CN110674478A - Anti-addiction computer - Google Patents

Anti-addiction computer Download PDF

Info

Publication number
CN110674478A
CN110674478A CN201910745454.4A CN201910745454A CN110674478A CN 110674478 A CN110674478 A CN 110674478A CN 201910745454 A CN201910745454 A CN 201910745454A CN 110674478 A CN110674478 A CN 110674478A
Authority
CN
China
Prior art keywords
module
addiction
user
computer
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910745454.4A
Other languages
Chinese (zh)
Inventor
陈孝军
唐小景
梁亨龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Rising Tripod Technology Co Ltd
Original Assignee
Wuhan Rising Tripod Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Rising Tripod Technology Co Ltd filed Critical Wuhan Rising Tripod Technology Co Ltd
Priority to CN201910745454.4A priority Critical patent/CN110674478A/en
Publication of CN110674478A publication Critical patent/CN110674478A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention discloses an anti-addiction computer, which comprises a computer box body, a power supply, a controller, an identity recognition module, an anti-addiction prompting module, a face recognition detection module, a timing module, a GPRS wireless signal transmitting module and a mobile phone receiving module, wherein two indexes of an addiction severity index and a software addiction index are introduced into the anti-addiction module of the computer, and a plurality of factors related to the degree of addiction, such as an addiction value and an addiction time in unit minute are combined, the anti-addiction index is introduced and cooperated with the identity recognition module, the face recognition detection module, the timing module, the GPRS wireless signal transmitting module, the mobile phone receiving module and the like to realize the operation protection and the remote supervision of the anti-addiction function of the computer, therefore, the anti-addiction function of the computer is more intelligent and accurate, and the influence of the addiction of the computer on the physical and psychological health of people is reduced.

Description

Anti-addiction computer
Technical Field
The invention belongs to the technical field of electronic technology application, and particularly relates to an anti-addiction computer.
Background
With the development of science and technology, the progress of society and the continuous improvement of living standard of people, computers have gradually become household computers, but the headache of people comes with the progress, namely teenagers are addicted to the network and are addicted to the online tour at the computer end; because of using the computer for a long time, the exercise amount of the people is suddenly reduced, the physical health of the people is injured, the people are often kept up night, the life irregularity is caused, and the physical and mental health of the addict is seriously threatened.
At present, in the aspect of computer anti-addiction, two types of anti-addiction means are mainly used, one is a well-known online game anti-addiction system, and the other is relatively popular real-time monitoring software in the market. However, in current practice in the background, both of these approaches have their inherent limitations, thus greatly affecting their anti-addiction effectiveness.
The current network game operators have developed various network game anti-addiction systems according to relevant regulations, but the systems mainly aim at minors, and the protection field is limited to network games. In fact, in the case of indulging computers, there are many reasons for indulging, and the online games are only one of them, for example, surfing the web for a minute and swiping a microblog for a moment in class, and playing a stand-alone game for a long time is a common indulging mode, and the online game anti-indulging system specially designed for the online games has a protection blank in these aspects.
In the prior art, a real-time monitoring software is adopted, so that the enthusiasm can be automatically identified and effectively processed, but the enthusiasm prevention method has the characteristics of simplicity, crudely, inaccuracy and humanization, and as the real-time monitoring software is only software of an application layer, for teenagers with weak self-control ability, the real-time monitoring software can be easily used by a task manager to close or unload the software, so that the real-time monitoring software hardly plays a substantial role in forcibly preventing enthusiasm in practical application. At present, people habitually adopt the length of the addiction time as a way for measuring the degree of the addiction computer without considering other factors related to addiction hazards, so that the method is not accurate and reasonable to a certain degree.
Disclosure of Invention
The invention aims to solve the problems in the prior art and provides an anti-addiction computer, wherein two indexes of an addiction severity index and a software addiction index are introduced into a control system of the computer, and a plurality of factors related to the addiction degree are integrated, so that a novel calculation method is provided.
In order to achieve the purpose, the invention adopts the technical scheme that:
an anti-addiction computer comprises a computer box body, a power supply, a controller, an identity recognition module, an anti-addiction prompt module, a face recognition detection module, a timing module, a GPRS wireless signal transmitting module and a mobile phone receiving module, wherein the controller, the identity recognition module, the anti-addiction prompt module, the face recognition detection module, the timing module and the GPRS wireless signal transmitting module are fixed in the computer box body; the controller is respectively and electrically connected with the power supply, the identity recognition module, the anti-addiction prompt module, the face recognition detection module, the timing module and the GPRS wireless signal transmitting module; and the GPRS wireless signal transmitting module transmits related information to the mobile phone receiving module.
Preferably, the identity recognition module comprises a biological information acquisition module, a biological information conversion module, a feature comparison module and an identity judgment module; the biological information acquisition module is used for acquiring the movement action data of a mouse and the knocking action data of a keyboard of a user; the biological information conversion module is used for analyzing and processing the biological information data to generate target characteristic information; the characteristic comparison module is used for comparing the user keystroke behavior characteristic information with the reference characteristic information, if the target characteristic information is smaller than the threshold value of the reference characteristic information, the user is judged to be an adult user, otherwise, the user is a minor user; and the identity judgment module is used for authenticating the identity of the user according to the judgment result.
Preferably, the biological information acquiring module includes: and the biological information input judging unit is used for judging whether the user inputs biological information data or not, and if so, the biological information data is collected through the computer.
Preferably, the feature comparison module includes:
the acquisition action acquisition unit is used for acquiring key timing sequence characteristics corresponding to behavior characteristics of mouse movement and keyboard knocking of a user;
and the reference characteristic generating unit is used for generating corresponding key timing sequence reference characteristic information by analyzing the behavior characteristics of mouse movement and keyboard knocking of a user.
Preferably, the identity module further comprises:
the storage module is used for storing the acquired target characteristic information and each time of identity judgment results of the user in a list form;
and the information viewing module is used for viewing the past login information and the identity authentication information of the user.
Preferably, the characteristic information is the keystroke behavior characteristic information of the keyboard and the mouse collected through the user chat and the keystroke window, and the comparison between the keystroke behavior characteristic information of the user and the reference characteristic information is realized by adopting an Euclidean distance calculation algorithm, so that the user identity identification is realized.
Further, the method for realizing user identity recognition by the Euclidean distance calculation algorithm comprises the following steps:
step 1): let x be { t ═ t1,t2,…,tdIs a user to be identified, which means that each user x to be identified has d characteristic attributes, i.e. ti
Step 2): the system user set is U ═ U1,U2,…,UdDenotes that U exists for each user U1、u2、…、udThe characteristic attribute of (2);
step 3): benefit toCalculating the correlation D (t) of the characteristic information of the user to be identified and the reference characteristic information by using Euclidean distancei,ui) And associated with each user UiComparing the reference characteristic information threshold value, and judging the identity information of the user according to the calculation result; wherein, the correlation calculation formula is as follows:
Figure BDA0002165403150000031
wherein u is1、u2、…、udIs a characteristic attribute of a user in the system, t1,t2,…,tdCalculating the result D (t) as the characteristic attribute of the user to be identifiedi,ui) When the value is less than the given characteristic attribute threshold value in the system, the user x belongs to an adult user UkOtherwise, the user x is a minor user, and the computer starts an anti-addiction mode.
Preferably, the anti-addiction module comprises a management module, an anti-addiction service module, operation protection and remote supervision; the management module is used for anti-addiction judgment standard setting and information checking; the anti-addiction service module is used for carrying out addiction detection in the background according to an addiction judgment standard set by parents and is responsible for recording the running condition of software and calculating, updating and storing an addiction index; the operation protection module is used for protecting the normal operation of the anti-addiction; the remote supervision is used for enabling parents to know the using condition of the computers of the minors anytime and anywhere, and remotely controlling the computers of the minors to carry out remote anti-addiction management.
Preferably, the addiction judgment standard includes an addiction value per minute, a software susceptibility to addiction index and an addiction severity index.
Further, the unit minute addiction value AtThe calculation formula of (2) is as follows:
At=st×pt×lt=st×pt×e0.0153x-0.1503
wherein A istIs the unit minute adduction value for the tth adduction minute of the day; stDenotes the t minuteThe software hazard coefficient of the running software; p is a radical oftRepresenting the hazard coefficient of the time point of the tth minute; ltIndicating the long-term hazard coefficient of having been continuously operated at the time of the tth minute.
For minor, different types of software have different hazard degrees, and the software hazard coefficient stIs used to indicate this level of harm. In the management module design of the anti-addiction computer, when parents set anti-addiction management of certain software, the software categories can be manually divided according to life experiences, and corresponding hazard coefficients are given. The common software hazard coefficient is 1.0 under the default condition, parents can also input by self definition, and the greater the hazard of the software is, the greater the input value is, and the hazard coefficient range is defined to be 0.5-1.5.
Playing games at different points in time has different hazards, such as playing games at rest in the evening is more harmful. Setting a time point hazard coefficient p according to the common work and rest habits and the healthy work and rest requirements of the minorstDefault time point hazard coefficient p for leisure and entertainmenttIs 1.0, time point hazard coefficient p of rest timet1.1 to 1.5.
The computer software is of various types, parents can hardly know which software is easy to indulge in children, and the health growth of the children is more harmful. The invention introduces the software addiction index EsTo measure this index. Taking QQ as an example, the QQ is operated for 60 minutes in a certain day, the indulgence accumulation value of the QQ is obtained by accumulating the indulgence values of the unit minutes of the 60 minutes, and in order to reduce the contingency and improve the accuracy, the invention calculates the indulgence-prone index E of the software by integrating the indulgence accumulation values of the past period of time and using a moving average method to calculate the indulgence-prone index E of the software in consideration of the fact that the running conditions of different software are different every daysThe calculation formula is as follows:
Es=(w1As1+w2As2+…+wnAsn)/(w1+w2+…wn)
where n represents the date range under consideration is the last n days: a. thesiRepresenting the accumulated value of the addiction of the s software i days ago; w is aiIs day iWeight of degree of correlation of the front, where wiThe smaller i represents the closer time, the larger the correlation weight, 2(n-i +1) -1.
The software addiction index is used for measuring the addiction dependence degree of a user on certain software from the software perspective. The addiction severity index A is used for measuring the severity of the current addiction of the user in real time from the perspective of the user. The index is mainly used for intelligently judging whether the user is addicted or not by the anti-addiction system, dividing the severity level of the addict and executing anti-addiction treatment with corresponding strength.
The addiction severity index A is obtained by superposing the addiction values of all the unit minutes in all the operation periods of the day, and the calculation formula is as follows:
Figure BDA0002165403150000051
where n is the total time in minutes that various software is currently running on the day.
Wherein, in setting for the anti-addiction module: the indulging severity index is 0-20 in a healthy state, 20-60 in a mild state, 60-100 in a moderate state, 100-140 in a severe state, and more than 140 in an extreme state.
Parents can set different levels of intensity management according to their own children's conditions, such as age. For example, the primary school students are required to be unable to achieve moderate addiction, and the secondary school students are required to be unable to achieve severe addiction.
Further, according to the actual situation, provision is made in the actual calculation for: 1. to ensure the continuity of the calculation of the operation time interval, the day zero point to the next day zero point is taken as one day. 2. When the prescribed rest time is less than or equal to 5 minutes, the rest is not effective and the operation can be regarded as continuous. 3. The operation means foreground operation, and the background service is not calculated.
Preferably, the anti-addiction prompting module is a voice broadcast device or an LED lamp.
Preferably, the timing module comprises a use timing module and an alarm timing module.
Compared with the prior art, the invention has the beneficial effects that:
(1) the invention introduces two indexes of indulging severity index and software indulging susceptibility index into the computer anti-indulging module, and integrates a plurality of factors related to the indulging degree, such as unit minute indulging value, indulging time and the like, the indulging severity index is used for representing the indulging severity of a user in real time, the software indulging susceptibility index reflects the dependence degree of the user in a short period of time on certain software, and the operation protection and remote supervision of the computer are realized by introducing the two indexes, so that the anti-indulging computer is more intelligent and accurate.
(2) The invention provides and realizes the identity authentication method based on mouse and keyboard behaviors by researching the computer input behavior characteristics of the user, analyzes the user input characteristic information by using the Euclidean distance calculation algorithm, combines the mouse and keyboard dual-index composite authentication, improves the identification accuracy, reduces the system error recognition rate, and strengthens the guarantee of the safety authentication, thereby providing favorable guarantee for the forced and effective operation of the anti-addiction module of the computer.
(3) The face recognition detection module is arranged to detect the distance between the face of the user and the display in real time, so that the computer user is reminded to keep a normal distance from the display, and the physical and psychological health of the user is protected; on the other hand, the enthusiasm degree of the user can be judged in an auxiliary mode through the distance between the user and the computer, and the adult user can supervise the use of the computer of the minors in real time by cooperating with the GPRS wireless signal transmitting module and the mobile phone receiving module.
Drawings
FIG. 1 is a schematic view of an anti-addiction computer according to the present invention;
FIG. 2 is a schematic structural diagram of the anti-addiction module;
fig. 3 is a schematic structural diagram of the identity module.
Detailed Description
The technical solution of the present invention will be described clearly and completely with reference to the accompanying drawings, and obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments; all other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The present invention is described in further detail below with reference to specific embodiments.
Examples
An anti-addiction computer comprises a computer box body, a power supply, a controller, an identity recognition module, an anti-addiction prompt module, a face recognition detection module, a timing module, a GPRS wireless signal transmitting module and a mobile phone receiving module, wherein the controller, the identity recognition module, the anti-addiction prompt module, the face recognition detection module, the timing module and the GPRS wireless signal transmitting module are fixed in the computer box body; the controller is respectively and electrically connected with the power supply, the identity recognition module, the anti-addiction prompt module, the face recognition detection module, the timing module and the GPRS wireless signal transmitting module; and the GPRS wireless signal transmitting module transmits related information to the mobile phone receiving module.
In the invention, the controller can control the anti-addiction module in various modes, after the anti-addiction module is started, the controller can control the timing module in the equipment to start timing, and after the preset time is reached, the software is closed or the power supply of the system is cut off. In addition, the startup and shutdown module is arranged between the controller and the system power supply and used for controlling and cutting off the system power supply, so that the computer can be conveniently controlled. The controller and the startup and shutdown module can be connected through a line or a wireless communication device.
The processing mechanism of the controller can also be that after the user starts the computer, the software started by the user is checked whether the software marked by the anti-addiction module is the software marked by the anti-addiction module, such as game software, if so, the user is prompted to perform identity authentication, if the user is judged to be a minor, the anti-addiction module is immediately started, and meanwhile, the timing module starts timing. Alternatively, after the user turns on the software marked by the anti-addiction module, the user may check whether the current time is a rest period, such as between 22:00 nights and 7:00 morning hours, and if so, the user may be prohibited from turning on or logging in the software.
The human face recognition detection module is used for detecting the distance between the face of the user and the display, and when the distance between the human face and the display is smaller than the threshold value set by the addiction prevention module, the controller can send an instruction to the addiction prevention prompt module to prompt the computer user to keep a normal distance with the display; and meanwhile, the timing module can also perform timing according to the use frequency of the mouse and the keyboard, and can send an instruction to the anti-addiction prompting module to remind the user of having a rest properly after the use frequency exceeds a threshold value set by the anti-addiction module.
Specifically, the identity recognition module comprises a biological information acquisition module, a biological information conversion module, a feature comparison module and an identity judgment module; the biological information acquisition module is used for acquiring the movement action data of a mouse and the knocking action data of a keyboard of a user; the biological information conversion module is used for analyzing and processing the biological information data to generate target characteristic information; the characteristic comparison module is used for comparing the user keystroke behavior characteristic information with the reference characteristic information, if the target characteristic information is smaller than the threshold value of the reference characteristic information, the user is judged to be an adult user, otherwise, the user is a minor user; and the identity judgment module is used for authenticating the identity of the user according to the judgment result.
Specifically, the biological information acquisition module includes: and the biological information input judging unit is used for judging whether the user inputs biological information data or not, and if so, the biological information data is collected through the computer.
Specifically, the feature comparison module includes:
the acquisition action acquisition unit is used for acquiring key timing sequence characteristics corresponding to behavior characteristics of mouse movement and keyboard knocking of a user;
and the reference characteristic generating unit is used for generating corresponding key timing sequence reference characteristic information by analyzing the behavior characteristics of mouse movement and keyboard knocking of a user.
Specifically, the identity module further includes:
the storage module is used for storing the acquired target characteristic information and each time of identity judgment results of the user in a list form;
and the information viewing module is used for viewing the past login information and the identity authentication information of the user.
Specifically, the characteristic information is obtained by collecting keystroke behavior characteristic information of a keyboard and a mouse through a user chat and a click chat window, and the comparison between the keystroke behavior characteristic information of the user and the reference characteristic information is realized by adopting an Euclidean distance calculation algorithm, so that the user identity identification is realized.
Further, the method for realizing user identity recognition by the Euclidean distance calculation algorithm comprises the following steps:
step 1): let x be { t ═ t1,t2,…,tdIs a user to be identified, which means that each user x to be identified has d characteristic attributes, i.e. ti
Step 2): the system user set is U ═ U1,U2,…,UdDenotes that U exists for each user U1、u2、…、udThe characteristic attribute of (2);
step 3): calculating the correlation D (t) of the characteristic information of the user to be identified and the reference characteristic information by using the Euclidean distancei,ui) And associated with each user UiComparing the reference characteristic information threshold value, and judging the identity information of the user according to the calculation result; wherein, the correlation calculation formula is as follows:
Figure BDA0002165403150000091
wherein u is1、u2、…、udIs a characteristic attribute of a user in the system, t1,t2,…,tdCalculating the result D (t) as the characteristic attribute of the user to be identifiedi,ui) When the value is less than the given characteristic attribute threshold value in the system, the user x belongs to an adult user UkOtherwise, the user x is a minor user, and the computer starts an anti-addiction mode.
Specifically, the anti-addiction module comprises a management module, an anti-addiction service module, operation protection and remote supervision; the management module is used for anti-addiction judgment standard setting and information checking; the anti-addiction service module is used for carrying out addiction detection in the background according to an addiction judgment standard set by parents and is responsible for recording the running condition of software and calculating, updating and storing an addiction index; the anti-addiction main function of the computer is realized through the synergistic effect of the management module and the anti-addiction service module; the operation protection module is used for protecting the normal operation of the anti-addiction; the remote supervision is used for enabling parents to know the using condition of the computers of the minors anytime and anywhere and remotely controlling the computers of the minors to carry out remote anti-addiction management; the computer anti-addiction function can be forced to effectively operate through operation protection and remote supervision.
On one hand, the operation protection module protects the anti-addiction module from being unloaded by the minors, so that the anti-addiction function of the computer is influenced; on the other hand, the operation protection module can actively recover in a background starting mode when the anti-addiction module cannot normally work, so that the forced effectiveness of the anti-addiction module is ensured.
The remote supervision module can play double roles of remote monitoring and remote control, the remote monitoring can enable parents to know the computer use condition of the minors at any time and any place, and particularly can remotely inform the parents when the anti-addiction module cannot work normally, so that the parents can manage and educate the minors; the remote control is to enable parents to remotely control the computers of minors to carry out remote anti-addiction management.
The invention ensures the forced effective operation of the anti-addiction function of the computer by the cooperative cooperation of the management module, the anti-addiction service module, the operation protection module and the remote supervision module.
In order to supervise the addiction of the minor to the computer, the invention binds another mobile phone held in the hand of the adult (which may be the parent of the minor) in advance by the computer used by the minor. Considering that the minor may log in the game again after the game is turned off or the power is turned off, a time threshold may be set for determining whether the minor continues to play the game. After the controller detects that the minors continuously play the games for more than a certain time, the GPRS wireless signal transmitting module can be used for sending related information (such as a notice that your children are indulged in the games for more than three hours) to the mobile phone receiving module, so that parents can supervise own children in time.
Specifically, the addiction judgment standard comprises an addiction value in unit minute, a software addiction index and an addiction severity index.
Wherein the unit minute addiction value AtThe calculation formula of (2):
At=st×pt×lt
wherein A istIs the unit minute adduction value for the tth adduction minute of the day; stRepresenting the software hazard coefficient of the software running at the t minute; p is a radical oftRepresenting the hazard coefficient of the time point of the tth minute; ltIndicating the long-term hazard coefficient of having been continuously operated at the time of the tth minute.
For minor, different types of software have different hazard degrees, and the software hazard coefficient stIs used to indicate this level of harm. In the management module design of the anti-addiction computer, when parents set anti-addiction management of certain software, the software categories can be manually divided according to life experiences, and corresponding hazard coefficients are given. The common software hazard coefficient is 1.0 under the default condition, parents can also input by self definition, and the greater the hazard of the software is, the greater the input value is, and the hazard coefficient range is defined to be 0.5-1.5.
Playing games at different points in time has different hazards, such as playing games at rest in the evening is more harmful. Setting a time point hazard coefficient p according to the common work and rest habits and the healthy work and rest requirements of the minorstDefault time point hazard coefficient p for leisure and entertainmenttIs 1.0, time point hazard coefficient p of rest timet1.1 to 1.5.
The longer the continuous operation time is, the faster the growth speed of the addiction hazard per unit minute is, and the model is considered to satisfy the exponential growth model, and the model of the growth function of the addiction hazard per unit minute is set as follows:
y=eax+b
taking logarithm at the same time to both sides of the above formula, and converting it into a linear fitting problem, then:
z=lny=ax+b
wherein x is the current continuous operation time length and the unit is minutes; y is the long-term hazard coefficient. In order to define the exponential function model more accurately and reasonably, the relationship between the continuous enthusiasm time and the hazard degree is preliminarily estimated according to the actual situation to obtain a group of original data:
T0={(x1,y1),(x2,y2),…,(xn,yn)}
for T0Taking logarithm of y value in data set to obtain new data set T:
T={(x1,lny1),(x2,lny2),…,(xn,lnyn)}
and performing linear fitting on the above formula by using a least square method to solve the values of a and b. Wherein the least squares method finds the best function match by minimizing the sum of the squares of the errors, using ziRepresentation lnyiThen the sum of the squared errors is:
Figure BDA0002165403150000111
when in use
Figure BDA0002165403150000112
At the minimum, the partial derivatives are calculated for a and b, respectively, and the two partial derivatives should be 0, that is:
Figure BDA0002165403150000113
wherein x isi、ziFor the known, the values a and b are determined by means of matlab to obtain the time-length hazard coefficient l at the t minutetLength of time d of continuous operation with time t minutetThe functional relationship of (A) is as follows:
lt=y=e0.0153x-0.1503
the computer software is of various types, parents can hardly know which software is easy to indulge in children, and the health growth of the children is more harmful. The invention introduces the software addiction index EsTo measure this index. Taking QQ as an example, the QQ is operated for 60 minutes in a certain day, the indulgence accumulation value of the QQ is obtained by accumulating the indulgence values of the unit minutes of the 60 minutes, and in order to reduce the contingency and improve the accuracy, the invention calculates the indulgence-prone index E of the software by integrating the indulgence accumulation values of the past period of time and using a moving average method to calculate the indulgence-prone index E of the software in consideration of the fact that the running conditions of different software are different every daysThe calculation formula is as follows:
Es=(w1As1+w2As2+…+wnAsn)/(w1+w2+…wn)
where n represents the date range under consideration is the last n days: a. thesiRepresenting the accumulated value of the addiction of the s software i days ago; w is aiIs the correlation weight i days ago, where wiThe smaller i represents the closer time, the larger the correlation weight, 2(n-i +1) -1.
Cumulative value of enthusiasm for software per day AsAnd settling once, and recalculating the software addiction index once a day along with the addition of new data and the removal of expired data.
The software addiction index is used for measuring the addiction dependence degree of a user on certain software from the software perspective. The addiction severity index A is used for measuring the severity of the current addiction of the user in real time from the perspective of the user. The index is mainly used for intelligently judging whether the user is addicted or not by the anti-addiction system, dividing the severity level of the addict and executing anti-addiction treatment with corresponding strength.
The addiction severity index A is obtained by superposing the addiction values of all the unit minutes in all the operation periods of the day, and the calculation formula is as follows:
Figure BDA0002165403150000121
where n is the total time in minutes that various software is currently running on the day.
Wherein, the serious indulging index of 0-20 is set as a healthy state, 20-60 is mild indulging, 60-100 is moderate indulging, 100-140 is severe indulging, and more than 140 is extreme indulging.
Parents can set different levels of intensity management according to their own children's conditions, such as age. For example, the primary school students are required to be unable to achieve moderate addiction, and the secondary school students are required to be unable to achieve severe addiction.
Further, according to the actual situation, provision is made in the actual calculation for: 1. to ensure the continuity of the calculation of the operation time interval, the day zero point to the next day zero point is taken as one day. 2. When the prescribed rest time is less than or equal to 5 minutes, the rest is not effective and the operation can be regarded as continuous. 3. The operation means foreground operation, and the background service is not calculated.
Specifically, anti-addiction prompt module is voice broadcast ware or LED lamp.
In order to improve the user experience and prevent the loss of the user caused by the sudden shutdown of the game or the power supply after the anti-addiction module is started for the preset time, the anti-addiction prompting module prompts the user to pay attention to rest before the game or the power supply is shut down for a period of time.
The anti-addiction prompting module can be a voice broadcast device, and sends voice prompts such as 'please pay attention to rest' and 'the system is closed for ten minutes' to the user. The anti-addiction prompting module can also be an LED lamp, is arranged in a place where the computer is obvious, and prompts a user in a light-on or flashing mode. And meanwhile, the anti-addiction prompting module is also used for prompting that the software or the power supply of the user is about to be turned off, so that the problem that the game or the power supply is suddenly turned off after the anti-addiction module is started for the preset time, which is caused by the fact that the user forgets the time due to excessive addiction, is avoided.
Specifically, the timing module comprises a timing module and an alarm timing module.
When the juveniles start to use the computer, the controller controls the timing module to start timing, and if the timing does not reach a set value, the computer stops using, the timing module is used for timing, resetting and stopping timing; if the timing reaches a set value, the controller controls the enthrallment prevention prompting module to enable a user to rest, meanwhile, the timing module is used for resetting and stopping timing, meanwhile, the alarm timing module is started to time, if the timing of the alarm timing module reaches a rated value, the controller controls the computer on-off module to close the computer, if the timing of the alarm timing module does not reach the rated value, the computer is stopped to use, the alarm timing module is reset and stops timing, and the steps are repeated until the computer is used again.
While the invention has been described with respect to specific embodiments thereof, it will be understood by those skilled in the art that the foregoing and other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention; those skilled in the art should appreciate that they can readily use the disclosed conception and specific embodiments as a basis for designing or modifying other structures for carrying out the same purposes of the present invention without departing from the spirit and scope of the invention; meanwhile, any equivalent changes, modifications and alterations of the above embodiments according to the spirit and techniques of the present invention are also within the scope of the present invention.

Claims (10)

1. An anti-addiction computer is characterized by comprising a computer box body, a power supply, a controller, an identity recognition module, an anti-addiction prompt module, a face recognition detection module, a timing module, a GPRS wireless signal transmitting module and a mobile phone receiving module, wherein the controller, the identity recognition module, the anti-addiction prompt module, the face recognition detection module, the timing module and the GPRS wireless signal transmitting module are fixed in the computer box body; the controller is respectively connected with the power supply, the identity recognition module, the anti-addiction prompt module, the face recognition detection module, the timing module and the GPRS wireless signal transmitting module; and the GPRS wireless signal transmitting module transmits related information to the mobile phone receiving module.
2. The anti-addiction computer according to claim 1, wherein the identity recognition module comprises a biological information acquisition module, a biological information conversion module, a feature comparison module and an identity judgment module; the biological information acquisition module is used for acquiring the movement action data of a mouse and the knocking action data of a keyboard of a user; the biological information conversion module is used for analyzing and processing the biological information data to generate target characteristic information; the characteristic comparison module is used for comparing the user keystroke behavior characteristic information with the reference characteristic information; and the identity judgment module is used for authenticating the identity of the user according to the judgment result.
3. The anti-addiction computer according to claim 2, wherein the biological information acquisition module comprises: and the biological information input judging unit is used for judging whether the user inputs biological information data or not, and if so, the biological information data is collected through the computer.
4. An anti-addiction computer according to claim 2, wherein said feature comparison module comprises:
the acquisition action acquisition unit is used for acquiring key timing sequence characteristics corresponding to behavior characteristics of mouse movement and keyboard knocking of a user;
and the reference characteristic generating unit is used for generating corresponding key timing sequence reference characteristic information by analyzing the behavior characteristics of mouse movement and keyboard knocking of a user.
5. An anti-addiction computer according to claim 2, wherein said identity module further comprises:
the storage module is used for storing the acquired target characteristic information and each time of identity judgment results of the user in a list form;
and the information viewing module is used for viewing the past login information and the identity authentication information of the user.
6. The anti-addiction computer according to claim 2, wherein the characteristic information is key stroke behavior characteristic information of a keyboard and a mouse collected through a user chat and a click chat window.
7. The anti-addiction computer according to claim 1, wherein the anti-addiction module comprises a management module, an anti-addiction service module, an operation protection module, and a remote supervision module; the management module is used for anti-addiction judgment standard setting and information checking; the anti-addiction service module is used for carrying out addiction detection in the background according to an addiction judgment standard set by parents and is responsible for recording the running condition of software and calculating, updating and storing an addiction index; the operation protection module is used for protecting the normal operation of the anti-addiction; the remote supervision is used for enabling parents to know the using condition of the computers of the minors anytime and anywhere, and remotely controlling the computers of the minors to carry out remote anti-addiction management.
8. The anti-addiction computer according to claim 7, wherein the addiction determination criteria include an addiction value per minute, a software susceptibility to addiction index, and an addiction severity index.
9. The anti-addiction computer according to claim 1, wherein the anti-addiction prompting module is a voice broadcaster or an LED lamp.
10. The anti-addiction computer according to claim 1, wherein the timing module comprises a usage timing module and an alarm timing module.
CN201910745454.4A 2019-08-13 2019-08-13 Anti-addiction computer Pending CN110674478A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910745454.4A CN110674478A (en) 2019-08-13 2019-08-13 Anti-addiction computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910745454.4A CN110674478A (en) 2019-08-13 2019-08-13 Anti-addiction computer

Publications (1)

Publication Number Publication Date
CN110674478A true CN110674478A (en) 2020-01-10

Family

ID=69068854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910745454.4A Pending CN110674478A (en) 2019-08-13 2019-08-13 Anti-addiction computer

Country Status (1)

Country Link
CN (1) CN110674478A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112451973A (en) * 2020-12-17 2021-03-09 徐岩 Identity authentication system relating to specific network user
CN113158159A (en) * 2021-04-16 2021-07-23 海南省妇女儿童医学中心 Internet addiction reducing computer based on human-computer interaction technology and use method thereof
CN113946810A (en) * 2021-12-07 2022-01-18 荣耀终端有限公司 Application program running method and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917289A (en) * 2010-08-09 2010-12-15 成都信息工程学院 System for remotely supervising internet surfing of minors based on computer and mobile phone
CN102184359A (en) * 2011-04-29 2011-09-14 德讯科技股份有限公司 Method for realizing identity discrimination of operation user through keyboard and mouse input habit recognition
CN104980565A (en) * 2014-04-09 2015-10-14 小米科技有限责任公司 Terminal anti-addiction method and device
CN105120080A (en) * 2015-07-23 2015-12-02 Tcl移动通信科技(宁波)有限公司 Anti-addiction control method and system of mobile terminal, and mobile terminal
CN105872247A (en) * 2016-05-26 2016-08-17 广东欧珀移动通信有限公司 Application anti-addiction method and device as well as mobile terminal
CN106021086A (en) * 2016-05-26 2016-10-12 广东欧珀移动通信有限公司 Method and device for automatically recognizing addition applications and terminal device
CN106096352A (en) * 2016-05-26 2016-11-09 广东欧珀移动通信有限公司 The control method for preventing indulging of a kind of mobile terminal, device and mobile terminal
CN106790417A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of long-range control method, terminal and system
CN207520591U (en) * 2017-11-28 2018-06-22 信利光电股份有限公司 A kind of indulging system and smart machine

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917289A (en) * 2010-08-09 2010-12-15 成都信息工程学院 System for remotely supervising internet surfing of minors based on computer and mobile phone
CN102184359A (en) * 2011-04-29 2011-09-14 德讯科技股份有限公司 Method for realizing identity discrimination of operation user through keyboard and mouse input habit recognition
CN104980565A (en) * 2014-04-09 2015-10-14 小米科技有限责任公司 Terminal anti-addiction method and device
CN105120080A (en) * 2015-07-23 2015-12-02 Tcl移动通信科技(宁波)有限公司 Anti-addiction control method and system of mobile terminal, and mobile terminal
CN105872247A (en) * 2016-05-26 2016-08-17 广东欧珀移动通信有限公司 Application anti-addiction method and device as well as mobile terminal
CN106021086A (en) * 2016-05-26 2016-10-12 广东欧珀移动通信有限公司 Method and device for automatically recognizing addition applications and terminal device
CN106096352A (en) * 2016-05-26 2016-11-09 广东欧珀移动通信有限公司 The control method for preventing indulging of a kind of mobile terminal, device and mobile terminal
CN106790417A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of long-range control method, terminal and system
CN207520591U (en) * 2017-11-28 2018-06-22 信利光电股份有限公司 A kind of indulging system and smart machine

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112451973A (en) * 2020-12-17 2021-03-09 徐岩 Identity authentication system relating to specific network user
CN113158159A (en) * 2021-04-16 2021-07-23 海南省妇女儿童医学中心 Internet addiction reducing computer based on human-computer interaction technology and use method thereof
CN113946810A (en) * 2021-12-07 2022-01-18 荣耀终端有限公司 Application program running method and electronic equipment

Similar Documents

Publication Publication Date Title
CN110674478A (en) Anti-addiction computer
US9829480B2 (en) Remote breath alcohol monitor
WO2005101252A3 (en) Managing event-condition-action rules in a database system
CN106603554B (en) A kind of anti-cheat method and device of adaptive real time video data
EP2220933A2 (en) Electronic animal trainer with temperament learning
CN105652767A (en) Adjustment method and adjustment system for intelligent bathroom
WO2000039724A3 (en) Internet surveillance system and method
EP3048971A1 (en) Remote breath alcohol monitoring
CN104382307A (en) Intelligent walking stick and implementation method thereof
EP0486486A1 (en) Sobriety interlock with bypass detection
CN103197647B (en) Based on home intelligent Double tabletop cooperative control system and the control method thereof of CPS
CN205301946U (en) Intelligence bathroom governing system
CN109920192A (en) Fire alarm method, system and computer readable storage medium
CN112972720A (en) System and method for achieving ultraviolet disinfection based on intelligent Internet of things
CN109345774A (en) A kind of drowned automatic alarm method and wearable device
CN104382308A (en) Walking stick
WO2006113879A3 (en) A system and method for the detection of an uncontrollable change in a person's physiology
CN114463938B (en) Intelligent monitoring system for empty nest old people
Wixted A signal detection analysis of memory for nonoccurrence in pigeons.
CN106445112B (en) Mobile terminal and method for controlling mobile terminal to be used
CN105771058A (en) Household nightmare awakening system and operating method thereof
CN108376566A (en) A kind of method and wearable device of prediction muscle cramp probability of happening
CN108182786A (en) Falls Among Old People warning system
CN111820880A (en) Campus overlord early warning system and method
CN113577638B (en) Intelligent skipping rope

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200110