Unlock instant, AI-driven research and patent intelligence for your innovation.

Page access method and system, and secure desktop

A page access and page technology, applied in the Internet field, can solve problems such as bad information, impact on the physical and mental health of minors, and impact on users' online experience

Inactive Publication Date: 2016-10-12
中青奇未(北京)网络科技有限公司
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the information in the network is complicated, and there is a large amount of bad information, which seriously affects the user's online experience
Especially for minors, due to their identification ability, it is often difficult to identify harmful information. When minors visit pages with harmful information, it will have adverse effects on minors' physical, mental and health

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Page access method and system, and secure desktop
  • Page access method and system, and secure desktop
  • Page access method and system, and secure desktop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] refer to figure 1 , which shows a schematic flowchart of steps of a page access method in Embodiment 1 of the present invention. In this embodiment, the page access method includes:

[0105] Step 102, receiving a page access configuration request.

[0106] In this embodiment, the page access configuration request carries a prohibited URL. Wherein, the page access configuration request may be actively generated or sent by a user. For example, it is possible to actively generate the page access configuration request based on the security judgment of historically accessed pages, and bad pages determined according to the judgment results (such as unhealthy pages involving pornography and violence, risky pages with fraudulent and phishing information, etc.) . For another example, the page access configuration request may be generated according to the prohibited URL input by the user, which is not limited in this embodiment.

[0107] Step 104, generating a first black an...

Embodiment 2

[0114] refer to figure 2 , which shows a schematic flowchart of steps of a page access method in Embodiment 2 of the present invention. In this embodiment, in this embodiment, the page access method may be specifically applied to a third-party desktop; wherein, the third-party desktop has a management mode and at least one managed mode.

[0115] Wherein, the page access method includes:

[0116] Step 202, receiving a page access configuration request.

[0117] In this embodiment, the page access configuration request may be received through a first add entry set locally on the third-party desktop and / or a second add entry set in the third-party application, wherein the page access configuration request contains at least forbidden URLs.

[0118]In this embodiment, the page access configuration request may be generated in any appropriate manner, for example, it may be generated actively, or it may be generated according to the user's operation behavior.

[0119] The followi...

Embodiment 3

[0151] In combination with the foregoing embodiments, this embodiment uses a specific example to describe the page access method in detail. In this embodiment, the page access method can be specifically implemented through a third-party desktop set in the terminal, the third-party desktop includes a control mode and a controlled mode, and its specific application scenario is the first user-second users, the first user may be a parent, and the second user may be a child. When the second user performs a network access behavior through the third-party desktop, the third-party desktop can control the network behavior performed by the second user through the page access method. For example, intercepting the second user's access to bad webpages, or intercepting bad pop-up pages popped up by applications, so as to prevent the second user from browsing to the bad pop-up pages.

[0152] refer to image 3 , which shows a schematic flowchart of steps of a page access method in Embodime...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a page access method and system, and a secure desktop. The method comprises the steps of receiving a page access configuration request, wherein access forbidden websites are carried in the page access configuration request; generating a first website blacklist and whitelist according to the access forbidden websites; and intercepting a page access request of a third party application according to the first website blacklist and whitelist. Through adoption of the technical scheme of the method, the system and the secure desktop, the bad pages are avoided from being loaded and displayed; the access behaviors of the users to the bad pages are effectively avoided; especially teenagers are effectively protected; and a health internet surfing environment is provided for the teenagers.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a page access method and system, and a secure desktop. Background technique [0002] With the development of the Internet, users can accomplish more and more things through the Internet, such as online learning, online office, browsing various web pages, playing games, listening to songs and watching movies, etc., and the number of users is also increasing. The closer it is to getting younger, more and more minors are starting to use the Internet. [0003] However, the information in the network is complicated, and there is a large amount of bad information, which seriously affects the user's online experience. Especially for minors, due to their identification ability, it is often difficult to identify harmful information. When a minor visits a page with harmful information, it will have a negative impact on the physical, mental and health of the minor. Contents of the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08G06F17/30
CPCH04L67/02G06F16/951G06F16/957G06F16/958H04L67/56
Inventor 郝宪强谢鹏金东齐向东
Owner 中青奇未(北京)网络科技有限公司