CN113886738A - CEF-based custom protocol extension method - Google Patents
CEF-based custom protocol extension method Download PDFInfo
- Publication number
- CN113886738A CN113886738A CN202111148699.2A CN202111148699A CN113886738A CN 113886738 A CN113886738 A CN 113886738A CN 202111148699 A CN202111148699 A CN 202111148699A CN 113886738 A CN113886738 A CN 113886738A
- Authority
- CN
- China
- Prior art keywords
- protocol
- cef
- user
- webpage
- url
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 80
- 230000008569 process Effects 0.000 claims description 24
- 238000005516 engineering process Methods 0.000 claims description 19
- 238000001514 detection method Methods 0.000 claims description 6
- 238000013138 pruning Methods 0.000 claims description 6
- 230000002159 abnormal effect Effects 0.000 abstract description 5
- 238000009877 rendering Methods 0.000 abstract description 5
- 230000004888 barrier function Effects 0.000 abstract description 4
- 230000006870 function Effects 0.000 abstract description 3
- 230000006399 behavior Effects 0.000 description 7
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/957—Browsing optimisation, e.g. caching or content distillation
- G06F16/9577—Optimising the visualization of content, e.g. distillation of HTML documents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
- G06F16/986—Document structures and storage, e.g. HTML extensions
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a CEF-based method for expanding a custom protocol, which specifically comprises the steps that a user accesses an embedded webpage home page; accessing a CEF frame, accessing a home page to the CEF frame, and intercepting various webpage requests sent in a webpage based on an API provided by the CEF frame; and (4) selecting whether to define the protocol by the user, entering a normal request until the protocol is finished if the protocol is not defined, and determining the logic of the defined protocol until the protocol is finished if the protocol is defined by the user. The scheme can completely support the http protocol, has high performance and is a good choice for the local development of the webpage; the self-defined protocol can be expanded through the CEF framework, and local application is awakened, so that barriers among different platforms are fundamentally solved; the user can directly use the application without specially selecting a browser, and can use the functions of the web application without difference; the abnormal condition of webpage rendering is avoided, and the use is convenient.
Description
Technical Field
The application relates to the technical field of custom protocols, in particular to a method for expanding a custom protocol based on a CEF.
Background
The Chrome Embedded Framework (CEF) is an open-source Web browser control based on the Google chrome project and supports Windows, Linux and Mac platforms. The Chrome Embedded Framework (CEF) is an open-source Web browser control based on the Google chrome project and supports Windows, Linux and Mac platforms. Besides providing a C/C + + interface, there are also port-fixes for other languages.
Many websites providing one-stop service now have not only web side, but also PC client side, and the advantage of PC side is that better experience can be brought to the user. Therefore, many web pages can wake up the client, getting through the barriers of the browser and the local application, but at the same time, problems arise, and different browsers are not good for detecting the local software and opening support.
Because the CEF is based on the chrome, the CEF naturally supports some common network protocols of the browser, such as the http protocol, the ftp protocol, and the like. However, if the local application is to be woken up, the framework must be able to customize, because the local application will generally write the relevant information installed in the system registry and then expose the information to the outside world as an accessible protocol string, and the current problem is that because the CEF cannot identify the information, the rendering of the web page is abnormal, and the use is affected.
Disclosure of Invention
The application mainly aims to provide a method for expanding a custom protocol based on a CEF (Web edge Format), so as to solve the problem that the CEF cannot identify the protocol, so that the webpage rendering is abnormal and the use is influenced in the related technology.
In order to achieve the above object, the present application provides a method for extending a custom protocol based on CEF, which specifically includes the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage;
s2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In an embodiment of the present application, in the step S1, the embedded web page is specifically constructed by, but not limited to, an application framework technology, a script component technology, a script file technology, and a built-in behavior technology.
In an embodiment of the present application, in the step S2, a specific manner of intercepting various web page requests sent in a web page is as follows: and (3) using an OnBeforeBrowseCallback method, acquiring the url in the method, and performing probable logic operation according to the specific content of the url.
In an embodiment of the present application, the method for implementing the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
and acquiring the url, and acquiring the url comprising the resource type, the host domain name for storing the resource and the resource file name in the processes of request interception and user-defined processing.
In one embodiment of the present application, the possible logical operations are specifically performed in the following manner;
if url, zjyzpep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
In an embodiment of the present application, in S2, a specific manner for the CEF framework to provide the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Compared with the prior art, the beneficial effects of this application are:
1. according to the method for expanding the custom protocol based on the CEF, the CEF is based on the chrome, so that the method naturally supports some common network protocols of the browser, such as an http protocol, an ftp protocol and the like, can completely support the http protocol, has high performance, and is a good choice for the localized development of the webpage;
2. the method for expanding the custom protocol based on the CEF can expand the custom protocol through the CEF framework and wake up the local application, thereby fundamentally solving the barriers between different platforms;
3. according to the method for expanding the custom protocol based on the CEF, the user can directly use the application without specially selecting a browser, and the function of the web application can be used without difference;
4. the method for expanding the custom protocol based on the CEF avoids the occurrence of abnormal webpage rendering and is convenient to use.
Drawings
Fig. 1 is a schematic block diagram of a flow chart of a method for extending a custom protocol based on CEF provided in an embodiment of the present application;
fig. 2 is a schematic block diagram of a flowchart of specific steps of an onbeforebrowse ecallback method based on a CEF extension custom protocol method according to an embodiment of the present application;
fig. 3 is a schematic block flow diagram illustrating a specific manner in which a CEF framework of a method for extending a custom protocol based on CEF provided in an embodiment of the present application provides an API;
fig. 4 is a programming diagram illustrating the above or possible logical operations of the method for extending the custom protocol based on CEF according to the embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In this application, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present application and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this application will be understood by those of ordinary skill in the art as appropriate.
In addition, the term "plurality" shall mean two as well as more than two.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Example 1
Referring to fig. 1 to 4, the present application provides a method for extending a custom protocol based on CEF, which specifically includes the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage, and the embedded webpage adopts an application frame technology;
in the method for embedding the external page in the host page by applying the framework technology, a "< IFRAME name ═ XXX" width ═ X height ═ X frame warder ═ 0 src ═ XXX. If the embedded external page is too long and the scroll bar does not appear, adding "scroll no" into the external file < body > tag or adding "scroll no" into the host page < IFRAME > tag.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Example 2
A method for expanding a custom protocol based on CEF specifically comprises the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage, and the embedded webpage uses script components technology;
it should be noted that, using the script component technology, a method for applying this technology is to insert "< OBJECT style ═ border: a statement of 0px "type ═ text/X-script" data ═ xxx.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Example 3
A method for expanding a custom protocol based on CEF specifically comprises the following steps:
s1, accessing by a user, wherein the user accesses the embedded webpage home page, and the embedded webpage uses a script file technology;
it should be noted that, by using the script file technology, the document. The method is that "< SCRIPT language" < "> src" > is inserted into the position of the host page containing the external page, then the external page is modified, and each line content is written into document.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Example 4
A method for expanding a custom protocol based on CEF specifically comprises the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage, and the embedded webpage uses a built-in behavior technology;
it should be noted that using built-in behavior technology, a new functionality also known as "DHTML behavior", and having a number of default behaviors built in, when a behavior is applied to a standard HTML element on a host page, it can enhance the default functionality of that element and provide any new methods, attributes or events defined in that behavior.
S2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
In this embodiment, in step S2, the specific way of intercepting various web page requests sent in a web page is as follows: using an OnBeforeBrowseCallback method, then acquiring url in the method, and carrying out probable logic operation according to the specific content of the url;
specifically, the method for the onbeforebrowse ecallback includes the following specific steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
acquiring a url, and acquiring the url comprising a resource type, a host domain name for storing the resource and a resource file name in the process of request interception and user-defined processing;
specifically, the possible logical operations are specifically performed in the following manner;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
It should be noted that the specific programming content is as follows:
if(url.Contains(zjyz pep″))
string path=getExePath(″ZJYZ-PEP″);
if(path==null)
show ("please download plug-in first"):
return true:
}
string[]xx=path.Split(′%′);
string exepath=xx[0].Trim();
process start (@ expepath, url): // opening procedure B
//pro.WaitForExit();
return true。
In this embodiment, in S2, the specific manner in which the CEF framework provides the API is as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
It should be noted that the.net Framework (NET Framework) is developed by microsoft, and is a software development platform dedicated to Agile software development (Agile software development), rapid application development (rapid application development), platform independence, and network transparency. NET is the first step microsoft has taken for the next decade for server and desktop software engineering. NET contains many technologies that contribute to the rapid development of internet and intranet applications.
The method is developed based on a CEF framework and net, and besides a protocol supported by a browser naturally, such as a websocket protocol, an http protocol and an ftp protocol, customized development of a custom protocol is also supported.
In summary, the method for expanding the custom protocol based on the CEF can completely support the http protocol, has high performance, and is a good choice for the localized development of the webpage; the self-defined protocol can be expanded through the CEF framework, and local application is awakened, so that barriers among different platforms are fundamentally solved; the user can directly use the application without specially selecting a browser, and can use the functions of the web application without difference; the abnormal condition of webpage rendering is avoided, and the use is convenient.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (6)
1. A method for expanding a custom protocol based on CEF is characterized by comprising the following steps:
s1, accessing by a user, wherein the user accesses the home page of the embedded webpage;
s2, accessing a CEF framework, accessing a home page to the CEF framework, and intercepting various webpage requests sent in the webpage based on an API provided by the CEF framework;
and S3, self-defining the protocol, wherein the user selects whether to self-define the protocol, if not, the user enters a normal request until the protocol is finished, and if the user defines the protocol, the user determines the logic of the self-defined protocol until the protocol is finished.
2. The method of claim 1, wherein in the step S1, the embedded web page is specifically constructed by means of application framework technology, script components technology, script file technology and built-in behavior technology.
3. The method according to claim 1, wherein in step S2, intercepting various web page requests sent in the web page is performed by: and (3) using an OnBeforeBrowseCallback method, acquiring the url in the method, and performing probable logic operation according to the specific content of the url.
4. The method of claim 3, wherein the OnBeforeBrowseCall Back method comprises the following steps:
defining request interception, wherein the request interception refers to the detection of request events of html, js and css in a webpage;
defining custom processing, wherein the custom processing means that after the interception prompt is completed, the intercepted requests are replaced to be the required requests;
and acquiring the url, and acquiring the url comprising the resource type, the host domain name for storing the resource and the resource file name in the processes of request interception and user-defined processing.
5. The method of claim 3, wherein the possible logical operations are specifically performed by;
if url, zjyz pep is included
A string path is getExePath ZJYZ-PEP;
if the path is null
MessageBox, MessageBox, shows "previous load"
Returning a true value:
string [ ] xx ═ path, split%;
pruning a character string exeptath ═ xx [0 ];
process ═ Process, Start (@ escape, url): opening program corresponding to the program
WaitForExit;
A true value is returned.
6. The method according to claim 1, wherein in S2, the CEF framework provides the API in a specific manner as follows:
viewing official source codes of the web pages;
rearranging the interface codes on the basis of the source codes;
and (4) breaking a breakpoint in the interface code, and then readjusting the request parameters to obtain the API.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111148699.2A CN113886738B (en) | 2021-09-29 | CEF (CEF) -based method for expanding custom protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111148699.2A CN113886738B (en) | 2021-09-29 | CEF (CEF) -based method for expanding custom protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113886738A true CN113886738A (en) | 2022-01-04 |
CN113886738B CN113886738B (en) | 2024-07-12 |
Family
ID=
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2317443A1 (en) * | 2009-10-29 | 2011-05-04 | Incard SA | Method for executing data updates in an IC Card |
CN103412890A (en) * | 2013-07-19 | 2013-11-27 | 北京亿赞普网络技术有限公司 | Webpage loading method and device |
CN104486140A (en) * | 2014-11-28 | 2015-04-01 | 华北电力大学 | Device and method for detecting hijacking of web page |
CN105187891A (en) * | 2015-09-09 | 2015-12-23 | 上海微令信息科技有限公司 | Transparent-browser-based video comment screen display system and method and device with system |
CN109299331A (en) * | 2018-11-23 | 2019-02-01 | 交通银行股份有限公司 | Air shows the method and device of the hypertext markup language HTML5 page |
CN110069683A (en) * | 2017-09-18 | 2019-07-30 | 北京国双科技有限公司 | A kind of method and device crawling data based on browser |
CN111176629A (en) * | 2019-12-24 | 2020-05-19 | 中国建设银行股份有限公司 | Application development method and device |
CN111226429A (en) * | 2018-09-21 | 2020-06-02 | 思杰系统有限公司 | System and method for intercepting and enhancing SAAS application calls via an embedded browser |
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2317443A1 (en) * | 2009-10-29 | 2011-05-04 | Incard SA | Method for executing data updates in an IC Card |
CN103412890A (en) * | 2013-07-19 | 2013-11-27 | 北京亿赞普网络技术有限公司 | Webpage loading method and device |
CN104486140A (en) * | 2014-11-28 | 2015-04-01 | 华北电力大学 | Device and method for detecting hijacking of web page |
CN105187891A (en) * | 2015-09-09 | 2015-12-23 | 上海微令信息科技有限公司 | Transparent-browser-based video comment screen display system and method and device with system |
CN110069683A (en) * | 2017-09-18 | 2019-07-30 | 北京国双科技有限公司 | A kind of method and device crawling data based on browser |
CN111226429A (en) * | 2018-09-21 | 2020-06-02 | 思杰系统有限公司 | System and method for intercepting and enhancing SAAS application calls via an embedded browser |
CN109299331A (en) * | 2018-11-23 | 2019-02-01 | 交通银行股份有限公司 | Air shows the method and device of the hypertext markup language HTML5 page |
CN111176629A (en) * | 2019-12-24 | 2020-05-19 | 中国建设银行股份有限公司 | Application development method and device |
Non-Patent Citations (1)
Title |
---|
傅建明;林艳;刘秀文;张旭;: "云计算环境下基于随机化的安全防御研究", 计算机学报, no. 06, 28 July 2017 (2017-07-28), pages 1 - 5 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10726195B2 (en) | Filtered stylesheets | |
US9485240B2 (en) | Multi-account login method and apparatus | |
US9584504B2 (en) | Auto login method and device | |
US20150121193A1 (en) | User interface virtualization for web applications | |
US9026902B2 (en) | Handling unexpected responses to script executing in client-side application | |
US20170083495A1 (en) | Method for Modifying Webpage and Apparatus for Modifying Webpage | |
US9766860B2 (en) | Dynamic source code formatting | |
CN105528200B (en) | Display method and device of browser tab | |
CN108563477B (en) | Page event response method and device | |
CN106155654B (en) | Method and device for shielding webpage operation and electronic equipment | |
US20140223414A1 (en) | Paige control for enterprise mobile applications | |
CN110941779B (en) | Page loading method and device, storage medium and electronic equipment | |
CN104881273A (en) | Webpage rendering analysis method and terminal device | |
CN111611037A (en) | View object processing method for electronic book, electronic device and storage medium | |
CN114385124A (en) | Independent page jumping method, device and equipment based on Vue framework | |
CN115309470A (en) | Method, device and equipment for loading widgets and storage medium | |
CN107918587B (en) | Debugging method and system for application program | |
CN113076165A (en) | Page checking method and device | |
CN113268277A (en) | Web-based client access method and terminal equipment | |
CN110442400B (en) | Browser control method and device | |
US9436669B1 (en) | Systems and methods for interfacing with dynamic web forms | |
CN111399836A (en) | Method and device for modifying page attribute | |
CN113886738A (en) | CEF-based custom protocol extension method | |
CN106126198B (en) | In the method and device of the mobile terminal load end PC application page | |
CN103136273A (en) | Method and device for displaying user information in webpage |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |