Method for intercepting business object and browser client

A browser client and business object technology, applied in the network field, can solve problems such as inability to intercept business objects, and achieve the effect of effective interception, wide interception range, and workload reduction.

Inactive Publication Date: 2015-02-11
BEIJING QIHOO TECH CO LTD +1
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the problem that business objects cannot be effectively intercepted in the above-mentioned existing solutions for intercepting business objects, the present invention is proposed to provide a method for intercepting business objects that overcomes the above-mentioned problems or at least partially solves the above-mentioned problems, and the browser client end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intercepting business object and browser client
  • Method for intercepting business object and browser client
  • Method for intercepting business object and browser client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] refer to figure 1 , shows a flow chart of steps of a method for intercepting a business object according to Embodiment 1 of the present invention.

[0026] In this embodiment, the method for intercepting business objects of the present invention is described from the browser side, and the method for intercepting business objects in this embodiment includes the following steps:

[0027] Step S102: Obtain the URL and / or CSS information corresponding to the new webpage loaded by the browser through the browser setting plug-in of the IE core.

[0028] In this embodiment, the configuration plug-in is injected into the browser of the IE kernel by an application program independent of the browser through BHO (Browser Helper Objects, browser helper objects).

[0029] It should be noted that, in the actual operation process, those skilled in the art can set to obtain only the URL or CSS information of the webpage when obtaining the information corresponding to the new webpage, ...

Embodiment 2

[0038] refer to figure 2 , shows a flow chart of steps of a method for intercepting a business object according to Embodiment 2 of the present invention.

[0039] The method for intercepting a business object in this embodiment is realized by injecting a setting plug-in into the browser of the IE kernel. The method for intercepting a business object of the present invention will be described below from the side of the IE kernel browser.

[0040] The method for intercepting business objects in this embodiment specifically includes the following steps:

[0041] Step S202: The browser receives the application program's request to detect the browser's attribute information, and sends the browser's attribute information to the application program to detect the identification information.

[0042] The browser in this embodiment is a browser with an IE kernel. Wherein, the request is used for the application program to detect whether there is identification information in the prop...

Embodiment 3

[0072] refer to image 3 , shows a flow chart of steps of a method for intercepting a business object according to Embodiment 3 of the present invention.

[0073] In this embodiment, the interception of the business object is carried out by the setting plug-in injected into the browser of the IE kernel by the application program. The method for intercepting the business object of the present invention will be described below from the application program side. The method includes the following steps:

[0074] Step S302: The application program registers and sets the plug-in with the system.

[0075] After the application program generates a setting plug-in of a version matching the browser version for the browser with the IE kernel, it will register the setting plug-in with the system. After the registration is successful, the system generates identification information uniquely identifying the identity of the setting plug-in for the setting plug-in in the registry, for exampl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for intercepting a business object and a browser client. The method comprises the following steps: acquiring URL and/or CSS information corresponding to a new webpage loaded by a browser through a set plug-in of the browser with an IE kernel, wherein the set plug-in is input into the browser with the IE kernel through BHO by an application program which is independent from the browser; judging whether URL is in a business object interception list according to the set plug-in, and/or judging whether the CSS information is in the business object interception list according to the set plug-in; if URL is in the business object interception list and/or the CSS information is in the business object interception list, intercepting the URL and/or the CSS information through the set plug-in; and loading the new webpage into the browser according to the interception result. By adopting the method, the business object can be effectively intercepted when a webpage is loaded to the browser.

Description

technical field [0001] The present application relates to the field of network technology, in particular to a method for intercepting business objects and a browser client. Background technique [0002] As we all know, browsing webpage content on the Internet is inseparable from a browser, and what most users use now is the IE browser based on the IE kernel provided by Microsoft Corporation. When users browse web pages through the IE browser, they will inevitably be disturbed by business objects such as advertisements, such as pop-up advertisements. In order to prevent the user from being disturbed when browsing the webpage as much as possible, it is necessary to intercept business objects such as advertisements when browsing the webpage through the IE browser. [0003] At present, the advertisement blocking function of the IE browser is based on the pop-up blocking of the pop-up advertisement that comes with the IE browser. When intercepting, the user needs to manually se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/957
Inventor 宗小斌李海亮
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products