CN107133153B - User monitoring system - Google Patents

User monitoring system Download PDF

Info

Publication number
CN107133153B
CN107133153B CN201710444582.6A CN201710444582A CN107133153B CN 107133153 B CN107133153 B CN 107133153B CN 201710444582 A CN201710444582 A CN 201710444582A CN 107133153 B CN107133153 B CN 107133153B
Authority
CN
China
Prior art keywords
user
authority
setting
module
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710444582.6A
Other languages
Chinese (zh)
Other versions
CN107133153A (en
Inventor
滕凯
刘善果
刘胜强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Eaglesoul Technology Co Ltd
Original Assignee
Shenzhen Eaglesoul Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Eaglesoul Technology Co Ltd filed Critical Shenzhen Eaglesoul Technology Co Ltd
Priority to CN201710444582.6A priority Critical patent/CN107133153B/en
Priority to PCT/CN2017/099058 priority patent/WO2018227763A1/en
Publication of CN107133153A publication Critical patent/CN107133153A/en
Application granted granted Critical
Publication of CN107133153B publication Critical patent/CN107133153B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method and a system for setting authority to a user and monitoring the condition of using a terminal by the user in a targeted manner. When the user uses the terminal, the authority setting of the user is obtained, and the monitoring mode is entered. And when at least one of the continuous operation time of the terminal and the accumulated operation time of the controlled application type reaches the set maximum time, sending a reminding message to the user and locking the terminal screen.

Description

User monitoring system
Technical Field
The invention relates to the field of intelligent terminals, in particular to a system and a corresponding method for setting authority for a user and reminding the user when the user uses a terminal.
Background
Along with the common use of intelligent terminals such as computers, mobile phones and PADs in different people, contents such as entertainment videos, electronic games and social network sites are continuously enriched, and when a user uses the terminal to browse the entertainment resources, the user can easily ignore the use duration, and the user can be immersed in the intelligent terminal for a long time, so that the intelligent terminal particularly affects the health of children, teenagers and the old.
In order to avoid the situation that a user watches videos, plays games, surfs the internet and the like by using a terminal for a long time, various solutions are provided in the prior art, for example, the screen is automatically locked after the videos are played for a certain time, so that the user cannot use the terminal within a period of time, or the time for using the terminal by the user is detected, a rest prompt is sent to the user, and the user selects whether to pause the use.
However, the above prior art does not take into consideration the use requirements and habits of different users, for example, the length of time for which children continuously watch videos or play games is different from the length of time for which adults or the elderly people are suitable. For another example, when the user is in a working state, if the screen is directly locked or the current program is skipped out only according to the terminal use duration, the current working schedule of the user cannot be saved in real time, which is likely to cause loss to the user.
Therefore, the existing monitoring and detecting method only considers the use duration of the user, performs uniform restrictive control when the use duration of the user reaches a preset threshold, does not consider the use requirements of different types of users, does not monitor the application to be monitored in a targeted manner, cannot meet the personalized requirements of the user, and causes low user experience.
Disclosure of Invention
Therefore, the technical problem to be solved by the invention is to set and monitor the right with pertinence when the user uses the terminal according to the requirements of different users. Furthermore, in order to simplify the operation of setting the authority for different users, the invention also provides a method for setting the authority for the users by adopting a preset template and updating the template in time.
Therefore, the invention provides a method for setting authority for a terminal user, which is characterized by comprising the following steps:
step S101, obtaining an account list stored in a terminal system, wherein the account list is all account lists which are stored in the system and can be logged in the terminal system;
step S102, selecting an account needing permission setting, and entering a permission setting interface;
step S103, setting a user label for the user account, judging whether a general configuration template of the corresponding user label exists in a database according to the set user label, if so, configuring the authority of the user account according to the general configuration template, and storing the configured user authority in a user authority list; otherwise, step S104 is carried out, and a new authority is established for the user account;
step S104, acquiring an installed application program list in the terminal;
step S105, selecting an application program to be monitored according to the actual requirement of the user, setting the type of the application program, and setting a uniform use permission for the set program type;
and step S106, storing the authority setting of the user in a user authority list, and storing the authority setting of the user as a universal authority configuration template of a corresponding user label.
The operation of setting the permission further includes increasing or decreasing types of applications that need to be monitored, or increasing or decreasing specific application programs that need to be monitored in a certain type of applications, and modifying the unified usage permission of the monitored application types.
Further, step S103 further includes, if the system has a generic permission configuration template of the tag stored in advance, directly configuring the user account permission with the tag as the generic configuration of the tag, or adding, deleting or modifying the permission setting according to the generic configuration template of the tag.
Step S103 may further include updating the generic configuration template for the tag. And when the permission setting of the user to a certain application type is higher or lower than the general setting, the permission setting originally used in the general setting template is combined, and the use permission of the application type in the general setting template is increased or decreased according to a proper proportion.
The invention also provides a method for reminding the terminal user, which is characterized by comprising the following steps:
step S201, obtaining user account information according to a login account of a user, and further searching whether the authority setting of the user exists in an authority setting list;
step S202, if the user is in the authority list, the authority setting of the user is read, the monitoring mode is started, and the step S203 is entered, if the user does not exist in the authority list, the user normally uses the terminal, and does not enter the monitoring mode;
step S203, starting a timing function, and recording the continuous operation time of the terminal and the accumulated operation time of the monitored application type;
step S204, respectively judging whether the continuous operation time of the terminal and the accumulated operation time of the monitored application type reach the maximum time set for the user in the authority list, and when at least one of the continuous operation time and the accumulated operation time reaches the set maximum time, sending a reminding message to the user and locking the terminal screen.
Further, step S203 further includes that when the user launches the application program set to be prohibited from launching, the system issues a prompt to the user. Timing the running time of the currently running application program, recording the running time as the running time of the application type, and storing the timed running time when the application program is converted into a background program or is ended; when the application program is restarted or a new monitored application program is started, timing is continuously carried out and the application program is stored as the running time of the corresponding application type; and if the type of the newly started program is the same as that of the program monitored before, accumulating the running time to form the accumulated running time of the application type.
The invention also provides a user monitoring system which comprises a user permission setting device and a user reminding device. The user authority setting device is used for setting the authority of the user for using the terminal; the user reminding device is used for monitoring the terminal use condition of the user and reminding the user.
By the scheme of the invention, different use authorities and reminding operations can be set for different user accounts on the terminal, so that the use requirements of different people are met, and the user experience of the terminal is enhanced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings used in the description of the embodiments of the present invention will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the contents of the embodiments of the present invention and the drawings without creative efforts.
Fig. 1 is a flowchart of a user authority setting method of the present invention.
Fig. 2 is a flow chart of a user reminding method of the invention.
Fig. 3 is a schematic structural diagram of a user monitoring system according to the present invention.
Fig. 4 is a schematic structural diagram of a rights configuration module according to the present invention.
Detailed Description
In order to make the technical problems solved, technical solutions adopted and technical effects achieved by the present invention clearer, the technical solutions of the embodiments of the present invention will be described in further detail below with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to enable users of different types to perform targeted monitoring when using the same terminal, the users of different types need to be respectively set with use permissions, for example, in family members, the user use permissions are respectively set for children, old people and adults according to the use requirements. Therefore, each user using the terminal should establish a personal login account in advance, so that personalized monitoring can be realized by logging in the personal account when the terminal is used.
The terminal can be an intelligent terminal such as a computer, a mobile phone and a PAD.
In order to simplify the operation process of the permission setting, a universal permission configuration template can be set in advance for different types of users and stored in the system for direct use during permission setting, or the universal permission configuration template is modified on the basis, so that the operation of the permission setting is simplified.
Fig. 1 is a flowchart of a user authority setting method according to the present invention.
First, in step S101, an account list that has been saved in the terminal system is acquired. The account list is a list of used accounts which are saved in the system and can be logged in the terminal system, and preferably can be presented in the form of user ID.
In order to ensure that the security of the authority setting is improved, only an operator with certain authority, such as an administrator identity, can be allowed to enter the user monitoring system for user authority configuration.
And step S102, selecting an account needing permission setting, and entering a permission setting interface.
Step S103, setting a user label for the user account, and judging whether a general configuration template of the corresponding user label exists in the database according to the set user label. If the universal configuration template exists, configuring the authority of the user account according to the universal configuration template, and storing the configured user authority in a user authority list. Otherwise, step S104 is entered to establish a new authority for the user account.
The user tag may be used to label the user type, and preferably, the user tag is set to be children, adults, elderly people, etc. according to the user characteristics. And storing the user tag, and searching whether the system stores the general authority configuration template of the tag or not according to the user tag. If the system has the universal authority configuration template of the label stored in advance, the administrator can make appropriate modification on the basis of the template so as to improve the configuration efficiency. Specifically, the user account authority with the tag may be directly configured as the general configuration of the tag, or the authority setting therein may be added, deleted, or modified according to the general configuration template of the tag, so as to form a more personalized authority configuration.
Specifically, the setting of the user person may be modified by increasing or decreasing the types of applications that need to be monitored, or by increasing or decreasing the specific applications that need to be monitored in a certain application type, and by modifying the specific usage rights of the monitored application type.
The setting of the usage right may include, but is not limited to, setting whether the user has the right to start the application program, setting the maximum duration for which the user continuously uses the type of application, setting the maximum duration for which the terminal continuously operates, and the like.
For example, when the user object currently set with the permission is a child, the tag of the user can be set as "child", and whether a universal permission configuration template tagged with "child" exists is searched in the system, and if the universal permission configuration template exists, the universal permission configuration can be directly set as the permission setting of the user according to needs, or the universal permission configuration can be modified in a targeted manner.
When the user right is modified according to the general configuration, the user's actual situation and the current application installed in the terminal can be changed, for example, in the general configuration, the "children" limited application types include a "video" class and a "game" class, wherein the "video" class includes "you and cool", "love and fun" and "Teng and news video", and the "game" class includes "happy and happy", and "fishing dare". For the user, the administrator considers that monitoring on the social application program is needed, so that the administrator adds the social application program in the permission type setting item, selects the social application program installed in the terminal as a monitored object, and selects the microblog application program and the WeChat application program as the monitored application program. According to the same principle, the administrator can also choose to delete the controlled program type or the specific application program. Also in this example, the "children" generic configuration has a maximum continuous viewing duration setting of 20 minutes for the "video" type application, a permission setting of "no" start for the "game" type application, and a maximum continuous operation duration setting of 1 hour for the terminal. The administrator can modify the maximum continuous use time of the video application to 15 minutes and the maximum continuous operation time of the terminal to 40 minutes according to needs.
And step S104, acquiring an installed application program list in the terminal so as to perform further application program permission setting.
And step S105, selecting the application program to be monitored according to the actual requirement of the user, setting the type of the application program, and setting a uniform use permission for the set program type.
Specifically, for example, the selected application is "you and cool", "love and fancy", or "microblog" installed on the terminal, the type of "you and cool" or "love and fancy" in the selected application is set as "video", the type of "microblog" is set as "social", and the usage rights of the "video" class and the "social" class are respectively set.
And step S106, storing the authority setting of the user in a user authority list, and storing the authority setting of the user as a universal authority configuration template of a corresponding user label.
Step S103 may further include, after modifying and configuring the user permission according to the general configuration of the tag and storing the configured user permission in the user permission list, updating the general configuration of the tag, for example, when the permission setting for the user to a certain type of application program is higher or lower than the general setting, increasing or decreasing the usage permission of the application type in the general setting template according to an appropriate proportion by combining the original permission setting in the general setting template.
The user authority setting method of the invention can also modify the user authority of the set authority, the specific modification mode is to obtain the authority list of the terminal user, select the user to be modified and modify the set authority, and the modification mode can refer to the specific steps described in the method.
The user authority setting method can also detect whether a new account is used and the use authority is not set at any time, and sends a prompt to an administrator when finding a new account without the set authority so as to prompt the administrator to set the authority of the new account.
The permission setting method can set the permission for each user, thereby realizing the personalized setting for different users. In addition, a universal setting template is set in the initial stage, and the complexity of authority setting is greatly simplified.
Fig. 2 is a flow chart of a user reminding method according to the invention.
First, in step S201, user account information is obtained according to a login account of a user, and further, whether an authority setting of the user exists is searched in an authority setting list.
Step S202, if the account is in the authority list, the authority setting of the user is obtained, the monitoring mode is started, and the step S203 is entered. If the user does not exist in the authority list, the user can normally use the terminal without entering a monitoring mode.
Step S203, starting a timing function, and recording the continuous operation time of the terminal and the accumulated operation time of the monitored application type.
When the user starts the application program which is set to be prohibited from starting, the system gives a prompt to the user to inform the user that the user cannot start the application program.
Preferably, the specific process of recording the accumulated running time of the monitored application type includes timing the running time of the currently running application program, and recording the running time as the running time of the application type. When the application program is converted into a background program or is finished, the running time length which is counted is saved. And when the application program is started again or a new monitored application program is started, timing is carried out again, and the running time length of the corresponding application type is saved. And if the newly started program type is the same as the previously monitored program type, accumulating the newly stored running time length and the previous running time length to form the accumulated running time length of the application type.
And step S204, respectively judging whether the continuous operation time of the terminal and the accumulated operation time of the monitored application type reach the maximum time set in the authority list, and when at least one of the continuous operation time and the accumulated operation time reaches the maximum time set by the authority list, sending a reminding message to a user and locking a terminal screen.
Through the dual monitoring of the continuous operation time of the terminal and the accumulated operation time of the monitored application type, the individuation and the practicability of the monitoring are effectively provided, and the requirements of different users are met. For example, considering the requirement that an adult should avoid being disturbed by a monitoring reminder when using a terminal to work, but should perform a proper reminding rest when working for a long time, the continuous operation time of the terminal in the authority setting can be set to be a longer time, such as 3 hours, and the accumulated operation time of the monitored application type can be set as a normal monitoring parameter, such as 30 minutes, so that when a user uses the terminal to work, as long as the user does not use the monitored application for a long time, the system monitors the use condition of the user through the continuous operation time of the terminal, and sends out a reminder when the maximum time is reached, so as to prompt the user to save the work progress and avoid the work progress from being lost. The monitoring device can meet the working requirements of the user, can remind the user to have a rest after the user works for a long time, and meets the personalized requirements of the user.
By way of illustration, the above monitoring reminder setting manner is only used as an example, and the monitoring reminder setting manner of the present invention is not limited thereto, and those skilled in the art can also perform more targeted monitoring reminder settings for the user within the understandable scope.
Fig. 3 is a schematic diagram of a user monitoring system according to the present invention.
The user monitoring system comprises a user authority setting device 100 and a user reminding device 200.
The user authority setting device 100 includes an account acquisition module 101, a selection module 102, an authority configuration module 103, and a database 104.
The database 104 is used for storing a user permission list and a tag general permission configuration template.
The account acquisition module 101 acquires an account list stored in the terminal system. The account list is the accounts used by the system, which can log in the terminal system, and can be preferably presented in the form of account ID.
In order to ensure that the security of the permission setting is improved, only an operator with certain permission, such as an administrator identity, may be allowed to enter the permission setting apparatus 101 for user permission configuration.
And the selection module 102 selects an account needing permission setting and enters a permission setting interface.
And the authority configuration module 103 is used for performing authority configuration on the user account. Referring to fig. 4, the right configuration module 103 may further include: a tab setting module 1031, a determination module 1032, a permission setting module 1033, an application acquisition module 1034, and an update module 1035.
Specifically, the tag setting module 1031 is responsible for setting a user tag for the user account.
The determining module 1032 determines whether a general configuration template corresponding to the user tag exists in the database 104 according to the set user tag, and provides the general configuration template to the authority setting module 1033 if the general configuration template exists.
The authority setting module 1033 configures the authority of the user according to the general configuration template, and stores the configured authority of the user in the user authority list.
When the general configuration template of the corresponding user tag does not exist in the database 104, the application acquisition module 1034 acquires a list of applications installed in the terminal and provides the list to the permission setting module 1033 for further permission setting.
When the permission setting module 1033 sets permission for a user tag without a general configuration template, it selects an application program to be monitored according to the actual requirements of the current user, sets the type of the application program, and sets a uniform usage permission for the set program type. After the setting is finished, the authority setting of the user is stored in a user authority list, and the authority setting of the user is stored as a universal authority configuration template of a corresponding user label.
Further, after the user's permission is modified and configured according to the general configuration of the tag and the configured user permission is stored in the user permission list, the update module 1035 may update the general configuration template of the tag.
The specific updating mode may be that when the permission setting for the user to a certain application type is higher or lower than the general setting, the permission setting originally used in the general setting template is combined to increase or decrease the usage permission of the application type in the general setting template according to a proper proportion.
As shown in fig. 3, the user reminding device 200 in the user monitoring system is used for monitoring the terminal usage of the user and reminding the user. The user reminding device 200 comprises an account information acquisition module 201, a starting module 202, a timing module 203 and a reminding module 204.
The account information obtaining module 201 obtains the user account information according to the login account of the user, and further searches whether the user exists in the permission setting list.
If the account is in the authority list, the initiation module 202 initiates entry into a monitoring mode. And if the user does not exist in the authority list, the monitoring mode is not started, and the user normally uses the terminal.
After entering the monitoring mode, the timing module 203 starts a timing function, and records the continuous operation time of the terminal and the operation duration of the monitored application type.
The reminding module 204 obtains the authority setting content of the account from the database, and when the user starts the application program which is set to be prohibited from starting, the reminding module 204 sends a prompt to the user to inform the user that the user cannot start the program.
The timing module 203 respectively judges whether the continuous operation time of the terminal and the accumulated operation time of the monitored application type reach the maximum time set in the authority list, and when at least one of the continuous operation time and the accumulated operation time reaches the maximum time set by the timing module, the reminding module 204 sends a reminding message to the user and locks the terminal screen.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware as instructed by a computer program, which may be stored on a computer readable storage medium and executed by a processor. The computer-readable storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The foregoing describes preferred embodiments of the present invention, and is intended to provide a clear and concise description of the spirit and scope of the invention, and not to limit the same, but to include all modifications, substitutions, and alterations falling within the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. A method for setting authority for a terminal user is characterized in that:
step S101, obtaining an account list stored in a terminal system, wherein the account list is all account lists which are stored in the system and can be logged in the terminal system; wherein, only allowing the administrator to enter the user monitoring system for user authority configuration;
step S102, selecting an account needing permission setting, and entering a permission setting interface;
step S103, setting a user label for the account, wherein the user label is used for marking the user type, storing the user label, judging whether a general configuration template of the corresponding user label exists in a database according to the set user label, if so, configuring the authority of the user account according to the general configuration template, and storing the configured user authority in a user authority list; otherwise, step S104 is carried out, and a new authority is established for the user account;
step S104, acquiring an installed application list in the terminal;
step S105, according to the actual requirement of the user, selecting the application to be monitored, setting the application type, and setting a uniform use permission for the set application type;
step S106, storing the authority setting of the user in a user authority list, and storing the authority setting of the user as a general configuration template of a corresponding user label;
step S103 further includes, if the system has pre-stored the generic configuration template of the tag, directly configuring, by the administrator, the user account permission having the tag as the generic configuration of the tag, or only allowing the administrator to add, delete or modify the permission settings therein according to the generic configuration template of the tag, where the operation on the permission settings further includes increasing or decreasing the application types that need to be monitored, or only allowing the administrator to increase or decrease the specific applications that need to be monitored in a certain type of applications, and modifying the unified usage permission of the monitored application types;
step S103 further comprises the steps of updating the general configuration template of the label after modifying and configuring the user authority according to the general configuration of the label and storing the configured user authority in the user authority list; when the permission setting of the user to a certain application type is higher or lower than the general configuration, combining the permission setting originally used in the general configuration template, and only allowing an administrator to proportionally increase or decrease the use permission of the application type in the general configuration template;
the unified use authority comprises whether the user has the authority of starting the application or not, the maximum duration of the continuous use of the application by the user or the maximum duration of the continuous operation of the terminal;
and when detecting that a new account without the set authority exists, sending a prompt to an administrator to prompt the administrator to set the authority of the new account.
2. The method of claim 1, wherein step S103 further comprises modifying the permissions of the users with set permissions, including obtaining a permission list of the end user, selecting a user to be modified, and modifying the user according to the set permissions.
3. A method of alerting an end user, for use in conjunction with the method of setting permissions for end users of claims 1 or 2, characterized by:
step S201, obtaining user account information according to a login account of a user, and further searching whether the authority setting of the user exists in an authority setting list;
step S202, if the user is in the authority list, the authority setting of the user is read, the monitoring mode is started, and the step S203 is entered, if the user does not exist in the authority list, the user normally uses the terminal and does not enter the monitoring mode;
step S203, starting a timing function, and recording the continuous operation time of the terminal and the accumulated operation time of the monitored application type;
step S204, respectively judging whether the continuous operation time of the terminal and the accumulated operation time of the monitored application type reach the maximum time set for the user in the authority list, and when at least one of the continuous operation time and the accumulated operation time reaches the set maximum time, sending a reminding message to the user and locking the terminal screen.
4. The method of claim 3, wherein: step S203 further includes that when the user launches an application that is set to be prohibited from launching, the system issues a message prompt to the user.
5. The method of claim 3, wherein: step S203 further includes timing the running time of the currently running application, recording the running time as the running duration of the application type, and saving the timed running duration when the application is converted into a background program or is ended; when the application is started again or a new monitored application is started, timing is carried out again and the running time length of the corresponding application type is saved; and if the newly started application type is the same as the previously monitored application type, accumulating the running time length to form the accumulated running time length of the application type.
6. A user authority setting device (100) for setting authority of a user to use a terminal, the device (100) comprising an account acquisition module (101), a selection module (102), an authority configuration module (103), a database (104), characterized in that:
the account acquisition module (101) is used for acquiring an account list stored in a terminal system, wherein the account list is all account lists which are stored in the system and can be logged in the terminal system; wherein, only allowing the administrator to enter the user monitoring system for user authority configuration;
the selection module (102) selects an account needing permission setting and enters a permission setting interface;
the authority configuration module (103) is used for carrying out authority configuration on the user account; when a new account without set authority is detected, sending a prompt to an administrator to prompt the authority setting of the new account;
the authority configuration module (103) comprises a label setting module (1031), a judgment module (1032) and an authority setting module (1033); a label setting module (1031) for setting a user label for the user account, wherein the user label is used for marking the user type and storing the user label; a judging module (1032) which judges whether the general configuration template of the corresponding user label exists in the database according to the set user label, if so, the template is provided to the authority setting module (1033);
the authority setting module (1033) configures the authority of the user according to the general configuration template and stores the configured user authority in a user authority list; when the authority setting module (1033) sets the authority for the user label without the universal configuration template, the application to be monitored is selected according to the actual requirement of the current user, the application type is set, the uniform use authority is set for the set application type, the authority setting of the user is stored in the user authority list, and the authority setting of the user is stored as the universal configuration template of the corresponding user label; the unified using authority comprises whether the user has the authority of starting the application, the maximum duration of the continuous use of the application by the user and the maximum duration of the continuous operation of the terminal;
the permission configuration module (103) further comprises an application program acquisition module (1034), when the database (104) does not have a general configuration template of a corresponding user tag, the application program acquisition module (1034) acquires an installed application list in the terminal and provides the application list to the permission setting module (1033) for further permission setting;
the authority configuration module (103) further comprises an updating module (1035), and after the authority of the user is modified and configured according to the general configuration of the label and the configured authority of the user is stored in the user authority list, the updating module (1035) updates the general configuration template of the label according to the configured authority of the user; when the permission setting of the user to a certain application type is higher or lower than the general configuration, the updating module (1035) proportionally increases or decreases the use permission of the application type in the general configuration template by combining the original permission setting of the general configuration template.
7. A user reminding device (200) used in cooperation with the user permission setting device (100) of claim 6, for monitoring the terminal usage of a user and reminding the user, wherein the user reminding device (200) comprises an account information acquisition module (201), a starting module (202), a timing module (203) and a reminding module (204), and is characterized in that:
the account information acquisition module (201) is used for acquiring user account information according to the login account of the user and further searching whether the user exists in the authority setting list;
a starting module (202), if the account is in the authority list, starting to enter a monitoring mode, if the user does not exist in the authority list, the monitoring mode is not started, and the user normally uses the terminal; the timing module (203) starts a timing function after entering the monitoring mode, and records the continuous operation time of the terminal and the accumulated operation time of the monitored application type;
and the reminding module (204) is used for sending a prompt to the user when the user starts the application which is set to be prohibited from starting, informing the user that the application cannot be started, sending a reminding message to the user when at least one of the continuous running time of the terminal or the accumulated running time of the controlled application type reaches the set maximum time length, and locking the screen of the terminal.
8. A user monitoring system is used for monitoring the use condition of a user to a terminal, and is characterized in that: the system comprises the user right setting device (100) as claimed in claim 6, and the user reminding device (200) as claimed in claim 7.
CN201710444582.6A 2017-06-13 2017-06-13 User monitoring system Active CN107133153B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710444582.6A CN107133153B (en) 2017-06-13 2017-06-13 User monitoring system
PCT/CN2017/099058 WO2018227763A1 (en) 2017-06-13 2017-08-25 User monitoring system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710444582.6A CN107133153B (en) 2017-06-13 2017-06-13 User monitoring system

Publications (2)

Publication Number Publication Date
CN107133153A CN107133153A (en) 2017-09-05
CN107133153B true CN107133153B (en) 2020-10-02

Family

ID=59734289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710444582.6A Active CN107133153B (en) 2017-06-13 2017-06-13 User monitoring system

Country Status (2)

Country Link
CN (1) CN107133153B (en)
WO (1) WO2018227763A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046486B (en) * 2019-04-10 2021-02-26 芋头科技(杭州)有限公司 Intelligent interaction equipment control method, system, controller and medium
CN111144833A (en) * 2019-12-04 2020-05-12 珠海格力电器股份有限公司 Terminal browsing timeout processing method, device, equipment and storage medium
CN114064386A (en) * 2020-08-05 2022-02-18 广东小天才科技有限公司 Remote management system and method for earphone use duration
CN112417408A (en) * 2020-12-11 2021-02-26 北京北信源软件股份有限公司 Authority control method and device, electronic equipment and storage medium
CN114611144A (en) * 2022-03-11 2022-06-10 北京百度网讯科技有限公司 Authority control method, device, equipment, medium and program product

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080155538A1 (en) * 2005-03-14 2008-06-26 Pappas Matthew S Computer usage management system and method
CN102143493A (en) * 2011-01-26 2011-08-03 惠州Tcl移动通信有限公司 Mobile communication terminal with user management function and user management method thereof
US9081974B2 (en) * 2011-11-10 2015-07-14 Microsoft Technology Licensing, Llc User interface for selection of multiple accounts and connection points
CN103108082B (en) * 2013-01-24 2014-06-04 北京航空航天大学 Smartphone multi-user mode permission management method and smartphone multi-user mode permission management system
CN106101084A (en) * 2016-06-01 2016-11-09 中青奇未(北京)网络科技有限公司 A kind of user behavior control method and system and a kind of safety desktop

Also Published As

Publication number Publication date
WO2018227763A1 (en) 2018-12-20
CN107133153A (en) 2017-09-05

Similar Documents

Publication Publication Date Title
CN107133153B (en) User monitoring system
US10447632B2 (en) Filtering notifications from a third party application to a user of a social networking system based on an action of the user
JP6434645B2 (en) Information processing method, terminal, and computer storage medium
US8583759B2 (en) Creation and presentation of selective digital content feeds
US10412232B2 (en) Converged family network usage insights and actions
US9871824B2 (en) Unified policy over heterogenous device types
US20120047448A1 (en) System and method for social browsing using aggregated profiles
EP3104623B1 (en) System and method of supervisory control
CN105100207A (en) Method and system for intelligently controlling child for getting online by parents
CN111465016B (en) Control method and device
CN105991407B (en) Message processing method and device and processing server
CN103716340B (en) Terminal device and information processing method
CN107147623A (en) A kind of method of particular browser filtering network address
CN104376009A (en) Microblog page enriching method, system and device
CN109767268A (en) A kind of advertisement sending method, device, storage medium and computer equipment
CN104202666A (en) Smart television/set-top box application software based control method
CN113742683A (en) Multi-screen anti-addiction method and system, server, user terminal and storage medium
CN106874455B (en) Task plan recommendation method and device and server
US20170127140A1 (en) Method and system for reminding appointment of live programs and computer-readable medium
CN106034256B (en) Video social contact method and device
US10413818B2 (en) Monitoring an application on a processing device
CN104144386A (en) Information interaction and cooperation method and device
CN115811636B (en) Security management method for application background startup on intelligent television
JP2011166622A (en) Recording-reservation management device and method for video content, and computer program
CN113064659A (en) Application program management method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant