CN108881608A - Web data screen method, device and mobile terminal - Google Patents

Web data screen method, device and mobile terminal Download PDF

Info

Publication number
CN108881608A
CN108881608A CN201810386799.0A CN201810386799A CN108881608A CN 108881608 A CN108881608 A CN 108881608A CN 201810386799 A CN201810386799 A CN 201810386799A CN 108881608 A CN108881608 A CN 108881608A
Authority
CN
China
Prior art keywords
network address
target network
data acquisition
acquisition request
security protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810386799.0A
Other languages
Chinese (zh)
Inventor
赵剑萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810386799.0A priority Critical patent/CN108881608A/en
Publication of CN108881608A publication Critical patent/CN108881608A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72445User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting Internet browser applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application discloses a kind of web data screen method, device and mobile terminal, is related to Internet technical field.This method is applied to the browser of mobile terminal, including:Browser receives the sending data acquisition request of the task, includes target network address in the data acquisition request;Judge whether the target network address is safe network address according to security protocol file, includes risky network address element in the security protocol file;If the target network address is safe network address, the data acquisition request is sent according to the target network address;If the target network address is not safe network address, the data acquisition request is not sent.The program can effectively shield the information with negative effect by the shielding to unsafe net page data.

Description

Web data screen method, device and mobile terminal
Technical field
This application involves Internet technical fields, more particularly, to a kind of web data screen method, device and movement Terminal.
Background technique
During the web page browsing of browser, in fact it could happen that illegal perhaps unsound webpage is such as illegal or yellow Color website propagates invalid information or unhealthy information, and therefore, it is necessary to the invalid informations to browsing device net page, unhealthy information It is shielded Deng the information with negative effect.
Summary of the invention
In view of the above problems, present applicant proposes a kind of web data screen method, device and mobile terminals, to certain nets Page data is shielded, so that shielding has the information of negative effect, is purified Internet environment.
In a first aspect, the embodiment of the present application provides a kind of web data screen method, the browsing applied to mobile terminal Device, the method includes:Browser receives the sending data acquisition request of the task, includes target network in the data acquisition request Location;Judge whether the target network address is safe network address according to security protocol file, includes wind in the security protocol file The network address element of danger;If the target network address is safe network address, the data acquisition request is sent according to the target network address;If The target network address is not safe network address, does not send the data acquisition request.
Second aspect, the embodiment of the present application provide a kind of web data screening arrangement, the browsing applied to mobile terminal Device, described device include:Task receiving module, for receiving the sending data acquisition request of the task, the data acquisition request In include target network address;Analysis module, for judging whether the target network address is safety net according to security protocol file Location includes risky network address element in the security protocol file;Request sending module, if being peace for the target network address The whole network location sends the data acquisition request according to the target network address and does not send if the target network address is not safe network address The data acquisition request.
The third aspect, the embodiment of the present application provide a kind of mobile terminal, including display screen, memory and processor, institute It states display screen and the memory is couple to the processor, the display screen is for showing that web page contents, the memory are deposited Storage instruction, the processor executes the above-mentioned method applied to mobile terminal when executed by the processor.
Fourth aspect, the embodiment of the present application provide it is a kind of with processor can be performed program code it is computer-readable Storage medium, said program code make the processor execute the above method.
Web data screen method, device and mobile terminal provided by the present application, browser receive send data obtain When taking the task of request, judge whether safety retransmits data acquisition and ask the target network address in the data acquisition request if safe It asks, if dangerous, does not send data acquisition request, by the shielding to unsafe net page data, can effectively shield has The information of negative effect.
These aspects or other aspects of the application can more straightforward in the following description.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 shows the flow chart of the web data screen method of the application first embodiment proposition;
Fig. 2 shows the flow charts for the web data screen method that the application second embodiment proposes;
Fig. 3 shows the flow chart of the web data screen method of the application 3rd embodiment proposition;
Fig. 4 shows the functional block diagram of the web data screening arrangement of the application fourth embodiment proposition;
Fig. 5 shows a kind of structural block diagram of the mobile terminal of the embodiment of the present application proposition;
Fig. 6 shows a kind of structure chart of the mobile terminal of the embodiment of the present application proposition;
Fig. 7 shows the shifting for being used to execute the web data screen method according to the embodiment of the present application of the embodiment of the present application The block diagram of dynamic terminal.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
In the use process of browser, can be potentially encountered illegitimate site or unsound website, such as carry out yellow, gambling, The website poison website that perhaps violence publicizes or be engaged in "pornography, gambling and drug abuse and trafficking" or violence.In addition, in certain webpages, it can also Invalid information or unhealthy information, such as violent pictures, illegal promotional file can occur.On the one hand, these websites or net On the other hand these negative information extreme influence user experiences in page can also propagate related negative information, or even produce to user Raw negative induction.Certain information screen is carried out therefore, it is necessary to the webpage to browser.
Common, carrying out information screen to webpage can only judge that server is clear by judging whether to respond by server-side The data of device of looking at request accomplish to shield website.But server can only shield entire webpage, can not achieve to entire net Whether page is monitored, that is, is unable in web page monitored whether have negative information, adjustment member webpage can dynamically can not access, Or can some resource load in webpage.If also, shielded by server, need browser to send data to server After acquisition request, then through server it is judged as the website that needs shield, server returns to the related pages that cannot return to browsing Device, required time is long, and consumes with certain flow.
Inventors have found that control access is carried out by browser, to negative network if there is illegal or yellow website Information has control and restraining force well, and controls rapidly, reduces flow consumption, therefore there is an urgent need to browsers to realize to net The independent monitoring and shielding of page, carry out pressure shielding to some illegal or unhealthy website, reduce the influence power to society.
Therefore, the embodiment of the present application provides a kind of web data screen method, in browser end to unsafe network address It is shielded, whether the network address of resource can be carried out shielding in the network address of webpage or webpage, to realize to dangerous Webpage or the web datas such as unsafe resource shielded.Wherein, it is non-that unsafe network address, which is corresponding information, The network address of the negative informations such as method information, unhealthy information.Web data screen method shielding is rapid, also, for only having portion Dividing web page resources is unsafe webpage, can be shielded only for dangerous resource, without influencing the normal clear of webpage It lookes at.
Browser in the embodiment of the present application can be operate in mobile terminal, and it is possible to the clothes in server Business end interacts.Wherein, mobile terminal can be the smart machines such as mobile phone, tablet computer, computer.Simultaneously below in conjunction with attached drawing Web data screen method provided by the embodiments of the present application is illustrated by specific embodiment.
First embodiment
Referring to Fig. 1, the application first embodiment provides a kind of web data screen method, the web data shield side In method, browser receive send data acquisition request task when, first to the target network address in the data acquisition request into Row safety judgement, if the target network address is dangerous, does not send data acquisition request, realizes effective shielding of web data. In the particular embodiment, the web data screen method is applied to web data screening arrangement as shown in Figure 4 and right There should be the mobile terminal 500 (Fig. 5, Fig. 6) of web data screening arrangement 400.Above-mentioned web data screen method specifically can be with Include the following steps:
Step S110:Browser receives the sending data acquisition request of the task, includes target in the data acquisition request Network address.
The data acquisition request is that the request of data, such as http request are obtained from server.In the data acquisition request Including target network address, that is to say, that the data that the data acquisition request will be requested from server are obtained according to the target network address ?.Wherein, target network address can be webpage network address, such as certain search engine network address, certain home page of company network address, certain website; The network address is also possible to the network address of child resource in webpage, such as in webpage the network address, audio of picture network address.
Step S120:Judge whether the target network address is safe network address, the security protocol according to security protocol file It include risky network address element in file.
It include having risky network address element in security protocol file, that is to say, that if having safety association in target network address Discuss the network address element in file, then it is assumed that the target network address is dangerous, may relate to Huang, relate to cruelly or be related to other illegal letters Breath.Wherein, network address element can be some or all of of network address, such as entire network address, agreement, domain name any one or it is more Kind, it is certainly also likely to be the other elements in network address, it is not limited here.
It, can be by target network address and security protocol text when judging whether target network address is safe with specific reference to default security protocol Each network address element of part is compared, and judges in target network address with the presence or absence of the network address element in security protocol file, and if it exists, Then think that the target network address is unsafe network address, if it does not exist, then it is assumed that the target network address is safe network address.
Step S130:If the target network address is safe network address, the data acquisition is sent according to the target network address and is asked It asks;If the target network address is not safe network address, the data acquisition request is not sent.
If target network address is safe network address, received task is executed, i.e., is initiated according to target network address to server Data acquisition request, to server request data.If target network address is not safe network address, the data acquisition is not sent and is asked It asks, to avoid illegal or unsound dangerous data are got.
Webpage screen method provided by the embodiments of the present application carries out safe sex determination to target network address from browser end, right In the target network address for not being safe network address, data acquisition request is not sent, efficiently and quickly shielding has the letter of negative effect Breath.
Second embodiment
The embodiment of the present application provides a kind of web data screen method, in the method, when opening webpage, from click Link is judged.After linking judgement, for the network address of safety, safety is carried out again before initiating request to server Judgement.Specifically, referring to Fig. 2, this method includes:
Step S210:When receiving the trigger action for opening webpage, judge whether the network address of the webpage is to preset black name Network address in list, if so, executing step S250;If it is not, using the network address of the webpage as the target network address in data acquisition request, Execute step S220.
For user in clickthrough, browser receives the link of page request, that is, receives beating for the corresponding link clicks The trigger action for opening webpage, first determine whether the link whether have access network permission, that is, judge the webpage network address whether Permission with access network.
When judging network legal power, browser client passes through the blacklist configured and judges whether the network address is safe, if safety, Then have the permission of access network, if dangerous, do not have the permission of access network.Specific deterministic process can be, by this Network address is compared with the network address in blacklist, sees the network address whether belonged in blacklist, if the network address in blacklist, the net Location is potentially unsafe, does not assign its permission for accessing network;If not the network address in blacklist, illustrates that the network address may be safety , its permission for accessing network can be assigned.
Optionally, browser client can also configure the white list of network address.When receive open webpage trigger action, Judge whether the network address is network address in white list, if so, executing step S220, if it is not, thening follow the steps S250.
Wherein, the blacklist or white list of client configuration can be and obtain in advance from server, this is obtained ahead of time can Be in certain preceding primary or history starting browser from server pull or this browser open after from clothes Business device pulls.
For example, after browser starting, the blacklist file configured first to server pull web page interlinkage waits browsing The file into local data base is updated after the completion of device initialization.Browser can be preferentially using being locally configured when starting next time File configured, be rapidly completed browser initialization.Likewise, blacklist file used in this starting of browser, It can be preceding once from server pull and the blacklist file that is stored in local data base.It is of course also possible to be browser In this use process, safety judgement can also be carried out by the blacklist file of this configuration.
Step S220:Determine to receive the sending data acquisition request of the task.
If network address be it is safe, can by the network address access network, therefore, can using the network address as target network address, Prepare to initiate data acquisition request to server.
Step S230:Judge whether the target network address is safe network address, the security protocol according to security protocol file It include risky network address element in file.If the target network address is safe network address, step S240 is executed;If the target network Location is not safe network address, executes step S250.
Specifically, can be, client determines network address safety by blacklist or white list, has network access authority When, network address can be sent to browser kernel, browser kernel is used to pass through to server the network mould of website address request data Block is when obtaining network address, before the data acquisition request including the network address is sent to server, passes through readjustment and notifies client.
The client is configured with security protocol file, therefore, the security protocol file that can be configured according to client, judgement Whether webpage network address is safe.
Wherein, the security protocol file of client configuration, can be and be pre-configured with, and browser acquisition is pre-configured with and stores Security protocol file, judge whether target network address is safe network address according to pre-stored security protocol file.
Optionally, preconfigured security protocol file can be from server acquisition in browser.Specifically, can be with It is that after browser starting, browser client is initialized, while the pre-loaded a secure browser agreement of demand is literary Part, this document are the portions preferentially saved in browser data library, are read in advance by client.Browser initialization is waited to complete Afterwards, a newest security protocol file can be pulled from server again, updates the safety association being pre-stored in local data base File is discussed, can be configured in this way using newest security protocol file when starting next time, and browser is initial Change rapider.Likewise, server, after this starting, the security protocol file for carrying out safety judgement can be upper one The security protocol file that secondary browser is obtained from server, to make browser that can be pacified with newer security protocol file Full property judgement, and security protocol file can be quickly obtained.
Optionally, browser can also every preset period of time from server pull once safety document of agreement, or It is to start the security protocol file etc. from server pull using this when this carries out safety judgement, in the embodiment of the present application In do not limit.
Step S240:The data acquisition request is sent according to the target network address.
If target network address is judged as safe by security protocol file, data can be sent according to the target network address and obtained Request is taken, corresponding webpage is obtained.Specifically, be used for can basis to the network module of server request data for browser kernel The network address initiates request of data to server, to obtain webpage.
Step S250:The wrong page is shown in the display interface of the browser.
If target network address is webpage network address, and target network address is the network address in blacklist, or according to security protocol text Part is determined as unsafe network address, then does not send the corresponding data acquisition request of target network address at this time, and show in browser The mistake page.
Specifically, indicating that the target network address does not have network legal power if target network address is the network address in blacklist, then directly returning It returns, normal webpage load process will not be carried out again;It notifies the browser kernel website invalid simultaneously, is generated by browser kernel One wrong page carries out loaded and displayed, prompts the user website invalid.
If target network address is unsafe network address according to the judgement of security protocol file, prevent to send, while returning to one Error code allows browser kernel to load a wrong page and shows, to prompt user's network address to correspond to webpage to browser kernel There are problem or directly tell that it is not present or in vain user.
In the embodiment of the present application, when receiving the corresponding network address of clickthrough, blacklist verifying first is carried out to network address, In the case that blacklist is verified, before initiating data acquisition request, then once safety is carried out by security protocol file and is tested Card, if security verification, which has passed through, just initiates data acquisition request to server, effectively to the web data with negative information It is shielded.
3rd embodiment
Present embodiments provide a kind of web data screen method, the browser applied to mobile terminal.In the method, When webpage successfully passes through security verification, the data acquisition request that the webpage includes the network address of the webpage is sent to server, from After server obtains web data, browser carries out in data resolving to webpage, needs to obtain from server wherein each The corresponding data of child resource.Then before initiating request child resource to server, first the safety of child resource is sentenced Disconnected, specifically, referring to Fig. 3, this method includes:
Step S310:When being resolved to the network address of child resource in webpage, using the network address of the child resource as data acquisition Target network address in request determines to receive the sending data acquisition request of the task.
During web analysis, if the child resource for needing to obtain data from server is resolved to, according to the child resource Network address from server obtain data before, first judge the child resource whether safety.Therefore, the net with the child resource is being received Location is as the target network address in data acquisition request, when sending the task of the data acquisition request, first to the data acquisition request In target network address carry out security verification.
Step S320:Judge whether the target network address is safe network address, the security protocol according to security protocol file It include risky network address element in file, if safe network address, thens follow the steps S330, if not safe network address, then execute Step S360.
Security verification is carried out by network address of the security protocol file to child resource, with ensure to obtain from server as far as possible Child resource is safe, legal, healthy.
Step S330:If the target network address is safe network address, judge whether the agreement of the target network address is standard association View, if so, step S340 is executed, if it is not, executing step S350.
For the target network address of safety, according to its agreement, whether standard determines the mode handled it.Wherein, target network address Agreement whether can say and determined by the setting to browser that such as setting http agreement is standard agreement safely, its outside setting He, such as " mttbrowser:// ", " taobao:// " etc. be nonstandard protocol.
Step S340:The data acquisition request is sent according to the target network address.
Step S350:Notify that the corresponding process of the target network address is handled according to the target network address.
If the target network address in data acquisition request is safe, and agreement is standard, by browser by the data Acquisition request is sent to server and obtains child resource data.
If the target network address in data acquisition request is safe, but its agreement is not standard agreement, then can be by the mesh Mark network address is sent to corresponding process and is handled.For example, the target network address is the related protocol for jumping to Taobao, such as taobao://, then it jumps to Taobao's application program and is handled.
Optionally, it before the corresponding process of notice target network address is handled, whether can first issue by other processes The prompt information handled, is selected by user, if user's selection is, notifies that the target network address is corresponding according to target network address Process handled, if user selection it is no, which can not be handled.
I.e., it is possible to being is safe network address in target network address, but its file protocol criteria of right and wrong agreement, such as mttbrowser://, taobao://, then it needs to judge whether the nonstandard protocol is that browser allows in browser client Agreement, if it is not allowing agreement then to ignore the request.If it is allowing agreement then to pop up prompting frame by browser, it to be used for user Oneself selection;Selection is, then browser is by the data assembling of the network request, generating system broadcast singal, by being registered to the association The application process of view is handled.
Step S360:The data acquisition request is not sent.
If target network address is not safe network address, corresponding child resource may relate to invalid information, unhealthy information etc. Negative information does not send the corresponding data acquisition request of target network address then, to block the acquisition of negative information from browser end.
In the embodiment of the present application, for the resource file in webpage, browser kernel is after being parsed, for needing The resource file link of web-page requests is sent to the network module of browser, and network module notifies client, according to client Security protocol judgement, whether the link is safe, allows kernel to send network request if safety, prevents to send out if dangerous It send, ignores the request, the corresponding resource data of negative information in effective shielding web page.
Fourth embodiment
The embodiment of the present application provides a kind of web data screening arrangement 400, the browser applied to mobile terminal.It please join See Fig. 4, which includes:
Task receiving module 410 includes for receiving the sending data acquisition request of the task, in the data acquisition request Target network address.Analysis module 420, for judging whether the target network address is safe network address according to security protocol file, It include risky network address element in the security protocol file.Request sending module 430, if being peace for the target network address The whole network location sends the data acquisition request according to the target network address and does not send if the target network address is not safe network address The data acquisition request.
Optionally, in the embodiment of the present application, when being resolved to the network address of child resource in webpage, with the child resource Network address is the target network address in data acquisition request, and task receiving module 410 receives the sending data acquisition request of the task.
It optionally, in the embodiment of the present application, further include blacklist judgment module, for when the touching for receiving opening webpage Hair operation judges whether the network address of the webpage is the network address preset in blacklist.It is not black when judging result is webpage network address Network address in list, then using the network address of the webpage as the target network address in data acquisition request, task receiving module 410 is received To the sending data acquisition request of the task.
It optionally, can also include display module, when judging result is the network address that webpage network address is in blacklist, display mould Block shows the wrong page in the display interface of the browser.
It optionally, can also include display module, if analysis module 420 determines that target network address is not safe network address, Display module is used to show the wrong page in the display interface of the browser.
It optionally, can also include agreement judgment module in the embodiment of the present application, for judging the association of the target network address Whether view is standard agreement.It is asked if so, request sending module 430 is used to send the data acquisition according to the target network address It asks.
In conclusion web data screen method provided by the embodiments of the present application and device, can pass through browser end pair Website carries out real-time control, and most web page access permission is controlled by the blacklist or white list of server-side, to not having The website having permission carries out masking operation, provides the miscue page.Pass through in browser kernel network module simultaneously to all Network request intercepted, as long as by browser send request link can be first according to secure browser document of agreement Safety regulation judged, request is sent to the refusal that carries out not being inconsistent normally, can thus be shielded many unnecessary Request, and the downloading of other illegal applications can be carried out by webpage in browser or opening provides more ways for prevention Diameter.The blacklist of a configuration, can dynamically control the access right of most of websites involved in the scheme of the embodiment of the present application Limit;The other is by realizing the interception to network request inside browser;Both modes one occurs in clickthrough When control, control webpage, one occur network occur http request before judged, can control all requests, include net Page request or resource request.
After the program, can access to all websites and resource control, in real time can according to configuration list It to increase and delete different websites, can accomplish the monitoring to the whole network, while country can be responded for internet-relevant violence, gambling It is rich, relate to the advantageous control of yellow website.
5th embodiment
Referring to Fig. 5, based on above-mentioned web data screen method and device, the embodiment of the present application also provides one kind Mobile terminal 500.As shown in figure 5, the mobile terminal 500 includes display screen 120, memory 104 and processor 102, it is described aobvious Display screen 120 and the memory 104 are couple to the processor 102, and the display screen 120 is described for showing web page contents 104 store instruction of memory, when described instruction is executed by the processor 102, the processor 102 executes above-described embodiment The method.
Specifically, the electronic body portion 10 is wrapped as shown in fig. 6, the mobile terminal 500 may include electronic body portion 10 The display screen 120 for including shell 12 and being arranged on the shell 12.Metal, such as steel, aluminium alloy system can be used in the shell 12 At.In the present embodiment, the display screen 120 generally includes display panel 111, may also comprise for responding to the display panel 111 carry out the circuit etc. of touch control operation.The display panel 111 can be a liquid crystal display panel (Liquid Crystal Display, LCD), in some embodiments, the display panel 111 is a touch screen 109 simultaneously.Webpage in the present embodiment Content can be to be shown in the display screen 120.
Please refer to Fig. 7, in actual application scenarios, the mobile terminal 500 can be used as intelligent mobile phone terminal into It exercises and uses, the electronic body portion 10 also typically includes one or more (only showing one in figure) processors in this case 102, memory 104, RF (Radio Frequency, radio frequency) module 106, voicefrequency circuit 110, sensor 114, input module 118, power module 122.It will appreciated by the skilled person that structure shown in Fig. 7 is only to illustrate, not to described The structure in electronic body portion 10 causes to limit.For example, the electronic body portion 10 may also include than shown in Fig. 7 more or more Few component, or with the correspondence different from shown in Fig. 7.
It will appreciated by the skilled person that every other component belongs to for the processor 102 It is coupled between peripheral hardware, the processor 102 and these peripheral hardwares by multiple Peripheral Interfaces 124.The Peripheral Interface 124 can Based on following standard implementation:Universal Asynchronous Receive/sending device (Universal Asynchronous Receiver/ Transmitter, UART), universal input/output (General Purpose Input Output, GPIO), serial peripheral connect Mouthful (Serial Peripheral Interface, SPI), internal integrated circuit (Inter-Integrated Circuit, I2C), but it is not limited to above-mentioned standard.In some instances, the Peripheral Interface 124 can only include bus;In other examples In, the Peripheral Interface 124 may also include other elements, such as one or more controller, such as connecting the display The display controller of panel 111 or storage control for connecting memory.In addition, these controllers can also be from described It detaches, and is integrated in the processor 102 or in corresponding peripheral hardware in Peripheral Interface 124.
The memory 104 can be used for storing software program and module, and the processor 102 is stored in institute by operation The software program and module in memory 104 are stated, thereby executing various function application and data processing.The memory 104 may include high speed random access memory, may also include nonvolatile memory, and such as one or more magnetic storage device dodges It deposits or other non-volatile solid state memories.In some instances, the memory 104 can further comprise relative to institute The remotely located memory of processor 102 is stated, these remote memories can pass through network connection to the electronic body portion 10 Or the display screen 120.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication And combinations thereof.
The RF module 106 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus It is communicated with communication network or other equipment.The RF module 106 may include various existing for executing these functions Circuit element, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module (SIM) card, memory etc..The RF module 106 can be carried out with various networks such as internet, intranet, wireless network Communication is communicated by wireless network and other equipment.Above-mentioned wireless network may include cellular telephone networks, wireless Local area network or Metropolitan Area Network (MAN).Various communication standards, agreement and technology can be used in above-mentioned wireless network, including but not limited to Global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication skill Art (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code Division multiple access, W-CDMA), Code Division Multiple Access (Code division access, CDMA), time-division Multiple access technology (time division multiple access, TDMA), adopting wireless fidelity technology (Wireless, Fidelity, WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.10A, IEEE802.11b, IEEE802.11g and/or IEEE 802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses (Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, Instant Messenger The agreement and any other suitable communications protocol of news and short message, or even may include that those are not developed currently yet Agreement.
Voicefrequency circuit 110, loudspeaker 101, microphone 103, microphone 105 provide user and the electronic body portion jointly Audio interface between 10 or the display screen 120.
The setting of sensor 114 is in the electronic body portion 10 or in the display screen 120, the sensor 114 Example include but is not limited to:Acceleration transducer 114F, gyroscope 114G, magnetometer 114H and other sensors.
In the present embodiment, the input module 118 may include the touch screen 109 being arranged on the display screen 120, The touch screen 109 collects the touch operation of user on it or nearby, and (for example user is suitble to using finger, stylus etc. are any Object or attachment operation on the touch screen 109 or near the touch screen 109), it is hereby achieved that user Touch gestures, and corresponding attachment device is driven according to a pre-set procedure, therefore, user can pass through the touching in display screen Control operation selected target region.Optionally, the touch screen 109 may include touch detecting apparatus and touch controller.Wherein, institute The touch orientation of touch detecting apparatus detection user is stated, and detects touch operation bring signal, transmits a signal to the touching Touch controller;The touch controller receives touch information from the touch detecting apparatus, and the touch information is converted into Contact coordinate, then give the processor 102, and order that the processor 102 is sent can be received and executed.In addition, The touch detection of the touch screen 109 can be realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Function.In addition to the touch screen 109, in other change embodiments, the input module 118 can also include other inputs Equipment, such as key 107.The key 107 for example may include the character keys for inputting character, and for triggering control function The control button of energy.The example of the control button includes " returning to main screen " key, power on/off key etc..
The display screen 120 is used for the information and the electronics sheet for showing information input by user, being supplied to user The various graphical user interface in body portion 10, these graphical user interface can be by figure, text, icon, number, video and Qi Ren Meaning combination such as shows the webpage information of browser to constitute.In an example, the touch screen 109 may be disposed at described aobvious Show on panel 111 to constitute an entirety with the display panel 111.
The power module 122 is used to provide power supply to the processor 102 and other each components.Specifically, The power module 122 may include power-supply management system, one or more power supply (such as battery or alternating current), charging circuit, Power-fail detection circuit, inverter, indicator of the power supply status and any other and electronic body portion 10 are described aobvious The generation, management of electric power and the relevant component of distribution in display screen 120.
The mobile terminal 500 further includes locator 119, and the locator 119 is for determining 500 institute of mobile terminal The physical location at place.In the present embodiment, the locator 119 realizes the positioning of the mobile terminal 500 using positioning service, The positioning service, it should be understood that the location information of the mobile terminal 500 is obtained by specific location technology (as passed through Latitude coordinate), it is marked on the electronic map by the technology or service of the position of positioning object.
It should be understood that above-mentioned mobile terminal 500 is not limited to intelligent mobile phone terminal, should refer to can moved Computer equipment used in dynamic.Specifically, mobile terminal 500, refers to the mobile computer for being equipped with intelligent operating system Equipment, mobile terminal 500 include but is not limited to smart phone, smartwatch, tablet computer, etc..
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.For arbitrary processing mode described in embodiment of the method, in device reality Apply in example can no longer be repeated in Installation practice by corresponding processing modules implement one by one.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Interconnecting piece (mobile terminal), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized:With for realizing the logic gates of logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.In addition, in each embodiment of the application In each functional unit can integrate in a processing module, be also possible to each unit and physically exist alone, can also two A or more than two units are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization, can also It is realized in the form of using software function module.If the integrated module realized in the form of software function module and as Independent product when selling or using, also can store in a computer readable storage medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application Type.
Finally it should be noted that:Above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding:It still can be with It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and Range.

Claims (12)

1. a kind of web data screen method, which is characterized in that applied to the browser of mobile terminal, the method includes:
Browser receives the sending data acquisition request of the task, includes target network address in the data acquisition request;
Judge whether the target network address is safe network address according to security protocol file, includes wind in the security protocol file The network address element of danger;
If the target network address is safe network address, the data acquisition request is sent according to the target network address;
If the target network address is not safe network address, the data acquisition request is not sent.
2. the method according to claim 1, wherein being gone back before receiving the sending data acquisition request of the task Including:
When receiving the trigger action for opening webpage, judge whether the network address of the webpage is the network address preset in blacklist;
If it is not, judgement receives transmission data acquisition and asks using the network address of the webpage as the target network address in data acquisition request Asking for task.
3. according to the method described in claim 2, it is characterized in that, if the network address of the webpage is the net in default blacklist Location shows the wrong page in the display interface of the browser.
4. according to the method described in claim 2, it is characterized in that, if the target network address is not safe network address, described clear The display interface of device look at shows the wrong page.
5. the method according to claim 1, wherein when being resolved to the network address of child resource in webpage, with institute The network address of child resource is stated as the target network address in data acquisition request, determines to receive the sending data acquisition request of the task.
6. according to the method described in claim 5, it is characterized in that, if the target network address is safe network address, according to the mesh Before marking the network address transmission data acquisition request, further include:
Whether the agreement for judging the target network address is standard agreement;
If so, executing described the step of sending the data acquisition request according to the target network address;
If it is not, notifying that the corresponding process of the target network address is handled according to the target network address.
7. the method according to claim 1, wherein described judge the target network address according to security protocol file Before whether being safe network address, further include:
Obtain pre-stored security protocol file;
It is described to be judged in the step of whether the target network address is safe network address according to security protocol file, according to described pre-stored Security protocol file judge whether the target network address is safe network address.
8. the method according to the description of claim 7 is characterized in that the method also includes:
Security protocol file is obtained from server;
After the security protocol file for obtaining and being pre-stored, further include:
By the pre-stored security protocol file of the security protocol file obtained from server replacement.
9. the method according to claim 1, wherein the network address element includes in network address, agreement and domain name It is one or more.
10. a kind of web data screening arrangement, which is characterized in that applied to the browser of mobile terminal, described device includes:
Task receiving module includes target network in the data acquisition request for receiving the sending data acquisition request of the task Location;
Analysis module, for judging whether the target network address is safe network address, the safety according to security protocol file It include risky network address element in document of agreement;
Request sending module sends the data according to the target network address and obtains if being safe network address for the target network address Request is taken,
If the target network address is not safe network address, the data acquisition request is not sent.
11. a kind of mobile terminal, which is characterized in that including display screen, memory and processor, the display screen and the storage Device is couple to the processor, and the display screen is for showing web page contents, the memory store instruction, when described instruction by The processor 1 to 9 described in any item methods of processor perform claim requirement when executing.
12. a kind of computer readable storage medium for the program code that can be performed with processor, which is characterized in that described program Code makes the processor perform claim require 1 to 9 described in any item methods.
CN201810386799.0A 2018-04-26 2018-04-26 Web data screen method, device and mobile terminal Pending CN108881608A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810386799.0A CN108881608A (en) 2018-04-26 2018-04-26 Web data screen method, device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810386799.0A CN108881608A (en) 2018-04-26 2018-04-26 Web data screen method, device and mobile terminal

Publications (1)

Publication Number Publication Date
CN108881608A true CN108881608A (en) 2018-11-23

Family

ID=64327377

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810386799.0A Pending CN108881608A (en) 2018-04-26 2018-04-26 Web data screen method, device and mobile terminal

Country Status (1)

Country Link
CN (1) CN108881608A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507706A (en) * 2019-01-31 2020-08-07 华为技术有限公司 Data browsing and storing method and device, computer equipment and storage medium
CN112632159A (en) * 2020-12-01 2021-04-09 腾讯科技(深圳)有限公司 Database access control method and device, electronic equipment and storage medium
CN113987472A (en) * 2021-09-14 2022-01-28 北京纽盾网安信息技术有限公司 Webpage browsing security detection method, device and system
CN116361748A (en) * 2023-04-03 2023-06-30 武汉金力软件有限公司 Software supply chain safety detection method and device
CN117336098A (en) * 2023-11-17 2024-01-02 重庆千港安全技术有限公司 Network space data security monitoring and analyzing method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027540A (en) * 2016-06-01 2016-10-12 中青奇未(北京)网络科技有限公司 Page interception method and system and secure desktop
CN106326455A (en) * 2016-08-26 2017-01-11 乐视控股(北京)有限公司 Web page browsing filtering processing method and system, terminal and cloud acceleration server

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027540A (en) * 2016-06-01 2016-10-12 中青奇未(北京)网络科技有限公司 Page interception method and system and secure desktop
CN106326455A (en) * 2016-08-26 2017-01-11 乐视控股(北京)有限公司 Web page browsing filtering processing method and system, terminal and cloud acceleration server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BAIDU_35002670: "关于在移动端浏览器中唤醒客户端的方法,让页面在客户端中打开", 《HTTPS://BBS.CSDN.NET/TOPICS/391951561》 *
KENZONE: "如何通过浏览器启动应用程序?", 《HTTPS://SEGMENTFAULT.COM/Q/1010000000252148》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111507706A (en) * 2019-01-31 2020-08-07 华为技术有限公司 Data browsing and storing method and device, computer equipment and storage medium
CN111507706B (en) * 2019-01-31 2024-04-26 华为技术有限公司 Method, device, computer equipment and storage medium for browsing and storing data
CN112632159A (en) * 2020-12-01 2021-04-09 腾讯科技(深圳)有限公司 Database access control method and device, electronic equipment and storage medium
CN112632159B (en) * 2020-12-01 2021-09-28 腾讯科技(深圳)有限公司 Database access control method and device, electronic equipment and storage medium
CN113987472A (en) * 2021-09-14 2022-01-28 北京纽盾网安信息技术有限公司 Webpage browsing security detection method, device and system
CN113987472B (en) * 2021-09-14 2023-07-18 北京纽盾网安信息技术有限公司 Webpage browsing security detection method, device and system
CN116361748A (en) * 2023-04-03 2023-06-30 武汉金力软件有限公司 Software supply chain safety detection method and device
CN116361748B (en) * 2023-04-03 2023-09-15 武汉金力软件有限公司 Software supply chain safety detection method and device
CN117336098A (en) * 2023-11-17 2024-01-02 重庆千港安全技术有限公司 Network space data security monitoring and analyzing method
CN117336098B (en) * 2023-11-17 2024-04-19 重庆千港安全技术有限公司 Network space data security monitoring and analyzing method

Similar Documents

Publication Publication Date Title
CN108881608A (en) Web data screen method, device and mobile terminal
US9712562B2 (en) Method, device and system for detecting potential phishing websites
CN106534277B (en) Data sharing method and device
CN110869907B (en) Method and terminal for browsing application page
CN106716956B (en) Method, related device and system for sharing cloud operation interface
CN106713266B (en) Method, device, terminal and system for preventing information leakage
CN109040419A (en) Record screen method, apparatus, mobile terminal and storage medium
CN108768870B (en) Flow control methods, device and mobile terminal
CN110557499B (en) Information processing method and device and mobile terminal
CN111355732A (en) Link detection method and device, electronic equipment and storage medium
CN108958576A (en) content identification method, device and mobile terminal
CN108763297A (en) Web page resources processing method, device and mobile terminal
CN111372205A (en) Information prompting method and electronic equipment
CN102905052B (en) Scanning method and system and scanner
CN108462580B (en) Numerical value transferring method and device
CN108763243A (en) Application program recommends method, apparatus, mobile terminal and server
CN108803961A (en) Data processing method, device and mobile terminal
CN108156071B (en) Method for adding members to community, terminal device and computer readable storage medium
CN107396319B (en) A kind of method of wireless network authentication, equipment, storage medium and terminal reclaimer
CN108536407B (en) Text display method, device and mobile terminal
CN108256312A (en) Webpage opens the method, device and mobile terminal of local application
CN108737341B (en) Service processing method, terminal and server
CN108632822A (en) Detection method, device and the mobile terminal of wireless access point
CN110856173B (en) Network access method and device and electronic equipment
CN111565382B (en) Transmission method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123

RJ01 Rejection of invention patent application after publication