CN108881608A - Web data screen method, device and mobile terminal - Google Patents
Web data screen method, device and mobile terminal Download PDFInfo
- Publication number
- CN108881608A CN108881608A CN201810386799.0A CN201810386799A CN108881608A CN 108881608 A CN108881608 A CN 108881608A CN 201810386799 A CN201810386799 A CN 201810386799A CN 108881608 A CN108881608 A CN 108881608A
- Authority
- CN
- China
- Prior art keywords
- network address
- target network
- data acquisition
- acquisition request
- security protocol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72445—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting Internet browser applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present application discloses a kind of web data screen method, device and mobile terminal, is related to Internet technical field.This method is applied to the browser of mobile terminal, including:Browser receives the sending data acquisition request of the task, includes target network address in the data acquisition request;Judge whether the target network address is safe network address according to security protocol file, includes risky network address element in the security protocol file;If the target network address is safe network address, the data acquisition request is sent according to the target network address;If the target network address is not safe network address, the data acquisition request is not sent.The program can effectively shield the information with negative effect by the shielding to unsafe net page data.
Description
Technical field
This application involves Internet technical fields, more particularly, to a kind of web data screen method, device and movement
Terminal.
Background technique
During the web page browsing of browser, in fact it could happen that illegal perhaps unsound webpage is such as illegal or yellow
Color website propagates invalid information or unhealthy information, and therefore, it is necessary to the invalid informations to browsing device net page, unhealthy information
It is shielded Deng the information with negative effect.
Summary of the invention
In view of the above problems, present applicant proposes a kind of web data screen method, device and mobile terminals, to certain nets
Page data is shielded, so that shielding has the information of negative effect, is purified Internet environment.
In a first aspect, the embodiment of the present application provides a kind of web data screen method, the browsing applied to mobile terminal
Device, the method includes:Browser receives the sending data acquisition request of the task, includes target network in the data acquisition request
Location;Judge whether the target network address is safe network address according to security protocol file, includes wind in the security protocol file
The network address element of danger;If the target network address is safe network address, the data acquisition request is sent according to the target network address;If
The target network address is not safe network address, does not send the data acquisition request.
Second aspect, the embodiment of the present application provide a kind of web data screening arrangement, the browsing applied to mobile terminal
Device, described device include:Task receiving module, for receiving the sending data acquisition request of the task, the data acquisition request
In include target network address;Analysis module, for judging whether the target network address is safety net according to security protocol file
Location includes risky network address element in the security protocol file;Request sending module, if being peace for the target network address
The whole network location sends the data acquisition request according to the target network address and does not send if the target network address is not safe network address
The data acquisition request.
The third aspect, the embodiment of the present application provide a kind of mobile terminal, including display screen, memory and processor, institute
It states display screen and the memory is couple to the processor, the display screen is for showing that web page contents, the memory are deposited
Storage instruction, the processor executes the above-mentioned method applied to mobile terminal when executed by the processor.
Fourth aspect, the embodiment of the present application provide it is a kind of with processor can be performed program code it is computer-readable
Storage medium, said program code make the processor execute the above method.
Web data screen method, device and mobile terminal provided by the present application, browser receive send data obtain
When taking the task of request, judge whether safety retransmits data acquisition and ask the target network address in the data acquisition request if safe
It asks, if dangerous, does not send data acquisition request, by the shielding to unsafe net page data, can effectively shield has
The information of negative effect.
These aspects or other aspects of the application can more straightforward in the following description.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 shows the flow chart of the web data screen method of the application first embodiment proposition;
Fig. 2 shows the flow charts for the web data screen method that the application second embodiment proposes;
Fig. 3 shows the flow chart of the web data screen method of the application 3rd embodiment proposition;
Fig. 4 shows the functional block diagram of the web data screening arrangement of the application fourth embodiment proposition;
Fig. 5 shows a kind of structural block diagram of the mobile terminal of the embodiment of the present application proposition;
Fig. 6 shows a kind of structure chart of the mobile terminal of the embodiment of the present application proposition;
Fig. 7 shows the shifting for being used to execute the web data screen method according to the embodiment of the present application of the embodiment of the present application
The block diagram of dynamic terminal.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
In the use process of browser, can be potentially encountered illegitimate site or unsound website, such as carry out yellow, gambling,
The website poison website that perhaps violence publicizes or be engaged in "pornography, gambling and drug abuse and trafficking" or violence.In addition, in certain webpages, it can also
Invalid information or unhealthy information, such as violent pictures, illegal promotional file can occur.On the one hand, these websites or net
On the other hand these negative information extreme influence user experiences in page can also propagate related negative information, or even produce to user
Raw negative induction.Certain information screen is carried out therefore, it is necessary to the webpage to browser.
Common, carrying out information screen to webpage can only judge that server is clear by judging whether to respond by server-side
The data of device of looking at request accomplish to shield website.But server can only shield entire webpage, can not achieve to entire net
Whether page is monitored, that is, is unable in web page monitored whether have negative information, adjustment member webpage can dynamically can not access,
Or can some resource load in webpage.If also, shielded by server, need browser to send data to server
After acquisition request, then through server it is judged as the website that needs shield, server returns to the related pages that cannot return to browsing
Device, required time is long, and consumes with certain flow.
Inventors have found that control access is carried out by browser, to negative network if there is illegal or yellow website
Information has control and restraining force well, and controls rapidly, reduces flow consumption, therefore there is an urgent need to browsers to realize to net
The independent monitoring and shielding of page, carry out pressure shielding to some illegal or unhealthy website, reduce the influence power to society.
Therefore, the embodiment of the present application provides a kind of web data screen method, in browser end to unsafe network address
It is shielded, whether the network address of resource can be carried out shielding in the network address of webpage or webpage, to realize to dangerous
Webpage or the web datas such as unsafe resource shielded.Wherein, it is non-that unsafe network address, which is corresponding information,
The network address of the negative informations such as method information, unhealthy information.Web data screen method shielding is rapid, also, for only having portion
Dividing web page resources is unsafe webpage, can be shielded only for dangerous resource, without influencing the normal clear of webpage
It lookes at.
Browser in the embodiment of the present application can be operate in mobile terminal, and it is possible to the clothes in server
Business end interacts.Wherein, mobile terminal can be the smart machines such as mobile phone, tablet computer, computer.Simultaneously below in conjunction with attached drawing
Web data screen method provided by the embodiments of the present application is illustrated by specific embodiment.
First embodiment
Referring to Fig. 1, the application first embodiment provides a kind of web data screen method, the web data shield side
In method, browser receive send data acquisition request task when, first to the target network address in the data acquisition request into
Row safety judgement, if the target network address is dangerous, does not send data acquisition request, realizes effective shielding of web data.
In the particular embodiment, the web data screen method is applied to web data screening arrangement as shown in Figure 4 and right
There should be the mobile terminal 500 (Fig. 5, Fig. 6) of web data screening arrangement 400.Above-mentioned web data screen method specifically can be with
Include the following steps:
Step S110:Browser receives the sending data acquisition request of the task, includes target in the data acquisition request
Network address.
The data acquisition request is that the request of data, such as http request are obtained from server.In the data acquisition request
Including target network address, that is to say, that the data that the data acquisition request will be requested from server are obtained according to the target network address
?.Wherein, target network address can be webpage network address, such as certain search engine network address, certain home page of company network address, certain website;
The network address is also possible to the network address of child resource in webpage, such as in webpage the network address, audio of picture network address.
Step S120:Judge whether the target network address is safe network address, the security protocol according to security protocol file
It include risky network address element in file.
It include having risky network address element in security protocol file, that is to say, that if having safety association in target network address
Discuss the network address element in file, then it is assumed that the target network address is dangerous, may relate to Huang, relate to cruelly or be related to other illegal letters
Breath.Wherein, network address element can be some or all of of network address, such as entire network address, agreement, domain name any one or it is more
Kind, it is certainly also likely to be the other elements in network address, it is not limited here.
It, can be by target network address and security protocol text when judging whether target network address is safe with specific reference to default security protocol
Each network address element of part is compared, and judges in target network address with the presence or absence of the network address element in security protocol file, and if it exists,
Then think that the target network address is unsafe network address, if it does not exist, then it is assumed that the target network address is safe network address.
Step S130:If the target network address is safe network address, the data acquisition is sent according to the target network address and is asked
It asks;If the target network address is not safe network address, the data acquisition request is not sent.
If target network address is safe network address, received task is executed, i.e., is initiated according to target network address to server
Data acquisition request, to server request data.If target network address is not safe network address, the data acquisition is not sent and is asked
It asks, to avoid illegal or unsound dangerous data are got.
Webpage screen method provided by the embodiments of the present application carries out safe sex determination to target network address from browser end, right
In the target network address for not being safe network address, data acquisition request is not sent, efficiently and quickly shielding has the letter of negative effect
Breath.
Second embodiment
The embodiment of the present application provides a kind of web data screen method, in the method, when opening webpage, from click
Link is judged.After linking judgement, for the network address of safety, safety is carried out again before initiating request to server
Judgement.Specifically, referring to Fig. 2, this method includes:
Step S210:When receiving the trigger action for opening webpage, judge whether the network address of the webpage is to preset black name
Network address in list, if so, executing step S250;If it is not, using the network address of the webpage as the target network address in data acquisition request,
Execute step S220.
For user in clickthrough, browser receives the link of page request, that is, receives beating for the corresponding link clicks
The trigger action for opening webpage, first determine whether the link whether have access network permission, that is, judge the webpage network address whether
Permission with access network.
When judging network legal power, browser client passes through the blacklist configured and judges whether the network address is safe, if safety,
Then have the permission of access network, if dangerous, do not have the permission of access network.Specific deterministic process can be, by this
Network address is compared with the network address in blacklist, sees the network address whether belonged in blacklist, if the network address in blacklist, the net
Location is potentially unsafe, does not assign its permission for accessing network;If not the network address in blacklist, illustrates that the network address may be safety
, its permission for accessing network can be assigned.
Optionally, browser client can also configure the white list of network address.When receive open webpage trigger action,
Judge whether the network address is network address in white list, if so, executing step S220, if it is not, thening follow the steps S250.
Wherein, the blacklist or white list of client configuration can be and obtain in advance from server, this is obtained ahead of time can
Be in certain preceding primary or history starting browser from server pull or this browser open after from clothes
Business device pulls.
For example, after browser starting, the blacklist file configured first to server pull web page interlinkage waits browsing
The file into local data base is updated after the completion of device initialization.Browser can be preferentially using being locally configured when starting next time
File configured, be rapidly completed browser initialization.Likewise, blacklist file used in this starting of browser,
It can be preceding once from server pull and the blacklist file that is stored in local data base.It is of course also possible to be browser
In this use process, safety judgement can also be carried out by the blacklist file of this configuration.
Step S220:Determine to receive the sending data acquisition request of the task.
If network address be it is safe, can by the network address access network, therefore, can using the network address as target network address,
Prepare to initiate data acquisition request to server.
Step S230:Judge whether the target network address is safe network address, the security protocol according to security protocol file
It include risky network address element in file.If the target network address is safe network address, step S240 is executed;If the target network
Location is not safe network address, executes step S250.
Specifically, can be, client determines network address safety by blacklist or white list, has network access authority
When, network address can be sent to browser kernel, browser kernel is used to pass through to server the network mould of website address request data
Block is when obtaining network address, before the data acquisition request including the network address is sent to server, passes through readjustment and notifies client.
The client is configured with security protocol file, therefore, the security protocol file that can be configured according to client, judgement
Whether webpage network address is safe.
Wherein, the security protocol file of client configuration, can be and be pre-configured with, and browser acquisition is pre-configured with and stores
Security protocol file, judge whether target network address is safe network address according to pre-stored security protocol file.
Optionally, preconfigured security protocol file can be from server acquisition in browser.Specifically, can be with
It is that after browser starting, browser client is initialized, while the pre-loaded a secure browser agreement of demand is literary
Part, this document are the portions preferentially saved in browser data library, are read in advance by client.Browser initialization is waited to complete
Afterwards, a newest security protocol file can be pulled from server again, updates the safety association being pre-stored in local data base
File is discussed, can be configured in this way using newest security protocol file when starting next time, and browser is initial
Change rapider.Likewise, server, after this starting, the security protocol file for carrying out safety judgement can be upper one
The security protocol file that secondary browser is obtained from server, to make browser that can be pacified with newer security protocol file
Full property judgement, and security protocol file can be quickly obtained.
Optionally, browser can also every preset period of time from server pull once safety document of agreement, or
It is to start the security protocol file etc. from server pull using this when this carries out safety judgement, in the embodiment of the present application
In do not limit.
Step S240:The data acquisition request is sent according to the target network address.
If target network address is judged as safe by security protocol file, data can be sent according to the target network address and obtained
Request is taken, corresponding webpage is obtained.Specifically, be used for can basis to the network module of server request data for browser kernel
The network address initiates request of data to server, to obtain webpage.
Step S250:The wrong page is shown in the display interface of the browser.
If target network address is webpage network address, and target network address is the network address in blacklist, or according to security protocol text
Part is determined as unsafe network address, then does not send the corresponding data acquisition request of target network address at this time, and show in browser
The mistake page.
Specifically, indicating that the target network address does not have network legal power if target network address is the network address in blacklist, then directly returning
It returns, normal webpage load process will not be carried out again;It notifies the browser kernel website invalid simultaneously, is generated by browser kernel
One wrong page carries out loaded and displayed, prompts the user website invalid.
If target network address is unsafe network address according to the judgement of security protocol file, prevent to send, while returning to one
Error code allows browser kernel to load a wrong page and shows, to prompt user's network address to correspond to webpage to browser kernel
There are problem or directly tell that it is not present or in vain user.
In the embodiment of the present application, when receiving the corresponding network address of clickthrough, blacklist verifying first is carried out to network address,
In the case that blacklist is verified, before initiating data acquisition request, then once safety is carried out by security protocol file and is tested
Card, if security verification, which has passed through, just initiates data acquisition request to server, effectively to the web data with negative information
It is shielded.
3rd embodiment
Present embodiments provide a kind of web data screen method, the browser applied to mobile terminal.In the method,
When webpage successfully passes through security verification, the data acquisition request that the webpage includes the network address of the webpage is sent to server, from
After server obtains web data, browser carries out in data resolving to webpage, needs to obtain from server wherein each
The corresponding data of child resource.Then before initiating request child resource to server, first the safety of child resource is sentenced
Disconnected, specifically, referring to Fig. 3, this method includes:
Step S310:When being resolved to the network address of child resource in webpage, using the network address of the child resource as data acquisition
Target network address in request determines to receive the sending data acquisition request of the task.
During web analysis, if the child resource for needing to obtain data from server is resolved to, according to the child resource
Network address from server obtain data before, first judge the child resource whether safety.Therefore, the net with the child resource is being received
Location is as the target network address in data acquisition request, when sending the task of the data acquisition request, first to the data acquisition request
In target network address carry out security verification.
Step S320:Judge whether the target network address is safe network address, the security protocol according to security protocol file
It include risky network address element in file, if safe network address, thens follow the steps S330, if not safe network address, then execute
Step S360.
Security verification is carried out by network address of the security protocol file to child resource, with ensure to obtain from server as far as possible
Child resource is safe, legal, healthy.
Step S330:If the target network address is safe network address, judge whether the agreement of the target network address is standard association
View, if so, step S340 is executed, if it is not, executing step S350.
For the target network address of safety, according to its agreement, whether standard determines the mode handled it.Wherein, target network address
Agreement whether can say and determined by the setting to browser that such as setting http agreement is standard agreement safely, its outside setting
He, such as " mttbrowser:// ", " taobao:// " etc. be nonstandard protocol.
Step S340:The data acquisition request is sent according to the target network address.
Step S350:Notify that the corresponding process of the target network address is handled according to the target network address.
If the target network address in data acquisition request is safe, and agreement is standard, by browser by the data
Acquisition request is sent to server and obtains child resource data.
If the target network address in data acquisition request is safe, but its agreement is not standard agreement, then can be by the mesh
Mark network address is sent to corresponding process and is handled.For example, the target network address is the related protocol for jumping to Taobao, such as
taobao://, then it jumps to Taobao's application program and is handled.
Optionally, it before the corresponding process of notice target network address is handled, whether can first issue by other processes
The prompt information handled, is selected by user, if user's selection is, notifies that the target network address is corresponding according to target network address
Process handled, if user selection it is no, which can not be handled.
I.e., it is possible to being is safe network address in target network address, but its file protocol criteria of right and wrong agreement, such as
mttbrowser://, taobao://, then it needs to judge whether the nonstandard protocol is that browser allows in browser client
Agreement, if it is not allowing agreement then to ignore the request.If it is allowing agreement then to pop up prompting frame by browser, it to be used for user
Oneself selection;Selection is, then browser is by the data assembling of the network request, generating system broadcast singal, by being registered to the association
The application process of view is handled.
Step S360:The data acquisition request is not sent.
If target network address is not safe network address, corresponding child resource may relate to invalid information, unhealthy information etc.
Negative information does not send the corresponding data acquisition request of target network address then, to block the acquisition of negative information from browser end.
In the embodiment of the present application, for the resource file in webpage, browser kernel is after being parsed, for needing
The resource file link of web-page requests is sent to the network module of browser, and network module notifies client, according to client
Security protocol judgement, whether the link is safe, allows kernel to send network request if safety, prevents to send out if dangerous
It send, ignores the request, the corresponding resource data of negative information in effective shielding web page.
Fourth embodiment
The embodiment of the present application provides a kind of web data screening arrangement 400, the browser applied to mobile terminal.It please join
See Fig. 4, which includes:
Task receiving module 410 includes for receiving the sending data acquisition request of the task, in the data acquisition request
Target network address.Analysis module 420, for judging whether the target network address is safe network address according to security protocol file,
It include risky network address element in the security protocol file.Request sending module 430, if being peace for the target network address
The whole network location sends the data acquisition request according to the target network address and does not send if the target network address is not safe network address
The data acquisition request.
Optionally, in the embodiment of the present application, when being resolved to the network address of child resource in webpage, with the child resource
Network address is the target network address in data acquisition request, and task receiving module 410 receives the sending data acquisition request of the task.
It optionally, in the embodiment of the present application, further include blacklist judgment module, for when the touching for receiving opening webpage
Hair operation judges whether the network address of the webpage is the network address preset in blacklist.It is not black when judging result is webpage network address
Network address in list, then using the network address of the webpage as the target network address in data acquisition request, task receiving module 410 is received
To the sending data acquisition request of the task.
It optionally, can also include display module, when judging result is the network address that webpage network address is in blacklist, display mould
Block shows the wrong page in the display interface of the browser.
It optionally, can also include display module, if analysis module 420 determines that target network address is not safe network address,
Display module is used to show the wrong page in the display interface of the browser.
It optionally, can also include agreement judgment module in the embodiment of the present application, for judging the association of the target network address
Whether view is standard agreement.It is asked if so, request sending module 430 is used to send the data acquisition according to the target network address
It asks.
In conclusion web data screen method provided by the embodiments of the present application and device, can pass through browser end pair
Website carries out real-time control, and most web page access permission is controlled by the blacklist or white list of server-side, to not having
The website having permission carries out masking operation, provides the miscue page.Pass through in browser kernel network module simultaneously to all
Network request intercepted, as long as by browser send request link can be first according to secure browser document of agreement
Safety regulation judged, request is sent to the refusal that carries out not being inconsistent normally, can thus be shielded many unnecessary
Request, and the downloading of other illegal applications can be carried out by webpage in browser or opening provides more ways for prevention
Diameter.The blacklist of a configuration, can dynamically control the access right of most of websites involved in the scheme of the embodiment of the present application
Limit;The other is by realizing the interception to network request inside browser;Both modes one occurs in clickthrough
When control, control webpage, one occur network occur http request before judged, can control all requests, include net
Page request or resource request.
After the program, can access to all websites and resource control, in real time can according to configuration list
It to increase and delete different websites, can accomplish the monitoring to the whole network, while country can be responded for internet-relevant violence, gambling
It is rich, relate to the advantageous control of yellow website.
5th embodiment
Referring to Fig. 5, based on above-mentioned web data screen method and device, the embodiment of the present application also provides one kind
Mobile terminal 500.As shown in figure 5, the mobile terminal 500 includes display screen 120, memory 104 and processor 102, it is described aobvious
Display screen 120 and the memory 104 are couple to the processor 102, and the display screen 120 is described for showing web page contents
104 store instruction of memory, when described instruction is executed by the processor 102, the processor 102 executes above-described embodiment
The method.
Specifically, the electronic body portion 10 is wrapped as shown in fig. 6, the mobile terminal 500 may include electronic body portion 10
The display screen 120 for including shell 12 and being arranged on the shell 12.Metal, such as steel, aluminium alloy system can be used in the shell 12
At.In the present embodiment, the display screen 120 generally includes display panel 111, may also comprise for responding to the display panel
111 carry out the circuit etc. of touch control operation.The display panel 111 can be a liquid crystal display panel (Liquid Crystal
Display, LCD), in some embodiments, the display panel 111 is a touch screen 109 simultaneously.Webpage in the present embodiment
Content can be to be shown in the display screen 120.
Please refer to Fig. 7, in actual application scenarios, the mobile terminal 500 can be used as intelligent mobile phone terminal into
It exercises and uses, the electronic body portion 10 also typically includes one or more (only showing one in figure) processors in this case
102, memory 104, RF (Radio Frequency, radio frequency) module 106, voicefrequency circuit 110, sensor 114, input module
118, power module 122.It will appreciated by the skilled person that structure shown in Fig. 7 is only to illustrate, not to described
The structure in electronic body portion 10 causes to limit.For example, the electronic body portion 10 may also include than shown in Fig. 7 more or more
Few component, or with the correspondence different from shown in Fig. 7.
It will appreciated by the skilled person that every other component belongs to for the processor 102
It is coupled between peripheral hardware, the processor 102 and these peripheral hardwares by multiple Peripheral Interfaces 124.The Peripheral Interface 124 can
Based on following standard implementation:Universal Asynchronous Receive/sending device (Universal Asynchronous Receiver/
Transmitter, UART), universal input/output (General Purpose Input Output, GPIO), serial peripheral connect
Mouthful (Serial Peripheral Interface, SPI), internal integrated circuit (Inter-Integrated Circuit,
I2C), but it is not limited to above-mentioned standard.In some instances, the Peripheral Interface 124 can only include bus;In other examples
In, the Peripheral Interface 124 may also include other elements, such as one or more controller, such as connecting the display
The display controller of panel 111 or storage control for connecting memory.In addition, these controllers can also be from described
It detaches, and is integrated in the processor 102 or in corresponding peripheral hardware in Peripheral Interface 124.
The memory 104 can be used for storing software program and module, and the processor 102 is stored in institute by operation
The software program and module in memory 104 are stated, thereby executing various function application and data processing.The memory
104 may include high speed random access memory, may also include nonvolatile memory, and such as one or more magnetic storage device dodges
It deposits or other non-volatile solid state memories.In some instances, the memory 104 can further comprise relative to institute
The remotely located memory of processor 102 is stated, these remote memories can pass through network connection to the electronic body portion 10
Or the display screen 120.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, mobile radio communication
And combinations thereof.
The RF module 106 is used to receive and transmit electromagnetic wave, realizes the mutual conversion of electromagnetic wave and electric signal, thus
It is communicated with communication network or other equipment.The RF module 106 may include various existing for executing these functions
Circuit element, for example, antenna, RF transceiver, digital signal processor, encryption/deciphering chip, subscriber identity module
(SIM) card, memory etc..The RF module 106 can be carried out with various networks such as internet, intranet, wireless network
Communication is communicated by wireless network and other equipment.Above-mentioned wireless network may include cellular telephone networks, wireless
Local area network or Metropolitan Area Network (MAN).Various communication standards, agreement and technology can be used in above-mentioned wireless network, including but not limited to
Global system for mobile communications (Global System for Mobile Communication, GSM), enhanced mobile communication skill
Art (Enhanced Data GSM Environment, EDGE), Wideband CDMA Technology (wideband code
Division multiple access, W-CDMA), Code Division Multiple Access (Code division access, CDMA), time-division
Multiple access technology (time division multiple access, TDMA), adopting wireless fidelity technology (Wireless, Fidelity,
WiFi) (such as American Institute of Electrical and Electronics Engineers's standard IEEE 802.10A, IEEE802.11b, IEEE802.11g and/or
IEEE 802.11n), the networking telephone (Voice over internet protocal, VoIP), worldwide interoperability for microwave accesses
(Worldwide Interoperability for Microwave Access, Wi-Max), other be used for mail, Instant Messenger
The agreement and any other suitable communications protocol of news and short message, or even may include that those are not developed currently yet
Agreement.
Voicefrequency circuit 110, loudspeaker 101, microphone 103, microphone 105 provide user and the electronic body portion jointly
Audio interface between 10 or the display screen 120.
The setting of sensor 114 is in the electronic body portion 10 or in the display screen 120, the sensor 114
Example include but is not limited to:Acceleration transducer 114F, gyroscope 114G, magnetometer 114H and other sensors.
In the present embodiment, the input module 118 may include the touch screen 109 being arranged on the display screen 120,
The touch screen 109 collects the touch operation of user on it or nearby, and (for example user is suitble to using finger, stylus etc. are any
Object or attachment operation on the touch screen 109 or near the touch screen 109), it is hereby achieved that user
Touch gestures, and corresponding attachment device is driven according to a pre-set procedure, therefore, user can pass through the touching in display screen
Control operation selected target region.Optionally, the touch screen 109 may include touch detecting apparatus and touch controller.Wherein, institute
The touch orientation of touch detecting apparatus detection user is stated, and detects touch operation bring signal, transmits a signal to the touching
Touch controller;The touch controller receives touch information from the touch detecting apparatus, and the touch information is converted into
Contact coordinate, then give the processor 102, and order that the processor 102 is sent can be received and executed.In addition,
The touch detection of the touch screen 109 can be realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Function.In addition to the touch screen 109, in other change embodiments, the input module 118 can also include other inputs
Equipment, such as key 107.The key 107 for example may include the character keys for inputting character, and for triggering control function
The control button of energy.The example of the control button includes " returning to main screen " key, power on/off key etc..
The display screen 120 is used for the information and the electronics sheet for showing information input by user, being supplied to user
The various graphical user interface in body portion 10, these graphical user interface can be by figure, text, icon, number, video and Qi Ren
Meaning combination such as shows the webpage information of browser to constitute.In an example, the touch screen 109 may be disposed at described aobvious
Show on panel 111 to constitute an entirety with the display panel 111.
The power module 122 is used to provide power supply to the processor 102 and other each components.Specifically,
The power module 122 may include power-supply management system, one or more power supply (such as battery or alternating current), charging circuit,
Power-fail detection circuit, inverter, indicator of the power supply status and any other and electronic body portion 10 are described aobvious
The generation, management of electric power and the relevant component of distribution in display screen 120.
The mobile terminal 500 further includes locator 119, and the locator 119 is for determining 500 institute of mobile terminal
The physical location at place.In the present embodiment, the locator 119 realizes the positioning of the mobile terminal 500 using positioning service,
The positioning service, it should be understood that the location information of the mobile terminal 500 is obtained by specific location technology (as passed through
Latitude coordinate), it is marked on the electronic map by the technology or service of the position of positioning object.
It should be understood that above-mentioned mobile terminal 500 is not limited to intelligent mobile phone terminal, should refer to can moved
Computer equipment used in dynamic.Specifically, mobile terminal 500, refers to the mobile computer for being equipped with intelligent operating system
Equipment, mobile terminal 500 include but is not limited to smart phone, smartwatch, tablet computer, etc..
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.For arbitrary processing mode described in embodiment of the method, in device reality
Apply in example can no longer be repeated in Installation practice by corresponding processing modules implement one by one.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by the application
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction
The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass
Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment
It sets.The more specific example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring
Interconnecting piece (mobile terminal), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized:With for realizing the logic gates of logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium
In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.In addition, in each embodiment of the application
In each functional unit can integrate in a processing module, be also possible to each unit and physically exist alone, can also two
A or more than two units are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization, can also
It is realized in the form of using software function module.If the integrated module realized in the form of software function module and as
Independent product when selling or using, also can store in a computer readable storage medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application
System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application
Type.
Finally it should be noted that:Above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although
The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding:It still can be with
It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And
These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and
Range.
Claims (12)
1. a kind of web data screen method, which is characterized in that applied to the browser of mobile terminal, the method includes:
Browser receives the sending data acquisition request of the task, includes target network address in the data acquisition request;
Judge whether the target network address is safe network address according to security protocol file, includes wind in the security protocol file
The network address element of danger;
If the target network address is safe network address, the data acquisition request is sent according to the target network address;
If the target network address is not safe network address, the data acquisition request is not sent.
2. the method according to claim 1, wherein being gone back before receiving the sending data acquisition request of the task
Including:
When receiving the trigger action for opening webpage, judge whether the network address of the webpage is the network address preset in blacklist;
If it is not, judgement receives transmission data acquisition and asks using the network address of the webpage as the target network address in data acquisition request
Asking for task.
3. according to the method described in claim 2, it is characterized in that, if the network address of the webpage is the net in default blacklist
Location shows the wrong page in the display interface of the browser.
4. according to the method described in claim 2, it is characterized in that, if the target network address is not safe network address, described clear
The display interface of device look at shows the wrong page.
5. the method according to claim 1, wherein when being resolved to the network address of child resource in webpage, with institute
The network address of child resource is stated as the target network address in data acquisition request, determines to receive the sending data acquisition request of the task.
6. according to the method described in claim 5, it is characterized in that, if the target network address is safe network address, according to the mesh
Before marking the network address transmission data acquisition request, further include:
Whether the agreement for judging the target network address is standard agreement;
If so, executing described the step of sending the data acquisition request according to the target network address;
If it is not, notifying that the corresponding process of the target network address is handled according to the target network address.
7. the method according to claim 1, wherein described judge the target network address according to security protocol file
Before whether being safe network address, further include:
Obtain pre-stored security protocol file;
It is described to be judged in the step of whether the target network address is safe network address according to security protocol file, according to described pre-stored
Security protocol file judge whether the target network address is safe network address.
8. the method according to the description of claim 7 is characterized in that the method also includes:
Security protocol file is obtained from server;
After the security protocol file for obtaining and being pre-stored, further include:
By the pre-stored security protocol file of the security protocol file obtained from server replacement.
9. the method according to claim 1, wherein the network address element includes in network address, agreement and domain name
It is one or more.
10. a kind of web data screening arrangement, which is characterized in that applied to the browser of mobile terminal, described device includes:
Task receiving module includes target network in the data acquisition request for receiving the sending data acquisition request of the task
Location;
Analysis module, for judging whether the target network address is safe network address, the safety according to security protocol file
It include risky network address element in document of agreement;
Request sending module sends the data according to the target network address and obtains if being safe network address for the target network address
Request is taken,
If the target network address is not safe network address, the data acquisition request is not sent.
11. a kind of mobile terminal, which is characterized in that including display screen, memory and processor, the display screen and the storage
Device is couple to the processor, and the display screen is for showing web page contents, the memory store instruction, when described instruction by
The processor 1 to 9 described in any item methods of processor perform claim requirement when executing.
12. a kind of computer readable storage medium for the program code that can be performed with processor, which is characterized in that described program
Code makes the processor perform claim require 1 to 9 described in any item methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810386799.0A CN108881608A (en) | 2018-04-26 | 2018-04-26 | Web data screen method, device and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810386799.0A CN108881608A (en) | 2018-04-26 | 2018-04-26 | Web data screen method, device and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108881608A true CN108881608A (en) | 2018-11-23 |
Family
ID=64327377
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810386799.0A Pending CN108881608A (en) | 2018-04-26 | 2018-04-26 | Web data screen method, device and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881608A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111507706A (en) * | 2019-01-31 | 2020-08-07 | 华为技术有限公司 | Data browsing and storing method and device, computer equipment and storage medium |
CN112632159A (en) * | 2020-12-01 | 2021-04-09 | 腾讯科技(深圳)有限公司 | Database access control method and device, electronic equipment and storage medium |
CN113987472A (en) * | 2021-09-14 | 2022-01-28 | 北京纽盾网安信息技术有限公司 | Webpage browsing security detection method, device and system |
CN116361748A (en) * | 2023-04-03 | 2023-06-30 | 武汉金力软件有限公司 | Software supply chain safety detection method and device |
CN117336098A (en) * | 2023-11-17 | 2024-01-02 | 重庆千港安全技术有限公司 | Network space data security monitoring and analyzing method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106027540A (en) * | 2016-06-01 | 2016-10-12 | 中青奇未(北京)网络科技有限公司 | Page interception method and system and secure desktop |
CN106326455A (en) * | 2016-08-26 | 2017-01-11 | 乐视控股(北京)有限公司 | Web page browsing filtering processing method and system, terminal and cloud acceleration server |
-
2018
- 2018-04-26 CN CN201810386799.0A patent/CN108881608A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106027540A (en) * | 2016-06-01 | 2016-10-12 | 中青奇未(北京)网络科技有限公司 | Page interception method and system and secure desktop |
CN106326455A (en) * | 2016-08-26 | 2017-01-11 | 乐视控股(北京)有限公司 | Web page browsing filtering processing method and system, terminal and cloud acceleration server |
Non-Patent Citations (2)
Title |
---|
BAIDU_35002670: "关于在移动端浏览器中唤醒客户端的方法,让页面在客户端中打开", 《HTTPS://BBS.CSDN.NET/TOPICS/391951561》 * |
KENZONE: "如何通过浏览器启动应用程序?", 《HTTPS://SEGMENTFAULT.COM/Q/1010000000252148》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111507706A (en) * | 2019-01-31 | 2020-08-07 | 华为技术有限公司 | Data browsing and storing method and device, computer equipment and storage medium |
CN111507706B (en) * | 2019-01-31 | 2024-04-26 | 华为技术有限公司 | Method, device, computer equipment and storage medium for browsing and storing data |
CN112632159A (en) * | 2020-12-01 | 2021-04-09 | 腾讯科技(深圳)有限公司 | Database access control method and device, electronic equipment and storage medium |
CN112632159B (en) * | 2020-12-01 | 2021-09-28 | 腾讯科技(深圳)有限公司 | Database access control method and device, electronic equipment and storage medium |
CN113987472A (en) * | 2021-09-14 | 2022-01-28 | 北京纽盾网安信息技术有限公司 | Webpage browsing security detection method, device and system |
CN113987472B (en) * | 2021-09-14 | 2023-07-18 | 北京纽盾网安信息技术有限公司 | Webpage browsing security detection method, device and system |
CN116361748A (en) * | 2023-04-03 | 2023-06-30 | 武汉金力软件有限公司 | Software supply chain safety detection method and device |
CN116361748B (en) * | 2023-04-03 | 2023-09-15 | 武汉金力软件有限公司 | Software supply chain safety detection method and device |
CN117336098A (en) * | 2023-11-17 | 2024-01-02 | 重庆千港安全技术有限公司 | Network space data security monitoring and analyzing method |
CN117336098B (en) * | 2023-11-17 | 2024-04-19 | 重庆千港安全技术有限公司 | Network space data security monitoring and analyzing method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881608A (en) | Web data screen method, device and mobile terminal | |
US9712562B2 (en) | Method, device and system for detecting potential phishing websites | |
CN106534277B (en) | Data sharing method and device | |
CN110869907B (en) | Method and terminal for browsing application page | |
CN106716956B (en) | Method, related device and system for sharing cloud operation interface | |
CN106713266B (en) | Method, device, terminal and system for preventing information leakage | |
CN109040419A (en) | Record screen method, apparatus, mobile terminal and storage medium | |
CN108768870B (en) | Flow control methods, device and mobile terminal | |
CN110557499B (en) | Information processing method and device and mobile terminal | |
CN111355732A (en) | Link detection method and device, electronic equipment and storage medium | |
CN108958576A (en) | content identification method, device and mobile terminal | |
CN108763297A (en) | Web page resources processing method, device and mobile terminal | |
CN111372205A (en) | Information prompting method and electronic equipment | |
CN102905052B (en) | Scanning method and system and scanner | |
CN108462580B (en) | Numerical value transferring method and device | |
CN108763243A (en) | Application program recommends method, apparatus, mobile terminal and server | |
CN108803961A (en) | Data processing method, device and mobile terminal | |
CN108156071B (en) | Method for adding members to community, terminal device and computer readable storage medium | |
CN107396319B (en) | A kind of method of wireless network authentication, equipment, storage medium and terminal reclaimer | |
CN108536407B (en) | Text display method, device and mobile terminal | |
CN108256312A (en) | Webpage opens the method, device and mobile terminal of local application | |
CN108737341B (en) | Service processing method, terminal and server | |
CN108632822A (en) | Detection method, device and the mobile terminal of wireless access point | |
CN110856173B (en) | Network access method and device and electronic equipment | |
CN111565382B (en) | Transmission method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181123 |
|
RJ01 | Rejection of invention patent application after publication |