Page access method and system, and secure desktop
A page access and page technology, applied in the Internet field, can solve problems such as bad information, impact on the physical and mental health of minors, and impact on users' online experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0104] refer to figure 1 , which shows a schematic flowchart of steps of a page access method in Embodiment 1 of the present invention. In this embodiment, the page access method includes:
[0105] Step 102, receiving a page access configuration request.
[0106] In this embodiment, the page access configuration request carries a prohibited URL. Wherein, the page access configuration request may be actively generated or sent by a user. For example, it is possible to actively generate the page access configuration request based on the security judgment of historically accessed pages, and bad pages determined according to the judgment results (such as unhealthy pages involving pornography and violence, risky pages with fraudulent and phishing information, etc.) . For another example, the page access configuration request may be generated according to the prohibited URL input by the user, which is not limited in this embodiment.
[0107] Step 104, generating a first black an...
Embodiment 2
[0114] refer to figure 2 , which shows a schematic flowchart of steps of a page access method in Embodiment 2 of the present invention. In this embodiment, in this embodiment, the page access method may be specifically applied to a third-party desktop; wherein, the third-party desktop has a management mode and at least one managed mode.
[0115] Wherein, the page access method includes:
[0116] Step 202, receiving a page access configuration request.
[0117] In this embodiment, the page access configuration request may be received through a first add entry set locally on the third-party desktop and / or a second add entry set in the third-party application, wherein the page access configuration request contains at least forbidden URLs.
[0118]In this embodiment, the page access configuration request may be generated in any appropriate manner, for example, it may be generated actively, or it may be generated according to the user's operation behavior.
[0119] The followi...
Embodiment 3
[0151] In combination with the foregoing embodiments, this embodiment uses a specific example to describe the page access method in detail. In this embodiment, the page access method can be specifically implemented through a third-party desktop set in the terminal, the third-party desktop includes a control mode and a controlled mode, and its specific application scenario is the first user-second users, the first user may be a parent, and the second user may be a child. When the second user performs a network access behavior through the third-party desktop, the third-party desktop can control the network behavior performed by the second user through the page access method. For example, intercepting the second user's access to bad webpages, or intercepting bad pop-up pages popped up by applications, so as to prevent the second user from browsing to the bad pop-up pages.
[0152] refer to image 3 , which shows a schematic flowchart of steps of a page access method in Embodime...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 