CN111274507A - Method, device and equipment for browsing webpage content and storage medium - Google Patents

Method, device and equipment for browsing webpage content and storage medium Download PDF

Info

Publication number
CN111274507A
CN111274507A CN202010072024.3A CN202010072024A CN111274507A CN 111274507 A CN111274507 A CN 111274507A CN 202010072024 A CN202010072024 A CN 202010072024A CN 111274507 A CN111274507 A CN 111274507A
Authority
CN
China
Prior art keywords
webpage
address
content
web page
white list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010072024.3A
Other languages
Chinese (zh)
Other versions
CN111274507B (en
Inventor
伍海君
田飞
黄皓祺
彭志华
李享荫
钱赓
张丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010072024.3A priority Critical patent/CN111274507B/en
Publication of CN111274507A publication Critical patent/CN111274507A/en
Application granted granted Critical
Publication of CN111274507B publication Critical patent/CN111274507B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2119Authenticating web pages, e.g. with suspicious links

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a webpage content browsing method, a webpage content browsing device and a webpage content browsing storage medium, and relates to the field of information security. The method comprises the following steps: receiving a first access request to a first webpage address; responding to the first webpage address belonging to the white list, and acquiring first webpage content corresponding to the first webpage address; and displaying the first webpage content, wherein the first webpage content comprises a graphic code of a second webpage address, and the second webpage address does not belong to the white list. Different from the prior art that the domain name of the inaccessible address is added to the white list of the security sensitive equipment, the method and the device can browse the webpage content corresponding to the webpage address in a mode that other terminals scan the graphic code after converting the inaccessible webpage address into the graphic code.

Description

Method, device and equipment for browsing webpage content and storage medium
Technical Field
The embodiment of the application relates to the field of virtual environments, in particular to a method, a device, equipment and a storage medium for browsing webpage content.
Background
In security sensitive devices such as child watches, game consoles, etc., access to only a portion of the specified web content is permitted for security reasons.
In the related art, a white list is provided in the security-sensitive device. The vendor adds domain names that are allowed to be accessed in a white list, such as domain name a, in advance. When the user accesses domain name a, the security sensitive device may determine whether domain name a belongs to the white list. When the domain name A belongs to the white list, the security sensitive equipment allows the domain name A to be accessed; when domain name B does not belong to the white list, the security sensitive device does not allow access to domain name a.
The web page content of domain name a may have a link to domain name B inserted therein, which is not added to the white list. When a user views the webpage content of the domain name A, if the user wants to continue accessing the domain name B, the user cannot normally access the security sensitive device.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for browsing webpage content, and the webpage content which is not in a white list of security sensitive equipment can be safely accessed. The technical scheme is as follows:
according to an aspect of the present application, a method for browsing web page content is provided, which is applied to a security sensitive device, where a white list is set in the security sensitive device, and the method includes:
receiving an access operation to a first webpage address;
responding to the first webpage address belonging to the white list, and acquiring first webpage content corresponding to the first webpage address;
and displaying the first webpage content, wherein the first webpage content comprises a graphic code of a second webpage address, and the second webpage address does not belong to the white list.
According to another aspect of the present application, the present application provides an apparatus for browsing web page content, where the apparatus is applied to a security sensitive device, and a white list is set in the security sensitive device, and the apparatus includes:
the receiving module is used for receiving access operation of the first webpage address;
the acquisition module is used for responding to the fact that the first webpage address belongs to the white list, and acquiring first webpage content corresponding to the first webpage address;
and the display module is used for displaying the first webpage content, wherein the first webpage content comprises a graphic code of a second webpage address, and the second webpage address does not belong to the white list.
According to another aspect of the present application, an embodiment of the present application provides a security-sensitive device, which includes a processor and a memory, where at least one instruction, at least one program, a code set, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement a browsing method of web content as described above
Optionally, the security-sensitive device is a terminal or a server.
According to another aspect of the present application, an embodiment of the present application provides a computer-readable storage medium, in which at least one instruction, at least one program, a code set, or a set of instructions is stored, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the browsing method of the web page content as described above.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
when the domain name of the second webpage address does not belong to the white list, generating a graphic code of the second webpage address, and displaying the graphic code of the second webpage address in the content of the first webpage. After scanning the graphic code of the second webpage address by using other terminals, the user can access the second webpage content of the second webpage address. Different from the related technology, the domain name of the inaccessible address is added to the white list of the security sensitive equipment, so that the security of the security sensitive equipment is ensured, and the accessibility of the second webpage address is also ensured.
According to the method and the device, the webpage content which does not belong to the white list can be directly browsed on other terminals, and the safety risk caused by adding too many domain names on the white list added with the safety sensitive equipment is greatly reduced. Moreover, the technology of the security sensitive equipment is changed less, and the method and the device are suitable for being used on electronic equipment developed by cooperation of multiple parties.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic diagram illustrating a method for browsing web page content according to an embodiment of the present application;
FIG. 2 is a flowchart of a method for browsing web page content according to an embodiment of the present application;
FIG. 3 is a schematic interface diagram illustrating a method for browsing web page content according to an embodiment of the present application;
FIG. 4 is an interface diagram illustrating a method for browsing web page content according to an embodiment of the present application;
FIG. 5 is a schematic interface diagram illustrating a method for browsing web page content according to an embodiment of the present application;
FIG. 6 is a flowchart of a method for browsing web page content according to another embodiment of the present application;
FIG. 7 is a flowchart of a method for browsing web page content according to another embodiment of the present application;
FIG. 8 is a block diagram of a device for browsing web page content according to an embodiment of the present application;
FIG. 9 is a block diagram of an apparatus for browsing web page content according to another embodiment of the present application;
FIG. 10 is a schematic diagram of a security sensitive device according to one embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
First, terms referred to in the embodiments of the present application are described:
white list: the white list corresponds to a "black list". For example: in a computer system, a plurality of software is applied to a black and white list rule, an operating system, a firewall, antivirus software, a mail system, application software and the like, and the black and white list rule is almost applied in all aspects related to control. After the blacklist is enabled, users (or IP addresses, IP packets, mail, viruses, etc.) that are blacklisted cannot pass. If the white list is set up, users (or IP addresses, IP packets, mails and the like) in the white list can pass preferentially and cannot be rejected as virus files, and the safety and the rapidity are greatly improved.
The "white list" in this application refers to a set of domain names of web page addresses allowed to be accessed, which are set in the security sensitive device. And if the domain name of the accessed address is on the white list, accessing the content corresponding to the webpage without limitation. Otherwise, access cannot be made. Similarly, the user can modify the white list set by the security sensitive device by upgrading the security sensitive device, and can also directly modify the white list to achieve the purpose of accessing the web page contents of other web page addresses. However, if the two ways are used to access other web page contents that are not on the white list, there are limitations to some extent, and developers are required to modify the technology, which requires a high technical requirement.
Security sensitive device: a device provided with a white list. When accessing a web page address, the domain name of the address must be the web page address on the white list, otherwise the device will not be able to access the web page address, i.e. browse the web page content. The safety sensitive equipment has higher requirements on safety performance.
When the second web page content is browsed based on the second web page address, the domain name of the second web page address belongs to the white list of the security sensitive device under a general condition, so that the second web page content can be browsed. Similarly, if the domain name of the second web page address does not belong to the security-sensitive device's whitelist, the security-sensitive device may terminate access to the second web page content. Therefore, the related art can browse the second web page content by adding the domain name of the second web page address not belonging to the white list.
The embodiment of the application provides a method for browsing webpage content. Adding a graphic code of a second webpage address on the first webpage content, wherein the domain name of the first webpage address belongs to a white list of the security sensitive equipment, and the domain name of the second webpage address does not belong to the white list of the security sensitive equipment. The user may browse the second web content through other devices/other terminals. The other device/other terminal is another electronic device than the security sensitive device, the other device/other terminal having the capability to scan and identify the graphical code. The method provided by the embodiment can be applied to enterprise electronic equipment, learning machines, child watches, child mobile phones, old people mobile phones or game machines.
FIG. 1 shows a block diagram of a computer system provided in an exemplary embodiment of the present application. The computer system 100 includes: security sensitive device 120, server 140, and terminal 160.
Security sensitive device 120 is provided with a white list on which all web page addresses for domain names can be accessed and web page content can be viewed. The security sensitive device may be an enterprise electronic device, a learning machine, a child watch, a child cell phone, an elderly cell phone, a game machine, a camera, a tablet, a wearable device, or the like. Security sensitive device 120 and terminal 160 are used by the same user. A user may access web content through a security sensitive device, but the domain name of the web page address must belong to the security sensitive device's whitelist. Accordingly, the white list of security sensitive devices may be modified and upgraded. Optionally, the purpose of accessing more web page contents can be achieved by adding a white list of security sensitive devices. Optionally, the security sensitive device is upgraded, and the white list content of the upgraded security sensitive device may be increased/decreased.
The security sensitive device 120 is connected to the server 140 through a wireless network or a wired network.
Optionally, the server 140 receives an access request sent by the security sensitive device 120, and the request manner may include various forms, such as an http request triggered based on a link, a hyperlink, a short link, and the like.
The server 140 includes at least one of a server, a plurality of servers, a cloud computing platform, and a virtualization center. Illustratively, the server 140 includes a processor 144 and a memory 142, the memory 142 in turn including a receiving module 1421 and a storage module 1422. Server 140 is configured to receive and store instructions for web browsing sent by security-sensitive device 120 and terminal 160. Optionally, server 140 undertakes primary computational work, security sensitive device 120 and terminal 160 undertakes secondary computational work; alternatively, the server 140 undertakes the secondary computing work, and the security sensitive device 120 and the terminal 160 undertakes the primary computing work; alternatively, the server 140, the security sensitive device 120, and the terminal 160 perform cooperative computing by using a distributed computing architecture.
The terminal 160 is an intelligent terminal that can access web page addresses on the white list that do not belong to security sensitive devices. The terminal 160 may be any one of a smart phone, a tablet, and a notebook. Optionally, the terminal 160 is controlled by a user controlling the security-sensitive device, and is mainly used for scanning a graphic code generated on the security-sensitive device based on the second webpage address to browse the second webpage content of the second webpage address.
The terminal 160 is connected to the server 140 through a wireless network or a wired network.
Fig. 2 is a flowchart illustrating a browsing method of web page content according to an embodiment of the present application. The embodiment is illustrated by the security sensitive device and the terminal implementation shown in fig. 1. The method comprises the following steps:
step 202, a security sensitive device receives an access operation to a first webpage address;
the security sensitive device may be at least one of an enterprise electronic device, a learning machine, a child mobile phone, a child watch, an old-man mobile phone, a game machine, a camera, and a tablet computer.
Optionally, the user triggers an access operation on the security sensitive device for the first web address, and the security sensitive device generates an access request for the first web address according to the access operation. The access type of the access request is at least one of web browsing, configuration updating and version upgrading. In this embodiment, the access type is exemplified as web browsing.
Optionally, the triggering operation of the user triggering the access operation may be at least one of clicking, long pressing, tapping, and pressure touch.
Step 204, in response to that the first webpage address belongs to the white list, the security sensitive device acquires first webpage content corresponding to the first webpage address;
the security sensitive device determines whether the domain name of the first web page address belongs to a white list.
When the domain name of the first webpage address belongs to the white list, the security sensitive device sends an access request to the server, and acquires the first webpage content corresponding to the first webpage address according to information (namely webpage data of the first webpage address) fed back by the server.
When the domain name of the first webpage address does not belong to the white list, the security sensitive device terminates the access to the first webpage address and does not acquire the first webpage content corresponding to the first webpage address.
Step 206, the security sensitive device displays a first webpage content, wherein the first webpage content includes a graphic code of a second webpage address, and the second webpage address does not belong to a white list;
the security sensitive device determines whether the first web page address belongs to a white list.
And when the domain name of the second webpage address belongs to the white list, the security sensitive equipment directly accesses the second webpage address to obtain the second webpage content.
And when the domain name of the second webpage address does not belong to the white list, the security sensitive equipment displays the graphic code of the second webpage address in the content of the first webpage. The graphic code may be carried by the first webpage content itself or generated by the security-sensitive device. Optionally, the graphical code is a two-dimensional code or a bar code.
Optionally, when the security sensitive device is a game machine, the user needs to agree with a license agreement a given by the game developer before playing the game, where the web address of the license agreement a is a first web address, and the manufacturer of the game device gives an additional license agreement C, where the address of the additional license agreement C is a second web address. The web page address (second web page address) of the additional license agreement C given by the game device manufacturer is in the web page content corresponding to the web page address (first web page address) of the license agreement a given by the game developer. The game machine may determine that the web address (second web address) corresponding to the additional license agreement C does not belong to the whitelist by receiving and responding to the access operation of the user to the web address (second web address) of the additional license agreement C, the game machine may jump to the lowermost part of the license agreement a, and a graphic code including the web address (second web address) corresponding to the additional license agreement C appears at the lowermost part of the license agreement a.
Optionally, when the security sensitive device is a child mobile phone, when a parent registers and logs in the child mobile phone for a child, the parent has a usage protocol B given by a child device developer, and the usage protocol B may include an additional usage protocol D of a child mobile phone manufacturer or a web page address of an additional usage protocol E of an enterprise or a company that cooperates with the child mobile phone device developer. The address using the protocol B is a first web page address, and the address additionally using the protocol D/E is a second web page address. The child mobile phone detects that the domain name of the web address (second web address) corresponding to the additional use protocol D/E does not belong to the white list of the child mobile phone. Therefore, when the parent registers and logs in, the parent accesses the webpage address (first webpage address) using the protocol B and accesses other webpage addresses (second webpage addresses) additionally using the protocol D/E, the child mobile phone jumps to the lowest end of the protocol B and generates a graphic code containing the webpage address (second webpage address) corresponding to the additionally using protocol D/E.
In one example shown in FIG. 3, a security sensitive device 302 has displayed on its screen first web page content 304 at a first web page address and a graphical code 306 at a second web page address.
Step 208, the terminal scans the graphic code of the second webpage address;
the terminal is an electronic device capable of recognizing a graphic code and accessing a network. The terminal is provided with a camera.
Optionally, the user uses the mobile phone to scan the graphic code containing the second webpage address.
In step 210, the terminal accesses the second webpage content.
And the terminal accesses the second webpage content by scanning and identifying the graphic code of the second webpage address.
Optionally, the user scans the graphic code containing the second webpage address by using the mobile phone, the mobile phone accesses the second webpage address, and the user can browse the second webpage content corresponding to the second webpage address.
In summary, in the method provided in this embodiment, when the domain name of the second webpage address does not belong to the white list, the graphic code of the second webpage address is generated, and the graphic code of the second webpage address is displayed in the content of the first webpage. After scanning the graphic code of the second webpage address by using other terminals, the user can access the second webpage content of the second webpage address. Different from the related technology, the domain name of the inaccessible address is added to the white list of the security sensitive equipment, so that the security of the security sensitive equipment is ensured, and the accessibility of the second webpage address is also ensured.
The security sensitive device displays the second webpage address in the webpage content of the first webpage address in one of a link mode, a hyperlink mode and a short link mode, and a user can conveniently access the second webpage address. The user can access the first webpage address by clicking, tapping, pressing the first webpage address for a long time and the like, and the method is convenient and quick.
And the security sensitive equipment receives and responds to a second access operation of the second webpage address, and displays the generated graphic code of the second webpage address in the first webpage content. The method and the device reduce new interface display, and save the operating memory occupied by the webpage contents of other webpage addresses to be browsed by the security sensitive equipment to a certain extent.
According to the method and the device, the webpage content which does not belong to the white list can be directly browsed on other terminals, and the safety risk caused by adding too many domain names on the white list added with the safety sensitive equipment is greatly reduced. Moreover, the technology of the security sensitive equipment is changed less, and the method and the device are suitable for being used on electronic equipment developed by cooperation of multiple parties.
In one example shown in fig. 4, a screen of a security sensitive device 402 displays first web page content 404 having a first web page address, the first web page content 404 includes a second web page address 406, a user performs a touch operation 408 on the second web page address 406, the security sensitive device 402 jumps to the lowest part of the first web page content and generates a graphic code 410 of the second web page address, and the graphic code containing the second web page address appears at the lowest part of the first web page content.
In one example shown in fig. 5, a security sensitive device 502 screen displays first web content 504 at a first web address, the first web content further includes a graphic code 506 at a second web address appearing at a bottom of the first web content, and a terminal 508 scans the graphic code appearing on the security sensitive device 502 to access the second web content 510.
Fig. 6 is a flowchart of a web page content browsing method according to another embodiment of the present application. This embodiment is illustrated as being implemented by a security sensitive device as shown in FIG. 1. The method comprises the following steps:
step 601, receiving a first access operation to a first webpage address;
optionally, the user triggers an access operation of the first web address by at least one of clicking, tapping and long-pressing, and the security sensitive device receives the access operation of the user on the first web address. The type of the access operation may be at least one of web browsing, configuration update, version upgrade. Optionally, the security-sensitive device automatically generates a first access operation to the first web page address after the first boot.
Optionally, after receiving the access operation to the first web page address, the security sensitive device sends an access request to the server for the first web page content of the first web page address.
Optionally, the server receives an access request from the security-sensitive device.
Illustratively, where the security-sensitive device is a gaming machine, the first web address is a web address of a user license agreement of the game developer. Illustratively, when the security sensitive device is a child watch, the first web address is a web address of a protocol used by a developer of the child watch.
Step 602, detecting whether the domain name belongs to a white list;
the security sensitive equipment detects whether the domain name of the first webpage address belongs to a white list, and if the detection result is yes, step 604 is executed; when the detection result is "no", step 603 is executed.
Illustratively, where the security sensitive device is a gaming machine, the gaming machine may need to detect the domain name of the web page address of the user license agreement of the gaming machine developer to see if it is on the white list. When the detection result is yes, go to step 604; when the detection result is "no", step 603 is executed.
Illustratively, when the security sensitive device is a child watch, the child watch needs to detect the domain name of the web page address of the usage protocol of the child watch developer to see if the child watch belongs to the white list. When the detection result is yes, go to step 604; when the detection result is "no", step 603 is executed.
Step 603, terminating the access to the first webpage address;
and the detection result is that the domain name corresponding to the first webpage address belongs to the white list, and the security sensitive equipment terminates the access to the first webpage address.
Illustratively, when the security-sensitive device is a game machine, the web address of the game developer user license agreement a is a first web address, and when the game machine detects that the address of the license agreement a (the first web address) does not belong to the white list, the game machine terminates the access to the web address of the game developer user license agreement a (the first web address).
Illustratively, when the security sensitive device is a child watch, the web address of the child watch developer using the protocol B is a first web address, and the child watch detects that the child watch does not belong to the white list, the child watch terminates the access to the web address (first web address) of the child watch developer using the protocol B.
Step 604, responding to the first webpage address, acquiring first webpage data corresponding to the first webpage address, wherein the first webpage data comprises a second webpage address;
the detection result of the security sensitive device is that the domain name corresponding to the first webpage address belongs to a white list, the security sensitive device obtains first webpage data corresponding to the first webpage address, and the first webpage data comprise a second webpage address.
Illustratively, when the security-sensitive device is a game machine, and the detection result of the web page address (first web page address) of the game developer user license agreement a is that the game machine belongs to the white list, the game machine responds to an access operation to the web page address (first web page address) of the game developer user license agreement a and acquires web page data of the web page address (first web page address) of the game developer user license agreement a. The web page data of the web page address (first web page address) of the game developer user license agreement a includes the web page address of the additional license agreement C given by the game device manufacturer. The address of the additional license agreement C is the second web page address.
Illustratively, when the security sensitive device is a child watch, and the detection result of the web page address (first web page address) of the child watch developer using the protocol B is that the web page address belongs to a white list, the child watch responds to an access operation of the web page address (first web page address) of the child watch developer using the protocol B, and acquires web page data of the web page address (first web page address) of the child watch developer using the protocol B. The web page data of the web page address (first web page address) of the child watch developer using the protocol B includes web page addresses of additional usage protocols D of other enterprises or companies having a cooperation with the child watch device developer. The address of the additional usage protocol D is the second web page address.
Step 605, receiving a second access operation to the second webpage address;
optionally, the user triggers an access operation to the second webpage address by clicking, tapping, long-pressing, and the like.
Illustratively, when the security-sensitive device is a game machine, the game machine receives an access operation of a user to a web address (second web address) of an additional licensing agreement C given by a manufacturer of the game machine, and the access operation may be at least one of clicking, tapping, long-pressing and pressure touch.
Illustratively, when the security sensitive device is a child watch, the child watch receives an access operation of a web address (second web address) of an additional usage protocol D of an enterprise or company having a cooperation with a developer of the child watch device, and the access operation may be at least one of clicking, tapping, long-pressing and pressure-touching.
Step 606, responding to the access operation of the second webpage address;
the security-sensitive device responds to an access operation of the second web page address.
Illustratively, where the security-sensitive device is a gaming machine, the gaming machine is responsive to a user accessing a web address (second web address) of an additional licensing agreement C given by the manufacturer of the gaming device.
Illustratively, where the security sensitive device is a child watch, the child watch responds to user access to a web address (second web address) of an additional usage protocol D of an enterprise or company with whom the child watch device developer has a collaboration.
Step 607, extracting the domain name of the second webpage address;
and the security sensitive equipment extracts the domain name of the second webpage address according to the trigger instruction.
Illustratively, when the security-sensitive device is a gaming machine, the domain name of the second web address extracted by the gaming machine is the domain name of the web address (second web address) of the additional licensing agreement C given by the manufacturer of the gaming device.
Illustratively, when the security sensitive device is a child watch, the child watch extracts a domain name of a web address (second web address) of an additional usage protocol D of an enterprise or company that has a collaboration with the child watch device developer.
Step 608, detecting whether the domain name does not belong to the white list;
the security sensitive equipment detects whether the domain name of the second webpage address belongs to a white list, and if the detection result is 'no', the step 609 is executed; if the result of the detection is "yes", step 610 is performed.
Illustratively, when the security-sensitive device is a game machine, the game machine detects the extracted domain name of the web address (second web address) of the additional licensing agreement C given by the manufacturer of the game device, and if the detection result is "no", step 609 is executed; if the result of the detection is "yes", step 610 is performed.
Illustratively, when the security sensitive device is a child watch, the child watch detects the extracted domain name of the web address (second web address) of the enterprise or company having a cooperation with the developer of the child watch device and using the protocol D additionally, and if the detection result is "no", step 609 is executed; if the result of the detection is "yes", step 610 is performed.
Step 609, displaying second webpage content corresponding to the second webpage address;
optionally, the domain name of the second web page address belongs to a white list, and the security sensitive device accesses the second web page address and displays second web page content corresponding to the second web page address.
For example, when the security-sensitive device is a game machine and a domain name of a web address (second web address) of the additional licensing agreement C given by the manufacturer of the game device belongs to the white list, the second web content displayed by the game machine may be the content of the additional licensing agreement C given by the manufacturer of the game device.
Illustratively, when the security sensitive device is a child watch, and the domain name of the web address (second web address) of the other enterprise or company having a cooperation with the child watch device developer belongs to the white list, the second web content displayed by the child watch may be the content of the additional usage protocol D of the other enterprise or company having a cooperation with the child watch device developer.
Step 610, displaying the first webpage content, including the graphic code of the second webpage address.
The graphic code may be carried by the first webpage content itself or generated by the security sensitive device. Optionally, the graphical code is a two-dimensional code or a bar code.
Optionally, the second web page address does not belong to a white list, and the security sensitive device generates a graphic code of the second web page address according to the second web page address. For example, the second webpage address is generated into a two-dimensional code of the second webpage address according to a two-dimensional code encoding rule, and the graphic code is added to the bottom of the first webpage content.
Optionally, the second web page address does not belong to the white list, and the security sensitive device displays the first web page content.
Optionally, the first webpage content includes a graphic code of the second webpage address.
Optionally, the first web page content displayed by the security sensitive device includes a second web page address, and the second web page address may be one of a link, a hyperlink, and a short link.
Optionally, after the security sensitive device receives the access operation to the second webpage address, the security sensitive device may move the display content of the first webpage content to the area where the graphic code of the second webpage address is located.
For example, when the security-sensitive device is a game machine and the domain name of the web address (second web address) of the additional licensing agreement C given by the manufacturer of the game device does not belong to the white list, the first web content displayed by the game machine may be the content of the licensing agreement a given by the game developer, which includes graphic codes containing the web address (second web address) of the additional licensing agreement C given by the manufacturer of the game device.
Illustratively, when the security sensitive device is a child watch, and the domain name of the web page address (second web page address) of the other enterprise or company having a cooperation with the child watch device developer does not belong to the white list, the first web page content displayed by the child watch may be the content of the usage protocol B given by the child watch developer, and the content includes a graphic code containing the web page address (second web page address) of the other enterprise or company having a cooperation with the child watch device developer.
In summary, in the method provided in this embodiment, when the domain name of the second webpage address does not belong to the white list, the security sensitive device generates the graphic code of the second webpage address, and displays the graphic code of the second webpage address in the content of the first webpage. After scanning the graphic code of the second webpage address by using other terminals, the user can access the second webpage content of the second webpage address. Different from the related technology, the domain name of the inaccessible address is added to the white list of the security sensitive equipment, so that the security of the security sensitive equipment is ensured, and the accessibility of the second webpage address is also ensured.
The security sensitive device displays the second webpage address in the webpage content of the first webpage address in one of a link mode, a hyperlink mode and a short link mode, and a user can conveniently access the second webpage address. The user can access the first webpage address by clicking, tapping, pressing the first webpage address for a long time and the like, and the method is convenient and quick.
And the security sensitive equipment receives and responds to a second access operation of the second webpage address, and displays the generated graphic code of the second webpage address in the first webpage content. The method and the device reduce new interface display, and save the operating memory occupied by the webpage contents of other webpage addresses to be browsed by the security sensitive equipment to a certain extent.
The security sensitive device can move the display content of the first webpage content to the content area where the graphic code of the second webpage address is located by receiving and responding to the access operation of the second webpage address. The method greatly facilitates the user to operate and use the security sensitive equipment, so that the second webpage address can be accessed more quickly, and unnecessary time is saved.
According to the method and the device, the webpage content which does not belong to the white list can be directly browsed on other terminals, and the safety risk caused by adding too many domain names on the white list added with the safety sensitive equipment is greatly reduced. Moreover, the technology of the security sensitive equipment is changed less, and the method and the device are suitable for being used on electronic equipment developed by cooperation of multiple parties.
In one example shown in fig. 7, security sensitive device 701 is provided with a whitelist 702 containing domain names 702 of a web page addresses (first web page addresses). The security sensitive device 701 receives an access operation to the a web page address (first web page address), and displays the web page content 704 corresponding to the a web page address (first web page address). The web page content of the a web page address (first web page address) further includes a B web page address (second web page address) 706, the security sensitive device 701 receives an access operation to the B web page address (second web page address), detects that the domain name 705 of the B web page address (second web page address) does not belong to the white list 702, and generates a graphic code 707 corresponding to the B web page address (second web page address). The graphic code 707 is also displayed in the web page content 704 corresponding to the a web page address (first web page address). The security sensitive device 701 receives an access operation to the B-web address (second web address) 706, immediately jumps to the lowest part of the web content 704 corresponding to the a-web address (first web address), and displays the generated graphic code 707 of the B-web address (second web address).
Fig. 8 is a block diagram illustrating a browsing apparatus for web page content according to an embodiment of the present application. The device is applied to the security sensitive equipment, a white list is arranged in the security sensitive equipment, and the device comprises:
a receiving module 802, configured to receive an access operation on a first web page address;
an obtaining module 804, configured to obtain first web page content corresponding to the first web page address in response to that the first web page address belongs to the white list;
a display module 806, configured to display the first webpage content, where the first webpage content includes a graphic code of a second webpage address, and the second webpage address does not belong to the white list.
Fig. 9 is a block diagram illustrating a browsing apparatus for web page content according to another embodiment of the present application. The device includes:
a receiving module 910, configured to receive an access operation to a first webpage address;
an obtaining module 920, configured to obtain first web page content corresponding to the first web page address in response to that the first web page address belongs to the white list;
a display module 930, configured to display the first webpage content, where the first webpage content includes a graphic code of a second webpage address, and the second webpage address does not belong to the white list.
In an optional embodiment, the obtaining module 920 is configured to obtain first webpage data corresponding to the first webpage address, where the first webpage data includes a graphic code material, and the graphic code material carries a graphic code of the second webpage address; the display module 930 includes:
the first display sub-module 931 is configured to display the first webpage content according to the first webpage data.
In an optional embodiment, the obtaining module 920 is configured to obtain first web page data corresponding to the first web page address, where the first web page data includes the second web page address; the display module 930 includes:
the generating submodule 934 is configured to generate, in response to that the second web page address does not belong to the white list, a graphic code of the second web page address according to the second web page address;
the second display sub-module 935 is configured to display the first web page content according to the first web page data, and add a graphic code of the second web page address to the first web page content.
In an alternative embodiment, the display module comprises:
an extracting sub-module 932, configured to extract a domain name of the second web page address;
a detecting sub-module 933, configured to detect whether the domain name does not belong to the white list.
In an alternative embodiment, the first web page content includes a hyperlink to the second web page address, the apparatus further comprising:
and a moving module 940, configured to move the display content of the first webpage content to a content area where the graphic code of the second webpage address is located in response to a trigger instruction of the hyperlink of the second webpage address.
In an alternative embodiment, the security sensitive device comprises: at least one of enterprise electronic equipment, child watches, child mobile phones, elder mobile phones and game machines.
Fig. 10 shows a block diagram of a security sensitive device 1000 according to an embodiment of the present application. The security sensitive device 1000 may be an electronic device such as a mobile phone, a tablet computer, a wearable device, a multimedia player, a camera, etc.
In general, security sensitive device 1000 includes: a processor 1001 and a memory 1002.
Processor 1001 may include one or more processing cores, such as a 4-core processor, a 16-core processor, or the like. The processor 1101 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (field Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 1101 may also include a main processor and a coprocessor, the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1001 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 1001 may further include an AI (Artificial Intelligence) processor for processing a computing operation related to machine learning.
Memory 1002 may include one or more computer-readable storage media, which may be non-transitory. The memory 1002 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1002 is used to store at least one instruction, at least one program, set of codes, or set of instructions for execution by processor 1001 to implement a method of prop use or a method of voice interaction in a virtual environment provided by method embodiments herein.
In some embodiments, the security sensitive device 1000 may further optionally include: a peripheral interface 1003 and at least one peripheral. The processor 1001, memory 1002 and peripheral interface 1003 may be connected by a bus or signal line. Various peripheral devices may be connected to peripheral interface 1003 via a bus, signal line, or circuit board. Specifically, the peripheral device may include: at least one of radio frequency circuitry 1004, touch screen display 1005, camera 10106, audio circuitry 1007, positioning components 1008, and power supply 1009.
The camera 1006 may be a three-dimensional camera formed by a color camera and a depth camera.
Those skilled in the art will appreciate that the configuration shown in FIG. 10 is not intended to be limiting of the security sensitive device 1000, and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
In an exemplary embodiment, there is also provided a computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions which, when executed by a processor of a security-sensitive device, implement the above-described method of browsing web content.
In an exemplary embodiment, there is also provided a computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions which, when executed by a processor of a security-sensitive device, implement the above-described method of browsing web content.
Optionally, the computer-readable storage medium may include: ROM (Read-Only Memory), RAM (Random Access Memory), SSD (Solid State drive), or optical disc. The Random Access Memory may include a ReRAM (resistive Random Access Memory) and a DRAM (Dynamic Random Access Memory).
In an exemplary embodiment, a computer program product is also provided, which when executed by a processor of a security sensitive device is configured to implement the above-mentioned method for browsing web page content.
In an exemplary embodiment, a computer program product is further provided, which is used to implement the browsing method of the web content when being executed by a processor of a terminal.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. In addition, the step numbers described herein only exemplarily show one possible execution sequence among the steps, and in some other embodiments, the steps may also be executed out of the numbering sequence, for example, two steps with different numbers are executed simultaneously, or two steps with different numbers are executed in a reverse order to the order shown in the figure, which is not limited by the embodiment of the present application.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (14)

1. The method for browsing the webpage content is applied to a security sensitive device, wherein a white list is set in the security sensitive device, and the method comprises the following steps:
receiving an access operation to a first webpage address;
responding to the first webpage address belonging to the white list, and acquiring first webpage content corresponding to the first webpage address;
and displaying the first webpage content, wherein the first webpage content comprises a graphic code of a second webpage address, and the second webpage address does not belong to the white list.
2. The method of claim 1, wherein the displaying the first web page content comprises:
acquiring first webpage data corresponding to the first webpage address, wherein the first webpage data comprise graphic code materials, and the graphic code materials carry graphic codes of the second webpage address;
and displaying the first webpage content according to the first webpage data.
3. The method of claim 1, wherein the displaying the first web page content comprises:
acquiring first webpage data corresponding to the first webpage address, wherein the first webpage data comprise the second webpage address;
responding to the fact that the second webpage address does not belong to the white list, and generating a graphic code of the second webpage address according to the second webpage address;
and displaying the first webpage content according to the first webpage data, and adding a graphic code of the second webpage address in the first webpage content.
4. The method of claim 3, further comprising:
extracting the domain name of the second webpage address;
detecting whether the domain name does not belong to the white list.
5. The method of any of claims 1 to 4, wherein the first web page content comprises a hyperlink to the second web page address;
the method further comprises the following steps:
and responding to a triggering instruction of the hyperlink of the second webpage address, and moving the display content of the first webpage content to a content area where the graphic code of the second webpage address is located.
6. The method of any of claims 1 to 4, wherein the security sensitive device comprises: at least one of enterprise electronic equipment, child watches, child mobile phones, elder mobile phones and game machines.
7. The browsing apparatus of web page content, wherein the apparatus is applied to a security-sensitive device, a white list is set in the security-sensitive device, and the apparatus comprises:
the receiving module is used for receiving access operation of the first webpage address;
the acquisition module is used for responding to the fact that the first webpage address belongs to the white list, and acquiring first webpage content corresponding to the first webpage address;
and the display module is used for displaying the first webpage content, wherein the first webpage content comprises a graphic code of a second webpage address, and the second webpage address does not belong to the white list.
8. The apparatus according to claim 7, wherein the obtaining module is configured to obtain first webpage data corresponding to the first webpage address, where the first webpage data includes a graphic code material, and the graphic code material carries a graphic code of the second webpage address;
the display module includes:
and the first display sub-module is used for displaying the first webpage content according to the first webpage data.
9. The apparatus according to claim 8, wherein the obtaining module is configured to obtain first web page data corresponding to the first web page address, where the first web page data includes the second web page address;
the display module includes:
the generating submodule is used for responding that the second webpage address does not belong to the white list and generating a graphic code of the second webpage address according to the second webpage address;
and the second display sub-module is used for displaying the first webpage content according to the first webpage data and adding the graphic code of the second webpage address in the first webpage content.
10. The apparatus of claim 9, wherein the display module comprises:
the extraction submodule is used for extracting the domain name of the second webpage address;
a detection sub-module, configured to detect whether the domain name does not belong to the white list.
11. The apparatus of any of claims 7 to 10, wherein the first web page content comprises a hyperlink to the second web page address;
the device further comprises:
and the moving module is used for responding to a triggering instruction of the hyperlink of the second webpage address and moving the display content of the first webpage content to a content area where the graphic code of the second webpage address is located.
12. The apparatus of any of claims 7 to 11, wherein the security sensitive device comprises: at least one of enterprise electronic equipment, child watches, child mobile phones, elder mobile phones and game machines.
13. A security-sensitive apparatus comprising a processor and a memory, the security-sensitive apparatus allowing access only to web page addresses located in a whitelist, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement a method of browsing web page content according to any one of claims 1 to 6.
14. A computer-readable storage medium, having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the method of browsing web content according to any one of claims 1 to 6.
CN202010072024.3A 2020-01-21 2020-01-21 Method, device and equipment for browsing webpage content and storage medium Active CN111274507B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010072024.3A CN111274507B (en) 2020-01-21 2020-01-21 Method, device and equipment for browsing webpage content and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010072024.3A CN111274507B (en) 2020-01-21 2020-01-21 Method, device and equipment for browsing webpage content and storage medium

Publications (2)

Publication Number Publication Date
CN111274507A true CN111274507A (en) 2020-06-12
CN111274507B CN111274507B (en) 2023-03-10

Family

ID=71003413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010072024.3A Active CN111274507B (en) 2020-01-21 2020-01-21 Method, device and equipment for browsing webpage content and storage medium

Country Status (1)

Country Link
CN (1) CN111274507B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583602A (en) * 2020-12-08 2021-03-30 数字广东网络建设有限公司 Information code data transmission method, device, system, computer device and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103268328A (en) * 2013-05-02 2013-08-28 百度在线网络技术(北京)有限公司 QR (quick response) code validation method and search engine server
CN103455601A (en) * 2013-09-03 2013-12-18 小米科技有限责任公司 Webpage processing method and device, and terminal equipment
US8752758B1 (en) * 2013-03-15 2014-06-17 Mettler-Toledo, LLC Use of scannable 2-D bar codes to provide context-sensitive information for a weighing device
CN104835046A (en) * 2015-04-20 2015-08-12 信码互通(北京)科技有限公司 Data identification method for two-dimension code safety verification
WO2017086992A1 (en) * 2015-11-20 2017-05-26 Hewlett Packard Enterprise Development Lp Malicious web content discovery through graphical model inference
CN106992975A (en) * 2017-03-21 2017-07-28 腾讯科技(深圳)有限公司 The recognition methods of malice network address and device
CN108959565A (en) * 2018-07-04 2018-12-07 广东小天才科技有限公司 A kind of method, apparatus and server of web page contents filtering

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8752758B1 (en) * 2013-03-15 2014-06-17 Mettler-Toledo, LLC Use of scannable 2-D bar codes to provide context-sensitive information for a weighing device
CN103268328A (en) * 2013-05-02 2013-08-28 百度在线网络技术(北京)有限公司 QR (quick response) code validation method and search engine server
CN103455601A (en) * 2013-09-03 2013-12-18 小米科技有限责任公司 Webpage processing method and device, and terminal equipment
CN104835046A (en) * 2015-04-20 2015-08-12 信码互通(北京)科技有限公司 Data identification method for two-dimension code safety verification
WO2017086992A1 (en) * 2015-11-20 2017-05-26 Hewlett Packard Enterprise Development Lp Malicious web content discovery through graphical model inference
CN106992975A (en) * 2017-03-21 2017-07-28 腾讯科技(深圳)有限公司 The recognition methods of malice network address and device
CN108959565A (en) * 2018-07-04 2018-12-07 广东小天才科技有限公司 A kind of method, apparatus and server of web page contents filtering

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ASHITHA SHAJI ET AL.: "Phishing Site Detection and Blacklisting Using EVCS, Steganography Based on Android Application" *
柴艳娜: "QR二维码防钓鱼的研究" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583602A (en) * 2020-12-08 2021-03-30 数字广东网络建设有限公司 Information code data transmission method, device, system, computer device and medium
CN112583602B (en) * 2020-12-08 2022-10-28 数字广东网络建设有限公司 Information code data transmission method, device, system, computer device and medium

Also Published As

Publication number Publication date
CN111274507B (en) 2023-03-10

Similar Documents

Publication Publication Date Title
US20240095043A1 (en) Execution of sub-application processes within application program
US10152660B2 (en) Smart card read/write method and apparatus
US9417793B2 (en) Global keyboard shortcuts management for web applications
CN109726067B (en) Process monitoring method and client device
US10891397B2 (en) User interface display method for terminal, and terminal
US11269663B2 (en) Method and apparatus for adapting handle device to third-party application, and storage medium
CN109471626B (en) Page logic structure, page generation method, page data processing method and device
CN109271211B (en) Method, device, equipment and medium for separating application program
CN105975393B (en) Page display detection method and system
CN114327688B (en) Data processing method, frame, storage medium and terminal equipment based on micro front end
US20220229528A1 (en) Method, apparatus, and system for generating resource value transfer request
TW201234267A (en) Emulating legacy video using UEFI
CN106487793A (en) application installation method and device
CN111274507B (en) Method, device and equipment for browsing webpage content and storage medium
CN109145598B (en) Virus detection method and device for script file, terminal and storage medium
CN111367518A (en) Page layout method and device, computing equipment and computer storage medium
CN108345683A (en) Webpage display process, device, terminal and storage medium
CN108268298B (en) Desktop icon generation method and device, storage medium and electronic equipment
CN114095533A (en) Cloud game account login method and device, computer equipment and storage medium
CN112052063A (en) Watermark filling method, system, terminal and storage medium for application program
CN115220859A (en) Data input mode monitoring method and device, electronic equipment and storage medium
CN111859999A (en) Message translation method, device, storage medium and electronic equipment
US20210021639A1 (en) Method and electronic device for displaying web page
CN111612450A (en) Detection method and device for application program payment channel, terminal equipment and medium
CN112035133A (en) Homepage upgrading method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024750

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant