KR101765760B1 - Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same - Google Patents
Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same Download PDFInfo
- Publication number
- KR101765760B1 KR101765760B1 KR1020150189696A KR20150189696A KR101765760B1 KR 101765760 B1 KR101765760 B1 KR 101765760B1 KR 1020150189696 A KR1020150189696 A KR 1020150189696A KR 20150189696 A KR20150189696 A KR 20150189696A KR 101765760 B1 KR101765760 B1 KR 101765760B1
- Authority
- KR
- South Korea
- Prior art keywords
- application
- user
- internet addiction
- url
- list
- Prior art date
Links
- 206010012335 Dependence Diseases 0.000 title claims abstract description 150
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000011156 evaluation Methods 0.000 claims description 37
- 231100000572 poisoning Toxicity 0.000 claims description 36
- 230000000607 poisoning effect Effects 0.000 claims description 36
- 238000003745 diagnosis Methods 0.000 claims description 30
- 238000012217 deletion Methods 0.000 claims description 15
- 230000037430 deletion Effects 0.000 claims description 15
- 230000000903 blocking effect Effects 0.000 claims description 14
- 238000001514 detection method Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 6
- 238000005259 measurement Methods 0.000 description 35
- 238000004891 communication Methods 0.000 description 33
- 208000005374 Poisoning Diseases 0.000 description 32
- 230000001186 cumulative effect Effects 0.000 description 21
- 230000008569 process Effects 0.000 description 7
- 230000001012 protector Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000014509 gene expression Effects 0.000 description 3
- 206010000117 Abnormal behaviour Diseases 0.000 description 2
- 208000001613 Gambling Diseases 0.000 description 2
- 230000003340 mental effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 101100281923 Oryza sativa subsp. japonica G1L1 gene Proteins 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000007654 immersion Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Debugging And Monitoring (AREA)
Abstract
An operation method of an application includes the steps of: an application executed on the user computer accumulating a connection time of the web browser and the website while the user is connecting to the web site using a web browser installed on the user computer; Generating a log file for all key values input from a keyboard connected to the user computer until the accumulated connection time reaches a predetermined first reference time, When the reference time is reached, the application generating a list of key values exceeding a preset key input first reference count among the key values recorded in the log file; Send the URL of the site to the Internet Addiction Diagnostic Server .
Description
An embodiment according to the inventive concept relates to an application which can be used for measuring the level of internet addiction and in particular to an application capable of generating a log file of key values for certain keyboards among the keyboards contained in the keyboard, And a method for measuring a level of internet addiction by a user using the log file.
Internet addiction is a state in which autonomous control of computer and internet use such as game addiction, pornography addiction, information search addiction, internet shopping addiction, and smart phone addiction is impossible, This means experiencing physical abnormal behavior and mental abnormal behavior enough to interfere with real life in life.
Game addiction is an excessive immersion in the Internet game, which means that it is constantly receiving unfair influence on school, family, and interpersonal relationships. Game addiction is more common in males than in females, and is more common among adolescents and children than adults.
Obscenity addiction is an example of a sexually suggestive behavior in which you see pornographic photos, comics, videos, or novels over the Internet, or overexertion through obscene chat or part of your body through video chat.
Especially, the internet addiction phenomenon of young people reached serious level. These Internet addicts cause serious mental harm and material damage to both myself and the people around me. From a guardian's perspective, it is required that minor children should be able to easily determine whether they are addicted to the Internet (especially online game addiction, pornography addiction, or smartphone addiction) and provide appropriate treatment according to their judgment.
An object of the present invention is to provide an application capable of generating a log file of key values for specific keyboards among keyboards included in a keyboard and an application for manually measuring the internet addiction level of a user using the log file And provides a method of automatically providing the treatment method corresponding to the measurement result to the guardian computer in real time in real time.
An operation method of an application according to an embodiment of the present invention is a method in which while an application is connected to a web site using a web browser installed on a user computer, Generating a log file for all key values input from a keyboard connected to the user computer until the accumulated connection time reaches a preset first reference time, When the time reaches a predetermined first reference time, the application generates a list of key values exceeding a predetermined number of key input first reference times among the key values recorded in the log file; If the application is in the above list and the URL of the website resource locator) to the Internet addiction diagnostic server.
According to embodiments, the method of operation of the application further comprises the steps of: the application requesting an input of an authentication number in response to a deletion event; and denying execution of the deletion event until the application completes authentication of the authentication number .
According to embodiments, an operation method of the application may include: receiving an access blocking command from the Internet addiction diagnostic server after transmitting the list and the URL of the website to the Internet addiction diagnostic server; The application immediately interrupts the connection of the web browser with the web site in response to the disconnect command.
According to embodiments, an operation method of the application may include: after transmitting the list and the URL of the web site to the internet addiction diagnosis server, the application receives a second reference time and a key input second reference The method comprising: receiving at least one of a first reference time, a second reference time, and a number of times; And performing at least one.
According to embodiments, the method of operation of the application further comprises initializing the log file after the list and the URL of the website are transmitted to the Internet addiction diagnostic server.
According to embodiments, a method of operating an application includes the steps of: the application recording an ID and a password entered when the user connects to the web site using the web browser, in the log file; And transmitting the list including the password and the URL of the website to the Internet addiction diagnostic server.
According to embodiments, an operation method of the application may include: receiving, by the application, a message set by a guardian of the user and a message to be transmitted to the user through the character; Before the predetermined time to reach one reference time, the application transmits the message to the user using the character.
According to an embodiment of the present invention, a method for measuring a level of a user's Internet addiction level using an Internet addiction diagnostic server capable of communicating with a user computer and a guardian computer includes: The method comprising the steps of: accumulating a connection time between the web browser and the web site, the application being executed on the user computer while the connection is being established; Generating a log file for all the key values input from the keyboard connected to the log file, and when the accumulated connection time reaches the predetermined first reference time, If the number of times of the first key input The method comprising the steps of: the application generating a list of URLs (uniform resource locators) of the list and the web site to an internet addiction diagnostic server; Receiving the URL and storing the URL in a database; analyzing the list and the URL of the website and automatically calculating an evaluation score according to the analysis result; and the Internet addiction diagnosis server calculates Classifying the level of the user's Internet addiction level into one of the levels of the addiction level based on the received score, and transmitting the classified level and the treatment method to the guardian computer .
The step of automatically calculating the evaluation score may include a step of determining whether the URL of the website is the URL of the poisoning level evaluation and how many of the key values included in the list are included in the poisoning level evaluation target key values And the evaluation score is automatically calculated.
The step of transmitting to the caregiver computer transmits the URL of the website to the guardian computer together with the classified level and the treatment method.
The method for measuring the level of internet addiction of a user is characterized in that the application detects a deletion event of the application and transmits a detection result to the internet addiction diagnosis server, Requesting the internet addiction diagnostic server to transmit the detection result to the guardian computer; and requesting, by the application, to reject the deletion event until the authentication of the authentication number is completed .
According to embodiments, a method for measuring the level of Internet addiction of a user may include sending an access blocking command transmitted from the guardian computer to the internet addiction diagnostic server after transmitting the list and the URL of the web site to the Internet addiction diagnostic server, Receiving via an internet addiction diagnostic server; and immediately disconnecting the web browser from the web site based on the application blocking command.
According to embodiments, a method for measuring the level of internet addiction of a user may include: after transmitting the list and the URL of the website to the Internet addiction diagnostic server, Receiving at least one of the number of key input second reference times through the Internet addiction diagnostic server; and receiving, by the application, resetting the first reference time to the second reference time, And resetting the key input number to the second reference number.
An application according to an embodiment of the present invention may generate a log file of key values for specific keyboards pressed by a user for a certain period of time among keyboards included in the keyboard and transmit the generated log file to the internet addiction diagnosis server There is an effect.
The method for measuring a user's level of Internet addiction according to an embodiment of the present invention automatically measures the level of Internet addiction of the user using the log file provided from the application instead of manually measuring the level of the addiction, And the corresponding treatment method can be automatically provided to the guardian computer in real time.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In order to more fully understand the drawings recited in the detailed description of the present invention, a detailed description of each drawing is provided.
1 shows an Internet addiction diagnostic system according to an embodiment of the present invention.
2 is a flowchart illustrating an operation method of the Internet addiction diagnostic system shown in FIG.
3 is a flowchart illustrating an operation of a first application executed in the user computer shown in FIG.
FIG. 4A illustrates an example of a log file for key values accumulated during a reference time, and FIG. 4B illustrates an example of a list including key values selected from the key values included in the log file.
FIG. 5 conceptually shows URLs of poisoning level evaluation managed by the Internet poisoning diagnosis server of FIG. 1; FIG.
FIG. 6 conceptually shows evaluation target key values for each URL of the poisoning level evaluation target managed by the Internet poisoning diagnosis server of FIG. 1; FIG.
FIG. 7 conceptually illustrates a score table used by the Internet addiction diagnostic server of FIG. 1; FIG.
8 conceptually illustrates poisoning levels and treatment methods calculated by the Internet addiction diagnostic server of FIG.
FIG. 9 is a conceptual diagram illustrating a process in which a deletion event of a first application executed in the user computer shown in FIG. 1 is processed.
FIG. 10 is a conceptual diagram illustrating a process in which a first application executed in the user computer shown in FIG. 1 transmits a message to a user using a character.
It is to be understood that the specific structural or functional description of embodiments of the present invention disclosed herein is for illustrative purposes only and is not intended to limit the scope of the inventive concept But may be embodied in many different forms and is not limited to the embodiments set forth herein.
The embodiments according to the concept of the present invention can make various changes and can take various forms, so that the embodiments are illustrated in the drawings and described in detail herein. It should be understood, however, that it is not intended to limit the embodiments according to the concepts of the present invention to the particular forms disclosed, but includes all modifications, equivalents, or alternatives falling within the spirit and scope of the invention.
The terms first, second, etc. may be used to describe various elements, but the elements should not be limited by the terms. The terms may be named for the purpose of distinguishing one element from another, for example, without departing from the scope of the right according to the concept of the present invention, the first element may be referred to as a second element, The component may also be referred to as a first component.
It is to be understood that when an element is referred to as being "connected" or "connected" to another element, it may be directly connected or connected to the other element, . On the other hand, when an element is referred to as being "directly connected" or "directly connected" to another element, it should be understood that there are no other elements in between. Other expressions that describe the relationship between components, such as "between" and "between" or "neighboring to" and "directly adjacent to" should be interpreted as well.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. The singular expressions include plural expressions unless the context clearly dictates otherwise. In this specification, the terms "comprises" or "having" and the like are used to specify that there are features, numbers, steps, operations, elements, parts or combinations thereof described herein, But do not preclude the presence or addition of one or more other features, integers, steps, operations, components, parts, or combinations thereof.
Unless otherwise defined, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries are to be interpreted as having a meaning consistent with the meaning of the context in the relevant art and, unless explicitly defined herein, are to be interpreted as ideal or overly formal Do not.
Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings attached hereto.
1 shows an Internet addiction diagnostic system according to an embodiment of the present invention. Referring to FIG. 1, an Internet addiction diagnostic system (or an Internet addiction level diagnostic system) 100 includes a
In the present specification, the Internet addiction should be understood not only as the Internet addiction but also as a concept including smartphone addiction. Each
Each
Accordingly, the application communicates commands or signals with other devices or other applications by allowing a computing device in which the application is installed to communicate with a computing device that is executing the other device or the other application under the control of the application with a wired communication network or a wireless communication network Lt; RTI ID = 0.0 > and / or < / RTI >
The
The user of the
The user of the
The
The Internet addiction
Each of the
The
FIG. 2 is a flowchart illustrating an operation method of the Internet addiction diagnostic system shown in FIG. 1. FIG. 3 is a flowchart illustrating an operation of a first application executed in the user computer shown in FIG.
1 and 2, while the user connects to the
For example, each time the user is connected to the
A uniform resource locator (URL) is a convention for indicating where resources are located on a network. The URL may represent both a web site address as well as resources on a computer network. In order to access the website, it is necessary to know the protocol corresponding to the URL corresponding to the website, and to access the same protocol. In case of FTP (File Transfer Protocol), an FTP client should be used. In case of HTTP (HyperText Transfer Protocol), a web browser should be used.
The
The
The
4 (a) is an example of a log file for key values accumulated during a reference time, and FIG. 4 (b) is an example of a list including key values selected from the key values included in the log file . Here, as exemplarily shown in Fig. 4A, it is assumed that the preset first reference time is "20 minutes ". However, the first reference time may be changed by the user of the
As shown in FIG. 4A, the log file T100 may include a cumulative number of times of input of each key value input during a predetermined first reference time (for example, 20 minutes). Although the log file T100 including the cumulative number of times of input to each of the nine key values K1 to K9 is shown in FIG. 4A, the log file T100 is set in advance And a cumulative number of times of input for each of the key values input during the first reference time.
When the cumulative connection time reaches the predetermined first reference time, the
That is, the
For example, when the cumulative connection time reaches the preset first reference time, the
As shown in FIG. 4 (b), the
The
The
The
The
The
The Internet addiction
The internet addiction
FIG. 5 conceptually shows URLs of poisoning level evaluation managed by the Internet poisoning diagnosis server of FIG. 1; FIG.
Referring to FIG. 5, the Internet addiction
5, the category of the "online game site" includes a plurality of online game site URLs (GURL1 to GURLa), the category of "pornographic site" includes a plurality of pornographic site URLs (SURL1 to SURLb) , The category "online gambling site" includes a plurality of online gambling site URLs (OGURL1 to OGURLc), and the category "chat site" includes a plurality of chat site URLs (CURL1 to CURLd) do. Here, a, b, c, and d are natural numbers of 3 or more, and a, b, c, and d may be the same or different from each other.
FIG. 6 conceptually shows evaluation target key values for each URL to be evaluated for poisoning level, which is managed by the Internet addiction diagnosis server of FIG. For example, when the poisoning level evaluation target URL is GURL1, it is assumed that the poisoning level evaluation target key values are K1, K3, K4, K6, and K7. When the poisoning level evaluation target URL is OGURL1, K3, K5, and K7. It is assumed that the
The internet addiction
For example, assuming that the first URL (URL1) of the
FIG. 7 conceptually illustrates a score table used by the Internet addiction diagnostic server of FIG. 1; FIG. 1 to 7, since the cumulative input count of the key value K1 included in the list T200 is 103, the internet addiction
The internet addiction
The internet addiction
The Internet addiction
The internet addiction
The internet addiction
8 conceptually illustrates poisoning levels and treatment methods calculated by the Internet addiction diagnostic server of FIG. The Internet addiction
The Internet addiction
Although a table (T500) including three user groups and three treatment methods is illustrated in FIG. 8, the user groups according to the evaluation score can be further subdivided into four or more, and the four or more The treatment methods for each of the user groups may be further subdivided. The table T500 shown in FIG. 8 illustrates the user groups to which the user belongs according to the evaluation score of the user, and the treatment method may also be more specific.
In accordance with embodiments, the internet addiction
As another example, assuming that the first URL (URL1) of the
The internet addiction
The internet addiction
The internet addiction
The internet addiction
The Internet addiction
The Internet addiction
In accordance with embodiments, the internet addiction
1 to 8 illustrate that the Internet addiction
For example, the internet poisoning
For example, the Internet addiction
A second application (APP2) executed in the
The second application APP2 may receive the usage restriction information input from the guardian through the keyboard 440 (S132). According to embodiments, the usage restriction information may be an access blocking command.
The second application APP2 may transmit the connection blocking command to the
The internet addiction
The
The
The
In another embodiment, the second application APP2 may receive usage restriction information input from the guardian via the keyboard 440 (S132). According to embodiments, the use restriction information may be at least one of a second reference time and a second key-entry count.
The second application APP2 transmits at least one of the second reference time and the second key reference number to the
The internet addiction
The
The
FIG. 9 is a conceptual diagram illustrating a process in which a deletion event of a first application executed in the user computer shown in FIG. 1 is processed. Referring to Figures 1 to 9, a user of the
At this time, the
The internet
The
The
FIG. 10 is a conceptual diagram illustrating a process in which a first application executed in the user computer shown in FIG. 1 transmits a message to a user using a character.
The
The
The Internet addiction
The
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is evident that many alternatives, modifications and variations will be apparent to those skilled in the art. Accordingly, the true scope of the present invention should be determined by the technical idea of the appended claims.
100: Internet addiction diagnosis system
110: first network
120: Second network
200: user computer
210: keyboard
215: Display device
220: Processor
221: Web Browser
223: First application
230: Communication module
300: Internet addiction diagnostic server
310: Internet addiction level specific module
320: Communication module
400: Protector computer
410: Processor
411: Second application
420: communication module
Claims (13)
The application generates a log file for all key values input from the keyboard connected to the user's computer while the web browser is connected to the website until the accumulated connection time reaches a preset first reference time step;
When the accumulated connection time reaches the predetermined first reference time, the application generates a list of key values exceeding a predetermined number of key input first reference times among the key values recorded in the log file step; And
The application sending the list and a uniform resource locator (URL) of the website to an internet addiction diagnostic server.
The application requesting an authentication number in response to a deletion event; And
Further comprising refusing execution of the delete event until the application completes authentication of the authentication number.
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
The application receiving an access blocking command from the Internet addiction diagnostic server; And
The application immediately blocking the connection between the web browser and the web site in response to the disconnect command.
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
Receiving at least one of a second reference time and a second key-entry count from the Internet addiction diagnostic server; And
Further comprising the step of the application performing at least one of resetting the first reference time to the second reference time and resetting the key input first reference number to the key input second reference number How the application works.
Further comprising: after the list and the URL of the web site are transmitted to the Internet addiction diagnostic server, the application initializing the log file.
The application recording an ID and a password entered when the user connects to the web site using the web browser in the log file; And
Further comprising the step of the application transmitting the list including the ID and the password and the URL of the website to the internet addiction diagnostic server.
Receiving, by the application, a character set by the guardian of the user and a message to be delivered to the user through the character; And
Further comprising the step of causing the application to deliver the message to the user using the character before the accumulated connection time reaches a predetermined first reference time.
An application installed in the user computer is automatically executed when a user connects to a web site using a web browser installed in the user computer, and the executed application accumulates connection time between the web browser and the web site;
Generating a log file for all key values input from a keyboard connected to the user's computer while the web browser is connected to the web site until the application reaches a preset first reference time, ;
When the accumulated connection time reaches the predetermined first reference time, the application generates a list of key values exceeding a predetermined number of key input first reference times among the key values recorded in the log file step;
The application transmitting the list and the uniform resource locator (URL) of the website to the internet addiction diagnostic server;
The internet addiction diagnosis server receiving the list and the URL of the website and storing the list in a database;
Analyzing the list and the URL of the website, and automatically calculating an evaluation score according to an analysis result;
Classifying the internet poisoning level of the user into one of the poisoning levels based on the calculated evaluation score; And
And the Internet addiction diagnostic server sending the classified level and the treatment method to the guardian computer.
The Internet addiction diagnosis server determines whether the URL of the website is a poisoning level evaluation target URL and how many of the key values included in the list are included in the poisoning level evaluation target key values, Of Internet addiction levels.
Wherein the Internet addiction diagnostic server measures a level of internet addiction of a user transmitting the URL of the website to the guardian computer together with the classified level and the treatment method.
The application detects a deletion event of the application, transmits a detection result to the Internet addiction diagnosis server, and requests input of an authentication number for deletion through a display device connected to the user computer;
The Internet addiction diagnostic server transmitting the detection result to the guardian computer; And
Further comprising refusing the application to perform the deletion event until authentication of the authentication number is completed.
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
Receiving, by the application, an access blocking command transmitted from the guardian computer through the Internet addiction diagnostic server; And
Wherein the application immediately blocks the connection between the web browser and the web site based on the blocking access command.
After transmitting the list and the URL of the website to the Internet addiction diagnosis server,
Receiving, by the application, at least one of a second reference time and a key input second reference count transmitted from the guardian computer through the Internet addiction diagnostic server; And
Further comprising the step of the application performing at least one of resetting the first reference time to the second reference time and resetting the key input first reference number to the key input second reference number A method of measuring a user's internet addiction level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150189696A KR101765760B1 (en) | 2015-12-30 | 2015-12-30 | Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150189696A KR101765760B1 (en) | 2015-12-30 | 2015-12-30 | Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020170096926A Division KR101849290B1 (en) | 2017-07-31 | 2017-07-31 | Application for generating log file for key values of input device, and method for measuring level of internet addiction for user using same |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170079291A KR20170079291A (en) | 2017-07-10 |
KR101765760B1 true KR101765760B1 (en) | 2017-08-07 |
Family
ID=59355749
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150189696A KR101765760B1 (en) | 2015-12-30 | 2015-12-30 | Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101765760B1 (en) |
-
2015
- 2015-12-30 KR KR1020150189696A patent/KR101765760B1/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
KR20170079291A (en) | 2017-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chatterjee et al. | The spyware used in intimate partner violence | |
Razaghpanah et al. | Apps, trackers, privacy, and regulators: A global study of the mobile tracking ecosystem | |
CN110413908B (en) | Method and device for classifying uniform resource locators based on website content | |
US10360230B2 (en) | Method and device for social platform-based data mining | |
KR101767454B1 (en) | Method and apparatus of fraud detection for analyzing behavior pattern | |
US20160241589A1 (en) | Method and apparatus for identifying malicious website | |
CN103843007A (en) | Assessing social risk due to exposure from linked contacts | |
CN107992738B (en) | Account login abnormity detection method and device and electronic equipment | |
US20190149540A1 (en) | Service provision system, service provision method, verification device, verification method, and computer program | |
CN107360122B (en) | Method and device for preventing malicious request | |
US9860328B2 (en) | Associating web page requests in a web access system | |
CN110516173B (en) | Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium | |
KR102029045B1 (en) | Digial detox program for restricting usage of mobile terminal and calculating harmfulness score of application installed in mobile terminal, and digital detox service providing method | |
CN102891861A (en) | Client-based phishing website detecting method and device | |
CN105591999A (en) | Verification method and device | |
KR101957630B1 (en) | Method for measuring level of internet addiction for user | |
EP4033717A1 (en) | Distinguishing network connection requests | |
KR20130065322A (en) | Sns trap collection system and url collection method by the same | |
KR101657667B1 (en) | Malicious app categorization apparatus and malicious app categorization method | |
US10078750B1 (en) | Methods and systems for finding compromised social networking accounts | |
KR101849290B1 (en) | Application for generating log file for key values of input device, and method for measuring level of internet addiction for user using same | |
KR101765760B1 (en) | Application for generating log file for key values of keyboard, and method for measuring level of internet addiction for user using same | |
Libert et al. | Preserving Needles in the Haystack: A search engine and multi-jurisdictional forensic documentation system for privacy violations on the web | |
CN105306419B (en) | Page information interaction method, device and system | |
Singh et al. | An analytical model for identifying suspected users on Twitter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |