stored on a server, it cannot be easily circumvented by the user, and its effectiveness is enhanced.
Abstract:
A malicious website access method and apparatus are provided. The method includes: determining whether a website is a malicious website; and acquiring a non-executable preview interface of a web page of the malicious website for a terminal to display, if the website is a malicious website. A user may view, through a non-executable preview interface, information about a website to be accessed by the user. Moreover, because a terminal does not access a malicious website directly, the terminal is not exposed to malicious websites, thereby enhancing security of the terminal.