Kiosk Browser Grows Up, Goes Pro

13 years ago, mid-November | 37 Comments

Over the last few days I’ve worked on a new release of Kiosk Browser what I’m calling the SE (Special Edition) for now. I am undecided as to how I’ll distribute and license this and at what cost. I know that some of you are using Android tablets that do not have the Google Market on them. It may be that distribution is just an apk download from my server. I’m not sure many of you would appreciate entering licenses for each kiosk tied to a specific device, so I favour the one off fee, install however many times you want approach. I’ve put a poll at the end of this post, you can vote for the one you like the most or provide alternatives in the comments.

Kiosk Browser SE includes some extra, more advanced features such as

Home Screen

You can make Kiosk Browser SE the device home screen so that when pressing the home screen, or back button the user ends up in Kiosk Browser and not the ‘desktop’. When the device is booted Kiosk Browser SE will automatically start.

Orientation Lock

Kiosk Browser SE can lock the screen in landscape or portrait mode.

Wake Lock

If you don’t want your kiosk to sleep you can force it to stay awake.

Options are,

off: The device will sleep as normal. This may result in loss of network connectivity and the lock screen may appear.

dim: Wake lock that ensures that the screen is on (but may be dimmed); the keyboard backlight will be allowed to go off.

full: Wake lock that ensures that the screen and keyboard are on at full brightness.*

*be aware of screen burn in and panel lifetime.

Idle Timeout

If there’s no input from the user you can jump back to the start url after a number of minutes you specify.

Capture Images

You can automatically capture images from the front camera and/or the screen when the user interacts with Kiosk Browser SE. You can have either image captured or both. If you have both each image filename is stamped with the same time. You can tag your kiosk files with a specific identity to help keep files unique. Useful if multiple kiosks are uploading to the same space.

Upload Images

Captured images can be FTP’d to a server, once complete they are removed from local storage to free up space. The target FTP path can also be specified.

Remote Load

Sometimes it may be useful to load a new configuration from a remote server. On boot Kiosk Browser SE will check for a local configuration file and then optionally a remote one. The local configuration file can be automatically deleted once loaded so can be used for initial provisioning. Settings are saved internally so after configuration updates the kiosk can operate without the presence of the configuration file on the remote server.

XML Configuration

Configuration is via XML, there is no preferences screen.

I’ll update this post with the status of Kiosk Browser SE as development progresses. I’ve set myself a target date for release, so far that’s looking good. Of course there’s still the documentation to do as well.

you can look to the Kiosk Browser SE pages for more detail on the Pro version

If you’re twitter minded you can follow Kiosk Browser for updates and news

What licencing do you prefer?

View Results

Loading ... Loading ...


[Slashdot] [Digg] [Reddit] [] [Facebook] [Technorati] [Google] [StumbleUpon]

Tagged with:
November 8, 2011 10:50



Kiosk Browser, is as its name suggests, a browser that acts like a kiosk.

You can limit the browser to a specific site or allow external sites to be loaded, optionally in the default standard browser. The browser has some additional features allowing the sending of Toast messages to the user from javascript, showing and hiding the title bar and launching applications on the device.

These special functions available from Javascript are demonstrated by the code below:

<input type="button" value="Show Preferences screen" onClick="Kiosk.showPreferences(); return false;" />
<input type="button" value="Show Platform Settings" onClick="Kiosk.platformSettings(); return false;" />
<input type="button" value="Clear cache, form data, history" onClick="Kiosk.clearCaches(); return false;" />
<input type="text" size=30 name=something>
<input type="button" value="Back" onClick="Kiosk.goBack(); return false;" />
<input type="button" value="Forward" onClick="Kiosk.goForward(); return false;" />
<input type="button" value="Reload" onClick="Kiosk.reload(); return false;" />
<input type="button" value="Stop" onClick="Kiosk.stop(); return false;" />
<input type="button" value="Disable Menus" onClick="Kiosk.disableMenus(); return false;" />
<input type="button" value="Enable Menus" onClick="Kiosk.enableMenus(); return false;" />
<input type="button" value="Disable Scaling" onClick="Kiosk.disableScaling(); return false;" />
<input type="button" value="Enable Scaling" onClick="Kiosk.enableScaling(); return false;" />
<input type="submit" value="Android app interface" onClick="Kiosk.showToast('Hello Android!'); return false;" >
<input type="button" value="Fullscreen" onClick="Kiosk.hideTitlebar(); return false;" >
<input type="button" value="With title" onClick="Kiosk.showTitlebar(); return false;" >
<input type="button" value="Restart" onClick="Kiosk.endApp(); return false;" >
<input type="button" value="Launch" onClick="Kiosk.launch('',''); return false;" >
<input type="button" value="Launch 2" onClick="Kiosk.launch('',''); return false;" >
<a href=>External</a>

UPDATE: 04-November-2011: Added more javascript interfaces and preferences… (sorry about the 2 updates in one go) Second update allows for zoom to be set from 1 to 200

UPDATE: 29-October-2011: Rearranged some of the options to make preferences a little less messy.

Added an optional “Page Loading” message, this blocks screen access until the page has completely loaded so be aware that it may just sit there forever if your network drops out. The good news is the addition of the labs section may help here.

Also added a ‘Labs’ preference section where experimental stuff can go. Currently there’s one active preference in there called “Network Connect”. What this does is run the kiosk application when the network goes up or down. What this means is that you can have the kiosk automatically run when the device boots (and gets unlocked). Feedback on how useful it is would be useful 😀

Seems I’ve managed to mess up the comments section :/

Some simple documentation is available here

There’s also some information on the next iteration of Kiosk Browser

[Slashdot] [Digg] [Reddit] [] [Facebook] [Technorati] [Google] [StumbleUpon]

Tagged with:
July 9, 2011 15:14



John Smiths have a lot to answer for there I can tell you.

It’s been a busy few weeks at work while Selection of widgetswe launch our revamped online shop and how did I go about relaxing? I did more development work at home. Since we’ve moved into our house I haven’t really had a lot of time to do much development, more tiling grouting and renovating than anything else. This last week though, as we started to get on top of things, I took some time to put together a widget for Android. I’ve been collecting, storing and graphing data from various sensors around the house for some time now and while the graphs are pretty they aren’t really a quick or efficient way of reading the status at a glance.

Step forward the widget. Each widget requests XML data from the server and presents it on the widget, this allows an infinite number of widget variations since the only change is the data received. In other words, if it’s in the database it can be served. The widget itself has a number of coloured backgrounds which the server data can trigger if and it’s also capable of playing an alarm sound if required. I still need to fix this because the alarm sound triggers on each update and there’s currently no way to tell the widget to be quiet.

Update: Fixed this, tapping the widget will silence it until the next alarm trigger ie once the state returns to normal and then alarms once again.

Incidentally, since I only have a self signed certificate on my server but still wanted encrypted access I had to extend the DefaultHttpClient. By default Android will just refuse to connect to a server if the certificate isn’t signed by one of the ‘trusted’ certificate authorities – it wont tell you that it refused, it’ll just silently fail. You’d only ever really know if you’d connected to your device via adb and done a logcat. You can get round this by adding a keystore to your application, which is good enough for testing or personal applications.

If you want to do this you need to make sure you have the Bouncy Castle cryptography jar in your CLASSPATH. The first thing you’ll need is a copy of the certificate which I hope you’ve generated and installed on your server. If you need to get a remote server certificate you can use the following command (all one line).

echo | openssl s_client -connect 2>&1 |  
sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > mycert.pem

Replace the “” with your server, obviously. Once you’ve done that export the CLASSPATH to the Bouncy Castle jar you downloaded replacing the path I’ve used with the location you downloaded it to:

export CLASSPATH=bcprov-jdk16-146.jar

You can now use the following script, note that the keystore name is appkeystore.bks as on line 3

if [ -a $CERTSTORE ]; then
    rm $CERTSTORE || exit 1
keytool \
      -import \
      -v \
      -trustcacerts \
      -alias 0 \
      -file <(openssl x509 -in mycert.pem) \
      -keystore $CERTSTORE \
      -storetype BKS \
      -provider org.bouncycastle.jce.provider.BouncyCastleProvider \
      -providerpath /usr/share/java/bcprov.jar \
      -storepass MyPaSsWoRd

Replacing the MyPaSsWoRd on line 19 with a password of your choosing, you’ll need it later too. If you run the script you should get some output like this, obviously with your server information – remember to answer yes to the “Trust this certificate” prompt.

Owner: EMAILADDRESS=info@,, OU=Tech, O=Automated IT, L=Eye, ST=Suffolk, C=GB
Issuer: EMAILADDRESS=info@,, OU=Tech, O=Automated IT, L=Eye, ST=Suffolk, C=GB
Serial number: 4dce9c74
Valid from: Sat May 14 16:15:00 BST 2011 until: Sun May 13 16:15:00 BST 2012
Certificate fingerprints:
	 MD5:  32:0F:33:0C:42:8D:FF:78:90:46:31:7A:4F:D3:33:23
	 SHA1: BD:A8:B8:21:B1:48:C3:53:BB:01:22:65:9E:00:6E:14:7B:DE:4E:F6
	 Signature algorithm name: SHA1withRSA
	 Version: 1
Trust this certificate? [no]:yes
Certificate was added to keystore
[Storing appkeystore.bks]

Create a directory called “raw” in your project’s ‘res‘ folder and copy the appkeystore.bks file to it.

In your Android application or widget you can now create a new class for the following code which will extend the original DefaultHttpClient class. You’ll want to change the package name on line 1 to match your application.

import android.content.Context;
import org.apache.http.conn.ClientConnectionManager;
import org.apache.http.conn.scheme.PlainSocketFactory;
import org.apache.http.conn.scheme.Scheme;
import org.apache.http.conn.scheme.SchemeRegistry;
import org.apache.http.conn.ssl.SSLSocketFactory;
import org.apache.http.impl.client.DefaultHttpClient;
import org.apache.http.impl.conn.SingleClientConnManager;
public class myHttpClient extends DefaultHttpClient {
  final Context context;
  public String UserAgent="Android dataWidget (ScaredyCat 0014150511-0.1b) []";
  public myHttpClient(Context context) {
    this.context = context;
  @Override protected ClientConnectionManager createClientConnectionManager() {
    SchemeRegistry registry = new SchemeRegistry();
        new Scheme("http", PlainSocketFactory.getSocketFactory(), 80));
    registry.register(new Scheme("https", newSslSocketFactory(), 443));
    return new SingleClientConnManager(getParams(), registry);
  private SSLSocketFactory newSslSocketFactory() {
    try {
      KeyStore trusted = KeyStore.getInstance("BKS");
      InputStream in = context.getResources().openRawResource(R.raw.appkeystore);
      try {
        trusted.load(in, "MyPaSsWoRd".toCharArray());
      } finally {
      return new SSLSocketFactory(trusted);
    } catch (Exception e) {
      throw new AssertionError(e);

Note that the password used in the script earlier should match the one on line 37– use your own different password in production for security purposes. You can now use the class as required in your application, for example:

myHttpClient httpclient = new myHttpClient(context);
httpclient.getCredentialsProvider().setCredentials(new AuthScope(host, port), new UsernamePasswordCredentials(username,password));
BasicHttpContext localcontext = new BasicHttpContext();
BasicScheme basicAuth = new BasicScheme();
localcontext.setAttribute("preemptive-auth", basicAuth);
httpclient.addRequestInterceptor(preemptiveAuth, 0);
HttpHost targetHost = new HttpHost(host, port, scheme); 
HttpGet httpget = new HttpGet(url);
httpget.setHeader("User-Agent", httpclient.UserAgent );

Once I’d got the SSL connection I could get the application to download a list of sensors from the database, this only happens the first time the first widget is added to the home screen. I need to sort a way of allowing the user to delete the list if more sensors are added. At the moment clearing the data for the widget application works but it erases the widget settings too.

When I’m at home I want to connect to a local server for the information for the widgets and when I’m out and about (using a 3G connection) I want to connect to an external server. I implemented the ability to automatically switch when my phone connected to my WiFi access point. One final thing I did was to add the ability to long press on a text field and then select ‘Save as default‘ allowing things like servers, Wifi MAC address, username and password to be saved as the defaults for all widgets.

First run, download sensorsSelection of widgetsWidget settingsSave as default


[Slashdot] [Digg] [Reddit] [] [Facebook] [Technorati] [Google] [StumbleUpon]

Tagged with:
May 20, 2011 21:10



Pictures from Computex 2009

15 years ago, at the start of June | Leave a Comment

Two of my colleagues are in Taipei again attending Computex 2009 this week and the news is that there appear to be a whole lot of netbooks on view. As ever Nick is uploading pictures to Picasa so you can get some idea of what’s about. As the days progress Nick will update the images, but it is a slow, slow process. Keep your eyes peeled for the rest of the week – and make sure you’re not looking at last years’ pictures by mistake ;). Some of you might notice that some things like the Asus Skype phone have been around for a little while. In fact it has been around since September of last year.

Update 1: More pictures are available.

Update 2: Pictures from day 3 are available now.

Update 3: Pictures from day 4 are available now. There are also some shots of Taipei

[Slashdot] [Digg] [Reddit] [] [Facebook] [Technorati] [Google] [StumbleUpon]

Tagged with:
June 2, 2009 10:51



Pull That Squidgy iPhone application

15 years ago, at the start of June | 7 Comments

Yesterday a friend was ranting away as usual about how stuff was always broken and in passing mentioned the iPhone application Squidgy, an application that allows you to control your Squeezbox(es). There are apparently two problems with the application. The first is that it crashes quite a bit and doesn’t really seem to work very well, not particularly good for an application costing £5 ($8 / 6 EUR). The second is a little more serious. You see EMCC Software Ltd, the company that released the application, went into administration on 12th March 2009. The application is still on sale in the iTunes store despite the fact that EMCC are not providing support and their website consists of a statement that they are in administration and who the acting agents are. Perhaps it would be wise to find a different application to control your Squeezebox(es).

[Slashdot] [Digg] [Reddit] [] [Facebook] [Technorati] [Google] [StumbleUpon]

Tagged with:
June 2, 2009 8:34

keep looking »

Current Electricity Use (15min)

iPhone/Webkit RSS Reader



1-Wire android api Apple arduino currentcost DDAR development DVD FIC freerunner G1 google Google Phone gphone gprs GPS hardware image image builds inspiration iphone jailbreak kiosk linux Mac monitoring Music neo 1973 Nokia openmoko opensource OSX Pachube personal qtopia rhubarb rikki Rio slimp3 slimserver software tracking Trolltech u-boot


Graphy Stuff

Nasty Spam Monkeys