CN113313350A - Internet of things data acquisition, analysis and management system - Google Patents

Internet of things data acquisition, analysis and management system Download PDF

Info

Publication number
CN113313350A
CN113313350A CN202110440379.8A CN202110440379A CN113313350A CN 113313350 A CN113313350 A CN 113313350A CN 202110440379 A CN202110440379 A CN 202110440379A CN 113313350 A CN113313350 A CN 113313350A
Authority
CN
China
Prior art keywords
module
unit
data acquisition
management system
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110440379.8A
Other languages
Chinese (zh)
Inventor
林云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ruian Technology Development Co ltd
Original Assignee
Wuhan Ruian Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ruian Technology Development Co ltd filed Critical Wuhan Ruian Technology Development Co ltd
Priority to CN202110440379.8A priority Critical patent/CN113313350A/en
Publication of CN113313350A publication Critical patent/CN113313350A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/906Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1093Calendar-based scheduling for persons or groups
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an Internet of things data acquisition, analysis and management system, which comprises a using end, a server and a safety verification system, and relates to the technical field of service management. This thing networking data acquisition analysis management system, place in integrated verification integrated unit through the verification mode that will multiple degree of difficulty is different, utilize risk classification unit to conclude the classification according to actual conditions to different APPs on the line, set up the gradient that the important degree is different, detect out when the user switches over to child or other users, directly launch the identifying code that sets up in advance on the APP of difference, and then guarantee the safety of some important APPs, simultaneously under the cooperation setting of the setting of trigger unit and memory cell, effectively avoid child excessively to be addicted in playing the cell-phone, can indicate child's time planning, and then improve child's cognition to the time effectively, promote benign growth.

Description

Internet of things data acquisition, analysis and management system
Technical Field
The invention relates to the technical field of business management, in particular to an Internet of things data acquisition, analysis and management system.
Background
Business security refers to measures or means to protect a business system from security threats. The broad business security shall include the security of the software and hardware platform (operating system, database, etc.) of the business operation, the business system itself (software or equipment), and the service provided by the business; the narrow definition of business security refers to the security of the own software and services of the business system.
With the development of society, smart phones are completely popularized, minors often use the smart phones, the supervision and management of the long-term use of various APP minors are not strict, and the minors are drowned, so that an Internet of things data acquisition, analysis and management system is provided for analysis and management.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides an Internet of things data acquisition, analysis and management system, which solves the problem that children are easy to drown in playing mobile phones and the growth is seriously influenced.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: an Internet of things data acquisition, analysis and management system comprises a using end, a server and a security verification system, the using end is in bidirectional connection with the server through the Ethernet, the server is in bidirectional connection with the security verification system through the Ethernet, the safety verification system is bidirectionally connected with a central processing unit which is respectively bidirectionally connected with a risk grade division unit and a verification integration unit, the risk grade dividing unit is in bidirectional connection with the triggering unit, the triggering unit comprises a time limit setting module, a margin counting module and a time recording module, the output ends of the time limit setting module and the time recording module are both connected with the input end of the margin statistic module, the trigger unit is in bidirectional connection with the storage unit, and the storage unit comprises a margin adding module, a cleaning module and a report generating module.
Preferably, the output end of the storage unit is connected with the input end of the limit locking module.
Preferably, the output end of the verification integration unit is connected with the input end of the risk classification unit, and the output end of the risk classification unit is connected with the input end of the secondary verification unit.
Preferably, the output end of the secondary verification unit is connected with the input ends of the coordinate recording module and the limit locking module respectively.
Preferably, the output end of the allowance adding module is connected with the input end of the cleaning module, and the output end of the cleaning module is connected with the input end of the report generating module.
(III) advantageous effects
The invention provides an Internet of things data acquisition, analysis and management system. The method has the following beneficial effects:
(1) the Internet of things data acquisition, analysis and management system is characterized in that a plurality of verification modes with different difficulty degrees are integrated in a verification integration unit, different online APPs are summarized and classified by a risk grade classification unit according to actual conditions to be set into gradients with different importance degrees, and special corresponding verification modes are set for the APPs, so that when a user is detected to be switched to a child or other users under the cooperation of a user track analysis unit, preset verification codes are directly started on the different APPs, at the moment, the child cannot pass through the verification mode with higher difficulty, the safety of some important APPs can be ensured, meanwhile, the user limits the time for the child to use the mobile phone through a trigger unit, the screen is automatically locked after a set time limit is reached, the child is effectively prevented from being excessively enthusiastic in playing the mobile phone, and through the setting of a storage unit, the time planning of the child can be prompted, namely, the staged purpose is realized in an accumulation mode, so that the time cognition of the child is effectively improved, and the benign growth is promoted.
Drawings
FIG. 1 is a schematic block diagram of the system of the present invention;
FIG. 2 is a system schematic block diagram of a trigger unit of the present invention;
FIG. 3 is a system schematic block diagram of a memory cell of the present invention.
In the figure, 1, the use end; 2. a server; 3. a security verification system; 4. a central processing unit; 8. a risk ranking unit; 9. verifying the integrated unit; 10. a secondary verification unit; 12. a limit lock module; 31. a trigger unit; 32. a storage unit; 33. a time limit setting module; 34. a margin statistic module; 35. a time recording module; 36. a margin adding module; 37. a cleaning module; 38. and a report generation module.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-3, an embodiment of the present invention provides a technical solution: the utility model provides a thing networking data acquisition analysis management system, includes user end 1, server 2 and safety verification system 3, user end 1 realizes the both way junction through ethernet and server 2, and server 2 realizes the both way junction through ethernet and safety verification system 3, its characterized in that: the safety verification system 3 is in bidirectional connection with the central processing unit 4, the central processing unit 4 is in bidirectional connection with the risk level dividing unit 8 and the verification integration unit 9 respectively, the risk level dividing unit 8 is in bidirectional connection with the trigger unit 31, the trigger unit 31 comprises a time limit setting module 33, a margin counting module 34 and a time recording module 35, output ends of the time limit setting module 33 and the time recording module 35 are connected with an input end of the margin counting module 34, the trigger unit 31 is in bidirectional connection with the storage unit 32, and the storage unit 32 comprises a margin adding module 36, a clearing module 37 and a report generation module 38.
Further, an output of the memory unit 32 is connected to an input of the limit lock module 12.
Further, the output end of the verification integration unit 9 is connected with the input end of the risk classification unit 8, and the output end of the risk classification unit 8 is connected with the input end of the secondary verification unit 10.
Further, the output end of the secondary verification unit 10 is connected to the input ends of the coordinate recording module 11 and the limit locking module 12, respectively.
Further, the output end of the allowance adding module 36 is connected with the input end of the cleaning module 37, and the output end of the cleaning module 37 is connected with the input end of the report generating module 38.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation. The use of the phrase "comprising one of the elements does not exclude the presence of other like elements in the process, method, article, or apparatus that comprises the element.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (5)

1. The utility model provides an thing networking data acquisition analysis management system, includes user (1), server (2) and safety verification system (3), user (1) realizes two-way connection through ethernet and server (2), server (2) realize two-way connection through ethernet and safety verification system (3), its characterized in that: safety verification system (3) and central processing unit (4) realize two-way connection, central processing unit (4) realize two-way connection with risk level partition unit (8) and verification integrated unit (9) respectively, risk level partition unit (8) realize two-way connection with trigger element (31), trigger element (31) are including time limit setting module (33), surplus statistics module (34) and time record module (35), the output of time limit setting module (33) and time record module (35) all is connected with the input of surplus statistics module (34), trigger element (31) and memory cell (32) realize two-way connection, memory cell (32) include surplus add module (36), clearance module (37) and report form generation module (38).
2. The internet of things data acquisition and analysis management system according to claim 1, wherein: the output end of the storage unit (32) is connected with the input end of the limit locking module (12).
3. The internet of things data acquisition and analysis management system according to claim 2, wherein: the output end of the verification integration unit (9) is connected with the input end of the risk grading unit (8), and the output end of the risk grading unit (8) is connected with the input end of the secondary verification unit (10).
4. The internet of things data acquisition and analysis management system according to claim 3, wherein: and the output end of the secondary verification unit (10) is respectively connected with the input ends of the coordinate recording module (11) and the limit locking module (12).
5. The internet of things data acquisition and analysis management system according to claim 4, wherein: the output end of the allowance adding module (36) is connected with the input end of the cleaning module (37), and the output end of the cleaning module (37) is connected with the input end of the report generating module (38).
CN202110440379.8A 2021-04-23 2021-04-23 Internet of things data acquisition, analysis and management system Pending CN113313350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110440379.8A CN113313350A (en) 2021-04-23 2021-04-23 Internet of things data acquisition, analysis and management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110440379.8A CN113313350A (en) 2021-04-23 2021-04-23 Internet of things data acquisition, analysis and management system

Publications (1)

Publication Number Publication Date
CN113313350A true CN113313350A (en) 2021-08-27

Family

ID=77372549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110440379.8A Pending CN113313350A (en) 2021-04-23 2021-04-23 Internet of things data acquisition, analysis and management system

Country Status (1)

Country Link
CN (1) CN113313350A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102446256A (en) * 2011-08-24 2012-05-09 宇龙计算机通信科技(深圳)有限公司 Terminal and application program management method
CN103079113A (en) * 2011-10-26 2013-05-01 康佳集团股份有限公司 Smart television with time-limited application program and control method thereof
CN103440140A (en) * 2013-09-11 2013-12-11 昆山富泰科电脑有限公司 System for classifying applications of intelligent device and setting use permission
CN103473015A (en) * 2013-09-22 2013-12-25 广东欧珀移动通信有限公司 Anti-addiction method and terminal
CN104468524A (en) * 2014-11-14 2015-03-25 小米科技有限责任公司 Permission verification method and device
CN105208132A (en) * 2015-10-14 2015-12-30 成都中科创达软件有限公司 Intelligent terminal cloud management system
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device
CN105760746A (en) * 2016-01-28 2016-07-13 福州瑞芯微电子股份有限公司 Authority management method, authority distribution method and equipment
CN109416659A (en) * 2017-09-30 2019-03-01 深圳市得道健康管理有限公司 A kind of network terminal and its constrained procedure of internet behavior
CN110062288A (en) * 2019-05-21 2019-07-26 广州视源电子科技股份有限公司 Application management method, device, user terminal, multimedia terminal and storage medium
CN112417429A (en) * 2020-11-26 2021-02-26 维沃移动通信有限公司 Security verification method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102446256A (en) * 2011-08-24 2012-05-09 宇龙计算机通信科技(深圳)有限公司 Terminal and application program management method
CN103079113A (en) * 2011-10-26 2013-05-01 康佳集团股份有限公司 Smart television with time-limited application program and control method thereof
CN103440140A (en) * 2013-09-11 2013-12-11 昆山富泰科电脑有限公司 System for classifying applications of intelligent device and setting use permission
CN103473015A (en) * 2013-09-22 2013-12-25 广东欧珀移动通信有限公司 Anti-addiction method and terminal
CN104468524A (en) * 2014-11-14 2015-03-25 小米科技有限责任公司 Permission verification method and device
CN105208132A (en) * 2015-10-14 2015-12-30 成都中科创达软件有限公司 Intelligent terminal cloud management system
CN105574378A (en) * 2015-12-09 2016-05-11 小米科技有限责任公司 Terminal control method and terminal control device
CN105760746A (en) * 2016-01-28 2016-07-13 福州瑞芯微电子股份有限公司 Authority management method, authority distribution method and equipment
CN109416659A (en) * 2017-09-30 2019-03-01 深圳市得道健康管理有限公司 A kind of network terminal and its constrained procedure of internet behavior
CN110062288A (en) * 2019-05-21 2019-07-26 广州视源电子科技股份有限公司 Application management method, device, user terminal, multimedia terminal and storage medium
CN112417429A (en) * 2020-11-26 2021-02-26 维沃移动通信有限公司 Security verification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN105117544B (en) Android platform App methods of risk assessment and device based on mobile cloud computing
CN104376266B (en) The determination method and device of application software level of security
US8359006B1 (en) Using communications records to detect unauthorized use of telecommunication services
CN103368904A (en) Mobile terminal, and system and method for suspicious behavior detection and judgment
CN105516133A (en) User identity verification method, server and client
Jiang et al. Isolating and analyzing fraud activities in a large cellular network via voice call graph analysis
CN103875015A (en) Multi-factor identity fingerprinting with user behavior
CN104486727A (en) Mobile phone anti-theft method and system based on Android system
CN107018115B (en) Account processing method and device
CN103415004A (en) Method and device for detecting junk short message
CN103369486A (en) System and method for preventing fraud SMS (Short message Service) message
CN103646310A (en) Rental-estate management system
CN107895039B (en) Method for constructing log database of campus network authentication system
CN102546654A (en) Security management system for server
CN103366116A (en) Predicting system, method and device for potential threats of application program of mobile terminal
CN104994220B (en) A kind of data processing method and system
CN114004708A (en) Risk control method and device for business system
CN113313350A (en) Internet of things data acquisition, analysis and management system
CN107835174B (en) Account book anti-fraud system and method based on Internet of things
CN107403386A (en) Insure management method and system based on bank outlets
CN113904828B (en) Method, apparatus, device, medium and program product for detecting sensitive information of interface
CN111901770B (en) Method and system for detecting call ticket processing efficiency of roaming place server
CN110033058A (en) Product sharing method, device, computer equipment and storage medium
CN115049330A (en) Grid push order intelligent distribution method and related product
CN114092065A (en) Data governance platform organizational structure and system management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210827

WD01 Invention patent application deemed withdrawn after publication