Browser protection method and device
A technology of browsers and extension components, applied in the field of computer security, can solve problems such as the inability to implement browser protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Embodiment 1 provides a browser protection method, which is used to solve the problem in the prior art that browser protection cannot be implemented after the illegal extension component is loaded after the logo is replaced. The specific flow chart of the method is shown in figure 1 shown, including the following steps:
[0033] Step S11: Monitor the setting changes of each extension component to each setting point of the browser.
[0034] Here, the browser may be a browser on a mobile terminal such as a mobile phone or a tablet computer, or a browser on a terminal such as a personal computer, and there is no limitation on the provider of the browser. For example, it may be a Google browser on a personal computer, or a 360 browser on a mobile phone, etc.
[0035] The extension components of the browser can modify some parameters of the browser by calling the API provided by the browser. These points on the browser where the parameters can be modified by the extension ...
Embodiment 2
[0057] Embodiment 2 provides a browser protection device, which is used to solve the problem in the prior art that browser protection cannot be implemented after the illegal extension component is loaded after the replacement identifier is loaded. The specific structure schematic diagram of this device 20 is as figure 2 As shown, the device 20 includes:
[0058] Monitoring unit 201, determination unit 202 and protection unit 203, wherein:
[0059] A monitoring unit 201, configured to monitor the setting changes of each extension component to each setting point of the browser;
[0060] A determining unit 202, configured to analyze the abnormality when the browser runs abnormally, and determine the current set point associated with the abnormality;
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


