CN109840418B - Jump control method and device for application program, storage medium and terminal - Google Patents
Jump control method and device for application program, storage medium and terminal Download PDFInfo
- Publication number
- CN109840418B CN109840418B CN201910124144.0A CN201910124144A CN109840418B CN 109840418 B CN109840418 B CN 109840418B CN 201910124144 A CN201910124144 A CN 201910124144A CN 109840418 B CN109840418 B CN 109840418B
- Authority
- CN
- China
- Prior art keywords
- application
- event
- jump
- webpage
- trigger
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the application discloses a jump control method and device of an application program, a storage medium and a terminal. The method comprises the following steps: when the browser enters a first webpage, monitoring an application jump event, judging whether the trigger is the first trigger or not when the application jump event is detected to be triggered, and if not, intercepting the application jump event triggered at this time. By adopting the technical scheme, the situation that the third-party application is maliciously jumped can be effectively reduced in the process that the user browses the webpage, and meanwhile the requirement for the normal jump function of the webpage cannot be influenced.
Description
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a jump control method and device of an application program, a storage medium and a terminal.
Background
With the rapid development of network technology and terminal technology, the number of people accessing the internet through terminals is increasing, and the number of web pages that can be accessed is also changing. In order to increase active users, some application program operators may frequently guide users to their own application programs through some means, such as using a third-party application call protocol included in a web page, so that when a user accesses a web page, the user often encounters a phenomenon of directly jumping out of a browser to call other third-party applications, which causes trouble to the user and needs to control the jump.
At present, the scheme for controlling the jump from the browser to the application program in the related art is still not perfect, and needs to be improved.
Disclosure of Invention
The embodiment of the application provides a jump control method and device of an application program, a storage medium and a terminal, and a jump control scheme from a browser to the application program can be optimized.
In a first aspect, an embodiment of the present application provides a jump control method for an application program, including:
when the browser enters a first webpage, monitoring an application jump event;
when detecting that an application jump event is triggered, judging whether the current trigger is the first trigger;
if the trigger is not the first trigger, intercepting the application jump event triggered this time.
In a second aspect, an embodiment of the present application provides an apparatus for controlling jump of an application program, including:
the application skip monitoring module is used for starting monitoring an application skip event when the browser enters a first webpage;
the trigger judging module is used for judging whether the current trigger is the first trigger or not when the application jump event is detected to be triggered;
and if the application jump event is not triggered for the first time, the jump control module intercepts the application jump event triggered this time.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a jump control method of an application program according to an embodiment of the present application.
In a fourth aspect, an embodiment of the present application provides a terminal, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements a jump control method for an application program according to an embodiment of the present application when executing the computer program.
According to the jump control scheme of the application program provided by the embodiment of the application program, when the browser enters the first webpage, the application jump event is monitored, and when the application jump event is detected to be triggered, if the trigger is judged not to be triggered for the first time, the application jump event triggered at this time is intercepted. By adopting the technical scheme, the situation of maliciously jumping to the third-party application can be effectively reduced in the process of browsing the webpage by the user, and the requirement of the normal jumping function of the webpage can not be influenced.
Drawings
Fig. 1 is a schematic flowchart of a jump control method for an application according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another jump control method for an application according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a jump control method for another application program according to an embodiment of the present application;
fig. 4 is a block diagram illustrating a structure of a jump control apparatus of an application according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another terminal provided in the embodiment of the present application.
Detailed Description
The technical scheme of the application is further explained by the specific implementation mode in combination with the attached drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the steps as a sequential process, many of the steps can be performed in parallel, concurrently or simultaneously. In addition, the order of the steps may be rearranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
Fig. 1 is a flowchart illustrating a jump control method for an application program according to an embodiment of the present application, where the method may be executed by a jump control apparatus for an application program, where the apparatus may be implemented by software and/or hardware, and may be generally integrated in a terminal. As shown in fig. 1, the method includes:
For example, the terminal in the embodiment of the present application may include a mobile phone, a tablet computer, a computer, and other terminal devices.
Generally, a user usually browses a web page by using a browser loaded in a terminal, where the browser may be a browser application built in a terminal system or a third-party browser application installed by the user. Optionally, the jump control device of the application program in the embodiment of the present application may be specifically integrated in the browser core.
At present, in order to increase active users and further increase income of economic advertising equivalent value, some third-party application program operators may frequently guide users to their own application programs through some methods, such as using a third-party application call protocol contained in a webpage, so that when a user accesses the webpage, under the condition that the user does not actively perform related operations of jumping to the application programs, the phenomenon that the user directly jumps out of a browser to call other third-party application programs occurs, or a pop-up box which maliciously calls the third-party application programs often pops up in the webpage, thereby bringing troubles to the user. The third-party application call Protocol is a custom Protocol written in an application program installation package in an application program development stage, is uncertain in general format and is used for realizing the jump from the browser to the application program, and different from a hypertext Transfer Protocol (HTTP) and a hypertext Transfer Protocol over Secure Socket Layer (HTTPs), when the browser judges that a webpage request does not correspond to the HTTP Protocol and the HTTPs Protocol, the webpage request can be considered to correspond to the third-party application call Protocol. In the process of installing the application program to the terminal, the third-party application call protocol is registered in an operating system (hereinafter referred to as a system) of the terminal, a webpage can contain related data of the third-party application call protocol, a webpage request is sent out based on the third-party application call protocol, the browser can judge whether the current third-party application call protocol is registered in the system, if the webpage is registered, the data corresponding to the webpage request can be distributed to the system in a broadcasting mode and the like, the system finishes related operations of the browser jumping to the application program corresponding to the third-party application call protocol, and a malicious application program operator can use the mode to realize diversion of a user. In the related technology, a blacklist is configured at a server side, a third party application call-up protocol corresponding to malicious jump behaviors is listed in the blacklist, when an application jump event is triggered, the current third party application call-up protocol is compared with the blacklist, and if the application jump event exists in the blacklist, interception is carried out. This blacklist needs to be maintained by a specially-assigned person, and if the application developer changes the third-party application invocation protocol, the original third-party application invocation protocol recorded in the blacklist is invalid. In addition, a large number of websites cannot be covered in the whole network, all third-party applications which are maliciously jumped by all websites cannot be shielded, and only targeted application shielding can be achieved. In addition, the third-party Application invoking protocol shielded in the blacklist is effective for the whole network, so that the error shielding occurs in some websites with business purposes, and further the function abnormality is caused, for example, when the panning web of the webpage version needs to invoke the panning Application (APP), the problem that the panning web cannot invoke the panning APP due to the third-party Application invoking protocol in the blacklist is caused. Therefore, the solutions in the related art have great limitations, frequent monitoring is required, and the difficulty and workload of later maintenance are increased.
In this embodiment of the present application, the application jump event may be an event that realizes a jump from the browser to another application program by using a third-party application call protocol. The jump can be understood as that the terminal screen finishes displaying the browser interface and opens the interfaces of other application programs. Therefore, the application jump event is monitored when the browser just enters the first webpage, so that the browser can judge whether the application jump event needs to be intercepted, and further malicious jump is prevented. The first webpage may be any webpage opened by a browser, and the embodiment of the application is not limited.
Illustratively, when a webpage wants to implement application jump, a webpage request is sent according to related data of a third-party application call-up protocol contained in the webpage, and the browser queries the registered third-party application call-up protocol according to the received webpage request. Optionally, a monitoring node may be set at a specified position in the above flow to monitor an application jump event, and the specific specified position is not limited in this embodiment of the present application.
And 102, when detecting that the application jump event is triggered, judging whether the current trigger is the first trigger.
Generally, after the browser enters the first webpage, a normal application jump event occurs only once, for example, a webpage version of the tabby web needs to jump to the tabby APP. Malicious application jump events may be triggered multiple times and may be determined by a script written by a web page developer. Taking a scene of reading novels through a webpage as an example, due to the fact that the size of a terminal screen is limited, the whole content of the webpage cannot be displayed at one time, the browsing time of a user is usually long, a plurality of advertisers generally put advertisements, and the need of respectively jumping to different third-party applications exists, so that webpage developers can write corresponding codes in webpage scripts, and multiple triggers of malicious application jumping events are achieved. In this step, when it is detected that the application jump event is triggered, it is determined whether the current trigger is a first trigger, so as to determine whether the current trigger is a malicious trigger in the following.
And 103, if the triggering is not the first triggering, intercepting the application jump event triggered this time.
As described above, after the browser enters the first web page, a normal application jump event generally occurs only once, and a malicious application jump event may be triggered multiple times. In the embodiment of the application, the trigger after the first trigger is regarded as a malicious trigger, and then the application jump event triggered maliciously is intercepted, so that the situation that the application program jumps maliciously is prevented. The embodiment of the application does not limit the specific process of interception, and can be designed according to actual requirements, for example, a browser cannot distribute data corresponding to a webpage request to a system, so that shielding is realized.
According to the jump control scheme of the application program provided by the embodiment of the application program, when the browser enters the first webpage, the application jump event is monitored, and when the application jump event is detected to be triggered, if the trigger is judged not to be triggered for the first time, the application jump event triggered at this time is intercepted. By adopting the technical scheme, the situation of maliciously jumping to the third-party application can be effectively reduced in the process of browsing the webpage by the user, and the requirement of the normal jumping function of the webpage can not be influenced.
In some embodiments, before the browser enters the first webpage, the method further includes: and acquiring loading mode information of a browser for loading the first webpage. When the application jump event is detected to be triggered, judging whether the current trigger is the first trigger or not, wherein the judging step comprises the following steps: when the application jump event is detected to be triggered, if the loading mode information is matched with a preset loading mode, judging whether the current trigger is the first trigger, wherein the preset loading mode corresponds to the active operation of a user. The advantage that sets up like this is that, from the source, also be the source of first webpage, begin to manage and control, need load first webpage under user's initiative operation, just think that the judgement that needs follow is carried out to the malicious jump event of differentiation more comprehensively. In the browser, malicious jump situations may also exist in jumping between web pages, if the first web page is not opened at the subjective intention of the user, an exception is likely to exist, and an application jump event triggered in the first web page is also likely to be malicious. Optionally, when it is detected that the application jump event is triggered, if the loading manner information is not matched with a preset loading manner, intercepting the application jump event triggered this time. For example, when a user reads a novel by using a browser, an advertisement frame is displayed at the bottom of a current webpage in the browser, and if the user actively clicks the advertisement frame to enter a first webpage, it indicates that the user wants to know content or an application program corresponding to the advertisement frame, and subsequent judgment can be performed; if the user does not click the advertisement frame, the browser automatically starts to load the first webpage corresponding to the advertisement frame, which indicates that the user does not subjectively wish, and an application jump event triggered in the first webpage needs to be intercepted.
Illustratively, the preset loading modes include the following three modes: responding to a first trigger operation of a user on a first link in a first application program, jumping to a browser, and loading a webpage corresponding to the first link in the browser; responding to the website input operation of a user in the browser address bar, and jumping to a webpage corresponding to the input website; responding to a second trigger operation of the user on the second link in the opened webpage of the browser, and jumping to the webpage corresponding to the second link. The advantage of setting up like this is, cover the multiple mode of user's initiative operation, avoid taking place the false negative.
In some embodiments, after obtaining the loading manner information of the browser for loading the first webpage, the method further includes: and defining a first event, and if the loading mode information is matched with a preset loading mode, initializing the current state of the first event to be effective. The judging whether the triggering is the first triggering or not comprises the following steps: judging whether the current state of the first event is effective or not, if so, determining that the current trigger is the first trigger, and changing the current state of the first event into the invalid state; and if the trigger is invalid, determining that the trigger is not the first trigger. The method has the advantages that the triggering condition of the application jump event can be accurately recorded according to the state of the first event, and whether the triggered application jump event needs to be intercepted or not can be quickly judged. The first event is a self-defined event, and the name of the first event is not limited in the embodiment of the present application, and for example, the first event may be a gesture event, which indicates that the loading (or jumping) of the first web page or the implementation of the page function is triggered and valid by the user, and the event is used to monitor the validity of the third-party application invocation protocol.
In some embodiments, after the browser enters the first webpage, the method further includes: and when a preset operation input in the first webpage is received, changing the current state of the first event into invalid. The preset operation may include a page operation, such as page sliding or page scrolling, which can be performed by the user on the first webpage. The method has the advantages that after the first webpage is actively operated by the user, the purpose that the user opens the first webpage is not to jump to other application programs, at the moment, the first event is consumed in time, and the malicious jump situation is avoided.
In some embodiments, after the determining whether the current trigger is the first trigger, the method further includes: if the application jump event is triggered for the first time, a first inquiry operation is carried out, and the first inquiry operation is used for inquiring whether the user confirms that the jump is carried out to a third-party application program corresponding to the application jump event triggered this time; and receiving confirmation information of the user for the first inquiry operation, and determining whether to execute the jump operation of the third-party application program according to the confirmation information. The method has the advantages that the subjective intention of the user can be further confirmed, the user determines whether to jump to the third-party application program, application jump which is not intended by the user and is caused by misoperation of the user is avoided, and meanwhile, the situation that an application jump event triggered for the first time is malicious jump can be avoided. For example, the first query operation may be to pop up an application jump bullet box to remind a user whether to approve opening of the third-party application, if the user approves, execute a jump operation of the third-party application program, and if the user does not approve, intercept the application jump event triggered this time.
Fig. 2 is a schematic flowchart of another jump control method for an application program according to an embodiment of the present application, where the method includes the following steps:
Wherein, the preset loading mode may include: responding to a first trigger operation of a user on a first link in a first application program, jumping to a browser, and loading a webpage corresponding to the first link in the browser. For example, the short message includes a first link, and after the user clicks the first link, the user jumps to the browser to indicate that the user actively opens the webpage corresponding to the first link. The preset loading mode may further include: responding to the website input operation of the user in the browser address bar, and jumping to the webpage corresponding to the input website. For example, when a user wants to access a certain web page, the user may copy the web address from other places, such as a document, copy the web address sent by a friend, paste the web address into the address bar of the browser, or manually input the web address character by character, which all indicate that the user actively wants to open the corresponding web page. The preset loading mode may further include: responding to a second trigger operation of the user on the second link in the opened webpage of the browser, and jumping to the webpage corresponding to the second link. When a user actively clicks the identifier corresponding to the second link, the user jumps to the corresponding webpage, and the user also indicates that the user wants to access the webpage corresponding to the second link at the subjective intention.
And step 205, when the browser enters the first webpage, monitoring the application jump event.
And step 207, executing the jump operation of the third-party application program, changing the current state of the first event into invalid, and returning to execute the step 206.
Illustratively, after the step 207 is executed for the first time, the current state of the first event is changed to be invalid, and then the step 206 is executed, and the current state of the first event is invalid, then the step 208 is executed, so as to intercept the subsequently triggered application jump event, thereby achieving the purpose of avoiding the occurrence of the situation of maliciously jumping to the third-party application.
And 208, intercepting the application jump event triggered at this time, and returning to execute the step 206.
The jump control method for the application program, provided by the embodiment of the application program, defines the first event, and performs different initializations on the state of the first event according to whether the loading mode information of the webpage conforms to the loading mode under the active operation of the user, can accurately record the triggering condition of the application jump event according to the state of the first event, and can quickly judge whether the application jump event triggered this time needs to be intercepted according to the current state of the first event after entering the first webpage, thereby effectively avoiding the occurrence of a situation of maliciously jumping to third-party applications, and ensuring the internet surfing environment of the user.
Fig. 3 is a schematic flowchart of a jump control method for another application program according to an embodiment of the present application, where the method includes:
For example, a browser monitoring unit may be set in a browser kernel, the browser monitoring unit is initialized after the browser is started, and when a user starts to access a web page, the browser monitoring unit starts to pre-judge and estimate a user behavior, for example, determine whether various operations in the browser meet subjective will of the user according to the user behavior. When the browser kernel starts to load the webpage, the browser monitoring unit can estimate the mode in which the webpage is loaded when the webpage is loaded, that is, when the browser is detected to start to load the first webpage, the loading mode information of the first webpage is acquired.
For example, a gesture unit may be set in the browser kernel, after the loading mode information of the first web page is acquired, the gesture unit is initialized according to the loading mode information, and then a first event, which may be referred to as a user gesture event, is defined by the browser kernel using the gesture unit, indicating that loading (or jumping) of the first web page or page function implementation is triggered and valid by a user, the event is used to monitor validity of a third-party application call-up protocol, and set an initial state of the first event, such as step 303 and step 304.
Wherein, the preset loading mode comprises the following steps: responding to a first trigger operation of a user on a first link in a first application program, jumping to a browser, and loading a webpage corresponding to the first link in the browser; responding to the website input operation of the user in the browser address bar, and jumping to a webpage corresponding to the input website; and responding to a second trigger operation of the user on the second link in the opened webpage of the browser, and jumping to the webpage corresponding to the second link.
And 305, when the browser enters the first webpage, monitoring the application jump event.
Illustratively, when a browser kernel receives a webpage request sent by a first webpage, whether the webpage request corresponds to an HTTP (hyper text transport protocol) and an HTTPS (hypertext transfer protocol transport protocol) is judged, if not, the webpage request is considered to correspond to a third-party application start protocol, that is, an application jump event is detected to be triggered, and whether the application jump event is prevented is judged by the browser kernel. At this time, the browser kernel determines whether the application jump event is triggered for the first time by judging whether the current state of the first event is valid. If it is valid, go to step 307.
Optionally, a protocol shielding unit may be further disposed in the browser, and a black list or a white list is disposed in the protocol shielding unit, before step 307 is executed, the method may further include determining, by the browser, whether the current third-party application call protocol is in the black list or the white list, and determining whether to perform a subsequent operation according to a determination result. For example, if the current location is in the blacklist, the application jump event is directly intercepted, that is, step 309 is executed, and if the current location is not in the blacklist, step 307 is executed. The method has the advantages that the application jump event can be strictly controlled by combining the black and white list, and the malicious jump condition is further prevented.
Optionally, before performing step 307, the method may further include determining, by the browser, whether the current third-party application invocation protocol is registered in the system, if so, performing step 307, and if not, performing step 309.
Optionally, after entering the first web page, before detecting that the application jump event is triggered for the first time, if a preset operation input on the first web page is received, the current state of the first event is changed to be invalid. The preset operation may include a page operation, such as page sliding or page scrolling, which can be performed by the user on the first webpage. After the first webpage is loaded, the user operates the webpage, for example, the webpage slides or rolls, and then it is indicated that the user has definite webpage operation, at this time, the user-defined first event can be consumed through gestures, that is, the state of the first event is changed to be invalid, when the third party application call protocol calls the third party application, the first event is directly shielded by the browser, a pop-up frame and an application call do not occur, and the problem that the third party application is maliciously called in the process of browsing the webpage by the user is thoroughly solved by the method.
Illustratively, if the first event is currently valid, the browser considers that the first web page is loaded due to the user's active actions (e.g., clicking on a link, etc.), indicating the user's subjective intention, the system application layer may be notified to perform a first query operation, such as popping up an application to call up a pop-up box, alerting the user whether to open a third-party application, deciding by the user whether to open, and the first event is consumed by the gesture resetting unit in the browser kernel, namely the current state of the first event is changed into invalid, thus, the first event is consumed, the third party protocol is called up to operate for one time, that is, the application jump event has been triggered once, and the third party protocol call which occurs again thereafter is illegal and invalid, that is, the application jump event which is triggered again thereafter is malicious and should be intercepted.
And 308, determining whether to execute the jump operation of the third-party application program according to the confirmation information, and returning to execute the step 306.
Illustratively, the confirmation information includes whether the user agrees to open the third party application. If the user agrees, executing the jump operation of the third-party application program, namely starting the third-party application and controlling the browser to enter a background running state; and if the user does not agree, intercepting the application jump event triggered this time, namely not executing the jump operation of the third-party application program.
Illustratively, after the step 307 is executed for the first time, the current state of the first event is changed to be invalid, and then the step 306 is executed again, and the current state of the first event is invalid, then the step 309 is executed, so as to intercept the subsequently triggered application jump event, thereby achieving the purpose of avoiding the occurrence of the situation of maliciously jumping to the third-party application.
Optionally, when it is detected that the user clicks the third link in the first web page or re-inputs the link in the address bar of the browser, or refreshes the current web page, the current state of the first event is reset to be invalid, that is, the first event is consumed by the gesture resetting unit, and the step 301 is returned to. It can also be understood that when entering other web pages or a web page refreshing condition occurs, the first event is redefined, and the redefined first event is initialized according to the page loading mode.
According to the jump control method of the application program, when a browser starts to load a webpage, a first event is defined, different initializations are carried out on the state of the first event according to whether the loading mode information of the webpage accords with the loading mode under the active operation of a user, the triggering condition of the application jump event can be accurately recorded according to the state of the first event, after the browser enters the first webpage, whether the application jump event triggered at this time needs to be intercepted can be quickly and accurately judged by combining the current state of the first event and the confirmation information of the inquiry operation of the user, the condition that the third-party application is maliciously jumped is comprehensively and effectively avoided, and the internet surfing environment of the user is guaranteed. The method can monitor and shield the third-party application call protocol on any webpage, reduces user disturbance, does not influence the application jump function requirement of the normal third-party call protocol of the webpage, greatly improves the usability of the browser, ensures the normal browsing of the webpage of the user and avoids damaging the benefit of the user.
Fig. 4 is a block diagram of an application jump control apparatus according to an embodiment of the present disclosure, where the apparatus may be implemented by software and/or hardware, and is generally integrated in a terminal, and may control an application jump occurring in a browser webpage by executing an application jump control method. As shown in fig. 4, the apparatus includes:
an application jump monitoring module 401, configured to start monitoring an application jump event when the browser enters the first webpage;
a trigger judging module 402, configured to, when it is detected that an application jump event is triggered, judge whether the current trigger is a first trigger;
and if the application is not triggered for the first time, the jump control module 403 intercepts the application jump event triggered this time.
The jump control device for the application program provided in the embodiment of the application starts to monitor the application jump event when the browser enters the first webpage, and intercepts the application jump event triggered this time if the situation that the application jump event is triggered is judged not to be triggered for the first time when the situation that the application jump event triggered this time is detected. By adopting the technical scheme, the situation of maliciously jumping to the third-party application can be effectively reduced in the process of browsing the webpage by the user, and the requirement of the normal jumping function of the webpage can not be influenced.
Optionally, the apparatus further comprises:
the loading mode acquisition module is used for acquiring loading mode information of the first webpage loaded by the browser before the browser enters the first webpage;
when the application jump event is detected to be triggered, judging whether the current trigger is the first trigger or not, wherein the judging step comprises the following steps:
when the application jump event is detected to be triggered, if the loading mode information is matched with a preset loading mode, judging whether the current trigger is the first trigger, wherein the preset loading mode corresponds to the active operation of a user.
Optionally, the preset loading manner includes:
responding to a first trigger operation of a user on a first link in a first application program, jumping to a browser, and loading a webpage corresponding to the first link in the browser; and the number of the first and second groups,
responding to the website input operation of a user in the browser address bar, and jumping to a webpage corresponding to the input website; and the number of the first and second groups,
responding to a second trigger operation of the user on the second link in the opened webpage of the browser, and jumping to the webpage corresponding to the second link.
Optionally, the skip control module is further configured to:
and when the application jump event is detected to be triggered, if the loading mode information is not matched with a preset loading mode, intercepting the triggered application jump event.
Optionally, the apparatus further comprises:
the event definition module is used for defining a first event after acquiring loading mode information of a first webpage loaded by a browser, and initializing the current state of the first event to be effective if the loading mode information is matched with a preset loading mode;
the judging whether the triggering is the first triggering or not comprises the following steps:
judging whether the current state of the first event is effective or not, if so, determining that the current trigger is the first trigger, and changing the current state of the first event into the invalid state; and if the trigger is invalid, determining that the trigger is not the first trigger.
Optionally, the apparatus further comprises:
and the state modification module is used for modifying the current state of the first event into invalid when the browser receives the preset operation input in the first webpage after entering the first webpage.
Optionally, the apparatus further comprises:
the query module is used for performing a first query operation if the current trigger is the first trigger after judging whether the current trigger is the first trigger, and the first query operation is used for querying whether the user confirms to jump to a third-party application program corresponding to the application jump event of the current trigger;
the jump control module is further configured to: and receiving confirmation information of the user for the first inquiry operation, and determining whether to execute the jump operation of the third-party application program according to the confirmation information.
Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a jump control method for an application program, the method including:
when the browser enters a first webpage, monitoring an application jump event;
when detecting that an application jump event is triggered, judging whether the current trigger is the first trigger;
if the trigger is not the first trigger, intercepting the application jump event triggered this time.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDRRAM, SRAM, EDORAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media that may reside in different locations, such as in different computer systems that are connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application includes computer-executable instructions, where the computer-executable instructions are not limited to the jump control operation of the application program described above, and may also perform related operations in the jump control method of the application program provided in any embodiment of the present application.
The embodiment of the application provides a terminal, and the terminal can be integrated with a jump control device of an application program provided by the embodiment of the application. Fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present application. The terminal 500 may include: the jump control method of the application program comprises a memory 501, a processor 502 and a computer program which is stored on the memory 501 and can be run by the processor, wherein the processor 502 executes the computer program to realize the jump control method of the application program according to the embodiment of the application program.
The terminal provided by the embodiment of the application can effectively reduce the occurrence of malicious third-party application jump in the process of browsing the webpage by the user, and meanwhile, the requirement of the normal jump function of the webpage cannot be influenced.
Fig. 6 is a schematic structural diagram of another terminal provided in the embodiment of the present application, where the terminal may include: a housing (not shown), a memory 601, a Central Processing Unit (CPU) 602 (also called a processor, hereinafter referred to as CPU), a circuit board (not shown), and a power circuit (not shown). The circuit board is arranged in a space enclosed by the shell; the CPU602 and the memory 601 are disposed on the circuit board; the power supply circuit is used for supplying power to each circuit or device of the terminal; the memory 601 is used for storing executable program codes; the CPU602 executes a computer program corresponding to the executable program code by reading the executable program code stored in the memory 601 to implement the steps of:
when the browser enters a first webpage, monitoring an application jump event;
when detecting that an application jump event is triggered, judging whether the current trigger is the first trigger;
if the trigger is not the first trigger, intercepting the application jump event triggered this time.
The terminal further comprises: peripheral interface 603, RF (Radio Frequency) circuitry 605, audio circuitry 606, speakers 611, power management chip 608, input/output (I/O) subsystem 609, other input/control devices 610, touch screen 612, other input/control devices 610, and external port 604, which communicate via one or more communication buses or signal lines 607.
It should be understood that the illustrated terminal 600 is merely one example of a terminal and that the terminal 600 may have more or fewer components than shown in the figures, may combine two or more components, or may have a different configuration of components. The various components shown in the figures may be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
The following describes in detail the terminal for controlling application jump provided in this embodiment, and the terminal is a mobile phone as an example.
A memory 601, the memory 601 being accessible by the CPU602, the peripheral interface 603, and the like, the memory 601 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other volatile solid state storage devices.
A peripheral interface 603, said peripheral interface 603 may connect input and output peripherals of the device to the CPU602 and the memory 601.
An I/O subsystem 609, the I/O subsystem 609 may connect input and output peripherals on the device, such as a touch screen 612 and other input/control devices 610, to the peripheral interface 603. The I/O subsystem 609 may include a display controller 6091 and one or more input controllers 6092 for controlling other input/control devices 610. Where one or more input controllers 6092 receive electrical signals from or transmit electrical signals to other input/control devices 610, the other input/control devices 610 may include physical buttons (push buttons, rocker buttons, etc.), dials, slide switches, joysticks, click wheels. It is noted that the input controller 6092 may be connected to any one of: a keyboard, an infrared port, a USB interface, and a pointing device such as a mouse.
A touch screen 612, which touch screen 612 is an input interface and an output interface between the user terminal and the user, displays visual output to the user, which may include graphics, text, icons, video, and the like.
The display controller 6091 in the I/O subsystem 609 receives electrical signals from the touch screen 612 or transmits electrical signals to the touch screen 612. The touch screen 612 detects a contact on the touch screen, and the display controller 6091 converts the detected contact into an interaction with a user interface object displayed on the touch screen 612, that is, to implement a human-computer interaction, where the user interface object displayed on the touch screen 612 may be an icon for running a game, an icon networked to a corresponding network, or the like. It is worth mentioning that the device may also comprise a light mouse, which is a touch sensitive surface that does not show visual output, or an extension of the touch sensitive surface formed by the touch screen.
The RF circuit 605 is mainly used to establish communication between the mobile phone and the wireless network (i.e., network side), and implement data reception and transmission between the mobile phone and the wireless network. Such as sending and receiving short messages, e-mails, etc. In particular, RF circuitry 605 receives and transmits RF signals, also referred to as electromagnetic signals, through which RF circuitry 605 converts electrical signals to or from electromagnetic signals and communicates with a communication network and other devices. RF circuitry 605 may include known circuitry for performing these functions including, but not limited to, an antenna system, an RF transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal processor, a CODEC (CODEC) chipset, a Subscriber Identity Module (SIM), and so forth.
The audio circuit 606 is mainly used to receive audio data from the peripheral interface 603, convert the audio data into an electric signal, and transmit the electric signal to the speaker 611.
The speaker 611 is used to convert the voice signal received by the handset from the wireless network through the RF circuit 605 into sound and play the sound to the user.
And a power management chip 608 for supplying power and managing power to the hardware connected to the CPU602, the I/O subsystem, and the peripheral interface.
The jump control device, the storage medium and the terminal of the application program provided in the above embodiments can execute the jump control method of the application program provided in any embodiment of the present application, and have corresponding functional modules and beneficial effects for executing the method. For technical details that are not described in detail in the above embodiments, reference may be made to a jump control method for an application program provided in any embodiment of the present application.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.
Claims (8)
1. A jump control method of an application program is characterized by comprising the following steps:
when the browser enters a first webpage, monitoring an application jump event;
when detecting that the application jump event is triggered, judging whether the current trigger is the first trigger comprises the following steps: judging whether the current state of a first event is effective or not, if so, determining that the current trigger is the first trigger, changing the current state of the first event into invalid, and if not, determining that the current trigger is not the first trigger, wherein the state of the first event is effective under the condition that loading mode information of a browser for loading a first webpage is matched with a preset loading mode, and the preset loading mode corresponds to the active operation of a user;
if the trigger is not the first trigger, intercepting the application jump event triggered this time.
2. The method of claim 1, wherein the predetermined loading manner comprises:
responding to a first trigger operation of a user on a first link in a first application program, jumping to a browser, and loading a webpage corresponding to the first link in the browser; and the number of the first and second groups,
responding to the website input operation of a user in the browser address bar, and jumping to a webpage corresponding to the input website; and the number of the first and second groups,
responding to a second trigger operation of the user on the second link in the opened webpage of the browser, and jumping to the webpage corresponding to the second link.
3. The method of claim 1, further comprising:
and when the application jump event is detected to be triggered, if the loading mode information is not matched with a preset loading mode, intercepting the triggered application jump event.
4. The method of claim 1, after the browser enters the first webpage, further comprising:
and when a preset operation input in the first webpage is received, changing the current state of the first event into invalid.
5. The method according to any one of claims 1-4, wherein after said determining whether the current trigger is a first trigger, further comprising:
if the application jump event is triggered for the first time, a first inquiry operation is carried out, and the first inquiry operation is used for inquiring whether the user confirms that the jump is carried out to a third-party application program corresponding to the application jump event triggered this time;
and receiving confirmation information of the user for the first inquiry operation, and determining whether to execute the jump operation of the third-party application program according to the confirmation information.
6. An apparatus for controlling jump of an application program, comprising:
the application skip monitoring module is used for starting monitoring an application skip event when the browser enters a first webpage;
the trigger judging module is used for judging whether the triggering is the first triggering or not when the application jump event is detected to be triggered, and comprises the following steps: judging whether the current state of a first event is effective, if so, determining that the current trigger is the first trigger, changing the current state of the first event into invalid, and if not, determining that the current trigger is not the first trigger, wherein the state of the first event is effective under the condition that loading mode information of a browser for loading a first webpage is matched with a preset loading mode, wherein the preset loading mode corresponds to the active operation of a user;
and if the application jump event is not triggered for the first time, the jump control module intercepts the application jump event triggered this time.
7. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements a jump control method of an application program according to any one of claims 1 to 5.
8. A terminal, characterized in that it comprises a memory, a processor and a computer program stored on the memory and executable on the processor, said processor implementing, when executing said computer program, a jump control method for an application according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910124144.0A CN109840418B (en) | 2019-02-19 | 2019-02-19 | Jump control method and device for application program, storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910124144.0A CN109840418B (en) | 2019-02-19 | 2019-02-19 | Jump control method and device for application program, storage medium and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109840418A CN109840418A (en) | 2019-06-04 |
CN109840418B true CN109840418B (en) | 2021-01-01 |
Family
ID=66884768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910124144.0A Active CN109840418B (en) | 2019-02-19 | 2019-02-19 | Jump control method and device for application program, storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109840418B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110557502B (en) * | 2019-08-09 | 2021-03-23 | 五八有限公司 | Method and device for calling up applet, electronic device and readable storage medium |
CN110941484B (en) * | 2019-11-22 | 2022-12-09 | 马蜂窝(贵州)旅游集团有限公司 | Application program calling method and device |
CN111327594A (en) * | 2020-01-20 | 2020-06-23 | Oppo广东移动通信有限公司 | Webpage processing method and device, electronic equipment and storage medium |
CN111625736B (en) * | 2020-05-25 | 2023-04-07 | 厦门美图之家科技有限公司 | Link skip control method and related device |
CN111783018B (en) * | 2020-07-28 | 2024-07-05 | 支付宝(杭州)信息技术有限公司 | Page processing method, device and equipment |
CN115048019B (en) * | 2021-02-26 | 2024-08-27 | 深圳市万普拉斯科技有限公司 | Terminal operation method, device, computer equipment and storage medium |
CN115022454B (en) * | 2022-06-24 | 2024-02-02 | 中国平安财产保险股份有限公司 | An Zhuo Duan return operation method and device, electronic equipment and storage medium |
CN116739670B (en) * | 2023-08-16 | 2023-10-24 | 北京三人行时代数字科技有限公司 | Advertisement pushing marketing system and method based on big data |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102726026A (en) * | 2011-12-30 | 2012-10-10 | 华为技术有限公司 | Method, equipment and system for acquiring user behavior |
CN103942207A (en) * | 2013-01-18 | 2014-07-23 | 联想(北京)有限公司 | Information processing method, device and electronic device |
CN104408204A (en) * | 2014-12-18 | 2015-03-11 | 北京国双科技有限公司 | Method and device for obtaining webpage page link address |
CN104519560A (en) * | 2014-12-10 | 2015-04-15 | 广东欧珀移动通信有限公司 | Mobile terminal request intercepting method and mobile terminal |
CN105160027A (en) * | 2015-09-30 | 2015-12-16 | 百度在线网络技术(北京)有限公司 | Advertisement data processing method and device |
CN106528657A (en) * | 2016-10-19 | 2017-03-22 | 广东欧珀移动通信有限公司 | Control method and device for browser skipping to application program |
CN106528659A (en) * | 2016-10-19 | 2017-03-22 | 广东欧珀移动通信有限公司 | A control method and device for jumping from a browser to an application program |
CN106570393A (en) * | 2016-10-09 | 2017-04-19 | 深圳市金立通信设备有限公司 | Process control method for application and terminal |
CN107370740A (en) * | 2017-07-28 | 2017-11-21 | 北京五八信息技术有限公司 | Redirect hold-up interception method and device |
CN107809420A (en) * | 2017-09-30 | 2018-03-16 | 谢彩红 | A kind of advertisement intelligent hold-up interception method |
CN107844324A (en) * | 2017-10-23 | 2018-03-27 | 北京京东尚科信息技术有限公司 | Customer terminal webpage redirects treating method and apparatus |
CN108121568A (en) * | 2017-11-30 | 2018-06-05 | 五八有限公司 | Arouse method and device, electronic equipment and the readable storage medium storing program for executing of APP |
CN108572866A (en) * | 2018-04-23 | 2018-09-25 | Oppo广东移动通信有限公司 | A kind of application management method, application program management device and mobile terminal |
CN108733424A (en) * | 2018-06-30 | 2018-11-02 | 努比亚技术有限公司 | Using wake-up control method, equipment and computer-readable storage media |
CN108829316A (en) * | 2018-06-01 | 2018-11-16 | 联想(北京)有限公司 | Data capture method, device, electronic equipment and readable storage medium storing program for executing |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8762360B2 (en) * | 2011-05-06 | 2014-06-24 | Microsoft Corporation | Integrating applications within search results |
US9348634B2 (en) * | 2013-08-12 | 2016-05-24 | Amazon Technologies, Inc. | Fast-booting application image using variation points in application source code |
CN106021079B (en) * | 2016-05-06 | 2018-10-09 | 华南理工大学 | It is a kind of based on the Web application performance test methods for being frequently visited by the user series model |
CN106021419A (en) * | 2016-05-12 | 2016-10-12 | 腾讯科技(深圳)有限公司 | Web page operation method and device, and terminal |
-
2019
- 2019-02-19 CN CN201910124144.0A patent/CN109840418B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102726026A (en) * | 2011-12-30 | 2012-10-10 | 华为技术有限公司 | Method, equipment and system for acquiring user behavior |
CN103942207A (en) * | 2013-01-18 | 2014-07-23 | 联想(北京)有限公司 | Information processing method, device and electronic device |
CN104519560A (en) * | 2014-12-10 | 2015-04-15 | 广东欧珀移动通信有限公司 | Mobile terminal request intercepting method and mobile terminal |
CN104408204A (en) * | 2014-12-18 | 2015-03-11 | 北京国双科技有限公司 | Method and device for obtaining webpage page link address |
CN105160027A (en) * | 2015-09-30 | 2015-12-16 | 百度在线网络技术(北京)有限公司 | Advertisement data processing method and device |
CN106570393A (en) * | 2016-10-09 | 2017-04-19 | 深圳市金立通信设备有限公司 | Process control method for application and terminal |
CN106528659A (en) * | 2016-10-19 | 2017-03-22 | 广东欧珀移动通信有限公司 | A control method and device for jumping from a browser to an application program |
CN106528657A (en) * | 2016-10-19 | 2017-03-22 | 广东欧珀移动通信有限公司 | Control method and device for browser skipping to application program |
CN107370740A (en) * | 2017-07-28 | 2017-11-21 | 北京五八信息技术有限公司 | Redirect hold-up interception method and device |
CN107809420A (en) * | 2017-09-30 | 2018-03-16 | 谢彩红 | A kind of advertisement intelligent hold-up interception method |
CN107844324A (en) * | 2017-10-23 | 2018-03-27 | 北京京东尚科信息技术有限公司 | Customer terminal webpage redirects treating method and apparatus |
CN108121568A (en) * | 2017-11-30 | 2018-06-05 | 五八有限公司 | Arouse method and device, electronic equipment and the readable storage medium storing program for executing of APP |
CN108572866A (en) * | 2018-04-23 | 2018-09-25 | Oppo广东移动通信有限公司 | A kind of application management method, application program management device and mobile terminal |
CN108829316A (en) * | 2018-06-01 | 2018-11-16 | 联想(北京)有限公司 | Data capture method, device, electronic equipment and readable storage medium storing program for executing |
CN108733424A (en) * | 2018-06-30 | 2018-11-02 | 努比亚技术有限公司 | Using wake-up control method, equipment and computer-readable storage media |
Also Published As
Publication number | Publication date |
---|---|
CN109840418A (en) | 2019-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109840418B (en) | Jump control method and device for application program, storage medium and terminal | |
US11086663B2 (en) | Preloading application using active window stack | |
CN109388453B (en) | Application page display method and device, storage medium and electronic equipment | |
CN108647052B (en) | Application program preloading method and device, storage medium and terminal | |
CN107402835B (en) | Application program exception handling method and device, storage medium and mobile terminal | |
CN107844342B (en) | Control method and device for keeping application program alive, storage medium and mobile terminal | |
CN110990075B (en) | Method, device, equipment and storage medium for starting fast application | |
US10956176B2 (en) | Processing method, device and storage medium for implementing automatic startup | |
WO2018223558A1 (en) | Data processing method and electronic device | |
CN106484547B (en) | Multi-open application management method and device and terminal | |
CN107422916B (en) | Touch operation response method and device, storage medium and terminal | |
CN108710512B (en) | Application program preloading method and device, storage medium and intelligent terminal | |
EP3584710B1 (en) | Method and apparatus for controlling display of mobile terminal, and storage medium | |
CN106357921A (en) | Application data sharing method, application data sharing device and mobile terminal | |
CN107391017B (en) | Word processing method, device, mobile terminal and storage medium | |
US9582584B2 (en) | Method, apparatus and system for filtering data of web page | |
CN107423064A (en) | Message treatment method, device, terminal device and storage medium | |
WO2018161955A1 (en) | Method and device for controlling broadcast recipient, and mobile terminal | |
CN112163193A (en) | Broadcast registration control method, device, equipment and medium | |
CN108920531B (en) | Search content recommendation method and device, terminal device and storage medium | |
CN115225966B (en) | Application starting method, device, terminal equipment and storage medium | |
CN108170576B (en) | Log processing method and device, terminal equipment and storage medium | |
CN113141530B (en) | Remote control interaction based method and device, electronic equipment and storage medium | |
CN115967692A (en) | Session information processing method and related equipment | |
CN109343961B (en) | Memory information processing method and device, storage medium and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |