CN116643680A - Secure access method, system and readable storage medium - Google Patents
Secure access method, system and readable storage medium Download PDFInfo
- Publication number
- CN116643680A CN116643680A CN202310532846.9A CN202310532846A CN116643680A CN 116643680 A CN116643680 A CN 116643680A CN 202310532846 A CN202310532846 A CN 202310532846A CN 116643680 A CN116643680 A CN 116643680A
- Authority
- CN
- China
- Prior art keywords
- input
- page
- input box
- user
- target control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 102
- 238000002955 isolation Methods 0.000 claims description 64
- 238000004590 computer program Methods 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 3
- 230000003213 activating effect Effects 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 claims description 2
- 230000000007 visual effect Effects 0.000 abstract description 28
- 238000012545 processing Methods 0.000 description 21
- 238000010586 diagram Methods 0.000 description 16
- 230000008569 process Effects 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0483—Interaction with page-structured environments, e.g. book metaphor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the application discloses a secure access method, secure access equipment and a readable storage medium. And after the operation event of the user on the first page is monitored, the operation event is sent to the proxy server. And the proxy server determines the target control according to the operation event and determines whether the target control has editing properties. If the target control has editing properties, the client browser on the terminal equipment is instructed to set the input box as a focus, so that a user can randomly input English, numbers, non-English characters, non-number characters and the like in the input box. By adopting the scheme, the simulated focus element is displayed on the client browser by utilizing the input box, so that a user can perform local input on the visual drawing page, the network security is improved, and the user can smoothly surf the internet.
Description
Technical Field
The embodiment of the application relates to the technical field of network security, in particular to a security access method, a security access system and a readable storage medium.
Background
Currently, remote quarantine browsers (Remote Browser Isolation, RBI) are a common technique to implement secure surfing.
In the internet surfing mode based on RBI technology, a proxy server is arranged, and a remote isolation browser is arranged on the proxy server and is a bridge for communication between a client browser and a source server. In the internet surfing process, an access request of a client browser is forwarded to a source server through a remote isolation browser, resources returned by the source server are loaded on the remote isolation browser, a proxy server loads pages obtained by the resources loaded by the remote isolation browser, the pages are returned to the client browser in a pixel stream pushing mode, and the client browser carries out page reconstruction according to the pixel stream.
However, since the client browser only performs page reconstruction according to the pixel stream, the client browser presents all the pictures, which causes the unable normal input in the user surfing process and further causes the inconvenience of surfing the internet.
Disclosure of Invention
The embodiment of the application provides a safe access method, a safe access system and a readable storage medium, wherein when a user accesses a website page which needs to be input, a simulated focus element is displayed on a client browser, so that the user can perform local input on a visual drawing page, the network security is improved, and the user can smoothly and conveniently surf the internet.
In a first aspect, an embodiment of the present application provides a secure access method, applied to a terminal device, where the method includes:
displaying a first page on a user interface of a client browser in a drawing mode;
creating an input box on the first page;
after monitoring an operation event of a user on the first page, sending the operation event to a proxy server;
receiving an indication message from the proxy server, wherein the indication message is sent after a remote isolation browser on the proxy server receives the operation event;
and setting the input box as a focus according to the indication message.
In a second aspect, an embodiment of the present application provides a secure access method, applied to a proxy server, where the method includes:
receiving an operation event from terminal equipment, wherein the operation event is an operation event of a first page, which is monitored by the terminal equipment, by a user, and the first page is displayed by a client browser on the terminal equipment in a drawing mode;
and sending an indication message to the terminal equipment according to the operation event, so that the terminal equipment sets an input box on the first page as a focus.
In a third aspect, an embodiment of the present application provides a security access apparatus, integrated on a terminal device, including:
the display module is used for displaying a first page on a user interface of the client browser in a drawing mode;
a processing module for creating an input box on the first page;
the sending module is used for sending the operation event to the proxy server after the processing module monitors the operation event of the user on the first page;
the receiving module is used for receiving an indication message from the proxy server, wherein the indication message is sent after the remote isolation browser on the proxy server receives the operation event;
the processing module is further configured to set the input box to be a focus according to the indication message.
In a fourth aspect, an embodiment of the present application provides a security access apparatus integrated on a proxy server, the apparatus including:
the terminal equipment comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving an operation event from the terminal equipment, the operation event is an operation event of a user monitored by the terminal equipment on a first page, and the first page is a page displayed by a client browser on the terminal equipment in a drawing mode;
And the sending module is used for sending an indication message to the terminal equipment according to the operation event so that the terminal equipment sets an input box on the first page as a focus.
In a fifth aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory and a computer program stored on the memory and executable on the processor, which processor, when executing the computer program, causes the electronic device to carry out the method as described above in the first aspect or in the various possible implementations of the first aspect.
In a sixth aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory and a computer program stored on the memory and executable on the processor, when executing the computer program, causing the electronic device to implement the method as described above in the sixth aspect or the various possible implementations of the sixth aspect.
In a seventh aspect, embodiments of the present application provide a computer readable storage medium having stored therein computer instructions which, when executed by a processor, are adapted to carry out the method according to the first aspect or the various possible implementations of the first aspect.
In an eighth aspect, embodiments of the present application provide a computer readable storage medium having stored therein computer instructions which, when executed by a processor, are adapted to carry out the method according to the above second aspect or the various possible implementations of the second aspect.
In a ninth aspect, embodiments of the present application provide a computer program product comprising a computer program which, when executed by a processor, implements the method as described above in the first aspect or in the various possible implementations of the first aspect.
In a tenth aspect, embodiments of the present application provide a computer program product comprising a computer program which, when executed by a processor, implements the method as described above for the second aspect or the various possible implementations of the second aspect.
In an eleventh aspect, an embodiment of the present application provides a secure access system, including a terminal device and a proxy server, where the terminal device is configured to implement a method as described above in the first aspect or in various possible implementations of the first aspect, and the proxy server is configured to implement a method as described above in the second aspect or in various possible implementations of the second aspect.
According to the secure access method, the secure access system and the readable storage medium provided by the embodiment of the application, a first page is displayed on a user interface of a client browser on terminal equipment in a drawing mode, and an input box is created on the first page. And after the operation event of the user on the first page is monitored, the operation event is sent to the proxy server. And the proxy server determines the target control according to the operation event and determines whether the target control has editing properties. If the target control has editing properties, the client browser on the terminal equipment is instructed to set the input box as a focus, so that a user can randomly input English, numbers, non-English characters, non-number characters and the like in the input box. By adopting the scheme, the simulated focus element is displayed on the client browser, so that a user can perform local input on the visual class drawing page, the network security is improved, and the user can smoothly surf the internet.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a network architecture to which a secure access method provided by an embodiment of the present application is applicable;
FIG. 2 is a schematic diagram of another network architecture to which the secure access method according to the embodiment of the present application is applicable;
FIG. 3 is a flow chart of a secure access method provided by an embodiment of the present application;
FIG. 4 is a schematic diagram of a first page in a secure access method according to an embodiment of the present application;
FIG. 5 is a flowchart of updating a target control with target content in a secure access method provided by an embodiment of the present application;
FIG. 6 is a diagram of a secure access method according to an embodiment of the present application showing intent;
FIG. 7A is a schematic diagram of a further network architecture of a secure access method according to an embodiment of the present application;
FIG. 7B is a flow chart corresponding to FIG. 7A;
fig. 8 is a schematic diagram of a security access device according to an embodiment of the present application;
Fig. 9 is a schematic diagram of a security access device according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In network security, WEB security has been the main research direction. Because the WEB service has the characteristics of openness, technical diversity of the source server, terminal environment complexity and the like, the WEB service faces more security risks. The source server technology diversity refers to: origin servers are provided based on hypertext transfer protocol (Hyper Text Transfer Protocol, HTTP) and the like, and with the development of HTTP technology, the implementation of origin servers is different. The terminal environment complexity refers to: terminal devices are various in variety, such as desktops, mobile phones, pads, and the like, and operating systems are also various, including android, windows, linux, and the like.
The RBI technology is an effective means for guaranteeing the safety of WEB access. RBI is characterized in that: and loading the WEB service provided by the source server through a unified safety edge isolation environment, transmitting the loaded visual result to the access terminal, and displaying the visual result by the terminal through a unified safety framework. In this process, the terminal device does not embody any code of the origin server.
After the visual result is drawn and displayed by the client browser on the terminal device, if the user inputs a single character or number on the keyboard, the client browser transmits the input event to the remote isolation browser, so that the remote isolation browser updates the visual result and returns the visual result to the terminal device for the client browser to update the current page. For example, after the client browser displays the visual result, the user presses the letter a on the keyboard, and after this event is passed to the remote quarantine browser side, a will be displayed in the input box of the remote quarantine browser. Because the visual result changes, the remote quarantine browser sends a new stream of pixels of the visual result to the client browser, causing the client browser to update the visual result.
However, when the user inputs a non-keyboard character such as chinese, for example, the user inputs "night" by using the pinyin input method, and presses y, e and space in sequence (i.e., presses space or number 1 when the night is the first word of yes), the current page update cannot be triggered.
From the above, it can be seen that: based on RBI technology, the terminal equipment does not embody any codes of the source server, which results in pictures presented on a client browser interface on the terminal equipment, and the client browser interface is not provided with a document object model (Document Object Model, DOM) of an original site, so that the local input method cannot be effective, and the user cannot input contents except single characters corresponding to character keys on a keyboard or single numbers corresponding to numeric keys, such as Chinese, japanese and the like, and further cannot surf the Internet.
Based on the above, the embodiments of the present application provide a secure access method, apparatus, and readable storage medium, where when a user accesses a web page that needs to be input, an input box is used to display a simulated focus element on a client browser, so that the user can perform local input on a visual drawing page, and ensure that the user can smoothly and conveniently surf the internet while improving network security.
Fig. 1 is a schematic diagram of a network architecture to which a secure access method according to an embodiment of the present application is applicable. Referring to fig. 1, the network architecture includes a terminal device 11, a proxy server 12 and an origin server 13. A network connection is established between the proxy server 12 and the terminal device 11, and a network connection is established between the proxy server 12 and the origin server 13.
The terminal device 11 may be hardware or software. When the terminal device 11 is hardware, the terminal device 11 is, for example, a mobile phone, a tablet computer, a personal computer, an electronic book reader, a laptop, a desktop computer, or the like, in which an android operating system, a microsoft operating system, a saint operating system, a Linux operating system, or an apple iOS operating system is installed. When the terminal device 11 is software, it may be installed in the above-listed hardware device, and in this case, the terminal device 11 is, for example, a plurality of software modules or a single software module, etc., the embodiment of the present application is not limited. The terminal device 11 is provided with a client browser.
The proxy server 12 is deployed with a remote quarantine browser, which is a bridge for communication between the client browser and the origin server 13. An access request initiated by the client browser to the origin server 13 is forwarded to the origin server 13 via the remote quarantine browser. The source server 13 sends the resource to the proxy server 12, and the remote isolation browser on the proxy server 12 loads the resource to obtain the page corresponding to the access request. Then, the proxy server 12 sends the page to the terminal device 11 in a pixel stream pushing manner, and the client browser performs page reconstruction according to the pixel stream.
The source server 13 is also called a source station server, a source node, an RBI site, etc. and is used for storing the resources provided by the resource provider, and updating, deleting, etc. the resources according to the operation of the resource provider, and the resources are, for example, pictures, videos, audios, webpages, etc. Resources are also referred to as resource data, traffic data, etc.
In the embodiment of the application, the client browser is provided with the simulated input box, so that the client browser is supported to display the first page in a drawing mode, and the local input method can be supported.
It should be understood that the number of terminal devices 11, proxy servers 12 and origin servers 13 in fig. 1 is merely illustrative. In practical implementation, any number of terminal devices 11, proxy servers 12 and origin servers 13 are deployed according to practical requirements.
Fig. 2 is a schematic diagram of another network architecture to which the secure access method according to the embodiment of the present application is applicable. Referring to fig. 2, the content delivery network (Content Delivery Network, CDN) includes CDN nodes of different levels, such as CDN node 25 in the top layer (e.g., core network layer) in fig. 2, CDN node 24 in the middle layer, and CDN node in the bottom layer, as shown by proxy server 22 in the bottom layer. In the embodiment of the present application, the CDN node closest to the terminal device 21 of the user, that is, the CDN node located at the "edge" of the network is referred to as a CDN edge node. Fig. 2 is an exemplary illustration of a network architecture including three layers of CDN nodes. In practical applications, the network structure may include any number of CDN nodes of a hierarchy, and the number of CDN nodes of each hierarchy may also be any number, which is not limited in the embodiments of the present application.
Referring to fig. 2, the CDN nodes of different levels can store resources, and the resources stored in each level of CDN nodes are from the CDN node of the previous level, and the resources stored in the top level of CDN nodes 25 are from the origin server 23. The origin server 23 is, for example, a data center or the like.
Referring to fig. 1 and 2, the proxy server 22 in fig. 2 is a CDN edge node in a CDN network, and corresponds to the proxy server 12 in fig. 1, and the origin server 23 in fig. 2 corresponds to the origin server 13 in fig. 1. In fig. 2, a remote isolation browser is deployed on the proxy server 22, and after the proxy server 22 receives an access request from the terminal device 21, if a resource requested by the access request is locally stored, the remote isolation browser loads the resource to obtain a page corresponding to the access request. Then, the proxy server 22 sends the page to the terminal device 21 in a pixel stream pushing manner, and the client browser performs page reconstruction according to the pixel stream. If the resource requested by the access request is not stored locally, the proxy server 21 returns to the source and obtains the resource to the upper CDN node or the source server 23.
Next, based on the network architecture shown in fig. 1 and fig. 2, a detailed description of the security access method provided by the embodiment of the present application is given, and for an example, please refer to fig. 3.
Fig. 3 is a flowchart of a secure access method according to an embodiment of the present application, and this embodiment is described in terms of interaction between a terminal device and a proxy server. The embodiment comprises the following steps:
301. and displaying the first page on a user interface of the client browser in a drawing mode.
In the embodiment of the application, when a client browser requests a resource from a source server each time, the resource provided by the source server is loaded by a remote isolation browser to obtain a first page, and the pixel stream of the first page is pushed to a terminal device, and the client browser on the terminal device draws and displays the first page according to the received pixel stream. In the process, a remote isolation browser on the proxy server pushes a visual result of a first page to the terminal equipment, and a client browser on the terminal equipment completes visual presentation through a drawing interface.
It can be understood that the first page obtained by loading the resource by the remote isolation browser and the first page displayed by the client browser in the drawing mode are identical in appearance, however, the control on the first page obtained by loading the resource by the remote isolation browser has operability, and if clicking a control, page jump, prompt information and the like can occur. However, the first page displayed by the client browser in the drawing mode is equivalent to a picture, if the user clicks a control on the picture, and the like, if the operation event is not transmitted to the remote isolation browser, the client browser cannot generate page skip, prompt information, and the like.
302. An input box is created on the first page.
Illustratively, after the client browser initiates the access request, the remote isolation browser completes loading the source station page, and sends the visual result of the page to the client browser. The client browser creates an input box, also called input box, analog input box, etc., while visually presenting according to the visual result.
Typically, if the input box is created for the first time, the input box may be located at any position on the first page, since no control has been selected by the user at this time and no focus has been generated. Or after the input box is created for the first time, the input box is positioned at a preset position. The input box is a control with editing properties, i.e. the input box is not a control displayed in a picture mode, but has editing properties, and a user can input numbers, english and other characters, such as Chinese, and the like, into the input box.
In the embodiment of the application, when a control has editing properties, if a user clicks to select the control, a continuously flashing cursor appears in the control, and the cursor is the focus. It should be noted that, the focus flicker here is not focus flicker in the control selected by the user on the client browser interface, because the client browser only presents the picture. The phenomenon that the focus in the selected control is flickered is seen by the user, because the focus in the control of the isolation browser flickers, each flickers to push the pixel stream to the client browser for the client browser to reconstruct the page, thereby giving the user the feeling that the focus is continuously flickered in the control selected by the user on the client browser.
Alternatively, the input box is, for example, a transparent input box, a translucent input box, a highlighted input box, or the like. When the input box is not a transparent input box, the user can quickly find the input box, but the non-transparent input box may obscure the content of the first page.
When the input box is a transparent input box, it is invisible to the user, and therefore, corresponds to creating the input box and hiding it. The transparent input box does not obscure any content of the first page. After the transparent input box is created, if the user operates the first page, such as clicking the target control, the terminal device moves the transparent input box to the target control, and the target content input by the user on the transparent input box is updated to the target control in real time in a pixel stream pushing mode. From the user's perspective, it is just as if the target control on the first page was entered. That is, the user is not aware of the transparent input box, which is input as if it were input to the target control.
303. And after the operation event of the user on the first page is monitored, sending the operation event to the proxy server.
After the input box is created, the terminal device determines whether the user operates the first page, that is, determines whether an operation event occurs. For example, the user clicks a certain position of the first page with a mouse; as another example, the user operates the first page through a keyboard. After the operation event is monitored, the terminal equipment sends the operation event to the proxy server, wherein the operation event comprises a click position and the like.
304. And sending an indication message to the terminal equipment according to the operation event, so that the terminal equipment sets an input box on the first page as a focus.
The proxy server sends an indication message to the terminal device after determining the target control according to the operation event, so that the terminal device moves the input box to the target control, and sets the input box to be a focus.
305. And setting the input box as a focus according to the indication message.
After the terminal equipment receives the indication message, the client browser on the terminal equipment sets the input box as a focus. After the input box is set as the focus, the focus continuously flashes in the first page obtained by loading the resources by the remote isolation browser, and the visual result of the first page is updated when the focus flashes each time. Therefore, the remote isolation browser continuously pushes updated visual results to the terminal equipment, so that the client browser on the terminal equipment updates the first page, and the client browser shows the effect of focus flickering.
It should be noted that, the focus flicker shown by the client browser is not a true focus flicker, but is obtained by continuously reconstructing the first page according to the received and updated visual result.
From the above, it can be seen that: by using the input box, an input box supporting the user to input non-english characters, non-digital characters and the like can be simulated on the client browser, and simultaneously the user is supported to input English and digital, so that the user can conveniently and randomly input in the internet surfing process, and smooth internet surfing is ensured.
According to the secure access method provided by the embodiment of the application, the first page is displayed on the user interface of the client browser in a drawing mode, and the terminal equipment creates the input box on the first page. And after the operation event of the user on the first page is monitored, the operation event is sent to the proxy server. The proxy server sends an indication message to the terminal device according to the operation event to instruct the client browser on the terminal device to set the input box as a focus, so that the user can randomly input English, numerals, non-English characters, non-numeral characters and the like in the input box. By adopting the scheme, the simulated focus element is displayed on the client browser by utilizing the input box, so that a user can perform local input on the visual drawing page, the network security is improved, and the user can smoothly surf the internet.
Optionally, in the foregoing embodiment, when the proxy server sends the indication message to the terminal device according to the operation event, the proxy server determines a target control according to the operation event, and determines whether the target control has an editing attribute. And when the target control has editing properties, sending an indication message to the terminal equipment. And if the target control has no editing attribute, continuing to wait for receiving the operation event.
Illustratively, after receiving the operation event, the proxy server determines a target control corresponding to the operation event. Since, for the terminal device, the first page displayed on the client browser corresponds to a drawn picture, the client browser cannot identify which control the user clicked on. After receiving the operation event, the proxy server determines a target control corresponding to the operation event according to the position and the like of the operation event.
Fig. 4 is a schematic diagram of a first page in a secure access method according to an embodiment of the present application. Referring to fig. 4, the first page is a search page, and for the client browser, each gray-filled control, previous page, next page, and hidden control, zoom-in control, and close control in the upper right corner on the first page are not operable because they are displayed in a pictorial manner. When the user clicks any position of the first page, the client browser sends the position information of the operation event and the like to the remote isolation browser, and the remote isolation browser determines which control, namely the target control, is clicked by the user according to the position information of the operation event and the like.
For example, if the user clicks on the search box, the remote isolation browser determines that the target control is the search box. For another example, if the user clicks the setting control, the remote isolation browser determines that the target control is the setting control.
After determining the target control, the proxy server determines whether the target control has editing properties. In the embodiment of the application, the target control with editing attribute means that: if the RBI technology is not adopted, the user can input characters except English and numerals, such as Chinese, korean, characters which can be input only by matching with a top-grade key, and the like, which are different from letters and numerals which can be directly input by using a keyboard, chinese and the like can be input only by matching a plurality of keys. For example, when a pinyin input method is used for inputting a 'night' word, y, e and 1 are required to be sequentially input (in a Chinese character with pinyin being ye, the night is arranged in the first case); for another example, when inputting the% number, the up key and the number key 5 need to be pressed simultaneously.
Referring to fig. 4 again, when the target control is a search box, the remote isolation browser determines that the target control has editing properties. For another example, when the target control is a change control, the remote isolation browser determines that the target control does not have editing properties. For another example, when the target control is a camera icon, the remote isolation browser determines that the target control does not have editing properties. And when the remote isolation browser determines that the target control has editing properties, sending an indication message to the terminal equipment, wherein the indication message is used for indicating the client browser to set the input box as a focus.
In the above embodiment, after determining that the target control corresponding to the operation event has the editing attribute, the proxy server sends an indication message to the terminal device. However, the embodiment of the present application is not limited thereto, and in other possible implementations, the proxy server may also determine whether the indication message needs to be sent according to the location of the target control, or the like. For example, the target control is located at a preset position, an indication message is sent to the terminal device,
optionally, in the foregoing embodiment, after setting the input box to be a focus according to the indication message, the terminal device further moves the input box to the target control. And then, simulating and displaying a focus flickering phenomenon on the target control.
For example, if the input box is created for the first time, the input box may be located at any position on the first page since the focus is not yet generated at this time. Or after the input box is created for the first time, the input box is positioned at a preset position. When the operation event occurs, the remote isolation browser determines the target control and instructs the client browser to set the input box as a focus after finding that the target control has editing properties. If the input box is not on the target control, the position of the focus flicker is not on the target control and is different from the position corresponding to the user operation event, so that the visual result based on RBI access is inconsistent with the expected result, and confusion is caused to the user.
Therefore, in the embodiment of the application, after the terminal device sets the input box as the focus, the input box is moved to the target control, and the focus flickering phenomenon is simulated and displayed on the target control, namely, the target control has a continuously flickering focus which is used for prompting the user to perform the input operation.
For example, referring to fig. 4 again, assuming that the input box is located at the lower right corner (not shown in the figure) initially, the target control is the search box, and after the user sets the input box to the focus, because the positions of the search box and the input box are far apart, if the position of the input box is not moved, the focus flicker scene is simulated in the input box, and the user feels that the focus flicker is in the lower right corner of the client browser, rather than in the search box on the client browser. Obviously, if the input box is not moved in this scenario, a problem may occur that the user misuses as the client browser, and input into the search box cannot be performed.
In the embodiment of the application, the input box is moved to the target control, namely to the search box, and the input box is positioned at the clicking position when the user clicks the target control after the movement. In this way, the scene of focus flicker is simulated in the input box, which is equivalent to the scene of focus flicker occurring in the search box, without misleading the user.
By adopting the scheme, the input box is moved to the target control, and the focus flicker phenomenon is simulated and displayed on the target control, so that the first page displayed in the drawing mode is completely consistent with the first page obtained by isolating the browser loading resources, interference to a user is avoided, and smooth surfing of the user is ensured.
Optionally, the indication message further carries style information, and after the terminal device receives the indication message, a client browser on the terminal device sets an input box according to the style information. Wherein style information indicates at least one of a height, a width, or a font size of text within the input box.
In an exemplary embodiment, when the terminal device displays the first page obtained by drawing, an input box is additionally created, in one manner, the size of the input box may be set to a preset size, that is, the width of the input box is a preset width, the height is a preset height, and the text in the box is set to a preset size, that is, once the user inputs the text, the size of the text is the preset size.
In another mode, after the remote isolation browser determines that the target control has editing properties, style information is determined according to the target control, and style information of different target controls is different. For example, the style information corresponding to the search box is different from the style information corresponding to the login box, and the width of the style information corresponding to the search box is larger, so that the user can conveniently input more contents. And in the style information corresponding to the login frame, the width is smaller, so that the user is limited to input excessive contents.
By adopting the scheme, the terminal equipment sets the input box according to the style information, so that the style of the input box is different along with the different target controls, and further the visual effect presented by the client browser is the same as the visual effect obtained by loading the resources by the remote isolation browser, thereby achieving the purpose of improving the display quality.
Optionally, in the above embodiment, after the terminal device sets the input box to the focus according to the indication message, the input method on the terminal device is further activated. When a user operates a keyboard, target content is input in the input box in response to each input operation of the input box by the user using the input method. And then, updating the target control by using the target content so as to display the target content in the target control. Wherein the target content within the input box is not visible to the user. The target content displayed in the target control is visible to the user.
The terminal device sets the input box as the focus, and activates the local input method, wherein the local input method comprises an input method downloaded by a user and installed on the terminal device, and an input method carried by an operating system of the terminal device. After activating the local input method, the user can input the input box. In the input process, the user can directly press the keyboard to input, or the user calls out the virtual keyboard on the user interface of the terminal equipment, and clicks the virtual keyboard by using a mouse to generate an input operation equivalent to pressing the keyboard.
Typically, one input operation by a user includes a plurality of keyboard events. For example, the user inputs "night" using the pinyin input method, in one mode, the user inputs the pinyin "yewan" and then presses a space or number 1, for a total of 6 keyboard events; in another approach, the user presses the number 2 after entering the pinyin "ywan" (assuming night is 2 nd), there are a total of 5 keyboard events.
After one input operation is finished, the target content is displayed in the input box, as described above for "night". The input box and the target content within the input box are not visible to the user. The terminal equipment sends the target content to the proxy server to obtain an updated pixel stream, and then the target control is updated according to the updated pixel stream so that the target content is displayed in the target control, and the target control and the target content on the target control are visible to the user
By adopting the scheme, when a user inputs an input box, the terminal equipment updates the target control according to the target content input into the input box according to each input operation, so that the target control displays the target content visible to the user, the visual effect presented by the client browser is the same as the visual effect obtained by loading resources by the remote isolation browser as much as possible, and the aim of improving the display quality is fulfilled.
Optionally, in the foregoing embodiment, the terminal device updates the target control with the target content, so that in a process of displaying the target content in the target control, the terminal device sends the target content to the remote isolation browser, interacts with the remote isolation browser to obtain an updated pixel stream, and updates the first page with the updated pixel stream. For example, please refer to fig. 5.
Fig. 5 is a flowchart of updating a target control with target content in the secure access method according to the embodiment of the present application. The embodiment comprises the following steps:
501. and after the input operation is finished, extracting the target content input at the time from the input box.
Continuing with the above example, when the target content input by the current input operation of the user is "night" and the target content extracted from the input box by the terminal device is "night" when the "country" has been displayed in the target control.
502. The client browser on the terminal device sends the target content to the remote quarantine browser on the proxy server.
In the embodiment of the application, based on the RBI technology, a data channel is established between the client browser and the remote isolation browser, and the terminal equipment sends the target content to the remote isolation browser through the data channel.
503. The remote quarantine browser on the proxy server loads the target content on the target control.
Illustratively, the remote quarantine browser on the proxy server updates the target control based on the target content, i.e., loads the target content on the target control. Since the target control is located on the first page, updating the target control is equivalent to updating the first page.
After updating the first page, the remote isolation browser obtains an updated pixel stream according to the updated first page, where in one manner, the updated pixel stream includes pixels of each row and each column of the first page. In another approach, the update pixel stream contains only pixels per row, column of the target control. In yet another approach, the updated pixel stream contains pixels of a region centered on the target control.
504. The remote quarantine browser on the proxy server sends an update pixel stream to the client browser on the terminal device.
Illustratively, the remote quarantine browser sends the update pixel stream to the client browser over the data channel.
505. And updating and displaying the first page according to the updated pixel stream so as to display the target content in the target control.
And the client browser redraws the first page according to the received updated pixel stream so as to update the first page.
By adopting the scheme, the client browser and the remote isolation browser interact to acquire the updated pixel stream, and the first page is reconstructed according to the updated pixel stream, so that the first page is ensured to be more accurate.
Optionally, in the above embodiment, the input operation of the user mainly includes two kinds of operations as follows: single character input and mixed input. Wherein, the single character input means: the user inputs letters or numbers, and can complete the input by pressing one key at a time. For example, the user may input 8 and press the numeric key 8; for another example, the user may input a and press the character key a. For such an input operation, each time the user performs an input operation, a character or a number is input into the input box. The client browser extracts characters from the input frame and sends the characters to the remote isolation browser, so that an updated pixel stream is obtained, and the updated pixel stream is utilized to update and display the first page.
The hybrid input refers to: one input operation contains a plurality of keyboard events. For example, the user inputs "night" using a pinyin input method. When the input operation is a mixed input, two cases are further divided: one is that the input method supports the back display, and the other is that the input method does not support the back display.
When the input method supports the back display, the user can see the currently input content on the interface of the client browser at a glance. For example, referring to fig. 6, fig. 6 is a schematic diagram illustrating a secure access method according to an embodiment of the present application. Referring to fig. 6, the user inputs "night" using the pinyin input method, and sequentially presses the character keys y, e, w, a, n. In the pressing process, y, e,', w, a and n are sequentially displayed in a gray highlighted frame in the figure.
For the input method supporting the back display, after one input operation is finished, for example, as shown in fig. 6, the user sequentially presses the character key y, e, w, a, n and presses the number key 1 or the space, and then one input operation is finished. The input target content is "night". The client browser extracts the target content from the input box and sends it to the remote isolation browser to obtain an updated pixel stream and update the first page.
When the input is mixed input and the mixed input does not support back display, the terminal equipment creates a label on the first page, and displays a character stream corresponding to the target content in the label, wherein the character stream is visible to a user. And when the input operation is finished, the label is emptied. The label is, for example, a transparent label.
Referring again to fig. 6, the user presses the character key y, e, w, a, n in sequence, and the "ye' wan" visible to the user appears in the label. And then, when the user presses the number key 1 or the space key, the input operation is finished, and the terminal equipment clears the label.
In the embodiment of the application, the label is similar to an input box with an automatic expansion width, and the addition of the text input by the dead person automatically expands the width, so that the problem of incomplete display can not occur. For example, in FIG. 6, when the user enters ye, the width of the label is the sum of the widths of the two characters; after the user inputs ye' wan, the width of the label is the sum of the widths of 6 characters.
Alternatively, in the above embodiment, after the label is first created, the label may be located at any position or a preset position on the first page. When the terminal device sets the input box as the focus, the tag is moved to the focus position to more intuitively simulate the user input.
When the input method does not support the back display, a label is created, and the character stream corresponding to the target content in the mixed input process is displayed by the label, so that the user input process is more vividly simulated on the first page of the drawing class, and the updating of the first page displayed in the drawing mode is ensured to be smoother.
Optionally, in the foregoing embodiment, after the current input operation is finished, the terminal device further clears the input box after extracting the target content input this time from the input box.
For example, for each input operation, only the target content of the current input is displayed in the input box. And after the input operation is finished, the terminal equipment immediately empties the target content in the input frame. And simultaneously, the input box is moved backwards, so that the focus flickers after the target content input at this time on the target control. For example, the target control is a search box, and the user inputs the night of the country, and three input operations are performed, namely, the first input of "country", the second input of "night", and the third input of "night". After the first input operation is finished, a 'village' two-word appears in the search box, and the terminal equipment moves the input box backwards so that the focus flashes behind the 'village' word. After the second input operation is finished, the 'rural' appears in the search box, and the terminal equipment clears the 'word' in the input box and moves the input box backwards so that the focus flashes behind the 'word'.
From the above, it can be seen that: the method is an embodiment, on one hand, the isolation browser determines the target control, which is equivalent to determining the cursor position of the focus; on the other hand, an input box is simulated at a designated position on the client browser, and the input box is set as a focus, so that the client browser interface simulates and displays cursor flickering. Moreover, the client browser activates the input method of the system. When a user inputs a character, namely target content, through the input method, the target content is immediately transmitted to a focus element of the remote isolation browser, so that the remote isolation browser updates the first page according to the target content. And then, the updated pixel stream is sent to the client browser, so that the client browser redraws the first page according to the updated pixel stream. At the same time, the client browser moves the input box to the new cursor position. For example, when the target content is one character, the user moves one character backward and continues to input.
By adopting the scheme, after each input operation is finished, the terminal equipment clears the input frame, so that the terminal equipment only extracts the target content input at this time after each input operation is finished, and the speed and the accuracy are high.
Optionally, in the above embodiment, after the remote isolation browser receives the operation event and determines the target control, when the target control does not have the editing attribute, the remote isolation browser obtains a resource corresponding to the target control. And then, the remote isolation browser loads a second page according to the resource, and sends a pixel stream corresponding to the second page to the terminal equipment, so that the terminal equipment displays the second page in a drawing mode.
Referring to fig. 4, when the user clicks on the controls such as news, bar, login, setting, news hot 4, etc., the remote isolation browser determines that the target control corresponding to the operation event does not have editing properties, but should skip the page. At this time, the proxy server acquires the resource corresponding to the target control. For example, the proxy server is an edge node in the CDN network, and if the proxy server locally stores a resource corresponding to the target control, the remote isolation browser loads the resource from the local; if the proxy server does not store the resources corresponding to the target control locally, the proxy server returns to the source and acquires the resources from the source station.
For another example, if the proxy server is a proxy server in the architecture shown in fig. 1, the proxy server obtains a resource corresponding to the target control from the source server, and loads the resource by the remote isolation browser.
By adopting the scheme, for the target control without editing attribute, the proxy server acquires and loads the resource to obtain the second page, and the pixel stream of the second page is sent to the terminal equipment, so that the terminal equipment generates a visual result of page jump, the display of the client browser is ensured to be smoother, and the user is smoothly surfing experience.
Fig. 7A is a schematic diagram of still another network architecture of the secure access method according to the embodiment of the present application. Fig. 7B is a flowchart corresponding to fig. 7A.
Referring to fig. 7A, a client browser is installed on a terminal device, and a remote isolation browser is set on a proxy server. And displaying the first page by a user interface of the client browser in a drawing mode. The terminal equipment creates an input box and a label on the first page, wherein the input box is used for supporting the input of a user local input method, and the label is used for displaying a character stream when the input method does not support the back display.
The proxy server is also called as RBI proxy server, on which a proxy gateway and a remote isolation browser are deployed, the remote isolation browser obtains resources from the source server after receiving an access request of the client browser each time, finishes loading the resources in the remote isolation browser to obtain a first page, and then transmits the loaded visual result back to the user. And a data channel is established between the client browser and the isolation browser and is used for transmitting pixel streams and the like.
Referring to fig. 7B, the present embodiment is described from the perspective of interaction between a client browser and a remote isolation browser, and includes:
701. and the client browser sends an access request to the remote isolation browser through the data channel.
In this embodiment, a user accesses the RBI site, i.e., accesses the origin server, through the client browser, and sends an access request to the remote quarantine browser on the proxy server.
702. The remote isolation browser completes the page loading.
Illustratively, the remote quarantine browser retrieves resources from the origin server and loads them to obtain the first page.
703. The remote quarantine browser sends a pixel stream of the first page to the client browser.
704. The client browser displays the first page in a drawing mode, and simultaneously creates a transparent input box and a transparent label.
705. The client browser judges whether an operation event of the user on the first page is monitored, and if the operation event is monitored, step 706 is executed; if no operational event is monitored, return to step 705.
706. The client browser sends an operational event to the remote quarantine browser.
707. The remote quarantine browser determines that the target control has editing properties.
And the remote isolation browser determines the target control according to the operation event, and further determines whether the target control has editing properties. And when the target control has editing properties, acquiring the width, height, position, font size and the like of the target control.
708. The remote quarantine browser sends an indication message to the client browser.
709. The client browser moves the transparent input box and transparent label to the appropriate position and sets the transparent input box as the focus.
710. The client browser activates a local input method and monitors target content in a transparent input box.
711. The client browser determines whether the input operation is a hybrid input operation, and if so, step 712 is performed; if the input operation is single character input, step 715 is performed.
712. The client browser determines whether the input method supports the echo, and if so, step 714 is executed; if the echo is not supported, step 713 is performed.
713. And displaying the character stream corresponding to the target content in the transparent label in each input process, and then executing step 714.
714. And after each output operation is finished, extracting target content in the transparent input frame, and emptying the transparent label.
It should be noted that, if the input method supports the echo display, the transparent label is not required to be used for displaying the character stream visible to the user, and the transparent label is not required to be emptied.
715. The client browser sends the target content to the remote quarantine browser.
When the input operation is single character input, the target content is a single character, such as a single english letter, a number, or the like; when the input operation is a mixed input, the target content is not a single english letter or number, for example, the target content is "night", or the like.
716. The client browser clears the transparent input box.
717. And the remote isolation browser updates the target control according to the target content.
Because the target control is located on the first page, updating the target content on the target control is equivalent to updating the first page.
718. The remote quarantine browser sends an update pixel stream to the client browser.
719. The client browser updates and displays the first page according to the updated pixel stream to display the target content in the target control, and then step 705 is performed.
The following are examples of the apparatus of the present application that may be used to perform the method embodiments of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method of the present application.
Fig. 8 is a schematic diagram of a security access device according to an embodiment of the present application. The security access apparatus 800 is integrated on a terminal device, the apparatus comprising: a display module 81, a processing module 82, a transmitting module 83 and a receiving module 84.
The display module 81 is configured to display a first page on a user interface of the client browser in a drawing manner;
a processing module 82 for creating an input box on the first page;
a sending module 83, configured to send an operation event to a proxy server after the processing module 82 monitors the operation event of the user on the first page;
a receiving module 84, configured to receive an indication message from the proxy server, where the indication message is sent by a remote quarantine browser on the proxy server after receiving the operation event;
the processing module 82 is further configured to set the input box to a focus according to the indication message.
In a possible implementation manner, the processing module 82 is further configured to activate an input method of the terminal device after setting the input box to a focus according to the indication message; inputting target content in the input box in response to each input operation of the input box by a user through the input method, wherein the target content in the input box is invisible to the user; and updating the target control by utilizing the target content so as to display the target content in the target control, wherein the target content displayed in the target control is visible to the user.
In a possible implementation manner, when the processing module 82 updates the target control with the target content to display the target content in the target control, after the input operation is finished, the processing module extracts the target content input this time from the input box;
the sending module 83 is further configured to send the target content to the proxy server;
the receiving module 84 is further configured to receive an updated pixel stream from the proxy server, where the updated pixel stream is a pixel stream corresponding to the updated first page after the remote isolation browser on the proxy server updates the target control with the target content;
the processing module 82 is configured to update and display the first page according to the updated pixel stream, so as to display the target content in the target control.
In a possible implementation, the processing module 82 is further configured to create a tag on the first page;
when the input operation is a mixed input operation and the input method does not support back display, displaying a character stream corresponding to the target content in the tag, wherein the character stream is visible to the user, and the mixed input operation comprises at least two keyboard events; and after the input operation is finished, the label is emptied.
In a possible implementation manner, the processing module 82 is further configured to empty the input box after extracting the target content input at this time from the input box after the input operation at this time is finished, and move the input box to the target content in the target control, where the content input at the next time is located after the target content input at this time.
In a possible implementation manner, the processing module 82 is further configured to set the input box according to style information carried by the indication message, where the style information indicates at least one of a height, a width, or a font size of characters in the input box.
In a possible implementation, the processing module 82 is further configured to move the input box onto the target control after setting the input box to the focus according to the indication message; and simulating and displaying a focus flickering phenomenon on the target control.
In one possible implementation, the input box is a transparent input box.
The security access device provided by the embodiment of the present application may perform the actions of the terminal device in the above embodiment, and its implementation principle and technical effects are similar and will not be described herein.
Fig. 9 is a schematic diagram of a security access device according to an embodiment of the present application. The secure access device 900 is integrated on a proxy server, the device comprising: a receiving module 91 and a transmitting module 92.
A receiving module 91, configured to receive an operation event from a terminal device, where the operation event is an operation event of a user monitored by the terminal device on a first page, where the first page is a page displayed by a client browser on the terminal device in a drawing manner;
and a sending module 92, configured to send an indication message to the terminal device according to the operation event, so that the terminal device sets an input box on the first page as a focus.
In a possible implementation manner, the secure access device 900 further includes a processing module 93, and the receiving module 91 is further configured to receive the target content from the terminal device;
the processing module 93 is further configured to update the target control according to the target content;
the sending module 92 is further configured to send an updated pixel stream to the terminal device, where the updated pixel stream is a pixel stream corresponding to the updated first page.
In a possible implementation manner, the processing module 93 is further configured to determine whether the target control corresponding to the operation event has an editing attribute;
The sending module 92 is configured to send an indication message to the terminal device when the target control has an editing attribute.
In a possible implementation manner, the processing module 93 is further configured to obtain, when the target control does not have the editing attribute, a resource corresponding to the target control; loading a second page according to the resource;
the sending module 92 is further configured to send a pixel stream corresponding to the second page to the terminal device, so that the terminal device displays the second page in a drawing manner
The security access device provided by the embodiment of the present application can execute the actions of the proxy server in the above embodiment, and its implementation principle and technical effects are similar, and will not be described herein.
Fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 10, the electronic device 1000 is, for example, the above-mentioned terminal device or proxy server, and the electronic device 1000 includes:
a processor 101 and a memory 102;
the memory 102 stores computer instructions;
the processor 101 executes the computer instructions stored by the memory 102 such that the processor 101 performs the secure access method as implemented by the terminal device or proxy server as described above.
The specific implementation process of the processor 101 may refer to the above-mentioned method embodiment, and its implementation principle and technical effects are similar, and this embodiment will not be described herein again.
Optionally, the electronic device 1000 further comprises a communication component 103. The processor 101, the memory 102, and the communication unit 103 may be connected via a bus 104.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores computer instructions, and the computer instructions are used for realizing the secure access method implemented by the terminal equipment or the proxy server when being executed by a processor.
The embodiment of the application also provides a computer program product, which comprises a computer program, and the computer program realizes the security access method implemented by the terminal equipment or the proxy server when being executed by a processor.
In addition, the embodiment of the present application further provides a secure access system, which includes a terminal device and a proxy server, and the actions of the terminal device and the proxy server can be referred to the description of the above embodiments, which is not repeated here.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (13)
1. A secure access method, applied to a terminal device, comprising:
displaying a first page on a user interface of a client browser in a drawing mode;
creating an input box on the first page;
after monitoring an operation event of a user on the first page, sending the operation event to a proxy server;
receiving an indication message from the proxy server, wherein the indication message is sent after a remote isolation browser on the proxy server receives the operation event;
and setting the input box as a focus according to the indication message.
2. The method of claim 1, wherein after setting the input box to focus according to the indication message, further comprising:
activating an input method of the terminal equipment;
inputting target content in the input box in response to each input operation of the input box by a user through the input method, wherein the target content in the input box is invisible to the user;
And updating the target control by utilizing the target content so as to display the target content in the target control, wherein the target content displayed in the target control is visible to the user.
3. The method of claim 2, wherein the updating the target control with the target content to display the target content in the target control comprises:
after the input operation is finished, extracting the target content input at this time from the input box;
transmitting the target content to the proxy server;
receiving an updated pixel stream from the proxy server, wherein the updated pixel stream is a pixel stream corresponding to a first updated page after a remote isolation browser on the proxy server updates the target control by using the target content;
and updating and displaying the first page according to the updated pixel stream so as to display the target content in the target control.
4. A method according to claim 2 or 3, further comprising:
creating a tag on the first page;
when the input operation is a mixed input operation and the input method does not support back display, displaying a character stream corresponding to the target content in the tag, wherein the character stream is visible to the user, and the mixed input operation comprises at least two keyboard events;
And after the input operation is finished, the label is emptied.
5. The method according to claim 3, wherein after the input operation is finished, extracting the target content of the input from the input box, the method further comprises:
and clearing the input box, and moving the input box to the position behind the target content in the target control, so that the content input next time is positioned behind the target content input this time.
6. A method according to any one of claims 1 to 3, further comprising:
and setting the input box according to the style information carried by the indication message, wherein the style information indicates at least one of the height, the width or the font size of the characters in the input box.
7. A method according to any one of claims 1 to 3, wherein after setting the input box to focus according to the indication message, further comprising:
moving the input box to a target control;
and simulating and displaying a focus flickering phenomenon on the target control.
8. A method according to any one of claim 1 to 3, wherein,
the input box is a transparent input box.
9. A secure access method, applied to a proxy server, comprising:
receiving an operation event from terminal equipment, wherein the operation event is an operation event of a first page, which is monitored by the terminal equipment, by a user, and the first page is displayed by a client browser on the terminal equipment in a drawing mode;
and sending an indication message to the terminal equipment according to the operation event, so that the terminal equipment sets an input box on the first page as a focus.
10. The method as recited in claim 9, further comprising:
receiving target content from the terminal equipment;
updating the target control according to the target content;
and sending an updated pixel stream to the terminal equipment, wherein the updated pixel stream is the pixel stream corresponding to the updated first page.
11. The method according to claim 9, wherein said sending an indication message to said terminal device according to said operation event comprises:
determining whether the target control corresponding to the operation event has editing attribute;
and when the target control has editing properties, sending an indication message to the terminal equipment.
12. A secure access system comprising a terminal device for implementing the method according to any of claims 1-8 and a proxy server for implementing the method according to any of claims 9-11.
13. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method according to any one of claims 1 to 11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310532846.9A CN116643680A (en) | 2023-05-11 | 2023-05-11 | Secure access method, system and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310532846.9A CN116643680A (en) | 2023-05-11 | 2023-05-11 | Secure access method, system and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116643680A true CN116643680A (en) | 2023-08-25 |
Family
ID=87639172
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310532846.9A Pending CN116643680A (en) | 2023-05-11 | 2023-05-11 | Secure access method, system and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116643680A (en) |
-
2023
- 2023-05-11 CN CN202310532846.9A patent/CN116643680A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3623942B1 (en) | Message processing method and apparatus, storage medium, and computer device | |
US7770122B1 (en) | Codeless dynamic websites including general facilities | |
CN106547417B (en) | Method and device for displaying background task message | |
CN104995601B (en) | Switching to and from native web applications | |
KR20110050707A (en) | New tab page and bookmark toolbar in browser | |
WO2014011271A1 (en) | Systems and methods for enabling internet co-browsing | |
CN102939583A (en) | Creating task sessions | |
CN103543925A (en) | Method and device for operating pictures | |
CN107818101A (en) | Method and device for page jump | |
CN107045546B (en) | Webpage processing method and device and intelligent terminal | |
JP6015967B2 (en) | Device and program for displaying web pages | |
CN111934985B (en) | Media content sharing method, device, equipment and computer readable storage medium | |
CN102831150A (en) | Interactive method, system and terminal for browser and local application | |
CN107643911B (en) | HTML 5-based interface interaction and display system and method | |
CN110007831B (en) | Page turning control method and device and terminal equipment | |
CN114116098B (en) | Application icon management method and device, electronic equipment and storage medium | |
CN113688341B (en) | Dynamic picture decomposition method and device, electronic equipment and readable storage medium | |
CN116643680A (en) | Secure access method, system and readable storage medium | |
US20160147741A1 (en) | Techniques for providing a user interface incorporating sign language | |
US8793342B2 (en) | Interpreting web application content | |
RU2202825C2 (en) | Method for visualizing object of advertising-andinformational character | |
CN114895815A (en) | Data processing method and electronic equipment | |
JP2012008970A (en) | Summary information display device, summary information display method, summary information display program, summary information provision device, summary information provision program, and storage medium | |
WO2016107871A1 (en) | Adaptive method for device independent web page presentation | |
CN107995091B (en) | Self-service method and device based on enterprise instant messaging application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |