CN113141621A - Agent configuration method, agent configuration device and electronic equipment - Google Patents

Agent configuration method, agent configuration device and electronic equipment Download PDF

Info

Publication number
CN113141621A
CN113141621A CN202110385238.0A CN202110385238A CN113141621A CN 113141621 A CN113141621 A CN 113141621A CN 202110385238 A CN202110385238 A CN 202110385238A CN 113141621 A CN113141621 A CN 113141621A
Authority
CN
China
Prior art keywords
input
target
agent
wifi
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110385238.0A
Other languages
Chinese (zh)
Other versions
CN113141621B (en
Inventor
张昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110385238.0A priority Critical patent/CN113141621B/en
Publication of CN113141621A publication Critical patent/CN113141621A/en
Application granted granted Critical
Publication of CN113141621B publication Critical patent/CN113141621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses an agent configuration method, an agent configuration device and electronic equipment, and belongs to the technical field of communication. The agent configuration method comprises the following steps: under the condition that a WiFi proxy is started and a target page request fails, acquiring a target URL in the target page request; the target page request is a request for opening a target page of a target application; based on the target URL, a target domain name is determined and configured to disable the WiFi proxy. According to the agent configuration method provided by the embodiment of the application, the automatically acquired domain name can be added into the forbidden agent list, the manual operation of a user is reduced, the use threshold of the function is lowered, the adaptability to different types of applications is good in the use process, and the normal use of other applications to WiFi configured with WiFi agents is not influenced.

Description

Agent configuration method, agent configuration device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to an agent configuration method, an agent configuration device and electronic equipment.
Background
A considerable number of mobile terminals can configure proxies when using WiFi functionality, and most android machines can manually configure a proxy [ unused website ]. In the case of configuring a WiFi agent, especially for a WiFi manual agent, when using WiFi networking, part of applications may fail to request due to certificate problem, and the user usually has the following two operation modes:
(1) selecting manual agent closing, wherein the mode is equivalent to switching to the mode of not opening the agent and is not in accordance with the actual requirement of a user;
(2) the domain name of the app without the agent is manually input, and the method needs to manually input the domain name and has high requirement on the professional skill of the user.
Disclosure of Invention
An object of the embodiments of the present application is to provide an agent configuration method, an agent configuration apparatus, and an electronic device, which can solve the problem of a high agent configuration threshold.
In order to solve the technical problem, the present application is implemented as follows:
in a first aspect, an embodiment of the present application provides an agent configuration method, where the method includes:
under the condition that a WiFi proxy is started and a target page request fails, acquiring a target URL in the target page request; the target page request is a request for opening a target page of a target application;
based on the target URL, a target domain name is determined and configured to disable the WiFi proxy.
In a second aspect, an embodiment of the present application provides an agent configuration apparatus, including:
the first acquisition module is used for acquiring a target URL in a target page request under the condition that a WiFi proxy is started and the target page request fails; the target page request is a request for opening a target page of a target application; (ii) a
A first configuration module to determine a target domain name based on the target URL and configure the target domain name to disable the WiFi proxy.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect.
In the embodiment of the application, the automatically acquired domain name can be added to the forbidden proxy list, so that manual operation of a user is reduced, the use threshold of the function is reduced, in the use process, the adaptability to different types of applications is good, and normal use of other applications to WiFi configured with WiFi proxies is not influenced.
Drawings
Fig. 1 is a flowchart of an agent configuration method provided in an embodiment of the present application;
fig. 2 is a second flowchart of an agent configuration method according to an embodiment of the present application;
FIG. 3 is an interface diagram of an agent configuration method according to an embodiment of the present disclosure;
FIG. 4 is a second schematic interface diagram of the agent configuration method according to the embodiment of the present application;
FIG. 5 is a third schematic interface diagram of an agent configuration method according to an embodiment of the present application;
FIG. 6 is a fourth schematic interface diagram of an agent configuration method according to an embodiment of the present application;
fig. 7 is a block diagram of an agent configuration apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 9 is a second hardware schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application are capable of operation in sequences other than those illustrated or described herein. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means a relationship in which a front and rear related objects are one kind of "or".
In the prior art, when a WiFi is manually configured with an agent, the domain name of an App needs to be manually added to a 'unused website' list, a general user does not know the domain name of the App, or a part of App corresponds to a plurality of domain names, and the user cannot completely know the domain name, so that when the App is used, the situation that a page cannot be refreshed occurs, and troubles are caused to the user.
The agent configuration method, the agent configuration apparatus, the electronic device, and the readable storage medium provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The agent configuration method may be applied to a terminal, and may be specifically, but not limited to, executed by hardware or software in the terminal. The execution subject of the agent configuration method may be a terminal, or a control device of the terminal, or the like.
Terminals include, but are not limited to, mobile phones or other portable communication devices such as tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the terminal may not be a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or a touchpad).
In the following various embodiments, a terminal including a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The embodiment of the application provides a proxy configuration method, and an execution main body of the proxy configuration method can be a terminal with a WiFi module or a control device of the terminal and the like.
As shown in fig. 1, the proxy configuration method includes: step 110 and step 120.
Step 110, when the WiFi agent is turned on and the target page request fails, obtaining a target URL (Uniform Resource Locator ) in the target page request;
it can be understood that, when the terminal normally works, a user may open a target Application (APP), and under the target application, if a certain page needs to be displayed, the terminal sends a page request to an opposite terminal (for example, a server), and under the condition that network connectivity is normal, a display screen of the terminal may display the target page.
The target page request is a request to open a target page of a target application.
The target application in the proxy configuration method of the embodiment of the present application may be various applications that can be networked through WiFi, including but not limited to: social applications, reading applications, video applications, game applications, and the like.
Under the condition that the terminal is in communication connection with the opposite terminal through WiFi and the WiFi proxy is started (such as the WiFi manual proxy), when a user initiates a request for opening a target page of a target application, if the request fails, a target URL in the target page request is obtained.
The target page request of the target application initiated by the user comprises various modes, including clicking a target control corresponding to the target page and the like.
In the case where the WiFi agent is already turned on and the target page request fails, there is a considerable possibility that the target application or the target page of the target application does not support the WiFi agent, and this step is used to automatically obtain the target URL in the target page request in this case, which facilitates automatic setting.
The manner of obtaining the target URL may be to intercept the target page request, so that the target URL included in the target page request may be obtained.
Step 120, determining a target domain name based on the target URL, and configuring the target domain name to disable the WiFi agent.
In step 110, a target URL included in the target page request is obtained, where the target URL is used to locate resources on the network, so as to implement display of the target page, and the target URL is usually expressed according to a target format, and a corresponding target domain name can be conveniently obtained by reading target information in the target URL.
For example, the obtained target URL is:
http://www.abcdefg.com:1234/news/index.aspboardID=5&ID=12345&page=1#name
the corresponding domain name is www.abcdefg.com.
And after the target domain name is determined based on the target URL, the target domain name is added into a forbidden proxy list, so that each page using the target domain name under the application can bypass the WiFi proxy.
There are various ways to name the forbidden proxy list for different systems, including but not limited to: a "web address not used", a "proxy is bypassed for the following object", a "proxy is disabled for the following object", or a "list of disabled proxies", etc.
These different nomenclature means that: the page request initiated by the domain name in the list does not use the corresponding WiFi agent.
As such, WiFi may automatically switch to a non-proxy mode, or automatically switch to a mobile network mode, upon a page request initiated by a target domain name configured to disable proxy; when other domain name initiated page requests are not configured to disable the proxy, the WiFi configuration of the WiFi proxy is automatically switched back.
According to the agent configuration method provided by the embodiment of the application, the automatically acquired domain name can be added into the forbidden agent list, the manual operation of a user is reduced, the use threshold of the function is lowered, the adaptability to different types of applications is good in the use process, and the normal use of other applications to WiFi configured with WiFi agents is not influenced.
In some embodiments, the agent configuration method may further include:
when the WiFi agent is started and the target page request fails, outputting first prompt information, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi agent;
configuring the target domain name to disable the WiFi agent in step 120 includes:
after the first prompt message is output, receiving a first input of a user;
in response to the first input, the target domain name is configured to disable the WiFi agent.
The first prompt message may be expressed in at least one of the following ways:
first, the first prompt message may be displayed on the display screen.
In this embodiment, as shown in fig. 3, in case that the WiFi proxy is turned on and the target page request fails, the display screen may display a popup window as shown in fig. 3, "whether the current page request failed, possibly due to turning on the proxy, to add the request initiated by the current app to the [ unused website ]? Or not ".
The specific expression of the information in the popup is not limited, and at least the meaning of the selection inquiry needs to be expressed.
It should be emphasized again that the popup is only displayed when the WiFi agent is turned on and the target page request fails, and if the WiFi agent is not turned on, it can be determined that the resource is not located due to the WiFi agent, and the popup is not required to be displayed.
Second, the first prompt message may be presented in a voice format.
In this embodiment, in case that the WiFi proxy is turned on and the target page request fails, the terminal outputs audio information for expressing "whether the current page request fails, possibly due to the turn-on of the proxy, the request initiated by the current app is all added to the [ unused website ]? ".
The first presentation information may be output in one of the two expression modes, or may be output in both of the two expression modes.
In this embodiment, the first input is used to determine whether the target domain name is configured to disable the WiFi proxy.
Based on different expression forms of the first prompt message, the first input can be expressed in at least one of the following modes:
first, the first input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the first prompt message may be displayed on the display screen, and correspondingly, the first input of the user is received, and the first prompt message may be displayed in a manner of receiving a touch operation of the user on a display area of the display screen of the terminal.
For example, in the embodiment shown in fig. 3, the display screen shows a popup "if the current page request failed, perhaps due to the agent being started, and the current app initiated request was all added to the [ unused web site ] list? Or not ". The first input may appear as a click of "yes" operation.
Second, the first input may be represented as a voice input.
In this embodiment, the first prompt message may be presented in a voice form, and correspondingly, the first input of the user may be received, and the first prompt message may be presented by receiving voice information of the user.
For example, the first prompt message may be "failure of the current page request, possibly due to the start of a proxy, and whether the request initiated by the current app is added to the [ unused website ]? ", the terminal may configure the target domain name to disable the WiFi agent when receiving a voice such as" yes ".
Third, the first input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the selection of "yes" or "no", and receives a first input of the user, which may be expressed as receiving a first input that the user presses the corresponding entity key; the first input may also be a combined operation of pressing a plurality of physical keys simultaneously.
Of course, in other embodiments, the first input may also be in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
The terminal, upon receiving the first input, may configure the target domain name to disable the WiFi agent in response to the first input.
In the above embodiment, before configuring the target domain name as the forbidden WiFi agent, the prompt information is output first, and then the determination is performed based on the input of the user, so that the intention of the user can be grasped more accurately, the configuration to be completed by the user can be informed in time, and the accurate interaction is realized.
In some embodiments, the agent configuration method may further include:
when the WiFi agent is started and the target page request fails, outputting second prompt information, wherein the second prompt information is used for prompting a user whether to start an inquiry-free function or not;
configuring the target domain name to disable the WiFi agent in step 120 includes:
after outputting the second prompt message, receiving a second input of the user;
in response to the second input, the target domain name is configured to disable the WiFi agent if the target page request fails again.
The second prompt message may be expressed in at least one of the following ways:
first, the second prompt message may be presented in a form of being displayed on a display screen.
In this embodiment, as shown in fig. 4, the display screen displays a popup window "is turned on or not is the query exemption function? Or not ".
The specific expression of the information in the popup is not limited, and at least the meaning of the selection inquiry needs to be expressed.
Second, the second prompt message may be presented in voice form.
In this embodiment, the terminal outputs audio information for expressing "whether or not the inquiry exempt function is turned on".
The second presentation information may be output in one of the two expression modes, or may be output in both of the two expression modes.
In addition, the time nodes for outputting the second prompt message are various:
first, the second prompt message is output together with the first prompt message.
In this embodiment, when the WiFi agent is turned on and the target page request fails, the first prompt message and the second prompt message are output.
For example, the first prompt message and the second prompt message may be displayed in the pop-up window at the same time; or the first prompt message and the second prompt message are broadcast in sequence in a voice broadcast mode.
Second, the second prompt message may be output after receiving the first input of the first prompt message from the user.
Taking a voice broadcasting mode as an example, the terminal outputs audio information for expressing that "the current page request fails, which may be caused by starting an agent, whether the request initiated by the current app is added to the [ unused website ] list? ", the terminal receives the first input of" yes ", and then outputs the second prompt information-" whether to start the function of exempting from inquiry ".
Taking the way of display screen display as an example, as shown in fig. 3, in the case that the WiFi agent is turned on and the target page request fails, the display screen may display a popup window as shown in fig. 3, "if the current page request fails, probably due to the turning on of the agent, whether the request initiated by the current app is all added to the [ unused website ]? Or not ". Receive a first input from the user clicking "yes" and then "turn on the query-exempt function with a popup window shown in fig. 4? Or not ".
In this embodiment, the second input is used to turn on the query-free function.
Wherein, based on the different expression forms of the second prompt message, the second input may be expressed in at least one of the following ways:
first, the second input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the second prompt message may be displayed on the display screen, and correspondingly, the second input of the user is received, which may be a touch operation of the user on the display area of the display screen of the terminal.
For example, in the embodiment shown in fig. 4, the display screen displays a popup window "is the query-free function enabled? Or not ". The second input may appear as a click of "yes" operation. In this way, in the case of a failure of re-request, the output of the first prompt message for reminding the failure of page request can be skipped, and the domain name can be directly configured as a disabled agent.
Second, the second input may be presented as a voice input.
In this embodiment, the second prompt message may be presented in a voice form, and correspondingly, receiving the second input of the user may be presented as receiving the voice message of the user.
For example, the second prompt message may be "whether to activate the query-exempt function? The terminal can set query-free when receiving voice such as yes, and can skip outputting first prompt information for reminding page request failure in case of request failure again, and directly configure the domain name as a disabled agent.
Third, the second input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the selection of "yes" or "no", and receives a second input from the user, which may be expressed as receiving a second input that the user presses the corresponding entity key; the second input may also be a combined operation of pressing a plurality of physical keys simultaneously.
Of course, in other embodiments, the second input may also be represented in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
After receiving the second input, the terminal may respond to the second input, and may skip outputting the first prompt information for prompting the page request failure under the condition that the request fails again, and directly configure the domain name as a disabled agent.
The above embodiment has been described mainly by taking the first input and the second input to select "yes" as an example, and when "no" is selected for the first prompt information, if "yes" is selected for the second prompt information, the first prompt information is not output and the corresponding domain name is not directly configured as the forbidden agent when the re-request fails; when "yes" or "no" is selected for the first presentation information, if "no" is selected for the second presentation information, the first presentation information is output again when the re-request fails.
In the embodiment, the prompt information for setting the query-free state is output, so that after the user determines the prompt information, the operation of the same scene can be simplified, and the disturbance on the normal use of the App by the user is reduced.
After configuring the target domain name to disable the WiFi agent in step 120, the method may further include: and outputting the third prompt message.
The third prompt message is used for prompting the user that the configuration is completed, and similar to the first prompt message and the second prompt message, the third prompt message can be displayed on a display screen or in a voice mode.
As shown in fig. 5, taking the third prompt message as an example of a display screen display, after configuring the target domain name to disable the WiFi agent, a popup prompt "add success, please refresh retry, if still access fails, please check for other reasons" is displayed.
Thus, the user can be informed of the change in the setting in time.
In some embodiments, the step 120 of configuring the target domain name to disable the WiFi agent comprises:
establishing a corresponding relation between a target domain name and a target application;
it will be appreciated that the domain name is determined by a target URL in a target page request corresponding to a certain page of the target application, typically one target application corresponding to one or more target domain names, but each domain name corresponding to only one target application.
By setting the corresponding relation between the target domain name and the target application, the visual operation of the user can be facilitated.
Correspondingly, after configuring the target domain name to disable the WiFi agent, the agent configuration method may further include:
receiving a third input of the user on the agent configuration display interface; in response to a third input, displaying a proxy configuration control, the proxy configuration control including an icon of the target application corresponding to the domain name;
in this embodiment, the third input is for displaying a proxy configuration control.
Wherein the third input may be expressed in at least one of the following ways:
first, the third input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, when the correspondence between the domain name and the target application is established, the proxy configuration interface may be entered through the third input, and the domain name that has been configured as the disabled proxy and the icon of the corresponding target application may be displayed in the proxy configuration control on the proxy configuration interface.
As shown in fig. 6, in a proxy configuration control [ unused website ] of the proxy configuration interface, a domain name that has been configured as a forbidden proxy and an icon of a corresponding target application are displayed:
icon X of the target application, domain name app.xxx.com; mail, XXX, com
Icon T of target application, domain name app.yyy.com; mail.yyy.com
And a corresponding selection frame is also displayed after each target application.
Second, the third input may be presented as a speech input.
In this embodiment, the third prompt message may be presented in a form of voice, and correspondingly, the third input from the user may be received, and the third prompt message may be presented by receiving voice information of the user.
For example, the third prompting message may be "enter WiFi advanced settings".
Third, the third input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with a corresponding physical key for receiving a third input from the user, which may be expressed as receiving a third input that the user presses the corresponding physical key; the third input may also be a combined operation of pressing a plurality of physical keys simultaneously.
Of course, in other embodiments, the third input may also be represented in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
The terminal may display the agent configuration control in response to the third input after receiving the third input.
Therefore, the method can automatically configure the domain name of the forbidden agent, and can realize the visual interface of the target application under the function, thereby facilitating the manual maintenance and setting of the user.
Receiving a fourth input of the agent configuration control by the user;
and responding to the fourth input, and modifying the configuration corresponding to the proxy configuration control.
In this embodiment, the fourth input is used to modify the list information in the proxy configuration control.
Wherein the fourth input may be expressed in at least one of the following ways:
first, the fourth input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
As shown in fig. 6, in a proxy configuration control [ unused website ] of the proxy configuration interface, a domain name that has been configured as a forbidden proxy and an icon of a corresponding target application are displayed:
icon X of the target application, domain name app.xxx.com; mail, XXX, com
Icon T of target application, domain name app.yyy.com; mail.yyy.com
And a corresponding selection frame is also displayed after each target application.
The fourth input may be represented by an operation of clicking a selection box, and manual management of the configuration list may be achieved through manual checking and deletion.
Second, the fourth input may be presented as a speech input.
In this embodiment, the third prompting message may be presented in a form of voice, and correspondingly, the fourth input of the user is received, and the third prompting message may be presented by receiving voice information of the user.
For example, the third prompt message may be "delete X in unused website".
Third, the fourth input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with a corresponding physical key for receiving a fourth input of the user, which may be expressed as receiving a fourth input of the user pressing the corresponding physical key; the fourth input may also be a combined operation of pressing a plurality of physical keys simultaneously.
Of course, in other embodiments, the fourth input may also be in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
Therefore, visual operation and maintenance can be achieved by setting icons of the target application and the corresponding domain names to be displayed on the corresponding configuration display interfaces.
How to obtain the target URL in the target page request is specifically described below from two different implementation perspectives.
Firstly, refreshing the current target page.
In this embodiment, the step of obtaining the target URL in the target page request may include:
receiving a seventh input of a user refreshing the target page;
generating a target page request in response to the seventh input;
and acquiring the target URL of the target page request.
In this embodiment, the seventh input is used to refresh the target page.
Wherein the seventh input may be expressed in at least one of the following ways:
first, the seventh input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the receiving of the seventh input by the user may be represented by receiving a touch operation of the user on a display area of a display screen of the terminal.
To reduce the user mishandling rate, the seventh input may be defined as a specific gesture, such as performing a pull-down in a pressed state; or displaying the target control on the current interface, and touching the target control, so that the seventh input can be realized.
Second, the seventh input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the refresh, and receives a seventh input from the user, which may be expressed as receiving a seventh input from the user pressing the corresponding entity key; the seventh input may also be a combined operation of pressing a plurality of physical keys at the same time.
Third, the seventh input may be represented as a voice input.
In this embodiment, the terminal may refresh the current target page when receiving a voice such as "refresh".
Of course, in other embodiments, the seventh input may also be represented in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
After receiving the seventh input, the terminal may generate a target page request in response to the seventh input, and intercept the request at this time, that is, may obtain a target URL of the target page request.
And II, exiting the target page.
In this embodiment, the step of obtaining the target URL in the target page request may include:
receiving an eighth input that the user exits the target page;
generating page requests for other pages in response to the eighth input;
acquiring a target URL in a target page request of other pages;
configuring the target domain name to disable the WiFi agent, including:
in the event of a request failure, the target domain name is configured to disable the WiFi agent.
In this embodiment, the eighth input is used to exit the target page, and other pages may be requested without exiting the target application while exiting the target page.
Wherein the eighth input may be expressed in at least one of the following ways:
first, the eighth input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the receiving of the eighth input by the user may be represented by receiving a touch operation of the user on a display area of a display screen of the terminal.
To reduce the user mishandling rate, the eighth input may be defined as a specific gesture, such as pulling from the side area toward the center of the screen in a pressed state; or displaying the target control on the current interface, and touching the target control, so that the eighth input can be realized.
Second, the eighth input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the backward movement, and receives the eighth input of the user, which may be expressed as receiving the eighth input of the user pressing the corresponding entity key; the eighth input may also be a combined operation of pressing a plurality of physical keys at the same time.
Third, the eighth input may be presented as a voice input.
In this embodiment, the terminal may trigger a return to the previous page upon receiving a voice such as "back".
Of course, in other embodiments, the eighth input may also be expressed in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
After receiving the eighth input, the terminal may generate a page request for another page in response to the eighth input; at this time, the request is intercepted, and the target URL in the target page request of other pages can be obtained.
For a new page request, the target domain name is configured to disable the WiFi proxy in the event the request fails.
In some embodiments, the agent configuration method may further include:
receiving a fifth input of the user on the agent configuration display interface;
displaying an application selection list in response to a fifth input;
in this embodiment, the fifth input is for causing the display to display a list of application selections on the proxy configuration display interface.
Wherein the fifth input may be expressed in at least one of the following ways:
first, the fifth input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the receiving of the fifth input by the user may be represented by receiving a touch operation of the user on the terminal agent configuration display interface.
For example, in the interface shown in fig. 6, by clicking [ unused website ], an application selection list can be displayed. In the application selection list, applications with configurations are arranged and displayed.
Second, the fifth input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with a corresponding physical key for receiving a fifth input of the user, which may be expressed as receiving a fifth input of the user pressing the corresponding physical key; the fifth input may also be a combined operation of pressing a plurality of physical keys simultaneously.
Third, the fifth input may be presented as a voice input.
In this embodiment, the terminal may trigger the display of the application selection list upon receiving a voice such as "open an application list of the agent configuration display interface".
Of course, in other embodiments, the fifth input may also be in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
The terminal may display the application selection list in response to the fifth input after receiving the fifth input.
Receiving a sixth input of the application selection list from the user;
in response to a sixth input, at least two domain names corresponding to the target application are configured to disable the proxy.
In this embodiment, the sixth input is used to select a target application from the application selection list.
Wherein the sixth input may be expressed in at least one of the following ways:
first, the sixth input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the receiving of the sixth input by the user may be represented by receiving a touch operation of the user on a display area of a display screen of the terminal.
In actual execution, each application in the application selection list has a corresponding selection box, and selection can be realized by clicking.
Second, the sixth input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the selection or determination, and receives a sixth input of the user, which may be expressed as receiving a sixth input that the user presses the corresponding entity key; the sixth input may also be a combined operation of pressing a plurality of physical keys at the same time.
Third, the sixth input may appear as a voice input.
In this embodiment, the terminal may configure the domain name of the 3 rd application to disable the WiFi agent upon receiving a voice such as "select 3 rd application".
Of course, in other embodiments, the sixth input may also be in other forms, including but not limited to character input, and the like, which may be determined according to actual needs, and this is not limited in this application.
The terminal may configure the domain name of the target application to disable the proxy in response to the sixth input after receiving the sixth input.
According to the embodiment, under the condition of being separated from the use environment of the target application, the configuration can be manually configured on the WiFi configuration page directly, the user does not need to know the target domain name of the target application, the plurality of target domain names can be configured to be forbidden to use the WiFi proxy at one time, the use is convenient, and the operation difficulty is low.
It should be noted that, in the proxy configuration method provided in the embodiment of the present application, the execution main body may be a proxy configuration device, or a control module in the proxy configuration device, which is used for executing the loading proxy configuration method. In the embodiment of the present application, an agent configuration device is taken as an example to execute an agent configuration processing method, and the agent configuration method provided in the embodiment of the present application is described.
As shown in fig. 2, the proxy configuration method includes: step 210-step 290.
Step 210, determining whether the current page request fails.
In actual implementation, the processor may determine whether the current page request failed based on information fed back by the network module.
And under the condition that the current page request is successful, directly ending the configuration method and executing normal display.
Step 220, under the condition that the current page request fails, whether the WiFi agent configured by WiFi is started currently or not.
The page request failure has various reasons, such as network disconnection, server downtime, terminal failure and the like, and whether the WiFi agent with WiFi configuration is required to be configured can be judged in advance by determining whether the WiFi agent with WiFi configuration is started at present.
In the case where the processor determines that the WiFi agent of the WiFi configuration is not turned on, the configuration method is directly ended.
In the case of determining that the WiFi agent of the WiFi configuration is currently turned on, based on whether the user refreshes the current interface or exits the current page next, there may be two paths, corresponding to step 231 and step 232, respectively.
And 231, refreshing the current page, intercepting the request of the current page and obtaining the URL.
In this embodiment, the user presses the display screen at the current page, and performs a pull-down in the pressed state; or displaying a target control for refreshing on the current interface, touching the target control, and refreshing the current page; after receiving the seventh input, the terminal may generate a target page request in response to the seventh input, and intercept the request at this time, i.e., may obtain a target URL of the target page request.
Step 232, exiting the current page, initiating other page requests, intercepting the requests, and obtaining the target URL.
In the embodiment, touch operation of a user in a display area of a terminal display screen is received, a current page is exited, and other page requests are initiated; at this time, the request is intercepted, and the target URL in the target page request of other pages can be obtained.
And 240, outputting the first prompt message.
The first prompt message is used for reminding the user of the failure of the page request.
As shown in fig. 3, in case that the WiFi proxy has been turned on and the target page request fails, the display screen may display a popup as shown in fig. 3, "whether the request initiated by the current app is all added to the list of [ unused website ],"? Or not ".
Determine if the user chooses to approve?
In case the user selects "no", the configuration method is directly ended.
And step 250, adding the domain name to the (unsupported website) under the condition that the user selects 'yes', and storing the current app name and the corresponding relation of the current app name.
At this step, one may choose not to jump to the configuration page as shown in fig. 6, but to continue to display the current interface.
And step 260, prompting the user after the adding is successful.
As shown in fig. 5, after configuring the target domain name to disable the WiFi agent, a pop-up prompt is displayed "add success, please refresh retries, if still access fails, please investigate other reasons".
Thus, the user can be informed of the change in the setting in time.
Step 270, initiate the request again and succeed.
The user may initiate the request again by refreshing the current page or backing up, and in case of unsuccessful, it may be determined that the failure is not in the WiFi setting, and at this time, the configuration method may be directly ended; in case of success, proceed to the next step.
Step 280, continuing to monitor other requests of the current app, and if the requests fail, repeating step 250.
It should be noted that, the current app may contain a plurality of domain names, and therefore, a request failure may occur in other requests, and if the request fails, the process returns to step 250 again to continue adding domain names.
Step 290, the added domain name can be viewed in a page configured by WiFi.
As shown in fig. 6, the icon of the target application and the corresponding domain name are displayed on the corresponding configuration display interface, so that the visual operation and maintenance can be realized.
The embodiment of the application also provides a proxy configuration device.
As shown in fig. 7, the agent configuration apparatus includes: a first acquisition module 710 and a first configuration module 720.
A first obtaining module 710, configured to obtain a target URL in a target page request when the WiFi agent is turned on and the target page request fails; the target page request is a request for opening a target page of a target application;
a first configuration module 720 for determining a target domain name based on the target URL and configuring the target domain name to disable the WiFi proxy.
According to the proxy configuration device provided by the embodiment of the application, the automatically acquired domain name can be added into the forbidden proxy list, the manual operation of a user is reduced, the use threshold of the function is reduced, the adaptability to different types of applications is good in the use process, and the normal use of other applications to WiFi configured with WiFi proxies is not influenced.
In some embodiments, the apparatus may further comprise:
the first output module is used for outputting first prompt information under the condition that the WiFi proxy is started and the target page request fails, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi proxy or not;
the first configuration module is further used for receiving a first input of a user after the first prompt message is output; in response to the first input, the target domain name is configured to disable the WiFi agent.
In some embodiments, the apparatus may further comprise:
the second output module is used for outputting second prompt information under the condition that the WiFi agent is started and the target page request fails, wherein the second prompt information is used for prompting a user whether to start an inquiry-free function or not;
the first configuration module is further used for receiving a second input of the user after the second prompt message is output; in response to the second input, the target domain name is configured to disable the WiFi agent if the target page request fails again.
In some embodiments, the first configuration module is further configured to establish a correspondence between the domain name and the target application;
the apparatus may further include:
the third receiving module is used for receiving a third input of the user on the agent configuration display interface after the target domain name is configured to disable the WiFi agent;
the first display module is used for responding to the third input and displaying an agent configuration control, and the agent configuration control comprises an icon of a target application corresponding to the domain name;
the fourth receiving module is used for receiving fourth input of the user to the agent configuration control;
and the second configuration module is used for responding to the fourth input and modifying the configuration corresponding to the proxy configuration control.
In some embodiments, the first obtaining module may be further configured to
Receiving a seventh input of a user refreshing the target page;
generating a target page request in response to the seventh input;
and acquiring the target URL of the target page request.
In some embodiments, the first obtaining module may be further configured to
Receiving an eighth input that the user exits the target page;
generating page requests for other pages in response to the eighth input;
acquiring a target URL in a target page request of other pages;
the first configuration module is further configured to configure the target domain name to disable the WiFi agent in the event of a request failure.
In some embodiments, the agent configuration device may further include:
the fifth receiving module is used for receiving fifth input of the user on the agent configuration display interface;
a second display module for displaying the application selection list in response to a fifth input;
a sixth receiving module, configured to receive a sixth input to the application selection list from the user;
and the third configuration module is used for responding to a sixth input and configuring at least two domain names corresponding to the target application as the forbidden agents.
The proxy configuration apparatus in the embodiment of the present application may be an apparatus, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The agent configuration device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
The proxy configuration device provided in the embodiment of the present application can implement each process implemented by the proxy configuration device in the method embodiments of fig. 1 to fig. 6, and is not described here again to avoid repetition.
As shown in fig. 8, an electronic device according to an embodiment of the present application is further provided, which includes a processor 820, a memory 810, and a program or an instruction stored in the memory 810 and capable of running on the processor 820, where the program or the instruction is executed by the processor 820 to implement each process of the above-mentioned proxy configuration method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 900 includes, but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, and a processor 910.
Those skilled in the art will appreciate that the electronic device 900 may further include a power supply (e.g., a battery) for supplying power to various components, and the power supply may be logically connected to the processor 910 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The processor 910 is configured to, when the WiFi agent is turned on and the target page request fails, obtain a target URL in the target page request; the target page request is a request for opening a target page of a target application;
a processor 910 configured to determine a target domain name based on the target URL, and configure the target domain name to disable the WiFi proxy.
According to the electronic device provided by the embodiment of the application, the automatically acquired domain name can be added into the forbidden proxy list, the manual operation of a user is reduced, the use threshold of the function is lowered, the adaptability to different types of applications is good in the use process, and the normal use of other applications to WiFi configured with WiFi proxies is not influenced.
Optionally, the display unit 906 or the audio output unit 903 may be configured to output first prompt information when the WiFi agent is turned on and the target page request fails, where the first prompt information is used to prompt the user whether to modify the setting of the WiFi agent;
a user input unit 907 for receiving a first input of a user after outputting the first prompt information;
the processor 910 is further configured to configure the target domain name to disable the WiFi agent in response to the first input.
Optionally, the display unit 906 or the audio output unit 903 may be configured to output second prompt information when the WiFi agent is turned on and the target page request fails, where the second prompt information is used to prompt the user whether to turn on the query-exempt function;
a user input unit 907 for receiving a second input of the user after outputting the second prompt information;
the processor 910 is further configured to configure the target domain name to disable the WiFi agent in response to a second input if the target page request fails again.
Optionally, the processor 910 is further configured to establish a correspondence between the domain name and the target application;
a user input unit 907 further configured to receive a third input of the user at the agent configuration display interface after configuring the target domain name to disable the WiFi agent;
a processor 910, further configured to display, in response to a third input, a proxy configuration control, the proxy configuration control including an icon of the target application corresponding to the domain name;
a user input unit 907, further configured to receive a fourth input of the agent configuration control from the user;
the processor 910 is further configured to modify, in response to the fourth input, a configuration corresponding to the proxy configuration control.
Optionally, the user input unit 907 is further configured to receive a seventh input that the user refreshes the target page;
processor 910, further configured to generate a target page request in response to the seventh input; acquiring a target URL of a target page request;
optionally, the user input unit 907 is further configured to receive an eighth input that the user exits the target page;
generating page requests for other pages in response to the eighth input;
the processor 910 is further configured to obtain a target URL in a target page request for another page; in the event of a request failure, the target domain name is configured to disable the WiFi agent.
Optionally, the user input unit 907 is further configured to receive a fifth input of the user on the agent configuration display interface;
processor 910, further configured to display, in response to a fifth input, an application selection list;
a user input unit 907, further configured to receive a sixth input to the application selection list from the user;
the processor 910 is further configured to configure at least two domain names corresponding to the target application as a disabled agent in response to a sixth input.
It should be noted that, in this embodiment, the electronic device 900 may implement each process in the method embodiment in this embodiment and achieve the same beneficial effects, and for avoiding repetition, details are not described here again.
It should be understood that, in the embodiment of the present application, the input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics Processing Unit 9041 processes image data of a still picture or a video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes a touch panel 9071 and other input devices 9072. A touch panel 9071, also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. Memory 909 can be used to store software programs as well as various data including, but not limited to, application programs and operating systems. The processor 910 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned proxy configuration method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to run a program or an instruction to implement each process of the above-mentioned proxy configuration method embodiment, and can achieve the same technical effect, and is not described here again to avoid repetition.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, or system-on-chip.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order, depending on the functionality involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the scope of the invention as defined by the appended claims.

Claims (12)

1. A method for proxy configuration, comprising:
under the condition that a WiFi proxy is started and a target page request fails, acquiring a target URL in the target page request; the target page request is a request for opening a target page of a target application;
based on the target URL, a target domain name is determined and configured to disable the WiFi proxy.
2. The agent configuration method according to claim 1, wherein the method further comprises:
when the WiFi agent is started and the target page request fails, outputting first prompt information, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi agent;
the configuring the target domain name to disable the WiFi agent comprises:
after the first prompt message is output, receiving a first input of a user;
in response to the first input, configuring the target domain name to disable the WiFi proxy.
3. The agent configuration method according to claim 1, wherein the method further comprises:
when the WiFi agent is started and the target page request fails, outputting second prompt information, wherein the second prompt information is used for prompting a user whether to start an inquiry-free function or not;
the configuring the target domain name to disable the WiFi agent comprises:
after outputting the second prompt message, receiving a second input of the user;
in response to the second input, configure the target domain name to disable the WiFi agent if the target page request fails again.
4. The agent configuration method of any of claims 1-3, wherein the configuring the target domain name to disable the WiFi agent comprises:
establishing a corresponding relation between the target domain name and the target application;
after the configuring the target domain name to disable the WiFi agent, the method further comprises:
receiving a third input of the user on the agent configuration display interface;
in response to the third input, displaying a proxy configuration control comprising an icon of the target application corresponding to the target domain name;
receiving a fourth input of the agent configuration control by the user;
and responding to the fourth input, and modifying the configuration corresponding to the proxy configuration control.
5. The agent configuration method according to any one of claims 1 to 3, further comprising:
receiving a fifth input of the user on the agent configuration display interface;
displaying an application selection list in response to the fifth input;
receiving a sixth input of the application selection list from the user;
in response to the sixth input, configuring at least two domain names corresponding to the target application to disable the proxy.
6. An agent configuration apparatus, comprising:
the first acquisition module is used for acquiring a target URL in a target page request under the condition that a WiFi proxy is started and the target page request fails; the target page request is a request for opening a target page of a target application;
a first configuration module to determine a target domain name based on the target URL and configure the target domain name to disable the WiFi proxy.
7. The agent configuration device of claim 6, wherein the device further comprises:
the first output module is used for outputting first prompt information under the condition that the WiFi proxy is started and the target page request fails, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi proxy or not;
the first configuration module is further used for receiving a first input of a user after the first prompt message is output; in response to the first input, configuring the target domain name to disable the WiFi proxy.
8. The agent configuration device of claim 6, wherein the device further comprises:
the second output module is used for outputting second prompt information under the condition that the WiFi agent is started and the target page request fails, wherein the second prompt information is used for prompting a user whether to start an inquiry-free function or not;
the first configuration module is further configured to receive a second input of the user after the second prompt message is output; in response to the second input, configure the target domain name to disable the WiFi agent if the target page request fails again.
9. The proxy configuration device according to any one of claims 6 to 8, wherein the first configuration module is further configured to establish a correspondence between the target domain name and the target application;
the device further comprises:
a third receiving module, configured to receive a third input of the user on the agent configuration display interface after the target domain name is configured to disable the WiFi agent;
a first display module, configured to display, in response to the third input, an agent configuration control, where the agent configuration control includes an icon of the target application corresponding to the target domain name;
a fourth receiving module, configured to receive a fourth input of the agent configuration control from the user;
and the second configuration module is used for responding to the fourth input and modifying the configuration corresponding to the proxy configuration control.
10. The agent configuration device according to any one of claims 6-8, further comprising:
the fifth receiving module is used for receiving fifth input of the user on the agent configuration display interface;
a second display module for displaying an application selection list in response to the fifth input;
a sixth receiving module, configured to receive a sixth input of the application selection list from the user;
and the third configuration module is used for responding to the sixth input and configuring at least two domain names corresponding to the target application as the forbidden agent.
11. An electronic device comprising a processor, a memory, and a program or instructions stored on the memory and executable on the processor, the program or instructions when executed by the processor implementing the steps of the agent configuration method of any of claims 1-5.
12. A readable storage medium, on which a program or instructions are stored, which when executed by a processor, implement the steps of the agent configuration method according to any one of claims 1-5.
CN202110385238.0A 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment Active CN113141621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110385238.0A CN113141621B (en) 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110385238.0A CN113141621B (en) 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113141621A true CN113141621A (en) 2021-07-20
CN113141621B CN113141621B (en) 2023-04-28

Family

ID=76811141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110385238.0A Active CN113141621B (en) 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113141621B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098493A1 (en) * 2000-08-25 2004-05-20 Rees Owain Huw Web page access
CN103125135A (en) * 2010-09-16 2013-05-29 高通股份有限公司 Power conservation in wireless client terminals using proxy device
CN106878458A (en) * 2017-03-24 2017-06-20 福建中金在线信息科技有限公司 A kind of proxy access method and system
CN110362416A (en) * 2018-03-26 2019-10-22 腾讯科技(深圳)有限公司 Page assembly loading method and device, electronic equipment, storage medium
CN111064795A (en) * 2019-12-20 2020-04-24 腾讯科技(深圳)有限公司 Web page access acceleration method, system, computer equipment, server and medium
CN111447624A (en) * 2020-03-04 2020-07-24 浙江大华技术股份有限公司 WiFi equipment, network distribution method thereof and device with storage function

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040098493A1 (en) * 2000-08-25 2004-05-20 Rees Owain Huw Web page access
CN103125135A (en) * 2010-09-16 2013-05-29 高通股份有限公司 Power conservation in wireless client terminals using proxy device
CN106878458A (en) * 2017-03-24 2017-06-20 福建中金在线信息科技有限公司 A kind of proxy access method and system
CN110362416A (en) * 2018-03-26 2019-10-22 腾讯科技(深圳)有限公司 Page assembly loading method and device, electronic equipment, storage medium
CN111064795A (en) * 2019-12-20 2020-04-24 腾讯科技(深圳)有限公司 Web page access acceleration method, system, computer equipment, server and medium
CN111447624A (en) * 2020-03-04 2020-07-24 浙江大华技术股份有限公司 WiFi equipment, network distribution method thereof and device with storage function

Also Published As

Publication number Publication date
CN113141621B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
WO2015172507A1 (en) Method, device and mobile terminal for starting applications
CN112306607A (en) Screenshot method and device, electronic equipment and readable storage medium
WO2023061280A1 (en) Application program display method and apparatus, and electronic device
CN105208015A (en) Application multi-account login processing method and device and terminal device
CN112306325B (en) Interaction control method and device
CN113114845B (en) Notification message display method and device
CN113194200B (en) Message display method and device and electronic equipment
CN112099684A (en) Search display method and device and electronic equipment
WO2023030265A1 (en) Control method and electronic device
CN112416200A (en) Display method, display device, electronic equipment and readable storage medium
CN111813305A (en) Application program starting method and device
KR20230002939A (en) Display method, device and electronic device of message detail page
CN110851057A (en) Method and device for configuring configuration options of BIOS
CN112711366A (en) Image generation method and device and electronic equipment
CN108073610B (en) Method and device for realizing webpage loading
CN110413169B (en) Information display method, device and medium
US20240089223A1 (en) Information display method and apparatus, and electronic device
CN114416269A (en) Interface display method and display device
CN112235412B (en) Message processing method and device
CN112291412B (en) Application program control method and device and electronic equipment
CN111666023B (en) Interface display method and device, electronic equipment and readable storage medium
CN106020694B (en) Electronic equipment, and method and device for dynamically adjusting selected area
AU2015383793A1 (en) Fingerprint event processing method, apparatus, and terminal
CN111641551A (en) Voice playing method, voice playing device and electronic equipment
CN113141621B (en) Proxy configuration method, proxy configuration device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant