KR101765760B1 - Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same - Google Patents

Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same Download PDF

Info

Publication number
KR101765760B1
KR101765760B1 KR1020150189696A KR20150189696A KR101765760B1 KR 101765760 B1 KR101765760 B1 KR 101765760B1 KR 1020150189696 A KR1020150189696 A KR 1020150189696A KR 20150189696 A KR20150189696 A KR 20150189696A KR 101765760 B1 KR101765760 B1 KR 101765760B1
Authority
KR
South Korea
Prior art keywords
application
user
internet addiction
url
list
Prior art date
Application number
KR1020150189696A
Other languages
Korean (ko)
Other versions
KR20170079291A (en
Inventor
허경호
Original Assignee
경희대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 경희대학교 산학협력단 filed Critical 경희대학교 산학협력단
Priority to KR1020150189696A priority Critical patent/KR101765760B1/en
Publication of KR20170079291A publication Critical patent/KR20170079291A/en
Application granted granted Critical
Publication of KR101765760B1 publication Critical patent/KR101765760B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Debugging And Monitoring (AREA)

Abstract

An operation method of an application includes the steps of: an application executed on the user computer accumulating a connection time of the web browser and the website while the user is connecting to the web site using a web browser installed on the user computer; Generating a log file for all key values input from a keyboard connected to the user computer until the accumulated connection time reaches a predetermined first reference time, When the reference time is reached, the application generating a list of key values exceeding a preset key input first reference count among the key values recorded in the log file; Send the URL of the site to the Internet Addiction Diagnostic Server .

Description

BACKGROUND OF THE INVENTION 1. Field of the Invention The present invention relates to an application capable of generating a log file of key values of a keyboard and a method of measuring the level of internet addiction using the same. 2. Description of the Related Art SAME}

An embodiment according to the inventive concept relates to an application which can be used for measuring the level of internet addiction and in particular to an application capable of generating a log file of key values for certain keyboards among the keyboards contained in the keyboard, And a method for measuring a level of internet addiction by a user using the log file.

Internet addiction is a state in which autonomous control of computer and internet use such as game addiction, pornography addiction, information search addiction, internet shopping addiction, and smart phone addiction is impossible, This means experiencing physical abnormal behavior and mental abnormal behavior enough to interfere with real life in life.

Game addiction is an excessive immersion in the Internet game, which means that it is constantly receiving unfair influence on school, family, and interpersonal relationships. Game addiction is more common in males than in females, and is more common among adolescents and children than adults.

Obscenity addiction is an example of a sexually suggestive behavior in which you see pornographic photos, comics, videos, or novels over the Internet, or overexertion through obscene chat or part of your body through video chat.

Especially, the internet addiction phenomenon of young people reached serious level. These Internet addicts cause serious mental harm and material damage to both myself and the people around me. From a guardian's perspective, it is required that minor children should be able to easily determine whether they are addicted to the Internet (especially online game addiction, pornography addiction, or smartphone addiction) and provide appropriate treatment according to their judgment.

1. Registration Patent Publication 10-1464190 (Registered Nov. 17, 2014) 2. Open Patent Publication No. 10-2005-0002720 (published Oct. 10, 2005)

An object of the present invention is to provide an application capable of generating a log file of key values for specific keyboards among keyboards included in a keyboard and an application for manually measuring the internet addiction level of a user using the log file And provides a method of automatically providing the treatment method corresponding to the measurement result to the guardian computer in real time in real time.

An operation method of an application according to an embodiment of the present invention is a method in which while an application is connected to a web site using a web browser installed on a user computer, Generating a log file for all key values input from a keyboard connected to the user computer until the accumulated connection time reaches a preset first reference time, When the time reaches a predetermined first reference time, the application generates a list of key values exceeding a predetermined number of key input first reference times among the key values recorded in the log file; If the application is in the above list and the URL of the website resource locator) to the Internet addiction diagnostic server.

According to embodiments, the method of operation of the application further comprises the steps of: the application requesting an input of an authentication number in response to a deletion event; and denying execution of the deletion event until the application completes authentication of the authentication number .

According to embodiments, an operation method of the application may include: receiving an access blocking command from the Internet addiction diagnostic server after transmitting the list and the URL of the website to the Internet addiction diagnostic server; The application immediately interrupts the connection of the web browser with the web site in response to the disconnect command.

According to embodiments, an operation method of the application may include: after transmitting the list and the URL of the web site to the internet addiction diagnosis server, the application receives a second reference time and a key input second reference The method comprising: receiving at least one of a first reference time, a second reference time, and a number of times; And performing at least one.

According to embodiments, the method of operation of the application further comprises initializing the log file after the list and the URL of the website are transmitted to the Internet addiction diagnostic server.

According to embodiments, a method of operating an application includes the steps of: the application recording an ID and a password entered when the user connects to the web site using the web browser, in the log file; And transmitting the list including the password and the URL of the website to the Internet addiction diagnostic server.

According to embodiments, an operation method of the application may include: receiving, by the application, a message set by a guardian of the user and a message to be transmitted to the user through the character; Before the predetermined time to reach one reference time, the application transmits the message to the user using the character.

According to an embodiment of the present invention, a method for measuring a level of a user's Internet addiction level using an Internet addiction diagnostic server capable of communicating with a user computer and a guardian computer includes: The method comprising the steps of: accumulating a connection time between the web browser and the web site, the application being executed on the user computer while the connection is being established; Generating a log file for all the key values input from the keyboard connected to the log file, and when the accumulated connection time reaches the predetermined first reference time, If the number of times of the first key input The method comprising the steps of: the application generating a list of URLs (uniform resource locators) of the list and the web site to an internet addiction diagnostic server; Receiving the URL and storing the URL in a database; analyzing the list and the URL of the website and automatically calculating an evaluation score according to the analysis result; and the Internet addiction diagnosis server calculates Classifying the level of the user's Internet addiction level into one of the levels of the addiction level based on the received score, and transmitting the classified level and the treatment method to the guardian computer .

The step of automatically calculating the evaluation score may include a step of determining whether the URL of the website is the URL of the poisoning level evaluation and how many of the key values included in the list are included in the poisoning level evaluation target key values And the evaluation score is automatically calculated.

The step of transmitting to the caregiver computer transmits the URL of the website to the guardian computer together with the classified level and the treatment method.

The method for measuring the level of internet addiction of a user is characterized in that the application detects a deletion event of the application and transmits a detection result to the internet addiction diagnosis server, Requesting the internet addiction diagnostic server to transmit the detection result to the guardian computer; and requesting, by the application, to reject the deletion event until the authentication of the authentication number is completed .

According to embodiments, a method for measuring the level of Internet addiction of a user may include sending an access blocking command transmitted from the guardian computer to the internet addiction diagnostic server after transmitting the list and the URL of the web site to the Internet addiction diagnostic server, Receiving via an internet addiction diagnostic server; and immediately disconnecting the web browser from the web site based on the application blocking command.

According to embodiments, a method for measuring the level of internet addiction of a user may include: after transmitting the list and the URL of the website to the Internet addiction diagnostic server, Receiving at least one of the number of key input second reference times through the Internet addiction diagnostic server; and receiving, by the application, resetting the first reference time to the second reference time, And resetting the key input number to the second reference number.

An application according to an embodiment of the present invention may generate a log file of key values for specific keyboards pressed by a user for a certain period of time among keyboards included in the keyboard and transmit the generated log file to the internet addiction diagnosis server There is an effect.

The method for measuring a user's level of Internet addiction according to an embodiment of the present invention automatically measures the level of Internet addiction of the user using the log file provided from the application instead of manually measuring the level of the addiction, And the corresponding treatment method can be automatically provided to the guardian computer in real time.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In order to more fully understand the drawings recited in the detailed description of the present invention, a detailed description of each drawing is provided.
1 shows an Internet addiction diagnostic system according to an embodiment of the present invention.
2 is a flowchart illustrating an operation method of the Internet addiction diagnostic system shown in FIG.
3 is a flowchart illustrating an operation of a first application executed in the user computer shown in FIG.
FIG. 4A illustrates an example of a log file for key values accumulated during a reference time, and FIG. 4B illustrates an example of a list including key values selected from the key values included in the log file.
FIG. 5 conceptually shows URLs of poisoning level evaluation managed by the Internet poisoning diagnosis server of FIG. 1; FIG.
FIG. 6 conceptually shows evaluation target key values for each URL of the poisoning level evaluation target managed by the Internet poisoning diagnosis server of FIG. 1; FIG.
FIG. 7 conceptually illustrates a score table used by the Internet addiction diagnostic server of FIG. 1; FIG.
8 conceptually illustrates poisoning levels and treatment methods calculated by the Internet addiction diagnostic server of FIG.
FIG. 9 is a conceptual diagram illustrating a process in which a deletion event of a first application executed in the user computer shown in FIG. 1 is processed.
FIG. 10 is a conceptual diagram illustrating a process in which a first application executed in the user computer shown in FIG. 1 transmits a message to a user using a character.

It is to be understood that the specific structural or functional description of embodiments of the present invention disclosed herein is for illustrative purposes only and is not intended to limit the scope of the inventive concept But may be embodied in many different forms and is not limited to the embodiments set forth herein.

The embodiments according to the concept of the present invention can make various changes and can take various forms, so that the embodiments are illustrated in the drawings and described in detail herein. It should be understood, however, that it is not intended to limit the embodiments according to the concepts of the present invention to the particular forms disclosed, but includes all modifications, equivalents, or alternatives falling within the spirit and scope of the invention.

The terms first, second, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms may be named for the purpose of distinguishing one element from another, for example, without departing from the scope of the right according to the concept of the present invention, the first element may be referred to as a second element, The component may also be referred to as a first component.

It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between. Other expressions that describe the relationship between components, such as "between" and "between" or "neighboring to" and "directly adjacent to" should be interpreted as well.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In this specification, the terms "comprises" or "having" and the like are used to specify that there are features, numbers, steps, operations, elements, parts or combinations thereof described herein, But do not preclude the presence or addition of one or more other features, integers, steps, operations, components, parts, or combinations thereof.

Unless otherwise defined, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries are to be interpreted as having a meaning consistent with the meaning of the context in the relevant art and, unless explicitly defined herein, are to be interpreted as ideal or overly formal Do not.

Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings attached hereto.

1 shows an Internet addiction diagnostic system according to an embodiment of the present invention. Referring to FIG. 1, an Internet addiction diagnostic system (or an Internet addiction level diagnostic system) 100 includes a user computer 200, an Internet addiction diagnostic server (or an Internet addiction level diagnostic server) 300, a database 330, (400).

In the present specification, the Internet addiction should be understood not only as the Internet addiction but also as a concept including smartphone addiction. Each computer 200 and 400 may include a computing device that may be connected to a wired Internet or wireless Internet, such as a desktop computer, a laptop computer, a smart phone, a mobile internet device (MID), or a tablet PC .

Each computer 200 and 400 may include a processor, a memory device, and a communication module. The processor may execute an operating system (OS), a web browser, and applications 223 and 411 described herein. Here, the application is an abbreviation of an application program, which means a program designed to directly perform a specific function to a user or another application program.

Accordingly, the application communicates commands or signals with other devices or other applications by allowing a computing device in which the application is installed to communicate with a computing device that is executing the other device or the other application under the control of the application with a wired communication network or a wireless communication network Lt; RTI ID = 0.0 > and / or < / RTI >

The user computer 200 may include a processor 220 and a communication module 230. The processor 220 may execute the web browser 221 and the first application 223. Processor 220 may refer to a CPU or an application processor.

The user of the user computer 200 can execute the web browser 221 installed in the user computer 200 to connect to the Internet (e.g., wired Internet or wireless Internet). The first application 223 according to the embodiments of the present invention can be automatically executed when the web browser 221 is executed. That is, the first application 223 monitors the execution of the web browser 221 and can be automatically executed without the user of the user computer 200 when the web browser 221 is executed.

The user of the user computer 200 can not delete or deactivate (for example, disable) the first application 223 installed by the user of the guardian computer 400, that is, the guardian of the user. That is, the consent of the guardian is essential for deleting (or deactivating) the first application 223 installed in the user computer 200. Also, the user of the user computer 200 can not forcibly deactivate the first application 223. That is, the consent of the guardian is essential for the deletion and / or deactivation of the first application 223. Here, the agreement may mean input of the authentication number described with reference to FIG.

The user computer 200 may further include a keyboard 210 and a display device 215. The user computer 200 may be connected to each of the websites 350 and 360 via the first network 110 and may be connected to the Internet addiction diagnostic server 300 and the signals You can send and receive.

The Internet addiction diagnostic server 300 may include an Internet addiction level measurement module 310 and a communications module 320. The Internet addiction level measurement module 310 may store data in the database 330, And analyze the read data. The Internet addiction diagnosis server 300 can exchange signals with the user computer 200 through the first network 110 and can receive or receive signals with the guardian computer 400 through the second network 120. [

Each of the networks 110 and 120 may be a wireless local area network (WLAN) such as the Internet, wireless fidelity (Wi-Fi), a wireless personal area network (WPAN) such as bluetooth, , Wireless universal serial bus (USB), Zigbee, near field communication (NFC), radio frequency identification (RFID), or mobile cellular network.

The protector computer 400 may include a processor 410 and a communication module 420. The processor 410 may execute the second application 411 described herein. The guardian computer 400 may further include a display device 430 and a keyboard 440.

FIG. 2 is a flowchart illustrating an operation method of the Internet addiction diagnostic system shown in FIG. 1. FIG. 3 is a flowchart illustrating an operation of a first application executed in the user computer shown in FIG.

1 and 2, while the user connects to the first Web site 350 using the Web browser 221 installed in the user computer 200 (S110) The first application 223 may accumulate (or record) the connection time between the web browser 221 and the first web site 350 (S112).

For example, each time the user is connected to the first web site 350 using the web browser 221, the first application 223 is automatically activated as soon as the web browser 221 is connected to the first web site 350 The connection time is counted, and the counted connection time can be accumulated in seconds (S112). The first website 350 can be identified by a first URL (uniform resource locator), and the second website 360 can be identified by a second URL (URL2).

A uniform resource locator (URL) is a convention for indicating where resources are located on a network. The URL may represent both a web site address as well as resources on a computer network. In order to access the website, it is necessary to know the protocol corresponding to the URL corresponding to the website, and to access the same protocol. In case of FTP (File Transfer Protocol), an FTP client should be used. In case of HTTP (HyperText Transfer Protocol), a web browser should be used.

The first application 223 executed in the processor 220 stores all the key values input from the keyboard 210 connected to the user computer 200 in real time until the accumulated connection time reaches a preset first reference time (S114), and a log file for all the received key values may be generated (S116).

The keyboard 210 or 440 herein collectively refers to an input device capable of inputting data (or information) to the computer 200 or 400. The input device 210 or 440 may be a keyboard, a keypad, a touchpad, / RTI > and / or a computer mouse. In this specification, a key value is a signal generated when a keyboard included in the keyboard 210 is pressed (or touched), or signals generated when two or more keyboards included in the keyboard 210 are pressed Or a combination of the signals).

The first application 223 may be stored in the memory device included in the user computer 200, for example, the generated log file (e.g., T100 in Fig. 4).

4 (a) is an example of a log file for key values accumulated during a reference time, and FIG. 4 (b) is an example of a list including key values selected from the key values included in the log file . Here, as exemplarily shown in Fig. 4A, it is assumed that the preset first reference time is "20 minutes ". However, the first reference time may be changed by the user of the guardian computer 400, that is, the guardian.

As shown in FIG. 4A, the log file T100 may include a cumulative number of times of input of each key value input during a predetermined first reference time (for example, 20 minutes). Although the log file T100 including the cumulative number of times of input to each of the nine key values K1 to K9 is shown in FIG. 4A, the log file T100 is set in advance And a cumulative number of times of input for each of the key values input during the first reference time.

When the cumulative connection time reaches the predetermined first reference time, the first application 223 sets a predetermined number of key input first reference times among the key values (K1 to K9) recorded in the log file (T100) And generate a list T200 for the exceeding key values. Here, it is assumed that the preset number of key input first reference times is 100 times.

That is, the first application 223 can determine (or determine) the generation time of the list T200 and the transmission timing to be transmitted to the Internet addiction diagnosis server 300 (S118). The first application 223 can determine the generation time (or generation timing) of the list T200 according to whether the accumulated connection time has reached the preset first reference time (S118).

For example, when the cumulative connection time reaches the preset first reference time, the first application 223 may transmit the key input first reference key (K1) K3, K4, K6, and K7 exceeding the number of times (for example, 100 times) and extracts a list T200 including the extracted key values K1, K3, K4, K6, and K7 (S120).

As shown in FIG. 4 (b), the first application 223 retrieves specific key values K1, K3, K4, K6, and K7 from the log file T100 stored in the memory device, K1, K3, K4, K6, and K7, respectively, and generate a list T200 including them (S120).

The first application 223 transmits the first URL (URL1) of the list T200 and the first website 350 to the internet addiction diagnosis server 300 through the communication module 230 and the first network 110 (S122).

The communication module 320 of the Internet addiction diagnosis server 300 transmits the list T200 and the first URL (URL1) of the first website 350 to the internet addiction level measurement module 310. [

The first application 223 initializes the log file T100 after the list T200 and the first URL of the first website 350 are transmitted to the Internet addiction diagnostic server 300 can do.

The first application 223 sends the ID and password input when the user of the user computer 200 connects to the first web site 350 using the web browser 221 in the log file T100, As shown in FIG. The first application 223 may transmit the log file T100 including the ID and the password and the first URL (URL1) of the first web site 350 to the internet addiction diagnosis server 300. [ At this time, the internet addiction diagnosis server 300 can transmit the log file T100 including the ID and the password and the first URL (URL1) of the first web site 350 to the guardian computer 400. [ Accordingly, the guardian can confirm the ID, the password, and the first URL (URL1) using the second application 411. [ This process may be performed together with step S130.

The first application 223 sends the ID and password input when the user of the user computer 200 connects to the first web site 350 using the web browser 221 in the log file T100, As shown in FIG. The first application 223 may transmit the list T200 including the ID and the password and the first URL (URL1) of the first web site 350 to the internet addiction diagnosis server 300. [ At this time, the internet addiction diagnosis server 300 can transmit the list T200 including the ID and the password and the first URL (URL1) of the first web site 350 to the guardian computer 400. [ Accordingly, the guardian can confirm the ID, the password, and the first URL (URL1) using the second application 411. [ This process may be performed together with step S130.

The Internet addiction level measurement module 310 receives the first URL (URL1) of the list T200 and the first website 350 and stores them (T200 and URL1) in the database 330 (S124).

The internet addiction level measurement module 310 analyzes the list T200 received or stored in the database 330 and the first URL (URL1) of the first website 350 and automatically calculates the evaluation score according to the analysis result (S126).

FIG. 5 conceptually shows URLs of poisoning level evaluation managed by the Internet poisoning diagnosis server of FIG. 1; FIG.

Referring to FIG. 5, the Internet addiction level measurement module 310 may store the URLs of the addiction level evaluation input from the operator of the Internet addiction diagnostic server 300 in the database 330. According to the embodiments, the internet poisoning level measurement module 310 receives the poisoning level evaluation target URLs periodically provided from the Cyber Security Agency of the National Police Agency or the cyber police station through the communication module 320 and transmits the poisoning level evaluation target URLs to the database 330).

5, the category of the "online game site" includes a plurality of online game site URLs (GURL1 to GURLa), the category of "pornographic site" includes a plurality of pornographic site URLs (SURL1 to SURLb) , The category "online gambling site" includes a plurality of online gambling site URLs (OGURL1 to OGURLc), and the category "chat site" includes a plurality of chat site URLs (CURL1 to CURLd) do. Here, a, b, c, and d are natural numbers of 3 or more, and a, b, c, and d may be the same or different from each other.

FIG. 6 conceptually shows evaluation target key values for each URL to be evaluated for poisoning level, which is managed by the Internet addiction diagnosis server of FIG. For example, when the poisoning level evaluation target URL is GURL1, it is assumed that the poisoning level evaluation target key values are K1, K3, K4, K6, and K7. When the poisoning level evaluation target URL is OGURL1, K3, K5, and K7. It is assumed that the database 330 includes a table (T300) for the evaluation target key values for each URL subjected to the poisoning level evaluation.

The internet addiction level measurement module 310 determines whether the first URL (URL1) of the first website 350 is the same as the poisoning level evaluation target URL and the key values K1, K3, K4, K6 , And K7) are included in the poisoning level evaluation target key values, the evaluation score can be automatically calculated.

For example, assuming that the first URL (URL1) of the first Web site 350 is GURL1, the Internet addiction level measurement module 310 determines that the first URL (URL1) matches the poisoning level evaluation object GURL1, Five of the included key values K1, K3, K4, K6, and K7 are included in the poisoning level evaluation subject key values K1, K3, K4, K6, and K7.

FIG. 7 conceptually illustrates a score table used by the Internet addiction diagnostic server of FIG. 1; FIG. 1 to 7, since the cumulative input count of the key value K1 included in the list T200 is 103, the internet addiction level measurement module 310 calculates the internet addiction level using the table T400 included in the database 330 "1" is calculated according to the cumulative count of the included key value K1.

The internet addiction level measurement module 310 calculates the cumulative number of key values K3 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K3 included in the list T200 is 150, "1"

The internet addiction level measurement module 310 calculates the cumulative number of key values K4 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K4 included in the list T200 is 162, "2"

The Internet addiction level measurement module 310 calculates the cumulative number of key values K6 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K6 included in the list T200 is 230, "3"

The internet addiction level measurement module 310 calculates the cumulative number of key values K7 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K7 included in the list T200 is 200, "2"

The internet addiction level measurement module 310 may automatically calculate a total of "9" for the key values K1, K3, K4, K6, and K7 included in the list T200 (S126).

8 conceptually illustrates poisoning levels and treatment methods calculated by the Internet addiction diagnostic server of FIG. The Internet addiction level measurement module 310 refers to the table T500 stored in the database 330 to classify the user's Internet addiction level as a "high risk user group &Quot; treatment method "corresponding to " treatment method ".

The Internet addiction level measurement module 310 classifies (or evaluates) the user's Internet addiction level as the "high risk user group" among the three addiction levels based on the calculated rating score (e.g., 9) To the guardian computer 400 through the communication module 230 and the second network 120 (S130). The " high-risk user group "

Although a table (T500) including three user groups and three treatment methods is illustrated in FIG. 8, the user groups according to the evaluation score can be further subdivided into four or more, and the four or more The treatment methods for each of the user groups may be further subdivided. The table T500 shown in FIG. 8 illustrates the user groups to which the user belongs according to the evaluation score of the user, and the treatment method may also be more specific.

In accordance with embodiments, the internet addiction level measurement module 310 sends the first URL (URL1) of the first web site 350 to the guardian computer 400 along with the classified level (e.g., " Lt; / RTI > Therefore, the guardian can confirm whether the user of the user computer 200 is connected to the first web site 350 by using the first URL (URL1). That is, the protector can connect to the first web site 350 corresponding to the first URL (URL1) using the protector computer 400 and check what service the first web site 350 provides.

As another example, assuming that the first URL (URL1) of the first Web site 350 is OGURL1, the Internet addiction level measurement module 310 determines that the first URL (URL1) matches the poisoning level evaluation object OGURL1, Three of the key values K1, K3, K4, K6, and K7 included in the poisoning level evaluation target key values K1, K3, and K7 are included in the poisoning level evaluation target key values K1, K3, and K7.

The internet addiction level measurement module 310 calculates the cumulative number of key values K1 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K1 included in the list T200 is 103, "1"

The internet addiction level measurement module 310 calculates the cumulative number of key values K3 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K3 included in the list T200 is 150, "1"

The internet addiction level measurement module 310 calculates the cumulative number of key values K7 included in the table T400 included in the database 330 because the cumulative number of times of inputting the key value K7 included in the list T200 is 200, "2"

The internet addiction level measurement module 310 may automatically calculate a total of "4" for the key values K1, K3, K4, K6, and K7 contained in the list T200.

The Internet addiction level measurement module 310 refers to the table T500 stored in the database 330 to classify the user's Internet addiction level into a "general user group ", and classifies the classified level (e.g., Quot; treatment method "corresponding to " treatment method ".

The Internet addiction level measurement module 310 classifies (or evaluates) the user's Internet addiction level into three groups of "general user groups" based on the calculated rating score (e.g., 4) To the guardian computer 400 through the communication module 230 and the second network 120 in step S130.

In accordance with embodiments, the internet addiction level measurement module 310 sends the first URL (URL1) of the first web site 350 to the parent computer 400, along with the classified level (e.g., " Lt; / RTI >

1 to 8 illustrate that the Internet addiction level measuring module 310 evaluates a user's Internet addiction level using a log file for specific key values for a specific web site, The Internet addiction level measurement module 310 according to the technical idea can evaluate the level of the user's internet addiction level by using a log file for specific key values for a specific time for each of a plurality of web sites.

For example, the internet poisoning level measurement module 310 may determine specific key values (e.g., K1, K3) among all key values input through the keyboard 210 for a specific time (e.g., 20 minutes) (E.g., 20 minutes) for the first URL (G1L1) of the first web site 350 and the second web site 360, and the log file for the keyboard (K1, K2, K4, K6, and K7) (URL2 = OGURL1) of the second website 360 and log files for specific key values (e.g., K1, K2, K3, K5, and K7) The score can be calculated automatically.

For example, the Internet addiction diagnostic server 300 determines how many of the URLs connected by the user using the user computer 200 coincide with the poisoning level evaluation target URLs and how many of the key values included in the lists are poisoning level The evaluation score of the user can be automatically calculated based on whether or not the evaluation score is included in the evaluation-target key values.

A second application (APP2) executed in the processor 410 of the guardian computer 400 receives the level of poisoning and the method of treatment assessed by the internet poisoning level measurement module 310 via the communication module 420, And display the evaluated level of poisoning and the treatment method on the display device 430 of the display device 400. [ Accordingly, the guardian can confirm the level of the user's poisoning and the treatment method for the user, and can perform necessary actions.

The second application APP2 may receive the usage restriction information input from the guardian through the keyboard 440 (S132). According to embodiments, the usage restriction information may be an access blocking command.

The second application APP2 may transmit the connection blocking command to the communication module 320 of the Internet addiction diagnosis server 300 through the communication module 420 and the second network 120 in operation S134. The internet addiction level measurement module 310 may store the connection blocking command received through the communication module 320 in the database 330. [ The access blocking command may include a first URL (URL1) of the first web site 350. [

The internet addiction level measurement module 310 may transmit the connection blocking command to the communication module 420 of the user computer 200 through the first network 110 through the communication module 320 at step S136. The first application 223 may store the disconnect command received via the communication module 420 in the memory device of the user computer 200. [

The first application 223 can control the operation of the web browser 221 in response to the connection blocking command (S138). For example, the web browser 221 can immediately disconnect from the first web site 350 under the control of the first application 223.

The first application 223 transmits the first URL (URL1) of the list T200 and the first website 350 to the Internet addiction diagnosis server 300 and then the first application 223 transmits the first URL Via the Internet addiction diagnostic server 300 (S132, S134, and S136).

The first application 223 may immediately block the connection between the web browser 221 and the first web site 350 in response to the connection blocking command.

In another embodiment, the second application APP2 may receive usage restriction information input from the guardian via the keyboard 440 (S132). According to embodiments, the use restriction information may be at least one of a second reference time and a second key-entry count.

The second application APP2 transmits at least one of the second reference time and the second key reference number to the communication module 420 of the Internet addiction diagnosis server 300 through the communication module 420 and the second network 120 320 (S134). The internet addiction level measurement module 310 may store at least one of the second reference time and the key input second reference count received through the communication module 320 in the database 330. [

The internet addiction level measurement module 310 may communicate at least one of the second reference time and the key input second reference frequency with the communication of the user computer 200 through the first network 110 through the communication module 320, Module 420 (S136). The first application 223 may store the at least one of the second reference time and the key input second reference time received via the communication module 420 in the memory device of the user computer 200. [

The first application 223 transmits the first URL (URL1) of the list T200 and the first web site 350 to the internet addiction diagnosis server 300 and then the first application 223 transmits the first URL At least one of a second reference time (e.g., 15 minutes) transmitted from the Internet add-on diagnostic server 300 and a second key-input reference number (e.g., 90 times) ).

The first application 223 may reset the first reference time (e.g., 20 minutes in FIG. 4) to the second reference time (e.g., 15 minutes) (E.g., 90 times) of the key input second reference number of times.

FIG. 9 is a conceptual diagram illustrating a process in which a deletion event of a first application executed in the user computer shown in FIG. 1 is processed. Referring to Figures 1 to 9, a user of the user computer 200 may attempt to delete the first application 223.

At this time, the first application 223 detects a deletion event of the first application 223 (or includes an event forcibly disabling the first application 223) (S210), and transmits the detection result to the Internet add- (S215 and S220) to the user through the display device 215, while inputting the authentication number for deletion to the user. The delete event may refer to a signal generated according to a user's input for deletion of the first application 223. For example, the first application 223 or the OS may generate a delete event.

The internet addiction diagnosis server 300 may transmit the detection result to the guardian computer 400 (S225). The second application 411 executed in the guardian computer 400 may display a message corresponding to the detection result on the display device 430 in step S230.

The first application 223 is able to perform the authentication process until the authentication for the authentication number is completed (for example, until the authentication number is input and the authentication number stored in advance in the memory device of the user computer 200 matches) A message rejecting the execution of the deletion event may be displayed to the user through the display device 215 (S235).

The first application 223 may receive the authentication number input by the guardian when the first application 223 is installed in the user computer 200 and may store the authentication number in the memory device of the user computer 200. [ The authentication number may include a password or biometric information. The biometric information may be fingerprint information, iris information, or voice information, but is not limited thereto. In other words, the authentication number may mean information that the guardian has input to the first application 223.

FIG. 10 is a conceptual diagram illustrating a process in which a first application executed in the user computer shown in FIG. 1 transmits a message to a user using a character.

The second application 411 may be connected to the Internet addiction diagnostic server 300 through the second network 120 (S310). The user of the protector computer 400, that is, the protector, selects one of the characters displayed on the display device 430 by using the keyboard 440 under the control of the second application 411, A message to be delivered to the user of the user computer 200 may be input through the keyboard 440 (S315). The selected character may be an image of a cartoon character, a movie character, or a character doll that the user of the user computer 200 likes, but the present invention is not limited thereto.

The second application 411 may transmit the character information for the selected character and the message to the communication module 320 of the Internet addiction diagnosis server 300 through the communication module 420 and the second network 120 ). The Internet addiction level measurement module 310 may store the character information and the message output from the communication module 320 in the database 330.

The Internet addiction level measuring module 310 may transmit the character information and the message to the communication module 230 through the communication module 320 and the first network 110 at step S330.

The first application 223 determines whether the accumulated connection time is before a predetermined time (for example, three minutes before) to reach the preset first reference time (S335). When the accumulated connection time is before the predetermined first reference time (for example, three minutes before), the first application 223 transmits a message (for example, " The connection with the site 350 is blocked ") to the user of the user computer 200 (S340).

While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, the true scope of the present invention should be determined by the technical idea of the appended claims.

100: Internet addiction diagnosis system
110: first network
120: Second network
200: user computer
210: keyboard
215: Display device
220: Processor
221: Web Browser
223: First application
230: Communication module
300: Internet addiction diagnostic server
310: Internet addiction level specific module
320: Communication module
400: Protector computer
410: Processor
411: Second application
420: communication module

Claims (13)

An application installed on the user's computer is automatically executed when a user connects to a web site using a web browser installed on the user's computer, and the executed application accumulates connection time between the web browser and the web site;
The application generates a log file for all key values input from the keyboard connected to the user's computer while the web browser is connected to the website until the accumulated connection time reaches a preset first reference time step;
When the accumulated connection time reaches the predetermined first reference time, the application generates a list of key values exceeding a predetermined number of key input first reference times among the key values recorded in the log file step; And
The application sending the list and a uniform resource locator (URL) of the website to an internet addiction diagnostic server.
The method according to claim 1,
The application requesting an authentication number in response to a deletion event; And
Further comprising refusing execution of the delete event until the application completes authentication of the authentication number.
The method according to claim 1,
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
The application receiving an access blocking command from the Internet addiction diagnostic server; And
The application immediately blocking the connection between the web browser and the web site in response to the disconnect command.
The method according to claim 1,
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
Receiving at least one of a second reference time and a second key-entry count from the Internet addiction diagnostic server; And
Further comprising the step of the application performing at least one of resetting the first reference time to the second reference time and resetting the key input first reference number to the key input second reference number How the application works.
The method according to claim 1,
Further comprising: after the list and the URL of the web site are transmitted to the Internet addiction diagnostic server, the application initializing the log file.
The method according to claim 1,
The application recording an ID and a password entered when the user connects to the web site using the web browser in the log file; And
Further comprising the step of the application transmitting the list including the ID and the password and the URL of the website to the internet addiction diagnostic server.
The method according to claim 1,
Receiving, by the application, a character set by the guardian of the user and a message to be delivered to the user through the character; And
Further comprising the step of causing the application to deliver the message to the user using the character before the accumulated connection time reaches a predetermined first reference time.
A method for measuring a user's Internet addiction level using an Internet addiction diagnostic server capable of communicating with a user computer and a guardian computer,
An application installed in the user computer is automatically executed when a user connects to a web site using a web browser installed in the user computer, and the executed application accumulates connection time between the web browser and the web site;
Generating a log file for all key values input from a keyboard connected to the user's computer while the web browser is connected to the web site until the application reaches a preset first reference time, ;
When the accumulated connection time reaches the predetermined first reference time, the application generates a list of key values exceeding a predetermined number of key input first reference times among the key values recorded in the log file step;
The application transmitting the list and the uniform resource locator (URL) of the website to the internet addiction diagnostic server;
The internet addiction diagnosis server receiving the list and the URL of the website and storing the list in a database;
Analyzing the list and the URL of the website, and automatically calculating an evaluation score according to an analysis result;
Classifying the internet poisoning level of the user into one of the poisoning levels based on the calculated evaluation score; And
And the Internet addiction diagnostic server sending the classified level and the treatment method to the guardian computer.
9. The method of claim 8, wherein automatically calculating the evaluation score comprises:
The Internet addiction diagnosis server determines whether the URL of the website is a poisoning level evaluation target URL and how many of the key values included in the list are included in the poisoning level evaluation target key values, Of Internet addiction levels.
9. The method of claim 8, wherein the transmitting the classified level and the treatment method to a guardian computer comprises:
Wherein the Internet addiction diagnostic server measures a level of internet addiction of a user transmitting the URL of the website to the guardian computer together with the classified level and the treatment method.
9. The method of claim 8,
The application detects a deletion event of the application, transmits a detection result to the Internet addiction diagnosis server, and requests input of an authentication number for deletion through a display device connected to the user computer;
The Internet addiction diagnostic server transmitting the detection result to the guardian computer; And
Further comprising refusing the application to perform the deletion event until authentication of the authentication number is completed.
9. The method of claim 8,
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
Receiving, by the application, an access blocking command transmitted from the guardian computer through the Internet addiction diagnostic server; And
Wherein the application immediately blocks the connection between the web browser and the web site based on the blocking access command.
9. The method of claim 8,
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
Receiving, by the application, at least one of a second reference time and a key input second reference count transmitted from the guardian computer through the Internet addiction diagnostic server; And
Further comprising the step of the application performing at least one of resetting the first reference time to the second reference time and resetting the key input first reference number to the key input second reference number A method of measuring a user's internet addiction level.
KR1020150189696A 2015-12-30 2015-12-30 Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same KR101765760B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150189696A KR101765760B1 (en) 2015-12-30 2015-12-30 Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150189696A KR101765760B1 (en) 2015-12-30 2015-12-30 Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same

Related Child Applications (1)

Application Number Title Priority Date Filing Date
KR1020170096926A Division KR101849290B1 (en) 2017-07-31 2017-07-31 Application for generating log file for key values of input device, and method for measuring level of internet addiction for user using same

Publications (2)

Publication Number Publication Date
KR20170079291A KR20170079291A (en) 2017-07-10
KR101765760B1 true KR101765760B1 (en) 2017-08-07

Family

ID=59355749

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150189696A KR101765760B1 (en) 2015-12-30 2015-12-30 Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same

Country Status (1)

Country Link
KR (1) KR101765760B1 (en)

Also Published As

Publication number Publication date
KR20170079291A (en) 2017-07-10

Similar Documents

Publication Publication Date Title
Chatterjee et al. The spyware used in intimate partner violence
Razaghpanah et al. Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem
CN110413908B (en) Method and device for classifying uniform resource locators based on website content
US10360230B2 (en) Method and device for social platform-based data mining
KR101767454B1 (en) Method and apparatus of fraud detection for analyzing behavior pattern
US20160241589A1 (en) Method and apparatus for identifying malicious website
CN103843007A (en) Assessing social risk due to exposure from linked contacts
CN107992738B (en) Account login abnormity detection method and device and electronic equipment
US20190149540A1 (en) Service provision system, service provision method, verification device, verification method, and computer program
CN107360122B (en) Method and device for preventing malicious request
US9860328B2 (en) Associating web page requests in a web access system
CN110516173B (en) Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium
KR102029045B1 (en) Digial detox program for restricting usage of mobile terminal and calculating harmfulness score of application installed in mobile terminal, and digital detox service providing method
CN102891861A (en) Client-based phishing website detecting method and device
CN105591999A (en) Verification method and device
KR101957630B1 (en) Method for measuring level of internet addiction for user
EP4033717A1 (en) Distinguishing network connection requests
KR20130065322A (en) Sns trap collection system and url collection method by the same
KR101657667B1 (en) Malicious app categorization apparatus and malicious app categorization method
US10078750B1 (en) Methods and systems for finding compromised social networking accounts
KR101849290B1 (en) Application for generating log file for key values of input device, and method for measuring level of internet addiction for user using same
KR101765760B1 (en) Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same
Libert et al. Preserving Needles in the Haystack: A search engine and multi-jurisdictional forensic documentation system for privacy violations on the web
CN105306419B (en) Page information interaction method, device and system
Singh et al. An analytical model for identifying suspected users on Twitter

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E701 Decision to grant or registration of patent right
GRNT Written decision to grant