CN105653641B - A kind of browser locking means and device - Google Patents

A kind of browser locking means and device Download PDF

Info

Publication number
CN105653641B
CN105653641B CN201511000390.3A CN201511000390A CN105653641B CN 105653641 B CN105653641 B CN 105653641B CN 201511000390 A CN201511000390 A CN 201511000390A CN 105653641 B CN105653641 B CN 105653641B
Authority
CN
China
Prior art keywords
key
registry key
rule file
registry
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201511000390.3A
Other languages
Chinese (zh)
Other versions
CN105653641A (en
Inventor
李文靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Baoqu Technology Co Ltd
Original Assignee
Zhuhai Seal Interest Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Seal Interest Technology Co Ltd filed Critical Zhuhai Seal Interest Technology Co Ltd
Priority to CN201511000390.3A priority Critical patent/CN105653641B/en
Publication of CN105653641A publication Critical patent/CN105653641A/en
Application granted granted Critical
Publication of CN105653641B publication Critical patent/CN105653641B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a kind of browser locking means and devices.A kind of browser locking means are applied to client, comprising the following steps: when the registry key for being directed to browser recorded in monitoring system access registration table, obtain the first registry key that the system accesses;According to first registry key, determine whether first registry key matches with the Login table key in the rule file being obtained ahead of time;If it is, then according to the corresponding relationship of the Login table key and target registered table key that are matched in the rule file, carry out registry key redirection, so that the system accesses target registered table key corresponding with the Login table key being matched to, the target registered table key is the registry key of browser to be locked.Using technical solution provided by the embodiment of the present invention, the locking that client carries out browser is facilitated, does not need to modify system registry repeatedly, improves system operating rate.

Description

A kind of browser locking means and device
Technical field
The present invention relates to computer application technology, in particular to a kind of browser locking means and device.
Background technique
With the fast development of Internet technology, browser software is more and more, and user can install multiple at the terminal Browser software.When being equipped with multiple browser softwares in terminal, user can set default browser according to actual needs. In this way, when the user clicks some web page interlinkage when, default browser can be provided for user web page browsing etc. service.
In the prior art, need to modify system registry by the browser software that user is appointed as default browser to lock Fixed itself is default browser.If other browser softwares also modify to system registry, default browser will occur Variation, the browser software need repeated multiple times modification registration table itself could be locked as default browser.To registration table into Row is modified repeatedly, complex disposal process, be will lead to system operating rate reduction, is influenced user to the normal use of terminal.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of browser locking means and device, to simplify locking browser Treatment process improves system operating rate.Technical solution is as follows:
A kind of browser locking means are applied to client, comprising:
When the registry key for being directed to browser recorded in monitoring system access registration table, obtains the system and access The first registry key;
According to first registry key, determine first registry key whether in the rule file that is obtained ahead of time The matching of Login table key;
If it is, being closed according to the corresponding of the Login table key and target registered table key being matched in the rule file System carries out registry key redirection, so that the system accesses target registered table key corresponding with the Login table key being matched to, The target registered table key is the registry key of browser to be locked.
In a kind of specific embodiment of the invention, it is described recorded in monitoring system access registration table for clear Look at device registry key when, obtain the first registry key of system access, comprising:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
In a kind of specific embodiment of the invention, the method also includes:
Obtain the corresponding key assignments title of first registry key and process title;
It is described according to first registry key, determine first registry key whether with the rule file that is obtained ahead of time In Login table key matching, comprising:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title and in advance Login table key, key assignments title and process name-matches in the rule file of acquisition;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
It include CRC check value in the rule file, described according to institute in a kind of specific embodiment of the invention The first registry key is stated, determines whether first registry key matches with the Login table key in the rule file being obtained ahead of time Before, the method also includes:
Judge whether the CRC check value in the rule file is consistent with preset initial check value;
If consistent, execute it is described according to first registry key, determine first registry key whether in advance The step of Login table key in the rule file first obtained matches.
In a kind of specific embodiment of the invention, the rule file is encryption file, according to first note Volume table key, before determining whether first registry key matches with the Login table key in the rule file being obtained ahead of time, institute State method further include:
The rule file is decrypted.
It include version number information in the rule file, the method is also in a kind of specific embodiment of the invention Include:
The inquiry request of the new version for the rule file is sent to server, in the inquiry request described in carrying Version number information;
Receive and store the rule file for the new version that the server returns.
A kind of browser locking device is applied to client, comprising:
Registry key obtains module, the registration table for browser for recording in monitoring system access registration table When key, the first registry key of the system access is obtained;
Registry key matching module, for according to first registry key, determine first registry key whether with Login table key matching in the rule file being obtained ahead of time, if it is, triggering redirection module;
The redirection module, for according to the Login table key and target registered table key being matched in the rule file Corresponding relationship, registry key redirection is carried out, so that the system accesses corresponding with the Login table key being matched to target Registry key, the target registered table key are the registry key of browser to be locked.
In a kind of specific embodiment of the invention, the registry key obtains module, is specifically used for:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
In a kind of specific embodiment of the invention, described device further include:
Title obtains module, for obtaining the corresponding key assignments title of first registry key and process title;
The registry key matching module, is specifically used for:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title and in advance Login table key, key assignments title and process name-matches in the rule file of acquisition;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
It include CRC check value in the rule file in a kind of specific embodiment of the invention, described device is also wrapped It includes:
Check value judgment module, for, according to first registry key, determining that first registry key is described Before the no Login table key with the rule file being obtained ahead of time matches, judge that the CRC check value in the rule file is It is no consistent with preset initial check value, if unanimously, triggering registry key matching module.
In a kind of specific embodiment of the invention, the rule file is encryption file, described device further include:
Deciphering module, for according to first registry key, determine first registry key whether with obtain in advance Before Login table key matching in the rule file obtained, the rule file is decrypted.
It include version number information in the rule file, described device is also in a kind of specific embodiment of the invention Include:
Inquiry request sending module, for sending the inquiry request of the new version for the rule file to server, The version number information is carried in the inquiry request;
Rule file receiving module, for receiving and storing the rule file for the new version that the server returns.
Using technical solution provided by the embodiment of the present invention, active note is recorded in the rule file that client is obtained ahead of time The corresponding relationship of volume table key and target registered table key, the registration for browser recorded in monitoring system access registration table When table key, the first registry key of system access can be obtained, if the Login in first registry key and rule file The matching of table key can then be carried out according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file Registry key redirects, and the first registry key is redirected to target registered table key.In this way, can make system that the target be accessed Registry key uses browser corresponding with the target registered table key.The locking that client carries out browser is facilitated, is not needed System registry is modified repeatedly, improves system operating rate.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of browser locking means in the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of browser locking device in the embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with this hair Attached drawing in bright embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described Embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field Those of ordinary skill's every other embodiment obtained without making creative work, belongs to protection of the present invention Range.
A kind of browser locking means provided by the embodiment of the present invention can be applied to client.Specifically, the client End can be the browser software client or other software client installed in terminal, and target registered table key is to be locked clear Look at the registry key of device.When user's using terminal has the request for opening web page interlinkage, the system of terminal will be accessed in registration table The registry key for browser of record.The behavior that client can access registry key to system is monitored, and works as monitoring When to system access needle to the registry key of browser, the first registry key of system access can be obtained.Determine first note Whether volume table key matches with the Login table key in rule file, if it does, then can be according to the Login table key being matched to With the corresponding relationship of target registered table key, registry key redirection is carried out, the first registry key is redirected to target registered table Key makes system access target registry key, opens web page interlinkage using the corresponding browser to be locked of the target registered table key.
It is shown in Figure 1, it is a kind of implementation flow chart of browser locking means in the embodiment of the present invention, this method can be with The following steps are included:
S110: monitor system access registration table in record for browser registry key when, obtain the system First registry key of system access.
It is understood that each browser software will be in terminal when installing multiple browser softwares in terminal It is registered in registration table, the key assignments of the registry key of itself is written in the registration table, wherein the key assignments of the registry key is The principal program path of the browser software.When some browser software is arranged to default browser, which will be registered The key assignments of the registry key for browser recorded in table is revised as the principal program path of itself.
In practical applications, when user carries out the opening of web page interlinkage, the web page interlinkage is clicked, that is, can be considered to system The opening having issued for the web page interlinkage is requested, and after system receives opening request, is needed to access and is recorded in registration table For the registry key of browser, to use corresponding browser software to open the web page interlinkage.
Client in the embodiment of the present invention can monitor the behavior of system access registry key, when the system that monitors accesses Recorded in registration table for browser registry key when, can obtain system access the first registry key.
In a kind of specific embodiment of the invention, step S110 be may comprise steps of:
Step 1: the parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
Step 2: according to the parameter, whether judge current accessed is the registry key of browser, if it is, holding Row step 3;
Step 3: the first registry key carried in the parameter is obtained.
For convenience of description, above three step is combined and is illustrated.
In embodiments of the present invention, client can register one using kernel function CmRegisterCallback in advance Registration table call back function, the registration table call back function are used to return to relevant parameter when system accesses registry key, and client is logical Cross available the first registry key to system access of parameter of registration table call back function return.
Specifically, client can carry out the registration of registration table call back function during installation, it can also be after terminal booting The registration of registration table call back function is carried out when itself starting.
The format of registration table call back function can be such that
NTSTATUS RegistryCallback(
PVOID Argument1,
PVOID Argument2,
PVOID Argument3)
Client can know that system is directed to the action type of registry key by above-mentioned second parameter Argument2, such as The action types such as opening, inquiry, modification or deletion.System includes opening behaviour to the access of registry key in the embodiment of the present invention Work and inquiry operation.When what is carried in the second parameter Argument2 is that system is directed to the action type of registry key as opening behaviour When making type or inquiry operation type, client can get the first note of its carrying from third parameter Augument3 Volume table key, i.e. the first registry key of system access.
After client obtains the first registry key of system access, the operation of step S120 can be continued to execute.
S120: according to first registry key, determine first registry key whether with the rule text that is obtained ahead of time Login table key matching in part.
In embodiments of the present invention, rule file, for the rule file redirected for registry key, record is source The corresponding relationship of registry key and target registered table key, each corresponding relationship are a redirection rule.In practical applications, Each corresponding relationship in rule file can be configured by technical staff, and rule file is stored in server, by taking Business device is actively handed down to client or server in the inquiry request for receiving client, and rule file is handed down to visitor Family end.Technical staff can constantly collect the corresponding relationship of Login table key and target registered table key, and carry out to rule file Upgrading.That is, the increase of the rule with the corresponding relationship of Login table key and target registered table key, the version of rule file This is also constantly upgrading.
In a kind of specific embodiment of the invention, version may include in the file header for the rule file that client obtains This number information, client can send the inquiry request of the new version for rule file to server, take in inquiry request The version number information of rule file with itself storage.Specifically, client can be sent out according to setting time interval to server Inquiry request is sent, inquiry request can also be sent to server when reaching preset trigger point, for example, in client network ring It is sent when border is preferable.
After server receives inquiry request, by the rule file of the version number carried in inquiry request and itself storage Latest edition number is compared.If the latest edition number of the rule file of itself storage is higher than the version carried in inquiry request Number, show to have the rule file of new version can provide, the rule file of the new version can be sent to client, client Receive and store the rule file of the new version of server return.If the latest edition of the rule file of server itself storage This number identical as the version number carried in inquiry request, then shows that the rule file currently without new version can provide, service Device can return to null message to client, or not do any operation.
It certainly, in practical applications, can be actively by new version when the rule file stored in server has update Rule file is sent to client, and client receives and stores the rule file of the new version.
In this manner it is ensured that the timeliness of the rule file stored in client.
In embodiments of the present invention, the corresponding relationship of the Login table key and target registered table key that include in rule file can With as follows, certainly, rule file shown in lower section is only a kind of example, for specific group of rule each in rule file Knit the mode embodiment of the present invention and with no restrictions.
<root>
<!-- the first rule -- >
<reg
Src=" HKEY_USERS * _ Classes http shell open command " target=" HKEY_ LOCAL_MACHINE\SOFTWARE\MiniLiebao\DBreg\lbmini.URL\shell\open\command”>
<valuelist>
<value name=" default " value=" %lbmini% lbmini.exe "/>
</valuelist>
<processlist>
<process name="**"action="0"/>
</processlist>
</reg>
<!-- the second rule -- >
<reg
Src=" HKEY_USERS * Software Microsoft Windows Shell Associations UrlAssociat ions\http\UserChoice”
Target=" HKEY_LOCAL_MACHINE SOFTWARE MiniLiebao DBreg UserChoice " >
<valuelist>
<value name=" Progid " value=" lbmini.URL "/>
</valuelist>
<processlist>
<process name="**"action="0"/>
</processlist>
</reg>
<!-- third rule -- >
< reg src=" HKEY_USERS * _ Classes 360seUrl shell open command " target=" HKEY_LOCAL_MACHINE\SOFTWARE\MiniLiebao\DBreg\lbmini.URL\s hell\open\command”>
<valuelist>
<value name=" default " value=" %lbmini% lbmini.exe "/>
</valuelist>
<processlist>
<process name="**"action="0"/>
</processlist>
</reg>
<!-- more rules
-->
</root>
Wherein:
<reg>it arrives</reg>it is that a registry key redirects rule;
Src is the Login table key that registry key redirects, and target is the target registered table key that registry key redirects, It represents src key and is redirected to target key;
<valuelist>it arrives</valuelist>it is registry key value information set, if there is multiple, then representative has multiple Registry key value information, name=" default " indicate that key assignments name is " default ", and value is value key data.
<processlist>it arrives</proesslist>it is process name information aggregate, if there is multiple, then representative has multiple Process name information, name are process names, and " * * " represents arbitrary process name.Action is the movement of this process.
Data have No. * data for representing wildcard, i.e., No. * is variable data, and front and back data are identical to be thought to match.
Client obtain the first registry key after, can according to the first registry key, determine the first registry key whether with Login table key matching in rule file.Specifically, client can use the registration table redirecting technique of bottom for first Registry key is matched with the src key in rule file, if be matched to, then it is assumed that is had found registry key and is redirected rule Then.
For example, the first registry key be HKEY_USERS S-1-5-21-3793426355-686612763- 191772094-1141_Classes http shell open command, will be in first registry key and rule file Login table key is matched, and the Login table key that can be matched in the first rule may thereby determine that the first registry key It is matched with the Login table key in rule file, can further execute the operation of step S130.
Certainly, it to guarantee matching accuracy rate, avoids registry key from redirecting and mistake occurs, in one embodiment of the present of invention In, client can also obtain the corresponding key assignments title of the first registry key and process title.Specifically, client can pass through The third parameter Argument3 of registration table call back function obtains the corresponding key assignments title of first registry key and process title.
Correspondingly, step S120 may comprise steps of:
First step: respectively by first registry key, the corresponding key assignments title of first registry key and into Login table key, key assignments title and process name-matches in journey title and the rule file being obtained ahead of time, if be matched to, Execute second step;
Second step: determine that first registry key is matched with the Login table key in the rule file.
It, can be with after client obtains the first registry key, the corresponding key assignments title of the first registry key and process name are referred to as It respectively will be in the first registry key, the corresponding key assignments title of the first registry key and process title and rule file in every rule Login table key, key assignments title and process title matched, if be matched to, can determine the first registry key and rule The then Login table key matching in file.Specifically, can be first by the Login table key in the first registry key and rule file It is matched, if be matched to, further by the corresponding key assignments title of the first registry key and the Login table key being matched to Key assignments title matched, if be matched to, further by the corresponding process title of the first registry key be matched to The process title of Login table key matched, if be matched to, can determine in the first registry key and rule file Login table key matching.
For example, the first registry key be HKEY_USERS S-1-5-21-3793426355-686612763- 191772094-1141_Classes http shell open command, the entitled default of key assignments, process are entitled bdbrowser.exe.By first registry key, the corresponding key assignments title of first registry key and process title respectively with rule Then Login table key, key assignments title and the process title in every rule of file are matched, and can be matched to rule file First rule, may thereby determine that the first registry key is matched with the Login table key in rule file, can further hold The operation of row step S130.
In embodiments of the present invention, rule file can be XML (Extensible Markup Language, it is expansible Markup language) format file, convenient for redirect rule writing and safeguarding, facilitate Rule Extended.
S130: according to the corresponding relationship of the Login table key and target registered table key that are matched in the rule file, into Row registry key redirects, so that the system accesses target registered table key corresponding with the Login table key being matched to, it is described Target registered table key is the registry key of browser to be locked.
In step S120, client determines that the first registry key is matched with the Login table key in rule file, then can be with Further according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file, registry key weight is carried out Orientation.The first registry key is redirected to the target registered table key.So that system accesses the target registered table key, this is used The corresponding browser of target registered table key opens web page interlinkage.Realize the locking of browser.
For example, by the matching of the Login table key in the first registry key and rule file, client determines the first note Volume table key is matched with the Login table key in the first rule of rule file, then the first rules and regulations in rule file can be used Then carry out registry key redirection, target registered table key be HKEY_LOCAL_MACHINE SOFTWARE Miniliebao DBreg lbmini.URL shell ope n command, the entitled default of key assignments, key assignments be %lbmini% lbmini.exe。
Using technical solution provided by the embodiment of the present invention, active note is recorded in the rule file that client is obtained ahead of time The corresponding relationship of volume table key and target registered table key, the registration for browser recorded in monitoring system access registration table When table key, the first registry key of system access can be obtained, if the Login in first registry key and rule file The matching of table key can then be carried out according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file Registry key redirects, and the first registry key is redirected to target registered table key.In this way, can make system that the target be accessed Registry key uses browser corresponding with the target registered table key.The locking that client carries out browser is facilitated, is not needed System registry is modified repeatedly, improves system operating rate.
It in one embodiment of the invention, include CRC check value in the rule file, it, should before step S120 Method can with the following steps are included:
Judge whether the CRC check value in the rule file is consistent with preset initial check value;
If consistent, execute it is described according to first registry key, determine first registry key whether in advance The step of Login table key in the rule file first obtained matches.
A kind of method for the calibration technology that data check is data is carried out by CRC check value.If rule file is disliked Meaning modification of program, the then CRC check value for including in the rule file will change.So using rule text in step S120 Before part, can first judge whether the CRC check value in the rule file is consistent with preset initial check value, if unanimously, The operation of step S120 is executed again, if it is inconsistent, the rule file may be modified by rogue program, client can be with By the communication with server, rule file is obtained again.In this way, the accuracy rate of registry key redirection can be improved.
In embodiments of the present invention, determine whether to carry out registry key redirection, the work of rule file by rule file With most important.For the safety and stability for being further ensured that rule file, rule file can be encryption file.For example, Rule file is encrypted by xor data, and exclusive or value is 0xBE.I.e. encrypted rule file is sent to visitor by server Family end.So, in step S120 according to first registry key, determine first registry key whether be obtained ahead of time In rule file Login table key matching before, client can be decrypted rule file, that is, use with Rule file is decrypted in the corresponding decryption method of encryption method, for example, decrypting rule file using exclusive or value 0xBE.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of browser locking device, the devices It can be applied to client.Shown in Figure 2, the apparatus may include with lower module:
Registry key obtains module 210, the note for browser for recording in monitoring system access registration table When volume table key, the first registry key of the system access is obtained;
Registry key matching module 220, for whether determining first registry key according to first registry key It is matched with the Login table key in the rule file being obtained ahead of time, if it is, triggering redirection module 230;
The redirection module 230, for according to the Login table key and target registered being matched in the rule file The corresponding relationship of table key carries out registry key redirection, so that system access is corresponding with the Login table key being matched to Target registered table key, the target registered table key are the registry key of browser to be locked.
Using device provided by the embodiment of the present invention, active registration table is recorded in the rule file that client is obtained ahead of time The corresponding relationship of key and target registered table key, the registry key for browser recorded in monitoring system access registration table When, the first registry key of system access can be obtained, if the Login table key in first registry key and rule file Matching, then can be registered according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file Table key redirects, and the first registry key is redirected to target registered table key.In this way, can make system that the target registered be accessed Table key uses browser corresponding with the target registered table key.The locking that client carries out browser is facilitated, is not needed repeatedly System registry is modified, system operating rate is improved.
In a kind of specific embodiment of the invention, the registry key obtains module 210, is specifically used for:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
In one embodiment of the invention, described device further include:
Title obtains module, for obtaining the corresponding key assignments title of first registry key and process title;
The registry key matching module 220, is specifically used for:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title and in advance Login table key, key assignments title and process name-matches in the rule file of acquisition;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
It in one embodiment of the invention, include CRC check value, described device in the rule file further include:
Check value judgment module, for, according to first registry key, determining that first registry key is described Before the no Login table key with the rule file being obtained ahead of time matches, judge that the CRC check value in the rule file is It is no consistent with preset initial check value, if unanimously, triggering registry key matching module 220.
In one embodiment of the invention, the rule file is encryption file, described device further include:
Deciphering module, for according to first registry key, determine first registry key whether with obtain in advance Before Login table key matching in the rule file obtained, the rule file is decrypted.
It in one embodiment of the invention, include version number information, described device in the rule file further include:
Inquiry request sending module, for sending the inquiry request of the new version for the rule file to server, The version number information is carried in the inquiry request;
Rule file receiving module, for receiving and storing the rule file for the new version that the server returns.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
Those of ordinary skill in the art will appreciate that all or part of the steps in realization above method embodiment is can It is completed with instructing relevant hardware by program, the program can store in computer-readable storage medium, The storage medium designated herein obtained, such as: ROM/RAM, magnetic disk, CD.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (12)

1. a kind of browser locking means are applied to client characterized by comprising
When the registry key for being directed to browser recorded in monitoring system access registration table, obtain that the system accesses the One registry key;
According to first registry key, determine whether first registry key is infused with the source in the rule file that is obtained ahead of time Volume table key matching;
If it is, according to the corresponding relationship of the Login table key and target registered table key that are matched in the rule file, into Row registry key redirects, so that the system accesses target registered table key corresponding with the Login table key being matched to, it is described Target registered table key is the registry key of browser to be locked.
2. the method according to claim 1, wherein the needle recorded in monitoring system access registration table When to the registry key of browser, the first registry key of the system access is obtained, comprising:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
3. the method according to claim 1, wherein the method also includes:
Obtain the corresponding key assignments title of first registry key and process title;
It is described according to first registry key, determine first registry key whether in the rule file that is obtained ahead of time The matching of Login table key, comprising:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title be obtained ahead of time Rule file in Login table key, key assignments title and process name-matches;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
4. the method according to claim 1, wherein including CRC check value in the rule file, at described According to first registry key, determine first registry key whether with the Login table key in the rule file that is obtained ahead of time Before matching, the method also includes:
Judge whether the CRC check value in the rule file is consistent with preset initial check value;
If consistent, execute it is described according to first registry key, determine first registry key whether with obtain in advance The step of Login table key in rule file obtained matches.
5. the method according to claim 1, wherein the rule file is encryption file, according to described the One registry key, determines whether first registry key with the Login table key in the rule file being obtained ahead of time matches it Before, the method also includes:
The rule file is decrypted.
6. the method according to claim 1, wherein including version number information, the side in the rule file Method further include:
The inquiry request of the new version for the rule file is sent to server, carries the version in the inquiry request Number information;
Receive and store the rule file for the new version that the server returns.
7. a kind of browser locking device is applied to client characterized by comprising
Registry key obtains module, the registry key for browser for recording in monitoring system access registration table When, obtain the first registry key of the system access;
Registry key matching module, for according to first registry key, determine first registry key whether in advance Login table key matching in the rule file of acquisition, if it is, triggering redirection module;
The redirection module, for pair according to the Login table key and target registered table key that are matched in the rule file It should be related to, carry out registry key redirection, so that the system accesses target registered corresponding with the Login table key being matched to Table key, the target registered table key are the registry key of browser to be locked.
8. device according to claim 7, which is characterized in that the registry key obtains module, is specifically used for:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
9. device according to claim 7, which is characterized in that described device further include:
Title obtains module, for obtaining the corresponding key assignments title of first registry key and process title;
The registry key matching module, is specifically used for:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title be obtained ahead of time Rule file in Login table key, key assignments title and process name-matches;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
10. device according to claim 7, which is characterized in that include CRC check value, the dress in the rule file It sets further include:
Check value judgment module, for according to first registry key, determined described first registry key whether with Before Login table key matching in the rule file being obtained ahead of time, judge CRC check value in the rule file whether with Preset initial check value is consistent, if unanimously, triggering registry key matching module.
11. device according to claim 7, which is characterized in that the rule file is encryption file, and described device is also wrapped It includes:
Deciphering module, for according to first registry key, determine first registry key whether be obtained ahead of time Before Login table key matching in rule file, the rule file is decrypted.
12. device according to claim 7, which is characterized in that include version number information, the dress in the rule file It sets further include:
Inquiry request sending module, it is described for sending the inquiry request of the new version for the rule file to server The version number information is carried in inquiry request;
Rule file receiving module, for receiving and storing the rule file for the new version that the server returns.
CN201511000390.3A 2015-12-25 2015-12-25 A kind of browser locking means and device Active CN105653641B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511000390.3A CN105653641B (en) 2015-12-25 2015-12-25 A kind of browser locking means and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511000390.3A CN105653641B (en) 2015-12-25 2015-12-25 A kind of browser locking means and device

Publications (2)

Publication Number Publication Date
CN105653641A CN105653641A (en) 2016-06-08
CN105653641B true CN105653641B (en) 2019-04-12

Family

ID=56476908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511000390.3A Active CN105653641B (en) 2015-12-25 2015-12-25 A kind of browser locking means and device

Country Status (1)

Country Link
CN (1) CN105653641B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112541176A (en) * 2019-09-20 2021-03-23 珠海金山办公软件有限公司 File association locking method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246734A (en) * 2013-05-13 2013-08-14 深圳市奇兔软件技术有限公司 Browser homepage locking method
CN103440144A (en) * 2013-08-07 2013-12-11 北京奇虎科技有限公司 Setting method and device of default software for equipment
CN103955378A (en) * 2014-03-31 2014-07-30 北京奇虎科技有限公司 Configuration information processing method and device aiming at IE (Internet Explorer) kernel browser
CN104572640A (en) * 2013-10-09 2015-04-29 腾讯科技(深圳)有限公司 Webpage bookmark importing method and device and browser
CN104850571A (en) * 2014-02-14 2015-08-19 群晖科技股份有限公司 Method and device for managing fixed website access
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7783672B2 (en) * 2003-04-09 2010-08-24 Microsoft Corporation Support mechanisms for improved group policy management user interface
CN102929656B (en) * 2012-09-28 2015-11-25 北京奇虎科技有限公司 Use method and the client of ActiveX plug-in in browser

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246734A (en) * 2013-05-13 2013-08-14 深圳市奇兔软件技术有限公司 Browser homepage locking method
CN103440144A (en) * 2013-08-07 2013-12-11 北京奇虎科技有限公司 Setting method and device of default software for equipment
CN104572640A (en) * 2013-10-09 2015-04-29 腾讯科技(深圳)有限公司 Webpage bookmark importing method and device and browser
CN104850571A (en) * 2014-02-14 2015-08-19 群晖科技股份有限公司 Method and device for managing fixed website access
CN103955378A (en) * 2014-03-31 2014-07-30 北京奇虎科技有限公司 Configuration information processing method and device aiming at IE (Internet Explorer) kernel browser
CN104881616A (en) * 2015-06-29 2015-09-02 北京金山安全软件有限公司 Privacy information storage method and device based on application program

Also Published As

Publication number Publication date
CN105653641A (en) 2016-06-08

Similar Documents

Publication Publication Date Title
US20220276910A1 (en) Dynamically integrating a client application with third-party services
US8156538B2 (en) Distribution of information protection policies to client machines
CN104376255B (en) Application program running control method and device
US8060860B2 (en) Security methods and systems
US8027976B1 (en) Enterprise content search through searchable links
US8612862B2 (en) Integrated client for access to remote resources
US10057293B2 (en) Method to modify android application life cycle to control its execution in a containerized workspace environment
Zdziarski iPhone forensics: recovering evidence, personal data, and corporate assets
JP2019506654A (en) Page jump method and apparatus
US9614826B1 (en) Sensitive data protection
US11899627B1 (en) Recent file synchronization and aggregation methods and systems
WO2009088685A1 (en) Secure and extensible policy-driven application platform
US20060136548A1 (en) Method for managing use of storage region by application
US9047489B2 (en) Security systems and methods for social networking
US11882154B2 (en) Template representation of security resources
US10643004B2 (en) Techniques for enabling a software application to access files at a computing device while enforcing privacy measures
CA2883029A1 (en) Method and system for securely updating a website
CN106648733A (en) Application pre-loading method
WO2019139855A1 (en) Data driven user interfaces for device management
US20140298416A1 (en) Providing access to managed content in rich client application environments
US9808078B2 (en) Policy configuration management console
WO2019040048A1 (en) Reducing remote procedure calls for multimedia content delivery
WO2013074245A1 (en) Security systems and methods for encoding and decoding digital content
WO2007145222A1 (en) Command execution program and command execution method
US9729551B1 (en) Virtual mailbox

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20181212

Address after: Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province

Applicant after: Zhuhai Leopard Technology Co.,Ltd.

Address before: 100085 East District, Second Floor, 33 Xiaoying West Road, Haidian District, Beijing

Applicant before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant