CN103345603A - Webpage browsing method and device based on sandbox technology - Google Patents

Webpage browsing method and device based on sandbox technology Download PDF

Info

Publication number
CN103345603A
CN103345603A CN2013102959278A CN201310295927A CN103345603A CN 103345603 A CN103345603 A CN 103345603A CN 2013102959278 A CN2013102959278 A CN 2013102959278A CN 201310295927 A CN201310295927 A CN 201310295927A CN 103345603 A CN103345603 A CN 103345603A
Authority
CN
China
Prior art keywords
sandbox
browser
framework
browser process
progress
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102959278A
Other languages
Chinese (zh)
Other versions
CN103345603B (en
Inventor
刘伟刚
孙鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310295927.8A priority Critical patent/CN103345603B/en
Priority claimed from CN2011104488152A external-priority patent/CN102436508B/en
Publication of CN103345603A publication Critical patent/CN103345603A/en
Application granted granted Critical
Publication of CN103345603B publication Critical patent/CN103345603B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a webpage browsing method based on the sandbox technology. The webpage browsing method includes the steps of when the command that webpage browsing is carried out in a sandbox is received, starting a frame progress outside the sandbox so as to process the operations generated in the frame progress outside the sandbox, intercepting and capturing a browser progress established by the frame progress, placing the browser progress into the sandbox so as to store the webpage access results of the browser progress in an assigned catalogue inside the sandbox, and/or enabling a script in a webpage to operate in the virtual environment of the sandbox, wherein the browser progress established by the frame progress is intercepted and captured, and the method for placing the browser progress into the sandbox includes the steps of when the browser progress is established by the frame progress, using an application program with the sandbox function to intercept and capture the browser progress, and placing the browser progress into the sandbox for operation. According to the webpage browsing method based on the sandbox technology, convenience to user operations is ensured, and the requirement for webpage access safety is met.

Description

Method and device based on sandbox technology browsing page
Technical field
The present invention relates to the secure browser technical field, particularly relate to method and device based on sandbox technology browsing page.
Background technology
Along with becoming increasingly conspicuous of network security problem, more sandbox (SandBox) technology is applied to safe web page visit aspect.So-called sandbox technology is sayed from technology angle, from the suspicious program of original prevention system is visited exactly, be transformed into the visit of suspicious program to disk, registration table etc. is redirected under the specified folder, thereby elimination is to the harm of system.For browser, the sandbox system constructing virtual execution environment of a safety.Any disk write operation by browser is done all will be redirected in the specific temporary folder.Like this, even comprise rogue programs such as virus, wooden horse, advertisement in the webpage, even installed by force, also all just be installed in the temporary folder, can user's real system do not worked the mischief.
The use of this technology, the security that has improved custom system, but also brought some restrictions simultaneously.For example, the user may need sometimes by the file on the real download network of browser, at this moment because the restriction of sandbox, file can only download under the virtual directory, and after browser program withdrawed from, sandbox can be deleted these temporary files, caused file forever not preserve.Perhaps sometimes the user need adjust browser some arrange, can cause the modification of registry information to the modification of these settings, at this moment because the restriction of sandbox, these modifications can successfully not preserved.As seen, must make necessary adjustment to the use of existing sandbox technology, could satisfy the needs of browser.
Summary of the invention
The invention provides method and device based on sandbox technology browsing page, both guaranteed the convenience of user's operation, also satisfied the security requirement of web page access.
The embodiment of the invention provides following scheme:
A kind of method based on sandbox technology browsing page, it comprises:
When receiving the instruction of in sandbox, carrying out web page browsing, outside sandbox, start the framework process, in order to the operation that produces in the described framework process, outside sandbox, handle;
Intercept and capture the browser process of framework process creation, described browser process is put into sandbox, in order to described browser process accessed web page result is kept at assigned catalogue in the sandbox, and/or scripts in web pages operates in the virtual environment of sandbox;
The browser process of wherein said intercepting and capturing framework process creation, described browser process is put into sandbox comprise:
During described framework process creation browser process, intercept and capture browser process by an application program with sandbox function, and this browser process is put into the sandbox operation.
Wherein, the described operation that produces in the framework process comprises at least: download the file into this locality, add webpage, browser in the collection and start refresh routine automatically and carry out in upgrading one.
The embodiment of the invention also provides a kind of device based on sandbox technology browsing page, comprising:
Framework process initiation unit when being used for receiving the instruction of carrying out web page browsing in sandbox, starts the framework process, in order to the operation that produces in the described framework process, handle outside sandbox outside sandbox;
The browser process processing unit, be used for intercepting and capturing the browser process of framework process creation, described browser process is put into sandbox, in order to described browser process accessed web page result is kept at assigned catalogue in the sandbox, and/or scripts in web pages operates in the virtual environment of sandbox;
Wherein the browser process processing unit is configured to intercept and capture browser process by an application program with sandbox function when described framework process creation browser process, and this browser process is put into the sandbox operation.
Wherein, the described operation that produces in the framework process comprises at least: download the file into this locality, add webpage, browser in the collection and start refresh routine automatically and carry out in upgrading one.
According to specific embodiment provided by the invention, the present invention has reached following technique effect:
By the present invention, employing moves the part process of browser in sandbox mode, be that browser process operates in the sandbox, the framework process operates in outside the sandbox, like this owing to provide the framework process of user's operation part to operate in outside the sandbox, be not subjected to the drawbacks limit of sandbox, therefore, user's operating result can be kept at this locality.Simultaneously, browser process runs in the sandbox, and the result of web page access is stored in the temp directory of sandbox, and the rogue program in the webpage operates in the virtual environment of sandbox, therefore, can not destroy the real system of user, thereby has guaranteed the security of browser.Like this, both guarantee the convenience of user's operation, also satisfied the security requirement of web page access.And owing to be that browser cooperates the above-mentioned functions of finishing with the application program with sandbox function, namely intercept and capture browser process by the application program with sandbox function, and put it into operation in the sandbox, browser and another application program with sandbox function can be separated like this, not only can use in it when making the sandbox function of browser program in realizing the present invention and realize in the sandbox functional module of integrating, the application program that also can have the sandbox function in conjunction with another makes the sandbox function realization of browser have the extensibility of program more like this.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use among the embodiment below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is implementation synoptic diagram of the prior art;
Fig. 2 is the process flow diagram of the method that provides of the embodiment of the invention;
Fig. 3 is the implementation synoptic diagram in the embodiment of the invention;
Fig. 4 is the schematic representation of apparatus that the embodiment of the invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, the every other embodiment that those of ordinary skills obtain belongs to the scope of protection of the invention.
For the ease of understanding, at first sandbox of the prior art is introduced simply in the use-pattern of browser.As everyone knows, the implementation of some browser is divided into framework process (Frame Process) and two parts of browser process (Browser Process) at present, wherein, the framework process is responsible for UI(User Interface such as user's input and web page access action, user interface) operation-interface, browser process is (in many based tab navigations device, this browser process is the equal of the label process, a plurality of labels can corresponding browser process, along with increasing of the label of opening, the number of browser process can increase) the responsible visit result who shows the user; The framework process is by IPC(Inter-Process Communication, Inter-Process Communication) behavior of control browser process.The browser of prior art uses the implementation of sandbox function, as long as need carry out web page browsing in sandbox, is that framework process and browser process are all entered in the sandbox, as shown in Figure 1 all just.
Yet, the inventor finds in realizing process of the present invention, framework process and browser process just because of browser are all moved in sandbox, make the various restrictions of sandbox all act on browser, it all is provisional that the user operates the modification that browser produces in the sandbox, for example, download file, revise setting, upgrade operations such as collection, when browser withdraws from, all modifications can all be lost, and this restriction brings is inconvenient to be far longer than the security that sandbox provides, and these are inconvenient and then limited the use of sandbox technology at browser.Therefore, allow browser in sandbox, be convenient to use, just must overcome these defectives that browser uses the sandbox function.
Based on the above, the embodiment of the invention provides a kind of method based on sandbox technology browsing page, and referring to Fig. 2, this method comprises:
S201: when receiving the instruction of in sandbox, carrying out web page browsing, outside sandbox, start the framework process, in order to the operation that produces in the described framework process, outside sandbox, handle;
During specific implementation, can be to be defaulted as long as start browser, just need in sandbox, carry out web page browsing, at this moment, as long as receive the instruction that starts browser, just be equivalent to receive the instruction of in sandbox, carrying out web page browsing.Perhaps, under another kind of mode, can also not to enter sandbox automatically, but feel in case of necessity the user, designated button in the click browser (can also be other mode of entrance certainly) is emitted in the instruction of carrying out web page browsing in the sandbox with this, etc.Above any mode can be used and be not limited to the embodiment of the invention.Receive after the instruction of in sandbox, carrying out web page browsing, just can outside sandbox, start a framework process.
S202: intercept and capture the browser process of framework process creation, described browser process is put into sandbox, in order to the web page access result is kept at assigned catalogue in the sandbox, and/or scripts in web pages operates in the virtual environment of sandbox.
Created outside sandbox after the framework process, the framework process can start browser process, at this moment, the browser process of creating can be intercepted and captured, and put it in the sandbox, that is to say, browser process is put into sandbox, and the framework process has been stayed outside the sandbox, as shown in Figure 3.Like this, because the framework process is responsible for user's input operation or the operations such as automatic renewal of browser, therefore, it is stayed outside the sandbox, this process just can not be subjected to the restriction of sandbox, like this, download certain file to local when the user carries out, perhaps add operations such as certain webpage in the collection, perhaps when browser starts refresh routine automatically and carries out renewal, corresponding processing all can be carried out outside sandbox, thereby preserves result in local system.Simultaneously, because browser process is responsible for displayed web page visit result, therefore, the concrete operation action of webpage then has been limited in the sandbox, also be, the web page access result can be kept in the sandbox under the moral assigned catalogue, and scripts in web pages operates in the virtual environment of sandbox, can user's local system not impacted.
Need to prove, though in embodiments of the present invention, frame window has been stayed outside the sandbox that section processes result can directly be kept in user's the local system,, normally can't reduce the web page browsing process safe.This be because, general malicious attack is normally carried out by the script that moves in webpage, for example, open after certain webpage, if inserted the script of a malice in this webpage, then may the force download file, certain plug-in unit etc. perhaps is installed.But this scripts in web pages operation action is responsible for by browser process, and this browser process has been placed in the sandbox, therefore, even comprise the malicious script program in the webpage, when operation, also can be limited in the virtual environment of sandbox, and can not impact local system.And the framework process only is responsible for importing relevant behavior with the user, therefore, the result who produces is normally initiatively carried out by the user, these behaviors are initiatively initiated by the user, be not have malicious attack, therefore, preserve corresponding result in this locality and also can not bring security threat to local system.
As seen, in embodiments of the present invention, employing moves the part process of browser in sandbox mode, be that browser process operates in the sandbox, the framework process operates in outside the sandbox, owing to provide the user to operate and the framework process upgraded automatically etc. operates in outside the sandbox, is not subjected to the drawbacks limit of sandbox like this, therefore, user's operating result or upgrade result etc. automatically and can be kept at this locality.Simultaneously, browser process runs in the sandbox, and the result of web page access is stored in the temp directory of sandbox, and the rogue program in the webpage operates in the virtual environment of sandbox, therefore, can not destroy the real system of user, thereby has guaranteed the security of browser.Like this, both guarantee the convenience of user's operation, also satisfied the security requirement of web page access.
Need to prove in addition, if above-mentioned user carries out the mode browsed in the sandbox in case of necessity thinking, after the user selects to carry out browsing in the sandbox, can create a frame window again, that is to say, In the view of the user, be equivalent to start two frame windows, frame window originally and the browser window of having created thereof move outside sandbox, and the new framework process that starts is moved outside sandbox, and the browser process of the framework process creation of this new startup is moved in sandbox.
In actual applications, can be cooperated with the application program with sandbox function by browser and finish above-mentioned functions, that is to say, after browser has newly started a framework process, during this framework process creation browser process, intercept and capture browser process by this application program with sandbox function, and put it into operation in the sandbox.Under this implementation, can enter into sandbox in order to make browser process, also need provide extra information to drive to identify for sandbox.During specific implementation, can be when framework process creation browser process, for browser process is added a sign that presets, like this, after the application program with sandbox function intercepts browser process, if find this sign, just can browser process be put into sandbox by the sandbox driving and move.Wherein, this sign that presets can be the sandboxse command line parameter, other implementations that can certainly make an appointment.
In addition, in the process of carrying out web page browsing, though browser is divided into framework process and browser process two parts,, in some cases, mutual (also being Inter-Process Communication) that needs between framework process and the browser process to carry out some message could be realized normal web page browsing.Yet, in embodiments of the present invention, browser process is in sandbox, and the framework process is outside sandbox, at this moment, if browser process need be in sandbox with sandbox outside framework process when carrying out Inter-Process Communication, because the security of sandbox restriction, the operational order of browser process outside sandbox can be shielded by the sandbox virtual environment, therefore, need sandbox to do special processing, let slip the instruction of browser necessity outside sandbox, to notify outside framework process, simultaneously, outside framework process also needs the browser process that the instruction of some user's operations (for example the user has clicked certain link, perhaps clicks " following one page " button etc.) is notified in the sandbox is carried out corresponding work for the treatment of.
For this reason, browser communication instruction collection that can pre-defined necessity, sandbox is let slip these instruction set that the domestic browser process is outwards sent, thereby guarantees the normal operation of browser.In other words, in order to guarantee that browser can normally move, sandbox can allow some instructions to be issued to outside the sandbox, but prerequisite has 2 points: the first, and framework process, second are issued in this instruction, this instruction belongs to predefined communication instruction collection, have only when these two conditions satisfy simultaneously, could let pass, to guarantee the security of system.
In a word, in embodiments of the present invention, browser process runs in the sandbox, the various modification results that produce in the browser access webpage process like this leave in the temp directory of sandbox, malicious code in the webpage operates in the virtual environment that sandbox provides, thereby has isolated because the malice network address is visited the harm that brings to custom system; Simultaneously, the framework process runs on outside the sandbox, is not subjected to the restriction of sandbox, the user can download the online file that arrives and arrive local disk, and the setting of revising browser also is saved in local registration table, adds network profile to local disk, etc., these operations are not subjected to the restriction of sandbox.
With the embodiment of the invention provide based on the method for sandbox technology browsing page with respect to, the embodiment of the invention also provides a kind of device based on sandbox technology browsing page, referring to Fig. 4, this device can comprise following processing unit:
Framework process initiation unit 401 when being used for receiving the instruction of carrying out web page browsing in sandbox, starts the framework process, in order to the operation that produces in the described framework process, handle outside sandbox outside sandbox;
Browser process processing unit 402, be used for to intercept and capture the browser process of framework process creation, described browser process is put into sandbox, in order to the web page access result is kept at assigned catalogue in the sandbox, and/or scripts in web pages operates in the virtual environment of sandbox.
Wherein, the operation that produces in the described framework process comprises user's input operation.
In actual applications, can be cooperated jointly with the application program that has the sandbox function by browser and finish above-mentioned functions, at this moment, this device can also comprise:
Identify unit when being used for framework process creation browser process, adds sign for described browser process, according to described sign described browser process is put into sandbox so that sandbox drives.
During specific implementation, described sign can comprise the sandboxse command line parameter, certainly, also can be other implementation.
In order to guarantee the normal operation of browser, can allow the instruction of some necessity in sandbox, to send, certainly, and in order to guarantee security, can more pre-defined instruction set, the instruction that only belongs to this instruction set can be let pass.At this moment, this device can also comprise:
The instruction judging unit is used for judging whether this instruction is to send to described framework process, and belonging to the communication instruction collection that presets when the browser process in the sandbox need be sent instruction outside sandbox;
Instruction clearance unit was if the judged result that is used for described instruction judging unit, then should be instructed clearance for being.
In the device based on the browsing page of sandbox technology that the embodiment of the invention provides, employing moves the part process of browser in sandbox mode, be that browser process operates in the sandbox, and the framework process operates in outside the sandbox, like this owing to provide the framework process of user's operation part to operate in outside the sandbox, be not subjected to the drawbacks limit of sandbox, therefore, user's operating result can be kept at this locality.Simultaneously, browser process runs in the sandbox, and the result of web page access is stored in the temp directory of sandbox, and the rogue program in the webpage operates in the virtual environment of sandbox, therefore, can not destroy the real system of user, thereby has guaranteed the security of browser.Like this, both guarantee the convenience of user's operation, also satisfied the security requirement of web page access.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode that software adds essential general hardware platform.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product can be stored in the storage medium, as ROM/RAM, magnetic disc, CD etc., comprise that some instructions are with so that a computer equipment (can be personal computer, server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the present invention or embodiment.
Each embodiment in this instructions all adopts the mode of going forward one by one to describe, and identical similar part is mutually referring to getting final product between each embodiment, and each embodiment stresses is difference with other embodiment.Especially, for device or system embodiment, because it is substantially similar in appearance to method embodiment, so describe fairly simplely, relevant part gets final product referring to the part explanation of method embodiment.Apparatus and system embodiment described above only is schematic, wherein said unit as the separating component explanation can or can not be physically to separate also, the parts that show as the unit can be or can not be physical locations also, namely can be positioned at a place, perhaps also can be distributed on a plurality of network element.Can select wherein some or all of module to realize the purpose of present embodiment scheme according to the actual needs.Those of ordinary skills namely can understand and implement under the situation of not paying creative work.
More than to method and the device based on sandbox technology browsing page provided by the present invention, be described in detail, used specific case herein principle of the present invention and embodiment are set forth, the explanation of above embodiment just is used for helping to understand method of the present invention and core concept thereof; Simultaneously, for one of ordinary skill in the art, according to thought of the present invention, part in specific embodiments and applications all can change.In sum, this description should not be construed as limitation of the present invention.

Claims (4)

1. the method based on sandbox technology browsing page is characterized in that, comprising:
When receiving the instruction of in sandbox, carrying out web page browsing, outside sandbox, start the framework process, in order to the operation that produces in the described framework process, outside sandbox, handle;
Intercept and capture the browser process of framework process creation, described browser process is put into sandbox, in order to described browser process accessed web page result is kept at assigned catalogue in the sandbox, and/or scripts in web pages operates in the virtual environment of sandbox;
The browser process of wherein said intercepting and capturing framework process creation, described browser process is put into sandbox comprise:
During described framework process creation browser process, intercept and capture browser process by an application program with sandbox function, and this browser process is put into the sandbox operation.
2. method according to claim 1 is characterized in that, the wherein said operation that produces in the framework process comprises at least: download the file into this locality, add webpage, browser in the collection and start refresh routine automatically and carry out in upgrading one.
3. the device based on sandbox technology browsing page is characterized in that, comprising:
Framework process initiation unit when being used for receiving the instruction of carrying out web page browsing in sandbox, starts the framework process, in order to the operation that produces in the described framework process, handle outside sandbox outside sandbox;
The browser process processing unit, be used for intercepting and capturing the browser process of framework process creation, described browser process is put into sandbox, in order to described browser process accessed web page result is kept at assigned catalogue in the sandbox, and/or scripts in web pages operates in the virtual environment of sandbox;
Wherein, described browser process processing unit is configured to intercept and capture browser process by an application program with sandbox function when described framework process creation browser process, and this browser process is put into the sandbox operation.
4. device according to claim 3 is characterized in that, the described operation that produces in the framework process comprises at least: download the file into this locality, add webpage, browser in the collection and start refresh routine automatically and carry out in upgrading one.
CN201310295927.8A 2011-12-28 2011-12-28 The method and device of webpage is browsed based on sandbox technology Active CN103345603B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310295927.8A CN103345603B (en) 2011-12-28 2011-12-28 The method and device of webpage is browsed based on sandbox technology

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310295927.8A CN103345603B (en) 2011-12-28 2011-12-28 The method and device of webpage is browsed based on sandbox technology
CN2011104488152A CN102436508B (en) 2011-12-28 2011-12-28 Method and device for browsing webpage based on sandbox technique

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN2011104488152A Division CN102436508B (en) 2011-12-28 2011-12-28 Method and device for browsing webpage based on sandbox technique

Publications (2)

Publication Number Publication Date
CN103345603A true CN103345603A (en) 2013-10-09
CN103345603B CN103345603B (en) 2016-08-10

Family

ID=49280398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310295927.8A Active CN103345603B (en) 2011-12-28 2011-12-28 The method and device of webpage is browsed based on sandbox technology

Country Status (1)

Country Link
CN (1) CN103345603B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916402A (en) * 2014-04-18 2014-07-09 北京奇虎科技有限公司 Method and device for protecting browser download file
CN103970574A (en) * 2014-05-22 2014-08-06 北京奇虎科技有限公司 Office program running method and device and computer system
CN106529942A (en) * 2015-09-09 2017-03-22 青岛海信移动通信技术股份有限公司 NFC card access method and terminal
CN107563189A (en) * 2017-08-24 2018-01-09 东软集团股份有限公司 One kind applies detection method and terminal
CN112257061A (en) * 2020-10-23 2021-01-22 广州小鹏汽车科技有限公司 Method and device for processing webpage content
CN114257841A (en) * 2021-12-20 2022-03-29 恒安嘉新(北京)科技股份公司 Method, device, system, equipment and medium for isolated playback of webpage video

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070174915A1 (en) * 2006-01-23 2007-07-26 University Of Washington Detection of spyware threats within virtual machine
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070174915A1 (en) * 2006-01-23 2007-07-26 University Of Washington Detection of spyware threats within virtual machine
CN102254111A (en) * 2010-05-17 2011-11-23 北京知道创宇信息技术有限公司 Malicious site detection method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
星空下的吻: "Sandbox-沙箱技术", 《HTTP://BBS.KAFAN.CN/THREAD-906580-1-1.HTML》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916402A (en) * 2014-04-18 2014-07-09 北京奇虎科技有限公司 Method and device for protecting browser download file
CN103916402B (en) * 2014-04-18 2018-07-24 北京奇虎科技有限公司 Guard method and the device of file are downloaded to browser
CN103970574A (en) * 2014-05-22 2014-08-06 北京奇虎科技有限公司 Office program running method and device and computer system
CN106529942A (en) * 2015-09-09 2017-03-22 青岛海信移动通信技术股份有限公司 NFC card access method and terminal
CN106529942B (en) * 2015-09-09 2018-07-03 青岛海信移动通信技术股份有限公司 The access method and terminal of a kind of nfc card
CN107563189A (en) * 2017-08-24 2018-01-09 东软集团股份有限公司 One kind applies detection method and terminal
CN112257061A (en) * 2020-10-23 2021-01-22 广州小鹏汽车科技有限公司 Method and device for processing webpage content
CN114257841A (en) * 2021-12-20 2022-03-29 恒安嘉新(北京)科技股份公司 Method, device, system, equipment and medium for isolated playback of webpage video

Also Published As

Publication number Publication date
CN103345603B (en) 2016-08-10

Similar Documents

Publication Publication Date Title
CN102436508B (en) Method and device for browsing webpage based on sandbox technique
CN103345603A (en) Webpage browsing method and device based on sandbox technology
EP3182323B1 (en) System and method for controlling access to data using api for users with disabilities
EP3230919B1 (en) Automated classification of exploits based on runtime environmental features
US20180276369A1 (en) OS Security Filter
CN102592086B (en) Method and device for browsing webpages in sandbox
US20090094150A1 (en) Method and client system for implementing online secure payment
CN103235903A (en) Processing method and device for hiding programs of mobile terminal
CN108469972B (en) Method and device for supporting display of multiple windows in WEB page
WO2016069595A1 (en) Method and system for exchanging content between applications
CN101483658B (en) System and method for input content protection of browser
CN102469096B (en) Method for secure loading of browser online bank
CN103152323A (en) Method and system of controlling access behaviors of client network
CN105718171A (en) Data processing method and terminal
CN105354498A (en) Operation method of registry, related device and equipment
EP2570960A2 (en) Method of controlling information processing system, program for controlling apparatus
CN103036852B (en) A kind of method and device realizing network entry
CN107908957B (en) Safe operation management method and system of intelligent terminal
Huang et al. A11y and Privacy don't have to be mutually exclusive: Constraining Accessibility Service Misuse on Android
CN108089887A (en) A kind of startup control method and device of new added pages
JP2011034349A (en) Terminal protection system and terminal protection method
CN104598812B (en) Web-page approach and device are browsed in sandbox
KR101459261B1 (en) Apparatus and Method for Switching Browser Automatically in a Logical Network Separation
CN102289628A (en) Sandbox-technology-based shell script security operating method and system
CN105592105A (en) Safety-guaranteed asynchronous network access method and safety-guaranteed asynchronous network access device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220801

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right