CN115964683A - Anti-sink-lost management method and system based on group supervision - Google Patents

Anti-sink-lost management method and system based on group supervision Download PDF

Info

Publication number
CN115964683A
CN115964683A CN202310077535.8A CN202310077535A CN115964683A CN 115964683 A CN115964683 A CN 115964683A CN 202310077535 A CN202310077535 A CN 202310077535A CN 115964683 A CN115964683 A CN 115964683A
Authority
CN
China
Prior art keywords
program
software
group
client software
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310077535.8A
Other languages
Chinese (zh)
Other versions
CN115964683B (en
Inventor
孔令宇
房玉国
孔祥真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenjiu Software Technology Shandong Co ltd
Original Assignee
Wenjiu Software Technology Shandong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenjiu Software Technology Shandong Co ltd filed Critical Wenjiu Software Technology Shandong Co ltd
Priority to CN202310077535.8A priority Critical patent/CN115964683B/en
Publication of CN115964683A publication Critical patent/CN115964683A/en
Application granted granted Critical
Publication of CN115964683B publication Critical patent/CN115964683B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention discloses an anti-addiction management method and system based on group supervision, belongs to the technical field of shielding software, and aims to solve the technical problems that the existing anti-addiction software has low limitation on games or videos, lacks effective anti-cracking means and cannot really play an effective anti-addiction role. The method comprises the following steps: the client software limits the operation of the target program belonging to the limited blacklist according to a preset limit rule; if the background software management program monitors that the client software is unloaded, the background software management program sends unloading warning information to all group members in a supervision group of the client software; if the client software is monitored to be damaged, repairing the client software through a preset repairing program, and if the client software cannot be repaired, sending damage warning information to all group members in the supervision group; and the background software management program automatically restores the abnormal change operation in the limited blacklist through the software protection program and sends abnormal warning information to each group member in the supervision group.

Description

Anti-sink-lost management method and system based on group supervision
Technical Field
The application relates to the technical field of shielding software, in particular to an anti-sink and anti-lost management method and system based on group supervision.
Background
The rapid development of the internet technology provides great convenience for daily life and work of people, people can acquire a lot of information from the internet, and electronic equipment such as smart phones and computers which are used in cooperation with the internet are also popularized. The computer is used for learning the network video and inquiring related knowledge, and the method is a simple and quick learning mode. In order to obtain more information data, more and more people using electronic equipment are popularized to students, the self-restraint ability of the students is poor, the students can play games or perform other entertainment activities by using a network after learning on the network for a period of time, and some people even sink on the network. The long-time use of the mobile phone for entertainment seriously affects the study and life of students and hinders the normal growth of the students.
In order to prevent children from being enthusiastic due to enthusiasm in games, many parents often limit the time for the children to watch the mobile phone. However, such limitation requires the parents to supervise all the time, otherwise the anti-addiction effect cannot be really achieved. Some anti-addiction software can limit games or short videos intermittently, but only limits partial games or videos, or forcibly puts the mobile phone in a dormant state in a certain time period so that the mobile phone cannot be used normally, and the anti-addiction strength is low. And the limiting means of the anti-addiction software is easy to crack, and an effective anti-cracking means is lacked, so that the anti-addiction function cannot be really played.
Disclosure of Invention
The embodiment of the application provides an anti-sinking and anti-lost management method and system based on group supervision, which are used for solving the following technical problems: the existing anti-addiction software has small limitation on games or videos, lacks effective anti-cracking means and cannot really play an effective anti-addiction role.
The embodiment of the application adopts the following technical scheme:
in one aspect, an embodiment of the present application provides a sink-and-lose prevention management method based on group supervision, and the method includes: the client software limits the operation of the target program belonging to the limited blacklist according to a preset limiting rule; if the background software management program monitors the unloading operation of the client software, unloading warning information is sent to all group members in a monitoring group of the client software; if the background software management program monitors that the client software is damaged, the client software is repaired through a preset repair program, and if the client software cannot be repaired, damage warning information is sent to all group members in the supervision group; and the background software management program automatically restores the abnormal change operation in the limited blacklist through a software protection program and sends abnormal warning information to each group member in the supervision group.
In a possible implementation manner, the client software limits the operation of the target program belonging to the limited blacklist according to a preset limiting rule, which specifically includes: the client software judges whether the target program belongs to the limited blacklist or not according to the program identifier of the target program; the program identification is a program process name or a program package name; if yes, judging the type of the limited blacklist to which the target program belongs; wherein the restricted blacklist types include a full restricted blacklist and an intermittent restricted blacklist; if the target program belongs to the complete restriction blacklist, the client software refuses to start the target program; and if the target program belongs to the intermittent limitation blacklist, the client software limits the operation of the target program according to a preset intermittent limitation rule.
In a possible implementation manner, after the client software refuses to start the target program if the target program belongs to the full-restriction blacklist, the method further includes: if the target program belongs to the complete restriction blacklist, the client software pops up a preset complete restriction tutorial on the desktop of the user terminal equipment and circularly plays the tutorial after closing the target program; determining a corresponding health tutoring website according to the browsing attention weight of the current user, and linking to the broadcasting page of the completely-limited tutoring; if the user clicks the broadcast page of the completely-limited tutor, automatically jumping to the linked health tutor website, and pushing related health tutor content to the user; and after the total limit tutorial is displayed for a preset time or the user closes the health tutorial website, the client software closes the tutorial broadcast program.
In a possible implementation manner, if the target program belongs to the intermittent limitation blacklist, the client software limits the operation of the target program according to a preset intermittent limitation rule, specifically including: the client software acquires the last operation ending time and the current day operation total time of the target program; if the interval between the current time and the last operation ending time reaches the preset time interval in the preset intermittent restriction rule, and the total time of the current operation is less than the longest operation time in the preset intermittent restriction rule, allowing the target program to start, and recording the operation time; stopping running the target program after the running time reaches the single running time in the preset intermittent limiting rule or the total running time of the current day reaches the longest running time; if the interval between the current time and the last operation ending time is smaller than the preset time interval in the preset intermittent limitation rule, or the total time of the current operation reaches the longest operation time in the preset intermittent limitation rule, refusing the starting of the target program and popping up a preset intermittent limitation tutorial; determining a corresponding health tutoring website according to the browsing attention weight of the current user, and linking to the broadcasting page of the intermittent limitation tutoring; if the user clicks the broadcasting page of the intermittent limit tutoring, automatically jumping to the linked health tutoring website, and pushing related health tutoring content to the user; and the client software counts the actual running time of the limited running program in the intermittent limitation blacklist at a preset time every day, generates an actual running time table and sends the actual running time table to the mobile phones of all the group members in the supervision group in a short message mode.
In one possible embodiment, before sending uninstall alert information to each member of the supervisory group of client software, the method further comprises: after the user installs the client software, the client software creates a supervision group, and guides the user to add a group member mobile phone number and verify a verification code in the supervision group through a group setting program; wherein the number of group members in the supervision group is not less than two; after the verification code passes the verification, the client software stores the corresponding group member mobile phone number into the supervision group and the group database; the client software responds to a group modification request of a user, sends confirmation information to all group members in the supervision group, and opens a group modification interface to the user after receiving the confirmation feedback information of all the group members; otherwise rejecting the group modification request.
In a possible implementation manner, the automatically restoring, by the background software management program, the program change operation in the limited blacklist through a software protection program specifically includes: the client software traverses the limited blacklist in a blacklist database through the software protection program, and monitors the program identification of the limited operation program contained in the limited blacklist; if the program identifier of any limited operation program is monitored to be modified, the software protection program restores the modified program identifier; and if the program attribution directory of any limited operation program is monitored, adding a new file through pasting operation, and deleting the newly added file by the software protection program.
In a possible implementation manner, the limited running programs in the limited blacklist are not limited to the application programs installed in the user terminal equipment; the method further comprises the following steps: the background software management program monitors new online applications in an application market, and judges the limited level of the new online applications according to the application types of the new online applications; wherein the restricted grades include a low restricted grade, a medium restricted grade, and a high restricted grade; the background software management program adds the new online application with the high limited level to a complete limitation blacklist, adds the new online application with the medium limited level to an intermittent limitation blacklist, and does not limit the new online application with the low limited level; the background software management program responds to the operation of adding the limited running program in the client software by the user, and adds the process name or the package name of the limited running program added by the user to a corresponding limited blacklist; wherein, the limited blacklist only includes the function of adding the limited operation program.
In a possible implementation manner, before the client software performs operation limitation on the target programs belonging to the limited blacklist according to a preset limitation rule, the method further includes: after the client software is installed on the mobile terminal, corresponding hiding and displaying processing is carried out according to the preset attributes of each software module; wherein each software module at least comprises: the client software comprises an uninstalling program module of the client software, a main program module of the client software, a blacklist adding module and a group setting modification module; the preset attributes comprise hiding, disclosing and clearing; the client software deletes the software module with the preset attribute of clearing; the software module with the preset attribute of clearing at least comprises the uninstalling program module; hiding the software module with the preset attribute of hiding through a preset hiding program; the software module with the preset attribute being hidden at least comprises the main program module; for a software module with a preset attribute of being public, creating a corresponding shortcut and displaying the shortcut on a desktop; the software modules with preset attributes as open at least comprise the blacklist adding module and the group setting modification module.
In one possible embodiment, the method further comprises: after receiving the remote uninstalling request, the background software management program verifies the identity of the requester through a biological characteristic identification technology; wherein the biometric identification technology at least comprises face identification or fingerprint identification; if the identity of the requester is consistent with the identity of the supervisor collected during client software registration, the verification is successful, and the background software management program carries out remote uninstalling operation on the client software used by the requester.
On the other hand, the embodiment of the application also provides an anti-sinking lost management system based on group supervision, and the system comprises:
compared with the prior art, the anti-sink lost management method and system based on group supervision provided by the embodiment of the application have the following beneficial effects:
1. the group monitoring function and the software protection program are added in the health shielding software, and the method plays an effective protection role when a user possibly unloads or destroys the client software or modifies the package name and the process name of the client software in order to avoid monitoring. Especially, the process name is easy to be modified by a computer player, and the modified process name does not belong to the blacklist range any more, so that the limitation failure can be caused. If the client software is uninstalled, damaged or modified, the client software and a background software management program of the software detect the monitoring function of the client software during networking, and send a short message notification reminding of uninstallation or damage to the mobile phone numbers of the group members in the set group through a short message sending function, so as to remind the group members to check and monitor after seeing the message.
2. The tutoring popup device is provided with the tutoring popup program, when a user uses the restricted operation program, different tutoring can be popped out in real time according to complete restriction and intermittent restriction, and the tutoring popup device has the characteristics of individuation, humanization, strong pertinence and the like, is beneficial to the user to psychologically accept anti-addiction restriction, and forms healthier and more active learning attitude and living attitude. And the application also links a tutoring webpage or a website on the tutoring playing page, and after clicking a limited program, a user can click the popped-up tutoring playing page and jump to the linked tutoring webpage or website, so that the user can select a healthier relaxing mode, accept network health psychological tutoring or related knowledge learning as far as possible, can learn various kinds of knowledge, provides flexible and various learning means, can read books, can live broadcast lessons and can watch meaningful learning videos. The function can change the passive psychological state of network enthusiasts or already enthusiasts, can also lead learning to become easy and interesting, can lead the user to change the internet surfing habits and living habits to the maximum extent fundamentally, changes the use purpose and habits of the network from the perspective of thought and psychology, and prevents the user from generating unhealthy internet surfing behaviors such as network enthusiasm and the like. Regardless of the user behaviors of completely limiting use or intermittently limiting use, the tutoring webpage pushes different knowledge and contents which accord with the individuality of the user according to the user browsing attention weight, and personalized psychological tutoring and knowledge learning are carried out, so that the tutoring function of the application is more efficient and accurate.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts. In the drawings:
fig. 1 is a flowchart of an anti-sinking and lost management method based on group supervision according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a working procedure of a monitoring main program of client software according to an embodiment of the present application;
fig. 3 is a flowchart of software protection provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of an anti-sink management system based on group supervision according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of client software provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a background software management program according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any inventive step based on the embodiments of the present disclosure, shall fall within the scope of protection of the present disclosure.
The embodiment of the application provides an anti-sink and lost management method based on group supervision, and as shown in fig. 1, the anti-sink and lost management method based on group supervision specifically comprises steps S101-S104:
s101, the client software limits the operation of the target program belonging to the limited blacklist according to a preset limiting rule.
Specifically, the client software judges whether the target program belongs to a limited blacklist according to the program identifier of the target program; wherein, the program identification is the program process name or the program package name. The target program refers to an application program which is about to be started after being clicked by a user.
If the target program belongs to the limited blacklist, judging the type of the limited blacklist to which the target program belongs; wherein the restricted blacklist types include a full restricted blacklist and an intermittent restricted blacklist. And if the target program belongs to the complete restriction blacklist, the client software refuses to start the target program. And if the target program belongs to the intermittent limitation blacklist, the client software limits the operation of the target program according to a preset intermittent limitation rule.
Further, if the target program belongs to the complete restriction blacklist, after the target program is closed by the client software, a preset complete restriction tutor is popped up on the desktop of the user terminal equipment and is played in a circulating mode. And then, according to the browsing attention weight of the current user, determining a corresponding health tutoring website and linking to a broadcasting page for completely limiting the tutoring. And if the user clicks the broadcast page of the completely-limited tutor, automatically jumping to a linked health tutor website and pushing related health tutor content to the user. And after the preset time for displaying the tutorial is completely limited or the user closes the health tutorial website, the client software closes the tutorial broadcasting program.
Further, if the target program belongs to the intermittent limitation blacklist, the client software acquires the last operation ending time and the current day operation total time of the target program. And if the interval between the current time and the last operation ending time reaches the preset time interval in the preset intermittent limiting rule, and the total operation time on the day is less than the longest operation time in the preset intermittent limiting rule, allowing the target program to start, and recording the operation time. And stopping running the target program after the running time reaches the single running time in the preset intermittent limit rule or the total running time of the current day reaches the maximum running time. And if the interval between the current time and the last operation ending time is smaller than the preset time interval in the preset intermittent limit rule or the total operation time on the day reaches the longest operation time in the preset intermittent limit rule, refusing the starting of the target program and popping up a preset intermittent limit tutorial entry. Determining a corresponding health tutoring website according to the browsing attention weight of the current user, and linking to a broadcasting page for intermittently limiting tutoring; and if the user clicks the broadcasting page of the intermittent limit tutoring, automatically jumping to a linked health tutoring website and pushing related health tutoring content to the user.
In one embodiment, the target program belongs to the interval restriction blacklist, and the last operation end time of the target program acquired by the client software is 12:00, the preset time interval in the preset intermittent limiting rule is 1 hour, the allowable operation time of each time is 10 minutes, and the maximum operation time in the preset intermittent limiting rule is 50 minutes. At this time, if the current time is 13 a.m.: 10, the total time of the operation of the current day is 30 minutes, then the interval between the current time and the last operation ending time is 1 hour and 10 minutes, which is greater than 1 hour specified by the restriction rule, and the total time of the operation of the current day does not exceed the maximum operation time specified by the restriction rule, so that the target program can be allowed to start, and the target program is forcibly closed after the operation time of the current day reaches 10 minutes (i.e. 13. If the current time is 12 a.m.: 40, then the interval from the last run end time is only 40 minutes, less than 1 hour as specified by the restriction rules, thus denying the target program launch. In still another case, if the total time of the current operation has reached 50 minutes, the target program is rejected whether the interval between the current time and the last operation end time exceeds a preset time interval.
In one embodiment, after the client software is activated, if the user attempts to use the restricted program, the restricted program will activate the tutorial pop-up program in addition to being restricted from working properly, the predetermined tutorial will pop up, and the tutorial database data will be broadcast in a loop. The tutoring and thesaurus broadcasting page is directly linked with the tutoring webpage; if the user clicks on the link to tutor the web page, the web page will push content to the user regarding mental knowledge, inspirational stories, success stories, learning stories, etc. that is beneficial for learning and health. Meanwhile, an operator organizes content authors to research from a psychological perspective, and gives knowledge content pushing meeting psychological guidance through the customer attention weight and the revealed behavior trend weight. Of course, the tutoring web page can also provide the contents of reading, learning materials, even web lessons, etc. If the limited program that the user is trying to run belongs to a fully limited program, the popped-up tutorial is a fully limited tutorial, such as: "Please not play the game for your future! "Or" strictly forbid viewing of the watch type live broadcast! ", and link the tutoring web page; if the user is attempting to run an intermittence limiting program, the popped-up tutorial is an intermittence limiting tutorial, such as: "Please watch this video after an interval of one hour for your health! "Or" you do not know the pause time yet, please see the book bar first! "and so on and links to tutor pages. And when the tutor is displayed for a reasonable time or the client link browses the webpage and closes the webpage, the program automatically exits.
Further, the client software counts the actual running time of the limited running program in the intermittent limitation blacklist at a preset time every day, generates an actual running time table, and sends the actual running time table to the mobile phones of all group members in the supervision group in the form of short messages, so that parents or teachers can know the use condition of the limited running program.
As a possible implementation manner, fig. 2 is a flowchart of a working process of a client software monitoring main program provided in an embodiment of the present application, and as shown in fig. 2, the monitoring process of the client software specifically includes the following steps:
s61, the client side monitoring main program operates the software recognition program after starting to work. The software identification program is associated with a blacklist database.
S62, determining a process name or package name blacklist, wherein the blacklist comprises an intermittent limitation blacklist S621 and a complete limitation blacklist S622, an operating program corresponding to the process name or package name in the intermittent limitation blacklist is monitored, a main program is given to an intermittent limitation definition rule, for example, the main program is allowed to operate for 10 minutes and then is closed, and the main program is allowed to operate for 10 minutes after 1 hour. The programs corresponding to the process names or package names in the full restriction blacklist are all programs which need to be prohibited for teenagers, such as games or enjoying live broadcast programs, the rule set by the monitoring main program is directly closed, the operation of the main program is completely restricted, and corresponding tutorials and linked tutorial webpages are popped up.
And S63, clicking software installed in the running terminal equipment by the user.
S6110, the software identification program traverses the process name or package name blacklist, and confirms whether the process name or package name of the software operated by the user belongs to the blacklist determined in the step S62. If yes, the process proceeds to S6111. If the process name or the packet name does not belong to the blacklist, the monitoring process is ended.
S6111, further confirming and analyzing whether the software belongs to the intermittent limitation blacklist or the complete limitation blacklist. When the software identification program determines that the name of the running software belongs to the intermittent restriction blacklist, the process proceeds to step S6123. When it is determined that the operation name does not belong to the intermittent restriction blacklist, the main routine proceeds to step S6112.
S6112, starting a software process closing program, shielding software operated by a user, activating a tutor popping program, and popping a tutor. And if the user clicks the tutoring playing page, jumping to the linked tutoring webpage or website. And playing the tutoring dictionary for a period of time or exiting to finish the monitoring process after the user closes the tutoring webpage or website.
S6123, starting the software intermittent limiting program, intermittently controlling the running program according to a defined rule, and closing the running program after a certain running time, wherein the method specifically comprises the following steps:
s611a, the user tries to open the operation intermittent limitation blacklist corresponding program.
S611b, the main program judges whether the current operation of the user accords with the time interval playing definition or not according to the definition rule.
In one embodiment, it is determined whether the interval playing time of a certain short video program exceeds a specified 1 hour, if yes, the intermittent playing rule is met, step S611c is performed, the playing and running program is allowed to run, the user can watch the short video program for a certain period of time according to a defined time, step S613 is performed, and the main program starts the masking program, closes the program, and exits to end the supervision and running. Otherwise, if the program intermittent running time definition corresponding to the intermittent blacklist is not met, the step S611b is entered, the software process closing program is started, the program is closed, the tutorial is popped up, and the tutorial webpage is linked. If the user clicks the link to browse the tutoring webpage, the step S611e is carried out, and the webpage is entered for tutoring learning; and when the user closes the webpage, finishing the supervision operation.
As a feasible implementation mode, whether the tutoring is limited completely or limited intermittently, the database has a plurality of pieces, and the tutoring is played circularly in the respective pop-up process, and the playing time is short and reasonable, and the normal use of the terminal by the user is not influenced.
Further, the limited-operation programs in the limited blacklist are not limited to the applications installed in the user terminal device. And the background software management program monitors the new online application in the application market and judges the limited level of the new online application according to the application type of the new online application. Wherein the restricted level includes a low restricted level, a medium restricted level, and a high restricted level.
Further, the background software management program adds the new online application with the high limited level to a complete limitation blacklist, adds the new online application with the medium limited level to an intermittent limitation blacklist, and does not limit the new online application with the low limited level.
Further, the user can also add the limited-operation program to the blacklist by himself. The background software management program can also respond to the operation that the user adds the limited running program in the client software, and add the process name or the package name of the limited running program added by the user to the corresponding limited blacklist. In addition, in order to prevent the supervised person from deleting the limited running program in the blacklist, the limited blacklist only comprises a function of adding the limited running program, and the limited running program added into the blacklist cannot be deleted.
As a feasible implementation mode, in order to adapt to the increasing limited running programs and realize the management of the background to the front end, all databases corresponding to the front end software, such as a blacklist database, a group database, a member management database and the like, which are arranged in the background software, realize networking synchronization and can be upgraded at any time. The database of the client software, whether a blacklist database or a tutoring database, comprises a group setting database, and all user member databases are in networking synchronization with the database of the background software management program of the application. The client software data, no matter the client software data is set or modified, is transmitted back to the background software management program and is stored in the corresponding database; and the database update of the background software management program can be synchronously updated to the database of the client software after being networked. According to the method and the device, the new online limited program is closely monitored in a mode of combining technical means with manual detection, and the new online limited program is added into a blacklist and classified in time, so that the limited program which harms the growth of teenagers is shielded to the maximum extent.
And S102, if the background software management program monitors the unloading operation of the client software, sending unloading warning information to all group members in the monitoring group of the client software.
Specifically, after the user installs the client software, the client software creates a supervision group, and guides the user to add a group member mobile phone number and verify a verification code in the supervision group through a group setting program. Wherein the number of the group members in the supervision group is not less than two.
Further, after the verification code passes the verification, the client software stores the corresponding mobile phone number of the group member in the supervision group and the group database.
The user can modify and monitor the numbers of the group members and the mobile phones added in the group by setting a modification function in the group. The client software responds to the group modification request of the user, sends confirmation information to all group members in the supervision group, and opens a group modification interface to the user after receiving the confirmation feedback information of all the group members; otherwise, the group modification request is rejected.
Furthermore, when the group member mobile phone number is deleted in the supervision group, the operation data is transmitted back to the background software management program through the network, and the short message is transmitted to all the group member mobile phone numbers through the short message transmission submodule to inform that the mobile phone number is unbound and deleted by the group. While operational data is added to the log. If the client software for modifying the group setting is not networked, the relevant modified data is temporarily stored in the client software, the data is transmitted back to the background after networking, and a short message notice that the group is unbound and deleted is sent to the mobile phone number of the group member with the deleted number.
As a feasible implementation manner, after the client software is installed on the mobile terminal, the client software performs corresponding hiding and displaying processing according to the preset attributes of each software module. Wherein, each software module at least comprises: the client software comprises an uninstalling program module of the client software, a main program module of the client software, a blacklist adding module and a group setting modification module; the preset attributes include hide, publish, and clear. Specifically, the client software deletes the software module with the preset attribute of clearing; the software module with the preset attribute of clearing at least comprises an uninstalling program module; hiding the software module with the preset attribute being hidden through a preset hiding program; the software module with the preset attribute of being hidden at least comprises a main program module; for a software module with a preset attribute of being public, creating a corresponding shortcut and displaying the shortcut on a desktop; the software modules with the preset attributes being public at least comprise a blacklist adding module and a group setting modification module.
If the supervisor needs to uninstall the client software of the application, a remote uninstalling request can be sent to the background software management program, and after receiving the request, the operator of the background software management program verifies the identity of the requester through a biological characteristic identification technology. Biometric identification techniques include at least face recognition or fingerprint recognition. If the identity of the requester is consistent with the identity of the supervisor acquired during client software registration, the verification is successful, and the operator performs remote uninstalling operation on the client software used by the requester. The uninstalling program can also be sent to a requester, and the requester carries out software uninstalling. This can avoid frequent uninstallation of the client software by the supervised person to evade supervision.
As a feasible implementation mode, in order to prevent the client software from being unloaded by an attempted evasion limiter, which may frequently occur the phenomenon of uninstalling and installing uninstallations, the application sets a hidden program package in the client software installation package, wherein the hidden program package can delete the uninstaller of the client software after the software installation is completed, and set the installed client software in a hidden state. The client software program does not generate shortcuts of the whole software on the desktop of the user terminal, and only generates shortcuts of desktop blacklist adding and group setting modification functions. And the uninstalling program of the client software is independently controlled by a reliable manager of a mobile phone or a computer.
Further, if the background software management program monitors that the client software uninstalls, and the client software uninstalls are initiated by itself and no uninstall request is sent to the background, the background software management program sends uninstall warning information to each group member in the supervision group of the client software.
S103, if the background software management program monitors that the client software is damaged, the client software is repaired through a preset repair program, and if the client software cannot be repaired, damage warning information is sent to all group members in the supervision group.
Specifically, a remote upgrading and monitoring program is set in the background software management program, and once the client software installed on a certain user terminal is found to be abnormal after networking, a notification short message is sent to the group members correspondingly set in the terminal to prompt all the group members to check the reason of the problem occurring in the terminal.
As a feasible implementation mode, a client software repair program is also arranged in an upgrading program of the background software management program, and if the client software repair program can be remotely repaired, the client software repair program can be automatically repaired after networking. If the repair can be automatically carried out, short message notification can not be sent to all the group members corresponding to the terminal.
And S104, automatically restoring the abnormal change operation in the limited blacklist by the background software management program through the software protection program, and sending abnormal warning information to each group member in the supervision group.
Specifically, the client software traverses the limited blacklist in the blacklist database through the software protection program, and monitors the program identifier of the limited running program contained in the limited blacklist. And if the program identifier of any limited operation program is monitored to be modified, the software protection program restores the modified program identifier. And if the program attribution directory of any limited operation program is monitored, adding a new file through pasting operation, and deleting the newly added file by the software protection program. The behavior that the program corresponding to the blacklist is required to continue to run by modifying the process name or the packet name is effectively prevented.
As a possible implementation manner, the software protection program may be embedded in the client software, installed and used in a binding manner, or may be installed and used as an independent software program. If the system is installed and used independently, the blacklist database and the client file comprise background logs, and programs such as background upgrading remote inspection maintenance and the like are independently set.
As a possible implementation manner, fig. 3 is a software protection flow chart provided in an embodiment of the present application, and as shown in fig. 3, the software protection flow specifically includes the following steps:
and S71, starting a monitoring program of the software protection program to work, and timely monitoring whether the process name or the package name of the terminal system is modified or whether a name in the same format is pasted under a certain program root directory. The monitoring program, i.e. the process name or package name detection program, is used for identifying and detecting the change of the process name or package name and instantly making the processing instruction for defining the rule.
And S72, finding that the process name or the package name of the terminal system changes, and comparing the changed name to a blacklist database by traversing the process name or the package name blacklist database of the main program. If the changed name is a new file name pasted into the directory, the process proceeds to S74, and if the changed name is a modified original package name, the process proceeds to S73.
And S73, if the process name or the package name of the client software running program is modified, the software protection program restores the modified name, and then the protection process is ended. For example: it is found that "word.exe" is changed to "wwrr.exe", and the software protection program still restores the "wwrr.exe" to which it was changed back to "word.exe", leaving the process name or package name unchanged.
And S74, if finding that the new process name or the new package name is pasted into the root directory of the client running program, directly deleting the new process name or the new package name. For example: the original default process name 'word.exe' is found under the root directory of the running program, and under the aaa directory under the C disk: "C: exe ". Ex.// aaa/word. At this time, if there is a behavior that "wwwd. This prevents the possibility of starting a restricted program with a new process name or package name by means of pasting the new process name or package name and then modifying the name of the existing process name or package name shortcut that is the same as the pasted process name or package name.
In the PC, the process name is easy to modify, most of the modified process name can start running, and therefore, the problem of preventing the name from being modified is an important problem of the stability and safety of the use of relational software. The foregoing is directed to modifying the original name. Another way of modifying the program name is to paste a new name, then modify the shortcut name of the running software process name or package name to be the same as the name pasted in the previous step, avoid the original process name or package name, and start the running of the program corresponding to the running main program blacklist, thereby possibly causing the function failure of the client software of the application. The software protection program adopted by the application solves the problem of software failure possibly caused by two modification means, and greatly improves the stability and the safety.
In addition, an embodiment of the present application further provides a sink-proof management system based on group supervision, and as shown in fig. 4, the sink-proof management system 400 based on group supervision specifically includes:
the client software 410 is used for limiting the operation of the target program belonging to the limited blacklist according to a preset limiting rule;
the background software management program 420 is configured to send uninstalling warning information to each group member in the monitoring group of the client software if the client software uninstalling operation is monitored; if the client software is monitored to be damaged, repairing the client software through a preset repairing program, and if the client software cannot be repaired, sending damage warning information to all group members in the supervision group; and automatically restoring the abnormal change operation in the limited blacklist through a software protection program, and sending abnormal warning information to each group member in the supervision group.
Specifically, fig. 5 is a schematic structural diagram of client software provided in an embodiment of the present application, and as shown in fig. 5, the client software includes a program installation module M1, M1 is connected to a monitoring main program module M6, and M6 is connected to a process name or package name protection module M7 and is connected to a main program activation module M8. M6 embeds two submodule, be monitoring blacklist module M62 and restricted program monitoring module M61 respectively. The M62 is embedded with two sub-modules, namely a completely restricted blacklist module M621 and an intermittently restricted blacklist module M622, and the M621 and M622 modules are both provided with a blacklist adding module M6211, so that a terminal user can add a blacklist by himself. Two sub-modules, namely a terminal program operation identification module M611 and a terminal operation program control module M612, are embedded in the limited program monitoring module M61. M612 embeds two sub-modules, namely a full limit control module M6121 and an intermittent limit control module M6122. The main program activation module M8 embeds two sub-modules, a charging module M83 and an activation confirmation module M84.
Further, the program installation module M1 undertakes a program installation function, the monitoring main program module M6 undertakes a client software monitoring main program function, and the process name or package name protection module M7 undertakes a process name or package name protection function. The program installation module M1 is connected with the remote upgrading and communication module M11 to realize network connection and digital transmission with the background software management program.
It should be noted that the module structure in fig. 5 is only a general structural framework for describing the client software of the present invention, and not all structural contents; the connection arrangement combination between the modules is not a fixed and unchangeable unique structure, and any design which reasonably arranges and combines the functional modules according to the conception of the invention to realize the purpose of the invention falls into the protection scope of the invention.
Further, fig. 6 is a schematic structural diagram of a background software management program provided in an embodiment of the present application, and as shown in fig. 6, the background software management program includes a background home page, and the background home page is divided into two major modules: a tutoring website module and a background management module. The background management module is provided with the following sub-modules: shielding management, terminal management, member management, order management, product service, operation management, download management, message management, upgrade management, file management, system management, log management, and the like. The shielding management module is used for setting and adding or deleting a blacklist database, and updating the relevant data of the client software through the upgrading management module, the blacklist is a process name or packet name database corresponding to a limited program which is possibly operated by the client, and the limited program which is possibly operated comprises the following steps: game programs, premium type live programs, and other limited video programs. The operation management module undertakes the sending tasks of the group short messages and other short messages required by the invention and the functions of storing and recording related data. The system management module undertakes the functions of operation payment charging, related data record query and the like. The message management module plays the role of sending text, editing and storing messages, tutoring, mails and the like, and retrieving files and other data. The terminal management module plays roles of unbinding, shutting down or opening the client software, detecting the use condition of the client and the like. The upgrade management module undertakes the functions of network connection, remote upgrade, communication and the like with the client.
The tutoring website module comprises the following sub-modules: the short text tutoring module, the short video tutoring module and the interesting learning module; a reading module; a video teaching module; interest module and other modules. The sub-modules include various psychological coaching functions and learning coaching functions for healthy surfing, which are not described in detail in the present application.
The specific using process of the client software provided by the application is as follows: firstly, installing client software on a computer or a mobile phone through an installation program. In order to facilitate the statistics of management customers by an operator, installation needs to input a mobile phone number of the user and a current installation attribution, wherein the attribution is specifically at a county and district level. Then, the client software has an installation confirmation program, and the installation and use of the software must be confirmed as the voluntary behavior of the user, and optionally confirmed through the mobile phone verification code of the user, and simultaneously agreed with the related agreement and agreement of the software operator, so that the next installation can be carried out. The client software has an installation group program, namely a relationship group is formed by taking a family as a unit or taking a specific group as a unit. The software is installed with a specific program, which can input the mobile phone number of the relation group member, so that once a certain group member of a certain relation group unloads or destroys the software, other group members can receive the information prompt of the unloading or destroying, and simultaneously send the installation or destroying information back to the background record for mutual supervision among the group members. After the installation is completed, the client software can monitor and limit the running programs corresponding to the blacklists one by one.
According to the method and the system, the limitation on the running program of the user client and the corresponding mode of combining the psychological counseling, learning and counseling of the user are realized, and the purpose of preventing the addiction of the Internet on the green can be achieved.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The foregoing description of specific embodiments of the present application has been presented. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the embodiments of the present application pertain. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A sink-proof lost management method based on group supervision is characterized by comprising the following steps:
the client software limits the operation of the target program belonging to the limited blacklist according to a preset limit rule;
if the background software management program monitors the unloading operation of the client software, unloading warning information is sent to all group members in a monitoring group of the client software;
if the background software management program monitors that the client software is damaged, the client software is repaired through a preset repair program, and if the client software cannot be repaired, damage warning information is sent to all group members in the supervision group;
and the background software management program automatically restores the abnormal change operation in the limited blacklist through a software protection program and sends abnormal warning information to each group member in the supervision group.
2. The group supervision-based anti-sinking and disordering management method according to claim 1, wherein the client software limits the operation of the target programs belonging to the limited blacklist according to preset limiting rules, and specifically comprises:
the client software judges whether the target program belongs to the limited blacklist or not according to the program identifier of the target program; the program identification is a program process name or a program package name;
if yes, judging the type of the limited blacklist to which the target program belongs; wherein the restricted blacklist types include a full restricted blacklist and an intermittent restricted blacklist;
if the target program belongs to the complete restriction blacklist, the client software refuses to start the target program;
and if the target program belongs to the intermittent limitation blacklist, the client software limits the operation of the target program according to a preset intermittent limitation rule.
3. The method of claim 2, wherein after the client software refuses to start the target program if the target program belongs to the full-restriction blacklist, the method further comprises:
if the target program belongs to the complete restriction blacklist, the client software pops up a preset complete restriction tutorial on the desktop of the user terminal equipment and circularly plays the tutorial after closing the target program;
determining a corresponding health tutoring website according to the browsing attention weight of the current user, and linking to the broadcasting page of the completely-limited tutoring;
if the user clicks the broadcast page of the completely-limited tutor, automatically jumping to the linked health tutor website, and pushing related health tutor content to the user;
and after the preset time for completely limiting the display of the tutorial is reached or the user closes the health tutorial website, the client software closes the tutorial broadcasting program.
4. The method according to claim 3, wherein if the target program belongs to the intermittent restriction blacklist, the client software restricts operation of the target program according to a preset intermittent restriction rule, specifically including:
the client software acquires the last operation ending time and the total operation time of the current day of the target program;
if the interval between the current time and the last operation ending time reaches the preset time interval in the preset intermittent restriction rule, and the total time of the current operation is less than the longest operation time in the preset intermittent restriction rule, allowing the target program to start, and recording the operation time;
stopping running the target program after the running time reaches the single running time in the preset intermittent limiting rule or the total running time of the current day reaches the longest running time;
if the interval between the current time and the last operation ending time is smaller than the preset time interval in the preset intermittent limitation rule, or the total time of the current operation reaches the longest operation time in the preset intermittent limitation rule, refusing the starting of the target program and popping up a preset intermittent limitation tutorial;
determining a corresponding health tutoring website according to the browsing attention weight of the current user, and linking to the broadcasting page of the intermittent limitation tutoring; if the user clicks the broadcasting page of the intermittent limit tutoring, automatically jumping to the linked health tutoring website and pushing related health tutoring content to the user;
and the client software counts the actual running time of the limited running program in the intermittent limitation blacklist at a preset time every day, generates an actual running time table and sends the actual running time table to the mobile phones of all the group members in the supervision group in a short message mode.
5. The method of claim 1, wherein before sending offload alert information to each member of the client software's supervision group, the method further comprises:
after the user installs the client software, the client software creates a supervision group, and guides the user to add a group member mobile phone number and verify a verification code in the supervision group through a group setting program; wherein the number of group members in the supervision group is not less than two;
after the verification code passes the verification, the client software stores the corresponding group member mobile phone number into the supervision group and the group database;
the client software responds to a group modification request of a user, sends confirmation information to all group members in the supervision group, and opens a group modification interface to the user after receiving the confirmation feedback information of all the group members; otherwise rejecting the group modification request.
6. The group supervision-based anti-sink-lost management method according to claim 1, wherein the background software management program automatically restores the program change operation in the restricted blacklist through a software protection program, specifically comprising:
the client software traverses the limited blacklist in a blacklist database through the software protection program, and monitors the program identification of the limited operation program contained in the limited blacklist;
if the program identifier of any limited operation program is monitored to be modified, the software protection program restores the modified program identifier;
and if the program attribution directory of any limited operation program is monitored, adding a new file through pasting operation, and deleting the newly added file by the software protection program.
7. The group supervision-based anti-sink-lost management method according to claim 1, wherein the restricted running programs in the restricted blacklist are not limited to the applications installed in the user terminal device;
the method further comprises the following steps:
the background software management program monitors new online applications in an application market, and judges the limited level of the new online applications according to the application types of the new online applications; wherein the restricted grades include a low restricted grade, a medium restricted grade, and a high restricted grade;
the background software management program adds the new online application with the high limited level to a complete limitation blacklist, adds the new online application with the medium limited level to an intermittent limitation blacklist, and does not limit the new online application with the low limited level;
the background software management program responds to the operation of adding the limited running program in the client software by the user, and adds the process name or the package name of the limited running program added by the user to a corresponding limited blacklist; wherein, the limited blacklist only includes the function of adding the limited operation program.
8. The group supervision-based anti-sink-lost management method according to claim 1, wherein before the client software restricts the operation of the target programs belonging to the restricted blacklist according to the preset restriction rule, the method further comprises:
after the client software is installed on the mobile terminal, corresponding hiding and displaying processing is carried out according to the preset attributes of all software modules; wherein each software module at least comprises: the client software comprises an uninstalling program module of the client software, a main program module of the client software, a blacklist adding module and a group setting modification module; the preset attributes comprise hiding, disclosing and clearing;
the client software deletes the software module with the preset attribute of clearing; the software module with the preset attribute of clearing at least comprises the uninstalling program module;
hiding the software module with the preset attribute being hidden through a preset hiding program; the software module with the preset attribute being hidden at least comprises the main program module;
for a software module with a preset attribute of being public, creating a corresponding shortcut and displaying the shortcut on a desktop; the software module with the preset attribute of being public at least comprises the blacklist adding module and the group setting modifying module.
9. The method of claim 8, wherein the method further comprises:
after receiving the remote uninstalling request, the background software management program verifies the identity of the requester through a biological characteristic identification technology; wherein the biometric identification technology at least comprises face identification or fingerprint identification;
if the identity of the requester is consistent with the identity of the supervisor collected during client software registration, the verification is successful, and the background software management program carries out remote uninstalling operation on the client software used by the requester.
10. An anti-subsidence management system based on group supervision, the system comprising:
the client software is used for limiting the operation of the target program belonging to the limited blacklist according to a preset limiting rule;
the background software management program is used for sending unloading warning information to all group members in a monitoring group of the client software if the unloading operation of the client software is monitored; if the client software is monitored to be damaged, repairing the client software through a preset repairing program, and if the client software cannot be repaired, sending damage warning information to all group members in the supervision group; and automatically restoring the abnormal change operation in the limited blacklist through a software protection program, and sending abnormal warning information to each group member in the supervision group.
CN202310077535.8A 2023-01-30 2023-01-30 Anti-addiction management method and system based on group supervision Active CN115964683B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310077535.8A CN115964683B (en) 2023-01-30 2023-01-30 Anti-addiction management method and system based on group supervision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310077535.8A CN115964683B (en) 2023-01-30 2023-01-30 Anti-addiction management method and system based on group supervision

Publications (2)

Publication Number Publication Date
CN115964683A true CN115964683A (en) 2023-04-14
CN115964683B CN115964683B (en) 2023-07-21

Family

ID=85899505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310077535.8A Active CN115964683B (en) 2023-01-30 2023-01-30 Anti-addiction management method and system based on group supervision

Country Status (1)

Country Link
CN (1) CN115964683B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116910710A (en) * 2023-07-19 2023-10-20 问久软件科技(山东)有限公司 Anti-addiction management method and system based on group supervision

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105278948A (en) * 2015-06-24 2016-01-27 维沃移动通信有限公司 Control method for mobile terminal, and mobile terminal
CN105791596A (en) * 2016-05-05 2016-07-20 绿网天下(福建)网络科技股份有限公司 Method for preventing uninstalling of APP
CN106101378A (en) * 2016-05-26 2016-11-09 广东欧珀移动通信有限公司 A kind of apply the method for Anti-addiction, device with mobile terminal
KR101829814B1 (en) * 2016-11-29 2018-02-19 대구대학교 산학협력단 Distance learning system and method with educational institutions
CN113709310A (en) * 2021-08-30 2021-11-26 广西爱学生教育科技有限公司 Anti-addiction system and anti-addiction method based on time strategy
CN114328101A (en) * 2021-12-24 2022-04-12 武汉众智数字技术有限公司 Method and system for positioning and repairing software fault
WO2022079543A2 (en) * 2020-10-15 2022-04-21 Rathod Yogesh User application store, platform, network, discovery, presentation and connecting with or synchronizing or accessing user data of users from/to parent application
WO2023273649A1 (en) * 2021-06-30 2023-01-05 深圳传音控股股份有限公司 Processing method, device, and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105278948A (en) * 2015-06-24 2016-01-27 维沃移动通信有限公司 Control method for mobile terminal, and mobile terminal
CN105791596A (en) * 2016-05-05 2016-07-20 绿网天下(福建)网络科技股份有限公司 Method for preventing uninstalling of APP
CN106101378A (en) * 2016-05-26 2016-11-09 广东欧珀移动通信有限公司 A kind of apply the method for Anti-addiction, device with mobile terminal
KR101829814B1 (en) * 2016-11-29 2018-02-19 대구대학교 산학협력단 Distance learning system and method with educational institutions
WO2022079543A2 (en) * 2020-10-15 2022-04-21 Rathod Yogesh User application store, platform, network, discovery, presentation and connecting with or synchronizing or accessing user data of users from/to parent application
WO2023273649A1 (en) * 2021-06-30 2023-01-05 深圳传音控股股份有限公司 Processing method, device, and storage medium
CN113709310A (en) * 2021-08-30 2021-11-26 广西爱学生教育科技有限公司 Anti-addiction system and anti-addiction method based on time strategy
CN114328101A (en) * 2021-12-24 2022-04-12 武汉众智数字技术有限公司 Method and system for positioning and repairing software fault

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
潘夏福;: "基于用户行为的Android手机防沉迷系统研究与设计", 电脑与信息技术, no. 03 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116910710A (en) * 2023-07-19 2023-10-20 问久软件科技(山东)有限公司 Anti-addiction management method and system based on group supervision
CN116910710B (en) * 2023-07-19 2024-01-26 问久软件科技(山东)有限公司 Anti-addiction management method and system based on group supervision

Also Published As

Publication number Publication date
CN115964683B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
US20220362666A1 (en) Interaction scene starting method and apparatus, storage medium, client, and server
US8140544B2 (en) Interactive digital video library
CN102831213B (en) A kind of searching method of learning content, device and electronic product
CN106648024A (en) Contextual history of computing objects
CN115964683B (en) Anti-addiction management method and system based on group supervision
CN107544784A (en) Recommend the method for software kit, the method and device for obtaining software kit, electronic equipment
US20230096357A1 (en) Emotion detection & moderation based on voice inputs
CN114489561A (en) Intelligent audio volume adjusting method and device, electronic equipment and storage medium
CN101836214A (en) Protection against unauthorized copying of digital media content
CN104009965A (en) Method, apparatus and system for displaying mobile media information
CN110223407A (en) Teaching Management Method, device and electronic equipment
CN109657428A (en) A kind of control method of mobile terminal, mobile terminal and storage medium
CN112328152B (en) Method and device for controlling playing of media file, electronic equipment and storage medium
CN104954407B (en) Information-pushing method and device
CN107944261A (en) The management-control method and user equipment of a kind of application program
CN113836167A (en) Data processing method, data processing apparatus, storage medium, and electronic apparatus
US20180157725A1 (en) Query-Based Application Data Retrieval
CN112135195A (en) Multimedia file playing test method, system and equipment
CN116113945A (en) System and method for controlling the amount of time on a personal screen
CN111666429A (en) Method, device and equipment for processing media information and storage medium
CN109032907A (en) The data monitoring method and system of equipment oriented application
CN106898370B (en) Audio file play method and device
CN111200635B (en) Method, equipment and storage medium for idle time display of store interaction screen
CN108829407A (en) System boot method, electronic equipment and the storage medium of electronic equipment
KR100808213B1 (en) System for providing function of cutting off moving picture through approval and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant