CN113886738A - CEF-based custom protocol extension method - Google Patents

CEF-based custom protocol extension method Download PDF

Info

Publication number
CN113886738A
CN113886738A CN202111148699.2A CN202111148699A CN113886738A CN 113886738 A CN113886738 A CN 113886738A CN 202111148699 A CN202111148699 A CN 202111148699A CN 113886738 A CN113886738 A CN 113886738A
Authority
CN
China
Prior art keywords
protocol
cef
user
webpage
url
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111148699.2A
Other languages
Chinese (zh)
Other versions
CN113886738B (en
Inventor
王振江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongjiao Yunzhi Digital Technology Co ltd
Original Assignee
Zhongjiao Yunzhi Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongjiao Yunzhi Digital Technology Co ltd filed Critical Zhongjiao Yunzhi Digital Technology Co ltd
Priority to CN202111148699.2A priority Critical patent/CN113886738B/en
Priority claimed from CN202111148699.2A external-priority patent/CN113886738B/en
Publication of CN113886738A publication Critical patent/CN113886738A/en
Application granted granted Critical
Publication of CN113886738B publication Critical patent/CN113886738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9577Optimising the visualization of content, e.g. distillation of HTML documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • G06F16/986Document structures and storage, e.g. HTML extensions

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a CEF-based method for expanding a custom protocol, which specifically comprises the steps that a user accesses an embedded webpage home page; accessing a CEF frame, accessing a home page to the CEF frame, and intercepting various webpage requests sent in a webpage based on an API provided by the CEF frame; and (4) selecting whether to define the protocol by the user, entering a normal request until the protocol is finished if the protocol is not defined, and determining the logic of the defined protocol until the protocol is finished if the protocol is defined by the user. The scheme can completely support the http protocol, has high performance and is a good choice for the local development of the webpage; the self-defined protocol can be expanded through the CEF framework, and local application is awakened, so that barriers among different platforms are fundamentally solved; the user can directly use the application without specially selecting a browser, and can use the functions of the web application without difference; the abnormal condition of webpage rendering is avoided, and the use is convenient.

Description

CEF-based custom protocol extension method
Technical Field
The application relates to the technical field of custom protocols, in particular to a method for expanding a custom protocol based on a CEF.
Background
The Chrome Embedded Framework (CEF) is an open-source Web browser control based on the Google chrome project and supports Windows, Linux and Mac platforms. The Chrome Embedded Framework (CEF) is an open-source Web browser control based on the Google chrome project and supports Windows, Linux and Mac platforms. Besides providing a C/C + + interface, there are also port-fixes for other languages.
Many websites providing one-stop service now have not only web side, but also PC client side, and the advantage of PC side is that better experience can be brought to the user. Therefore, many web pages can wake up the client, getting through the barriers of the browser and the local application, but at the same time, problems arise, and different browsers are not good for detecting the local software and opening support.
Because the CEF is based on the chrome, the CEF naturally supports some common network protocols of the browser, such as the http protocol, the ftp protocol, and the like. However, if the local application is to be woken up, the framework must be able to customize, because the local application will generally write the relevant information installed in the system registry and then expose the information to the outside world as an accessible protocol string, and the current problem is that because the CEF cannot identify the information, the rendering of the web page is abnormal, and the use is affected.
Disclosure of Invention
The application mainly aims to provide a method for expanding a custom protocol based on a CEF (Web edge Format), so as to solve the problem that the CEF cannot identify the protocol, so that the webpage rendering is abnormal and the use is influenced in the related technology.
In order to achieve the above object, the present application provides a method for extending a custom protocol based on CEF, which specifically includes the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage;
s2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In an embodiment of the present application, in the step S1, the embedded web page is specifically constructed by, but not limited to, an application framework technology, a script component technology, a script file technology, and a built-in behavior technology.
In an embodiment of the present application, in the step S2, a specific manner of intercepting various web page requests sent in a web page is as follows: and (3) using an OnBeforeBrowseCallback method, acquiring the url in the method, and performing probable logic operation according to the specific content of the url.
In an embodiment of the present application, the method for implementing the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
and acquiring the url, and acquiring the url comprising the resource type, the host domain name for storing the resource and the resource file name in the processes of request interception and user-defined processing.
In one embodiment of the present application, the possible logical operations are specifically performed in the following manner;
if url, zjyzpep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
In an embodiment of the present application, in S2, a specific manner for the CEF framework to provide the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Compared with the prior art, the beneficial effects of this application are:
1. according to the method for expanding the custom protocol based on the CEF, the CEF is based on the chrome, so that the method naturally supports some common network protocols of the browser, such as an http protocol, an ftp protocol and the like, can completely support the http protocol, has high performance, and is a good choice for the localized development of the webpage;
2. the method for expanding the custom protocol based on the CEF can expand the custom protocol through the CEF framework and wake up the local application, thereby fundamentally solving the barriers between different platforms;
3. according to the method for expanding the custom protocol based on the CEF, the user can directly use the application without specially selecting a browser, and the function of the web application can be used without difference;
4. the method for expanding the custom protocol based on the CEF avoids the occurrence of abnormal webpage rendering and is convenient to use.
Drawings
Fig. 1 is a schematic block diagram of a flow chart of a method for extending a custom protocol based on CEF provided in an embodiment of the present application;
fig. 2 is a schematic block diagram of a flowchart of specific steps of an onbeforebrowse ecallback method based on a CEF extension custom protocol method according to an embodiment of the present application;
fig. 3 is a schematic block flow diagram illustrating a specific manner in which a CEF framework of a method for extending a custom protocol based on CEF provided in an embodiment of the present application provides an API;
fig. 4 is a programming diagram illustrating the above or possible logical operations of the method for extending the custom protocol based on CEF according to the embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
In addition, the term "plurality" shall mean two as well as more than two.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
Referring to fig. 1 to 4, the present application provides a method for extending a custom protocol based on CEF, which specifically includes the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage, and the embedded webpage adopts an application frame technology;
in the method for embedding the external page in the host page by applying the framework technology, a "< IFRAME name ═ XXX" width ═ X height ═ X frame warder ═ 0 src ═ XXX. If the embedded external page is too long and the scroll bar does not appear, adding "scroll no" into the external file < body > tag or adding "scroll no" into the host page < IFRAME > tag.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Example 2
A method for expanding a custom protocol based on CEF specifically comprises the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage, and the embedded webpage uses script components technology;
it should be noted that, using the script component technology, a method for applying this technology is to insert "< OBJECT style ═ border: a statement of 0px "type ═ text/X-script" data ═ xxx.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Example 3
A method for expanding a custom protocol based on CEF specifically comprises the following steps:
s1, accessing by a user, wherein the user accesses the embedded webpage home page, and the embedded webpage uses a script file technology;
it should be noted that, by using the script file technology, the document. The method is that "< SCRIPT language" < "> src" > is inserted into the position of the host page containing the external page, then the external page is modified, and each line content is written into document.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Example 4
A method for expanding a custom protocol based on CEF specifically comprises the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage, and the embedded webpage uses a built-in behavior technology;
it should be noted that using built-in behavior technology, a new functionality also known as "DHTML behavior", and having a number of default behaviors built in, when a behavior is applied to a standard HTML element on a host page, it can enhance the default functionality of that element and provide any new methods, attributes or events defined in that behavior.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
It should be noted that the.net Framework (NET Framework) is developed by microsoft, and is a software development platform dedicated to Agile software development (Agile software development), rapid application development (rapid application development), platform independence, and network transparency. NET is the first step microsoft has taken for the next decade for server and desktop software engineering. NET contains many technologies that contribute to the rapid development of internet and intranet applications.
The method is developed based on a CEF framework and net, and besides a protocol supported by a browser naturally, such as a websocket protocol, an http protocol and an ftp protocol, customized development of a custom protocol is also supported.
In summary, the method for expanding the custom protocol based on the CEF can completely support the http protocol, has high performance, and is a good choice for the localized development of the webpage; the self-defined protocol can be expanded through the CEF framework, and local application is awakened, so that barriers among different platforms are fundamentally solved; the user can directly use the application without specially selecting a browser, and can use the functions of the web application without difference; the abnormal condition of webpage rendering is avoided, and the use is convenient.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (6)

1. A method for expanding a custom protocol based on CEF is characterized by comprising the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage;
s2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
2. The method of claim 1, wherein in the step S1, the embedded web page is specifically constructed by means of application framework technology, script components technology, script file technology and built-in behavior technology.
3. The method according to claim 1, wherein in step S2, intercepting various web page requests sent in the web page is performed by: and (3) using an OnBeforeBrowseCallback method, acquiring the url in the method, and performing probable logic operation according to the specific content of the url.
4. The method of claim 3, wherein the OnBeforeBrowseCall Back method comprises the following steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
and acquiring the url, and acquiring the url comprising the resource type, the host domain name for storing the resource and the resource file name in the processes of request interception and user-defined processing.
5. The method of claim 3, wherein the possible logical operations are specifically performed by;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
6. The method according to claim 1, wherein in S2, the CEF framework provides the API in a specific manner as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
CN202111148699.2A 2021-09-29 CEF (CEF) -based method for expanding custom protocol Active CN113886738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111148699.2A CN113886738B (en) 2021-09-29 CEF (CEF) -based method for expanding custom protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111148699.2A CN113886738B (en) 2021-09-29 CEF (CEF) -based method for expanding custom protocol

Publications (2)

Publication Number Publication Date
CN113886738A true CN113886738A (en) 2022-01-04
CN113886738B CN113886738B (en) 2024-07-12

Family

ID=

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2317443A1 (en) * 2009-10-29 2011-05-04 Incard SA Method for executing data updates in an IC Card
CN103412890A (en) * 2013-07-19 2013-11-27 北京亿赞普网络技术有限公司 Webpage loading method and device
CN104486140A (en) * 2014-11-28 2015-04-01 华北电力大学 Device and method for detecting hijacking of web page
CN105187891A (en) * 2015-09-09 2015-12-23 上海微令信息科技有限公司 Transparent-browser-based video comment screen display system and method and device with system
CN109299331A (en) * 2018-11-23 2019-02-01 交通银行股份有限公司 Air shows the method and device of the hypertext markup language HTML5 page
CN110069683A (en) * 2017-09-18 2019-07-30 北京国双科技有限公司 A kind of method and device crawling data based on browser
CN111176629A (en) * 2019-12-24 2020-05-19 中国建设银行股份有限公司 Application development method and device
CN111226429A (en) * 2018-09-21 2020-06-02 思杰系统有限公司 System and method for intercepting and enhancing SAAS application calls via an embedded browser

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2317443A1 (en) * 2009-10-29 2011-05-04 Incard SA Method for executing data updates in an IC Card
CN103412890A (en) * 2013-07-19 2013-11-27 北京亿赞普网络技术有限公司 Webpage loading method and device
CN104486140A (en) * 2014-11-28 2015-04-01 华北电力大学 Device and method for detecting hijacking of web page
CN105187891A (en) * 2015-09-09 2015-12-23 上海微令信息科技有限公司 Transparent-browser-based video comment screen display system and method and device with system
CN110069683A (en) * 2017-09-18 2019-07-30 北京国双科技有限公司 A kind of method and device crawling data based on browser
CN111226429A (en) * 2018-09-21 2020-06-02 思杰系统有限公司 System and method for intercepting and enhancing SAAS application calls via an embedded browser
CN109299331A (en) * 2018-11-23 2019-02-01 交通银行股份有限公司 Air shows the method and device of the hypertext markup language HTML5 page
CN111176629A (en) * 2019-12-24 2020-05-19 中国建设银行股份有限公司 Application development method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
傅建明;林艳;刘秀文;张旭;: "云计算环境下基于随机化的安全防御研究", 计算机学报, no. 06, 28 July 2017 (2017-07-28), pages 1 - 5 *

Similar Documents

Publication Publication Date Title
US10726195B2 (en) Filtered stylesheets
US9485240B2 (en) Multi-account login method and apparatus
US9584504B2 (en) Auto login method and device
US20150121193A1 (en) User interface virtualization for web applications
US9026902B2 (en) Handling unexpected responses to script executing in client-side application
US20170083495A1 (en) Method for Modifying Webpage and Apparatus for Modifying Webpage
US9766860B2 (en) Dynamic source code formatting
CN105528200B (en) Display method and device of browser tab
CN108563477B (en) Page event response method and device
CN106155654B (en) Method and device for shielding webpage operation and electronic equipment
US20140223414A1 (en) Paige control for enterprise mobile applications
CN110941779B (en) Page loading method and device, storage medium and electronic equipment
CN104881273A (en) Webpage rendering analysis method and terminal device
CN111611037A (en) View object processing method for electronic book, electronic device and storage medium
CN114385124A (en) Independent page jumping method, device and equipment based on Vue framework
CN115309470A (en) Method, device and equipment for loading widgets and storage medium
CN107918587B (en) Debugging method and system for application program
CN113076165A (en) Page checking method and device
CN113268277A (en) Web-based client access method and terminal equipment
CN110442400B (en) Browser control method and device
US9436669B1 (en) Systems and methods for interfacing with dynamic web forms
CN111399836A (en) Method and device for modifying page attribute
CN113886738A (en) CEF-based custom protocol extension method
CN106126198B (en) In the method and device of the mobile terminal load end PC application page
CN103136273A (en) Method and device for displaying user information in webpage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant