CN108966140B - Network control method, system, mobile terminal and storage medium - Google Patents

Network control method, system, mobile terminal and storage medium Download PDF

Info

Publication number
CN108966140B
CN108966140B CN201810515090.6A CN201810515090A CN108966140B CN 108966140 B CN108966140 B CN 108966140B CN 201810515090 A CN201810515090 A CN 201810515090A CN 108966140 B CN108966140 B CN 108966140B
Authority
CN
China
Prior art keywords
network
shielding
target application
application information
request instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810515090.6A
Other languages
Chinese (zh)
Other versions
CN108966140A (en
Inventor
袁哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingwei Intelligent Technology (Shanghai) Co., Ltd.
Original Assignee
Jingwei Intelligent Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingwei Intelligent Technology Shanghai Co ltd filed Critical Jingwei Intelligent Technology Shanghai Co ltd
Priority to CN201810515090.6A priority Critical patent/CN108966140B/en
Publication of CN108966140A publication Critical patent/CN108966140A/en
Application granted granted Critical
Publication of CN108966140B publication Critical patent/CN108966140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/60Jamming involving special techniques
    • H04K3/68Jamming involving special techniques using passive jamming, e.g. by shielding or reflection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention provides a network control method, a system, a mobile terminal and a storage medium, wherein the method comprises the following steps: when a network request instruction is received, acquiring the current time and judging whether the current time is in a network shielding time period; if not, acquiring the current positioning coordinate and judging whether the current positioning coordinate is in the range of the network shielding area; if not, acquiring target application information in the network request instruction, and judging whether the target application information is matched with the application shielding list; if yes, no response is made to the network request instruction; if not, network link response is carried out aiming at the target port information and the target application information, the method does not need to manually control the carrying of the mobile terminals such as the mobile phone by the children, and prevents the children from carrying out networking operation of the mobile terminals such as the mobile phone in class period or at night by correspondingly controlling the response or non-response mode aiming at the network request instruction through judging the current time, the current positioning coordinate and the target application information.

Description

Network control method, system, mobile terminal and storage medium
Technical Field
The present invention relates to the field of network communication technologies, and in particular, to a network control method, system, mobile terminal, and storage medium.
Background
With the rapid development of the communication industry, mobile phones are widely used, the mobile phones are more intelligent, the functions are more diversified, the mobile phones have a basic conversation function, an internet surfing function, an audio-visual function, a game function and the like, and the smart phones bring great convenience to the life of people and also bring serious influence to immature life. Minors are the future of our country and are concerned by the key of the country, and in order to prevent minors from being influenced by games and internet bad information, the country strictly forbids minors to enter internet cafes, but because the intelligence is equivalent to a microcomputer, the online games and internet bad information on the mobile phone are very much, and the minors can be used anytime and anywhere, even play surreptitiously in class, and seriously influence the learning and life of minors, so people pay more and more attention to the network control problem on mobile equipment.
In the existing network control method, parents can only artificially control children to go to school without carrying mobile phones so as to prevent the children from being connected with the network to play the mobile phones in class, but the mode of controlling the children without the mobile phones is adopted, so that the communication with the daily life of the children is inconvenient, and the communication between the parents and the children is inconvenient.
Disclosure of Invention
Based on this, the invention provides a network control method, a system, a mobile terminal and a storage medium, which are used for solving the problem of inconvenient communication caused by adopting control without carrying a mobile phone in the prior art.
In a first aspect, the present invention provides a network control method, including:
when a network request instruction is received, acquiring current time and judging whether the current time is in a network shielding time period or not, wherein the network request instruction comprises target application information and target port information;
when the current time is judged not to be in the network shielding time period, acquiring a current positioning coordinate and judging whether the current positioning coordinate is in a network shielding area range, wherein the network shielding area range is an area formed by taking a shielding point preset by a user as a center;
when the current positioning coordinate is judged not to be in the network shielding area range, acquiring target application information in the network request instruction, and judging whether the target application information is matched with a locally stored application shielding list or not, wherein the target application information comprises an application name and an application network port address;
if yes, no response is carried out aiming at the network request instruction;
and if not, performing network link response aiming at the target port information and the target application information.
According to the network control method, through the design of judgment between the current time and the network shielding time period, the operation of connecting the network by a child in the network shielding time period can be effectively prevented, through the design of judgment between the current positioning coordinate and the network shielding area range, the operation of connecting the network by the child in the network shielding area range can be effectively prevented, through the design of matching judgment between the target application information and the application shielding list, the use of the application in the application shielding list by the child can be effectively prevented, and through the judgment of the current time, the current positioning coordinate and the target application information, the child is prevented from carrying the mobile terminal such as a mobile phone in a mode of responding or not responding to the network request instruction in a corresponding control mode in class term or at night by the network control method of preventing the child from carrying the mobile terminal such as the mobile phone in the mode of responding or not responding to the network request instruction And (5) operating.
Further, the step of obtaining the current positioning coordinate and determining whether the current positioning coordinate is within the network shielding area range includes:
obtaining the shielding coordinates of the shielding points, inquiring a locally stored shielding length value, and drawing a circular area by taking the shielding coordinates as a circle center and the shielding length value as a radius to obtain the range of the network shielding area;
acquiring the current positioning coordinate, and judging whether the current positioning coordinate is in the range of the network shielding area;
and if so, judging that the current positioning coordinate is in the range of the network shielding area.
Further, after the step of obtaining the current time and determining whether the current time is within the network mask time period, the method further includes:
and when the current time is judged to be in the network shielding time period, not responding to the network request instruction.
Further, after the step of not responding to the network request instruction, the method further comprises:
sending a shielding control prompt, and judging whether the shielding frequency of sending the shielding control prompt in a preset time is greater than a frequency threshold value;
if yes, closing the network request port, and sending a shielding prompt signal to a preset communication port, wherein the preset communication port is a mobile phone communication port, a network communication port or an electronic equipment switch port.
Further, after the step of not responding to the network request instruction, the method further comprises:
judging whether a networking password is received;
when the networking password is judged to be received, whether the networking password is the same as a locally stored preset password or not is continuously judged;
and if so, performing network link response aiming at the target port information and the target application information.
Further, after the step of not responding to the network request instruction, the method further comprises:
and respectively acquiring the current time, the current positioning coordinates and the target application information, and forming a corresponding relationship among the current time, the current positioning coordinates and the target application information for storage.
In a second aspect, the present invention provides a network control system, including:
the device comprises a first judgment module, a second judgment module and a third judgment module, wherein the first judgment module is used for acquiring current time and judging whether the current time is in a network shielding time period or not when a network request instruction is received, and the network request instruction comprises target application information and target port information;
the second judging module is used for acquiring a current positioning coordinate and judging whether the current positioning coordinate is in a network shielding area range when the first judging module judges that the current time is not in the network shielding time period, wherein the network shielding area range is an area formed by taking a shielding point preset by a user as a center;
a third determining module, configured to, when the second determining module determines that the current location coordinate is not within the network shielding area range, obtain target application information in the network request instruction, and determine whether the target application information matches a locally stored application shielding list, where the target application information includes an application name and an application network port address;
the response module is used for not responding to the network request instruction when the third judgment module judges that the target application information is matched with the application screening list; and when the third judging module judges that the target application information is not matched with the application screening list, performing network link response aiming at the target port information and the target application information.
In the network control system, through the design of the first judging module for judging between the current time and the network shielding time period, the operation of connecting the network by the child in the network shielding time period can be effectively prevented, through the design of the second judging module for judging between the current positioning coordinate and the network shielding area range, the operation of connecting the network by the child in the network shielding area range can be effectively prevented, through the design of the third judging module for matching judgment between the target application information and the application shielding list, the use of the application in the application shielding list by the child can be effectively prevented, the network control system does not need to manually control the child to carry mobile terminals such as mobile phones, and the like, but judges the current time, the current positioning coordinate and the target application information, and the children are prevented from performing networking operation of the mobile terminal such as a mobile phone in class period or at night in a mode of correspondingly controlling response or non-response to the network request instruction.
Further, the second determination module includes:
the area drawing unit is used for acquiring the shielding coordinates of the shielding points, inquiring a locally stored shielding length value, and drawing a circular area by taking the shielding coordinates as a circle center and the shielding length value as a radius to obtain the range of the network shielding area;
the judging unit is used for acquiring the current positioning coordinate and judging whether the current positioning coordinate is in the range of the network shielding area; and if so, judging that the current positioning coordinate is in the range of the network shielding area.
In a third aspect, the present invention provides a mobile terminal, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the computer program to make the mobile terminal execute the network control method.
In a fourth aspect, the present invention provides a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the network control method described above.
Drawings
Fig. 1 is a flowchart of a network control method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a network control method according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of a network control system according to a third embodiment of the present invention.
Detailed Description
In order to facilitate a better understanding of the invention, the invention will be further explained below with reference to the accompanying drawings of embodiments. Embodiments of the present invention are shown in the drawings, but the present invention is not limited to the preferred embodiments described above. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Referring to fig. 1, a flowchart of a network control method according to a first embodiment of the present invention includes steps S10 to S50.
Step S10, when receiving the network request instruction, obtaining the current time and judging whether the current time is in the network shielding time period;
the network request instruction comprises target application information and target port information, the network request instruction can be a voice instruction, a touch instruction or a text instruction, and the like, for example, when the network control method is applied to a mobile phone, the network request instruction is a touch instruction, for example, a touch signal for different APP applications or a request for different network addresses, preferably, the network shielding time period is a time period preset by a parent of a user, for example, 8 o 'clock to 12 o' clock in the morning, 2 o 'clock to 5 o' clock in the afternoon, or 9 o 'clock to 7 o' clock in the early morning, and the time period is a time period for limiting network use on a mobile phone of a child by the parent of the user, so as to prevent the child from using network through the mobile phone in class time or in the evening.
When it is determined at step S10 that the current time is not in the network mask time period, performing step S20;
when the step S10 determines that the current time is in the network mask time period, no response is made to the network request instruction, so as to prevent the use of the mobile phone network by the child.
Step S20, acquiring a current positioning coordinate and judging whether the current positioning coordinate is in a network shielding area range;
the network shielding region range is a region formed by taking a shielding point preset by a user as a center, the current positioning coordinate can be automatically positioned according to the GPS function of the mobile phone, the shielding point can be a coordinate point preset by a parent of the user, the coordinate point can be a coordinate of a school of children or any coordinate point of the child on the way of learning, and therefore the use of the network on the mobile phone in the school region range or on the way of learning of the children is effectively prevented.
When the step S20 determines that the current location coordinate is not within the network shielded area range, execute step S30;
when the current positioning coordinate is determined to be in the network shielding area range in step S20, no response is made to the network request instruction, so as to prevent a child from using the mobile phone network.
Step S30, obtaining the target application information in the network request instruction, and judging whether the target application information is matched with a locally stored application shielding list;
the target application information comprises an application name and an application network port address, the application screening list is an application blacklist preset by a user parent, and the application blacklist stores a plurality of application names.
When the step S30 determines that the target application information matches the application mask list, step S40 is performed.
Step S40, not responding to the network request instruction;
the design that the network request is not responded is adopted, so that the corresponding application cannot realize the function of the network request, for example, when the application which is needed to be used by a child currently is WeChat and a user parent marks the WeChat in the application shielding list in advance, the network link request for the WeChat is not responded at the moment, so that the WeChat function cannot normally operate, and the use of the WeChat function by the child is effectively prevented.
In addition, in this embodiment, when the step S10 determines that the current time is in the network shielded time period, or when the step S20 determines that the current location coordinate is within the network shielded area range, the step S40 is directly performed.
When the step S30 determines that the target application information does not match the application mask list, execute step S50.
Step S50, performing a network link response for the target port information and the target application information.
In this embodiment, through the design of judging between the current time and the network shielding time period, a child can be effectively prevented from performing a network connection operation within the network shielding time period, through the design of judging between the current positioning coordinate and the network shielding area range, a child can be effectively prevented from performing a network connection operation within the network shielding area range, and through the design of matching judgment between the target application information and the application shielding list, a child can be effectively prevented from using an application in the application shielding list.
Referring to fig. 2, a flowchart of a network control method according to a second embodiment of the present invention is shown, the method includes steps S11 to S81.
Step S11, when receiving the network request instruction, obtaining the current time and judging whether the current time is in the network shielding time period;
the network request instruction comprises target application information and target port information, the network request instruction can be a voice instruction, a touch instruction or a text instruction, and the like, for example, when the network control method is applied to a mobile phone, the network request instruction is a touch instruction, for example, a touch signal for different APP applications or a request for different network addresses, preferably, the network shielding time period is a time period preset by a parent of a user, for example, 8 o 'clock to 12 o' clock in the morning, 2 o 'clock to 5 o' clock in the afternoon, or 9 o 'clock to 7 o' clock in the early morning, and the time period is a time period for limiting network use on a mobile phone of a child by the parent of the user, so as to prevent the child from using network through the mobile phone in class time or in the evening.
When it is determined at step S11 that the current time is in the network mask time period, step S21 is performed.
Step S21, not responding to the network request instruction;
the design that the network request is not responded is adopted, so that the corresponding application cannot realize the function of the network request, for example, when the application which is needed to be used by a child currently is WeChat and a user parent marks the WeChat in the application shielding list in advance, the network link request for the WeChat is not responded at the moment, so that the WeChat function cannot normally operate, and the use of the WeChat function by the child is effectively prevented.
Further, after the step of not responding to the network request instruction in step S21, the method further includes:
sending a shielding control prompt, and judging whether the shielding frequency of sending the shielding control prompt in a preset time is greater than a frequency threshold value;
the shielding control prompt is used for recording the number of times of being shielded by a network on a mobile phone or mobile terminal equipment of a child, and the shielding control prompt is sent so that parents of the user can conveniently know the network request condition applied to the mobile phone or the mobile terminal equipment of the child.
If yes, closing the network request port, and sending a shielding prompt signal to a preset communication port;
the preset communication port is a mobile phone communication port, a network communication port or an electronic equipment switch port, and the shielding prompt signal is used for reminding a parent and a child of a user that the child attempts to carry out a network link request for multiple times currently in a non-allowed internet surfing time, a non-allowed internet surfing area or a non-allowed application.
In addition, in this implementation, after the step of not responding to the network request command, the method further includes:
respectively acquiring the current time, the current positioning coordinates and the target application information, and forming corresponding relations among the current time, the current positioning coordinates and the target application information for storage;
the current time, the current positioning coordinate and the corresponding storage design of the target application information effectively facilitate the follow-up inquiry and understanding of the information by the parents of the user, and the parents of the user can use the network condition of the mobile phone or the mobile terminal of the child conveniently.
Step S31, determining whether a networking password is received;
wherein the networking password is used for network usage in special cases, i.e. when the networking password is received, the network usage can be performed at any time period, in any area range or at any application.
When it is determined at step S31 that the networking password is received, step S41 is performed.
Step S41, judging whether the networking password is the same as a preset password stored locally;
step S41 is configured to determine whether the received networking password is accurate, so as to prevent a child from initiating an operation of breaking through network shielding, thereby effectively improving the network control efficiency of the network control prevention.
When it is determined at step S41 that the networking password is the same as the preset password, step S51 is performed.
Step S51, making network link response to the target port information and the target application information;
when it is determined at step S11 that the current time is not in the network mask time period, step S61 is performed.
Step S61, obtaining the shielding coordinates of the shielding points, inquiring the locally stored shielding length value, and drawing a circular area by taking the shielding coordinates as the circle center and the shielding length value as the radius to obtain the network shielding area range;
the network shielding region range is a region formed by taking a shielding point preset by a user as a center, the current positioning coordinate can be automatically positioned according to the GPS function of the mobile phone, the shielding coordinate can be a coordinate point preset by a parent of the user, the coordinate point can be a coordinate of a school of children or any coordinate point of the child on the way of learning, and therefore the use of the network on the mobile phone in the school region range or on the way of learning of the children is effectively prevented.
Step S71, acquiring the current positioning coordinate, and judging whether the current positioning coordinate is in the network shielding area range;
and judging whether the current positioning coordinate is in the range of the network shielding area by adopting a coordinate point judgment mode, so that the control efficiency of the network control method is effectively improved.
When it is determined at step S71 that the current location coordinates are within the network shielded area range, step S21 is performed.
When it is determined at step S71 that the current location coordinates are not within the network shielded area range, step S81 is performed.
Step S81, obtaining the target application information in the network request instruction, and judging whether the target application information is matched with a locally stored application shielding list;
the target application information comprises an application name and an application network port address, the application screening list is an application blacklist preset by a user parent, and the application blacklist stores a plurality of application names.
When the step S81 determines that the target application matches the application mask list, step S21 is performed.
When the step S81 determines that the target application does not match the application mask list, execute step S51.
In this embodiment, through the design of judging between the current time and the network shielding time period, a child can be effectively prevented from performing a network connection operation within the network shielding time period, through the design of judging between the current positioning coordinate and the network shielding area range, a child can be effectively prevented from performing a network connection operation within the network shielding area range, and through the design of matching judgment between the target application information and the application shielding list, a child can be effectively prevented from using an application in the application shielding list.
Referring to fig. 3, a schematic structural diagram of a network control system 100 according to a third embodiment of the present invention includes:
a first judging module 10, configured to, when a network request instruction is received, obtain a current time and judge whether the current time is in a network shielding time period, the network request instruction comprises target application information and target port information, the network request instruction can be a voice instruction, a touch instruction or a text instruction and the like, for example, when the network control method is applied to a mobile phone, the network request command is a touch command, for example, a touch signal for different APP applications or a request for different network addresses, preferably, the network mask time period is a time period preset by the parents of the user, such as 8 to 12 am in the morning, 2 to 5 pm in the afternoon or 9 to 7 am in the evening, the time period is a time period in which parents of the user limit the use of the network on the mobile phone of the child so as to prevent the use of the network through the mobile phone of the child in class time or in the evening.
A second determination module 11, configured to obtain a current positioning coordinate and determine whether the current positioning coordinate is within a network shielding region range when the first determination module 10 determines that the current time is not in the network shielding time period, where the network shielding region range is a region formed by using a shielding point preset by a user as a center, where the current positioning coordinate may be automatically positioned according to a GPS function of the mobile phone itself, the shielding point may be a coordinate point preset by a parent of the user, and the coordinate point may be a coordinate of a school of a child or an arbitrary coordinate point of the child on the way of learning, so as to effectively prevent the use of the network on the mobile phone in the school region range or on the way of learning and learning of the child.
A third determining module 12, configured to, when the second determining module 11 determines that the current location coordinate is not within the network shielding region range, obtain target application information in the network request instruction, and determine whether the target application information matches a locally stored application shielding list, where the target application information includes an application name and an application network port address, the application shielding list is an application blacklist preset by a parent of a user, and a plurality of application names are stored in the application blacklist.
A response module 13, configured to not respond to the network request instruction when the third determining module 12 determines that the target application information matches the application screening list; when the third determining module 12 determines that the target application information does not match the application screening list, a network link response is performed with respect to the target port information and the target application information.
The shielding module 14 is configured to not respond to the network request instruction when the first determining module 10 determines that the current time is in the network shielding time period, where the design of not responding to the network request makes a corresponding application unable to implement a network request function, for example, when an application that a child needs to use currently is a WeChat and a parent of a user marks a WeChat in the application shielding list in advance, a network link request for the WeChat is not responded at this time, so that the WeChat function cannot operate normally, and use of the WeChat function by the child is effectively prevented.
A fourth determining module 15, configured to send a shielding control prompt when the response module 13 or the shielding module 14 does not respond to the network request instruction, and determine whether the shielding frequency of sending the shielding control prompt within a preset time is greater than a frequency threshold.
And a prompt module 16, configured to close the network request port and send a shielding prompt signal to a preset communication port when the fourth determination module 15 determines that the shielding frequency is greater than the frequency threshold, where the preset communication port is a mobile phone communication port, a network communication port, or an electronic device switch port.
A fifth judging module 17, configured to judge whether a networking password is received when the responding module 13 or the shielding module 14 does not respond to the network request instruction;
a sixth judging module 18, configured to, when the fifth judging module 17 judges that the networking password is received, continuously judge whether the networking password is the same as a locally stored preset password; and if so, performing network link response aiming at the target port information and the target application information.
A storage module 19, configured to obtain the current time, the current positioning coordinate, and the target application information, respectively, and form a corresponding relationship between the current time, the current positioning coordinate, and the target application information for storage.
Specifically, the second determining module 11 includes:
the area drawing unit 111 is configured to obtain a shielding coordinate of the shielding point, query a locally stored shielding length value, and draw a circular area with the shielding coordinate as a circle center and the shielding length value as a radius to obtain the network shielding area range;
a determining unit 112, configured to obtain the current positioning coordinate, and determine whether the current positioning coordinate is within the network shielding area; and if so, judging that the current positioning coordinate is in the range of the network shielding area.
In this embodiment, through the design of the first determining module 10 for determining between the current time and the network shielding time period, the operation of connecting the network by the child in the network shielding time period can be effectively prevented, through the design of the second determining module 11 for determining between the current location coordinate and the network shielding region range, the operation of connecting the network by the child in the network shielding region range can be effectively prevented, through the design of the third determining module 12 for determining matching between the target application information and the application shielding list, the use of the application in the application shielding list by the child can be effectively prevented, the network control system 100 does not need to manually control the child to carry the mobile terminal such as a mobile phone, but through the determination of the current time, the current location coordinate and the target application information, and the children are prevented from performing networking operation of the mobile terminal such as a mobile phone in class period or at night in a mode of correspondingly controlling response or non-response to the network request instruction.
The present embodiment also provides a storage medium having stored thereon a computer program that, when executed, comprises the steps of:
when a network request instruction is received, acquiring current time and judging whether the current time is in a network shielding time period or not, wherein the network request instruction comprises target application information and target port information;
when the current time is judged not to be in the network shielding time period, acquiring a current positioning coordinate and judging whether the current positioning coordinate is in a network shielding area range, wherein the network shielding area range is an area formed by taking a shielding point preset by a user as a center;
when the current positioning coordinate is judged not to be in the network shielding area range, acquiring target application information in the network request instruction, and judging whether the target application information is matched with a locally stored application shielding list or not, wherein the target application information comprises an application name and an application network port address;
if yes, no response is carried out aiming at the network request instruction;
and if not, performing network link response aiming at the target port information and the target application information. The storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The above-described embodiments describe the technical principles of the present invention, and these descriptions are only for the purpose of explaining the principles of the present invention and are not to be construed as limiting the scope of the present invention in any way. Based on the explanations herein, those skilled in the art will be able to conceive of other embodiments of the present invention without inventive effort, which would fall within the scope of the present invention.
More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.

Claims (9)

1. A method for network control, the method comprising:
when a network request instruction is received, acquiring current time and judging whether the current time is in a network shielding time period or not, wherein the network request instruction comprises target application information and target port information;
when the current time is judged not to be in the network shielding time period, acquiring a current positioning coordinate and judging whether the current positioning coordinate is in a network shielding area range, wherein the network shielding area range is an area formed by taking a shielding point preset by a user as a center;
when the current positioning coordinate is judged not to be in the network shielding area range, acquiring target application information in the network request instruction, and judging whether the target application information is matched with a locally stored application shielding list or not, wherein the target application information comprises an application name and an application network port address;
if so, not responding to the network request instruction, judging whether a networking password is received, continuing to judge whether the networking password is the same as a locally stored preset password when judging that the networking password is received, and if so, performing network link response on the target port information and the target application information;
and if not, performing network link response aiming at the target port information and the target application information.
2. The network control method according to claim 1, wherein the step of obtaining the current positioning coordinates and determining whether the current positioning coordinates are within the network shielded area comprises:
obtaining the shielding coordinates of the shielding points, inquiring a locally stored shielding length value, and drawing a circular area by taking the shielding coordinates as a circle center and the shielding length value as a radius to obtain the range of the network shielding area;
acquiring the current positioning coordinate, and judging whether the current positioning coordinate is in the range of the network shielding area;
and if so, judging that the current positioning coordinate is in the range of the network shielding area.
3. The network control method of claim 1, wherein after the step of obtaining the current time and determining whether the current time is within a network screening period, the method further comprises:
and when the current time is judged to be in the network shielding time period, not responding to the network request instruction.
4. The network control method of claim 3, wherein after the step of not responding to the network request instruction, the method further comprises:
sending a shielding control prompt, and judging whether the shielding frequency of sending the shielding control prompt in a preset time is greater than a frequency threshold value;
if yes, closing the network request port, and sending a shielding prompt signal to a preset communication port, wherein the preset communication port is a mobile phone communication port, a network communication port or an electronic equipment switch port.
5. The network control method of claim 1, wherein after the step of not responding to the network request instruction, the method further comprises:
and respectively acquiring the current time, the current positioning coordinates and the target application information, and forming a corresponding relationship among the current time, the current positioning coordinates and the target application information for storage.
6. A network control system, comprising:
the device comprises a first judgment module, a second judgment module and a third judgment module, wherein the first judgment module is used for acquiring current time and judging whether the current time is in a network shielding time period or not when a network request instruction is received, and the network request instruction comprises target application information and target port information;
the second judging module is used for acquiring a current positioning coordinate and judging whether the current positioning coordinate is in a network shielding area range when the first judging module judges that the current time is not in the network shielding time period, wherein the network shielding area range is an area formed by taking a shielding point preset by a user as a center;
a third determining module, configured to, when the second determining module determines that the current location coordinate is not within the network shielding area range, obtain target application information in the network request instruction, and determine whether the target application information matches a locally stored application shielding list, where the target application information includes an application name and an application network port address;
the response module is used for not responding to the network request instruction when the third judgment module judges that the target application information is matched with the application screening list; when the third judging module judges that the target application information is not matched with the application screening list, network link response is carried out aiming at the target port information and the target application information;
a fifth judging module, configured to judge whether a networking password is received when the response module does not respond to the network request instruction;
a sixth judging module, configured to, when the fifth judging module judges that the networking password is received, continuously judge whether the networking password is the same as a locally stored preset password; and if so, performing network link response aiming at the target port information and the target application information.
7. The network control system of claim 6, wherein the second determining module comprises:
the area drawing unit is used for acquiring the shielding coordinates of the shielding points, inquiring a locally stored shielding length value, and drawing a circular area by taking the shielding coordinates as a circle center and the shielding length value as a radius to obtain the range of the network shielding area;
the judging unit is used for acquiring the current positioning coordinate and judging whether the current positioning coordinate is in the range of the network shielding area; and if so, judging that the current positioning coordinate is in the range of the network shielding area.
8. A mobile terminal comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor executes the computer program to cause the mobile terminal to perform the network control method according to any one of claims 1 to 5.
9. A storage medium on which a computer program is stored, characterized in that the program, when being executed by a processor, carries out the steps of the network control method of any one of claims 1 to 5.
CN201810515090.6A 2018-05-25 2018-05-25 Network control method, system, mobile terminal and storage medium Active CN108966140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810515090.6A CN108966140B (en) 2018-05-25 2018-05-25 Network control method, system, mobile terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810515090.6A CN108966140B (en) 2018-05-25 2018-05-25 Network control method, system, mobile terminal and storage medium

Publications (2)

Publication Number Publication Date
CN108966140A CN108966140A (en) 2018-12-07
CN108966140B true CN108966140B (en) 2021-06-08

Family

ID=64492182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810515090.6A Active CN108966140B (en) 2018-05-25 2018-05-25 Network control method, system, mobile terminal and storage medium

Country Status (1)

Country Link
CN (1) CN108966140B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112399345A (en) * 2020-10-29 2021-02-23 四川长虹网络科技有限责任公司 Network access method and device based on location encryption and readable storage medium
CN114024649B (en) * 2021-10-21 2024-03-29 广州市瀚云信息技术有限公司 Method and device for starting shielding device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795639A (en) * 2014-02-17 2014-05-14 南通大学杏林学院 Wireless router with lock
CN205750911U (en) * 2016-06-25 2016-11-30 安徽工程大学机电学院 A kind of check class attendance supervisory systems
CN107133504A (en) * 2016-02-29 2017-09-05 广州市动景计算机科技有限公司 Rights Management System, right management method and electronic equipment
CN107437023A (en) * 2017-06-23 2017-12-05 珠海格力电器股份有限公司 A kind of control method of terminal applies, control device and mobile terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204559628U (en) * 2015-04-01 2015-08-12 江苏鸿信系统集成有限公司 A kind of cloud educational system
CN104952222A (en) * 2015-07-20 2015-09-30 顾易佳 Eye using environment monitor for individual mobile equipment as well as monitoring method of eye using environment monitor
CN106598676B (en) * 2016-12-19 2020-01-10 Oppo广东移动通信有限公司 Application program management method and device and terminal equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103795639A (en) * 2014-02-17 2014-05-14 南通大学杏林学院 Wireless router with lock
CN107133504A (en) * 2016-02-29 2017-09-05 广州市动景计算机科技有限公司 Rights Management System, right management method and electronic equipment
CN205750911U (en) * 2016-06-25 2016-11-30 安徽工程大学机电学院 A kind of check class attendance supervisory systems
CN107437023A (en) * 2017-06-23 2017-12-05 珠海格力电器股份有限公司 A kind of control method of terminal applies, control device and mobile terminal

Also Published As

Publication number Publication date
CN108966140A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
US8130738B2 (en) Mobile device services acquisition
CN106851654B (en) Pseudo base station identification method, pseudo base station identification device and terminal
US20180183651A1 (en) Content push method and server, and terminal
CN107889092A (en) Bluetooth devices control method, device, terminal device and storage medium
US11184314B2 (en) Method and apparatus for prompting message reading state, and electronic device
CN105549718A (en) Method and device for optimizing power consumption of application program and electronic equipment
CN105467874A (en) Method and device for identifying categories of electronic devices on intelligent sockets
CN109408465B (en) File attribution information recording method, device, storage medium and terminal
CN108966140B (en) Network control method, system, mobile terminal and storage medium
CN105681549B (en) Export the method and device of prompt information
CN110557499B (en) Information processing method and device and mobile terminal
CN111131951A (en) Wireless earphone positioning method, wireless earphone, electronic equipment and storage medium
CN104866782A (en) Data processing method and apparatus
CN106934277A (en) Application program detection method and device and terminal
CN104507043A (en) Positioning method and terminal
CN104038900A (en) Locating method and equipment
CN110868347A (en) Message prompting method, device and system
CN107888480A (en) Prompting message processing method, device, storage medium and mobile terminal
CN106385415B (en) Information security control method and device and terminal
WO2020007250A1 (en) Pseudo base station identification on-off control method and device, mobile terminal, and storage medium
CN112055301A (en) Bluetooth-based anti-lost method and system and mobile terminal
CN109040937B (en) Microphone blockage reminding method and related device
CN106708501A (en) Activity monitoring method and device
CN104503736A (en) Information prompt method and device
CN112040057B (en) Device control method, device, electronic device, control system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190212

Address after: 201808 Room J1335, Room 101, Lane 12, 1661, Jialuo Road, Jiading District, Shanghai

Applicant after: Jingwei Intelligent Technology (Shanghai) Co., Ltd.

Address before: Room 312, Jiaoqiao Town Office Building, Nanchang Economic and Technological Development Zone, Nanchang City, Jiangxi Province

Applicant before: Jiangxi noon Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant