CN109359482B - Webpage browsing method and device - Google Patents

Webpage browsing method and device Download PDF

Info

Publication number
CN109359482B
CN109359482B CN201811179030.8A CN201811179030A CN109359482B CN 109359482 B CN109359482 B CN 109359482B CN 201811179030 A CN201811179030 A CN 201811179030A CN 109359482 B CN109359482 B CN 109359482B
Authority
CN
China
Prior art keywords
webpage
label
hidden
tag
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811179030.8A
Other languages
Chinese (zh)
Other versions
CN109359482A (en
Inventor
王冬冬
李涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qilin Hesheng Network Technology Inc
Original Assignee
Qilin Hesheng Network Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qilin Hesheng Network Technology Inc filed Critical Qilin Hesheng Network Technology Inc
Priority to CN201811179030.8A priority Critical patent/CN109359482B/en
Publication of CN109359482A publication Critical patent/CN109359482A/en
Application granted granted Critical
Publication of CN109359482B publication Critical patent/CN109359482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • User Interface Of Digital Computer (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a webpage browsing method and a webpage browsing device, relates to the technical field of internet, and aims to solve the problem that the privacy of a user is revealed because the content browsed by the user in a privacy mode is easily seen by others. The method may comprise: controlling a browser to enter a privacy browsing mode; recording the tags of the webpage browsed in the private browsing mode into a hidden tag list; acquiring a command for hiding the label in the privacy browsing mode; and hiding the labels recorded in the hidden label list according to the label hiding instruction. The invention is used for browsing the webpage.

Description

Webpage browsing method and device
Technical Field
The invention relates to the technical field of internet, in particular to a webpage browsing method and device.
Background
Currently, modes of browsing a web page through a browser may be classified into a general browsing mode and a private browsing mode. When browsing a web page in the normal browsing mode, a large amount of user-related information, such as search terms, filled-in forms, etc., is retained on the local terminal device, and any person using the terminal device may obtain the data, so that the privacy of the normal browsing mode is poor. In the private browsing mode, the local terminal device does not record much information related to the user.
When a user browses a web page in a privacy mode, the user may be busy and leave the terminal device for a short time. At this time, if the terminal device is acquired by another person, the user may see the web page viewed by the user in the privacy mode, and the privacy of the user may be leaked.
Disclosure of Invention
The embodiment of the invention provides a webpage browsing method and device, and aims to solve the problem that the privacy of a user is revealed because the content browsed by the user in a privacy mode is easily seen by others.
In a first aspect, a method for browsing a web page is provided, which is applied to a terminal, and the method includes:
controlling a browser to enter a privacy browsing mode;
recording the tags of the webpage browsed in the private browsing mode into a hidden tag list;
acquiring a command for hiding the label in the privacy browsing mode;
and hiding the labels recorded in the hidden label list according to the instruction of hiding the labels.
In a second aspect, an apparatus for web browsing is provided, including:
the control module is used for controlling the browser to enter a privacy browsing mode;
the recording module is used for recording the labels of the webpages browsed in the private browsing mode into a hidden label list;
the acquisition module is used for acquiring a command of hiding the label in the privacy browsing mode;
and the hiding module is used for hiding the labels recorded in the hidden label list according to the instruction of hiding the labels.
In a third aspect, a terminal is provided, including: a memory, a processor and computer executable instructions stored on the memory and executable on the processor, which when executed by the processor implement the steps of the method of launching an application program as described in the first aspect above.
In a fourth aspect, the present application provides a computer-readable storage medium for storing computer-executable instructions, which when executed by a processor implement the steps of the method for starting an application program according to the first aspect.
According to the webpage browsing method and device provided by the embodiment of the invention, after the browser enters the privacy browsing mode, the tags of the webpage browsed in the privacy browsing mode are recorded in the hidden tag list, and when the instruction of the hidden tag is obtained, the tags recorded in the hidden tag list can be hidden. Therefore, other people cannot see the label browsed by the user, so that the privacy of the user cannot be disclosed, the safety of webpage browsing is improved, and the privacy of the user can be better protected.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a method for web browsing according to an embodiment of the present invention;
FIG. 2 is a flowchart of another method for browsing a web page according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a web browsing apparatus according to an embodiment of the present invention;
fig. 4 is a schematic diagram of another web browsing apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The webpage browsing method provided by the embodiment of the invention can be executed by a terminal, and the terminal can be any terminal with a webpage browsing function, such as a mobile phone, a notebook computer, a tablet computer and the like.
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for browsing a web page according to an embodiment of the present invention. Referring to fig. 1, a method for browsing a web page according to an embodiment of the present invention may include:
and step 110, controlling the browser to enter a privacy browsing mode.
In an embodiment of the present invention, before step 110, the user may open a browser for web browsing. For example, a user may first open a general browsing mode on a browser, and at this time, a terminal may record a lot of data related to the user, such as a Uniform Resource Locator (URL), a search term, geographic location information, a form, and the like of a webpage accessed by the user.
In the embodiment of the invention, a trigger button can be arranged on the browser to enter a private browsing mode. The trigger button may be, for example, a virtual button provided on a designated page of the browser, or may be, for example, a physical shortcut key provided by the user. When the user wants to open the privacy browsing mode, the user can click the trigger button to enter the privacy browsing mode.
The privacy browsing mode in the embodiment of the present invention is a browsing mode for protecting the privacy of the user, and many data related to the user, such as the above-mentioned search term, geographical location information, a form filled by the user, and the like, may not be recorded in the privacy browsing mode. However, unlike the private browsing mode in the related art, some specific contents, such as tags of web pages browsed in the private browsing mode mentioned below, may be recorded in the private browsing mode mentioned in the embodiment of the present invention.
And step 120, recording the tags of the web pages browsed in the private browsing mode into a hidden tag list.
In the embodiment of the present invention, the hidden tag list may be a list for storing hidden tags. The hidden tag may be a tag that needs to be hidden in the private browsing mode (i.e., is not visible to the user), and specifically may be a tag of a webpage that the user has browsed in the private browsing mode.
In embodiments of the present invention, the tag may encompass at least one of: the web page data itself, and web page information. Wherein the web page information may include at least one of: the webpage comprises a webpage name, a webpage address and webpage progress indication information.
Accordingly, in this step 120, recording the tags of the web pages browsed in the private browsing mode into the hidden tag list may include: and recording at least one item of the webpage name, the webpage address and the webpage progress indication information of the label in the hidden label list. For example, initially, only the web page name may be recorded in the hidden tag list, and when the web page address corresponding to the tag is obtained, the web page address may also be recorded in the hidden tag list. Of course, if the webpage name and the webpage address of the tag are obtained, the webpage name and the webpage address may also be initially recorded in the hidden tag list. If the webpage progress indicating information is subsequently acquired, the webpage progress indicating information can also be recorded in the hidden tag list.
In the embodiment of the present invention, all tags recorded in the hidden tag list may be hidden tags that need to be hidden.
And step 130, acquiring a label hiding instruction in the privacy browsing mode.
In the embodiment of the present invention, the instruction of hiding the tag may be acquired in various different ways. The instruction for obtaining the hidden tag in step 130 may include: receiving an instruction of the hidden tag triggered by clicking a button, or acquiring an instruction of the hidden tag triggered and generated because the time of the browser in the inactive state exceeds a threshold value.
In the first case, the user may trigger an instruction to hide the tag by clicking a button. The button may be a virtual button or an entity button on the terminal. The virtual button may be a virtual button provided at a designated position of the browser, or may be a virtual button provided on a display interface of the terminal. The physical button may be any physical button on the terminal, such as a standby button, a volume button, etc. Once the user clicks on such a virtual button or physical button, the terminal receives an instruction to hide the tag.
In the second case, the terminal may detect whether the time the browser was in the inactive state exceeds a threshold, upon which an instruction to generate a hidden tag may be triggered. The threshold may be set as needed, and is generally set to be short, for example, 45 seconds, for example, 1 minute. In the embodiment of the present invention, the browser being in the inactive state may represent at least one of the following situations: the browser is in a background running mode, the browser is displayed in a foreground but is not operated for more than a preset time (for example, 30 seconds and the like), the terminal (for example, a mobile phone) is locked, and the like. If the time the browser is in the inactive state does not exceed the threshold, the instruction to generate the hidden tag may not be triggered.
Step 140, hiding the tags recorded in the hidden tag list according to the instruction for hiding the tags.
In embodiments of the present invention, step 140 may be implemented in a variety of different ways.
Optionally, in one embodiment, step 140 may comprise: according to the instruction of hiding the labels, setting the states of all the labels in the hidden label list to be invisible, so that the browser does not display the labels with the invisible states. In this way, the terminal can control whether the browser displays the tab in the hidden tab list according to the state (e.g., invisible state and visible state) of the tab.
Optionally, in the embodiment of the present invention, after the terminal acquires the instruction of hiding the tag, the tag hiding purpose may also be achieved by directly closing the tag in the hidden tag list or placing the tag in a background for operation.
According to the webpage browsing method provided by the embodiment of the invention, after the browser enters the privacy browsing mode, the tags of the webpage browsed in the privacy browsing mode are recorded in the hidden tag list, and when the instruction of the hidden tags is obtained, the tags recorded in the hidden tag list can be hidden. Therefore, other people cannot see the label browsed by the user, so that the privacy of the user cannot be disclosed, the safety of webpage browsing is improved, and the privacy of the user can be better protected.
In the embodiment of the present invention, after step 140, optionally, the terminal may control the browser to exit the private browsing mode, and may open a preset tab or a tab that has been browsed in the normal browsing mode on the browser. In this way, user privacy may be protected. Of course, the terminal may also turn off the entire browser (including all tabs) for better user privacy.
In an embodiment of the present invention, after step 140, when the user wants to perform web page recovery, the user may launch a browser. In this case, optionally, the web browsing method provided in the embodiment of the present invention may further include: after the browser is started, receiving an instruction for displaying a hidden label; and according to the instruction for displaying the hidden label, restoring the webpage. Therefore, the webpage browsing method provided by the embodiment of the invention not only can realize the label hiding in the privacy browsing mode, but also can realize the webpage recovery, so that the browsing of the user is not greatly influenced, and the user experience is improved.
In this embodiment of the present invention, optionally, according to the instruction for displaying the hidden tag, the performing webpage recovery may include: when a label exists in the hidden label list, performing webpage recovery on the label in the hidden label list; and when no label exists in the hidden label list or the hidden label list, creating a label to recover the webpage. The created tag may be a preset tag indicating that the web page is in a recovery state, or other preset tags. Therefore, whether the label is recorded in the hidden label list or not can be recovered, so that the user can browse conveniently and the user experience is improved.
As mentioned above, after step 110, the web page information corresponding to each tag in the hidden tag list may be obtained, where the web page information may include a web page address, and the tag and the web page information may be bound together, so that the web page information serves as a part of the content of the tag. Meanwhile, all or part of the acquired webpage information can be recorded in the hidden tag list as part of the tag, so that webpage recovery can be performed subsequently. Therefore, when the label exists in the hidden label list, the webpage recovery can be performed on the label according to the webpage information corresponding to the label.
According to the mode for recovering the webpage based on the webpage information, the webpage information comprises the webpage address (such as URL), so that the webpage can be accurately recovered, a user can browse the previous webpage better conveniently, and the browsing efficiency of the user is improved.
In the embodiment of the invention, when the webpage is recovered, the webpage can be recovered to the page browsed before, and can be recovered to a specific position or a playing position of the page browsed before more accurately, so that the browsing requirements of users can be better met, and the browsing efficiency of the users can be improved. In this case, the web page information further includes web page progress indication information. Correspondingly, the web page recovery of the tag according to the web page information corresponding to the tag includes: acquiring a webpage corresponding to the label according to the webpage address; and restoring the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
In the embodiment of the present invention, the webpage progress indication information may indicate a specific position of the webpage, such as a reading position or a video playing position. The specific content of the webpage progress indication information may not be specifically limited in the present application, and in the embodiment of the present invention, the terminal can restore the webpage to the specific position where the user browses the webpage before according to the webpage progress indication information, and the data related to achieve the purpose can be all used as the content of the webpage progress indication information.
It should be appreciated that, in the embodiment of the present invention, in order to improve security and better protect privacy of the user, an interface may be displayed to prompt the user to set authentication information, such as a password and a fingerprint, when the user enters the privacy browsing mode for the first time or when the user opens a new tag for the first time in the privacy browsing mode. After the authentication information (e.g., entered by the user) is obtained, this authentication information may be retained and used for subsequent authentication of the user.
In the embodiment of the invention, once the user sets the identity authentication information, after the instruction for displaying the hidden tag is received, the prompt interface for identity authentication can be displayed, after the identity authentication information is acquired, the acquired identity authentication information can be compared with the pre-stored identity authentication information, if the acquired identity authentication information is the same as the pre-stored identity authentication information, the identity authentication is passed, and then the webpage is recovered according to the instruction for displaying the hidden tag. If the two are different, the authentication is failed, and the webpage recovery cannot be carried out. Through the authentication mode, the privacy of the user is better guaranteed, and the safety is improved.
Fig. 2 is a flowchart of another method for browsing a web page according to an embodiment of the present invention, and referring to fig. 2, the method for browsing a web page according to the embodiment of the present invention includes:
step 201, controlling the browser to enter a privacy browsing mode.
In the embodiment of the invention, the terminal can be provided with the browser, and the user can operate the browser on the terminal to enable the browser to enter the privacy browsing mode. Taking the terminal as a mobile phone as an example, the user browses a webpage by using a mobile phone browser, and the user can click a button to enter a private browsing mode. The button can be a virtual button set on the mobile phone by a developer, and can also be a key (such as a volume key) carried by the mobile phone, and the preferred button is a virtual button set in a browser interface by the developer, such as a button named as 'private browsing'. After the user clicks the button, the browser enters a privacy browsing mode, and the browser does not store information related to the user, such as cache, Cookies, geographical position information and the like generated by the user in the mode.
Step 202, when the label is opened, displaying an interface for prompting a user to set authentication information, and acquiring the authentication information.
In the embodiment of the invention, after the user enters the privacy browsing mode, when the label is opened, whether the user sets the authentication information or not can be judged firstly, and if the user does not set the authentication information, an authentication information setting interface can be displayed to remind the user to set the authentication information. The identity authentication information may be used to authenticate subsequent identity authentication information input by an operator, for example, and determine whether the operator is a valid user. The authentication information may include information such as a key, a fingerprint, an iris, a voiceprint, a gesture, and the like.
In the embodiment of the invention, after the user operates the browser to enter the privacy browsing mode, when the user opens the label, the browser can pop up an interface for guiding the user to set the identity verification information. Taking the password as an example, if the user selects to set the password for identity recognition, the browser pops up a password setting interface, and after the user inputs the personal password on the password setting interface and confirms through the secondary input of the user, the terminal receives the password of the user and stores the password.
In another embodiment of the invention, the user can also be prompted to set the authentication information directly after the user enters the privacy mode without opening the tag. The user can actively enter an interface for setting the authentication information at any time to complete the setting of the authentication information.
Therefore, after the user sets the identity authentication information, the webpage can be restored according to the instruction of the real hidden tag only after passing the identity authentication, so that the safety of the user information is improved, and the privacy of the user can be better protected.
Step 203, recording the tags of the web pages browsed in the private browsing mode into a hidden tag list.
In the embodiment of the invention, after the browser enters the private browsing mode, the tags of the web pages browsed by the user can be recorded in the hidden tag list. The hidden tag list may be used to record tags, and the tags recorded in the hidden tag list may include: tags of web pages accessed by a user in a private browsing mode. The tag may include a website name, may include an address of the website, and may include web page information. Wherein the web page information may include web page progress indication information. The hidden tag list may be a dynamic list, which exists when a tag exists, and may be an empty list or deleted when no tag exists.
Taking the terminal as a mobile phone as an example, after the user enters the privacy browsing mode, if the user opens the tag a, the tag B, and the tag C in the mode for access, the browser can record all the tag a, the tag B, and the tag C in the hidden tag list. If the user does not open any tabs after entering the private browsing mode, the hidden tab list may be empty or the hidden tab list may not exist.
In this way, all the tags of the web pages accessed by the user in the private browsing mode are stored in the hidden tag list, so that the centralized storage is convenient for management.
And 204, receiving a label hiding instruction in the privacy browsing mode.
In the embodiment of the present invention, the instruction for hiding the tag may be generated by the following method: a user clicks a button to generate a label hiding instruction; or when the time that the browser is in the inactive state exceeds a threshold value, triggering the terminal equipment to generate an instruction of hiding the label.
Taking the terminal as a mobile phone as an example, wherein a user can click a button preset by a developer to trigger generation of an instruction for hiding the tag, and the button clicked by the user can be a virtual button set on the mobile phone by the developer, or a key (such as a volume key, a screen locking key, etc.) carried by the mobile phone. For example, the virtual button is a button named "hidden mode" set in the browser interface by the developer. When other people borrow the mobile phone for use from the user, the user does not want to close the webpage browsed by the user in the privacy mode, the user clicks a button for hiding the label preset by the developer, an instruction for generating the hidden label can be triggered, and then the terminal can acquire the instruction for hiding the label. For another example, after the user browses the web page in the privacy mode, the mobile phone may be locked by the physical button, and then the mobile phone may be triggered to generate the instruction of hiding the tag by the action of locking the screen by the physical button.
The terminal may detect whether the time the browser is in the inactive state exceeds a threshold, and may trigger an instruction to generate a hidden tag once the threshold is exceeded. Taking a terminal as an example, where the terminal may be a mobile phone, where the browser in the inactive state may include at least one of: the browser is in a background running state, the browser is in a closing state, the time that the browser is in a display state but not operated exceeds preset time (for example, 30 seconds and the like), and the mobile phone is in a screen locking state and a power-off state. The threshold may be time set by a developer or a user of the browser, and the size of the threshold set by the developer needs to be comprehensively considered to play a role in protecting user privacy, and also needs to consider convenience in browser operation. For example, if the terminal is a computer, a user watches a video in a privacy mode, and if the time threshold set by a developer is too small, the video is not played completely, the terminal device already generates a command for hiding a tag, which may affect the normal operation of the user; if the terminal is a mobile phone, a user browses a webpage in a privacy mode, if a time threshold set by a developer is too large, the user is in a chance occasionally, does not quit a browser and does not lock the screen of the mobile phone, and browsing information of the user can be acquired by others before a terminal device generates a label hiding instruction. Of course, the threshold may also be 0, that is, the mobile phone is in an inactive state, and the hidden tag instruction is immediately generated.
Taking the terminal as a mobile phone as an example, the instruction for hiding the tag can be generated by clicking a button (for example, a preset virtual button for hiding the tag or an entity key) by one key of a user, so that the convenience of operation is improved; the instruction can be automatically generated after the time that the browser is in the inactive state is judged to exceed the threshold value, the instruction of the hidden label can be acquired more conveniently, and the convenience of operation is improved.
Step 205, acquiring webpage information of a webpage corresponding to each tag in the hidden tag list, and binding the tag and the webpage information.
In the embodiment of the invention, after the terminal receives the instruction of hiding the tags, the terminal can acquire the webpage information of the webpage corresponding to each tag in the hidden tag list and bind the tags and the webpage information of the webpage. Thus, the tag has the web page information of the web page.
In one embodiment of the invention, the web page information may include a web page address. Because the label is bound with the webpage information of the webpage, the webpage corresponding to the label can be obtained according to the webpage address when the label is opened next time.
In another embodiment of the present invention, the web page information may also include a web page address and web page progress indication information (e.g., a user's progress in watching a video, a user reading an article to a few lines). Because the label is bound with the webpage information of the webpage, the webpage corresponding to the label can be obtained according to the webpage address when the label is opened next time; the webpage can be restored to the position indicated by the webpage progress indication information according to the webpage progress indication information.
In the embodiment of the present invention, step 205 may also be performed after step 201. And when a user browses a webpage in a privacy browsing mode, acquiring webpage information of the webpage corresponding to each label in the hidden label list, and binding the label with the webpage information.
And step 206, hiding the tags recorded in the hidden tag list according to the instruction of hiding the tags.
In an embodiment of the present invention, after receiving the instruction of hiding the tags, the terminal may set all the tags in the hidden tag list to be invisible, so as to hide the tags recorded in the hidden tag list. In the embodiment of the invention, after the terminal receives the instruction of hiding the label, the terminal can directly hide the label recorded in the hidden label list. For example, the tags recorded in the hidden tag list are turned to the background to run without being displayed, and the tags recorded in the hidden tag list are turned off.
And step 207, exiting the private browsing mode, and opening a preset label or a browsed label on the browser.
In the embodiment of the present invention, after the terminal hides the tag recorded in the hidden tag list, the browser may automatically exit the private browsing mode. After the browser exits the privacy browsing mode, the browser can enter a common browsing mode, and a preset tag or a browsed tag can be automatically opened in the common browsing mode. The preset tab may be a default tab set by a user or a developer. The browsed tags may be tags that the user has browsed in a normal browsing mode before. In addition, after the browser exits the privacy browsing mode, the terminal can not only open a preset tag or a browsed tag on the browser, but also directly display a blank page.
Taking a terminal as a mobile phone as an example, a user browses a webpage in a hidden browsing mode, the user can click a button for hiding a label preset by a developer or the user, and after the mobile phone receives an instruction for hiding the label, the mobile phone can completely hide the webpage browsed by the user in a private browsing mode, automatically enter a common browsing mode, and open a blank page.
Therefore, after the privacy browsing mode exits, a label in the common browsing mode is displayed on the browser, and the user privacy can be better protected.
And step 208, receiving an instruction for displaying the hidden label after the browser is started.
In the embodiment of the invention, when a user wants to recover a webpage, the user can start the browser, click a display hidden tag button preset by a developer or the user to generate an instruction for displaying a hidden tag, and after receiving the instruction for displaying the hidden tag, the terminal equipment can recover the webpage according to the instruction for displaying the hidden tag.
In the embodiment of the present invention, the hidden label displaying button may be a virtual button set by the developer on the mobile phone, for example, a virtual button named "hidden label displaying" set by the developer in the browser interface. The instruction for displaying the hidden label can also be generated for a shortcut key set by a user, such as pressing a standby key and triggering the volume at the same time.
Taking the terminal as a mobile phone as an example, after all the tags in the hidden browsing list are hidden, if the user is in use. After the browser is started, the user wants to browse the previous webpage again, can click a button for displaying the hidden tag preset by a developer or a user, and the mobile phone can receive an instruction for displaying the hidden tag.
And 209, displaying an authentication prompt interface, acquiring authentication information, and authenticating the authentication information.
In order to better protect the privacy of the user, in the embodiment of the present invention, after receiving the instruction for displaying the hidden tag, the terminal may first determine whether the instruction is issued by the user himself. Therefore, an authentication prompt interface can be displayed, a user can input authentication information through the authentication prompt interface, or the terminal can actively acquire the authentication information of the user when the user is in a proper position.
Specifically, after the terminal acquires the authentication information, the acquired authentication information may be compared with the pre-stored authentication information, and if the two authentication information are the same, the authentication is passed, and then the webpage is restored according to the instruction for displaying the hidden tag. If the two are different, the authentication is failed, and the webpage recovery cannot be carried out. Through the authentication mode, the privacy of the user is better guaranteed, and the safety is improved.
Taking the terminal as a mobile phone and taking password verification as an example, after the mobile phone receives an instruction for displaying the hidden tag, a screen of the mobile phone can display a password input prompting interface, a user inputs a password set before, and if the password input by the user is correct, the verification is passed. Certainly, in the embodiment of the present invention, gesture verification may also be adopted, in this case, the mobile phone screen may also display a gesture input interface, the user inputs a gesture set before on the mobile phone screen, the mobile phone receives the gesture input by the user, and compares the gesture input by the user with the gesture set before, and if the gesture input by the user is consistent with the gesture set before, the verification is passed.
In the embodiment of the invention, whether the instruction of the hidden label is sent by the user can be judged through testing. For example, if the user can accurately find out a part or all of the web pages previously browsed in the privacy mode from all the web pages, it can be determined that the operator is the user himself.
And step 210, when the identity authentication is passed, restoring the webpage according to the instruction for displaying the hidden label.
In the process of restoring the webpage according to the instruction of the real hidden tag, the terminal can firstly determine whether the hidden tag list exists, and if the hidden tag list does not exist, a tag can be automatically created to restore the webpage; if the list exists, the terminal can further determine whether a tag exists in the hidden tag list, if the tag does not exist in the hidden tag list, a tag can be automatically created to recover the tag, and if the tag exists in the hidden tag list, the tag in the hidden tag list can be recovered.
In the embodiment of the invention, when the hidden tag list does not exist or tags do not exist in the hidden tag list, one tag can be automatically created to recover the tags, so that the condition that the request of a user does not answer can be prevented. The automatically created tag may be a tag preset by a developer or a tag set by a user. Therefore, whether the label is recorded in the hidden label list or not can be recovered, so that the user can browse conveniently and the user experience is improved.
In the embodiment of the present invention, after the tag exists in the hidden tag list (the tag exists originally or a tag is automatically generated), the terminal may perform web page recovery according to the web page information in the tag. In the embodiment of the present invention, after the instruction to display the hidden tag is received, the state of the tag recorded in the hidden tag list may also be set to a visible state.
In an embodiment of the present invention, when a tag exists in the hidden tag list, the terminal may perform web page recovery according to a web page address in the acquired web page information. According to the mode for recovering the webpage based on the webpage information, the webpage information comprises the webpage address (such as URL), so that the webpage can be accurately recovered, a user can browse the previous webpage better conveniently, and the browsing efficiency of the user is improved.
In another embodiment of the present invention, the web page information may also include a web page address and web page progress indication information (e.g., a user's progress in watching a video, a user reading an article to a few lines). The terminal can obtain the webpage corresponding to the label according to the webpage address, and can restore the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
In the embodiment of the present invention, the webpage progress indication information may indicate a specific position of the webpage, such as a reading position or a video playing position. The specific content of the webpage progress indication information may not be specifically limited in the present application, and in the embodiment of the present invention, the terminal can restore the webpage to the specific position where the user browses the webpage before according to the webpage progress indication information, and the data related to achieve the purpose can be all used as the content of the webpage progress indication information.
When the webpage is restored by using the webpage progress indication information, the webpage can be restored to the page browsed before, and the webpage can be restored to a specific position or a playing position of the page browsed before more accurately, so that the browsing requirements of the user can be better met, and the browsing efficiency of the user is improved.
Fig. 3 is a schematic diagram of a web browsing apparatus according to an embodiment of the present invention. Referring to fig. 3, a web browsing apparatus 300 according to an embodiment of the present invention may include:
the control module 301 is configured to control a browser to enter a private browsing mode;
a recording module 302, configured to record a tag of a webpage browsed in the private browsing mode into a hidden tag list;
an obtaining module 303, configured to obtain, in the private browsing mode, an instruction for hiding a tag;
a hiding module 304, configured to hide the tags recorded in the hidden tag list according to the instruction of hiding the tags.
According to the webpage browsing device provided by the embodiment of the invention, after the browser enters the privacy browsing mode, the tags of the webpage browsed in the privacy browsing mode are recorded in the hidden tag list, and when the instruction of the hidden tag is obtained, the tags recorded in the hidden tag list can be hidden. Therefore, other people cannot see the label browsed by the user, so that the privacy of the user cannot be disclosed, the safety of webpage browsing is improved, and the privacy of the user can be better protected.
Fig. 4 is a schematic diagram of another web browsing apparatus according to an embodiment of the present invention. Referring to fig. 4, a web browsing apparatus 400 according to an embodiment of the present invention may include: a control module 401, a recording module 402, an acquisition module 403 and a hiding module 404. Optionally, the web browsing device 400 may further include a restoring module 405 and a binding module 406.
The control module 401 is configured to control the browser to enter a private browsing mode;
a recording module 402, configured to record a tag of a webpage browsed in the private browsing mode into a hidden tag list;
an obtaining module 403, configured to obtain, in the private browsing mode, an instruction for hiding a tag;
a hiding module 404, configured to hide the tag recorded in the hidden tag list according to the instruction of hiding the tag.
Optionally, in the apparatus 400, in an embodiment of the present invention, the obtaining module 403 is specifically configured to: receiving an instruction of the hidden tag triggered by clicking a button; or acquiring an instruction for triggering the generated hidden tag because the time that the browser is in the inactive state exceeds a threshold value.
Optionally, in the apparatus 400, in an embodiment of the present invention, the hiding module 404 is specifically configured to: and setting the states of all the labels in the hidden label list to be invisible according to the instruction of hiding the labels, so that the browser does not display the labels in the invisible state.
Optionally, in an embodiment of the present invention, the apparatus 400 is further configured to: after the browser is started, receiving an instruction for displaying a hidden label; the apparatus further includes a recovery module 405, configured to perform webpage recovery according to the instruction for displaying the hidden tag.
Optionally, in the apparatus 400, in an embodiment of the present invention, the recovery module 405 is specifically configured to: when a label exists in the hidden label list, performing webpage recovery on the label in the hidden label list; and when no label exists in the hidden label list or the hidden label list, creating a label to recover the webpage.
Optionally, in the apparatus 400, in an embodiment of the present invention, the obtaining module 403 is further configured to: after the browser enters a privacy browsing mode, acquiring webpage information corresponding to each tag in the hidden tag list, wherein the webpage information comprises a webpage address; the apparatus 400 further comprises a binding module 406, configured to bind the tag and the web page information; the recovery module 405 is specifically configured to: and according to the webpage information corresponding to the label, performing webpage recovery on the label.
Optionally, in the apparatus 400, in an embodiment of the present invention, the web page information further includes web page progress indication information, and the recovery module 405 is specifically configured to: acquiring a webpage corresponding to the label according to the webpage address; and restoring the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
According to the webpage browsing device provided by the embodiment of the invention, after the browser enters the privacy browsing mode, the tags of the webpage browsed in the privacy browsing mode are recorded in the hidden tag list, and when the instruction of the hidden tag is obtained, the tags recorded in the hidden tag list can be hidden. Therefore, other people cannot see the label browsed by the user, so that the privacy of the user cannot be disclosed, the safety of webpage browsing is improved, and the privacy of the user can be better protected.
An embodiment of the present application further provides a terminal device, and fig. 5 is a schematic structural diagram of the terminal device provided in the embodiment of the present application. As shown in fig. 5, the terminal device may have a relatively large difference due to different configurations or performances, and may include one or more processors 501 and a memory 502, where the memory 502 may store one or more stored applications or data. Memory 502 may be, among other things, transient or persistent storage. The application program stored in memory 502 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for the terminal device. Still further, the processor 501 may be arranged in communication with the memory 502 to execute a series of computer executable instructions in the memory 502 on the terminal device. The terminal may also include one or more power supplies 503, one or more wired or wireless network interfaces 505, one or more input-output interfaces 505, one or more keyboards 506, and the like.
In a specific embodiment, the terminal device includes a memory, a processor, and computer-executable instructions stored on the memory and executable on the processor, and when executed by the processor, the computer-executable instructions implement the following process:
controlling a browser to enter a privacy browsing mode;
recording the tags of the webpage browsed in the private browsing mode into a hidden tag list;
acquiring a command for hiding the label in the privacy browsing mode;
and hiding the labels recorded in the hidden label list according to the label hiding instruction.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: receiving an instruction of the hidden tag triggered by clicking a button; or acquiring an instruction for triggering the generated hidden tag because the time that the browser is in the inactive state exceeds a threshold value.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: and setting the states of all the labels in the hidden label list to be invisible according to the instruction of hiding the labels, so that the browser does not display the labels with the invisible states.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: after the browser is started, receiving an instruction for displaying a hidden label; and restoring the webpage according to the instruction for displaying the hidden label.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: when a label exists in the hidden label list, performing webpage recovery on the label in the hidden label list; and when no label exists in the hidden label list or the hidden label list, creating a label to recover the webpage.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: acquiring webpage information corresponding to each label in the hidden label list, wherein the webpage information comprises a webpage address; binding the label and the webpage information; when a tag exists in the hidden tag list, the web page recovery of the tag in the hidden tag list includes: and according to the webpage information corresponding to the label, performing webpage recovery on the label.
Optionally, the web page information further includes web page progress indication information, and when executed by the processor, the computer-executable instructions implement the following process: acquiring a webpage corresponding to the label according to the webpage address; and restoring the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
According to the terminal device provided by the embodiment of the invention, after the browser enters the privacy browsing mode, the tags of the webpage browsed in the privacy browsing mode are recorded in the hidden tag list, and when the instruction of the hidden tag is obtained, the tags recorded in the hidden tag list can be hidden. Therefore, other people cannot see the label browsed by the user, so that the privacy of the user cannot be disclosed, the safety of webpage browsing is improved, and the privacy of the user can be better protected.
Further, an embodiment of the present application also provides a computer-readable storage medium for storing computer-executable instructions, which when executed by a processor implement the following process:
controlling a browser to enter a privacy browsing mode;
recording the tags of the webpage browsed in the private browsing mode into a hidden tag list;
acquiring a command for hiding the label in the privacy browsing mode;
and hiding the labels recorded in the hidden label list according to the label hiding instruction.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: receiving an instruction of the hidden tag triggered by clicking a button; or acquiring an instruction for triggering the generated hidden tag because the time that the browser is in the inactive state exceeds a threshold value.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: and setting the states of all the labels in the hidden label list to be invisible according to the instruction of hiding the labels, so that the browser does not display the labels with the invisible states.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: after the browser is started, receiving an instruction for displaying a hidden label; and restoring the webpage according to the instruction for displaying the hidden label.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: when a label exists in the hidden label list, performing webpage recovery on the label in the hidden label list; and when no label exists in the hidden label list or the hidden label list, creating a label to recover the webpage.
Optionally, the computer executable instructions, when executed by the processor, implement the following process: acquiring webpage information corresponding to each label in the hidden label list, wherein the webpage information comprises a webpage address; binding the label and the webpage information; when a tag exists in the hidden tag list, the web page recovery of the tag in the hidden tag list includes: and according to the webpage information corresponding to the label, performing webpage recovery on the label.
Optionally, the web page information further includes web page progress indication information, and when executed by the processor, the computer-executable instructions implement the following process: acquiring a webpage corresponding to the label according to the webpage address; and restoring the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
According to the computer-readable storage medium provided by the embodiment of the invention, after the browser enters the privacy browsing mode, the tags of the web pages browsed in the privacy browsing mode are recorded in the hidden tag list, and when the instruction of the hidden tags is obtained, the tags recorded in the hidden tag list can be hidden. Therefore, other people cannot see the label browsed by the user, so that the privacy of the user cannot be disclosed, the safety of webpage browsing is improved, and the privacy of the user can be better protected.
The computer-readable storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (12)

1. A webpage browsing method is applied to a terminal, and is characterized in that the method comprises the following steps:
controlling a browser to enter a privacy browsing mode;
recording a tag of a webpage browsed in the private browsing mode into a hidden tag list, wherein the tag comprises webpage information, and the webpage information is used for webpage recovery of the tag after the tag is hidden;
acquiring a command for hiding the label in the privacy browsing mode;
according to the instruction of the hidden labels, setting the states of all the labels in the hidden label list to be invisible states, so that the browser does not display the labels in the invisible states, or closing the labels in the hidden label list, or placing the labels in the hidden label list in a background for running, so as to hide the labels recorded in the hidden label list.
2. The web browsing method of claim 1, wherein the instruction for obtaining the hidden tag comprises:
receiving an instruction of the hidden tag triggered by clicking a button;
or acquiring an instruction for triggering the generated hidden tag because the time that the browser is in the inactive state exceeds a threshold value.
3. The web browsing method according to claim 1, wherein after the hiding the tags recorded in the hidden tag list, the method further comprises:
after the browser is started, receiving an instruction for displaying a hidden label;
and according to the instruction for displaying the hidden label, restoring the webpage.
4. The web browsing method of claim 3, wherein the performing web page restoration according to the instruction for displaying the hidden tag comprises:
when a label exists in the hidden label list, performing webpage recovery on the label in the hidden label list;
and when no label exists in the hidden label list or the hidden label list, creating a label to recover the webpage.
5. The web browsing method of claim 4, wherein after the controlling browser enters the private browsing mode, the method further comprises:
acquiring webpage information corresponding to each label in the hidden label list, wherein the webpage information comprises a webpage address;
binding the label and the webpage information;
when a tag exists in the hidden tag list, the web page recovery of the tag in the hidden tag list includes:
and according to the webpage information corresponding to the label, performing webpage recovery on the label.
6. The web browsing method of claim 5, wherein the web page information further includes web page progress indication information,
the web page recovery of the tag according to the web page information corresponding to the tag comprises: acquiring a webpage corresponding to the label according to the webpage address; and restoring the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
7. An apparatus for web browsing, comprising:
the control module is used for controlling the browser to enter a privacy browsing mode;
the recording module is used for recording a label of a webpage browsed in the private browsing mode into a hidden label list, wherein the label comprises webpage information, and the webpage information is used for recovering the webpage after the label is hidden;
the acquisition module is used for acquiring a command of hiding the label in the privacy browsing mode;
and the hiding module is used for setting the states of all the labels in the hidden label list to be invisible according to the instruction of hiding the labels, so that the browser does not display the labels in the invisible state, or the labels in the hidden label list are closed, or the labels in the hidden label list are placed in a background to run, so as to hide the labels recorded in the hidden label list.
8. The apparatus of claim 7, wherein the obtaining module is specifically configured to:
receiving an instruction of the hidden tag triggered by clicking a button;
or acquiring an instruction for triggering the generated hidden tag because the time that the browser is in the inactive state exceeds a threshold value.
9. The apparatus of claim 7, wherein the obtaining module is further configured to: after the browser is started, receiving an instruction for displaying a hidden label;
the device also comprises a recovery module used for recovering the webpage according to the instruction for displaying the hidden label.
10. The apparatus of claim 9, wherein the recovery module is specifically configured to:
when a label exists in the hidden label list, performing webpage recovery on the label in the hidden label list;
and when no label exists in the hidden label list or the hidden label list, creating a label to recover the webpage.
11. The apparatus of claim 10, wherein the obtaining module is further configured to:
after the browser enters a privacy browsing mode, acquiring webpage information corresponding to each tag in the hidden tag list, wherein the webpage information comprises a webpage address;
the device also comprises a binding module used for binding the label and the webpage information;
the recovery module is specifically configured to:
and according to the webpage information corresponding to the label, performing webpage recovery on the label.
12. The apparatus of claim 11, wherein the web page information further includes web page progress indication information, and the recovery module is specifically configured to: acquiring a webpage corresponding to the label according to the webpage address; and restoring the webpage to the position indicated by the webpage progress indication information according to the webpage progress indication information.
CN201811179030.8A 2018-10-10 2018-10-10 Webpage browsing method and device Active CN109359482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811179030.8A CN109359482B (en) 2018-10-10 2018-10-10 Webpage browsing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811179030.8A CN109359482B (en) 2018-10-10 2018-10-10 Webpage browsing method and device

Publications (2)

Publication Number Publication Date
CN109359482A CN109359482A (en) 2019-02-19
CN109359482B true CN109359482B (en) 2020-11-13

Family

ID=65349104

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811179030.8A Active CN109359482B (en) 2018-10-10 2018-10-10 Webpage browsing method and device

Country Status (1)

Country Link
CN (1) CN109359482B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826098B (en) * 2019-10-30 2022-03-22 维沃移动通信有限公司 Information processing method and electronic equipment
CN112818271A (en) * 2021-01-27 2021-05-18 北京小米移动软件有限公司 Webpage display method, device, terminal equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473515A (en) * 2013-09-27 2013-12-25 贝壳网际(北京)安全技术有限公司 Management method, device and client terminal of private data of browser
CN106681616A (en) * 2015-11-06 2017-05-17 广州市动景计算机科技有限公司 Browser function bar display method, browser function bar display device and processing equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8392837B2 (en) * 2007-02-28 2013-03-05 Red Hat, Inc. Browser supporting multiple users
US8464350B2 (en) * 2011-03-14 2013-06-11 International Business Machines Corporation System and method for in-private browsing
US10706175B2 (en) * 2016-06-10 2020-07-07 Nirvon Shoa Method and apparatus for hiding private browsing data

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103473515A (en) * 2013-09-27 2013-12-25 贝壳网际(北京)安全技术有限公司 Management method, device and client terminal of private data of browser
CN106681616A (en) * 2015-11-06 2017-05-17 广州市动景计算机科技有限公司 Browser function bar display method, browser function bar display device and processing equipment

Also Published As

Publication number Publication date
CN109359482A (en) 2019-02-19

Similar Documents

Publication Publication Date Title
US20160366126A1 (en) Screen-analysis based device security
CN104700001B (en) Information encryption method and device for application program
KR101669104B1 (en) Method, device and mobile terminal for controlling interface display
EP3176719B1 (en) Methods and devices for acquiring certification document
CN110598441B (en) User privacy protection method and device
CN112311795B (en) Account management method and device and electronic equipment
CN109359482B (en) Webpage browsing method and device
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN111176543A (en) Method, device, computer equipment and storage medium for realizing electronic signature
CN112800401B (en) Privacy processing method, privacy processing device and terminal
CN107085694B (en) Information display processing method and device
CN112905098B (en) Content display method, device, equipment and storage medium
CN105760075A (en) Operating record creating method and device and intelligent terminal
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN116156050A (en) Display method and device
WO2016180234A1 (en) Method and apparatus for building secure environment
CN111274577A (en) Information protection method, device, system and computer readable storage medium
CN113238691B (en) Application icon management method and device and electronic equipment
CN113709300B (en) Display method and device
CN113326539B (en) Method, device and system for private data leakage detection aiming at applet
CN114518928A (en) Interface display method and device
CN113868702A (en) Object moving method and device
CN106648671A (en) Application upgrade method and terminal
CN106295274B (en) Application program control method and device
WO2019095449A1 (en) Method and apparatus for preventing personal information leakage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant