Nothing Special   »   [go: up one dir, main page]

CN111273922B - Browser use control method and device of reading kiosk operation terminal - Google Patents

Browser use control method and device of reading kiosk operation terminal Download PDF

Info

Publication number
CN111273922B
CN111273922B CN202010085162.5A CN202010085162A CN111273922B CN 111273922 B CN111273922 B CN 111273922B CN 202010085162 A CN202010085162 A CN 202010085162A CN 111273922 B CN111273922 B CN 111273922B
Authority
CN
China
Prior art keywords
application
browser
installation package
program lock
reading
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010085162.5A
Other languages
Chinese (zh)
Other versions
CN111273922A (en
Inventor
胡天祥
莫兆忠
张翊绵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yougu Information Technology Co ltd
Original Assignee
Guangzhou Yougu Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yougu Information Technology Co ltd filed Critical Guangzhou Yougu Information Technology Co ltd
Priority to CN202010085162.5A priority Critical patent/CN111273922B/en
Publication of CN111273922A publication Critical patent/CN111273922A/en
Application granted granted Critical
Publication of CN111273922B publication Critical patent/CN111273922B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B5/00Electrically-operated educational appliances
    • G09B5/06Electrically-operated educational appliances with both visual and audible presentation of the material to be studied
    • G09B5/065Combinations of audio and video presentations, e.g. videotapes, videodiscs, television systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application discloses a browser use control method and device of a reading kiosk operation terminal. According to the technical scheme, the reading application program is automatically started through starting, the program lock installation package is extracted from the corresponding reading application installation package after the reading application program is started, the program lock installation package is placed into a system installation package folder of an operating terminal system, the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application, the browser is monitored in real time after the program lock application is started, and the browser is calibrated and verified when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided. And the purpose of supervising the reasonable use of the browser by students is realized by recording and monitoring the use behavior of the browser.

Description

Browser use control method and device of reading kiosk operation terminal
Technical Field
The embodiment of the application relates to the technical field of browsers, in particular to a browser use control method and device of a reading kiosk operation terminal.
Background
At present, in order to improve reading ability of students and enrich mental demands of the students, reading kiosks are arranged in schools. Reading kiosks generally have functions such as reading aloud, exercise, speech training, can guide the student to participate in reading to read aloud the exercise. The reading kiosk is provided with an operation terminal, most of recording and broadcasting systems of the reading kiosk operation terminal are reading application programs installed on an android system, and the recording and broadcasting functions of the reading kiosk are realized through the reading application programs installed on the reading kiosk operation terminal. In order to ensure that the user correctly uses the reading kiosk operation terminal and prevent the user from watching live video, playing games and other behaviors by using a browser on the operation terminal, the browser of the reading kiosk operation terminal needs to be started and controlled. Generally speaking, the reading application program is set to be in a starting running state, and a user needs to input a password from the step of exiting the reading application program to the background, so that the condition that the user uses the browser illegally from exiting the reading application program to the background is avoided.
However, the above method of verifying and exiting the reading application program by using the preset password is easy for students to easily know the password, so that the situation of illegally using the browser of the reading kiosk operation terminal frequently occurs, and the restriction effect is not ideal.
Disclosure of Invention
The embodiment of the application provides a method and a device for controlling the use of a browser of a reading kiosk operation terminal, electronic equipment and a storage medium, which can be used for starting and controlling the browser of the reading kiosk operation terminal.
In a first aspect, an embodiment of the present application provides a browser usage control method for a reading kiosk operation terminal, including:
starting up an automatic reading application program, extracting a program lock installation package from a corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operating terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package;
the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application;
the program lock application monitors the starting of the browser in real time after the browser is started, and checks and verifies the use of the browser when the browser is started.
Further, after monitoring the browser start in real time after the program lock application is started, and performing check verification on the browser use when the browser is started, the method further includes:
after the verification is successful, the program lock application records a timestamp corresponding to the successful verification, inquires a historical record of the browser according to the timestamp and the exit time of the browser, and generates corresponding record information, wherein the record information comprises the verification information and the login time of the corresponding user and a URL corresponding to the browsing record of the browser.
Further, the program lock application monitors the browser to start in real time after starting, and includes:
the program lock application is automatically started based on the starting broadcast sent by the operating terminal system;
and running a monitoring application starting service after the program lock application is started, acquiring the application package name of the application program to be started in real time, and judging whether the application package name is the application package name of the browser.
Further, the performing verification for browser usage when the browser is started includes:
the program lock application judges that the acquired application package name is the application package name of the browser, and determines that the browser is started;
the program lock application interrupts the browser to start and pops up a checking and verifying dialog box, wherein the checking and verifying dialog box is used for a user to input checking and verifying information, and the checking and verifying information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and the program lock application acquires the checking and verifying information to carry out checking and verifying, and starts the browser after the checking and verifying is successful.
Further, the detecting the system installation package folder and the extracting the program lock installation package by the operation terminal system to install the program lock application includes:
and after the operation terminal system is started, the operation terminal system runs an installation package detection service, automatically traverses each installation package in a system installation package folder, and extracts the program lock installation package from the uninstalled installation packages to install the program lock application.
Further, the starting automatically starts the reading application program, the reading application program extracts the program lock installation package from the corresponding reading application installation package after being started, and the program lock installation package is placed in a system installation package folder of the operating terminal system, including:
after the operation terminal system is started, automatically starting a reading application program, running an installation package management service by the reading application program, and searching whether an installation package installed on the operation terminal system has a program lock application or not through the installation package management service;
and if the program lock application exists on the operation terminal system is not retrieved, the reading application program automatically acquires the highest authority of the operation terminal system, and the program lock installation package is moved to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
Further, before the automatically starting the reading application program at the startup, and before the reading application program extracts the program lock installation package from the corresponding reading application installation package after the starting, the method further includes:
and packaging the program lock application into a system application according to the signature certificate of the operation terminal system, and implanting the corresponding program lock installation package into the reading application installation package.
In a second aspect, an embodiment of the present application provides a browser usage control device for a reading kiosk operating terminal, including:
the device comprises an extraction module, a reading module and a reading module, wherein the extraction module is used for starting up and automatically starting a reading application program, the reading application program extracts a program lock installation package from a corresponding reading application installation package after being started, the program lock installation package is placed into a system installation package folder of an operation terminal system, and the program lock installation package is pre-implanted into the reading application installation package;
the installation module is used for detecting the system installation package folder through the operation terminal system and extracting the program lock installation package to install the program lock application;
and the verification module is used for monitoring the browser starting in real time after the program lock application is started, and verifying the use of the browser when the browser is started.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the browser usage control method of the speakerphone-operated terminal of the first aspect.
In a fourth aspect, embodiments of the present application provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the browser usage control method of the speakerphone-operated terminal according to the first aspect.
According to the method and the device for detecting the program lock application, the reading application program is automatically started through starting, the program lock installation package is extracted from the corresponding reading application installation package after the reading application program is started, the program lock installation package is placed into a system installation package folder of an operation terminal system, the operation terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application, the browser is monitored to be started in real time after the program lock application is started, and the browser is checked and verified when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided. And moreover, the use behavior of the browser is recorded and monitored by collecting the recording information of the browser, so that the aim of supervising the reasonable use of the browser by students is fulfilled.
Drawings
Fig. 1 is a flowchart of a browser usage control method of a reading kiosk operation terminal according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating the movement of a program lock installation package according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating a procedure of monitoring browser launching by a program lock application according to an embodiment of the present application;
FIG. 4 is a flowchart illustrating a program lock verification process according to an embodiment of the present application;
fig. 5 is a flowchart of another browser usage control method for a reading kiosk operation terminal according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of a browser use control device of a reading kiosk operation terminal according to a third embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The browser use control method of the reading kiosk operation terminal aims to carry out start control on the browser of the reading kiosk operation terminal through program lock application, so that illegal use of the browser by a user is limited, browsing records of the browser are further carried out through monitoring and recording each URL file of the browser used by the user, the purpose of supervising the user to reasonably use the browser is further achieved, and the user is prevented from excessively using the browser in a violation mode. In addition, through the verification of the proofreading, the basis of tracking the identity of the browser user is provided, and the problem can be conveniently researched when the browser is illegally used in the follow-up process through the record of the proofreading verification information. Compared with the existing reading kiosk operation terminal, in the practical application process, the used reading system, the recording system and other related applications are generally application programs installed on the operation terminal system. That is, when the user uses the reading kiosk to read, the user needs to read through the reading application program of the operation terminal. In general, in order to avoid the illegal use of the browser by the user, the user needs to input a corresponding password when exiting from the reading application to the background of the system. However, in the course of using the campus, these preset passwords are easy to be known by students, and the phenomenon that the students quit the reading application to the background and use the browser to surf the internet occurs. In order to ensure that a user correctly uses the reading kiosk, and prevent the user from watching live video, playing games and other behaviors by using a browser, the starting of the browser needs to be controlled, and the using behaviors need to be recorded and monitored. Therefore, the browser use control method of the reading kiosk operation terminal provided by the embodiment of the application is provided to solve the technical problem that the existing reading kiosk operation terminal cannot well start and control the browser.
The first embodiment is as follows:
fig. 1 is a flowchart illustrating a browser usage control method of a reading kiosk operation terminal according to an embodiment of the present disclosure, where the browser usage control method of the reading kiosk operation terminal provided in this embodiment may be executed by a browser usage control device of the reading kiosk operation terminal, the browser usage control device of the reading kiosk operation terminal may be implemented in a software and/or hardware manner, and the browser usage control device of the reading kiosk operation terminal may be formed by two or more physical entities or may be formed by one physical entity. Generally, the browser use control device of the reading kiosk operation terminal may be a computer, a reading kiosk operation terminal host, or the like.
The following description will be made taking, as an example, a browser use control device of a reading kiosk operation terminal as a main body for executing a browser use control method of the reading kiosk operation terminal. Referring to fig. 1, the method for controlling the use of the browser of the reading kiosk operation terminal specifically includes:
s110, starting the reading application program automatically, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operation terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package.
Specifically, the browser is started and controlled through the program lock application, the installation package of the program lock needs to be pre-embedded into the reading application installation package, and therefore the program lock installation package is conveniently placed into the reading kiosk operation terminal through the subsequent installation of the reading application installation package. And packaging the program lock application into a system application according to the signature certificate of the operating terminal system, and implanting the corresponding program lock installation package into the reading application installation package. When the program lock installation package is implanted into the reading application installation package, the function of monitoring the application starting is achieved by acquiring the page management class object of the operation terminal system and generating an application page management instance as a tool for monitoring the application page starting. Since the program lock application monitors the starting of the browser and needs to be packaged into a system level application, a system internal file of the operation terminal needs to be acquired. Taking an Android (Android) system as an example, internal files of platform.x 509.pet and platform.pk8 of an operation terminal system need to be obtained, and the two files are signature certificates under the Android system and can be used for signing a program lock application into a system application and obtaining all permissions of the operation terminal system. After packaging the program lock application into the system application, placing a program lock installation package (namely, a program lock apk and an Android application installation package) under a raw folder in the reading application installation package, wherein when the reading application is packaged into the apk, the file can be packaged into the reading application installation package without moving.
Further, after the program lock installation package is implanted into the reading application installation package, the reading application installation package is installed in the reading kiosk operation terminal system. And then, when the reading application is started, moving the program lock installation package and placing the program lock installation package into a system installation package folder. As shown in fig. 2, the procedure of moving the program lock installation package includes:
s1101, after the reading application program is started up automatically, the reading application program runs an installation package management service, and whether a program lock application exists in an installation package installed on the operating terminal system is searched through the installation package management service;
s1102, if the program lock application exists on the operation terminal system is not searched, the reading application program automatically acquires the highest authority of the operation terminal system, and the program lock installation package is moved to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
Specifically, when the reading kiosk operation terminal is started, the reading kiosk application is automatically started, and the installation package management service of the operation terminal system is operated. And searching application IDs (application names) of all installation package files (apk files) in a system installation package folder of the operation terminal system through an installation package management service, and if program lock applications exist, directly extracting and installing the program locks. On the contrary, if the program lock application does not exist, the highest authority root of the operation terminal system is automatically obtained through the reading application, and the program lock installation package is automatically moved from the reading application installation package to a system folder (namely/system/app folder) of the operation terminal system by using a moving command of adb (Android Debug Bridge).
And S120, the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application.
Further, after the program lock installation package is placed in a system installation package folder of the operation terminal system, the program lock installation package is automatically detected and extracted for installation through an installation package detection service after the next operation terminal is restarted. Specifically, the operation terminal system may operate an installation package detection service after being started, where the installation package detection service is used to detect installation package files in a system installation package folder, and extract and install installation package files that have not been installed. The installation package detection service automatically traverses each installation package in the system installation package folder, and extracts the program lock installation packages from each installation package to install the program lock application. Since the program lock installation package is in an uninstalled state in the system installation package folder, it will be extracted for installation when detected by the installation package detection service.
S130, monitoring the browser starting in real time after the program lock application is started, and checking and verifying the use of the browser when the browser is started.
After the application lock program is installed, the application lock program can be started by self-starting after starting up, and further starting monitoring and checking verification of the browser are carried out, so that starting control of the browser is realized. Referring to fig. 3, the process of monitoring the browser startup by the program lock application includes:
s1301, automatically starting the program lock application based on the starting broadcast sent by the operating terminal system;
s1302, running a monitoring application starting service after the program lock application is started, acquiring an application package name of an application program to be started in real time, and judging whether the application package name is the application package name of the browser.
After the program lock application installation is executed, the operation terminal system sends a starting broadcast. The program lock application starts automatically according to the startup broadcast and starts to monitor the startup of the browser. The program lock application runs a monitoring application starting service in the operation terminal system, and the monitoring application starting service acquires the application package name of each application to be started in the operation terminal system in real time. It will be appreciated that each application will have a specific application package name that serves as a unique identifier for the respective application. And determining whether the current browser is started or not by judging the application package name, and performing starting control operation according to a judgment result.
Referring to fig. 4, the start control operation in the embodiment of the present application is performed by checking and verifying, and the procedure lock checking and verifying process includes:
s1303, judging that the acquired application package name is the application package name of the browser by the program lock application, and determining that the browser is started;
s1304, the program lock application interrupts the browser to start, and pops up a verification dialog box for verification, wherein the verification dialog box is used for a user to input verification information, and the verification information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and S1305, the program lock application acquires the checking and verifying information to check and verify, and starts the browser after the checking and verifying is successful.
Specifically, according to the application package name judgment result, when the application package name of the application being started is judged to correspond to the application package name of the browser, it is determined that the browser is being started. At this time, the program lock application interrupts the starting of the browser first, and checks and verifies the use of the browser. And providing a dialog box through a human-computer interaction interface of the operation terminal, wherein the dialog box is used for a current user to input the checking verification information. The verification information is used as the unique identification of the user, when the verification is carried out, the user inputs the mobile phone number through the dialog box and clicks a button for acquiring the verification code on the interactive interface, after the user mobile phone receives the verification code, the verification code is input through the dialog box, the identity of the user is verified, and whether the user using the browser is the user of the mobile phone at present is determined.
In addition, in some embodiments, the verification information may also be verification information such as a user ID or a user identification number according to actual application needs. It can be understood that the verification information is used as the identity of the user, the verification information is obtained and compared with the pre-stored user information, if the verification information is matched with the pre-stored user information, the verification is considered to be passed, and the current user has the browser use permission. Otherwise, if the two are not matched, the verification is considered to be passed, and the current user does not have the browser use permission.
Further, according to the verification information input by the user, if the verification is successful, the application of the program lock restarts the browser, and the user can use the browser normally. And if the verification is not passed, popping up a prompt box to indicate that the current user does not have the use permission of the browser. In addition, corresponding use time limit can be set corresponding to each use of the browser. For example, if the usage time limit of each browser is set to 30 minutes, the program lock starts to count time after the browser is started, and the browser is closed after 30 minutes. Before closing the browser, a prompt box can be popped up in advance to prompt a user that the browser is about to be closed, so that the user experience is prevented from being influenced. It should be noted that, the program lock may open the browser usage right for the user according to the actual application, and may adaptively limit the browser usage to the group such as students that need to perform usage control, so as to implement the browser usage control method of the reading kiosk operation terminal in the embodiment of the present application.
The method comprises the steps of automatically starting the reading application program by starting, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, putting the program lock installation package into a system installation package folder of an operation terminal system, detecting the system installation package folder and extracting the program lock installation package by the operation terminal system to install the program lock application, monitoring the starting of the browser in real time after the program lock application is started, and performing calibration and verification on the use of the browser when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided.
Example two:
on the basis of the first embodiment, the present application provides another browser use control method for a reading kiosk operation terminal, and referring to fig. 5, the browser use control method for the reading kiosk operation terminal includes:
s210, starting the reading application program automatically, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operation terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package;
s220, the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application;
s230, monitoring the browser starting in real time after the program lock application is started, and checking and verifying the use of the browser when the browser is started;
s240, after the verification is successful, the program lock application records a timestamp corresponding to the successful verification, inquires a historical record of the browser according to the timestamp and the exit time of the browser, and generates corresponding recorded information, wherein the recorded information comprises the verification information, the login time and the URL corresponding to the browsing record of the browser of the corresponding user.
According to the embodiment of the application, after the browser is started and controlled, monitoring records of the browsing records of the browser are further carried out. After the verification is successful, the program lock records a time stamp when the verification is successful, and the time stamp is the time when the browser starts to use. And then, when the user finishes using and exits the browser, the program lock queries the browsing history list of the browser according to the time stamp to the browser exiting time. The method comprises the steps that a webpage browsed by a user through a browser is recorded by a program lock application, and when the user quits from using the browser, the program lock application uploads the browsing record of the browser to a system management background to be used as record information for recording. The record information is obtained by inquiring the browsing history list, and the record information can be presented in a list form, wherein the list form comprises user checking verification information, browsed URL (uniform resource locator) and login time. The record information generated by monitoring and recording the use of the browser every time can be used as a historical basis for tracking the identity of the browser user, so that the problem can be conveniently traced according to the record information of the background.
Example three:
based on the foregoing embodiments, fig. 6 is a schematic structural diagram of a browser use control device of a reading kiosk operation terminal according to a third embodiment of the present application. Referring to fig. 6, the browser use control device of the reading kiosk operation terminal provided in this embodiment specifically includes: an extraction module 31, a mounting module 32 and a verification module 33.
The extraction module 31 is configured to start up an automatic reading application program, extract a program lock installation package from a corresponding reading application installation package after the reading application program is started, and place the program lock installation package into a system installation package folder of an operating terminal system, where the program lock installation package is pre-embedded in the reading application installation package;
the installation module 32 is configured to detect the system installation package folder through the operation terminal system and extract the program lock installation package to install the program lock application;
the checking module 33 is configured to monitor the browser start in real time after the browser is started through the program lock application, and perform checking and verification on the browser when the browser is started.
Specifically, still include:
and the recording module is used for recording a timestamp corresponding to the successful verification of the verification by the program lock application after the verification is successful, inquiring the historical record of the browser according to the timestamp and the exit time of the browser, and generating corresponding recording information, wherein the recording information comprises the verification information, the login time and the URL corresponding to the browsing record of the browser of the corresponding user.
The extraction module 31 includes:
and the retrieval unit is used for running the installation package management service by the reading application program after the reading application program is automatically started after the operation terminal system is started, and retrieving whether the installation package installed on the operation terminal system has a program lock installation package or not by the installation package management service.
And the mobile unit is used for automatically acquiring the highest authority of the operation terminal system by the reading application program when the program lock installation package is not searched on the operation terminal system, and moving the program lock installation package to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
Specifically, the calibration module 33 includes:
the broadcasting unit is used for automatically starting the starting broadcast transmitted by the operating terminal system through the program lock application;
and the monitoring unit is used for running monitoring application starting service after the program lock application is started, acquiring the application package name of the application program to be started in real time, and judging whether the application package name is the application package name of the browser.
The determining unit is used for judging that the acquired application package name is the application package name of the browser through the program lock application and determining that the browser is started;
the verification unit is used for interrupting the browser to start through the program lock application and popping up a verification dialog box for verification, the verification dialog box is used for a user to input verification information, and the verification information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and the starting unit is used for acquiring the checking and verifying information through the program lock application to carry out checking and verifying and starting the browser after the checking and verifying is successful.
The method comprises the steps of automatically starting the reading application program by starting, extracting a program lock installation package from the corresponding reading application installation package after the reading application program is started, putting the program lock installation package into a system installation package folder of an operation terminal system, detecting the system installation package folder and extracting the program lock installation package by the operation terminal system to install the program lock application, monitoring the starting of the browser in real time after the program lock application is started, and performing calibration and verification on the use of the browser when the browser is started. By adopting the technical means, the starting control of the browser of the reading kiosk operation terminal can be effectively carried out, and the illegal use of the browser of the reading kiosk operation terminal is avoided. And moreover, the use behavior of the browser is recorded and monitored by collecting the recording information of the browser, so that the effect of supervising the reasonable use of the browser by students is achieved.
The browser use control device of the reading kiosk operation terminal provided by the third embodiment of the application can be used for executing the browser use control method of the reading kiosk operation terminal provided by the first embodiment of the application, and has corresponding functions and beneficial effects.
Example four:
an embodiment of the present application provides an electronic device, and with reference to fig. 7, the electronic device includes: a processor 41, a memory 42, a communication module 43, an input device 44, and an output device 45. The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or other means.
The memory 42 serves as a computer-readable storage medium, and may be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the browser usage control method of the speakerphone-operated terminal according to any embodiment of the application (for example, the extraction module, the installation module, and the verification module in the browser usage control apparatus of the speakerphone-operated terminal). The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication module 43 is used for data transmission.
The processor executes various functional applications and data processing of the device by running the software programs, instructions and modules stored in the memory, that is, the browser use control method of the reading kiosk operation terminal is realized.
The input device 44 is operable to receive input numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 45 may include a display device such as a display screen.
The electronic device provided above can be used to execute the browser use control method of the reading kiosk operation terminal provided in the first embodiment above, and has corresponding functions and beneficial effects.
Example five:
the present application also provides a storage medium containing computer-executable instructions, which when executed by a computer processor, perform a method for controlling browser usage of a terminal operating a speakerphone, the method for controlling browser usage of a terminal operating a speakerphone comprising: starting up an automatic reading application program, extracting a program lock installation package from a corresponding reading application installation package after the reading application program is started, and placing the program lock installation package into a system installation package folder of an operating terminal system, wherein the program lock installation package is pre-implanted into the reading application installation package; the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application; the program lock application monitors the starting of the browser in real time after the browser is started, and checks and verifies the use of the browser when the browser is started.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the browser use control method of the speakerphone operation terminal described above, and may also execute related operations in the browser use control method of the speakerphone operation terminal provided in any embodiments of the present application.
The browser use control device, the storage medium, and the electronic device of the speakerphone operation terminal provided in the above embodiments may execute the browser use control method of the speakerphone operation terminal provided in any embodiment of the present application, and reference may be made to the browser use control method of the speakerphone operation terminal provided in any embodiment of the present application without detailed technical details described in the above embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (10)

1. A browser use control method of a reading kiosk operation terminal is characterized by comprising the following steps:
starting up an automatic reading application program, wherein the reading application program extracts a program lock installation package from a corresponding reading application installation package after being started, the program lock installation package is placed into a system installation package folder of an operation terminal system, the program lock installation package is pre-implanted into the reading application installation package, and the program lock installation package manages class objects by acquiring pages of the operation terminal system and generates an application page management example as a tool for monitoring application page starting by program lock application;
the operating terminal system detects the system installation package folder and extracts the program lock installation package to install the program lock application;
the program lock application monitors the starting of the browser in real time after the browser is started, and checks and verifies the use of the browser when the browser is started.
2. The method for controlling browser usage in a terminal operating a reading kiosk of claim 1 wherein after monitoring browser startup in real time after the application program lock is started and performing verification of browser usage when the browser is started, the method further comprises:
after the verification is successful, the program lock application records a timestamp corresponding to the successful verification, inquires a historical record of the browser according to the timestamp and the exit time of the browser, and generates corresponding record information, wherein the record information comprises the verification information and the login time of the corresponding user and a URL corresponding to the browsing record of the browser.
3. The browser usage control method of a reading kiosk operation terminal of claim 1, wherein the program lock application monitors browser startup in real time after startup, comprising:
the program lock application is automatically started based on the starting broadcast sent by the operating terminal system;
and running a monitoring application starting service after the program lock application is started, acquiring the application package name of the application program to be started in real time, and judging whether the application package name is the application package name of the browser.
4. The method for controlling browser usage of a terminal operated by a reading kiosk according to claim 3, wherein said performing a check-up verification of browser usage at browser startup comprises:
the program lock application judges that the acquired application package name is the application package name of the browser, and determines that the browser is started;
the program lock application interrupts the browser to start and pops up a checking and verifying dialog box, wherein the checking and verifying dialog box is used for a user to input checking and verifying information, and the checking and verifying information is a unique user identifier and comprises a user mobile phone number and a corresponding verification code;
and the program lock application acquires the checking and verifying information to carry out checking and verifying, and starts the browser after the checking and verifying is successful.
5. The browser usage control method for a reading kiosk operating terminal of claim 1, wherein the operating terminal system detects the system installation package folder and extracts the program lock installation package for installing the program lock application, comprising:
and after the operation terminal system is started, the operation terminal system runs an installation package detection service, automatically traverses each installation package in a system installation package folder, and extracts the program lock installation package from the uninstalled installation packages to install the program lock application.
6. The browser use control method for the speakerphone operating terminal according to claim 1, wherein the starting automatically starts the speakerphone application, the speakerphone application extracts a program lock installation package from a corresponding speakerphone application installation package after the starting, and places the program lock installation package into a system installation package folder of the operating terminal system, and the method includes:
after the operation terminal system is started, automatically starting a reading application program, running an installation package management service by the reading application program, and searching whether a program lock application exists on the operation terminal system or not through the installation package management service;
and if the program lock application exists on the operation terminal system is not retrieved, the reading application program automatically acquires the highest authority of the operation terminal system, and the program lock installation package is moved to a system installation package folder from the reading application installation package by using a debugging bridge of the operation terminal system.
7. The browser usage control method for a speakerphone-operated terminal according to claim 1, further comprising, before the starting automatically starting the speakerphone application, before the speakerphone application extracts the program lock installation package from the corresponding speakerphone application installation package after the starting:
and packaging the program lock application into a system application according to the signature certificate of the operation terminal system, and implanting the corresponding program lock installation package into the reading application installation package.
8. A browser use control device for a reading kiosk operation terminal, comprising:
the system comprises an extraction module, a reading module and a reading module, wherein the extraction module is used for starting up and automatically starting a reading application program, the reading application program extracts a program lock installation package from a corresponding reading application installation package after being started, the program lock installation package is placed into a system installation package folder of an operation terminal system, the program lock installation package is pre-implanted into the reading application installation package, and the program lock installation package is used for monitoring application page starting by acquiring a page management class object of the operation terminal system and generating an application page management example as a tool for monitoring application page starting;
the installation module is used for detecting the system installation package folder through the operation terminal system and extracting the program lock installation package to install the program lock application;
and the verification module is used for monitoring the browser starting in real time after the program lock application is started, and verifying the use of the browser when the browser is started.
9. An electronic device, comprising:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a browser usage control method of a speakerphone-operated terminal as recited in any one of claims 1-7.
10. A storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a browser usage control method of a speakerphone-operated terminal according to any one of claims 1 to 7.
CN202010085162.5A 2020-02-10 2020-02-10 Browser use control method and device of reading kiosk operation terminal Active CN111273922B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010085162.5A CN111273922B (en) 2020-02-10 2020-02-10 Browser use control method and device of reading kiosk operation terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010085162.5A CN111273922B (en) 2020-02-10 2020-02-10 Browser use control method and device of reading kiosk operation terminal

Publications (2)

Publication Number Publication Date
CN111273922A CN111273922A (en) 2020-06-12
CN111273922B true CN111273922B (en) 2021-03-16

Family

ID=71003549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010085162.5A Active CN111273922B (en) 2020-02-10 2020-02-10 Browser use control method and device of reading kiosk operation terminal

Country Status (1)

Country Link
CN (1) CN111273922B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105160212A (en) * 2015-09-29 2015-12-16 上海斐讯数据通信技术有限公司 Application security protection method and system
CN106022106A (en) * 2016-05-30 2016-10-12 努比亚技术有限公司 Application installation method and device and terminal
CN110460726A (en) * 2019-08-15 2019-11-15 四川长虹电器股份有限公司 Intelligent terminal applies management-control method
KR20190140551A (en) * 2018-06-12 2019-12-20 장연호 Educational services with app lock on mobile devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105160212A (en) * 2015-09-29 2015-12-16 上海斐讯数据通信技术有限公司 Application security protection method and system
CN106022106A (en) * 2016-05-30 2016-10-12 努比亚技术有限公司 Application installation method and device and terminal
KR20190140551A (en) * 2018-06-12 2019-12-20 장연호 Educational services with app lock on mobile devices
CN110460726A (en) * 2019-08-15 2019-11-15 四川长虹电器股份有限公司 Intelligent terminal applies management-control method

Also Published As

Publication number Publication date
CN111273922A (en) 2020-06-12

Similar Documents

Publication Publication Date Title
US9229844B2 (en) System and method for monitoring web service
US10943008B2 (en) System and method of detecting hidden behavior of a browser extension
US20180046798A1 (en) Mining Sandboxes
CN111782416A (en) Data reporting method, device, system, terminal and computer readable storage medium
CN111191243B (en) Vulnerability detection method, vulnerability detection device and storage medium
CN104363578B (en) Mobile device connects the method and system that WIFI hot spot installs matching application automatically
CN110855642B (en) Application vulnerability detection method and device, electronic equipment and storage medium
CN108881132B (en) Application authorization method, client, server and computer readable medium
CN114157568B (en) Browser secure access method, device, equipment and storage medium
Hu et al. VALERA: an effective and efficient record-and-replay tool for android
EP2541456B1 (en) Method for protecting the digital contents of a solid state memory
CN111273922B (en) Browser use control method and device of reading kiosk operation terminal
CN113672918A (en) Malicious code detection method and device, storage medium and electronic equipment
CN113596600B (en) Security management method, device, equipment and storage medium for live broadcast embedded program
US20230137661A1 (en) Verification method and verification system for information and communication safety protection mechanism
CN112445705B (en) Software running system, method and device based on trusted verification and computer equipment
RU2697951C2 (en) System and method of terminating functionally restricted application, interconnected with website, launched without installation
CN107682224B (en) Method and device for testing network WEB page
CN112507389A (en) Webpage data processing method and device
CN112035888A (en) File path determining method, device and medium based on webpage tamper-proof system
CN114491474B (en) Terminal and internet bank U-key secure interaction method and device
CN113407166B (en) Safe and controllable agile software development method under controlled network environment
CN118036051B (en) Data transfer protection method, device, storage medium and electronic equipment
US20090271430A1 (en) System and method for collaborative information development
CN116506222B (en) Safety protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Browser use control method and device of reading booth operation terminal

Effective date of registration: 20211101

Granted publication date: 20210316

Pledgee: Bank of Guangzhou Co.,Ltd. Liwan sub branch

Pledgor: GUANGZHOU YOUGU INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2021980011692

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20221121

Granted publication date: 20210316

Pledgee: Bank of Guangzhou Co.,Ltd. Liwan sub branch

Pledgor: GUANGZHOU YOUGU INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2021980011692

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: The browser use control method and device of the reading booth operating terminal

Effective date of registration: 20221122

Granted publication date: 20210316

Pledgee: Bank of Guangzhou Co.,Ltd. Liwan sub branch

Pledgor: GUANGZHOU YOUGU INFORMATION TECHNOLOGY Co.,Ltd.

Registration number: Y2022980022971

PE01 Entry into force of the registration of the contract for pledge of patent right