CN116910710B - Anti-addiction management method and system based on group supervision - Google Patents

Anti-addiction management method and system based on group supervision Download PDF

Info

Publication number
CN116910710B
CN116910710B CN202310884484.XA CN202310884484A CN116910710B CN 116910710 B CN116910710 B CN 116910710B CN 202310884484 A CN202310884484 A CN 202310884484A CN 116910710 B CN116910710 B CN 116910710B
Authority
CN
China
Prior art keywords
software
feature map
facial feature
facial
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310884484.XA
Other languages
Chinese (zh)
Other versions
CN116910710A (en
Inventor
孔祥真
孔令宇
房玉国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wenjiu Software Technology Shandong Co ltd
Original Assignee
Wenjiu Software Technology Shandong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wenjiu Software Technology Shandong Co ltd filed Critical Wenjiu Software Technology Shandong Co ltd
Priority to CN202310884484.XA priority Critical patent/CN116910710B/en
Publication of CN116910710A publication Critical patent/CN116910710A/en
Application granted granted Critical
Publication of CN116910710B publication Critical patent/CN116910710B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An anti-addiction management method and system based on group supervision are applied to the technical field of intelligent management, respond to the running of client software, and prohibit all other software installation and network use by preset rules; the installed software and the upgrade installation and network use of the installed software are not limited; setting an encryption switch, and closing the client software after the administrator inputs encryption information; when the client software is reinstalled by combining with the background software, all the mobile phone numbers of the swarm members in the original swarm can receive the reinstalled reminding information; and combining the background software, and if the reinstallation terminal does not use the original corresponding mobile phone number for verification, updating and verifying all the mobile phone numbers set by the group. Therefore, the information of the encrypted information input member can be accurately identified, and further the influence on the anti-addiction management quality is avoided.

Description

Anti-addiction management method and system based on group supervision
Technical Field
The present application relates to the field of intelligent management technologies, and in particular, to an anti-addiction management method and system based on group supervision.
Background
With the popularization of the internet and the wide application of mobile devices, network addiction becomes a serious social problem. Especially teenagers have a negative impact on their physical and mental health due to their excessive reliance on online games and social media. Network addiction can lead to problems such as declining academic, social isolation, insufficient sleep, inattention and the like, and even long-term influence on mental health of teenagers.
To solve this problem, an anti-addiction management method has been developed. These approaches aim to limit the overuse of internet and cell phone applications by minors to protect their physical and mental health. These methods typically involve measures to limit game time, limit application use, set screen time, etc., to ensure that the minors have enough time to learn, rest, and socialize.
However, existing anti-addiction management methods have some drawbacks. For example, some minors may find ways to bypass restrictions, such as using a Virtual Private Network (VPN) to bypass geographic restrictions or modifying devices to set bypass time restrictions, which reduce the effectiveness of the management method. Moreover, in the existing face recognition method, when face detection is performed, the detection accuracy is easily affected by factors such as light, angles and the like, and misjudgment or missed judgment can be caused, so that information recognition errors of encrypted information input members are caused, and the anti-addiction management quality is affected.
Thus, an optimized group supervision-based anti-addiction management scheme is desired.
Disclosure of Invention
The present application has been made in order to solve the above technical problems. The embodiment of the application provides an anti-addiction management method and system based on group supervision, which respond to the operation of client software and prohibit all other software installation and network use by preset rules; the installed software and the upgrade installation and network use of the installed software are not limited; setting an encryption switch, and closing the client software after the administrator inputs encryption information; when the client software is reinstalled by combining with the background software, all the mobile phone numbers of the swarm members in the original swarm can receive the reinstalled reminding information; and combining the background software, and if the reinstallation terminal does not use the original corresponding mobile phone number for verification, updating and verifying all the mobile phone numbers set by the group. Therefore, the information of the encrypted information input member can be accurately identified, and further the influence on the anti-addiction management quality is avoided.
In a first aspect, an anti-addiction management method based on group supervision is provided, which includes: in response to the client software being run, disabling all subsequent other software installations and network usage by preset rules; the upgrade installation and network use of the installed software and the installed software are not limited except for the blacklist corresponding program in the installed software program; if new software is required to be installed or the whole network function is used, the client software is closed after the encryption information is input by an administrator through the encryption switch setting; combining background software, if the client software is uninstalled or destroyed, and then the client software is reinstalled, all group member mobile phone numbers in the original group can receive reinstalled reminding information except that the mobile phone number corresponding to the terminal equipment receives the confirmation message; and if the reinstallation terminal does not use the original corresponding mobile phone number for verification by combining the background software, the mobile phone numbers set by the group are updated and verified.
In a second aspect, there is provided an anti-addiction management system based on group supervision, comprising: a preset rule module for prohibiting all subsequent other software installation and network use by a preset rule in response to the client software being run; the unlimited module is used for not limiting the installed software and the upgrade installation and network use of the installed software except for the blacklist corresponding program in the installed software program; the client software closing module is used for closing the client software after the administrator inputs the encryption information through the encryption switch setting if new software needs to be installed or the whole network function is used; the information reminding module is used for combining background software, if the client software is uninstalled or destroyed, and then the client software is reinstalled, except that the mobile phone number corresponding to the terminal equipment can receive the confirmation message, all group member mobile phone numbers in the original group can receive the reinstalled reminding information; and the updating verification module is used for combining the background software, and if the reinstallation terminal does not use the original corresponding mobile phone number for verification, the mobile phone numbers set by the group are updated and verified completely.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an anti-addiction management method based on group supervision according to an embodiment of the present application.
Fig. 2 is a schematic architecture diagram of an anti-addiction management method based on group supervision according to an embodiment of the application.
Fig. 3 is a flowchart of the sub-steps of step 130 in the group supervision-based anti-addiction management method according to an embodiment of the application.
Fig. 4 is a flowchart of the sub-steps of step 132 in the group supervision-based anti-addiction management method according to an embodiment of the application.
Fig. 5 is a flowchart of the substep of step 1323 in the group supervision-based anti-addiction management method according to an embodiment of the present application.
FIG. 6 is a block diagram of an anti-addiction management system based on group supervision in accordance with an embodiment of the present application.
Fig. 7 is a schematic view of a scenario of an anti-addiction management method based on group supervision according to an embodiment of the present application.
Description of the embodiments
The following description of the technical solutions in the embodiments of the present application will be made with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
Unless defined otherwise, all technical and scientific terms used in the examples of this application have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the present application is for the purpose of describing particular embodiments only and is not intended to limit the scope of the present application.
In the description of the embodiments of the present application, unless otherwise indicated and defined, the term "connected" should be construed broadly, and for example, may be an electrical connection, may be a communication between two elements, may be a direct connection, or may be an indirect connection via an intermediary, and it will be understood by those skilled in the art that the specific meaning of the term may be understood according to the specific circumstances.
It should be noted that, the term "first\second\third" in the embodiments of the present application is merely to distinguish similar objects, and does not represent a specific order for the objects, it is to be understood that "first\second\third" may interchange a specific order or sequence where allowed. It is to be understood that the "first\second\third" distinguishing objects may be interchanged where appropriate such that the embodiments of the present application described herein may be implemented in sequences other than those illustrated or described herein.
The existing anti-addiction management method has some defects. For example, some minors may find ways to bypass restrictions, such as using a Virtual Private Network (VPN) to bypass geographic restrictions or modifying devices to set bypass time restrictions, which reduce the effectiveness of the management method. Moreover, in the existing face recognition method, when face detection is performed, the detection accuracy is easily affected by factors such as light, angles and the like, and misjudgment or missed judgment can be caused, so that information recognition errors of encrypted information input members are caused, and the anti-addiction management quality is affected. Thus, an optimized group supervision-based anti-addiction management scheme is desired.
Fig. 1 is a flowchart of an anti-addiction management method based on group supervision according to an embodiment of the present application. As shown in fig. 1, the anti-addiction management method based on group supervision includes: 110, in response to the client software being run, disabling all subsequent other software installations and network usage by preset rules; 120, except for the blacklist corresponding program in the installed software program, the upgrade installation and network use of the installed software and the installed software are not limited; 130, if new software needs to be installed or a full network function is used, the client software is closed after the encryption information is input by an administrator through the encryption switch setting; 140, combining background software, if the client software is uninstalled or destroyed, and then reinstalling the client software, except that the mobile phone number corresponding to the terminal equipment receives a confirmation message, all group member mobile phone numbers in the original group can receive reinstalling reminding information; and 150, combining the background software, and if the reinstallation terminal does not use the original corresponding mobile phone number for verification, updating and verifying all the mobile phone numbers set by the group.
Further, in step 110: the client software starts automatic operation along with the terminal system, and can prohibit all other programs from being installed and used by the network through preset rules. This prevents the end user from arbitrarily installing software programs that may be dangerous to teenager health, nor is the user able to access uninstalled or unauthorized websites or programs via the network.
In step 120, on the user terminal device, the upgrade installation and network use of the installed software and programs are not limited except for the blacklist counterpart in the installed software or program. The installed software or program refers to software or program installed by the terminal equipment according to actual needs in the hands of a manager, and the software or program comprises programs which are commonly used by adults and can have hidden danger for teenagers. The blacklist corresponding program refers to a program which is commonly used by the adult and has potential danger to teenagers, such as a browser, and the adult frequently uses to log in various websites to review data, but the teenagers may browse difficult webpages or play webgames. If the program with hidden trouble is not installed, the use of adults is affected or the terminal manager is caused to frequently install and uninstall the program, so that inconvenience is brought to the manager or the adult user.
In step 130, if necessary new software needs to be installed or a normal mode of the network is used, the terminal manager can close the client software after the encryption information authentication through the encryption switch setting program, enter the normal mode, let the operating system of the terminal equipment (mobile phone or PC and the like) normally run, and start to run the client software through the encryption switch setting program after the installation or the use of the normal network is completed, so as to play an anti-addiction management role.
In step 140, in combination with the background software, if the terminal user uninstalls or destroys the client software, and reinstallates the client software, except that the unique mobile phone number corresponding to the initial installation of the terminal device receives the confirmation short message, the mobile phone number in the corresponding group of the terminal device in the last installation can receive the message prompt of reinstallation of the terminal. The function is derived from the fact that the mobile phone numbers of group members corresponding to the terminal equipment corresponding to the single mobile phone number are stored in a background program, and for the installation setting process of uninstalling and reinstalling the client software once installed, default group setting is kept unchanged and manual setting change of the group in the reinstalling process is not allowed; unless the terminal manager makes a change by the client software encryption switch setting program after the installation is completed.
In step 150, in combination with the background software, if the terminal user re-installs the client software, the mobile phone number corresponding to the original terminal device is not used for verification, and the mobile phone number of the original group corresponding to the terminal device is also replaced completely, and the terminal user faces the result of re-payment in the charged business operation mode. If one of the original group numbers is not replaced, the original number still receives the reinstallation warning information, and the action of trying to evade supervision is also found possibly.
Fig. 2 is a schematic architecture diagram of an anti-addiction management method based on group supervision according to an embodiment of the application. Fig. 3 is a flowchart of the sub-steps of step 130 in the group supervision-based anti-addiction management method according to an embodiment of the application. As shown in fig. 2 and 3, if new software needs to be installed or a full network function is used, the client software is closed after the administrator inputs encryption information through the encryption switch setting, which includes: 131, acquiring a user face image of input encryption information; and 132, performing image analysis and identification on the facial image of the user to determine whether the user belongs to a minor object.
Specifically, in the step 131, a face image of the user inputting the encrypted information is acquired. Accordingly, in the process of closing the client software after the administrator inputs the encrypted information through the encryption switch setting in the actual anti-addiction management process based on the group supervision, it is expected to perform face detection on the input member inputting the encrypted information to determine that the encrypted information is not an underage input, thereby ensuring the anti-addiction management quality.
Specifically, in the technical scheme of the present application, first, a face image of a user inputting encryption information is acquired through a camera.
Specifically, in the step 132, image analysis and recognition are performed on the facial image of the user, to determine whether the user belongs to a minor object. Fig. 4 is a flowchart of the sub-step of step 132 in the group supervision-based anti-addiction management method according to an embodiment of the application, and as shown in fig. 4, performing image analysis and recognition on the facial image of the user to determine whether the user belongs to a minor object, including: 1321, performing image noise reduction processing on the user face image to obtain a user face image after noise reduction; 1322, passing the noise-reduced user facial image through an MBCNet comprising a first branch and a second branch to obtain a facial feature map, wherein the first branch is a backbone network, and the second branch is a boundary feature extraction branch; and 1323, based on the facial feature map, determining whether the user belongs to a minor object.
First, for step 1321, an image noise reduction process is performed on the user face image to obtain a noise reduced user face image. In the process of actually collecting the facial image of the user, noise interference caused by factors such as image collecting equipment, ambient light, image transmission and the like may be considered, so that the image becomes blurred, the capturing and depicting precision of contour edges and detail features of the face in the image is reduced, and the accuracy of identifying and detecting the underage object is further affected. Therefore, the image noise reduction processing is required to be performed on the user face image before face recognition to obtain the user face image after noise reduction, so that noise and interference in the image are reduced, and the face features in the user face image are clearer and more recognizable. This helps to improve the recognition accuracy of the face detection algorithm, thereby more reliably judging whether the user who inputs the encrypted information is a minor.
Then, for step 1322, the denoised user facial image is passed through MBCNet that includes a first branch and a second branch, where the first branch is a backbone network and the second branch is a boundary feature extraction branch, to obtain a facial feature map. Then, feature mining of the noise-reduced user face image is performed using a convolutional neural network model having excellent performance in terms of implicit characteristic extraction of the image, so as to perform recognition detection on the user's face features.
Particularly, because MBCNet is a deep convolutional neural network for image segmentation, the problem of boundary information loss caused by repeated convolution and up-sampling is mainly solved, and the network adopts a multi-scale fusion boundary feature extraction branch, so that the accuracy of image segmentation can be improved. Therefore, in the technical scheme of the application, the face image of the user after noise reduction is further passed through the MBCNet comprising the first branch and the second branch to obtain the facial feature map. It is worth mentioning that here, the MBCNet contains two branches, one being the backbone network and the other being the boundary feature extraction branch. Specifically, the first branch is a backbone network, and the second branch is a boundary feature extraction branch. The backbone network is used for extracting global features of the image, and the boundary feature extraction branches are used for extracting boundary information of the image.
More specifically, in this process, the first branch is the backbone network, which is responsible for learning the overall facial features of the user's face, such as facial contours, eye and nose feature information, and deep semantic features of the face. The second branch is a boundary feature extraction branch, which is responsible for learning boundary features of the face image, such as feature information of contour lines of the face. The boundary feature extraction branches are typically used to enhance the edge information of facial features to better capture details of the face. By combining the backbone network and the boundary feature extraction branches, the MBCNet can comprehensively consider the overall features and detail features of the face, so that a more comprehensive and accurate facial feature map is obtained, subsequent face detection, recognition or verification tasks are facilitated, and whether a user inputting encrypted information is a minor or not is accurately judged.
Next, for step 1323, it is determined whether the user belongs to a minor object based on the facial feature map. FIG. 5 is a flowchart of the substep of step 1323 in the group supervision-based anti-addiction management method according to an embodiment of the application, and as shown in FIG. 5, determining whether the user belongs to a minor object based on the facial feature map, including: 13231, performing feature distribution optimization on the facial feature map to obtain an optimized facial feature map; and 13232, passing the optimized facial feature map through a classifier to obtain a classification result, wherein the classification result is used for indicating whether a user inputting encryption information belongs to a minor object.
For step 13231, it includes: calculating weighted feature vectors by means of scene constraints based on the feature matrix; and weighting each feature matrix of the facial feature map with the weighted feature vector to obtain the optimized facial feature map. Wherein calculating weighted feature vectors by means of scene constraints based on feature matrices comprises: performing channel linear transformation on each feature matrix of the facial feature map to convert the feature matrix into a square matrix so as to obtain a converted facial feature map; and calculating the weighted feature vector based on the transformed facial feature map by means of scene constraints based on a feature matrix.
In particular, in the technical solution of the present application, when the facial feature map is obtained by using the MBCNet including the first branch and the second branch, the first branch and the second branch of the MBCNet are considered to be respectively used for extracting global features and boundary information of the image, so in order to promote feature expression comprehensiveness of the facial feature map, it is preferable to obtain the facial feature map by directly concatenating the first sub-feature map and the second sub-feature map obtained by the first branch and the second branch along a channel. However, at the same time, the feature expression comprehensiveness is improved, and at the same time, because the first sub-feature map and the second sub-feature map respectively express the image semantic features of the facial image of the user from different angles, a large distribution difference exists between feature matrixes of all channels of the facial feature map, that is, the overall feature channel distribution association effect of the facial feature map is poor, which affects the accuracy of the classification result obtained by the classifier of the facial feature map.
Based on this, the global feature channel distribution association effect of the facial feature map needs to be improved by weighting each feature matrix of the facial feature map along a channel, and specifically, the weighted feature vector is obtained by a scene constraint based on the feature matrix, and the specific procedure is as follows: calculating the weighted feature vector according to the following optimization formula by means of scene constraint based on a feature matrix based on the converted facial feature map; wherein, the optimization formula is:
wherein,is the +.o. of the transformed facial feature map along the channel dimension>Characteristic matrix->Is the vector obtained by global pooling of the transformed facial feature map along each feature matrix of the channel dimension,/v>Is the +.o. of the transformed facial feature map along the channel dimension>First->Characteristic value of the location->、/>And->Representing addition, subtraction and multiplication by position, respectively,/->Is the weighted feature vector.
That is, each static scene matrix along the channel dimension in the facial feature mapRelative to channel control vector->By weighting the feature matrices of the facial feature map with the weighted feature vectors, the static feature scene may be supportively self-tuned using a directional bias vector for expressing channel dimension association to structure a high-dimensional feature manifold based on a particular convex polygon family (convex polytopes family) of the high-dimensional feature manifold corresponding to the feature scene expressed by the feature matrices of the facial feature map to promote explicit association between the image semantic expression of the scenes of the feature matrices of the facial feature map and the model feature extraction expression of the channel dimension, thereby promoting global feature channel distribution association effects of the facial feature map. Thus, the face recognition detection can be carried out on the encrypted information input member so as to ensure that the encrypted information input member is not unfinished, thereby ensuring the anti-addiction management quality and the anti-addiction management effect.
For step 13232, it includes: expanding the optimized facial feature map into classification feature vectors according to row vectors or column vectors; performing full-connection coding on the classification feature vectors by using a plurality of full-connection layers of the classifier to obtain coded classification feature vectors; and passing the coding classification feature vector through a Softmax classification function of the classifier to obtain the classification result.
Further, the facial feature map is subjected to classification processing in a classifier to obtain a classification result indicating whether or not the user who inputs the encrypted information belongs to the minor object. That is, in the technical solution of the present application, the label of the classifier includes that the user who inputs the encrypted information belongs to a minor object (first label), and that the user who inputs the encrypted information does not belong to a minor object (second label), wherein the classifier determines to which classification label the facial feature map belongs by a soft maximum function.
It should be noted that the first tag p1 and the second tag p2 do not include a human-set concept, and in fact, during the training process, the computer model does not have a concept of "whether the user who inputs the encrypted information belongs to a minor object", which is simply that there are two kinds of classification tags and the probability that the output feature is under the two kinds of classification tags, that is, the sum of p1 and p2 is one. Therefore, the classification result of whether the user who inputs the encrypted information belongs to the minor object is actually converted into a classification probability distribution conforming to the natural rule through classifying the tag, and the physical meaning of the natural probability distribution of the tag is essentially used instead of the language text meaning of whether the user who inputs the encrypted information belongs to the minor object.
It should be understood that, in the technical solution of the present application, the classification label of the classifier is a detection evaluation label of whether the user inputting the encrypted information belongs to a minor object, so after the classification result is obtained, accurate face recognition detection can be performed on the input member inputting the encrypted information based on the classification result, thereby determining that the encrypted information is not a minor input, and ensuring the anti-addiction management quality.
In summary, the group supervision-based anti-addiction management method 100 according to the embodiments of the present application is illustrated, which accurately identifies information of encrypted information input members, so as to avoid affecting anti-addiction management quality.
In one embodiment of the present application, FIG. 6 is a block diagram of an anti-addiction management system based on group supervision in accordance with an embodiment of the present application. As shown in fig. 6, an anti-addiction management system 200 based on group supervision according to an embodiment of the present application includes: a preset rule module 210 for prohibiting all subsequent other software installations and network use by preset rules in response to the client software being run; a non-limiting module 220, configured to not limit the installed software and upgrade installation and network usage of the installed software except for a blacklist corresponding program in the installed software program; a client software closing module 230, configured to close the client software after the administrator inputs the encrypted information through the encryption switch setting if new software needs to be installed or a full network function is used; the information reminding module 240 is configured to combine the background software, if the client software is uninstalled or destroyed, and then reinstalled, except for the mobile phone number corresponding to the terminal device, the mobile phone number of all group members in the original group can receive the confirmation message, and the reinstalled reminding information can be received by the mobile phone number of all group members in the original group; and the update verification module 250 is configured to combine the background software, and if the reinstallation terminal does not use the original corresponding mobile phone number for verification, the mobile phone numbers set in the group are updated and verified.
Specifically, in the group supervision-based anti-addiction management system, the client software closing module includes: an image acquisition unit configured to acquire a user face image to which encryption information is input; and the image analysis and identification unit is used for carrying out image analysis and identification on the facial image of the user and determining whether the user belongs to a minor object.
Here, it will be understood by those skilled in the art that the specific functions and operations of the respective units and modules in the above-described group supervision-based anti-addiction management system have been described in detail in the above description of the group supervision-based anti-addiction management method with reference to fig. 1 to 5, and thus, repetitive descriptions thereof will be omitted.
As described above, the group supervision-based anti-addiction management system 200 according to the embodiment of the present application may be implemented in various terminal devices, for example, a server or the like for group supervision-based anti-addiction management. In one example, group supervision-based anti-addiction management system 200 in accordance with embodiments of the present application may be integrated into a terminal device as a software module and/or hardware module. For example, the group supervision-based anti-addiction management system 200 may be a software module in the operating system of the terminal device, or may be an application developed for the terminal device; of course, the group supervision-based anti-addiction management system 200 can also be one of a plurality of hardware modules of the terminal device.
Alternatively, in another example, the group supervision based anti-addiction management system 200 and the terminal device may be separate devices, and the group supervision based anti-addiction management system 200 may be connected to the terminal device through a wired and/or wireless network and transmit the interaction information in a agreed data format.
Specifically, the application provides an anti-addiction system based on group supervision, installation and network control, which consists of client software and a background management program. The client software is installed on user terminal equipment, such as a PC computer, a smart phone, a tablet computer and the like. The PC computer can be provided with various systems, the mobile phone and the tablet computer can also be provided with various operating systems, and the client software of the invention can be designed into different versions for installation and compatible use. The background management program is installed on a server computer of the anti-addiction system operator, and is connected with the client software through a network and works cooperatively. When the client software is installed on the terminal equipment, the client files and group data established in the installation process of the client software and all setting records can be transmitted back to a background management program through a network and stored in a corresponding database, meanwhile, short message verification codes and verification confirmation processes are provided for verification of all steps of mobile phone numbers necessary in the installation and use processes of the terminal user, and meanwhile, corresponding verification code verification, data storage support and short message reminding of all steps are carried out on reinstallation of the client software by the terminal user. Of course, when the anti-addiction system is used for business operation, the charging process is realized by the cooperation of the background program and the client software.
In one embodiment of the present application, the present application further provides an installation step of exposing the client software. Firstly, downloading the client software installation package to a desktop of the terminal equipment, and then starting to install: step S21, clicking an installation program package to install; the installation program is started to enter a second part S22, and the installation interface pops up a user protocol for the user to browse and confirm; then go to the next selection procedure S23, is the user agreement agreed or accepted? If yes, entering a next step of selecting S24, otherwise, directly exiting the installation to finish the installation; step S24 is to display the present software or service charge and sign up to remind the user of the agreement to pay or purchase the service? If yes, entering the next step S25, if no, directly exiting to finish installation; s25, popping up a charging two-dimensional code on an interface for a user to pay for purchasing service, if the user pays for the service fee by scanning the code, automatically completing confirmation of whether the payment is successful or not by the system according to the network charging information transmission condition, if the payment is successful, entering a next step S26 of client main program installation, otherwise, returning to display that the payment two-dimensional code is paid again, and only until the payment is successful; after the main routine installation is completed in step S26, the entire installation process ends and exits. And the client software automatically starts running.
Further, the application also provides a client main program installation flow for displaying the main program installation process and detailing the input process of the user file during the client software installation. The installation process of the client main program installation flow is the installation step of the subroutine described in the above step S26. Firstly starting from S31, enabling a client main program to enter an installation process; the next step is entered manually on the client terminal device, the client registration profile information including the client phone number, client name, installation home location, even client email, etc. The procedure is slightly different according to different terminal equipment, if the terminal equipment is a mobile phone, the procedure is carried out according to the step S32a, the mobile phone number and other registration information are input, the mobile phone number corresponding to the mobile phone is a local number, and of course, other mobile phone numbers can be used as the file registration mobile phone number in terms of technology, but the local number is preferably the file registration number; if the terminal device is a home computer or a tablet computer, all the registration file information is input according to the step S32b, and the terminal manager can choose to confirm that one mobile phone number is a file registration number because of no local mobile phone number, and the installation program automatically searches for the terminal central processor ID corresponding to the file registration number.
After the input of the installation registration information of the terminal equipment client software is completed, the next step S33 is entered: in the installation process of the invention, short message verification is carried out under the support of a system background program, the corresponding registration mobile phone receives the short message verification code and inputs the verification code on a program installation and ejection interface for verification; after the verification code is input, the next step is selected, and verification is successful? If yes, the verification is successful to enter the next step S34 of group setting program installation, otherwise, the verification code is input again until the verification is successful; of course, if the registered mobile phone cannot enter the next step because the authentication code cannot be received due to the error of inputting the mobile phone number, it is of course necessary to return to S32a or S32b to re-input the mobile phone number and verify, only until the registered mobile phone receives the authentication code in step S33. After the group setting program S34 is installed, the process proceeds to step S35, where the operation control program is installed. The running control program is a core control part of the client software, the working content of the running control program comprises installation control and network control, and the running control program bears the main work of the anti-addiction method. And S35, after the installation is completed, the whole client software is installed and exits. The whole system is automatically started to operate.
Furthermore, the application also provides a workflow of the operation control program, which is used for explaining the main working process and the operation logic of the operation control of the client software; this flow is also the workflow of the operation control subroutine installed in step S35 described above. Starting from step S41, the next step is an encryption identification switch setting subroutine S42; if the next setting selection step S43 at step S42 is on, the following steps operate the control on to effect, i.e. enter a so-called "teenager mode" or "learning mode", the terminal device will operate under the control strategy of the invention; if the setting is all closed, the client software of the invention is in a dormant state or a state called a common mode, and the conventional use of the terminal equipment is not affected, and the setting is completed to exit. If the encryption switch setting program is to be entered in step S42 to perform the switch setting, clicking the program first requires encryption information verification, and only the input encryption information is matched with the initially set encryption information by comparison, the party can perform the switch setting.
The initially set encryption information is verified to be input through the encryption information setting subroutine S422 and stored in the encryption information base S421.
If "on" or "all controls are turned off" at the setting switch selection step S43? And selecting no, and normally operating the control program to realize the limiting function set by the invention. Because the control function is divided into an installation control and a network control, the whole control function is parallel to two main control functions, and a switch is designed for the two main control functions. That is, the operation control may switch off all the control, or may flexibly switch off any one of the network control and the installation control, or may select to switch off all the control functions.
As shown in the installation switch selection setting step at S441, if "installation control on? "no" on selection, the installation control is closed, the control is disabled and the setting is exited, in which state the terminal device can be used conventionally, and any program is not restricted to be installed; if on "install control on? If yes, the installation control function is started to operate and the step S4411 is entered; if the terminal user tries to install a certain program, entering step S45, the installation control program traversing the process name (PC end) name or package name (mobile phone end) of the installed program, comparing with the process name or package name created by the installed program of the program, if the package name or process name created by the installed program belongs to the process name or package name set of the installed program, selecting yes, entering step S4414 to allow upgrade installation, and exiting after the installation is completed; otherwise, no is selected, and the process advances to S4415 to prohibit the installation. Such an installation control process ends.
Further, for upgrade installation of installed software, the original created process name or package name will not change, and naturally belongs to the installed process name or package name set, if it is a new installed software program, the newly created process name or package name is not found in the "installed process name or package name set", so S4413 "is an installed program? The "judgment step" judges no ", and proceeds to S4411 to prohibit the mounting step.
Similarly, in the network control program parallel to the installation control program, there is a switch selection setting step S442, and if the switch is selected in step S442, that is, "yes", step S4421 is entered, and the network control program is started to operate; if the end user goes to step S4422 to start the application using the network, then goes to step S45 to compare the process name or package name of the application to be started with the process name or package name of the installed program, and analyze "is installed program? "or" does it analyze "be an upgrade installation or a re-overlay installation of an installed program? If yes, go to next step S4424 to compare and select; the step S4424 is to build a blacklist of specific programs in the installed programs, process names or package names of the specific programs, and if the programs to be started belong to the blacklist set, step S4426 is entered to disconnect the network; if the process name or package name of the program to be started does not belong to the blacklist set, step S4425 is entered to allow for a network upgrade and normal network use of the program. Such a network control procedure ends.
Further, the blacklist of the comparison in step S4424 is a program that is considered by the terminal device manager to be frequently used by some adults or people who do not need to be restricted from using the program, and is not suitable for teenagers, that is, a specific program of the installed program, and the specific program is set on the client software of the present invention to be used by minors or people who are not suitable for using the program. Such as a browser program, a tremble quick-handle program, or a QQ program, etc. Such programs are often used by adults, but pose potential health risks to minors, such as the potential for minors to watch yellow websites or live tolls, or to entice children to indulge in games, etc. The number of common programs in the blacklist is limited, the occupied resources are few, and the concept of controlling the switch by using the blacklist strategy in the traditional sense is completely different. The blacklist not only solves the problem that adults may face to frequently install and uninstall the corresponding programs in the blacklist, but also achieves the aim of preventing teenager network addiction.
Furthermore, the present application also provides a group setting program flow for describing the setting step and the modifying step of the group, and includes the group generating process of reinstalling the client software of the present invention. If the client software of the present invention is installed on a terminal for the first time, when the client software is installed in the group setting program S34, the installation process starts from S341, and the next step S342 is to analyze and select the steps: automatically detect whether first install? The first installation certainly judges "yes", and then step S344a is entered: after inputting the mobile phone number of the crowd 1, and after finishing inputting and confirming, based on the background program support of the invention, the mobile phone number receives the short message of the mobile phone verification code, and then enters the next step S345a: inputting the verification code received by the mobile phone; then, the process proceeds to the next step S346 a: is the verification passed? If yes, the verification is passed to enter the input and verification process flow of the next group member mobile phone number; the "next group member" may be a plurality of, from group member 2, group member 3 to group member n, with a minimum of 2 group members. If the judgment in the step S346a is no, the verification is not passed, the step S344a is returned to, the mobile phone number of the group member 1 is input again to carry out repeated input and verification processes, and the next group member mobile phone number input and verification process which is identical to the next group member mobile phone number is input and verification process is carried out until the verification is passed; if the group setting of the group has been completed, at S347, the next step S348 is confirmed and entered: query the end user who is installing the program as to "whether to modify group.
When the group setting is completed in step S348, the group data is stored in the client software group database, and simultaneously, the client software group database is synchronously stored in the database corresponding to the background program of the invention through a network.
If the terminal manager wants to modify the group setting after the group setting is installed, the terminal manager needs to input encryption information for decryption and then enters S349 to modify the group setting subroutine for modification, and after the modification is completed, the terminal manager confirms in S350 that the group modification is completed and exits.
If the anti-addiction software system of the present invention is installed in step S342, it detects that the client software is reinstalled, that is, is not installed for the first time, through the background manager database record and the client software installer, and then determines "no", then the next step of the inputting and authenticating process of the group members is automatically completed by the background manager according to the background database record, not allowing the installer to manually input and confirm, and automatically entering step S347 to confirm that the group setting is completed after the automatic completion, not asking "whether to modify the group? ", directly enter the next installation process.
And finishing automatic copying and inputting of the mobile phone number of the default verification group member from S343, finishing automatic setting of the group from S347, and entering the next step by bypassing the step S348, wherein in the whole process, the mobile phone number of the group member and the file mobile phone number corresponding to the terminal equipment on which the program is being installed can both receive the warning information of the reinstallation, and remind a manager of the terminal equipment and the group member of verification. Because the installer of the ongoing program cannot manually input other mobile phone numbers and has no right to modify the group settings, trying to avoid the assumption of supervision by inputting a new group member mobile phone number that can be mastered by himself to replace the original group member mobile phone number cannot be achieved.
Steps S349 to S348 are procedures for modifying the group settings when the manager of the terminal installs the client software of the present invention for the first time. The processes from S349 to S350 are modification processes performed by the manager of the terminal device when the manager needs to modify the group setting after the client software is installed or in the use process, and when the process is modified, the manager needs to perform encryption information verification, and the verification can enter the modification group setting program from the rear side in S349.
When the terminal device manager wants to modify the group settings, firstly, after inputting the encryption information and confirming through the client software encryption information switch program of the present invention, starting the modification group setting program from step S3491, and then entering the next step S3491a selection program: is "new" or "replace"? That is, whether the administrator replaces a certain group member phone number in the group or the original group member phone number is unchanged but a new group member phone number is added? If "replace" is selected, that is, the original group member mobile phone number is replaced with the new group member mobile phone number, the next step S3492 is entered: the system of the invention reads the input number and then sends a verification code to the mobile phone number to prompt to enter the next step S3493: inputting the mobile phone verification code, and then entering the next step S3494: is analysis validated? If no, returning to step S3492 to repeat the verification process of inputting the mobile phone number of the original group member until yes is analyzed, and entering the next step S3495 after the verification is passed: inputting a new group member phone number, and next step S3496: inputting the verification code of the new mobile phone number, performing analysis and verification in the step S3487, returning to the step S3495 to input the mobile phone number again and verify the verification code if the verification is no, and ending the exit after the verification is passed by the modification group setting.
If the administrator selects "newly added" in step S3491a, the administrator only needs to perform verification code verification on the mobile phone number of the newly added group member from step S3498 to step S3500, and the administrator ends the exit after the verification is passed.
The method comprises the steps of establishing a setting flow of a client software operation control database, and displaying the steps of establishing, operating and setting a main database of an operation control program in detail. If the client software has just started to install, then step S51 goes directly to step S521: the encryption identification program performs initialization setting, and next step goes to S522: a manager encryption information database is established and the data is stored in the database S5221. The data of the manager encryption information database can be face recognition data, fingerprint recognition data or other encryption data, and the face recognition data is preferred in view of the difficulty and convenience of cracking. If the manager needs to change after the encryption identification database is built, the corresponding manager encryption identification data is also changed, and in the changing steps S528 to S527: from S528 "manager encryption information identification database set" function menu to S523, it is judged that "whether to change manager encryption information? ", if no, directly ending the exit; if yes, go to step S524: inputting original manager encryption information data, such as original manager face data, if the data input is completed and the next step S525 is judged to be "no", that is, the encryption data is compared to be incorrect, the process returns to step S524 to repeat the previous step until the compared data is correct, and the result is "yes", and the next step S526 is entered: new manager encryption information data is input, and then the next step S527 is to input the data to complete and update the manager encryption information database, and then to end the exit.
The other group of databases is established as the database of the controlled software program, namely the process name (PC end) or package name (mobile phone end) database of all application programs installed on the terminal equipment. When the client software installer of the present invention reaches the database creation step, the process of S51 to S511: the terminal program data collection program automatically searches for the process name or package name of the installed program and builds a process name or package name database S512. If some corresponding application programs in the S512 database are rarely used by adults, the terminal manager is required to manually pull the process name or package name of the application program into a blacklist at a shortcut menu of a blacklist setting program, a sub-library of the S512 step database is established, that is, the S5121 step is entered, and a process name or package name blacklist database is established "
If the client software of the present invention has been installed in the terminal device, the terminal is restarted or restarted, and the database program operation starts from step S51 directly to the analysis selection step S513: is the installation control of the client software ever closed and a new application installed? Or traverse all running programs to compare against existing databases, is there a new program? If "yes", that is, if the application is newly installed, the process name or package name of the program is added to the "process name or package name database" in steps S511 to S512, and if the analysis in step S513 is judged "no", that is, if the newly installed application is not found, the database creation program ends to exit.
In the step S5122 of the blacklist setting subroutine, in order to facilitate the addition of the blacklist on the terminal device by the manager, the procedure establishes a shortcut setting menu on the terminal desktop, a blank area is popped up after the menu is opened, and the manager can manually drag the blacklist drawing procedure into the blank area frame, so that the process name or package name corresponding to the blacklist procedure is rapidly extracted and added into the blacklist database.
In one embodiment of the present application, a structure of the client software of the present invention is also provided to illustrate the main functional structural components of the software. The client software package M1, M1 comprises two sub-modules: the installer module M11 and the client main program module M12 further include a network monitoring communication module M13. The client main program module M12 includes a client archive module M121 and an operation main program module M122. The M121 module includes a customer registration archive database sub-module M1211 and a group settings database module M1212. The run main program module M122 contains a database program sub-module M1221 and a run control program sub-module M1222. Database program module M1221 in turn includes an installed program process name or package name database submodule 12211, an encrypted identification database submodule M12212, and other data modules M12213. The operation control program module M1222 includes a network control sub-module M12221, an installation control sub-module M12222, and other control sub-modules M12223. In the M12211 database module, an M122111 process name or package name black name sub-module is also included.
In addition, the client software package M1 further includes a network detection communication module M13 for connecting the background management program of the present invention to a network, and completing network communication and data transmission with the background program installed on the background server, and synchronizing short message verification and encrypted message verification required by each function of the database and the client software.
And the control function modules and the database modules are completely arranged in the client software, and the database and the background management program database are synchronously stored. Under normal conditions, the client software extracts or traverses and recognizes all the data, and can provide data through the functional data module of the client software, and only under special conditions, such as damage or other abnormal conditions of the client software, the data support or repair data is provided through the database corresponding to the background management program. Therefore, the defect that a user only depends on a background database to use a large amount of network resources is avoided, the speed and the efficiency of the client software are improved, and the workload of the background management program is further reduced.
And each functional module corresponds to each functional workflow of the client. For example, the installer module M11, the corresponding installation procedure is a management method procedure; the M12 module corresponds to a client main program flow; the sub-program database program module in the M122 main program module corresponds to the client database program installation or operation flow; the operation control submodule 1222 corresponds to the flow of the operation control program in the main program; etc., and are not described in detail.
In one implementation of the present application, all the programs of the background management program are constructed into a total background management module M2, and each sub-program in the background management program corresponds to a sub-module of M2, where the sub-modules include a member management module M21, an upgrade and network module M22, and a web page and edit management module M23. The member management module comprises the following sub-modules: a member profile module M211, a member group data module M212, a member client remote monitoring module M213, a member log module M214, a download module M215, a message module M216, a search and print module M217, and the like. The M211 module is used for storing and managing information such as the mobile phone number, the name, the registration place, the registration date and the like of the client; the M212 module is used for storing group data corresponding to each client file; the M213 module is used for remotely monitoring whether the client software used by each member is online or not and whether the client software is normally used or not, and whether information such as reloading and the like is unloaded or not, so as to realize the related management function of the invention; the M214 module is used for establishing a use log for each member or user and managing the information such as the use date, the use time and the like; the download module M215 is configured to download and manage client profile information or log information; the M216 message module is used for realizing message functions according to the feedback or monitoring of the client software network, such as short message sending, mail sending and the like; the M217 printing module is used for realizing printing management functions on data such as client archive data or client logs.
The upgrade and network communication module M22 is configured to upgrade the client software and perform network communication.
The M23 webpage and editing management module is used for modifying, editing and updating the webpage of the background management program and realizing other webpage management functions.
Furthermore, the installation control and network control functions of the invention do not change any existing structural functions of the operating system software or hardware of the terminal equipment, but are overlapped with new management functions set for realizing the purpose of the invention on the basis of the original functions of the system software or hardware. The operating system software of the terminal device also has installation control or network control functions, for example, when a new program is installed, the system prompts whether to install; the operating system may also perform network control but, as previously described, may not prevent network use by teenager end users for unfavorable programs. The whole control of the invention is controlled by the terminal equipment manager, the common terminal user does not grasp the encryption information of the switch and can not set the switch for the installation and the network control, thus the program installation can not be carried out arbitrarily or the network program is not easy to use. Therefore, the invention can truly prevent teenagers from installing unsuitable software programs such as games and the like through installation control, prevent teenagers from logging in and browsing unsuitable webpages, playing webpages games and the like through network control and the like and fundamentally solve the problem of network addiction of teenagers.
The traditional intelligent terminal equipment management is that the terminal screen is directly locked, and any other person cannot use the locked terminal equipment, so that the terminal equipment cannot be used when teenagers learn. The invention differs from the former in that: the intelligent terminal equipment is allowed to be used for learning and other beneficial activities, but through comprehensive measures such as installation control and network control, the possible network addiction problem of teenagers is prevented, and meanwhile, the method or system for preventing the addiction problem is simple, efficient and reliable, so that the fear of parents to children is solved, and the problems of high operation cost and uncontrollable operation of a software system caused by the traditional addiction prevention strategy are solved.
Furthermore, the problem of anti-addiction is solved, and the upgrade installation and network use of normal application programs cannot be influenced, so that the client of the invention adopts a method for establishing a process name or packet name database of an installed program of a terminal equipment manager, and enables the installed program to be normally upgraded and installed and normally connected with a network by identifying and analyzing whether the installed program is the installed program; and prohibiting installation for the installed program of the manager. Establishing a blacklist for programs, such as a browser or small video software, that are common to a few individual adults and not suitable for teenagers in the installed programs; when the terminal equipment is set to be in teenager mode by the manager, namely, the network control and the installation control are completely opened, the corresponding program in the blacklist cannot be connected with the network and cannot be normally used.
Of course, the teenager study sometimes needs to use a network, such as net lessons, inquire knowledge points, read certain articles or news, and then the terminal manager can completely install programs or websites which are commonly used by teenagers such as intelligent AI, ape search questions, academic halls and the like and have no health hazard on the terminal equipment so as to solve the problem of the teenager study surfing. These programs installed via the terminal manager are normally network connectable.
Further, some learning websites are commonly used by teenagers, but when the website is used, the website address bar can input the website to log in the website, browse the webpage, play the webpage game and the like, and the effect is similar to that of a browser, but the advertisement and the guiding link of the browser are not provided. Thus, to block this potential teenager health vulnerability, a specific website control program is provided in the other control module M1223 of the present invention. The content within the particular web site is healthy and secure, so all content under the web site address HTTP/, is browse-enabled and used, and the end user is disconnected if he enters a non-enable HTTP in the web site address bar. That is, a white list of healthy websites is established in the website control program, and the white list uses a plurality of website addresses (HTTP// x) which must be used for teenager learning as comparison data to build a database. When the terminal is in teenager mode, any inputted website is compared with the website in the white list database when other websites of the address bar of the specific website are inputted, and if the comparison result is a website in the non-white list, the network connection is directly disconnected; if so, the network is used normally. The white list setting is also like the step S472, and a shortcut menu is established on the desktop of the terminal equipment, so that the setting is convenient for a terminal manager.
Because the learning websites necessary for teenagers are limited, the website white list database is also limited, and the website white list database is set for a long time without maintenance and management, and is simple to use and operate.
Therefore, the anti-addiction system based on group supervision, installation and network control not only solves the hidden trouble of network addiction of teenagers, but also does not influence the normal network learning and use of teenagers; meanwhile, the terminal manager turns off the terminal through the encryption information switch, enters an adult mode, and all uses return to normal and are not affected at all.
Furthermore, in order to increase the difficulty of uninstalling or destroying the client software, the installer package of the client has no uninstalling program, and if the terminal manager needs to uninstall the client program, an uninstalling scheme is provided by the operator of the system. Meanwhile, on the desktop of the terminal operating system, without establishing a management menu of the terminal software, a general terminal user cannot simply find an uninstalling or deleting way of the client software.
Further, in order to facilitate the terminal manager to manage and use the client software of the present invention, the encryption information switch setting step S43 and the setting steps S451 and S456 including the setting options thereof are all to set a shortcut menu on the desktop of the terminal, so that the manager can operate more easily. Similarly, for the blacklist setting program in step S472, or the website whitelist setting program, a shortcut menu is also built on the desktop, so that the administrator can use the setting. Of course, the method can be performed by the party after the encryption information identification verification before the start and the entry of the shortcut menu, and the encryption information identification verification process is consistent with the identification verification process of the encryption identification switch setting program in the step S42.
Further, after the encryption information switch is set through the shortcut menu, two options are respectively set and controlled by the switch in the next step, and if the switch control is selected, the step S43 and the following steps are performed; if a setting is selected, the group setting, the blacklist setting, and the website whitelist setting may be selected. Therefore, the intelligent terminal manager can be convenient to use and is simple to operate.
Further, in order to ensure the reliability and effectiveness of the encryption information identification, the encryption information is preferably identified by face recognition, but the reliability of the face recognition is highest.
Furthermore, in order to make the system of the present invention fully function, the client software of the system sets a program that automatically starts to run along with the start of the installed terminal desktop system in the installation program, so that the client software automatically runs on the installed terminal equipment immediately after the installation of the client software is completed or automatically starts along with the start of the operating system after the terminal is started. The user authorization required by the client software when the automatic starting running program is started is all defaulted to be 'user authorization starting running'. Therefore, the phenomenon that the client software cannot function due to the fact that the client software is not started after the terminal system is started can be prevented.
Fig. 7 is a schematic view of a scenario of an anti-addiction management method based on group supervision according to an embodiment of the present application. As shown in fig. 7, in this application scenario, first, a user face image (e.g., C as illustrated in fig. 7) of input encryption information is acquired; the acquired user face image is then input into a server (e.g., S as illustrated in fig. 7) deployed with a group-supervised-based anti-addiction management algorithm, where the server is capable of processing the user face image based on the group-supervised anti-addiction management algorithm to determine whether the user belongs to a minor object.
It is also noted that in the apparatus, devices and methods of the present application, the components or steps may be disassembled and/or assembled. Such decomposition and/or recombination should be considered as equivalent to the present application.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present application. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the application. Thus, the present application is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, this description is not intended to limit the embodiments of the application to the form disclosed herein. Although a number of example aspects and embodiments have been discussed above, a person of ordinary skill in the art will recognize certain variations, modifications, alterations, additions, and subcombinations thereof.

Claims (3)

1. An anti-addiction management method based on group supervision is characterized by comprising the following steps:
in response to the client software being run, disabling all subsequent other software installations and network usage by preset rules;
the upgrade installation and network use of the installed software and the installed software are not limited except for the blacklist corresponding program in the installed software program;
if new software is required to be installed or the whole network function is used, the client software is closed after the encryption information is input by an administrator through the encryption switch setting;
combining background software, if the client software is uninstalled or destroyed, and then the client software is reinstalled, all group member mobile phone numbers in the original group can receive reinstalled reminding information except that the mobile phone number corresponding to the terminal equipment receives the confirmation message; and
Combining the background software, if the reinstallation terminal does not use the original corresponding mobile phone number for verification, the mobile phone numbers set by the group are updated and verified;
if new software needs to be installed or the whole network function is used, the client software is closed after the encryption information is input by an administrator through the encryption switch setting, and the method comprises the following steps:
acquiring a user face image of input encryption information;
performing image analysis and identification on the facial image of the user to determine whether the user belongs to an underage object;
image analysis and recognition are carried out on the facial image of the user, and whether the user belongs to a minor object is determined, which comprises the following steps:
performing image noise reduction processing on the user face image to obtain a user face image after noise reduction;
passing the noise-reduced user facial image through an MBCNet comprising a first branch and a second branch to obtain a facial feature map, wherein the first branch is a backbone network, and the second branch is a boundary feature extraction branch; and
determining whether the user belongs to a minor object based on the facial feature map;
based on the facial feature map, determining whether the user belongs to a minor object comprises:
performing feature distribution optimization on the facial feature map to obtain an optimized facial feature map; and
The optimized facial feature map is passed through a classifier to obtain a classification result, wherein the classification result is used for indicating whether a user inputting encryption information belongs to a minor object or not;
performing feature distribution optimization on the facial feature map to obtain an optimized facial feature map, including:
calculating weighted feature vectors by means of scene constraints based on the feature matrix; and
weighting each feature matrix of the facial feature map with the weighted feature vector to obtain the optimized facial feature map;
calculating weighted feature vectors by way of feature matrix based scene constraints, comprising:
performing channel linear transformation on each feature matrix of the facial feature map to convert the feature matrix into a square matrix so as to obtain a converted facial feature map; and
calculating the weighted feature vector based on the converted facial feature map by means of scene constraints based on a feature matrix;
calculating the weighted feature vector based on the transformed facial feature map by means of a feature matrix based scene constraint, comprising:
calculating the weighted feature vector according to the following optimization formula by means of scene constraint based on a feature matrix based on the converted facial feature map;
Wherein, the optimization formula is:
wherein,is the +.o. of the transformed facial feature map along the channel dimension>Characteristic matrix->Is the vector obtained by global pooling of the transformed facial feature map along each feature matrix of the channel dimension,/v>Is the +.o. of the transformed facial feature map along the channel dimension>First->Characteristic value of the location->And->Representing addition, subtraction and multiplication by position, respectively,/->Is the weighted feature vector.
2. The group supervision-based anti-addiction management method of claim 1, wherein passing the optimized facial feature map through a classifier to obtain a classification result indicating whether a user inputting encrypted information belongs to a minor object, comprises:
expanding the optimized facial feature map into classification feature vectors according to row vectors or column vectors;
performing full-connection coding on the classification feature vectors by using a plurality of full-connection layers of the classifier to obtain coded classification feature vectors; and
and the coding classification feature vector is passed through a Softmax classification function of the classifier to obtain the classification result.
3. An anti-addiction management system based on group supervision, comprising:
A preset rule module for prohibiting all subsequent other software installation and network use by a preset rule in response to the client software being run;
the unlimited module is used for not limiting the installed software and the upgrade installation and network use of the installed software except for the blacklist corresponding program in the installed software program;
the client software closing module is used for closing the client software after the administrator inputs the encryption information through the encryption switch setting if new software needs to be installed or the whole network function is used;
the information reminding module is used for combining background software, if the client software is uninstalled or destroyed, and then the client software is reinstalled, except that the mobile phone number corresponding to the terminal equipment can receive the confirmation message, all group member mobile phone numbers in the original group can receive the reinstalled reminding information; and
the updating verification module is used for combining the background software, and if the reinstallation terminal does not use the original corresponding mobile phone number for verification, the mobile phone numbers set by the group are updated and verified;
the client software closing module comprises:
an image acquisition unit configured to acquire a user face image to which encryption information is input;
The image analysis and identification unit is used for carrying out image analysis and identification on the facial image of the user and determining whether the user belongs to a minor object or not;
the image analysis and identification unit is specifically configured to:
performing image noise reduction processing on the user face image to obtain a user face image after noise reduction;
passing the noise-reduced user facial image through an MBCNet comprising a first branch and a second branch to obtain a facial feature map, wherein the first branch is a backbone network, and the second branch is a boundary feature extraction branch; and
determining whether the user belongs to a minor object based on the facial feature map;
the image analysis and identification unit is specifically configured to:
performing feature distribution optimization on the facial feature map to obtain an optimized facial feature map; and
the optimized facial feature map is passed through a classifier to obtain a classification result, wherein the classification result is used for indicating whether a user inputting encryption information belongs to a minor object or not;
the image analysis and identification unit is specifically configured to:
calculating weighted feature vectors by means of scene constraints based on the feature matrix; and
weighting each feature matrix of the facial feature map with the weighted feature vector to obtain the optimized facial feature map;
The image analysis and identification unit is specifically configured to:
performing channel linear transformation on each feature matrix of the facial feature map to convert the feature matrix into a square matrix so as to obtain a converted facial feature map; and
calculating the weighted feature vector based on the converted facial feature map by means of scene constraints based on a feature matrix;
the image analysis and identification unit is specifically configured to:
calculating the weighted feature vector according to the following optimization formula by means of scene constraint based on a feature matrix based on the converted facial feature map;
wherein, the optimization formula is:
wherein,is the +.o. of the transformed facial feature map along the channel dimension>Characteristic matrix->Is the vector obtained by global pooling of the transformed facial feature map along each feature matrix of the channel dimension,/v>Is the +.o. of the transformed facial feature map along the channel dimension>First->Characteristic value of the location->And->Representing addition, subtraction and multiplication by position, respectively,/->Is the weighted feature vector.
CN202310884484.XA 2023-07-19 2023-07-19 Anti-addiction management method and system based on group supervision Active CN116910710B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310884484.XA CN116910710B (en) 2023-07-19 2023-07-19 Anti-addiction management method and system based on group supervision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310884484.XA CN116910710B (en) 2023-07-19 2023-07-19 Anti-addiction management method and system based on group supervision

Publications (2)

Publication Number Publication Date
CN116910710A CN116910710A (en) 2023-10-20
CN116910710B true CN116910710B (en) 2024-01-26

Family

ID=88357739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310884484.XA Active CN116910710B (en) 2023-07-19 2023-07-19 Anti-addiction management method and system based on group supervision

Country Status (1)

Country Link
CN (1) CN116910710B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194404A (en) * 2017-04-13 2017-09-22 哈尔滨工程大学 Submarine target feature extracting method based on convolutional neural networks
CN115964683A (en) * 2023-01-30 2023-04-14 问久软件科技(山东)有限公司 Anti-sink-lost management method and system based on group supervision

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090113414A1 (en) * 2007-10-24 2009-04-30 Total Tech International Inc. Computer administration deployment system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194404A (en) * 2017-04-13 2017-09-22 哈尔滨工程大学 Submarine target feature extracting method based on convolutional neural networks
CN115964683A (en) * 2023-01-30 2023-04-14 问久软件科技(山东)有限公司 Anti-sink-lost management method and system based on group supervision

Also Published As

Publication number Publication date
CN116910710A (en) 2023-10-20

Similar Documents

Publication Publication Date Title
US20220067798A1 (en) Evaluating and recycling electronic devices
CN106383875B (en) Man-machine interaction method and device based on artificial intelligence
CN106506524A (en) Method and apparatus for verifying user
CN109800386A (en) Highlight the key component of text in document
WO2009023363A2 (en) Smart visual comparison
CN109214914A (en) A kind of loan information checking method and device based on communication open platform
CN110363411B (en) Risk control method and device for intelligent recommendation by using speech technology
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN109685514A (en) For the method, apparatus of payment, storage medium and electronic equipment
CN110619528A (en) Behavior verification data processing method, behavior verification data processing device, behavior verification equipment and storage medium
CN110399473B (en) Method and device for determining answers to user questions
CN116910710B (en) Anti-addiction management method and system based on group supervision
CN110648412A (en) Intelligent inspection method, mobile terminal and storage medium
CN110086826B (en) Information processing method
CN107222765A (en) Edit methods, server and the system of the video playback page of web camera
US20170310664A1 (en) Apparatus and system for obtaining and encrypting documentary materials
CN111931186A (en) Software risk identification method and device
CN116451207A (en) Multi-element semantic verification code and generation method thereof
CN115776548A (en) Double recording system
CN114510725B (en) Vulnerability information processing method based on digital service and server
CN113297488A (en) Data processing method and system based on big data and artificial intelligence
Crawshaw et al. AI in telecom operations: Opportunities & obstacles
Mikhaylov Mobile Forensics Cookbook: Data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
KR20020045150A (en) The System of File Transmission and Management using Voice Verification and the Method thereof
Jung et al. Practical experience gained from modeling security goals: using SGITs in an industrial project

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant