Unlock instant, AI-driven research and patent intelligence for your innovation.

Page interception method and system and secure desktop

A technology that intercepts systems and pages, applied in the Internet field, can solve problems such as difficulty in identifying bad information, physical and mental and health effects of minors, and complex information.

Inactive Publication Date: 2016-10-12
中青奇未(北京)网络科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the information in the network is complicated, and there is a large amount of bad information, which seriously affects the user's online experience
Especially for minors, due to their identification ability, it is often difficult to identify harmful information. When minors visit pages with harmful information, it will have adverse effects on minors' physical, mental and health

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Page interception method and system and secure desktop
  • Page interception method and system and secure desktop
  • Page interception method and system and secure desktop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] refer to figure 1 , which shows a schematic flow chart of the steps of a page interception method in Embodiment 1 of the present invention. In this embodiment, the page interception method includes:

[0098] Step 102, monitor the page access request of the third-party application, and obtain the page information of the page requested by the page access request.

[0099] In this embodiment, the third-party application may be, but not limited to: a browser application and / or a game application. The page may be, but not limited to: a web page corresponding to a browser application, and / or a pop-up page corresponding to a game application, and the like. Taking a browser application as an example, the page access request of the browser application can be monitored, and then the web pages in the browser application can be intercepted.

[0100] Wherein, the page information includes but not limited to: URL information and / or domain name resolution information. The URL info...

Embodiment 2

[0106] refer to figure 2 , which shows a schematic flowchart of steps of a page interception method in Embodiment 2 of the present invention. In this embodiment, the page interception method may be specifically applied to a third-party desktop; wherein, the third-party desktop has a management mode and at least one managed mode.

[0107] Wherein, the page blocking method includes:

[0108] Step 202, monitor the page access request of the third-party application, and obtain the page information of the page requested by the page access request.

[0109] In this embodiment, the page information includes but not limited to: URL information and / or domain name resolution information. Preferably, the page access request of the third-party application can be monitored to obtain the page access request; then, the URL of the page access request is analyzed to obtain the URL information; and / or, the page access request Perform domain name resolution to obtain the domain name resoluti...

Embodiment 3

[0132] In combination with the foregoing embodiments, this embodiment uses a specific example to describe the page interception method in detail. In this embodiment, the page interception method can be specifically implemented through a third-party desktop set in the terminal, the third-party desktop includes a control mode and a controlled mode, and its specific application scenario is the first user-second users, the first user may be a parent, and the second user may be a child. When the second user performs a network access behavior through the third-party desktop, the third-party desktop can intercept the network behavior performed by the second user through the page interception method. For example, intercepting the second user's access to bad webpages, or intercepting bad pop-up pages popped up by applications, so as to prevent the second user from browsing to the bad pop-up pages.

[0133] refer to image 3 , which shows a schematic flowchart of steps of a page inter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a page interception method and system, and a secure desktop. The method comprises the steps of monitoring a page access request of a third party application, and obtaining page information of a page requested by the page access request, wherein the page information comprises website information and / or domain name resolution information; and determining whether to intercept the page access request or not according to the website information and / or domain name resolution information. Through adoption of the technical scheme of the method, the system and the secure desktop, the bad pages are effectively avoided from being loaded and displayed; the access behaviors of the users to the bad pages are also effectively avoided; especially teenagers are effectively protected; and a health internet surfing environment is provided for the teenagers.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a page blocking method and system, and a secure desktop. Background technique [0002] With the development of the Internet, users can accomplish more and more things through the Internet, such as online learning, online office, browsing various web pages, playing games, listening to songs and watching movies, etc., and the number of users is also increasing. The closer it is to getting younger, more and more minors are starting to use the Internet. [0003] However, the information in the network is complicated, and there is a large amount of bad information, which seriously affects the user's online experience. Especially for minors, due to their identification ability, it is often difficult to identify harmful information. When a minor visits a page with harmful information, it will have a negative impact on the physical, mental and health of the minor. Contents of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/02H04L63/10H04L63/101
Inventor 郝宪强谢鹏金东齐向东
Owner 中青奇未(北京)网络科技有限公司