CN105653641B - A kind of browser locking means and device - Google Patents
A kind of browser locking means and device Download PDFInfo
- Publication number
- CN105653641B CN105653641B CN201511000390.3A CN201511000390A CN105653641B CN 105653641 B CN105653641 B CN 105653641B CN 201511000390 A CN201511000390 A CN 201511000390A CN 105653641 B CN105653641 B CN 105653641B
- Authority
- CN
- China
- Prior art keywords
- key
- registry key
- rule file
- registry
- browser
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a kind of browser locking means and devices.A kind of browser locking means are applied to client, comprising the following steps: when the registry key for being directed to browser recorded in monitoring system access registration table, obtain the first registry key that the system accesses;According to first registry key, determine whether first registry key matches with the Login table key in the rule file being obtained ahead of time;If it is, then according to the corresponding relationship of the Login table key and target registered table key that are matched in the rule file, carry out registry key redirection, so that the system accesses target registered table key corresponding with the Login table key being matched to, the target registered table key is the registry key of browser to be locked.Using technical solution provided by the embodiment of the present invention, the locking that client carries out browser is facilitated, does not need to modify system registry repeatedly, improves system operating rate.
Description
Technical field
The present invention relates to computer application technology, in particular to a kind of browser locking means and device.
Background technique
With the fast development of Internet technology, browser software is more and more, and user can install multiple at the terminal
Browser software.When being equipped with multiple browser softwares in terminal, user can set default browser according to actual needs.
In this way, when the user clicks some web page interlinkage when, default browser can be provided for user web page browsing etc. service.
In the prior art, need to modify system registry by the browser software that user is appointed as default browser to lock
Fixed itself is default browser.If other browser softwares also modify to system registry, default browser will occur
Variation, the browser software need repeated multiple times modification registration table itself could be locked as default browser.To registration table into
Row is modified repeatedly, complex disposal process, be will lead to system operating rate reduction, is influenced user to the normal use of terminal.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of browser locking means and device, to simplify locking browser
Treatment process improves system operating rate.Technical solution is as follows:
A kind of browser locking means are applied to client, comprising:
When the registry key for being directed to browser recorded in monitoring system access registration table, obtains the system and access
The first registry key;
According to first registry key, determine first registry key whether in the rule file that is obtained ahead of time
The matching of Login table key;
If it is, being closed according to the corresponding of the Login table key and target registered table key being matched in the rule file
System carries out registry key redirection, so that the system accesses target registered table key corresponding with the Login table key being matched to,
The target registered table key is the registry key of browser to be locked.
In a kind of specific embodiment of the invention, it is described recorded in monitoring system access registration table for clear
Look at device registry key when, obtain the first registry key of system access, comprising:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
In a kind of specific embodiment of the invention, the method also includes:
Obtain the corresponding key assignments title of first registry key and process title;
It is described according to first registry key, determine first registry key whether with the rule file that is obtained ahead of time
In Login table key matching, comprising:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title and in advance
Login table key, key assignments title and process name-matches in the rule file of acquisition;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
It include CRC check value in the rule file, described according to institute in a kind of specific embodiment of the invention
The first registry key is stated, determines whether first registry key matches with the Login table key in the rule file being obtained ahead of time
Before, the method also includes:
Judge whether the CRC check value in the rule file is consistent with preset initial check value;
If consistent, execute it is described according to first registry key, determine first registry key whether in advance
The step of Login table key in the rule file first obtained matches.
In a kind of specific embodiment of the invention, the rule file is encryption file, according to first note
Volume table key, before determining whether first registry key matches with the Login table key in the rule file being obtained ahead of time, institute
State method further include:
The rule file is decrypted.
It include version number information in the rule file, the method is also in a kind of specific embodiment of the invention
Include:
The inquiry request of the new version for the rule file is sent to server, in the inquiry request described in carrying
Version number information;
Receive and store the rule file for the new version that the server returns.
A kind of browser locking device is applied to client, comprising:
Registry key obtains module, the registration table for browser for recording in monitoring system access registration table
When key, the first registry key of the system access is obtained;
Registry key matching module, for according to first registry key, determine first registry key whether with
Login table key matching in the rule file being obtained ahead of time, if it is, triggering redirection module;
The redirection module, for according to the Login table key and target registered table key being matched in the rule file
Corresponding relationship, registry key redirection is carried out, so that the system accesses corresponding with the Login table key being matched to target
Registry key, the target registered table key are the registry key of browser to be locked.
In a kind of specific embodiment of the invention, the registry key obtains module, is specifically used for:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
In a kind of specific embodiment of the invention, described device further include:
Title obtains module, for obtaining the corresponding key assignments title of first registry key and process title;
The registry key matching module, is specifically used for:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title and in advance
Login table key, key assignments title and process name-matches in the rule file of acquisition;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
It include CRC check value in the rule file in a kind of specific embodiment of the invention, described device is also wrapped
It includes:
Check value judgment module, for, according to first registry key, determining that first registry key is described
Before the no Login table key with the rule file being obtained ahead of time matches, judge that the CRC check value in the rule file is
It is no consistent with preset initial check value, if unanimously, triggering registry key matching module.
In a kind of specific embodiment of the invention, the rule file is encryption file, described device further include:
Deciphering module, for according to first registry key, determine first registry key whether with obtain in advance
Before Login table key matching in the rule file obtained, the rule file is decrypted.
It include version number information in the rule file, described device is also in a kind of specific embodiment of the invention
Include:
Inquiry request sending module, for sending the inquiry request of the new version for the rule file to server,
The version number information is carried in the inquiry request;
Rule file receiving module, for receiving and storing the rule file for the new version that the server returns.
Using technical solution provided by the embodiment of the present invention, active note is recorded in the rule file that client is obtained ahead of time
The corresponding relationship of volume table key and target registered table key, the registration for browser recorded in monitoring system access registration table
When table key, the first registry key of system access can be obtained, if the Login in first registry key and rule file
The matching of table key can then be carried out according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file
Registry key redirects, and the first registry key is redirected to target registered table key.In this way, can make system that the target be accessed
Registry key uses browser corresponding with the target registered table key.The locking that client carries out browser is facilitated, is not needed
System registry is modified repeatedly, improves system operating rate.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of browser locking means in the embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of browser locking device in the embodiment of the present invention.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with this hair
Attached drawing in bright embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described
Embodiment is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field
Those of ordinary skill's every other embodiment obtained without making creative work, belongs to protection of the present invention
Range.
A kind of browser locking means provided by the embodiment of the present invention can be applied to client.Specifically, the client
End can be the browser software client or other software client installed in terminal, and target registered table key is to be locked clear
Look at the registry key of device.When user's using terminal has the request for opening web page interlinkage, the system of terminal will be accessed in registration table
The registry key for browser of record.The behavior that client can access registry key to system is monitored, and works as monitoring
When to system access needle to the registry key of browser, the first registry key of system access can be obtained.Determine first note
Whether volume table key matches with the Login table key in rule file, if it does, then can be according to the Login table key being matched to
With the corresponding relationship of target registered table key, registry key redirection is carried out, the first registry key is redirected to target registered table
Key makes system access target registry key, opens web page interlinkage using the corresponding browser to be locked of the target registered table key.
It is shown in Figure 1, it is a kind of implementation flow chart of browser locking means in the embodiment of the present invention, this method can be with
The following steps are included:
S110: monitor system access registration table in record for browser registry key when, obtain the system
First registry key of system access.
It is understood that each browser software will be in terminal when installing multiple browser softwares in terminal
It is registered in registration table, the key assignments of the registry key of itself is written in the registration table, wherein the key assignments of the registry key is
The principal program path of the browser software.When some browser software is arranged to default browser, which will be registered
The key assignments of the registry key for browser recorded in table is revised as the principal program path of itself.
In practical applications, when user carries out the opening of web page interlinkage, the web page interlinkage is clicked, that is, can be considered to system
The opening having issued for the web page interlinkage is requested, and after system receives opening request, is needed to access and is recorded in registration table
For the registry key of browser, to use corresponding browser software to open the web page interlinkage.
Client in the embodiment of the present invention can monitor the behavior of system access registry key, when the system that monitors accesses
Recorded in registration table for browser registry key when, can obtain system access the first registry key.
In a kind of specific embodiment of the invention, step S110 be may comprise steps of:
Step 1: the parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
Step 2: according to the parameter, whether judge current accessed is the registry key of browser, if it is, holding
Row step 3;
Step 3: the first registry key carried in the parameter is obtained.
For convenience of description, above three step is combined and is illustrated.
In embodiments of the present invention, client can register one using kernel function CmRegisterCallback in advance
Registration table call back function, the registration table call back function are used to return to relevant parameter when system accesses registry key, and client is logical
Cross available the first registry key to system access of parameter of registration table call back function return.
Specifically, client can carry out the registration of registration table call back function during installation, it can also be after terminal booting
The registration of registration table call back function is carried out when itself starting.
The format of registration table call back function can be such that
NTSTATUS RegistryCallback(
PVOID Argument1,
PVOID Argument2,
PVOID Argument3)
Client can know that system is directed to the action type of registry key by above-mentioned second parameter Argument2, such as
The action types such as opening, inquiry, modification or deletion.System includes opening behaviour to the access of registry key in the embodiment of the present invention
Work and inquiry operation.When what is carried in the second parameter Argument2 is that system is directed to the action type of registry key as opening behaviour
When making type or inquiry operation type, client can get the first note of its carrying from third parameter Augument3
Volume table key, i.e. the first registry key of system access.
After client obtains the first registry key of system access, the operation of step S120 can be continued to execute.
S120: according to first registry key, determine first registry key whether with the rule text that is obtained ahead of time
Login table key matching in part.
In embodiments of the present invention, rule file, for the rule file redirected for registry key, record is source
The corresponding relationship of registry key and target registered table key, each corresponding relationship are a redirection rule.In practical applications,
Each corresponding relationship in rule file can be configured by technical staff, and rule file is stored in server, by taking
Business device is actively handed down to client or server in the inquiry request for receiving client, and rule file is handed down to visitor
Family end.Technical staff can constantly collect the corresponding relationship of Login table key and target registered table key, and carry out to rule file
Upgrading.That is, the increase of the rule with the corresponding relationship of Login table key and target registered table key, the version of rule file
This is also constantly upgrading.
In a kind of specific embodiment of the invention, version may include in the file header for the rule file that client obtains
This number information, client can send the inquiry request of the new version for rule file to server, take in inquiry request
The version number information of rule file with itself storage.Specifically, client can be sent out according to setting time interval to server
Inquiry request is sent, inquiry request can also be sent to server when reaching preset trigger point, for example, in client network ring
It is sent when border is preferable.
After server receives inquiry request, by the rule file of the version number carried in inquiry request and itself storage
Latest edition number is compared.If the latest edition number of the rule file of itself storage is higher than the version carried in inquiry request
Number, show to have the rule file of new version can provide, the rule file of the new version can be sent to client, client
Receive and store the rule file of the new version of server return.If the latest edition of the rule file of server itself storage
This number identical as the version number carried in inquiry request, then shows that the rule file currently without new version can provide, service
Device can return to null message to client, or not do any operation.
It certainly, in practical applications, can be actively by new version when the rule file stored in server has update
Rule file is sent to client, and client receives and stores the rule file of the new version.
In this manner it is ensured that the timeliness of the rule file stored in client.
In embodiments of the present invention, the corresponding relationship of the Login table key and target registered table key that include in rule file can
With as follows, certainly, rule file shown in lower section is only a kind of example, for specific group of rule each in rule file
Knit the mode embodiment of the present invention and with no restrictions.
<root>
<!-- the first rule -- >
<reg
Src=" HKEY_USERS * _ Classes http shell open command " target=" HKEY_
LOCAL_MACHINE\SOFTWARE\MiniLiebao\DBreg\lbmini.URL\shell\open\command”>
<valuelist>
<value name=" default " value=" %lbmini% lbmini.exe "/>
</valuelist>
<processlist>
<process name="**"action="0"/>
</processlist>
</reg>
<!-- the second rule -- >
<reg
Src=" HKEY_USERS * Software Microsoft Windows Shell Associations
UrlAssociat ions\http\UserChoice”
Target=" HKEY_LOCAL_MACHINE SOFTWARE MiniLiebao DBreg UserChoice " >
<valuelist>
<value name=" Progid " value=" lbmini.URL "/>
</valuelist>
<processlist>
<process name="**"action="0"/>
</processlist>
</reg>
<!-- third rule -- >
< reg src=" HKEY_USERS * _ Classes 360seUrl shell open command " target="
HKEY_LOCAL_MACHINE\SOFTWARE\MiniLiebao\DBreg\lbmini.URL\s hell\open\command”>
<valuelist>
<value name=" default " value=" %lbmini% lbmini.exe "/>
</valuelist>
<processlist>
<process name="**"action="0"/>
</processlist>
</reg>
<!-- more rules
…
-->
</root>
Wherein:
<reg>it arrives</reg>it is that a registry key redirects rule;
Src is the Login table key that registry key redirects, and target is the target registered table key that registry key redirects,
It represents src key and is redirected to target key;
<valuelist>it arrives</valuelist>it is registry key value information set, if there is multiple, then representative has multiple
Registry key value information, name=" default " indicate that key assignments name is " default ", and value is value key data.
<processlist>it arrives</proesslist>it is process name information aggregate, if there is multiple, then representative has multiple
Process name information, name are process names, and " * * " represents arbitrary process name.Action is the movement of this process.
Data have No. * data for representing wildcard, i.e., No. * is variable data, and front and back data are identical to be thought to match.
Client obtain the first registry key after, can according to the first registry key, determine the first registry key whether with
Login table key matching in rule file.Specifically, client can use the registration table redirecting technique of bottom for first
Registry key is matched with the src key in rule file, if be matched to, then it is assumed that is had found registry key and is redirected rule
Then.
For example, the first registry key be HKEY_USERS S-1-5-21-3793426355-686612763-
191772094-1141_Classes http shell open command, will be in first registry key and rule file
Login table key is matched, and the Login table key that can be matched in the first rule may thereby determine that the first registry key
It is matched with the Login table key in rule file, can further execute the operation of step S130.
Certainly, it to guarantee matching accuracy rate, avoids registry key from redirecting and mistake occurs, in one embodiment of the present of invention
In, client can also obtain the corresponding key assignments title of the first registry key and process title.Specifically, client can pass through
The third parameter Argument3 of registration table call back function obtains the corresponding key assignments title of first registry key and process title.
Correspondingly, step S120 may comprise steps of:
First step: respectively by first registry key, the corresponding key assignments title of first registry key and into
Login table key, key assignments title and process name-matches in journey title and the rule file being obtained ahead of time, if be matched to,
Execute second step;
Second step: determine that first registry key is matched with the Login table key in the rule file.
It, can be with after client obtains the first registry key, the corresponding key assignments title of the first registry key and process name are referred to as
It respectively will be in the first registry key, the corresponding key assignments title of the first registry key and process title and rule file in every rule
Login table key, key assignments title and process title matched, if be matched to, can determine the first registry key and rule
The then Login table key matching in file.Specifically, can be first by the Login table key in the first registry key and rule file
It is matched, if be matched to, further by the corresponding key assignments title of the first registry key and the Login table key being matched to
Key assignments title matched, if be matched to, further by the corresponding process title of the first registry key be matched to
The process title of Login table key matched, if be matched to, can determine in the first registry key and rule file
Login table key matching.
For example, the first registry key be HKEY_USERS S-1-5-21-3793426355-686612763-
191772094-1141_Classes http shell open command, the entitled default of key assignments, process are entitled
bdbrowser.exe.By first registry key, the corresponding key assignments title of first registry key and process title respectively with rule
Then Login table key, key assignments title and the process title in every rule of file are matched, and can be matched to rule file
First rule, may thereby determine that the first registry key is matched with the Login table key in rule file, can further hold
The operation of row step S130.
In embodiments of the present invention, rule file can be XML (Extensible Markup Language, it is expansible
Markup language) format file, convenient for redirect rule writing and safeguarding, facilitate Rule Extended.
S130: according to the corresponding relationship of the Login table key and target registered table key that are matched in the rule file, into
Row registry key redirects, so that the system accesses target registered table key corresponding with the Login table key being matched to, it is described
Target registered table key is the registry key of browser to be locked.
In step S120, client determines that the first registry key is matched with the Login table key in rule file, then can be with
Further according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file, registry key weight is carried out
Orientation.The first registry key is redirected to the target registered table key.So that system accesses the target registered table key, this is used
The corresponding browser of target registered table key opens web page interlinkage.Realize the locking of browser.
For example, by the matching of the Login table key in the first registry key and rule file, client determines the first note
Volume table key is matched with the Login table key in the first rule of rule file, then the first rules and regulations in rule file can be used
Then carry out registry key redirection, target registered table key be HKEY_LOCAL_MACHINE SOFTWARE Miniliebao
DBreg lbmini.URL shell ope n command, the entitled default of key assignments, key assignments be %lbmini%
lbmini.exe。
Using technical solution provided by the embodiment of the present invention, active note is recorded in the rule file that client is obtained ahead of time
The corresponding relationship of volume table key and target registered table key, the registration for browser recorded in monitoring system access registration table
When table key, the first registry key of system access can be obtained, if the Login in first registry key and rule file
The matching of table key can then be carried out according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file
Registry key redirects, and the first registry key is redirected to target registered table key.In this way, can make system that the target be accessed
Registry key uses browser corresponding with the target registered table key.The locking that client carries out browser is facilitated, is not needed
System registry is modified repeatedly, improves system operating rate.
It in one embodiment of the invention, include CRC check value in the rule file, it, should before step S120
Method can with the following steps are included:
Judge whether the CRC check value in the rule file is consistent with preset initial check value;
If consistent, execute it is described according to first registry key, determine first registry key whether in advance
The step of Login table key in the rule file first obtained matches.
A kind of method for the calibration technology that data check is data is carried out by CRC check value.If rule file is disliked
Meaning modification of program, the then CRC check value for including in the rule file will change.So using rule text in step S120
Before part, can first judge whether the CRC check value in the rule file is consistent with preset initial check value, if unanimously,
The operation of step S120 is executed again, if it is inconsistent, the rule file may be modified by rogue program, client can be with
By the communication with server, rule file is obtained again.In this way, the accuracy rate of registry key redirection can be improved.
In embodiments of the present invention, determine whether to carry out registry key redirection, the work of rule file by rule file
With most important.For the safety and stability for being further ensured that rule file, rule file can be encryption file.For example,
Rule file is encrypted by xor data, and exclusive or value is 0xBE.I.e. encrypted rule file is sent to visitor by server
Family end.So, in step S120 according to first registry key, determine first registry key whether be obtained ahead of time
In rule file Login table key matching before, client can be decrypted rule file, that is, use with
Rule file is decrypted in the corresponding decryption method of encryption method, for example, decrypting rule file using exclusive or value 0xBE.
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of browser locking device, the devices
It can be applied to client.Shown in Figure 2, the apparatus may include with lower module:
Registry key obtains module 210, the note for browser for recording in monitoring system access registration table
When volume table key, the first registry key of the system access is obtained;
Registry key matching module 220, for whether determining first registry key according to first registry key
It is matched with the Login table key in the rule file being obtained ahead of time, if it is, triggering redirection module 230;
The redirection module 230, for according to the Login table key and target registered being matched in the rule file
The corresponding relationship of table key carries out registry key redirection, so that system access is corresponding with the Login table key being matched to
Target registered table key, the target registered table key are the registry key of browser to be locked.
Using device provided by the embodiment of the present invention, active registration table is recorded in the rule file that client is obtained ahead of time
The corresponding relationship of key and target registered table key, the registry key for browser recorded in monitoring system access registration table
When, the first registry key of system access can be obtained, if the Login table key in first registry key and rule file
Matching, then can be registered according to the corresponding relationship of the Login table key and target registered table key that are matched in rule file
Table key redirects, and the first registry key is redirected to target registered table key.In this way, can make system that the target registered be accessed
Table key uses browser corresponding with the target registered table key.The locking that client carries out browser is facilitated, is not needed repeatedly
System registry is modified, system operating rate is improved.
In a kind of specific embodiment of the invention, the registry key obtains module 210, is specifically used for:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
In one embodiment of the invention, described device further include:
Title obtains module, for obtaining the corresponding key assignments title of first registry key and process title;
The registry key matching module 220, is specifically used for:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title and in advance
Login table key, key assignments title and process name-matches in the rule file of acquisition;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
It in one embodiment of the invention, include CRC check value, described device in the rule file further include:
Check value judgment module, for, according to first registry key, determining that first registry key is described
Before the no Login table key with the rule file being obtained ahead of time matches, judge that the CRC check value in the rule file is
It is no consistent with preset initial check value, if unanimously, triggering registry key matching module 220.
In one embodiment of the invention, the rule file is encryption file, described device further include:
Deciphering module, for according to first registry key, determine first registry key whether with obtain in advance
Before Login table key matching in the rule file obtained, the rule file is decrypted.
It in one embodiment of the invention, include version number information, described device in the rule file further include:
Inquiry request sending module, for sending the inquiry request of the new version for the rule file to server,
The version number information is carried in the inquiry request;
Rule file receiving module, for receiving and storing the rule file for the new version that the server returns.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Each embodiment in this specification is all made of relevant mode and describes, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
Those of ordinary skill in the art will appreciate that all or part of the steps in realization above method embodiment is can
It is completed with instructing relevant hardware by program, the program can store in computer-readable storage medium,
The storage medium designated herein obtained, such as: ROM/RAM, magnetic disk, CD.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (12)
1. a kind of browser locking means are applied to client characterized by comprising
When the registry key for being directed to browser recorded in monitoring system access registration table, obtain that the system accesses the
One registry key;
According to first registry key, determine whether first registry key is infused with the source in the rule file that is obtained ahead of time
Volume table key matching;
If it is, according to the corresponding relationship of the Login table key and target registered table key that are matched in the rule file, into
Row registry key redirects, so that the system accesses target registered table key corresponding with the Login table key being matched to, it is described
Target registered table key is the registry key of browser to be locked.
2. the method according to claim 1, wherein the needle recorded in monitoring system access registration table
When to the registry key of browser, the first registry key of the system access is obtained, comprising:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
3. the method according to claim 1, wherein the method also includes:
Obtain the corresponding key assignments title of first registry key and process title;
It is described according to first registry key, determine first registry key whether in the rule file that is obtained ahead of time
The matching of Login table key, comprising:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title be obtained ahead of time
Rule file in Login table key, key assignments title and process name-matches;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
4. the method according to claim 1, wherein including CRC check value in the rule file, at described
According to first registry key, determine first registry key whether with the Login table key in the rule file that is obtained ahead of time
Before matching, the method also includes:
Judge whether the CRC check value in the rule file is consistent with preset initial check value;
If consistent, execute it is described according to first registry key, determine first registry key whether with obtain in advance
The step of Login table key in rule file obtained matches.
5. the method according to claim 1, wherein the rule file is encryption file, according to described the
One registry key, determines whether first registry key with the Login table key in the rule file being obtained ahead of time matches it
Before, the method also includes:
The rule file is decrypted.
6. the method according to claim 1, wherein including version number information, the side in the rule file
Method further include:
The inquiry request of the new version for the rule file is sent to server, carries the version in the inquiry request
Number information;
Receive and store the rule file for the new version that the server returns.
7. a kind of browser locking device is applied to client characterized by comprising
Registry key obtains module, the registry key for browser for recording in monitoring system access registration table
When, obtain the first registry key of the system access;
Registry key matching module, for according to first registry key, determine first registry key whether in advance
Login table key matching in the rule file of acquisition, if it is, triggering redirection module;
The redirection module, for pair according to the Login table key and target registered table key that are matched in the rule file
It should be related to, carry out registry key redirection, so that the system accesses target registered corresponding with the Login table key being matched to
Table key, the target registered table key are the registry key of browser to be locked.
8. device according to claim 7, which is characterized in that the registry key obtains module, is specifically used for:
The parameter that monitoring is returned using the pre-registered registration table call back function of kernel function;
According to the parameter, judge current accessed whether be browser registry key;
If it is, obtaining the first registry key carried in the parameter.
9. device according to claim 7, which is characterized in that described device further include:
Title obtains module, for obtaining the corresponding key assignments title of first registry key and process title;
The registry key matching module, is specifically used for:
Respectively by first registry key, the corresponding key assignments title of first registry key and process title be obtained ahead of time
Rule file in Login table key, key assignments title and process name-matches;
If be matched to, it is determined that first registry key is matched with the Login table key in the rule file.
10. device according to claim 7, which is characterized in that include CRC check value, the dress in the rule file
It sets further include:
Check value judgment module, for according to first registry key, determined described first registry key whether with
Before Login table key matching in the rule file being obtained ahead of time, judge CRC check value in the rule file whether with
Preset initial check value is consistent, if unanimously, triggering registry key matching module.
11. device according to claim 7, which is characterized in that the rule file is encryption file, and described device is also wrapped
It includes:
Deciphering module, for according to first registry key, determine first registry key whether be obtained ahead of time
Before Login table key matching in rule file, the rule file is decrypted.
12. device according to claim 7, which is characterized in that include version number information, the dress in the rule file
It sets further include:
Inquiry request sending module, it is described for sending the inquiry request of the new version for the rule file to server
The version number information is carried in inquiry request;
Rule file receiving module, for receiving and storing the rule file for the new version that the server returns.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511000390.3A CN105653641B (en) | 2015-12-25 | 2015-12-25 | A kind of browser locking means and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201511000390.3A CN105653641B (en) | 2015-12-25 | 2015-12-25 | A kind of browser locking means and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105653641A CN105653641A (en) | 2016-06-08 |
CN105653641B true CN105653641B (en) | 2019-04-12 |
Family
ID=56476908
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201511000390.3A Active CN105653641B (en) | 2015-12-25 | 2015-12-25 | A kind of browser locking means and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105653641B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112541176A (en) * | 2019-09-20 | 2021-03-23 | 珠海金山办公软件有限公司 | File association locking method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246734A (en) * | 2013-05-13 | 2013-08-14 | 深圳市奇兔软件技术有限公司 | Browser homepage locking method |
CN103440144A (en) * | 2013-08-07 | 2013-12-11 | 北京奇虎科技有限公司 | Setting method and device of default software for equipment |
CN103955378A (en) * | 2014-03-31 | 2014-07-30 | 北京奇虎科技有限公司 | Configuration information processing method and device aiming at IE (Internet Explorer) kernel browser |
CN104572640A (en) * | 2013-10-09 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Webpage bookmark importing method and device and browser |
CN104850571A (en) * | 2014-02-14 | 2015-08-19 | 群晖科技股份有限公司 | Method and device for managing fixed website access |
CN104881616A (en) * | 2015-06-29 | 2015-09-02 | 北京金山安全软件有限公司 | Privacy information storage method and device based on application program |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7783672B2 (en) * | 2003-04-09 | 2010-08-24 | Microsoft Corporation | Support mechanisms for improved group policy management user interface |
CN102929656B (en) * | 2012-09-28 | 2015-11-25 | 北京奇虎科技有限公司 | Use method and the client of ActiveX plug-in in browser |
-
2015
- 2015-12-25 CN CN201511000390.3A patent/CN105653641B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246734A (en) * | 2013-05-13 | 2013-08-14 | 深圳市奇兔软件技术有限公司 | Browser homepage locking method |
CN103440144A (en) * | 2013-08-07 | 2013-12-11 | 北京奇虎科技有限公司 | Setting method and device of default software for equipment |
CN104572640A (en) * | 2013-10-09 | 2015-04-29 | 腾讯科技(深圳)有限公司 | Webpage bookmark importing method and device and browser |
CN104850571A (en) * | 2014-02-14 | 2015-08-19 | 群晖科技股份有限公司 | Method and device for managing fixed website access |
CN103955378A (en) * | 2014-03-31 | 2014-07-30 | 北京奇虎科技有限公司 | Configuration information processing method and device aiming at IE (Internet Explorer) kernel browser |
CN104881616A (en) * | 2015-06-29 | 2015-09-02 | 北京金山安全软件有限公司 | Privacy information storage method and device based on application program |
Also Published As
Publication number | Publication date |
---|---|
CN105653641A (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220276910A1 (en) | Dynamically integrating a client application with third-party services | |
US8156538B2 (en) | Distribution of information protection policies to client machines | |
CN104376255B (en) | Application program running control method and device | |
US8060860B2 (en) | Security methods and systems | |
US8027976B1 (en) | Enterprise content search through searchable links | |
US8612862B2 (en) | Integrated client for access to remote resources | |
US10057293B2 (en) | Method to modify android application life cycle to control its execution in a containerized workspace environment | |
Zdziarski | iPhone forensics: recovering evidence, personal data, and corporate assets | |
JP2019506654A (en) | Page jump method and apparatus | |
US9614826B1 (en) | Sensitive data protection | |
US11899627B1 (en) | Recent file synchronization and aggregation methods and systems | |
WO2009088685A1 (en) | Secure and extensible policy-driven application platform | |
US20060136548A1 (en) | Method for managing use of storage region by application | |
US9047489B2 (en) | Security systems and methods for social networking | |
US11882154B2 (en) | Template representation of security resources | |
US10643004B2 (en) | Techniques for enabling a software application to access files at a computing device while enforcing privacy measures | |
CA2883029A1 (en) | Method and system for securely updating a website | |
CN106648733A (en) | Application pre-loading method | |
WO2019139855A1 (en) | Data driven user interfaces for device management | |
US20140298416A1 (en) | Providing access to managed content in rich client application environments | |
US9808078B2 (en) | Policy configuration management console | |
WO2019040048A1 (en) | Reducing remote procedure calls for multimedia content delivery | |
WO2013074245A1 (en) | Security systems and methods for encoding and decoding digital content | |
WO2007145222A1 (en) | Command execution program and command execution method | |
US9729551B1 (en) | Virtual mailbox |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20181212 Address after: Room 105-53811, No. 6 Baohua Road, Hengqin New District, Zhuhai City, Guangdong Province Applicant after: Zhuhai Leopard Technology Co.,Ltd. Address before: 100085 East District, Second Floor, 33 Xiaoying West Road, Haidian District, Beijing Applicant before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |