CN109416659A - A kind of network terminal and its constrained procedure of internet behavior - Google Patents

A kind of network terminal and its constrained procedure of internet behavior Download PDF

Info

Publication number
CN109416659A
CN109416659A CN201780037096.0A CN201780037096A CN109416659A CN 109416659 A CN109416659 A CN 109416659A CN 201780037096 A CN201780037096 A CN 201780037096A CN 109416659 A CN109416659 A CN 109416659A
Authority
CN
China
Prior art keywords
behavior
internet
user
standard data
behavioral standard
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780037096.0A
Other languages
Chinese (zh)
Inventor
孙尚传
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Dafu Intelligent Health Technology Co.,Ltd.
Original Assignee
Shenzhen City Dedao Health Management Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Dedao Health Management Ltd filed Critical Shenzhen City Dedao Health Management Ltd
Publication of CN109416659A publication Critical patent/CN109416659A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/308Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Evolutionary Computation (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of network terminal and its constrained procedure of internet behavior, the constrained procedure of the internet behavior includes: the behavior for obtaining active user in internet;Behavior of the active user in internet is constrained according to the behavioral standard data pre-established.By the above-mentioned means, the present invention can restrict behavior of the user in internet according to behavioral standard data, to prevent user from making to itself or other people unfavorable internet behaviors, is conducive to purify network, creates the network environment of health.

Description

A kind of network terminal and its constrained procedure of internet behavior
Technical field
The present invention relates to field of computer technology, more particularly to a kind of network terminal and its constraint side of internet behavior Method.
Background technique
Network is information transmission, receives, shared virtual platform, by it the informational linkage of each point, face, body to one It rises, to realize the shared of these resources.Network is that human development history carrys out most important invention, improves science and technology and human society Development.
User connects network by the network terminal, can carry out the reception and propagation of information, also referred to as " surf the Internet ".With calculating The development of machine and network technology, present user can carry out social, amusement, transaction, work etc. by online.
Summary of the invention
The invention mainly solves the technical problem of providing a kind of network terminal and its constrained procedure of internet behavior, energy It is enough that behavior of the user in internet is restricted according to behavioral standard data, to prevent user from making to itself or other people not The internet behavior of benefit is conducive to purify network, creates the network environment of health.
In order to solve the above technical problems, one technical scheme adopted by the invention is that: a kind of pact of internet behavior is provided Shu Fangfa, this method comprises: obtaining behavior of the active user in internet;According to the behavioral standard data pre-established to working as Behavior of the preceding user in internet constrains.
In order to solve the above technical problems, another technical solution used in the present invention is: providing a kind of computer-readable deposit Storage media, for storing computer program, the computer program is when being executed by processor, to realize such as above-mentioned internet The constrained procedure of behavior.
In order to solve the above technical problems, another technical solution used in the present invention is: providing a kind of network terminal, the net Network terminal includes input unit, output device, memory and processor, and the behavioral standard number pre-established is stored in memory According to processor is used to execute: obtaining behavior of the active user in internet;According to the behavioral standard data pre-established to working as Behavior of the preceding user in internet constrains.
The beneficial effects of the present invention are: being in contrast to the prior art, the constraint of internet behavior provided by the invention Method includes: the behavior for obtaining active user in internet;Existed according to the behavioral standard data pre-established to active user Behavior in internet is constrained.By the above-mentioned means, being capable of row according to behavioral standard data to user in internet To restrict, to prevent user from making to itself or other people unfavorable internet behaviors, be conducive to purify network, creation health Network environment.
Detailed description of the invention
Fig. 1 is the flow diagram of one embodiment of constrained procedure of internet behavior provided by the invention;
Fig. 2 is the flow diagram of another embodiment of constrained procedure of internet behavior provided by the invention;
Fig. 3 is the flow diagram of the another embodiment of constrained procedure of internet behavior provided by the invention;
Fig. 4 is the structural schematic diagram of one embodiment of the network terminal provided by the invention;
Fig. 5 is the structural schematic diagram of one embodiment of network system provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first ", " second ", " third " " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that the embodiment of the present invention described herein for example can be to remove Sequence other than those of illustrating or describe herein is implemented.In addition, term " includes " and " having " and theirs is any Deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, production Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for this A little process, methods, the other step or units of product or equipment inherently.
Refering to fig. 1, Fig. 1 is the flow diagram of one embodiment of constrained procedure of internet behavior provided by the invention, should Method includes:
Step 11: obtaining behavior of the active user in internet.
Wherein, behavior of the user in internet can be internet behavior caused by the user's operation network terminal, lift Example for, may include: user's logon account, made a speech, forwarded, commented on, multimedia information browse (including video, novel, Picture, music etc.), shopping or the transaction of ideal money are carried out, online game is carried out.Wherein, user can be corresponding by entering Website or log in corresponding application to execute above-mentioned internet behavior.
Optionally, obtain behavior of the active user in internet specifically can by or the operation network terminal finger It enables, and instruction parsing is obtained.For example, user when browsing microblogging, wants to be forwarded a certain microblogging, when user uses When mouse clicks forwarding button, that is, get the internet behavior of the forwarding microblogging of active user.For another example, user purchases on the net When object, after shopping cart is added in specified article, in payment, ACK button is clicked, that is, gets the shopping online of active user Internet behavior.
Step 12: behavior of the active user in internet being constrained according to the behavioral standard data pre-established.
Wherein, behavioral standard data can be previously according to corresponding laws and regulations, behavioural norm, classics, well-known saying Epigram etc. as a reference to formulate, for example, can according to scholar, release, road, doctor, force, pleasure, custom, section, quotient etc. classics To formulate behavioral standard data, and classify to behavioral standard data.
Optionally, in one embodiment, which is stored in only reading in memory According to being not modifiable;Certainly, in other embodiments, behavior normal data can also be according to the development and civilization of network Progress be modified.
Wherein, behavioral standard data by active user essential information it is customized form, wherein essential information include occupation, At least one or combination of age, income and marital status.
For example, different users can be adapted for different behavioral standard data.For example, user A is middle school student, not It is 18 years old full, then it then needs that user A is forbidden to browse unsound webpage suitable for the behavioral standard data of user A, and to user A's Surf time and playtime are limited;User B income is lower, then then needs to prohibit suitable for the behavioral standard data of user B Only user B carries out high consumption in shopping website or buys luxuries.
When constraining behavior of the user in internet, various ways can be taken, below in two ways into Row citing:
In the first way, it can first judge whether behavior of the user in internet meets the behavior mark pre-established Quasi- data carry out evaluation record, guidance or correction to it when not meeting the behavioral standard data pre-established.
For example, minor logs in unhealthy webpage, the behavioral standard data pre-established for minor are not met, Prompting interface can be then popped up on webpage, be not appropriate for watching with the page for reminding user to be browsed, and to the upper of user Net record saved so that backstage manager is managed, at this point, backstage manager can be minor guardian or Person's government regulator.
For another example, company personnel logs in the work hours with the unrelated webpage that works, and does not meet preparatory for company personnel The behavioral standard data of formulation, then can pop up prompting interface on webpage, be not appropriate for the page for reminding user to be browsed Work hours viewing, and the internet records of user are saved so that backstage manager is managed, at this point, backstage is managed Reason person can be proprietor of an establishment or company administration staff.
In a further mode of operation, surfing the net for user can also be prevented according to the behavioral standard data pre-established are met For, with prevent user do not meet behavioral standard data internet behavior continuation.
For example, the income of a user is lower, for requiring the user in the behavioral standard data about consumption of the user Online shopping consumption monthly meets " industrious and thrifty in managing a household " behavioral standard data less than 2000 yuan.Then in the online shopping process of the user In, detect that one 3000 yuan of commodity are added shopping cart and paid the bill by user, in payment, directly prevention user, which inputs, is handed over Easy password, it is therefore prevented that current transaction.
It is different from the prior art, the constrained procedure of the internet behavior of the present embodiment includes: to obtain active user interconnecting Behavior in net;Behavior of the active user in internet is constrained according to the behavioral standard data pre-established.Pass through Aforesaid way can restrict behavior of the user in internet according to behavioral standard data, to prevent user from making pair Itself or other people unfavorable internet behaviors, are conducive to purify network, create the network environment of health.
Referring to Fig.2, Fig. 2 is the flow diagram of another embodiment of constrained procedure of internet behavior provided by the invention, This method comprises:
Step 21: formulating behavioral standard data, and collect the behavior sample for meeting behavioral standard data.
Wherein, the behavior sample for meeting behavioral standard data refers to the internet behavior for meeting concrete behavior normal data. Illegal network behavior is reported for example, the behavior for meeting " patriotism and observance of law " behavioral standard data can have, is issued related The model etc. of patriotism and observance of law;Meet the style of writing of " industrious and thrifty in managing a household " behavioral standard data and get a good buy by shopping around when there can be shopping, selects valence The relatively inexpensive commodity etc. of lattice.
Optionally, in one embodiment, step 21 can be with specifically: determine the user's sample for meeting behavioral standard data, The internet behavior of user's sample is monitored, to obtain behavior sample.
For example, user A meets a certain behavioral standard data, then the internet behavior of user A is monitored, by user A Internet behavior as behavior sample.It is of course also possible to the user for largely meeting behavior normal data be selected, to all The behavior of user is monitored, and using behavior of all users in internet as behavior sample, or by the phase of all users Same/similar internet behavior is as behavior sample.
Optionally, in another embodiment, step 21 can specifically include: discussing topic warmly in collection network, and obtain Masses' evaluation or official interpret;It is interpreted from masses' evaluation or official and extracts behavioral standard data, and extract behavior from topic is discussed warmly Sample.
For example, occur " network game indulging " in network discusses topic warmly, wherein the network for minor is swum Play type, time are discussed.In the present embodiment, so that it may collect online friend or official to the view of " network game indulging " And suggestion, and then discussed warmly from this and obtain sample behavior in discussion of topic.
For concrete example, if most of online friends or official think that 12-16 years old minor is daily in masses discuss warmly Playtime should not be more than 1 hour, then the internet behavior using playtime less than 1 hour was as 12-16 years old user Meet the sample behavior of behavioral standard data.
Step 22: feature extraction, and training behavior classifier are carried out to behavior sample.
Step 23: obtaining behavior of the active user in internet.
Step 24: feature extraction being carried out to behavior of the active user in internet, and is divided using behavior classifier Class, to judge whether it meets behavioral standard data.
The feature of internet behavior can determine according to specific internet behavior.Come with the example of above-mentioned online game It says, feature may include type of play, playtime, game consumption etc..By taking shopping online as an example, feature may include quotient Category type, commodity price, sales volume of commodity etc..
Step 25: mutual to the correlation of user when behavior no enough row of the active user in internet is normal data Networking permission is limited.
Optionally, step 25 can be with specifically: in behavior no enough row of the active user in internet is normal data When, it at least executes following a kind of: forbidding user to log in, forbid user to post, forward or comment on, user is forbidden to log in setting net Page forbids user to use Internetbank.
Above-described embodiment is illustrated with a specific example below:
Firstly, according to step 21 and step 22, meet do not allow in the behavioral standard data of teenage health online not at Pictures and the videos such as year viewing violence, pornographic.
User A is minor, can obtain the identity information of user A in advance.User A and user B are in Internet chat Cheng Zhong has received the network of a film (film for not meeting teenage healthy internet behavior normal data) for user B transmission Link, user's A clickthrough, which is intended to open corresponding webpage, watches the film.The interconnection of user A is then got in step 23 Net behavior then forbids user A to open the film webpage.
It is the flow diagram of the another embodiment of constrained procedure of internet behavior provided by the invention refering to Fig. 3, Fig. 3, This method comprises:
Step 31: uniquely can recognize account for active user's distribution.
Step 32: obtaining behavior of the active user in internet.
Step 33: behavior of the active user in internet being constrained according to the behavioral standard data pre-established.
Wherein, behavior normal data by active user essential information it is customized form, wherein essential information includes duty At least one or combination of industry, age, income and marital status.
Step 34: behavior of the active user in internet and about beam recording with unique can recognize that account is associated.
Optionally, in step 33, historical internet behavior associated by uniquely recognizable account can be combined and/or gone through History about beam recording constrains the current internet behavior of active user.
For example, user A is minor, user A online game time some day is (to meet behavioral standard data in 2 hours Time be assumed to be within an hour), do not meet behavioral standard data, then online prompting can be carried out to it, it is proposed that its stop on Net;Thereafter user A online game time some day, should according to pre-set behavioral standard data still above 1 hour It being reminded, but relative to its historical internet behavior, user A is not this internet behavior occur for the first time, because This, can mandatory closing game, or forbid the login of game.
Optionally, in one embodiment, this method can be comprising steps of according to about beam recording to unique identification account institute It is associated morals integral is increased or decreased, morals integral be set as other users as it can be seen that simultaneously at least with internet permission phase Association.
For example, the morals integral original state of each user is that full marks 100 divide, after constraint, according to the result of constraint Its morals integral is increased and decreased, wherein the degree of deduction can be according to behavior of the user in internet and behavioral standard number According to matching degree determine, or according to the degree of restraint to its internet behavior.First is reduced in the integral of user to set When definite value (such as 60 points), part limitation is carried out to behavior of the user in internet, second is reduced in the integral of user and sets When definite value (such as 0 point), user is forbidden to surf the Internet.
The present invention also provides a kind of computer readable storage medium, the computer readable storage medium is for storing computer Program, the computer program are executed by processor the constrained procedure to realize the internet behavior provided in above-described embodiment.It can With understanding, the computer program of readable storage medium storing program for executing storage in the present embodiment is used to be performed method and above-mentioned reality The constrained procedure for applying the internet behavior of example offer is similar, and principle is identical with step, and which is not described herein again.
Wherein, the storage medium include: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), with Machine accesses various Jie that can store program code such as memory (RAM, Random Access Memory), magnetic or disk Matter.
It is the structural schematic diagram of one embodiment of the network terminal provided by the invention, the network terminal 40 packet refering to Fig. 4, Fig. 4 Include input unit 41, output device 42, memory 43 and processor 44.
Wherein, the behavioral standard data pre-established are stored in memory 43.
Optionally, behavior normal data by active user essential information it is customized form, wherein essential information includes At least one or combination of occupation, age, income and marital status.
Wherein, processor 44 is used to execute: obtaining behavior of the active user in internet;According to the behavior pre-established Normal data constrains behavior of the active user in internet.
Optionally, in another embodiment, processor 44 is also used to execute: formulating behavioral standard data, and collects satisfaction The behavior sample of behavioral standard data;Feature extraction, and training behavior classifier are carried out to behavior sample;To active user mutual Behavior in networking carries out feature extraction, and is classified using behavior classifier, to judge whether it meets behavioral standard number According to;When behavior no enough row of the active user in internet is normal data, the associated internet permission of user is carried out Limitation.
Optionally, in another embodiment, processor 44 is also used to execute: behavior of the active user in internet not When meeting behavioral standard data, at least executes following a kind of: forbidding user to log in, forbid user to post, forward or comment on, forbid User logs in setting webpage, and user is forbidden to use Internetbank.
Optionally, in another embodiment, processor 44 is also used to execute: determining the user's sample for meeting behavioral standard data This, is monitored the internet behavior of user's sample, to obtain behavior sample.
Optionally, in another embodiment, processor 44 is also used to execute: discussing topic warmly in collection network, and obtains Masses' evaluation or official interpret;It is interpreted from masses' evaluation or official and extracts behavioral standard data, and extract behavior from topic is discussed warmly Sample.
Optionally, in another embodiment, processor 44 is also used to execute: uniquely can recognize account for active user's distribution Family;Behavior of the active user in internet and about beam recording with unique can recognize that account is associated.
Optionally, in another embodiment, processor 44 is also used to execute: going through associated by account in conjunction with unique can recognize The behavior of history internet and/or historical restraints record constrain the current internet behavior of active user.
Optionally, in another embodiment, processor 44 is specifically used for executing: according to about beam recording to unique identification account Associated morals integral is increased or decreased, morals integral be set as other users as it can be seen that simultaneously at least with internet permission It is associated.
It should be understood that the network terminal 40 provided by the embodiment can be user terminal, such as computer, mobile phone, intelligence are worn The terminal that equipment etc. can surf the Internet is worn, it can also be with terminals such as server, base stations, for the behavior remotely to user in internet It is evaluated.
The network terminal provided in this embodiment is an equipment of the evaluation method of internet behavior based on the above embodiment, Its implementation principle is similar with step, and which is not described herein again.
It is the structural schematic diagram of one embodiment of network system provided by the invention refering to Fig. 5, Fig. 5, which includes The network terminal 51 and server 52.
Wherein, the network terminal 51 is sent for obtaining behavior of the active user in internet, and by the internet behavior To server, server 52 is used to carry out behavior of the active user in internet according to the behavioral standard data pre-established Constraint.
Different from above-described embodiment, behavior of the user in internet is carried out about by server 52 in the present embodiment Beam.
It should be understood that the constrained procedure of server 52 can be whole with reference to the network in above-described embodiment in the present embodiment End, structure is similar with working principle, and which is not described herein again.
In several embodiments provided by the present invention, it should be understood that disclosed method and equipment, Ke Yitong Other modes are crossed to realize.For example, equipment embodiment described above is only schematical, for example, the module or The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize present embodiment scheme according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can integrate in one processing unit, it can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units.It is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.
Mode the above is only the implementation of the present invention is not intended to limit the scope of the invention, all to utilize this Equivalent structure or equivalent flow shift made by description of the invention and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (19)

1. a kind of constrained procedure of internet behavior, which is characterized in that the described method includes:
Obtain behavior of the active user in internet;
Behavior of the active user in internet is constrained according to the behavioral standard data pre-established.
2. the method according to claim 1, wherein in the behavior of the acquisition active user in internet Further comprise before step:
Behavioral standard data are formulated, and collect the behavior sample for meeting the behavioral standard data;
Feature extraction, and training behavior classifier are carried out to the behavior sample;
The step that the behavioral standard data that the basis pre-establishes constrain behavior of the active user in internet Suddenly further comprise:
Feature extraction is carried out to behavior of the active user in internet, and is classified using the behavior classifier, To judge whether it meets the behavioral standard data;
It is mutual to the correlation of the user when behavior of the active user in internet is unsatisfactory for the behavioral standard data Networking permission is limited.
3. according to the method described in claim 2, it is characterized in that, the behavior in the active user in internet not When meeting the behavioral standard data, the step of limiting the associated internet permission of the user, includes:
When behavior of the active user in internet is unsatisfactory for the behavioral standard data, at least execute following a kind of: Forbid user to log in, user is forbidden to post, forward or comment on, forbids user to log in setting webpage, user is forbidden to use Internetbank.
4. according to the method described in claim 2, it is characterized in that, the formulation behavioral standard data, and collecting described in satisfaction The step of behavior sample of behavioral standard data, further comprises:
It determines the user's sample for meeting the behavioral standard data, the internet behavior of user's sample is monitored, with Obtain the behavior sample.
5. according to the method described in claim 2, it is characterized in that, the formulation behavioral standard data, and collecting described in satisfaction The step of behavior sample of behavioral standard data, further comprises:
Topic is discussed warmly in collection network, and obtains public evaluation or official's interpretation;
It is interpreted from the public evaluation or official and extracts the behavioral standard data, and extract the behavior from the topic of discussing warmly Sample.
6. the method according to claim 1, wherein in the behavior of the acquisition active user in internet Further comprise before step:
It uniquely can recognize account for active user distribution;
The step that the behavioral standard data that the basis pre-establishes constrain behavior of the active user in internet Further comprise after rapid:
Behavior of the active user in internet and about beam recording are associated with the uniquely recognizable account.
7. according to the method described in claim 6, it is characterized in that, the row in the acquisition active user in internet For the step of before further comprise:
The historical internet behavior in conjunction with associated by the uniquely recognizable account and/or historical restraints record are to the current use The current internet behavior at family is constrained.
8. according to the method described in claim 6, it is characterized in that, the method further includes:
The integral of morals associated by the unique identification account is increased or decreased according to the about beam recording, the morals Integral is set as other users as it can be seen that simultaneously at least associated with internet permission.
9. the method according to claim 1, wherein the behavioral standard data are by the basic of the active user Information is customized to be formed, wherein the essential information includes at least one or group of occupation, age, income and marital status It closes.
10. a kind of computer readable storage medium, for storing computer program, which is characterized in that the computer program exists When being executed by processor, to realize the constrained procedure such as the described in any item internet behaviors of claim 1-9.
11. a kind of network terminal, which is characterized in that including input unit, output device, memory and processor, the storage The behavioral standard data pre-established are stored in device, the processor is for executing:
Obtain behavior of the active user in internet;
Behavior of the active user in internet is constrained according to the behavioral standard data pre-established.
12. the network terminal according to claim 11, which is characterized in that the processor is also used to execute:
Behavioral standard data are formulated, and collect the behavior sample for meeting the behavioral standard data;
Feature extraction, and training behavior classifier are carried out to the behavior sample;
Feature extraction is carried out to behavior of the active user in internet, and is classified using the behavior classifier, To judge whether it meets the behavioral standard data;
It is mutual to the correlation of the user when behavior of the active user in internet is unsatisfactory for the behavioral standard data Networking permission is limited.
13. the network terminal according to claim 12, which is characterized in that the processor is specifically used for executing:
When behavior of the active user in internet is unsatisfactory for the behavioral standard data, at least execute following a kind of: Forbid user to log in, user is forbidden to post, forward or comment on, forbids user to log in setting webpage, user is forbidden to use Internetbank.
14. the network terminal according to claim 12, which is characterized in that the processor is specifically used for executing:
It determines the user's sample for meeting the behavioral standard data, the internet behavior of user's sample is monitored, with Obtain the behavior sample.
15. the network terminal according to claim 12, which is characterized in that the processor is also used to execute:
Topic is discussed warmly in collection network, and obtains public evaluation or official's interpretation;
It is interpreted from the public evaluation or official and extracts the behavioral standard data, and extract the behavior from the topic of discussing warmly Sample.
16. the network terminal according to claim 11, which is characterized in that the processor is also used to execute:
It uniquely can recognize account for active user distribution;
Behavior of the active user in internet and about beam recording are associated with the uniquely recognizable account.
17. the network terminal according to claim 16, which is characterized in that the processor is also used to execute:
The historical internet behavior in conjunction with associated by the uniquely recognizable account and/or historical restraints record are to the current use The current internet behavior at family is constrained.
18. the network terminal according to claim 16, which is characterized in that the processor is also used to execute:
The integral of morals associated by the unique identification account is increased or decreased according to the about beam recording, the morals Integral is set as other users as it can be seen that simultaneously at least associated with internet permission.
19. the network terminal according to claim 11, which is characterized in that the behavioral standard data are by the active user Essential information it is customized form, wherein the essential information includes at least one of occupation, age, income and marital status Or combination.
CN201780037096.0A 2017-09-30 2017-09-30 A kind of network terminal and its constrained procedure of internet behavior Pending CN109416659A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/104717 WO2019061379A1 (en) 2017-09-30 2017-09-30 Network terminal and internet behavior constraint method thereof

Publications (1)

Publication Number Publication Date
CN109416659A true CN109416659A (en) 2019-03-01

Family

ID=65462998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780037096.0A Pending CN109416659A (en) 2017-09-30 2017-09-30 A kind of network terminal and its constrained procedure of internet behavior

Country Status (2)

Country Link
CN (1) CN109416659A (en)
WO (1) WO2019061379A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130346917A1 (en) * 2012-06-22 2013-12-26 Microsoft Corporation Client application analytics
CN103853841A (en) * 2014-03-19 2014-06-11 北京邮电大学 Method for analyzing abnormal behavior of user in social networking site
CN103930921A (en) * 2011-11-11 2014-07-16 迈克菲股份有限公司 Reputation services for a social media identity
CN105590055A (en) * 2014-10-23 2016-05-18 阿里巴巴集团控股有限公司 Method and apparatus for identifying trustworthy user behavior in network interaction system
CN106257507A (en) * 2015-06-18 2016-12-28 阿里巴巴集团控股有限公司 The methods of risk assessment of user behavior and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893407A (en) * 2015-11-12 2016-08-24 乐视云计算有限公司 Individual user portraying method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103930921A (en) * 2011-11-11 2014-07-16 迈克菲股份有限公司 Reputation services for a social media identity
US20130346917A1 (en) * 2012-06-22 2013-12-26 Microsoft Corporation Client application analytics
CN103853841A (en) * 2014-03-19 2014-06-11 北京邮电大学 Method for analyzing abnormal behavior of user in social networking site
CN105590055A (en) * 2014-10-23 2016-05-18 阿里巴巴集团控股有限公司 Method and apparatus for identifying trustworthy user behavior in network interaction system
CN106257507A (en) * 2015-06-18 2016-12-28 阿里巴巴集团控股有限公司 The methods of risk assessment of user behavior and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113313350A (en) * 2021-04-23 2021-08-27 武汉瑞安科技发展有限公司 Internet of things data acquisition, analysis and management system

Also Published As

Publication number Publication date
WO2019061379A1 (en) 2019-04-04

Similar Documents

Publication Publication Date Title
CN103176982B (en) The method and system that a kind of e-book is recommended
US9454563B2 (en) Fact checking search results
CN104809154B (en) The method and device recommended for information
US9630090B2 (en) Game play fact checking
Searls The intention economy: when customers take charge
Doron et al. The great Indian phone book: How the cheap cell phone changes business, politics, and daily life
US20130159127A1 (en) Method of and system for rating sources for fact checking
Guest Borderless economics: Chinese sea turtles, Indian fridges and the new fruits of global capitalism
Hughes Pimps and Predators on the Internet
CN106484829B (en) A kind of foundation and microblogging diversity search method of microblogging order models
Clegg Big data: How the information revolution is transforming our lives
CN103348369A (en) Interestingness recommendations in a computing advice facility
CN107656918B (en) Obtain the method and device of target user
CN107918622A (en) Commending contents, methods of exhibiting, client, server and system
TW201032168A (en) User interface for interest-based targeted marketing
CN102904800B (en) Method and system with instant communication contacts shared network Transaction Information
Staab et al. Beyond memorization: Violating privacy via inference with large language models
JP2021520567A (en) Face matching method and device, storage medium
KR20160042891A (en) Search result augmenting
CN103793481A (en) Microblog word cloud generating method based on user interest mining and accessing supporting system
CN106462810A (en) Connecting current user activities with related stored media collections
CN110474944A (en) Processing method, device and the storage medium of the network information
CN107798011A (en) A kind of searching method and device, a kind of device for being used to search for
CN107480227A (en) A kind of information-pushing method based on big data
KR101693429B1 (en) System for identifying human relationships around users and coaching based on identified human relationships

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518000 Guangdong city of Shenzhen province Futian District Futian District, three Lunuode financial center building on the west side of 32B

Applicant after: Dedao Health Management Co.,Ltd.

Address before: 518000 Guangdong city of Shenzhen province Futian District Futian District, three Lunuode financial center building on the west side of 32B

Applicant before: SHENZHEN DEDAO HEALTH MANAGEMENT Co.,Ltd.

CB02 Change of applicant information
TA01 Transfer of patent application right

Effective date of registration: 20200604

Address after: 518000. C, unit 207, building A3, China Merchants science and Technology Park, 3009 Guangming Road, Guangming Road, Guangming District, Guangdong, Shenzhen

Applicant after: Shenzhen Dafu Intelligent Health Technology Co.,Ltd.

Address before: 518000 Guangdong city of Shenzhen province Futian District Futian District, three Lunuode financial center building on the west side of 32B

Applicant before: Dedao Health Management Co.,Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301

RJ01 Rejection of invention patent application after publication