CN113141621B - Proxy configuration method, proxy configuration device and electronic equipment - Google Patents

Proxy configuration method, proxy configuration device and electronic equipment Download PDF

Info

Publication number
CN113141621B
CN113141621B CN202110385238.0A CN202110385238A CN113141621B CN 113141621 B CN113141621 B CN 113141621B CN 202110385238 A CN202110385238 A CN 202110385238A CN 113141621 B CN113141621 B CN 113141621B
Authority
CN
China
Prior art keywords
input
target
proxy
wifi
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110385238.0A
Other languages
Chinese (zh)
Other versions
CN113141621A (en
Inventor
张昭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202110385238.0A priority Critical patent/CN113141621B/en
Publication of CN113141621A publication Critical patent/CN113141621A/en
Application granted granted Critical
Publication of CN113141621B publication Critical patent/CN113141621B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses a proxy configuration method, a proxy configuration device and electronic equipment, and belongs to the technical field of communication. The agent configuration method comprises the following steps: under the condition that a WiFi proxy is started and a target page request fails, acquiring a target URL in the target page request; the target page request is a request for opening a target page of a target application; and determining a target domain name based on the target URL, and configuring the target domain name to disable the WiFi proxy. According to the agent configuration method provided by the embodiment of the application, the domain name which is automatically acquired can be added into the forbidden agent list, so that manual operation of a user is reduced, the use threshold of the function is reduced, and in the use process, the suitability of the agent configuration method for the WiFi agent is good, and normal use of other applications on WiFi configured with the WiFi agent is not influenced.

Description

Proxy configuration method, proxy configuration device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to a proxy configuration method, a proxy configuration device and electronic equipment.
Background
Quite a few mobile terminals can configure agents when using WiFi functionality, and most android machines can manually configure agents [ websites that are not used ]. In the case of configuring a WiFi proxy, especially for a WiFi manual proxy, when using WiFi networking, part of the applications may fail in request due to certificate problem, and the user usually has two operation modes as follows:
(1) Selecting a manual closing agent, wherein the mode is equivalent to switching to not open the agent, and is inconsistent with the actual requirement of a user;
(2) The domain name of the app without the agent is manually input, and the domain name is manually input in the mode, so that the requirement on the professional skill of the user is high.
Disclosure of Invention
The embodiment of the application aims to provide a proxy configuration method, a proxy configuration device and electronic equipment, which can solve the problem that the proxy configuration threshold is high.
In order to solve the technical problems, the application is realized as follows:
in a first aspect, an embodiment of the present application provides a proxy configuration method, where the method includes:
under the condition that a WiFi proxy is started and a target page request fails, acquiring a target URL in the target page request; the target page request is a request for opening a target page of a target application;
and determining a target domain name based on the target URL, and configuring the target domain name to disable the WiFi proxy.
In a second aspect, an embodiment of the present application provides an agent configuration apparatus, including:
the first acquisition module is used for acquiring a target URL in a target page request under the condition that a WiFi proxy is started and the target page request fails; the target page request is a request for opening a target page of a target application; the method comprises the steps of carrying out a first treatment on the surface of the
And the first configuration module is used for determining a target domain name based on the target URL and configuring the target domain name to disable the WiFi proxy.
In a third aspect, embodiments of the present application provide an electronic device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, the program or instruction implementing the steps of the method according to the first aspect when executed by the processor.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor implement the steps of the method according to the first aspect.
In a fifth aspect, embodiments of the present application provide a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and where the processor is configured to execute a program or instructions to implement a method according to the first aspect.
In the embodiment of the application, the domain name obtained automatically can be added to the forbidden agent list, so that manual operation of a user is reduced, the use threshold of the function is reduced, and in the use process, the suitability of the application to different types is good, and normal use of WiFi configured with the WiFi agent by other applications is not influenced.
Drawings
FIG. 1 is one of the flowcharts of the proxy configuration method provided in the embodiments of the present application;
FIG. 2 is a second flowchart of a proxy configuration method according to an embodiment of the present application;
FIG. 3 is one of the interface schematic diagrams of the proxy configuration method provided in the embodiment of the present application;
FIG. 4 is a second interface diagram of a proxy configuration method according to an embodiment of the present disclosure;
FIG. 5 is a third interface diagram of a proxy configuration method according to an embodiment of the present disclosure;
FIG. 6 is a fourth interface diagram of a proxy configuration method according to an embodiment of the present application;
FIG. 7 is a block diagram of a proxy configuration device provided in an embodiment of the present application;
fig. 8 is one of schematic structural diagrams of an electronic device according to an embodiment of the present application;
fig. 9 is a second hardware schematic of the electronic device according to the embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
In the prior art, when the agent is manually configured for WiFi, the domain name of the App needs to be manually added to a list (a website which is not used), but a general user does not know the domain name of the App, or part of the App corresponds to a plurality of domain names, so that the user is difficult to know the domain name completely, and when the App is used, the situation that the page is refreshed cannot occur, which causes trouble to the user.
The proxy configuration method, the proxy configuration device, the electronic device and the readable storage medium provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings by specific embodiments and application scenarios thereof.
The proxy configuration method is applicable to terminals and can be executed by, but not limited to, hardware or software in the terminal. The agent configuration method may be executed by a terminal, a control device of the terminal, or the like.
Terminals include, but are not limited to, mobile phones or tablet computers and other portable communication devices having touch-sensitive surfaces (e.g., touch screen displays and/or touchpads). It should also be appreciated that in some embodiments, the terminal may not be a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or a touch pad).
In the following various embodiments, a terminal including a display and a touch sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The embodiment of the application provides a proxy configuration method, and an execution subject of the proxy configuration method may be a terminal with a WiFi module, a control device of the terminal, or the like.
As shown in fig. 1, the proxy configuration method includes: step 110 and step 120.
Step 110, under the condition that the WiFi proxy is started and the target page request fails, acquiring a target URL (Uniform Resource Locator, uniform resource positioning system) in the target page request;
it can be understood that, when the terminal works normally, the user can open a target Application (APP), under which if a certain page needs to be displayed, the terminal sends a page request to the opposite terminal (such as a server), and under the condition that the network connectivity is normal, the display screen of the terminal can display the target page.
The target page request is a request to open a target page of the target application.
The target application in the proxy configuration method of the embodiment of the present application may be various applications capable of being networked through WiFi, including but not limited to: social class applications, reading class applications, video class applications, game class applications, and the like.
Under the condition that the terminal is in communication connection with the opposite terminal through WiFi and a WiFi proxy is started (such as a WiFi manual proxy), when a user initiates a request for opening a target page of a target application, if the request fails, a target URL in the target page request is obtained.
The target page request of the target application initiated by the user comprises various modes, including clicking a target control corresponding to the target page, and the like.
In the case that the WiFi proxy is started and the target page request fails, there is a considerable possibility that the target application or the target page of the target application does not support the WiFi proxy, and the step is used for automatically acquiring the target URL in the target page request under the condition, so that automatic setting is facilitated.
The target URL may be obtained by intercepting the target page request, so that the target URL included in the target page request may be obtained.
Step 120, determining a target domain name based on the target URL, and configuring the target domain name to disable the WiFi proxy.
In step 110, a target URL included in the target page request is obtained, where the target URL is used to locate a resource on the internet, so that the target URL is generally expressed according to a target format from the display of the target page, and the corresponding target domain name can be conveniently obtained by reading the target information in the target URL.
For example, the obtained target URL is:
http://www.abcdefg.com:1234/news/index.aspboardID=5&ID=12345&page=1#name
the corresponding domain name is www.abcdefg.com.
After determining the target domain name based on the target URL, adding the target domain name to the forbidden agent list, so that the WiFi agent can be bypassed by each page using the target domain name under the application.
There are a number of naming schemes for the forbidden agent list for different systems, including but not limited to: the following objects bypass agents, disable agents, or disable agent list, etc.
The meaning of these different naming schemes are all: the page request initiated by the domain name in the list does not use the corresponding WiFi agent.
Thus, upon a page request initiated by a target domain name configured to disable proxy, wiFi may automatically switch to a non-proxy mode, or to a mobile network mode; the WiFi configuration of the WiFi proxy is automatically switched back when other domain name initiated page requests that are not configured to disable the proxy.
According to the agent configuration method provided by the embodiment of the application, the domain name which is automatically acquired can be added into the forbidden agent list, so that manual operation of a user is reduced, the use threshold of the function is reduced, and in the use process, the suitability of the agent configuration method for the WiFi agent is good, and normal use of other applications on WiFi configured with the WiFi agent is not influenced.
In some embodiments, the proxy configuration method may further include:
outputting first prompt information for prompting a user whether to modify the setting of the WiFi proxy or not under the condition that the WiFi proxy is started and the target page request fails;
configuring the target domain name to disable the WiFi proxy in step 120 includes:
after outputting the first prompt information, receiving a first input of a user;
in response to the first input, the target domain name is configured to disable the WiFi agent.
The first hint information may be presented in at least one of the following ways:
first, the first prompt message may be presented in a form displayed on a display screen.
In this embodiment, as shown in fig. 3, in the case where the WiFi proxy has been turned on and the target page request fails, the display screen may display the popup window "current page request fails, possibly due to the turn-on proxy, whether or not to add the current app initiated request to the list [ unused web site ]? Whether or not to.
The specific expression of the information in the popup window is not limited, and at least the meaning of the selection inquiry needs to be expressed.
It should be emphasized again that the pop-up window is only displayed when the WiFi proxy is already opened and the target page request fails, and if the WiFi proxy is not opened, it can be judged that the problem that the resources are not located due to the WiFi proxy is not caused, and the pop-up window does not need to be displayed.
Second, the first prompt message may be presented in a voice form.
In this embodiment, in the case that the WiFi proxy has been turned on and the target page request fails, the terminal outputs audio information for expressing "whether the current page request fails, possibly due to the turn-on proxy, adds the current app initiated request to the [ unused web site? ".
The first prompt information may be output in one of the two modes of expression, or may be output in both modes of expression.
In this embodiment, the first input is used to determine whether to configure the target domain name to disable the WiFi proxy.
Wherein, based on the different expression forms of the first prompt information, the first input can be expressed as at least one of the following modes:
First, the first input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the first prompt information may be displayed on the display screen, and correspondingly, the first input of the user may be received, and may be displayed in a manner of receiving a touch operation of the user on the display area of the terminal display screen.
For example, in the embodiment shown in fig. 3, the display displays a pop-up window, "failure of the current page request, possibly due to the start of the proxy, to add the request initiated by the current app to the list [ unused web sites? Whether or not to. The first input may appear as a click "yes" operation.
Second, the first input may appear as a voice input.
In this embodiment, the first prompt may be in the form of voice, and correspondingly, receiving the first input of the user may be in the form of receiving voice information of the user.
For example, the first hint information may be "whether the current page request fails, possibly due to the start of the proxy, adds the request initiated by the current app to the list [ unused web sites ]? The terminal may configure the target domain name to disable the WiFi proxy when a voice is received, such as yes.
Third, the first input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the selection of yes or no, and the first input of the user is received, which may be represented by receiving the first input of the user pressing the corresponding entity key; the first input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Of course, in other embodiments, the first input may also take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
After receiving the first input, the terminal may configure the target domain name to disable the WiFi proxy in response to the first input.
In the above embodiment, before configuring the target domain name as the disabled WiFi proxy, the prompt information is output first, and then the target domain name is determined based on the input of the user, so that the intention of the user can be more accurately mastered, and the user can be timely informed of the configuration to be completed, thereby realizing accurate interaction.
In some embodiments, the proxy configuration method may further include:
outputting second prompt information for prompting a user whether to start the no-query function or not under the condition that the WiFi proxy is started and the target page request fails;
Configuring the target domain name to disable the WiFi proxy in step 120 includes:
after outputting the second prompt information, receiving a second input of the user;
in response to the second input, the target domain name is configured to disable the WiFi proxy in the event that the target page request fails again.
The second hint information may be presented in at least one of the following ways:
first, the second prompt may be presented in the form of a display on a display screen.
In this embodiment, as shown in fig. 4, the display screen displays the popup window "is the no-query function turned on? Whether or not to.
The specific expression of the information in the popup window is not limited, and at least the meaning of the selection inquiry needs to be expressed.
Second, the second prompt may be presented in a voice form.
In this embodiment, the terminal outputs audio information for expressing "whether to turn on the no-query function".
The second prompt information may be output in one of the two modes of expression, or may be output in both modes of expression.
In addition, the time nodes for outputting the second prompt information are of various types:
first, the second prompt information is output together with the first prompt information.
In this embodiment, when the WiFi proxy is started and the target page request fails, the first prompt information and the second prompt information are output.
For example, the popup window can simultaneously display the first prompt information and the second prompt information; or the first prompt information and the second prompt information are sequentially broadcast in a voice broadcast mode.
Second, the second prompt information may be output after receiving the first input of the first prompt information from the user.
Taking a voice broadcast manner as an example, the terminal outputs audio information for expressing that "the current page request fails, possibly due to the start of the proxy, is the request initiated by the current app added to the list [ unused web sites? The terminal receives the first input of yes and outputs the second prompt message, namely whether the inquiry-free function is started or not.
Taking the manner of display on the display screen as shown in fig. 3, in the case that the WiFi proxy is turned on and the target page request fails, the display screen may display a popup window as shown in fig. 3, "whether the current page request fails, possibly due to the turn-on proxy, adds the request initiated by the current app to the list? Whether or not to. Receiving a first input of a user click "yes" and then displaying the popup window "do not turn on the no-query function? Whether or not to.
In this embodiment, the second input is used to turn on the no-query function.
Wherein, based on the different expression forms of the second prompt information, the second input can be expressed as at least one of the following modes:
first, the second input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, the second prompt information may be displayed on the display screen, and correspondingly, the second input of the user may be received, and may be displayed in a manner that a touch operation of the user is received in a display area of the terminal display screen.
For example, in the embodiment shown in fig. 4, the display displays a pop-up window "do it turn on no-query function? Whether or not to. The second input may appear as a click "yes" operation. In this way, in the case of the failure of the re-request, the first prompt information for reminding the failure of the page request can be skipped to be output, and the domain name can be directly configured as the forbidden agent.
Second, the second input may appear as a voice input.
In this embodiment, the second prompt may be in the form of speech, and correspondingly, receiving the second input of the user may be in the form of receiving the speech information of the user.
For example, the second prompt may be "do it turn on no-query function? The terminal may set the query-free when receiving the voice like yes, and may skip outputting the first prompt information for prompting the page request failure in case of the re-request failure, and configure the domain name directly as the disabling agent.
Third, the second input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the selection of yes or no, and the second input of the user is received, which may be represented by receiving the second input of the user pressing the corresponding entity key; the second input may also be a combined operation of simultaneously pressing multiple physical keys.
Of course, in other embodiments, the second input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
After receiving the second input, the terminal can respond to the second input, and under the condition that the request fails again, the terminal can skip to output the first prompt information for reminding the page request of failing, and the domain name can be directly configured as a forbidden agent.
The above embodiment mainly uses the selection of "yes" for the first input and the second input as an example, when "no" is selected for the first prompt message, if "yes" is selected for the second prompt message, the first prompt message is not output and the corresponding domain name is not directly configured as the forbidden proxy when the request again fails; when "yes" or "no" is selected for the first hint information, if "no" is selected for the second hint information, the first hint information is output again when the re-request fails.
In the above embodiment, by outputting the prompt information for setting the no-query, after the user determines, the operation of the same scene can be simplified, and the disturbance to the normal use of App by the user can be reduced.
After configuring the target domain name to disable the WiFi proxy in step 120, the method may further include: and outputting a third prompt message.
The third prompt information is used for prompting the user that the configuration is completed, and similar to the first prompt information and the second prompt information, the third prompt information can be displayed in a display screen or in a voice mode.
As shown in fig. 5, taking the third prompt information as an example of display screen display, after the target domain name is configured to disable the WiFi agent, a popup prompt "has been added successfully, please refresh retry, if still access fails, please check other reasons" is displayed.
In this way, the user can be informed of the change in setting in time.
In some embodiments, step 120, configuring the target domain name to disable the WiFi proxy includes:
establishing a corresponding relation between a target domain name and a target application;
it will be appreciated that the domain name is determined by the target URL in the target page request, and the page request corresponds to a certain page of the target application, typically one target application corresponds to one or more target domain names, but each domain name corresponds to only one target application.
By setting the corresponding relation between the target domain name and the target application, the user can conveniently perform the visual operation.
Correspondingly, after configuring the target domain name to disable the WiFi proxy, the proxy configuration method may further include:
receiving a third input of a user on the agent configuration display interface; in response to the third input, displaying a proxy configuration control, the proxy configuration control comprising an icon of the target application corresponding to the domain name;
in this embodiment, the third input is for displaying a proxy configuration control.
Wherein the third input may be represented as at least one of:
first, the third input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, when a correspondence relationship between the domain name and the target application is established, through the third input, the proxy configuration interface may be entered, and in the proxy configuration control on the proxy configuration interface, the domain name that has been configured to disable the proxy and the icon of the corresponding target application may be displayed.
As shown in fig. 6, in the proxy configuration control of the proxy configuration interface [ unused web site ], icons of domain names that have been configured to disable the proxy and corresponding target applications are displayed:
icon X, domain name app.xxx.com of the target application; mail.XXX.com
Icon T of target application, domain name app.yyy.com; mail.YYY.com
And each target application is also displayed with a corresponding selection frame.
Second, the third input may appear as a voice input.
In this embodiment, the third prompt may be in the form of speech, and correspondingly, receiving the third input from the user may be in the form of receiving the speech information from the user.
For example, the third hint may be "enter WiFi advanced settings".
Third, the third input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with a corresponding physical key, and the receiving of the third input of the user may be represented by receiving the third input of the user pressing the corresponding physical key; the third input may also be a combined operation of simultaneously pressing multiple physical keys.
Of course, in other embodiments, the third input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
After receiving the third input, the terminal may display a proxy configuration control in response to the third input.
Therefore, the method not only can automatically configure the domain name of the forbidden agent, but also can realize the visual interface of the target application under the function, thereby being convenient for the manual maintenance and setting of users.
Receiving a fourth input of a user to the agent configuration control;
in response to the fourth input, a configuration corresponding to the proxy configuration control is modified.
In this embodiment, the fourth input is used to modify list information in the proxy configuration control.
Wherein the fourth input may be represented as at least one of:
first, the fourth input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
As shown in fig. 6, in the proxy configuration control of the proxy configuration interface [ unused web site ], icons of domain names that have been configured to disable the proxy and corresponding target applications are displayed:
icon X, domain name app.xxx.com of the target application; mail.XXX.com
Icon T of target application, domain name app.yyy.com; mail.YYY.com
And each target application is also displayed with a corresponding selection frame.
The fourth input may be represented as an operation of clicking on the selection box, and manual management of the configuration list may be achieved through manual hooking and deletion.
Second, the fourth input may appear as a voice input.
In this embodiment, the third prompt may be in the form of speech, and correspondingly, receiving the fourth input of the user may be in the form of receiving the speech information of the user.
For example, the third hint information may be "delete X in unused web sites".
Third, the fourth input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with a corresponding physical key, and the receiving of the fourth input of the user may be represented by receiving the fourth input of the user pressing the corresponding physical key; the fourth input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Of course, in other embodiments, the fourth input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
In this way, the icon of the target application and the corresponding domain name are displayed on the corresponding configuration display interface, so that visual operation and maintenance can be realized.
The following describes embodiments of the present application in detail from two different implementation angles, respectively, regarding how to obtain a target URL in a target page request.
1. And refreshing the current target page.
In this embodiment, the step of obtaining the target URL in the target page request may include:
receiving a seventh input of refreshing the target page by a user;
generating a target page request in response to the seventh input;
a target URL of the target page request is obtained.
In this embodiment, the seventh input is used to refresh the target page.
Wherein the seventh input may be represented as at least one of:
first, the seventh input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, receiving the seventh input of the user may be represented by receiving a touch operation of the user in the display area of the terminal display screen.
To reduce the user's rate of misoperation, the seventh input may be defined as a specific gesture, such as performing a pull-down in a pressed state; or displaying the target control on the current interface, and touching the target control to realize the seventh input.
Second, the seventh input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to refreshing, and the seventh input of the user is received, which may be represented by receiving the seventh input of the user pressing the corresponding entity key; the seventh input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Third, the seventh input may appear as a voice input.
In this embodiment, the terminal may refresh the current target page upon receiving speech, such as "refresh".
Of course, in other embodiments, the seventh input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
After receiving the seventh input, the terminal may respond to the seventh input to generate a target page request, and intercept the request at this time, thereby obtaining a target URL of the target page request.
2. And exiting the target page.
In this embodiment, the step of obtaining the target URL in the target page request may include:
receiving an eighth input that the user exits the target page;
generating page requests for other pages in response to the eighth input;
Acquiring target URLs in target page requests of other pages;
configuring the target domain name to disable the WiFi proxy includes:
in the event that the request fails, the target domain name is configured to disable the WiFi proxy.
In this embodiment, the eighth input is for exiting the target page, and when exiting the target page, the target application is not exited, other pages are requested.
Wherein the eighth input may be represented as at least one of:
first, the eighth input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, receiving the eighth input of the user may be represented by receiving a touch operation of the user in the display area of the terminal display screen.
To reduce the user's rate of misoperation, the eighth input may be defined as a specific gesture, such as pulling from the side region to the center of the screen in a pressed state; or displaying the target control on the current interface, and touching the target control to realize eighth input.
Second, the eighth input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to the backward direction, and the eighth input of the user is received, which may be represented by receiving the eighth input of the user pressing the corresponding entity key; the eighth input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Third, the eighth input may be represented as a voice input.
In this embodiment, the terminal may trigger a return to the previous page when a voice such as "back" is received.
Of course, in other embodiments, the eighth input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
After receiving the eighth input, the terminal can respond to the eighth input to generate page requests for other pages; at this time, the request is intercepted, and the target URL in the target page request of other pages can be obtained.
For new page requests, the target domain name is configured to disable the WiFi proxy in the event the request fails.
In some embodiments, the proxy configuration method may further include:
receiving a fifth input of a user on the agent configuration display interface;
in response to the fifth input, displaying an application selection list;
in this embodiment, the fifth input is for causing the display to display an application selection list at the proxy configuration display interface.
Wherein the fifth input may be represented as at least one of:
first, the fifth input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, receiving the fifth input of the user may be performed by receiving a touch operation of configuring the display interface at the terminal agent by the user.
For example, in the interface shown in fig. 6, clicking on [ unused web site ], an application selection list may be displayed. In the application selection list, applications with configurations are displayed in an array.
Second, the fifth input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with a corresponding physical key, and the receiving of the fifth input of the user may be represented by receiving the fifth input of the user pressing the corresponding physical key; the fifth input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Third, the fifth input may appear as a voice input.
In this embodiment, the terminal may trigger the display of the application selection list upon receiving a voice such as "open application list of proxy configuration display interface".
Of course, in other embodiments, the fifth input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
The terminal, after receiving the fifth input, may display an application selection list in response to the fifth input.
Receiving a sixth input of the user to the application selection list;
in response to the sixth input, at least two domain names corresponding to the target application are configured to disable the proxy.
In this embodiment, the sixth input is for selecting the target application from the application selection list.
Wherein the sixth input may be represented as at least one of:
first, the sixth input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, receiving the sixth input of the user may be represented by receiving a touch operation of the user in the display area of the terminal display screen.
In actual execution, each application in the application selection list has a corresponding selection box, and the selection can be realized by clicking.
Second, the sixth input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key corresponding to selection or determination, and the sixth input of the user is received, which may be represented by receiving the sixth input of the user pressing the corresponding entity key; the sixth input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Third, the sixth input may appear as a voice input.
In this embodiment, the terminal may configure the domain name of the 3 rd application to disable the WiFi proxy upon receiving speech such as "select 3 rd application".
Of course, in other embodiments, the sixth input may take other forms, including but not limited to character input, etc., which may be specifically determined according to actual needs, which is not limited in this embodiment of the present application.
After receiving the sixth input, the terminal may configure the domain name of the target application to disable the proxy in response to the sixth input.
According to the embodiment, the configuration can be manually performed on the WiFi configuration page directly under the condition of being separated from the use environment of the target application, the user does not need to know the target domain name of the target application, a plurality of target domain names can be configured to disable the WiFi proxy at one time, the use is convenient, and the operation difficulty is low.
It should be noted that, in the proxy configuration method provided in the embodiment of the present application, the execution body may be a proxy configuration device, or a control module in the proxy configuration device for executing the loading proxy configuration method. In the embodiment of the present application, an example is taken as an agent configuration processing method executed by an agent configuration device, which is described in the embodiment of the present application.
As shown in fig. 2, the proxy configuration method includes: step 210-step 290.
Step 210, determining whether the current page request fails.
In actual execution, the processor may determine whether the current page request failed based on information fed back by the network module.
Under the condition that the current page request is successful, the configuration method is directly ended, and normal display is executed.
Step 220, if the current page request fails, whether to start the WiFi proxy of the WiFi configuration currently.
The page request fails for various reasons, such as network disconnection, server downtime, terminal failure, etc., and whether the proxy configuration is needed can be determined in advance by determining whether the WiFi proxy for the WiFi configuration is currently started.
And directly ending the configuration method under the condition that the processor determines that the WiFi proxy of the WiFi configuration is not started.
In the case of determining that the WiFi agent of the WiFi configuration is currently turned on, there may be two paths corresponding to step 231 and step 232, respectively, based on whether the user refreshes the current interface or exits the current page next.
And 231, refreshing the current page, intercepting the request of the current page, and obtaining the URL.
In this embodiment, the user presses the display screen at the current page, and performs a pull-down in the pressed state; or displaying a target control for refreshing on the current interface, touching the target control, and refreshing the current page; after receiving the seventh input, the terminal may respond to the seventh input to generate a target page request, and intercept the request at this time, thereby obtaining a target URL of the target page request.
And 232, exiting the current page, initiating other page requests, intercepting the requests, and obtaining the target URL.
In the embodiment, receiving touch operation of a user in a display area of a terminal display screen, exiting a current page, and initiating other page requests; at this time, the request is intercepted, and the target URL in the target page request of other pages can be obtained.
Step 240, outputting the first prompt message.
The first prompt message is used for reminding the user of failure of the page request.
As shown in fig. 3, in the case where the WiFi proxy has been turned on and the target page request fails, the display screen may display the popup window shown in fig. 3, "whether the current page request fails, possibly due to the turn-on proxy, adds the current app initiated request to the [ (not used) web site? Whether or not to.
Determining whether the user chooses to agree?
In the case where the user selects "no", the configuration method is directly ended.
Step 250, in the case that the user selects "yes", the domain name is added to the [ in the non-supporting website ], and the current app name and the corresponding relation thereof are saved.
At this step, it may be selected not to jump to the configuration page as shown in fig. 6, but to continue displaying the current interface.
Step 260, after the addition is successful, the user is prompted.
After configuring the target domain name to disable the WiFi agent, a popup window prompt "successful added, please refresh retry, if still access failed, please check for other reasons" is displayed as shown in fig. 5.
In this way, the user can be informed of the change in setting in time.
Step 270, initiate the request again and succeed.
The user can initiate the request again by refreshing the current page or backing up, and under the condition of unsuccessful, the user can determine that the fault is not the WiFi setting, and the configuration method can be directly ended at the moment; in case of success, the next step is entered.
Step 280, continuing to monitor other requests of the current app, and if the request fails, repeating step 250.
It should be noted that, the current app may contain multiple domain names, so, under other requests, there may be a case that the request fails, and if the request fails, the process returns to step 250 again, and the domain name is added continuously.
In step 290, the domain name after addition can be viewed in the page of the WiFi configuration.
As shown in fig. 6, the icon of the target application and the corresponding domain name are displayed on the corresponding configuration display interface, so that visual operation and maintenance can be realized.
The embodiment of the application also provides a proxy configuration device.
As shown in fig. 7, the agent configuration device includes: a first acquisition module 710 and a first configuration module 720.
A first obtaining module 710, configured to obtain a target URL in a target page request when the WiFi proxy is turned on and the target page request fails; the target page request is a request for opening a target page of the target application;
the first configuration module 720 is configured to determine a target domain name based on the target URL, and configure the target domain name to disable the WiFi proxy.
According to the agent configuration device provided by the embodiment of the application, the domain name which is automatically acquired can be added into the forbidden agent list, so that manual operation of a user is reduced, the use threshold of the function is reduced, and in the use process, the suitability of the agent configuration device for different types of applications is good, and normal use of WiFi configured with the WiFi agent by other applications is not influenced.
In some embodiments, the apparatus may further comprise:
the first output module is used for outputting first prompt information when the WiFi agent is started and the target page request fails, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi agent or not;
The first configuration module is further used for receiving a first input of a user after outputting the first prompt information; in response to the first input, the target domain name is configured to disable the WiFi agent.
In some embodiments, the apparatus may further comprise:
the second output module is used for outputting second prompt information when the WiFi agent is started and the target page request fails, wherein the second prompt information is used for prompting a user whether to start the query-free function;
the first configuration module is further used for receiving a second input of the user after outputting the second prompt information; in response to the second input, the target domain name is configured to disable the WiFi proxy in the event that the target page request fails again.
In some embodiments, the first configuration module is further configured to establish a correspondence between the domain name and the target application;
the apparatus may further include:
the third receiving module is used for receiving a third input of a user on the agent configuration display interface after the target domain name is configured to disable the WiFi agent;
the first display module is used for responding to the third input and displaying a proxy configuration control, and the proxy configuration control comprises an icon of a target application corresponding to the domain name;
The fourth receiving module is used for receiving a fourth input of the agent configuration control by a user;
and the second configuration module is used for responding to the fourth input and modifying the configuration corresponding to the proxy configuration control.
In some embodiments, the first acquisition module may also be configured to
Receiving a seventh input of refreshing the target page by a user;
generating a target page request in response to the seventh input;
a target URL of the target page request is obtained.
In some embodiments, the first acquisition module may also be configured to
Receiving an eighth input that the user exits the target page;
generating page requests for other pages in response to the eighth input;
acquiring target URLs in target page requests of other pages;
the first configuration module is further configured to configure the target domain name to disable the WiFi proxy if the request fails.
In some embodiments, the proxy configuration apparatus may further include:
the fifth receiving module is used for receiving a fifth input of the user on the agent configuration display interface;
a second display module for displaying an application selection list in response to a fifth input;
a sixth receiving module, configured to receive a sixth input of the user on the application selection list;
and the third configuration module is used for responding to the sixth input and configuring at least two domain names corresponding to the target application as forbidden agents.
The proxy configuration device in the embodiment of the application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a cell phone, tablet computer, notebook computer, palm computer, vehicle-mounted electronic device, wearable device, ultra-mobile personal computer (ultra-mobile personal computer, UMPC), netbook or personal digital assistant (personal digital assistant, PDA), etc., and the non-mobile electronic device may be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and the embodiments of the present application are not limited in particular.
The proxy configuration device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of the present application.
The proxy configuration device provided in the embodiment of the present application can implement each process implemented by the proxy configuration device in the method embodiments of fig. 1 to 6, and in order to avoid repetition, a description is omitted here.
As shown in fig. 8, the embodiment of the present application further provides an electronic device, including a processor 820, a memory 810, and a program or an instruction stored in the memory 810 and capable of running on the processor 820, where the program or the instruction implements each process of the above-mentioned proxy configuration method embodiment when executed by the processor 820, and the same technical effects can be achieved, and for avoiding repetition, a detailed description is omitted herein.
It should be noted that, the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 9 is a schematic hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 900 includes, but is not limited to: radio frequency unit 901, network module 902, audio output unit 903, input unit 904, sensor 905, display unit 906, user input unit 907, interface unit 908, memory 909, and processor 910.
Those skilled in the art will appreciate that the electronic device 900 may also include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 910 by a power management system to perform functions such as managing charge, discharge, and power consumption by the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than shown, or may combine certain components, or may be arranged in different components, which are not described in detail herein.
The processor 910 is configured to obtain a target URL in the target page request when the WiFi proxy is turned on and the target page request fails; the target page request is a request for opening a target page of the target application;
a processor 910 is configured to determine a target domain name based on the target URL and configure the target domain name to disable the WiFi proxy.
According to the electronic equipment provided by the embodiment of the application, the domain name which is automatically acquired can be added into the forbidden proxy list, so that manual operation of a user is reduced, the use threshold of the function is reduced, and in the use process, the suitability of the electronic equipment for different types of applications is good, and normal use of WiFi configured with the WiFi proxy by other applications is not influenced.
Optionally, the display unit 906 or the audio output unit 903 may be configured to output first prompting information when the WiFi agent is turned on and the target page request fails, where the first prompting information is used to prompt the user whether to modify the setting of the WiFi agent;
a user input unit 907 for receiving a first input of a user after outputting the first prompt information;
the processor 910 is further configured to configure the target domain name to disable the WiFi proxy in response to the first input.
Optionally, the display unit 906 or the audio output unit 903 may be configured to output a second prompt message when the WiFi proxy is turned on and the target page request fails, where the second prompt message is used to prompt the user whether to turn on the no-query function;
a user input unit 907 for receiving a second input of the user after outputting the second prompt information;
the processor 910 is further configured to configure the target domain name to disable the WiFi proxy if the target page request fails again in response to the second input.
Optionally, the processor 910 is further configured to establish a correspondence between the domain name and the target application;
a user input unit 907, further configured to receive a third input from the user at the agent configuration display interface after configuring the target domain name to disable the WiFi agent;
the processor 910 is further configured to display, in response to the third input, a proxy configuration control, the proxy configuration control including an icon of the target application corresponding to the domain name;
a user input unit 907, further configured to receive a fourth input of a proxy configuration control by the user;
the processor 910 is further configured to modify a configuration corresponding to the proxy configuration control in response to the fourth input.
Optionally, the user input unit 907 is further configured to receive a seventh input for refreshing the target page by the user;
The processor 910 is further configured to generate a target page request in response to the seventh input; acquiring a target URL of a target page request;
optionally, the user input unit 907 is further configured to receive an eighth input that the user exits from the target page;
generating page requests for other pages in response to the eighth input;
the processor 910 is further configured to obtain a target URL in a target page request for another page; in the event that the request fails, the target domain name is configured to disable the WiFi proxy.
Optionally, the user input unit 907 is further configured to receive a fifth input from the user on the proxy configuration display interface;
the processor 910 is further configured to display an application selection list in response to the fifth input;
a user input unit 907 for receiving a sixth input of a user selection list of applications;
the processor 910 is further configured to configure at least two domain names corresponding to the target application to disable the proxy in response to the sixth input.
It should be noted that, in this embodiment, the above-mentioned electronic device 900 may implement each process in the method embodiment of the present application, and achieve the same beneficial effects, and in order to avoid repetition, the description is omitted here.
It should be appreciated that in embodiments of the present application, the input unit 904 may include a graphics processor (Graphics Processing Unit, GPU) 9041 and a microphone 9042, with the graphics processor 9041 processing image data of still pictures or video obtained by an image capture device (e.g., a camera) in a video capture mode or an image capture mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes a touch panel 9071 and other input devices 9072. Touch panel 9071, also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein. Memory 909 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 910 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 910.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored, and when the program or the instruction is executed by a processor, the processes of the above-mentioned proxy configuration method embodiment are implemented, and the same technical effects can be achieved, so that repetition is avoided, and no further description is given here.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, the chip includes a processor and a communication interface, the communication interface is coupled with the processor, and the processor is used for running a program or an instruction, so as to implement each process of the above agent configuration method embodiment, and achieve the same technical effect, so that repetition is avoided, and no redundant description is provided here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may also be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), including several instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those of ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are also within the protection of the present application.

Claims (12)

1. A proxy configuration method, comprising:
under the condition that a WiFi proxy is started by a terminal and a target page request fails, acquiring a target URL in the target page request; the target page request is a request for opening a target page of a target application, and the opening of the WiFi proxy indicates that the target application or the target page is networked through the WiFi proxy;
determining a target domain name based on the target URL, and configuring the target domain name to disable the WiFi proxy;
the configuring the target domain name to disable the WiFi proxy includes:
and establishing a corresponding relation between the target domain name and the target application.
2. The proxy configuration method of claim 1, wherein the method further comprises:
outputting first prompt information when the WiFi agent is started and the target page request fails, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi agent;
the configuring the target domain name to disable the WiFi proxy includes:
after the first prompt information is output, receiving a first input of a user;
in response to the first input, the target domain name is configured to disable the WiFi proxy.
3. The proxy configuration method of claim 1, wherein the method further comprises:
outputting second prompt information for prompting a user whether to start the query-free function or not under the condition that the WiFi proxy is started and the target page request fails;
the configuring the target domain name to disable the WiFi proxy includes:
after outputting the second prompt information, receiving a second input of the user;
in response to the second input, the target domain name is configured to disable the WiFi proxy if the target page request fails again.
4. A proxy configuration method according to any one of claims 1 to 3, characterized in that,
after the configuring the target domain name to disable the WiFi proxy, the method further includes:
receiving a third input of a user on the agent configuration display interface;
in response to the third input, displaying a proxy configuration control, the proxy configuration control comprising an icon of the target application corresponding to the target domain name;
receiving a fourth input of a user to the agent configuration control;
and modifying the configuration corresponding to the proxy configuration control in response to the fourth input.
5. A proxy configuration method according to any one of claims 1-3, further comprising:
receiving a fifth input of a user on the agent configuration display interface;
displaying an application selection list in response to the fifth input;
receiving a sixth input of a user to the application selection list;
and in response to the sixth input, configuring at least two domain names corresponding to the target application to disable the proxy.
6. An agent configuration device, comprising:
the first acquisition module is used for acquiring a target URL in a target page request under the condition that a WiFi proxy is started by a terminal and the target page request fails; the target page request is a request for opening a target page of a target application, and the opening of the WiFi proxy indicates that the target application or the target page is networked through the WiFi proxy;
the first configuration module is used for determining a target domain name based on the target URL and configuring the target domain name to disable the WiFi proxy;
the first configuration module is further configured to establish a correspondence between the target domain name and the target application.
7. The proxy configuration device of claim 6, wherein the device further comprises:
The first output module is used for outputting first prompt information when the WiFi agent is started and the target page request fails, wherein the first prompt information is used for prompting a user whether to modify the setting of the WiFi agent or not;
the first configuration module is further configured to receive a first input of a user after outputting the first prompt information; in response to the first input, the target domain name is configured to disable the WiFi proxy.
8. The proxy configuration device of claim 6, wherein the device further comprises:
the second output module is used for outputting second prompt information when the WiFi agent is started and the target page request fails, wherein the second prompt information is used for prompting a user whether to start the no-query function;
the first configuration module is further configured to receive a second input of the user after outputting the second prompt information; in response to the second input, the target domain name is configured to disable the WiFi proxy if the target page request fails again.
9. Agent configuration device according to any of the claims 6-8, characterized in that,
the apparatus further comprises:
The third receiving module is used for receiving a third input of a user on the agent configuration display interface after the target domain name is configured to disable the WiFi agent;
a first display module for displaying a proxy configuration control in response to the third input, the proxy configuration control including an icon of the target application corresponding to the target domain name;
the fourth receiving module is used for receiving a fourth input of the agent configuration control by a user;
and the second configuration module is used for responding to the fourth input and modifying the configuration corresponding to the proxy configuration control.
10. The proxy configuration device according to any one of claims 6 to 8, further comprising:
the fifth receiving module is used for receiving a fifth input of the user on the agent configuration display interface;
a second display module for displaying an application selection list in response to the fifth input;
a sixth receiving module, configured to receive a sixth input from a user to the application selection list;
and the third configuration module is used for responding to the sixth input and configuring at least two domain names corresponding to the target application as forbidden agents.
11. An electronic device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the proxy configuration method as claimed in any one of claims 1 to 5.
12. A readable storage medium, characterized in that the readable storage medium has stored thereon a program or instructions which, when executed by a processor, implement the steps of the agent configuration method according to any of claims 1-5.
CN202110385238.0A 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment Active CN113141621B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110385238.0A CN113141621B (en) 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110385238.0A CN113141621B (en) 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment

Publications (2)

Publication Number Publication Date
CN113141621A CN113141621A (en) 2021-07-20
CN113141621B true CN113141621B (en) 2023-04-28

Family

ID=76811141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110385238.0A Active CN113141621B (en) 2021-04-09 2021-04-09 Proxy configuration method, proxy configuration device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113141621B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103125135A (en) * 2010-09-16 2013-05-29 高通股份有限公司 Power conservation in wireless client terminals using proxy device
CN111447624A (en) * 2020-03-04 2020-07-24 浙江大华技术股份有限公司 WiFi equipment, network distribution method thereof and device with storage function

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0021083D0 (en) * 2000-08-25 2000-10-11 Claripoint Ltd Web page access
CN106878458A (en) * 2017-03-24 2017-06-20 福建中金在线信息科技有限公司 A kind of proxy access method and system
CN110362416B (en) * 2018-03-26 2022-03-25 腾讯科技(深圳)有限公司 Page component loading method and device, electronic equipment and storage medium
CN111064795B (en) * 2019-12-20 2021-05-14 腾讯科技(深圳)有限公司 Web page access acceleration method, system, computer equipment, server and medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103125135A (en) * 2010-09-16 2013-05-29 高通股份有限公司 Power conservation in wireless client terminals using proxy device
CN111447624A (en) * 2020-03-04 2020-07-24 浙江大华技术股份有限公司 WiFi equipment, network distribution method thereof and device with storage function

Also Published As

Publication number Publication date
CN113141621A (en) 2021-07-20

Similar Documents

Publication Publication Date Title
WO2018137467A1 (en) Display method and mobile terminal utilizing split screen
TWI604368B (en) Data processing method and device
RU2614567C2 (en) Method and mobile terminal device for performing operations with images
CN106453925B (en) Information transmission method and mobile terminal
CN112306325B (en) Interaction control method and device
CN102647515B (en) Terminal state displaying control method and device
US10796087B2 (en) Method and apparatus for obtaining web content
WO2021238840A1 (en) Information sharing method, information sharing apparatus, and electronic device
WO2021233282A1 (en) Method and apparatus for displaying message detail page, and electronic device
CN112148178A (en) Application switching method and device, electronic equipment and readable storage medium
CN113194200B (en) Message display method and device and electronic equipment
WO2023030265A1 (en) Control method and electronic device
CN111813305A (en) Application program starting method and device
CN110851057A (en) Method and device for configuring configuration options of BIOS
CN113114845A (en) Notification message display method and device
CN112711366A (en) Image generation method and device and electronic equipment
CN108073610B (en) Method and device for realizing webpage loading
CN112148167A (en) Control setting method and device and electronic equipment
CN113992615B (en) Method and device for displaying withdrawal message, electronic equipment and storage medium
US20240089223A1 (en) Information display method and apparatus, and electronic device
CN112291412B (en) Application program control method and device and electronic equipment
CN107728898B (en) Information processing method and mobile terminal
CN113867585A (en) Interface display method and device, electronic equipment and storage medium
CN111766987B (en) Application program management method and device and electronic equipment
AU2015383793A1 (en) Fingerprint event processing method, apparatus, and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant