Page interception method and system and secure desktop
A technology that intercepts systems and pages, applied in the Internet field, can solve problems such as difficulty in identifying bad information, physical and mental and health effects of minors, and complex information.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0097] refer to figure 1 , which shows a schematic flow chart of the steps of a page interception method in Embodiment 1 of the present invention. In this embodiment, the page interception method includes:
[0098] Step 102, monitor the page access request of the third-party application, and obtain the page information of the page requested by the page access request.
[0099] In this embodiment, the third-party application may be, but not limited to: a browser application and / or a game application. The page may be, but not limited to: a web page corresponding to a browser application, and / or a pop-up page corresponding to a game application, and the like. Taking a browser application as an example, the page access request of the browser application can be monitored, and then the web pages in the browser application can be intercepted.
[0100] Wherein, the page information includes but not limited to: URL information and / or domain name resolution information. The URL info...
Embodiment 2
[0106] refer to figure 2 , which shows a schematic flowchart of steps of a page interception method in Embodiment 2 of the present invention. In this embodiment, the page interception method may be specifically applied to a third-party desktop; wherein, the third-party desktop has a management mode and at least one managed mode.
[0107] Wherein, the page blocking method includes:
[0108] Step 202, monitor the page access request of the third-party application, and obtain the page information of the page requested by the page access request.
[0109] In this embodiment, the page information includes but not limited to: URL information and / or domain name resolution information. Preferably, the page access request of the third-party application can be monitored to obtain the page access request; then, the URL of the page access request is analyzed to obtain the URL information; and / or, the page access request Perform domain name resolution to obtain the domain name resoluti...
Embodiment 3
[0132] In combination with the foregoing embodiments, this embodiment uses a specific example to describe the page interception method in detail. In this embodiment, the page interception method can be specifically implemented through a third-party desktop set in the terminal, the third-party desktop includes a control mode and a controlled mode, and its specific application scenario is the first user-second users, the first user may be a parent, and the second user may be a child. When the second user performs a network access behavior through the third-party desktop, the third-party desktop can intercept the network behavior performed by the second user through the page interception method. For example, intercepting the second user's access to bad webpages, or intercepting bad pop-up pages popped up by applications, so as to prevent the second user from browsing to the bad pop-up pages.
[0133] refer to image 3 , which shows a schematic flowchart of steps of a page inter...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 