Disclosure of Invention
The embodiment of the application provides a method and a device for controlling the use of a browser of a reading kiosk operation terminal, electronic equipment and a storage medium, which can be used for starting and controlling the browser of the reading kiosk operation terminal.
In a first aspect, an embodiment of the present application provides a browser usage control method for a reading kiosk operation terminal, including:
starting up an automatic reading application program, extracting a program lock installation package from a corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operating terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package;
the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application;
the program lock application monitors the starting of the browser in real time after the browser is started, and checks and verifies the use of the browser when the browser is started.
Further, after monitoring the browser start in real time after the program lock application is started, and performing check verification on the browser use when the browser is started, the method further includes:
after the verification is successful, the program lock application records a timestamp corresponding to the successful verification, inquires a historical record of the browser according to the timestamp and the exit time of the browser, and generates corresponding record information, wherein the record information comprises the verification information and the login time of the corresponding user and a URL corresponding to the browsing record of the browser.
Further, the program lock application monitors the browser to start in real time after starting, and includes:
the program lock application is automatically started based on the starting broadcast sent by the operating terminal system;
and running a monitoring application starting service after the program lock application is started, acquiring the application package name of the application program to be started in real time, and judging whether the application package name is the application package name of the browser.
Further, the performing verification for browser usage when the browser is started includes:
the program lock application judges that the acquired application package name is the application package name of the browser, and determines that the browser is started;
the program lock application interrupts the browser to start and pops up a checking and verifying dialog box, wherein the checking and verifying dialog box is used for a user to input checking and verifying information, and the checking and verifying information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and the program lock application acquires the checking and verifying information to carry out checking and verifying, and starts the browser after the checking and verifying is successful.
Further, the detecting the system installation package folder and the extracting the program lock installation package by the operation terminal system to install the program lock application includes:
and after the operation terminal system is started, the operation terminal system runs an installation package detection service, automatically traverses each installation package in a system installation package folder, and extracts the program lock installation package from the uninstalled installation packages to install the program lock application.
Further, the starting automatically starts the reading application program, the reading application program extracts the program lock installation package from the corresponding reading application installation package after being started, and the program lock installation package is placed in a system installation package folder of the operating terminal system, including:
after the operation terminal system is started, automatically starting a reading application program, running an installation package management service by the reading application program, and searching whether an installation package installed on the operation terminal system has a program lock application or not through the installation package management service;
and if the program lock application exists on the operation terminal system is not retrieved, the reading application program automatically acquires the highest authority of the operation terminal system, and the program lock installation package is moved to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
Further, before the automatically starting the reading application program at the startup, and before the reading application program extracts the program lock installation package from the corresponding reading application installation package after the starting, the method further includes:
and packaging the program lock application into a system application according to the signature certificate of the operation terminal system, and implanting the corresponding program lock installation package into the reading application installation package.
In a second aspect, an embodiment of the present application provides a browser usage control device for a reading kiosk operating terminal, including:
the device comprises an extraction module, a reading module and a reading module, wherein the extraction module is used for starting up and automatically starting a reading application program, the reading application program extracts a program lock installation package from a corresponding reading application installation package after being started, the program lock installation package is placed into a system installation package folder of an operation terminal system, and the program lock installation package is pre-implanted into the reading application installation package;
the installation module is used for detecting the system installation package folder through the operation terminal system and extracting the program lock installation package to install the program lock application;
and the verification module is used for monitoring the browser starting in real time after the program lock application is started, and verifying the use of the browser when the browser is started.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the browser usage control method of the speakerphone-operated terminal of the first aspect.
In a fourth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the browser usage control method of the speakerphone-operated terminal according to the first aspect.
According to the method and the device for detecting the program lock application, the reading application program is automatically started through starting, the program lock installation package is extracted from the corresponding reading application installation package after the reading application program is started, the program lock installation package is placed into a system installation package folder of an operation terminal system, the operation terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application, the browser is monitored to be started in real time after the program lock application is started, and the browser is checked and verified when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided. And moreover, the use behavior of the browser is recorded and monitored by collecting the recording information of the browser, so that the aim of supervising the reasonable use of the browser by students is fulfilled.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The browser use control method of the reading kiosk operation terminal aims to carry out start control on the browser of the reading kiosk operation terminal through program lock application, so that illegal use of the browser by a user is limited, browsing records of the browser are further carried out through monitoring and recording each URL file of the browser used by the user, the purpose of supervising the user to reasonably use the browser is further achieved, and the user is prevented from excessively using the browser in a violation mode. In addition, through the verification of the proofreading, the basis of tracking the identity of the browser user is provided, and the problem can be conveniently researched when the browser is illegally used in the follow-up process through the record of the proofreading verification information. Compared with the existing reading kiosk operation terminal, in the practical application process, the used reading system, the recording system and other related applications are generally application programs installed on the operation terminal system. That is, when the user uses the reading kiosk to read, the user needs to read through the reading application program of the operation terminal. In general, in order to avoid the illegal use of the browser by the user, the user needs to input a corresponding password when exiting from the reading application to the background of the system. However, in the course of using the campus, these preset passwords are easy to be known by students, and the phenomenon that the students quit the reading application to the background and use the browser to surf the internet occurs. In order to ensure that a user correctly uses the reading kiosk, and prevent the user from watching live video, playing games and other behaviors by using a browser, the starting of the browser needs to be controlled, and the using behaviors need to be recorded and monitored. Therefore, the browser use control method of the reading kiosk operation terminal provided by the embodiment of the application is provided to solve the technical problem that the existing reading kiosk operation terminal cannot well start and control the browser.
The first embodiment is as follows:
fig. 1 is a flowchart illustrating a browser usage control method of a reading kiosk operation terminal according to an embodiment of the present disclosure, where the browser usage control method of the reading kiosk operation terminal provided in this embodiment may be executed by a browser usage control device of the reading kiosk operation terminal, the browser usage control device of the reading kiosk operation terminal may be implemented in a software and/or hardware manner, and the browser usage control device of the reading kiosk operation terminal may be formed by two or more physical entities or may be formed by one physical entity. Generally, the browser use control device of the reading kiosk operation terminal may be a computer, a reading kiosk operation terminal host, or the like.
The following description will be made taking, as an example, a browser use control device of a reading kiosk operation terminal as a main body for executing a browser use control method of the reading kiosk operation terminal. Referring to fig. 1, the method for controlling the use of the browser of the reading kiosk operation terminal specifically includes:
s110, starting the reading application program automatically, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operation terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package.
Specifically, the browser is started and controlled through the program lock application, the installation package of the program lock needs to be pre-embedded into the reading application installation package, and therefore the program lock installation package is conveniently placed into the reading kiosk operation terminal through the subsequent installation of the reading application installation package. And packaging the program lock application into a system application according to the signature certificate of the operating terminal system, and implanting the corresponding program lock installation package into the reading application installation package. When the program lock installation package is implanted into the reading application installation package, the function of monitoring the application starting is achieved by acquiring the page management class object of the operation terminal system and generating an application page management instance as a tool for monitoring the application page starting. Since the program lock application monitors the starting of the browser and needs to be packaged into a system level application, a system internal file of the operation terminal needs to be acquired. Taking an Android (Android) system as an example, internal files of platform.x 509.pet and platform.pk8 of an operation terminal system need to be obtained, and the two files are signature certificates under the Android system and can be used for signing a program lock application into a system application and obtaining all permissions of the operation terminal system. After packaging the program lock application into the system application, placing a program lock installation package (namely, a program lock apk and an Android application installation package) under a raw folder in the reading application installation package, wherein when the reading application is packaged into the apk, the file can be packaged into the reading application installation package without moving.
Further, after the program lock installation package is implanted into the reading application installation package, the reading application installation package is installed in the reading kiosk operation terminal system. And then, when the reading application is started, moving the program lock installation package and placing the program lock installation package into a system installation package folder. As shown in fig. 2, the procedure of moving the program lock installation package includes:
s1101, after the reading application program is started up automatically, the reading application program runs an installation package management service, and whether a program lock application exists in an installation package installed on the operating terminal system is searched through the installation package management service;
s1102, if the program lock application exists on the operation terminal system is not searched, the reading application program automatically acquires the highest authority of the operation terminal system, and the program lock installation package is moved to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
Specifically, when the reading kiosk operation terminal is started, the reading kiosk application is automatically started, and the installation package management service of the operation terminal system is operated. And searching application IDs (application names) of all installation package files (apk files) in a system installation package folder of the operation terminal system through an installation package management service, and if program lock applications exist, directly extracting and installing the program locks. On the contrary, if the program lock application does not exist, the highest authority root of the operation terminal system is automatically obtained through the reading application, and the program lock installation package is automatically moved from the reading application installation package to a system folder (namely/system/app folder) of the operation terminal system by using a moving command of adb (Android Debug Bridge).
And S120, the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application.
Further, after the program lock installation package is placed in a system installation package folder of the operation terminal system, the program lock installation package is automatically detected and extracted for installation through an installation package detection service after the next operation terminal is restarted. Specifically, the operation terminal system may operate an installation package detection service after being started, where the installation package detection service is used to detect installation package files in a system installation package folder, and extract and install installation package files that have not been installed. The installation package detection service automatically traverses each installation package in the system installation package folder, and extracts the program lock installation packages from each installation package to install the program lock application. Since the program lock installation package is in an uninstalled state in the system installation package folder, it will be extracted for installation when detected by the installation package detection service.
S130, monitoring the browser starting in real time after the program lock application is started, and checking and verifying the use of the browser when the browser is started.
After the application lock program is installed, the application lock program can be started by self-starting after starting up, and further starting monitoring and checking verification of the browser are carried out, so that starting control of the browser is realized. Referring to fig. 3, the process of monitoring the browser startup by the program lock application includes:
s1301, automatically starting the program lock application based on the starting broadcast sent by the operating terminal system;
s1302, running a monitoring application starting service after the program lock application is started, acquiring an application package name of an application program to be started in real time, and judging whether the application package name is the application package name of the browser.
After the program lock application installation is executed, the operation terminal system sends a starting broadcast. The program lock application starts automatically according to the startup broadcast and starts to monitor the startup of the browser. The program lock application runs a monitoring application starting service in the operation terminal system, and the monitoring application starting service acquires the application package name of each application to be started in the operation terminal system in real time. It will be appreciated that each application will have a specific application package name that serves as a unique identifier for the respective application. And determining whether the current browser is started or not by judging the application package name, and performing starting control operation according to a judgment result.
Referring to fig. 4, the start control operation in the embodiment of the present application is performed by checking and verifying, and the procedure lock checking and verifying process includes:
s1303, judging that the acquired application package name is the application package name of the browser by the program lock application, and determining that the browser is started;
s1304, the program lock application interrupts the browser to start, and pops up a verification dialog box for verification, wherein the verification dialog box is used for a user to input verification information, and the verification information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and S1305, the program lock application acquires the checking and verifying information to check and verify, and starts the browser after the checking and verifying is successful.
Specifically, according to the application package name judgment result, when the application package name of the application being started is judged to correspond to the application package name of the browser, it is determined that the browser is being started. At this time, the program lock application interrupts the starting of the browser first, and checks and verifies the use of the browser. And providing a dialog box through a human-computer interaction interface of the operation terminal, wherein the dialog box is used for a current user to input the checking verification information. The verification information is used as the unique identification of the user, when the verification is carried out, the user inputs the mobile phone number through the dialog box and clicks a button for acquiring the verification code on the interactive interface, after the user mobile phone receives the verification code, the verification code is input through the dialog box, the identity of the user is verified, and whether the user using the browser is the user of the mobile phone at present is determined.
In addition, in some embodiments, the verification information may also be verification information such as a user ID or a user identification number according to actual application needs. It can be understood that the verification information is used as the identity of the user, the verification information is obtained and compared with the pre-stored user information, if the verification information is matched with the pre-stored user information, the verification is considered to be passed, and the current user has the browser use permission. Otherwise, if the two are not matched, the verification is considered to be passed, and the current user does not have the browser use permission.
Further, according to the verification information input by the user, if the verification is successful, the application of the program lock restarts the browser, and the user can use the browser normally. And if the verification is not passed, popping up a prompt box to indicate that the current user does not have the use permission of the browser. In addition, corresponding use time limit can be set corresponding to each use of the browser. For example, if the usage time limit of each browser is set to 30 minutes, the program lock starts to count time after the browser is started, and the browser is closed after 30 minutes. Before closing the browser, a prompt box can be popped up in advance to prompt a user that the browser is about to be closed, so that the user experience is prevented from being influenced. It should be noted that, the program lock may open the browser usage right for the user according to the actual application, and may adaptively limit the browser usage to the group such as students that need to perform usage control, so as to implement the browser usage control method of the reading kiosk operation terminal in the embodiment of the present application.
The method comprises the steps of automatically starting the reading application program by starting, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, putting the program lock installation package into a system installation package folder of an operation terminal system, detecting the system installation package folder and extracting the program lock installation package by the operation terminal system to install the program lock application, monitoring the starting of the browser in real time after the program lock application is started, and performing calibration and verification on the use of the browser when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided.
Example two:
on the basis of the first embodiment, the present application provides another browser use control method for a reading kiosk operation terminal, and referring to fig. 5, the browser use control method for the reading kiosk operation terminal includes:
s210, starting the reading application program automatically, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operation terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package;
s220, the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application;
s230, monitoring the browser starting in real time after the program lock application is started, and checking and verifying the use of the browser when the browser is started;
s240, after the verification is successful, the program lock application records a timestamp corresponding to the successful verification, inquires a historical record of the browser according to the timestamp and the exit time of the browser, and generates corresponding recorded information, wherein the recorded information comprises the verification information, the login time and the URL corresponding to the browsing record of the browser of the corresponding user.
According to the embodiment of the application, after the browser is started and controlled, monitoring records of the browsing records of the browser are further carried out. After the verification is successful, the program lock records a time stamp when the verification is successful, and the time stamp is the time when the browser starts to use. And then, when the user finishes using and exits the browser, the program lock queries the browsing history list of the browser according to the time stamp to the browser exiting time. The method comprises the steps that a webpage browsed by a user through a browser is recorded by a program lock application, and when the user quits from using the browser, the program lock application uploads the browsing record of the browser to a system management background to be used as record information for recording. The record information is obtained by inquiring the browsing history list, and the record information can be presented in a list form, wherein the list form comprises user checking verification information, browsed URL (uniform resource locator) and login time. The record information generated by monitoring and recording the use of the browser every time can be used as a historical basis for tracking the identity of the browser user, so that the problem can be conveniently traced according to the record information of the background.
Example three:
based on the foregoing embodiments, fig. 6 is a schematic structural diagram of a browser use control device of a reading kiosk operation terminal according to a third embodiment of the present application. Referring to fig. 6, the browser use control device of the reading kiosk operation terminal provided in this embodiment specifically includes: an extraction module 31, a mounting module 32 and a verification module 33.
The extraction module 31 is configured to start up an automatic reading application program, extract a program lock installation package from a corresponding reading application installation package after the reading application program is started, and place the program lock installation package into a system installation package folder of an operating terminal system, where the program lock installation package is pre-embedded in the reading application installation package;
the installation module 32 is configured to detect the system installation package folder through the operation terminal system and extract the program lock installation package to install the program lock application;
the checking module 33 is configured to monitor the browser start in real time after the browser is started through the program lock application, and perform checking and verification on the browser when the browser is started.
Specifically, still include:
and the recording module is used for recording a timestamp corresponding to the successful verification of the verification by the program lock application after the verification is successful, inquiring the historical record of the browser according to the timestamp and the exit time of the browser, and generating corresponding recording information, wherein the recording information comprises the verification information, the login time and the URL corresponding to the browsing record of the browser of the corresponding user.
The extraction module 31 includes:
and the retrieval unit is used for running the installation package management service by the reading application program after the reading application program is automatically started after the operation terminal system is started, and retrieving whether the installation package installed on the operation terminal system has a program lock installation package or not by the installation package management service.
And the mobile unit is used for automatically acquiring the highest authority of the operation terminal system by the reading application program when the program lock installation package is not searched on the operation terminal system, and moving the program lock installation package to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
Specifically, the calibration module 33 includes:
the broadcasting unit is used for automatically starting the starting broadcast transmitted by the operating terminal system through the program lock application;
and the monitoring unit is used for running monitoring application starting service after the program lock application is started, acquiring the application package name of the application program to be started in real time, and judging whether the application package name is the application package name of the browser.
The determining unit is used for judging that the acquired application package name is the application package name of the browser through the program lock application and determining that the browser is started;
the verification unit is used for interrupting the browser to start through the program lock application and popping up a verification dialog box for verification, the verification dialog box is used for a user to input verification information, and the verification information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and the starting unit is used for acquiring the checking and verifying information through the program lock application to carry out checking and verifying and starting the browser after the checking and verifying is successful.
The method comprises the steps of automatically starting the reading application program by starting, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, putting the program lock installation package into a system installation package folder of an operation terminal system, detecting the system installation package folder and extracting the program lock installation package by the operation terminal system to install the program lock application, monitoring the starting of the browser in real time after the program lock application is started, and performing calibration and verification on the use of the browser when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided. And moreover, the use behavior of the browser is recorded and monitored by collecting the recording information of the browser, so that the effect of supervising the reasonable use of the browser by students is achieved.
The browser use control device of the reading kiosk operation terminal provided by the third embodiment of the application can be used for executing the browser use control method of the reading kiosk operation terminal provided by the first embodiment of the application, and has corresponding functions and beneficial effects.
Example four:
an embodiment of the present application provides an electronic device, and with reference to fig. 7, the electronic device includes: a processor 41, a memory 42, a communication module 43, an input device 44, and an output device 45. The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or other means.
The memory 42 serves as a computer-readable storage medium, and may be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the browser usage control method of the speakerphone-operated terminal according to any embodiment of the application (for example, the extraction module, the installation module, and the verification module in the browser usage control apparatus of the speakerphone-operated terminal). The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication module 43 is used for data transmission.
The processor executes various functional applications and data processing of the device by running the software programs, instructions and modules stored in the memory, that is, the browser use control method of the reading kiosk operation terminal is realized.
The input device 44 is operable to receive input numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 45 may include a display device such as a display screen.
The electronic device provided above can be used to execute the browser use control method of the reading kiosk operation terminal provided in the first embodiment above, and has corresponding functions and beneficial effects.
Example five:
the present application also provides a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a method for controlling browser usage of a terminal operating a speakerphone, the method for controlling browser usage of a terminal operating a speakerphone comprising: starting up an automatic reading application program, extracting a program lock installation package from a corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operating terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package; the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application; the program lock application monitors the starting of the browser in real time after the browser is started, and checks and verifies the use of the browser when the browser is started.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the browser use control method of the speakerphone operation terminal described above, and may also execute related operations in the browser use control method of the speakerphone operation terminal provided in any embodiments of the present application.
The browser use control device, the storage medium, and the electronic device of the speakerphone operation terminal provided in the above embodiments may execute the browser use control method of the speakerphone operation terminal provided in any embodiment of the present application, and reference may be made to the browser use control method of the speakerphone operation terminal provided in any embodiment of the present application without detailed technical details described in the above embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.