Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiment of the present invention described herein for example can be to remove
Sequence other than those of illustrating or describe herein is implemented.In addition, term " includes " and " having " and theirs is any
Deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, production
Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for this
A little process, methods, the other step or units of product or equipment inherently.
Refering to fig. 1, Fig. 1 is the flow diagram of one embodiment of constrained procedure of internet behavior provided by the invention, should
Method includes:
Step 11: obtaining behavior of the active user in internet.
Wherein, behavior of the user in internet can be internet behavior caused by the user's operation network terminal, lift
Example for, may include: user's logon account, made a speech, forwarded, commented on, multimedia information browse (including video, novel,
Picture, music etc.), shopping or the transaction of ideal money are carried out, online game is carried out.Wherein, user can be corresponding by entering
Website or log in corresponding application to execute above-mentioned internet behavior.
Optionally, obtain behavior of the active user in internet specifically can by or the operation network terminal finger
It enables, and instruction parsing is obtained.For example, user when browsing microblogging, wants to be forwarded a certain microblogging, when user uses
When mouse clicks forwarding button, that is, get the internet behavior of the forwarding microblogging of active user.For another example, user purchases on the net
When object, after shopping cart is added in specified article, in payment, ACK button is clicked, that is, gets the shopping online of active user
Internet behavior.
Step 12: behavior of the active user in internet being constrained according to the behavioral standard data pre-established.
Wherein, behavioral standard data can be previously according to corresponding laws and regulations, behavioural norm, classics, well-known saying
Epigram etc. as a reference to formulate, for example, can according to scholar, release, road, doctor, force, pleasure, custom, section, quotient etc. classics
To formulate behavioral standard data, and classify to behavioral standard data.
Optionally, in one embodiment, which is stored in only reading in memory
According to being not modifiable;Certainly, in other embodiments, behavior normal data can also be according to the development and civilization of network
Progress be modified.
Wherein, behavioral standard data by active user essential information it is customized form, wherein essential information include occupation,
At least one or combination of age, income and marital status.
For example, different users can be adapted for different behavioral standard data.For example, user A is middle school student, not
It is 18 years old full, then it then needs that user A is forbidden to browse unsound webpage suitable for the behavioral standard data of user A, and to user A's
Surf time and playtime are limited;User B income is lower, then then needs to prohibit suitable for the behavioral standard data of user B
Only user B carries out high consumption in shopping website or buys luxuries.
When constraining behavior of the user in internet, various ways can be taken, below in two ways into
Row citing:
In the first way, it can first judge whether behavior of the user in internet meets the behavior mark pre-established
Quasi- data carry out evaluation record, guidance or correction to it when not meeting the behavioral standard data pre-established.
For example, minor logs in unhealthy webpage, the behavioral standard data pre-established for minor are not met,
Prompting interface can be then popped up on webpage, be not appropriate for watching with the page for reminding user to be browsed, and to the upper of user
Net record saved so that backstage manager is managed, at this point, backstage manager can be minor guardian or
Person's government regulator.
For another example, company personnel logs in the work hours with the unrelated webpage that works, and does not meet preparatory for company personnel
The behavioral standard data of formulation, then can pop up prompting interface on webpage, be not appropriate for the page for reminding user to be browsed
Work hours viewing, and the internet records of user are saved so that backstage manager is managed, at this point, backstage is managed
Reason person can be proprietor of an establishment or company administration staff.
In a further mode of operation, surfing the net for user can also be prevented according to the behavioral standard data pre-established are met
For, with prevent user do not meet behavioral standard data internet behavior continuation.
For example, the income of a user is lower, for requiring the user in the behavioral standard data about consumption of the user
Online shopping consumption monthly meets " industrious and thrifty in managing a household " behavioral standard data less than 2000 yuan.Then in the online shopping process of the user
In, detect that one 3000 yuan of commodity are added shopping cart and paid the bill by user, in payment, directly prevention user, which inputs, is handed over
Easy password, it is therefore prevented that current transaction.
It is different from the prior art, the constrained procedure of the internet behavior of the present embodiment includes: to obtain active user interconnecting
Behavior in net;Behavior of the active user in internet is constrained according to the behavioral standard data pre-established.Pass through
Aforesaid way can restrict behavior of the user in internet according to behavioral standard data, to prevent user from making pair
Itself or other people unfavorable internet behaviors, are conducive to purify network, create the network environment of health.
Referring to Fig.2, Fig. 2 is the flow diagram of another embodiment of constrained procedure of internet behavior provided by the invention,
This method comprises:
Step 21: formulating behavioral standard data, and collect the behavior sample for meeting behavioral standard data.
Wherein, the behavior sample for meeting behavioral standard data refers to the internet behavior for meeting concrete behavior normal data.
Illegal network behavior is reported for example, the behavior for meeting " patriotism and observance of law " behavioral standard data can have, is issued related
The model etc. of patriotism and observance of law;Meet the style of writing of " industrious and thrifty in managing a household " behavioral standard data and get a good buy by shopping around when there can be shopping, selects valence
The relatively inexpensive commodity etc. of lattice.
Optionally, in one embodiment, step 21 can be with specifically: determine the user's sample for meeting behavioral standard data,
The internet behavior of user's sample is monitored, to obtain behavior sample.
For example, user A meets a certain behavioral standard data, then the internet behavior of user A is monitored, by user A
Internet behavior as behavior sample.It is of course also possible to the user for largely meeting behavior normal data be selected, to all
The behavior of user is monitored, and using behavior of all users in internet as behavior sample, or by the phase of all users
Same/similar internet behavior is as behavior sample.
Optionally, in another embodiment, step 21 can specifically include: discussing topic warmly in collection network, and obtain
Masses' evaluation or official interpret;It is interpreted from masses' evaluation or official and extracts behavioral standard data, and extract behavior from topic is discussed warmly
Sample.
For example, occur " network game indulging " in network discusses topic warmly, wherein the network for minor is swum
Play type, time are discussed.In the present embodiment, so that it may collect online friend or official to the view of " network game indulging "
And suggestion, and then discussed warmly from this and obtain sample behavior in discussion of topic.
For concrete example, if most of online friends or official think that 12-16 years old minor is daily in masses discuss warmly
Playtime should not be more than 1 hour, then the internet behavior using playtime less than 1 hour was as 12-16 years old user
Meet the sample behavior of behavioral standard data.
Step 22: feature extraction, and training behavior classifier are carried out to behavior sample.
Step 23: obtaining behavior of the active user in internet.
Step 24: feature extraction being carried out to behavior of the active user in internet, and is divided using behavior classifier
Class, to judge whether it meets behavioral standard data.
The feature of internet behavior can determine according to specific internet behavior.Come with the example of above-mentioned online game
It says, feature may include type of play, playtime, game consumption etc..By taking shopping online as an example, feature may include quotient
Category type, commodity price, sales volume of commodity etc..
Step 25: mutual to the correlation of user when behavior no enough row of the active user in internet is normal data
Networking permission is limited.
Optionally, step 25 can be with specifically: in behavior no enough row of the active user in internet is normal data
When, it at least executes following a kind of: forbidding user to log in, forbid user to post, forward or comment on, user is forbidden to log in setting net
Page forbids user to use Internetbank.
Above-described embodiment is illustrated with a specific example below:
Firstly, according to step 21 and step 22, meet do not allow in the behavioral standard data of teenage health online not at
Pictures and the videos such as year viewing violence, pornographic.
User A is minor, can obtain the identity information of user A in advance.User A and user B are in Internet chat
Cheng Zhong has received the network of a film (film for not meeting teenage healthy internet behavior normal data) for user B transmission
Link, user's A clickthrough, which is intended to open corresponding webpage, watches the film.The interconnection of user A is then got in step 23
Net behavior then forbids user A to open the film webpage.
It is the flow diagram of the another embodiment of constrained procedure of internet behavior provided by the invention refering to Fig. 3, Fig. 3,
This method comprises:
Step 31: uniquely can recognize account for active user's distribution.
Step 32: obtaining behavior of the active user in internet.
Step 33: behavior of the active user in internet being constrained according to the behavioral standard data pre-established.
Wherein, behavior normal data by active user essential information it is customized form, wherein essential information includes duty
At least one or combination of industry, age, income and marital status.
Step 34: behavior of the active user in internet and about beam recording with unique can recognize that account is associated.
Optionally, in step 33, historical internet behavior associated by uniquely recognizable account can be combined and/or gone through
History about beam recording constrains the current internet behavior of active user.
For example, user A is minor, user A online game time some day is (to meet behavioral standard data in 2 hours
Time be assumed to be within an hour), do not meet behavioral standard data, then online prompting can be carried out to it, it is proposed that its stop on
Net;Thereafter user A online game time some day, should according to pre-set behavioral standard data still above 1 hour
It being reminded, but relative to its historical internet behavior, user A is not this internet behavior occur for the first time, because
This, can mandatory closing game, or forbid the login of game.
Optionally, in one embodiment, this method can be comprising steps of according to about beam recording to unique identification account institute
It is associated morals integral is increased or decreased, morals integral be set as other users as it can be seen that simultaneously at least with internet permission phase
Association.
For example, the morals integral original state of each user is that full marks 100 divide, after constraint, according to the result of constraint
Its morals integral is increased and decreased, wherein the degree of deduction can be according to behavior of the user in internet and behavioral standard number
According to matching degree determine, or according to the degree of restraint to its internet behavior.First is reduced in the integral of user to set
When definite value (such as 60 points), part limitation is carried out to behavior of the user in internet, second is reduced in the integral of user and sets
When definite value (such as 0 point), user is forbidden to surf the Internet.
The present invention also provides a kind of computer readable storage medium, the computer readable storage medium is for storing computer
Program, the computer program are executed by processor the constrained procedure to realize the internet behavior provided in above-described embodiment.It can
With understanding, the computer program of readable storage medium storing program for executing storage in the present embodiment is used to be performed method and above-mentioned reality
The constrained procedure for applying the internet behavior of example offer is similar, and principle is identical with step, and which is not described herein again.
Wherein, the storage medium include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), with
Machine accesses various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic or disk
Matter.
It is the structural schematic diagram of one embodiment of the network terminal provided by the invention, the network terminal 40 packet refering to Fig. 4, Fig. 4
Include input unit 41, output device 42, memory 43 and processor 44.
Wherein, the behavioral standard data pre-established are stored in memory 43.
Optionally, behavior normal data by active user essential information it is customized form, wherein essential information includes
At least one or combination of occupation, age, income and marital status.
Wherein, processor 44 is used to execute: obtaining behavior of the active user in internet;According to the behavior pre-established
Normal data constrains behavior of the active user in internet.
Optionally, in another embodiment, processor 44 is also used to execute: formulating behavioral standard data, and collects satisfaction
The behavior sample of behavioral standard data;Feature extraction, and training behavior classifier are carried out to behavior sample;To active user mutual
Behavior in networking carries out feature extraction, and is classified using behavior classifier, to judge whether it meets behavioral standard number
According to;When behavior no enough row of the active user in internet is normal data, the associated internet permission of user is carried out
Limitation.
Optionally, in another embodiment, processor 44 is also used to execute: behavior of the active user in internet not
When meeting behavioral standard data, at least executes following a kind of: forbidding user to log in, forbid user to post, forward or comment on, forbid
User logs in setting webpage, and user is forbidden to use Internetbank.
Optionally, in another embodiment, processor 44 is also used to execute: determining the user's sample for meeting behavioral standard data
This, is monitored the internet behavior of user's sample, to obtain behavior sample.
Optionally, in another embodiment, processor 44 is also used to execute: discussing topic warmly in collection network, and obtains
Masses' evaluation or official interpret;It is interpreted from masses' evaluation or official and extracts behavioral standard data, and extract behavior from topic is discussed warmly
Sample.
Optionally, in another embodiment, processor 44 is also used to execute: uniquely can recognize account for active user's distribution
Family;Behavior of the active user in internet and about beam recording with unique can recognize that account is associated.
Optionally, in another embodiment, processor 44 is also used to execute: going through associated by account in conjunction with unique can recognize
The behavior of history internet and/or historical restraints record constrain the current internet behavior of active user.
Optionally, in another embodiment, processor 44 is specifically used for executing: according to about beam recording to unique identification account
Associated morals integral is increased or decreased, morals integral be set as other users as it can be seen that simultaneously at least with internet permission
It is associated.
It should be understood that the network terminal 40 provided by the embodiment can be user terminal, such as computer, mobile phone, intelligence are worn
The terminal that equipment etc. can surf the Internet is worn, it can also be with terminals such as server, base stations, for the behavior remotely to user in internet
It is evaluated.
The network terminal provided in this embodiment is an equipment of the evaluation method of internet behavior based on the above embodiment,
Its implementation principle is similar with step, and which is not described herein again.
It is the structural schematic diagram of one embodiment of network system provided by the invention refering to Fig. 5, Fig. 5, which includes
The network terminal 51 and server 52.
Wherein, the network terminal 51 is sent for obtaining behavior of the active user in internet, and by the internet behavior
To server, server 52 is used to carry out behavior of the active user in internet according to the behavioral standard data pre-established
Constraint.
Different from above-described embodiment, behavior of the user in internet is carried out about by server 52 in the present embodiment
Beam.
It should be understood that the constrained procedure of server 52 can be whole with reference to the network in above-described embodiment in the present embodiment
End, structure is similar with working principle, and which is not described herein again.
In several embodiments provided by the present invention, it should be understood that disclosed method and equipment, Ke Yitong
Other modes are crossed to realize.For example, equipment embodiment described above is only schematical, for example, the module or
The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.Some or all of unit therein can be selected to realize present embodiment scheme according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can integrate in one processing unit, it can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units.It is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this
Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.