CN105743981B - Monitoring method, monitoring terminal and monitoring system - Google Patents
Monitoring method, monitoring terminal and monitoring system Download PDFInfo
- Publication number
- CN105743981B CN105743981B CN201610080820.5A CN201610080820A CN105743981B CN 105743981 B CN105743981 B CN 105743981B CN 201610080820 A CN201610080820 A CN 201610080820A CN 105743981 B CN105743981 B CN 105743981B
- Authority
- CN
- China
- Prior art keywords
- behavior
- monitored
- terminal
- instruction
- monitored terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 155
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000004891 communication Methods 0.000 claims description 20
- 238000012545 processing Methods 0.000 claims description 15
- 230000007246 mechanism Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 10
- 238000005516 engineering process Methods 0.000 description 8
- 230000009471 action Effects 0.000 description 7
- 238000001514 detection method Methods 0.000 description 6
- 238000013523 data management Methods 0.000 description 4
- 230000003139 buffering effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a monitoring method, a monitoring terminal and a monitoring system, wherein the monitoring method comprises the following steps: receiving behavior information sent by a monitored terminal, wherein the behavior information is information corresponding to an operation behavior of a monitored user on the monitored terminal, and the behavior information comprises: the behavior parameters comprise at least one category of behavior data, and the time parameters comprise: a behavior start time and a current time; classifying and extracting various types of behavior data in the behavior parameters; and generating a corresponding control instruction according to the behavior starting time, the current time and various types of behavior data, and sending the control instruction to the monitored terminal to control the monitored terminal to execute corresponding operations.
Description
Technical Field
The present invention relates to the field of information technologies, and in particular, to a monitoring method, a monitoring terminal, and a monitoring system.
Background
With the rapid development of the communication field, the mobile phone becomes a necessity of life of people, the functions of the mobile phone are more and more, the mobile phone is greatly enticed for teenagers, the safety of the mobile phone used by the teenagers is ensured, all operation events of the mobile phone of the teenagers are monitored, and parents feel relieved.
At present, in the monitoring of a mobile phone in the prior art, there is a special mobile phone for teenagers, a corresponding monitoring module and a corresponding monitoring application are provided in the mobile phone, and parents set corresponding usage rights in the monitoring application, for example: the monitoring application is used for managing the behavior of teenagers using the mobile phone.
However, when there are many other applications installed in the mobile phone, the parents need to configure corresponding usage rights for each application in the monitoring application, so that the number of operations that the parents need to perform becomes large. In addition, the current authority mechanism is only a single utilization time limiting mechanism or a single utilization content limiting mechanism to 'prohibit' teenagers from using the mobile phone, and the judgment mechanism is relatively rigid and low in flexibility.
Therefore, it is a technical problem to be solved in the art to provide a simple, convenient and flexible monitoring method for monitoring the behavior of a teenager using a mobile phone.
Disclosure of Invention
The invention provides a monitoring method, a monitoring terminal and a monitoring system, which are used for solving the technical problems of relative rigid control method and lower flexibility in the prior art.
In order to achieve the above object, the present invention provides a monitoring method, including:
receiving behavior information sent by a monitored terminal, wherein the behavior information is information corresponding to an operation behavior of a monitored user on the monitored terminal, and the behavior information comprises: the behavior parameters comprise at least one category of behavior data, and the time parameters comprise: a behavior start time and a current time;
classifying and extracting various types of behavior data in the behavior parameters;
and generating a corresponding control instruction according to the behavior starting time, the current time and various types of behavior data, and sending the control instruction to the monitored terminal so as to control the monitored terminal to execute corresponding operation.
Optionally, the step of generating a corresponding control instruction according to the behavior start time, the current time, and each type of behavior data includes:
judging whether the behavior starting moment is within a preset time period or not;
if the behavior starting moment is judged not to be within the preset time period, a shutdown instruction is generated for the monitored terminal to execute shutdown operation;
if the behavior starting moment is judged to be within the preset time period, judging whether various types of behavior data contain bad information;
if the at least one type of behavior data contains bad information, generating an operation stopping instruction for the monitored terminal to execute the operation of prohibiting the user behavior;
if the various types of behavior data do not contain bad information, judging whether the current moment is within the preset time period;
and if the current moment is judged not to be within the preset time period, generating a warning operation instruction for the monitored terminal to execute the operation of warning the monitored user.
Optionally, the step of generating a corresponding control instruction according to the behavior start time, the current time, and each type of behavior data includes:
judging whether the behavior starting moment is within a preset time period or not;
if the behavior starting moment is judged not to be within the preset time period, a shutdown instruction is generated for the monitored terminal to execute shutdown operation;
if the behavior starting moment is judged to be within the preset time period, judging whether various types of behavior data contain bad information;
if the at least one type of behavior data contains bad information, generating an operation stopping instruction for the monitored terminal to execute the operation of prohibiting the user behavior;
if the various types of behavior data do not contain bad information, calculating behavior duration according to the behavior starting time and the current time, and judging whether the duration is greater than a preset threshold value or not;
and if the duration time is judged to be greater than the preset threshold value, generating an alarm operation instruction for the monitored terminal to execute an operation of alarming the monitored user.
Optionally, after generating the warning operation instruction, the method further includes:
judging whether the monitored terminal still sends out behavior information after receiving the warning operation instruction;
if the monitored terminal still sends the behavior information after receiving the warning operation instruction is judged, timing the duration of the behavior information which is continuously sent by the monitored terminal after receiving the warning operation instruction;
judging whether the duration is longer than a preset duration or not;
and if the duration is judged to be longer than the preset duration, generating the operation stopping instruction so that the monitored terminal can execute the operation of forbidding the user behavior.
Optionally, the monitoring method further includes:
and receiving feedback information generated after the monitored terminal executes corresponding operation, and storing the behavior information, the control instruction and the feedback information after binding.
In order to achieve the above object, the present invention provides a monitoring terminal, including:
the communication module is used for receiving behavior information sent by a monitored terminal, wherein the behavior information is information corresponding to an operation behavior of a monitored user on the monitored terminal, and the behavior information comprises: the behavior parameters comprise at least one category of behavior data, and the time parameters comprise: a behavior start time and a current time;
the data processing module is used for classifying and extracting various types of behavior data in the behavior parameters;
and the control instruction generating module is used for generating corresponding control instructions according to the behavior starting time, the current time and various types of behavior data and sending the control instructions to the monitored terminal so as to control the monitored terminal to execute corresponding operations.
Optionally, the control instruction generating module includes:
the first judgment unit is used for judging whether the behavior starting moment is within a preset time period or not;
the first instruction generating unit is used for generating a shutdown instruction for the monitored terminal to execute shutdown operation if the first judging unit judges that the behavior starting moment is not within the preset time period;
the second judging unit is used for judging whether each type of behavior data contains bad information or not if the first judging unit judges that the behavior starting moment is positioned in the preset time period;
a second instruction generating unit, configured to generate an operation stopping instruction for the monitored terminal to perform an operation for prohibiting a user behavior if the second determining unit determines that at least one type of behavior data includes bad information;
a third judging unit, configured to, if the second judging unit judges that none of the various types of behavior data includes bad information, judge whether the current time is within the preset time period;
and the third instruction generating unit is used for generating a warning operation instruction for the monitored terminal to execute an operation of warning the monitored user if the third judging unit judges that the current time is not within the preset time period.
Optionally, the control instruction generating module includes:
the first judgment unit is used for judging whether the behavior starting moment is within a preset time period or not;
the first instruction generating unit is used for generating a shutdown instruction for the monitored terminal to execute shutdown operation if the first judging unit judges that the behavior starting moment is not within the preset time period;
the second judging unit is used for judging whether each type of behavior data contains bad information or not if the first judging unit judges that the behavior starting moment is positioned in the preset time period;
a second instruction generating unit, configured to generate an operation stopping instruction for the monitored terminal to perform an operation for prohibiting a user behavior if the second determining unit determines that at least one type of behavior data includes bad information;
a fourth judging unit, configured to calculate a behavior duration according to the behavior start time and the current time if the second judging unit judges that none of the types of behavior data includes bad information, and judge whether the duration is greater than a preset threshold;
and the fourth instruction generating unit is used for generating an alarm operation instruction for the monitored terminal to execute an operation of alarming the monitored user if the fourth judging unit judges that the duration is greater than the preset threshold.
Optionally, the control instruction generating module further includes:
a fifth judging unit, configured to judge whether the monitored terminal still sends behavior information after receiving the warning operation instruction;
a timing unit, configured to time a duration that the monitored terminal continues to send behavior information after receiving the warning operation instruction if the fifth determining unit determines that the monitored terminal still sends behavior information after receiving the warning operation instruction;
a sixth judging unit, configured to judge whether the duration is greater than a preset duration;
and the fifth instruction generating unit is used for generating the operation stopping instruction for the monitored terminal to execute the operation of prohibiting the user behavior if the sixth judging unit judges that the duration is longer than the preset duration.
Optionally, the method further comprises:
and the storage module is used for receiving feedback information generated after the monitored terminal executes corresponding operation, and storing the behavior information, the control instruction and the feedback information after binding.
In order to achieve the above object, the present invention further provides a monitoring system, including: the monitoring terminal comprises a monitored terminal and a monitoring terminal, wherein the monitoring terminal adopts the monitoring terminal.
The invention has the following beneficial effects:
the invention provides a monitoring method, a monitoring terminal and a monitoring system, which can realize the monitoring of a monitored terminal by using the monitoring terminal, and the monitoring method generates a corresponding control instruction based on behavior parameters and time parameters in behavior information, thereby realizing more diversified and finer control of the monitored terminal, and breaking the limitation that a monitored user is simply limited to 'forbidden' or 'allowed' to use the monitored terminal by a single utilization time limiting mechanism or a single utilization content limiting mechanism in the prior art.
Drawings
Fig. 1 is a flowchart of a monitoring method according to an embodiment of the present invention;
fig. 2 is a block diagram of a structure of behavior information received by a monitoring terminal;
FIG. 3 is a block diagram of behavior information obtained by classifying and extracting various types of behavior data in behavior parameters;
FIG. 4 is a flowchart of an alternative implementation of step S3 in the present invention;
FIG. 5 is a flowchart of an alternative implementation of step S3 in accordance with the present invention;
FIG. 6 is a flowchart of a method for continuing to monitor a monitoring terminal after a monitored terminal generates an alarm operation instruction;
fig. 7 is a flowchart of a monitoring method according to a second embodiment of the present invention;
fig. 8 is a schematic structural diagram of a monitoring terminal according to a third embodiment of the present invention;
fig. 9 is a schematic structural diagram of a monitored terminal monitored by a monitoring terminal;
FIG. 10 is a schematic diagram of a control command generating module shown in FIG. 8;
fig. 11 is a schematic diagram of another structure of the control instruction generating module in fig. 8.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, a monitoring method, a monitoring terminal and a monitoring system provided by the present invention are described in detail below with reference to the accompanying drawings.
Example one
Fig. 1 is a flowchart of a monitoring method according to an embodiment of the present invention, as shown in fig. 1, the monitoring method is used for implementing monitoring of a monitored terminal by using a monitoring terminal, and the monitoring method includes:
step S1: and receiving the behavior information sent by the monitored terminal.
In this embodiment, the monitored terminal and the monitoring terminal may be selected from electronic devices such as a mobile phone, a computer, and a tablet computer, and the monitored terminal and the monitoring terminal may perform wireless communication.
It should be noted that, a corresponding data management module is arranged in the monitored terminal, and when a monitored user (teenager) performs an operation on the monitored terminal every time, the data management module generates a corresponding behavior information according to the operation of the monitored user, where the behavior information includes: the behavior parameters comprise at least one type of behavior data, and the time parameters comprise: an action start time and a current time.
Optionally, the types of behavior data include: text class, image class, and speech class. The text behavior data may specifically include Chinese text information related to the monitored user in chat tools such as web browsing, searching, instant messaging and other applications (such as game software); the image behavior data specifically can include pictures and video information related to the monitored user in chat tools such as web browsing, searching and instant messaging and other applications (such as game software); the voice behavior data may specifically include voice information of the monitored user in a chat tool such as telephone, web browsing, searching, instant messaging, and other applications (e.g., game software). In practical applications, when a monitored user uses a monitored device, for example, during a chat process using chat software, text chat, picture viewing, picture sending, picture receiving, voice or video may be involved, and therefore, in behavior information generated by the monitored device, at least one type of behavior data may exist in corresponding behavior parameters.
When behavior information is generated in the monitored terminal, the determination mechanism for the behavior start time in the time parameter is roughly as follows: by setting a timer in the monitored terminal, the timer is reset and starts timing again each time the monitored terminal generates a piece of behavior information. At this time, before the monitored terminal generates the behavior information, the timing time in the timer is acquired, and the timing time is compared with a preset timing threshold; when the timing time in the timer is greater than a preset timing threshold, the interval between the current operation and the last operation of the user is larger, namely the two operations are not a continuous operation, and the behavior starting time in the behavior information generated by the monitored terminal corresponding to the current operation is the current time; when the timing time in the timer is less than or equal to the preset timing threshold, it indicates that the interval between the current operation and the last operation performed by the user is small, that is, the two operations are a continuous operation, and the behavior start time in the behavior information generated by the monitored terminal corresponding to the current operation is equal to the behavior start time in the behavior information generated by the monitored terminal corresponding to the last operation.
For the current moment in the time parameter, it can be obtained through an application with a time display function provided in the monitored terminal.
After the monitored terminal generates corresponding behavior information according to the operation of the monitored user, the monitored terminal sends the behavior information to the communication module of the monitoring terminal through the built-in communication module. And after the communication module in the monitoring terminal receives the behavior information, the communication module sends the received behavior information to the data processing module for processing by the data processing module.
Fig. 2 is a structural block diagram of behavior information received by a monitoring terminal, and as shown in fig. 2, it should be noted that, in the process of behavior information generated by a monitored terminal, various types of behavior data in behavior parameters are mixed together, so that various types of behavior data in the behavior information received by the monitoring terminal are mixed together.
Step S2: and classifying and extracting various types of behavior data in the behavior parameters.
Fig. 3 is a block diagram of the behavior information after classifying and extracting various types of behavior data in the behavior parameters, and as shown in fig. 3, in step S102, the data processing module in the monitoring terminal classifies and extracts various types of behavior data in the behavior parameters in the behavior information. Specifically, all the character-class behavior data are classified together, all the image-class behavior data are classified together, and all the voice-class behavior data are classified together.
Step S3: and generating a corresponding control instruction according to the behavior starting time, the current time and various types of behavior data, and sending the control instruction to the monitored terminal so as to control the monitored terminal to execute corresponding operation.
Step S3 is executed by a control command generation module built in the monitored terminal.
Fig. 4 is a flowchart of an alternative implementation of step S3 in the present invention, and as shown in fig. 4, step S3 includes:
step S301 a: and judging whether the behavior starting moment is within a preset time period.
In this embodiment, the preset time period is a time period set by the monitoring user and allowing the monitored user to use the monitored terminal, and the monitoring user may perform corresponding operation on the monitoring terminal to perform corresponding setting or adjustment on the preset time period.
For convenience of description, in this embodiment, the behavior start time in the behavior information is denoted as tOpening deviceThe current time is denoted as tWhen in useRecording the preset time period as tm,tn]。
In step S301a, when the action start time t is determinedOpening deviceNot in a preset time period tm,tn]If yes, it means that the time when the monitored user initially performs the operation is not within the allowable time period set by the monitoring user, and then step S302a is executed; if the action starting time t is judgedOpening deviceAt a preset time period tm,tn]When the time is within the allowable time period set by the monitoring user, step S303a is executed.
Step S302 a: and generating a shutdown instruction.
Judging the behavior starting time t at the monitoring terminalOpening deviceNot in a preset time period tm,tn]When the power-off command is received by the monitored terminal, the shutdown operation is executed.
Step S303 a: and judging whether various types of behavior data contain bad information or not.
Judging the behavior starting time t at the monitoring terminalOpening deviceAt a preset time period tm,tn]And if so, the monitoring terminal can detect whether bad information exists in various types of behavior data. Specifically, when bad information detection is performed on the text behavior data, the adopted technologies include, but are not limited to, a keyword matching technology and a semantic analysis technology, and the specific flow of the method can adopt any flow of a text bad information detection method in the prior art, and specific contents are not described in detail herein; when the bad information detection is performed on the image behavior data, the adopted technology includes but is not limited to an image recognition technology, and the specific flow can adopt any flow of the detection method of the bad information of the image behavior data in the prior art, and the specific content is not described in detail herein; when bad information detection is performed on voice behavior data, the adopted technology includes, but is not limited to, a voice recognition technology, and a specific flow can adopt any flow of a voice bad information detection method existing in the prior art, and specific contents are not described in detail here.
If it is determined in step S303a that the at least one category of behavior data includes bad information, it indicates that the monitored user performed an "illegal operation" on the monitored terminal, and then step S304a is executed; if it is determined that the various types of behavior data do not include any bad information, it indicates that the monitored user performs "legal operation" on the monitored terminal, and then step S305a is executed.
Step S304 a: and generating a stop operation instruction.
When the monitoring terminal judges that at least one type of behavior data contains bad information, the monitoring terminal correspondingly generates an operation stopping instruction, the operation stopping instruction is transmitted to the monitored terminal through the communication module, and the monitored terminal executes the operation of forbidding the user behavior after receiving the operation stopping instruction. In particular, the monitored terminal will no longer respond to the operation of the monitored user for a period of time.
Step S305 a: and judging whether the current moment is within a preset time period.
When the monitoring terminal judges that all kinds of behavior data do not contain bad information, the monitoring terminal judges the current time t in the behavior informationWhen in useWhether it is in a preset time period tm,tn]And (4) the following steps. If the monitoring terminal judges the current time tWhen in useAt a preset time period tm,tn]And when the user is in the normal use state, the monitored user is indicated to normally use the monitored terminal. If the monitoring terminal judges the current time tWhen in useNot in a preset time period tm,tn]If it is, it indicates that the monitored user should not use the monitored terminal currently, and step S306a is executed.
Step 306 a: and generating a warning operation instruction.
Judging the current time t at the monitoring terminalWhen in useNot in a preset time period tm,tn]When the monitoring terminal is in the normal state, the monitoring terminal correspondingly generates a warning operation instruction, the warning operation instruction is transmitted to the monitored terminal through the communication module, and the monitored terminal executes an operation of warning the monitored user after receiving the warning operation instruction. Specifically, the monitored terminal warns the user that it is not in the normal use period (i.e., the preset period), and gives a prompt of "stop use".
It can be seen from the above steps S301a to S305a that the monitoring terminal employs a completely new monitoring mechanism, and can generate corresponding control instructions based on the behavior parameters and the time parameters in the behavior information, thereby implementing more diversified and finer control over the monitored terminal, and breaking the limitation that the monitored user is simply limited to "prohibit" or "allow" to use the monitored terminal by a single time limitation mechanism or a single content limitation mechanism in the prior art. In addition, the monitoring user can operate on the monitoring terminal at any time and any place to monitor the monitored terminal, and the flexibility is high.
Fig. 5 is a flowchart of another alternative implementation of step S3 in the present invention, and as shown in fig. 5, different from the monitoring mechanism shown in fig. 4, in the monitoring mechanism shown in fig. 5, when it is determined in step S303a that no bad information is included in each type of behavior data, step S305b is executed.
Step S305 b: and calculating the action duration according to the action starting time and the current time, and judging whether the duration is greater than a preset threshold value.
For convenience of description, the duration of the action is denoted as tHand holder,tHand holder=tWhen in use-tOpening deviceWhich represents the time when the monitored user has continuously operated the monitored terminal.
Calculating the action duration t at the monitoring terminalHand holderAnd then, the monitoring terminal can continuously judge whether the duration is greater than a preset threshold. If the duration time is greater than the preset threshold value, and if the duration time is less than or equal to the preset threshold value, it indicates that the time for the monitored user to continuously use the monitored terminal is short, and the monitored user can also continuously use the monitored terminal. If the duration is greater than the preset threshold, which indicates that the monitored user is using the monitored terminal continuously for a long time (the monitored user is in fatigue use), and may have a bad influence on the monitored user, step S306b is executed.
Step 306 b: and generating a warning operation instruction.
Judging the duration t at the monitoring terminalHand holderIf the alarm operation instruction is larger than the preset threshold value, the monitoring terminal correspondingly generates an alarm operation instruction, the alarm operation instruction is transmitted to the monitored terminal through the communication module, and the monitored terminal executes an operation of alarming to a monitored user after receiving the alarm operation instruction. Specifically, the monitored terminal warns the user of the continuous use timeout and gives a prompt of "stop use".
It should be noted that, for the descriptions of step S101a to step S104a in fig. 5, reference may be made to the foregoing descriptions, and details are not repeated here.
In addition, in this embodiment, the monitoring mechanisms of fig. 4 and fig. 5 may be simultaneously saved in the monitoring terminal, so that the monitoring user may make an appropriate selection. For example, in a non-holiday, the monitoring user may set a range of a "preset time period" to be smaller, and operate the monitoring mechanism shown in fig. 4 in the monitoring terminal, thereby more prominently monitoring whether the monitored user uses the behavior of the monitored terminal within the preset time period; in holidays, the monitoring user can set the range of the 'preset time period' to be larger, and the monitoring mechanism shown in fig. 5 is operated in the monitoring terminal, so that the behavior of monitoring whether the monitored user continuously uses the monitored terminal for too long time (fatigue use) is more prominently monitored.
Fig. 6 is a flowchart of a method for continuing to monitor a monitoring terminal after a monitored terminal generates an alarm operation instruction, and as shown in fig. 6, after the monitored terminal generates the alarm operation instruction, the monitored terminal further performs the following steps to continue monitoring the monitoring terminal, where step S3 further includes, after step 306a in fig. 4 and after step 306b in fig. 5:
step 307 a: and judging whether the monitored terminal still sends out behavior information after receiving the warning operation instruction.
After the monitored terminal generates the warning operation instruction, the monitored terminal receives the warning operation instruction and executes an operation of warning the monitored user. In theory the monitored user would stop using the monitored terminal after receiving the warning, but in fact some of the monitored users would continue to use the monitored terminal after receiving the warning. Therefore, the monitoring terminal can know whether the monitored user continues to use the monitored terminal after receiving the warning by judging whether the monitored terminal still sends the behavior information after receiving the warning operation instruction (namely, the monitoring terminal judges whether the monitoring terminal receives the behavior information sent by the monitored terminal).
And if the monitoring terminal judges that the monitored terminal does not send behavior information after receiving the warning operation instruction, indicating that the monitored user stops using the monitored terminal. If the monitoring terminal determines that the monitored terminal still sends the behavior information after receiving the warning operation instruction, it indicates that the monitored user still continues to use the monitored terminal, and then step S308a is executed.
Step S308 a: and timing the duration of the behavior information which is continuously sent out by the monitored terminal after the monitored terminal receives the warning operation instruction.
The monitoring terminal can be provided with a timing unit for timing the duration of the behavior information continuously sent by the monitored terminal after receiving the warning operation instruction when the monitored terminal is judged to still send the behavior information after receiving the warning operation instruction. Specifically, when the monitoring terminal generates the warning operation instruction, the timing unit resets and starts timing, if the monitoring terminal continuously receives the behavior information sent by the monitored terminal, timing continues, and if the monitoring terminal does not receive the behavior information sent by the monitored terminal within a certain time period (which can be considered to be set), timing stops.
Step 309 a: and judging whether the duration is greater than the preset duration.
In the process of timing, as long as the monitored user continues to operate, the timing duration of the timing unit (i.e. the duration of the monitored user continuing to operate after receiving the warning) is gradually increased, i.e. the duration is gradually increased. In this process, the duration may be compared to a preset duration. If the duration is judged to be less than or equal to the preset duration, the monitored user is indicated to have shorter duration of continuous operation after receiving the warning, and the duration is within the acceptable range of the monitored user. If the duration is longer than the preset duration, it indicates that the duration of the operation of the monitored user after receiving the warning is longer and exceeds the acceptable range of the monitoring user, then step 310a is executed.
Step 310 a: and generating a stop operation instruction.
When the monitoring terminal judges that the duration of the continuous operation of the monitored user after receiving the warning is longer than the preset duration, the monitoring terminal correspondingly generates an operation stopping instruction, transmits the operation stopping instruction to the monitored terminal through the communication module, and executes the operation of prohibiting the user behavior after the monitored terminal receives the operation stopping instruction. In particular, the monitored terminal will no longer respond to the operation of the monitored user for a period of time.
It should be noted that the purpose of setting the "preset duration" in this embodiment is to provide a certain buffering time for the monitored user after receiving the warning, and within the buffering time, the monitored user can complete some relatively important operations. The monitoring mechanism shown in fig. 4 and 5 can be further completed through the above steps 307a to 310 a.
The embodiment of the invention provides a monitoring method, which can realize monitoring of a monitored terminal by using a monitoring terminal, and can generate a corresponding control instruction based on behavior parameters and time parameters in behavior information, thereby realizing more diversified and finer control of the monitored terminal, and breaking the limitation that a monitored user is simply limited to 'forbidden' or 'allowed' to use the monitored terminal by a single utilization time limiting mechanism or a single utilization content limiting mechanism in the prior art.
Example two
Fig. 7 is a flowchart of a monitoring method according to a second embodiment of the present invention, as shown in fig. 7, compared with the monitoring method shown in fig. 1, the monitoring method shown in fig. 7 further includes step S4, and for the descriptions of step S1 to step S3 in fig. 7, reference may be made to corresponding contents in the first embodiment, which is not described again here. Only step S4 will be described in detail below.
Step S4: and receiving feedback information generated after the monitored terminal executes corresponding operation, and storing the behavior information, the control instruction and the feedback information after binding.
When the monitored terminal receives a control instruction (such as a shutdown instruction, an operation stopping instruction or a warning instruction), the monitored terminal executes corresponding operation and generates feedback information through a built-in feedback module. At this moment, the monitored terminal sends the feedback information to the monitored terminal, and a storage module in the monitored terminal binds the behavior information received from the monitored terminal, the control instruction sent to the monitored terminal and the feedback information received from the monitored terminal at present and stores the behavior information, the control instruction and the feedback information so that a monitoring user can know the monitoring execution condition at any time. In addition, the storage module can also update corresponding data to the data processing module, and directly sends a notification to inform the control instruction generation module to generate a corresponding control instruction when the data processing module receives the same and similar behavior information next time, so that the control instruction generation module is prevented from using a monitoring mechanism to perform secondary operation on repeated data.
EXAMPLE III
Fig. 8 is a schematic structural diagram of a monitoring terminal according to a third embodiment of the present invention, and fig. 9 is a schematic structural diagram of a monitored terminal monitored by using a monitoring terminal, as shown in fig. 8 and 9, the monitoring terminal includes: the device comprises a communication module 1, a data processing module 2 and a control instruction generating module 3. The communication module 1 is used for receiving behavior information sent by a monitored terminal; the data processing module 2 is used for classifying and extracting various behavior data in the behavior parameters; the control instruction generating module 3 is configured to generate a corresponding control instruction according to the behavior start time, the current time, and various types of behavior data, and send the control instruction to the monitored terminal, so as to control the monitored terminal to execute a corresponding operation.
It should be noted that, the monitored terminal at least includes a data management module 5 and a communication module 6, when the monitored user performs an operation on the monitored terminal every time, the data management module 5 generates a corresponding behavior information according to the operation of the monitored user, and the communication module 6 in the monitored terminal sends the behavior information to the corresponding communication module 1 in the monitoring terminal.
It should be noted that the communication module 1 in the monitoring terminal in this embodiment is configured to execute step S1 in the first embodiment, the data processing module 2 is configured to execute step S2 in the first embodiment, and the control command generating module 3 is configured to execute step S3 in the first embodiment. For the description of the specific execution process and the coordination process of each module, reference may be made to the corresponding contents in the first embodiment, and details are not described here. In this embodiment, the communication module 1, the data processing module 2, and the control instruction generating module 3 can flexibly monitor the monitored terminal.
Optionally, the monitoring terminal further includes: and the storage module 4 is used for receiving the feedback information generated after the monitored terminal executes the corresponding operation, and binding and storing the behavior information received by the communication module 1, the control instruction generated by the data processing module 2 and the received feedback information.
It should be noted that, a feedback module 7 is further disposed at the monitoring terminal, and the feedback module 7 is configured to generate corresponding feedback information after the monitoring terminal executes the control instruction sent by the monitored terminal.
In this embodiment, the storage module 4 is provided to facilitate the monitoring user to know the monitoring execution situation at any time. In addition, the storage module 4 can also update the corresponding data to the data processing module, and directly issue a notification to tell the control instruction generation module 3 to generate the corresponding control instruction when the data processing module 2 receives the same and similar behavior information next time, so that the control instruction generation module 3 is prevented from using a monitoring mechanism to perform secondary operation on the repeated data.
Fig. 10 is a schematic structural diagram of the control instruction generating module in fig. 8, and as shown in fig. 10, the control instruction generating module 3 includes: a first judgment unit 301, a first instruction generation unit 302, a second judgment unit 303, a second instruction generation unit 304, a third judgment unit 305a, and a third instruction generation unit 306 a. The first judging unit 301 is configured to judge whether a behavior starting time is within a preset time period; the first instruction generating unit 302 is configured to generate a shutdown instruction for the monitored terminal to perform a shutdown operation if the first determining unit determines that the behavior starting time is not within the preset time period; the second determining unit 303 is configured to determine whether each type of behavior data includes bad information if the first determining unit 301 determines that the behavior start time is within the preset time period; the second instruction generating unit 304 is configured to generate an operation stopping instruction for the monitored terminal to perform an operation for prohibiting a user behavior if the second determining unit 303 determines that at least one type of behavior data includes bad information; the third determining unit 305a is configured to determine whether the current time is within a preset time period if the second determining unit 303 determines that none of the various types of behavior data includes bad information; the third instruction generating unit 306b is configured to generate a warning operation instruction for the monitored terminal to perform an operation of warning the monitored user if the third determining unit 305a determines that the current time is not within the preset time period.
It should be noted that, in this embodiment, the first determining unit 301 is configured to execute the step 301a in the first embodiment, the first instruction generating unit 302 is configured to execute the step 302a in the first embodiment, the second determining unit 303 is configured to execute the step 303a in the first embodiment, the second instruction generating unit 304 is configured to execute the step 304a in the first embodiment, the third determining unit 305a is configured to execute the step 305a in the first embodiment, and the third instruction generating unit 306a is configured to execute the step 306a in the first embodiment. For the description of the specific execution process and the coordination process of each unit, reference may be made to the corresponding contents in the first embodiment, and details are not described here.
In this embodiment, the first determining unit 301, the first instruction generating unit 302, the second determining unit 303, the second instruction generating unit 304, the third determining unit 305a, and the third instruction generating unit 306a together implement a brand new monitoring mechanism, and can generate corresponding control instructions based on the behavior parameters and the time parameters in the behavior information, thereby implementing more diversified and finer control over the monitored terminal, and breaking the limitation that the monitored user is simply limited to "prohibit" or "allow" to use the monitored terminal by using a single time limiting mechanism or a single content limiting mechanism in the prior art. In addition, the monitoring user can operate on the monitoring terminal at any time and any place to monitor the monitored terminal, and the flexibility is high.
Optionally, the control instruction generating module 3 further includes: a fifth judging unit 307, a timing unit 308, a sixth judging unit 309, and a fifth instruction generating unit 310. The fifth judging unit 307 is configured to judge whether the monitored terminal still sends out behavior information after receiving the warning operation instruction; the timing unit 308 is configured to time a duration that the monitored terminal continues to send behavior information after receiving the warning operation instruction if the fifth determining unit determines that the monitored terminal still sends behavior information after receiving the warning operation instruction; the sixth judging unit 309 is configured to judge whether the duration is greater than a preset duration in real time; the fifth instruction generating unit 310 is configured to generate an operation stopping instruction for the monitored terminal to perform an operation for prohibiting the user behavior if the sixth determining unit 309 determines that the duration is longer than the preset duration.
It should be noted that, in this embodiment, the fifth determining unit 307 is configured to execute the step 307a in the first embodiment, the timing unit 308 is configured to execute the step 308a in the first embodiment, the sixth determining unit 309 is configured to execute the step 309a in the first embodiment, and the fifth instruction generating unit 310 is configured to execute the step 310a in the first embodiment.
Fig. 11 is a schematic diagram of another structure of the control instruction generating module in fig. 8, and as shown in fig. 11, the control instruction generating module shown in fig. 11 is different from the control instruction generating module shown in fig. 10 in that the control instruction generating module shown in fig. 11 does not include the third judging unit 305a and the third instruction unit 306a, but includes the fourth judging unit 305b and the fourth instruction unit 306 b. For the description of fig. 11 through the first determining unit 301, the first instruction generating unit 302, the second determining unit 303, the second instruction generating unit 304, the fifth determining unit 307, the timing unit 308, the sixth determining unit 309 and the fifth instruction generating unit 310, the description of fig. 8 can be referred to, and only the fourth determining unit and the fourth instruction unit are described below.
The fourth determining unit 305b is configured to, if the second determining unit 303 determines that no bad information is included in each type of behavior data, calculate a behavior duration according to the behavior starting time and the current time, and determine whether the duration is greater than a preset threshold. The fourth instruction generating unit 306b is configured to, if the fourth judging unit 305b judges that the duration is greater than the preset threshold, generate a warning operation instruction for the monitored terminal to perform an operation of warning the monitored user.
For the description of the specific execution process and the coordination process of each unit, reference may be made to corresponding contents in the above first embodiment, and details are not repeated here.
The third embodiment of the invention provides a monitoring terminal for monitoring a monitored terminal, and the monitoring method can generate a corresponding control instruction based on the behavior parameters and the time parameters in the behavior information, thereby realizing more diversified and finer control over the monitored terminal, and breaking the limitation that a monitored user is simply limited to 'forbidden' or 'allowed' to use the monitored terminal by a single time limit mechanism or a single content limit mechanism in the prior art.
Example four
An embodiment of the present invention provides a monitoring system, where the monitoring system includes: the specific structures of the monitored terminal and the monitoring terminal, and the monitoring terminal and the monitored terminal can be seen in fig. 9, and for the description of each module or unit in the monitoring terminal and the monitored terminal, the contents in the third embodiment can be seen, and details are not described here.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.
Claims (11)
1. A method of monitoring, comprising:
receiving behavior information sent by a monitored terminal, wherein the behavior information is information corresponding to each operation executed by a monitored user on the monitored terminal, and the behavior information comprises: the method comprises the following steps of behavior parameters and time parameters, wherein the behavior parameters comprise at least one type of behavior data, and the types of the behavior data comprise: text class, image class, and speech class; the time parameters include: a behavior start time and a current time;
classifying and extracting various types of behavior data in the behavior parameters;
automatically generating a corresponding control instruction according to the behavior starting time, the current time and various types of behavior data, and sending the control instruction to the monitored terminal so as to automatically control the monitored terminal to execute corresponding operation;
the step of generating corresponding control instructions according to the behavior starting time, the current time and various types of behavior data comprises the following steps: judging whether the behavior starting moment is within a preset time period or not;
if the behavior starting moment is judged not to be within the preset time period, a shutdown instruction is generated for the monitored terminal to execute shutdown operation;
if the behavior starting moment is judged to be within the preset time period, judging whether various types of behavior data contain bad information;
and if the at least one type of behavior data contains bad information, generating an operation stopping instruction for the monitored terminal to execute the operation of prohibiting the user behavior.
2. The monitoring method according to claim 1, wherein if it is determined that none of the various types of behavior data includes bad information, determining whether the current time is within the preset time period;
and if the current moment is judged not to be within the preset time period, generating a warning operation instruction for the monitored terminal to execute the operation of warning the monitored user.
3. The monitoring method according to claim 1, wherein if it is determined that none of the types of behavior data includes bad information, calculating a behavior duration according to the behavior start time and the current time, and determining whether the duration is greater than a preset threshold;
and if the duration time is judged to be greater than the preset threshold value, generating an alarm operation instruction for the monitored terminal to execute an operation of alarming the monitored user.
4. The monitoring method according to claim 2 or 3, after generating the warning operation instruction, further comprising:
judging whether the monitored terminal still sends out behavior information after receiving the warning operation instruction;
if the monitored terminal still sends the behavior information after receiving the warning operation instruction is judged, timing the duration of the behavior information which is continuously sent by the monitored terminal after receiving the warning operation instruction;
judging whether the duration is longer than a preset duration or not;
and if the duration is judged to be longer than the preset duration, generating the operation stopping instruction so that the monitored terminal can execute the operation of forbidding the user behavior.
5. The monitoring method of claim 1, further comprising:
and receiving feedback information generated after the monitored terminal executes corresponding operation, and storing the behavior information, the control instruction and the feedback information after binding.
6. A monitor terminal, comprising:
the communication module is used for receiving behavior information sent by a monitored terminal, wherein the behavior information corresponds to an operation behavior executed by a monitored user on the monitored terminal every time, and the behavior information comprises: the method comprises the following steps of behavior parameters and time parameters, wherein the behavior parameters comprise at least one type of behavior data, and the types of the behavior data comprise: text class, image class, and speech class; the time parameters include: a behavior start time and a current time;
the data processing module is used for classifying and extracting various types of behavior data in the behavior parameters;
the control instruction generating module is used for automatically generating corresponding control instructions according to the behavior starting time, the current time and various types of behavior data and sending the control instructions to the monitored terminal so as to automatically control the monitored terminal to execute corresponding operations;
the control instruction generation module comprises:
the first judgment unit is used for judging whether the behavior starting moment is within a preset time period or not;
the first instruction generating unit is used for generating a shutdown instruction for the monitored terminal to execute shutdown operation if the first judging unit judges that the behavior starting moment is not within the preset time period;
the second judging unit is used for judging whether each type of behavior data contains bad information or not if the first judging unit judges that the behavior starting moment is positioned in the preset time period;
and the second instruction generating unit is used for generating an operation stopping instruction for the monitored terminal to execute the operation of prohibiting the user behavior if the second judging unit judges that at least one type of behavior data contains bad information.
7. The monitoring terminal of claim 6, wherein the control instruction generation module further comprises:
a third judging unit, configured to, if the second judging unit judges that none of the various types of behavior data includes bad information, judge whether the current time is within the preset time period;
and the third instruction generating unit is used for generating a warning operation instruction for the monitored terminal to execute an operation of warning the monitored user if the third judging unit judges that the current time is not within the preset time period.
8. The monitoring terminal of claim 6, wherein the control instruction generation module further comprises:
a fourth judging unit, configured to calculate a behavior duration according to the behavior start time and the current time if the second judging unit judges that none of the types of behavior data includes bad information, and judge whether the duration is greater than a preset threshold;
and the fourth instruction generating unit is used for generating an alarm operation instruction for the monitored terminal to execute an operation of alarming the monitored user if the fourth judging unit judges that the duration is greater than the preset threshold.
9. The monitoring terminal according to claim 7 or 8, wherein the control instruction generation module further comprises:
a fifth judging unit, configured to judge whether the monitored terminal still sends behavior information after receiving the warning operation instruction;
a timing unit, configured to time a duration that the monitored terminal continues to send behavior information after receiving the warning operation instruction if the fifth determining unit determines that the monitored terminal still sends behavior information after receiving the warning operation instruction;
a sixth judging unit, configured to judge whether the duration is greater than a preset duration;
and the fifth instruction generating unit is used for generating the operation stopping instruction for the monitored terminal to execute the operation of prohibiting the user behavior if the sixth judging unit judges that the duration is longer than the preset duration.
10. The monitoring terminal of claim 6, further comprising:
and the storage module is used for receiving feedback information generated after the monitored terminal executes corresponding operation, and storing the behavior information, the control instruction and the feedback information after binding.
11. A monitoring system, comprising: a monitored terminal and a monitoring terminal as claimed in any one of the preceding claims 6 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610080820.5A CN105743981B (en) | 2016-02-04 | 2016-02-04 | Monitoring method, monitoring terminal and monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610080820.5A CN105743981B (en) | 2016-02-04 | 2016-02-04 | Monitoring method, monitoring terminal and monitoring system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105743981A CN105743981A (en) | 2016-07-06 |
CN105743981B true CN105743981B (en) | 2020-06-02 |
Family
ID=56244935
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610080820.5A Active CN105743981B (en) | 2016-02-04 | 2016-02-04 | Monitoring method, monitoring terminal and monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105743981B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106774861B (en) * | 2016-12-01 | 2020-07-28 | 北京奇宝科技有限公司 | Intelligent device and behavior data correction method and device |
CN106647394A (en) * | 2016-12-16 | 2017-05-10 | 惠州Tcl移动通信有限公司 | Method and system for monitoring usage behavior of wearable device |
CN109542739A (en) * | 2017-09-21 | 2019-03-29 | Tcl集团股份有限公司 | A kind of optimization method, device and the equipment of user behavior data acquisition |
CN108509312A (en) * | 2018-03-15 | 2018-09-07 | 北京市育学林教育技术有限公司 | A kind of computer applied algorithm real-time control software |
CN108664379A (en) * | 2018-05-22 | 2018-10-16 | 北京小鱼在家科技有限公司 | Information cuing method, device, computer equipment and storage medium |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1863211A (en) * | 2006-03-23 | 2006-11-15 | 华为技术有限公司 | Content filtering system and method thereof |
GB0916239D0 (en) * | 2009-09-16 | 2009-10-28 | Vodafone Plc | Internet breakout in HNB/Femto, UMTS and LTE networks |
CN102625295A (en) * | 2011-01-28 | 2012-08-01 | 上海晨兴希姆通电子科技有限公司 | Secure internet access system of mobile phone and method thereof |
CN102208049A (en) * | 2011-03-17 | 2011-10-05 | 江苏省莱科信息技术有限公司 | Healthy work schedule management method and system |
CN102571753A (en) * | 2011-12-05 | 2012-07-11 | 苏州汉清投资管理有限公司 | Surfing protection system |
CN103179556B (en) * | 2011-12-20 | 2016-06-08 | 深圳业拓讯通信科技有限公司 | A kind of green internet system and method based on mobile network's strategy and charging framework |
CN102881125B (en) * | 2012-09-25 | 2014-06-18 | 杭州立高科技有限公司 | Alarm monitoring system based on multi-information fusion centralized processing platform |
CN103078954B (en) * | 2013-01-28 | 2016-09-28 | 广东欧珀移动通信有限公司 | A kind of mobile terminal remote monitoring method, mobile terminal and control terminal |
CN103167180A (en) * | 2013-03-19 | 2013-06-19 | 浙江中呼科技有限公司 | System and method for controlling surfing internet through mobile phone |
CN104978516A (en) * | 2014-04-02 | 2015-10-14 | 上海优立检测技术有限公司 | Method and device for preventing people from being addicted to mobile games |
CN104657251B (en) * | 2015-02-04 | 2017-12-26 | 广东小天才科技有限公司 | Method and device for monitoring use state of electronic equipment |
CN104853371A (en) * | 2015-06-09 | 2015-08-19 | 上海斐讯数据通信技术有限公司 | Mobile terminal monitoring method and system, and corresponding mobile terminal |
CN105187266B (en) * | 2015-07-28 | 2018-09-21 | 小米科技有限责任公司 | information monitoring method and device |
CN105245566A (en) * | 2015-08-28 | 2016-01-13 | 广东小天才科技有限公司 | Monitoring method, device and system of learning terminal |
-
2016
- 2016-02-04 CN CN201610080820.5A patent/CN105743981B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN105743981A (en) | 2016-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105743981B (en) | Monitoring method, monitoring terminal and monitoring system | |
US9239726B2 (en) | Misoperation-preventing method and device | |
KR102006562B1 (en) | METHOD AND DEVICE FOR MESSAGE PROCESSING | |
JP5572726B2 (en) | Program and information processing method | |
US20060136882A1 (en) | System and method for background JAVA application resource control | |
CN105094630B (en) | The prompt information processing method and device of application program PUSH message | |
JP6526044B2 (en) | Information recall method and apparatus, and electronic terminal | |
CN107783803B (en) | System optimization method and device of intelligent terminal, storage medium and intelligent terminal | |
WO2010125451A1 (en) | Apparatus and method for handling notifications within a communications device | |
CN112286483A (en) | Audio playing control method and device and electronic equipment | |
CN104683596A (en) | Mobile phone button alarm system | |
CN108595236A (en) | A kind of method and device for preventing sub-line journey from carrying out operating user interface | |
EP3314438B1 (en) | Thermal mitigation user experience | |
CN104486509A (en) | Mobile terminal and control method thereof | |
CN107766103A (en) | A kind of terminal control method and device, terminal and readable storage medium storing program for executing | |
CN209805952U (en) | Camera controlling means and smart machine | |
WO2023241455A1 (en) | Group chat operation processing method and apparatus, electronic device, and storage medium | |
CN111884906A (en) | Information notification method and device and electronic equipment | |
CN111966425A (en) | Process cleaning method and device, storage medium and mobile terminal | |
WO2023078262A1 (en) | Application processing method and apparatus, and electronic device | |
CN110989816A (en) | Application processing method and device and storage medium | |
CN104205163A (en) | Method and apparatus for controlling content capture of prohibited content | |
CN115437593A (en) | Information processing method, information processing apparatus, storage medium, and electronic device | |
CN114138443A (en) | Remote control method, device, equipment and storage medium | |
CN110086924A (en) | A kind of method and terminal device of switching working mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |