WO2018010072A1 - Method and apparatus for monitoring terminal device - Google Patents

Method and apparatus for monitoring terminal device Download PDF

Info

Publication number
WO2018010072A1
WO2018010072A1 PCT/CN2016/089660 CN2016089660W WO2018010072A1 WO 2018010072 A1 WO2018010072 A1 WO 2018010072A1 CN 2016089660 W CN2016089660 W CN 2016089660W WO 2018010072 A1 WO2018010072 A1 WO 2018010072A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
content
specified operation
screen image
displayed
Prior art date
Application number
PCT/CN2016/089660
Other languages
French (fr)
Chinese (zh)
Inventor
王凤周
Original Assignee
深圳前海达闼云端智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海达闼云端智能科技有限公司 filed Critical 深圳前海达闼云端智能科技有限公司
Priority to CN201680002916.8A priority Critical patent/CN107111539A/en
Priority to PCT/CN2016/089660 priority patent/WO2018010072A1/en
Publication of WO2018010072A1 publication Critical patent/WO2018010072A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

Definitions

  • the present disclosure relates to the field of device management, and in particular, to a method and device for monitoring a terminal device.
  • EMM Enterprise Mobile Management
  • MDM Mobile Device Management
  • the government or other enterprises that need to control and audit the terminal equipment of employees, it is of great significance.
  • the present disclosure provides a method and a device for monitoring a terminal device, which are used to solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored.
  • the present disclosure provides a method for monitoring a terminal device, which is applied to a terminal device, where the method includes:
  • the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine whether the content displayed by the terminal device when performing the specified operation exists.
  • Violating content or,
  • the screen image is used by the monitoring system to display the screen image through a display terminal device.
  • the monitoring the operating status of the terminal device includes:
  • the operating state of the terminal device is monitored in response to the monitoring instruction.
  • the monitoring the operating status of the terminal device includes:
  • the operating state of the terminal device is monitored.
  • the method further includes:
  • the warning information is used to notify the user that the specified operation involves the offending content
  • the warning information is displayed in response to the warning instruction.
  • the method further includes:
  • the specified function is locked in response to the lock instruction.
  • the present disclosure further provides another monitoring method for a terminal device, which is applied to a monitoring system, where the method includes:
  • the obtaining, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determining whether the content of the violation is included in the content that is displayed when the terminal device performs the specified operation includes:
  • the method further includes:
  • the warning information is used to notify the user that the specified operation involves the offending content; or sending a warning instruction to the terminal device, the warning instruction being used by the terminal device according to the warning
  • the instruction displays the warning message.
  • the method further includes:
  • the present disclosure further provides a monitoring method for a terminal device, which is applied to a terminal device, where the method includes:
  • the acquiring, according to the screen image, the content that is displayed when the terminal device performs the specified operation, to determine whether the content of the violation is displayed in the content that is displayed when the terminal device performs the specified operation includes:
  • the method further includes:
  • the warning information is displayed, the warning information being used to notify the user that the specified operation involves a violation of content.
  • the method further includes:
  • the specified function is locked in response to the lock instruction.
  • the present disclosure provides a monitoring apparatus for a terminal device, which is applied to a terminal device.
  • the device includes:
  • a monitoring module configured to monitor an operating state of the terminal device
  • An image acquisition module configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
  • the uploading module is configured to upload the screen image to the monitoring system.
  • the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine whether the content displayed by the terminal device when performing the specified operation exists.
  • Violating content or,
  • the screen image is used by the monitoring system to display the screen image through a display terminal device.
  • the monitoring module is configured to:
  • the operating state of the terminal device is monitored in response to the monitoring instruction.
  • the monitoring module is configured to:
  • the operating state of the terminal device is monitored.
  • the device further includes:
  • a receiving module configured to receive warning information sent by the monitoring system
  • a display module configured to display the warning information, the warning information is used to notify a user that the specified operation involves a violation of content;
  • the receiving module is further configured to receive a warning instruction sent by the monitoring system
  • the display module is further configured to display the warning information in response to the warning instruction.
  • the device further includes:
  • An instruction receiving module configured to receive a locking instruction sent by the monitoring system, the locking instruction Used to indicate that the specified function of the terminal device is locked;
  • a management module configured to lock the specified function in response to the locking instruction.
  • the present disclosure further provides another monitoring device for a terminal device, which is applied to a monitoring system, and the device includes:
  • a receiving module configured to receive a screen image uploaded by the terminal device, where the screen image is an image obtained by the terminal device when the terminal device performs a specified operation, and the screen image includes the terminal device being executed Specify what is displayed during the operation;
  • an analysis module configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • the analyzing module includes:
  • An image recognition sub-module configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
  • a content analysis sub-module configured to compare content displayed by the terminal device when performing a specified operation with pre-set violation content
  • the device further includes: a warning module, configured to:
  • the terminal device After determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, sending the warning information to the terminal device, the warning information being used to notify the user that the specified operation involves the offending content; or The terminal device transmits a warning command for the terminal device to display the warning information according to the warning instruction.
  • the device further includes:
  • a locking module configured to store in the content that is displayed when the terminal device performs the specified operation After the offending content, a lock command is sent to the terminal device, the lock command being used to indicate that the specified function of the terminal device is locked.
  • the present disclosure further provides a monitoring device for a terminal device, which is applied to a terminal device, where the device includes:
  • a monitoring module configured to monitor an operating state of the terminal device
  • An image acquisition module configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
  • an analysis module configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • the analyzing module includes:
  • An image recognition sub-module configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
  • a content analysis sub-module configured to compare content displayed by the terminal device when performing a specified operation with pre-set violation content
  • the device further includes:
  • An information generating module configured to generate warning information after determining that the content that is violated when the terminal device displays the specified operation
  • the warning module is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the content of the violation.
  • the device further includes:
  • An instruction generating module configured to generate a lock instruction, after the determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate that the specified function of the terminal device is locked;
  • a locking module configured to lock the specified function in response to the locking instruction.
  • a non-transitory computer readable storage medium comprising one or more programs, the one or more programs for performing the first aspect A method, or for performing the method of the third aspect.
  • a terminal device where the terminal device includes:
  • One or more processors for executing a program in the non-transitory computer readable storage medium.
  • a ninth aspect a non-transitory computer readable storage medium comprising one or more programs for performing the second aspect method.
  • a monitoring system comprising:
  • One or more processors for executing a program in the non-transitory computer readable storage medium.
  • the terminal device when the terminal device detects that the terminal device performs the specified operation, acquires a screen image, so that a screen image containing the content displayed by the terminal device when performing the operation may be obtained, and then uploaded to the monitoring system by the monitoring system. Performing an analysis on the screen image to obtain content displayed by the terminal device when performing the operation, thereby determining whether the content displayed by the terminal device in the content displayed when the operation is performed, wherein the process of analyzing the screen image may also be performed. It is performed locally by the terminal device. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and the device capable of implementing the terminal device can be realized. The operation is monitored.
  • FIG. 1 is a schematic structural diagram of an implementation environment involved in various embodiments of the present disclosure
  • FIG. 2 is a flowchart of a method for monitoring a terminal device according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart of another method for monitoring a terminal device according to an embodiment of the present disclosure
  • FIG. 4 is a flowchart of a method for monitoring a terminal device according to another embodiment of the present disclosure.
  • FIG. 5 is a flowchart of a method for monitoring a terminal device according to still another embodiment of the present disclosure
  • FIG. 6 is a flowchart of another method for monitoring a terminal device according to still another embodiment of the present disclosure.
  • FIG. 7 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 8 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 9 is a block diagram of still another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 10 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG 11 is a block diagram of an analysis module shown in the embodiment of Figure 10;
  • FIG. 12 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 13 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 14 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG 15 is a block diagram of an analysis module shown in the embodiment of Figure 14;
  • FIG. 16 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 17 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 18 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 19 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • FIG. 1 is a schematic structural diagram of an implementation environment involved in various embodiments of the present disclosure.
  • the implementation environment may include: a terminal device 100, and a monitoring system 200.
  • the terminal device 100 is installed with an application for monitoring the operation of the terminal device 100, such as an SDK (Software Development Kit).
  • the application can also perform a screen capture operation on the terminal device 100.
  • the terminal device 100 may be, for example, a smart phone, a function tablet, a smart wearable terminal device (such as a smart watch), a PDA (Personal Digital Assistant), a portable computer, or a desktop computer.
  • the monitoring system 200 stores a pre-established compliance policy for judging whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation, the monitoring system 200 may include a server or a server.
  • a server cluster or it can be a cloud computing service center.
  • FIG. 2 is a flowchart of a method for monitoring a terminal device according to an embodiment of the present disclosure. The method may be applied to a terminal device.
  • the terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 2, the method includes:
  • Step 201 Monitor an operation state of the terminal device.
  • the operating state of the terminal device may include that the terminal device performs a specified operation or does not perform an operation, and the specified operation may be any operation generated by the user when using the terminal device, for example, may wake up the screen, unlock, and open.
  • An application, typing, sending or receiving Message, save, etc., the specified operation may be by the manufacturer of the terminal device, or the manager of the monitoring system, or the user of the terminal.
  • the step of monitoring the operating state of the terminal device may be implemented based on a monitoring instruction sent by the server, or may be triggered after detecting that the terminal device runs a certain type of application.
  • Step 202 Acquire a screen image of the terminal device when the terminal device performs the specified operation, and the screen image includes the content displayed by the terminal device when performing the specified operation.
  • the acquiring the screen image of the terminal device when the terminal device performs the specified operation may include: first, determining whether the terminal device is monitored to perform a specified operation, for example, sending or receiving a message, when the terminal device is detected.
  • the specified operation is performed, the screen image of the terminal device is obtained.
  • the screen image of the terminal device may include a screen capture operation or a screen recording operation.
  • the screen capture operation is performed, the screen image of the terminal device is the terminal.
  • Step 203 uploading a screen image to the monitoring system.
  • the monitoring system can obtain the content displayed by the terminal device when performing the specified operation according to the screen image, and determine whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
  • the monitoring system may display the screen image of the terminal device, so that the monitoring personnel can analyze whether the content displayed by the terminal device during the execution of the specified operation is illegal.
  • the monitoring system may store a pre-established compliance policy, which is used to determine whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation.
  • FIG. 3 is a flowchart of another method for monitoring a terminal device according to an embodiment of the present disclosure.
  • the method may be applied to a monitoring system.
  • the monitoring system may be the monitoring system 200 shown in FIG. 1.
  • the method includes :
  • Step 301 Receive a screen image uploaded by the terminal device, where the screen image is a screen image of the terminal device that is acquired when the terminal device detects the terminal device performing the specified operation, where the screen image includes the terminal device displaying when performing the specified operation. Content.
  • Step 302 Acquire, according to the screen image, content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • the monitoring system may also display the screen image of the terminal device, so that the monitoring personnel can analyze whether the content of the violation displayed by the terminal device during the execution of the specified operation is present.
  • step 302 above may also be performed locally by the terminal device. Therefore, the embodiment shown in FIG. 4:
  • FIG. 4 is a flowchart of a method for monitoring a terminal device according to another embodiment of the present disclosure. The method may be applied to a terminal device.
  • the terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 4, the method includes :
  • Step 401 Monitor an operation state of the terminal device.
  • Step 402 Acquire a screen image of the terminal device when the terminal device is configured to perform the specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation.
  • the content of the steps 401 and 402 is the same as the content of the step 201 and the step 202, and details are not described herein again.
  • Step 403 Acquire, according to the screen image, content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • a pre-established compliance policy may be stored on the terminal device, and the policy is used to determine whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation.
  • the monitoring method of the terminal device acquires a screen image when the terminal device detects that the terminal device performs a specified operation, so that the terminal device can be obtained.
  • a screen image of the content displayed when the operation is performed and then uploaded to the monitoring system, the screen image is analyzed by the monitoring system to obtain the content displayed by the terminal device when the operation is performed, thereby determining that the terminal device displays when performing the operation.
  • Whether there is a violation content in the content wherein the above process of analyzing the screen image can also be performed locally by the terminal device. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the monitoring effect on the operation of the terminal device.
  • FIG. 5 is a flowchart of a method for monitoring a terminal device according to another embodiment of the present disclosure. The method may be applied to the implementation environment shown in FIG. 1. Referring to FIG. 5, the method includes:
  • Step 501 The terminal device monitors an operation state of the terminal device.
  • the operating state of the terminal device may include that the terminal device performs a specified operation or does not perform an operation
  • the specified operation may be any operation generated by the user when using the terminal device, for example, may wake up the screen, unlock, and enable some An application, typing, sending or receiving messages, saving, and more.
  • the specified operation may be by the manufacturer of the terminal device, or the manager of the monitoring system, or the user of the terminal.
  • the step 501 may be performed in real time or may be implemented based on a monitoring instruction sent by the monitoring system.
  • the monitoring system may further include: the monitoring system sends a monitoring instruction to the terminal device, wherein the step of monitoring the operating state of the terminal device in step 501 may include: the terminal device receiving the monitoring instruction sent by the monitoring system; the terminal device responding Monitoring the operation status of the terminal device.
  • the terminal device is not monitored all the time. When the monitoring system determines that it is necessary to monitor the terminal device, the monitoring command is sent. At this time, the terminal device performs monitoring again, which can reduce the work of the terminal device during monitoring. Consumption.
  • the step 501 may be implemented based on a certain monitoring policy, for example, it may be triggered after the terminal device runs a specified application, and the monitoring policy may be sent by the monitoring system to the terminal device, or may be preset in the terminal device.
  • the step of the device monitoring the operating state of the terminal device may include: monitoring whether the terminal device runs the specified application program; and monitoring the operating state of the terminal device when the terminal device is monitored to run the specified application program.
  • the designated application can be a communication-enabled application, such as instant messaging applications such as SMS, WeChat, QQ, mail applications, and social platforms. Class applications and more.
  • the advantage of this is that the terminal device is not monitored all the time. When the terminal device starts the above specified application program and then performs monitoring, the power consumption of the terminal device during monitoring can be reduced.
  • the operating state of the monitoring terminal device can be implemented by an application installed on the terminal device for monitoring the operation of the terminal device, for example, monitoring in the background through an SDK.
  • Step 502 Acquire a screen image of the terminal device when the terminal device is configured to perform the specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation.
  • the specified operation may be any operation generated by the user when using the terminal device, for example, may wake up the screen, unlock, open an application, input characters, send or receive messages, save (messages, files, pictures, etc.)
  • the photographing operation, etc. may be performed by the manufacturer of the terminal device, or the manager of the monitoring system, or the user of the terminal.
  • the terminal device when it is detected that the terminal device performs an operation, it can be determined whether it is a specified operation, and when it is a specified operation, a screen image of the terminal device is acquired.
  • the specified operation may be to send a message.
  • the specified operation may be set according to the security level of the user of the terminal device. For example, for a user with a lower security level, the secret information is less, so that only the individual operations of the user's terminal device may be monitored, for example,
  • the specified operation of the terminal device setting of the user may be a sending message. For a user with a medium security level, multiple operations of the terminal device of the user may be monitored.
  • the specified operation set for the terminal device of the user may include: sending a message, Receive messages, character input, photo taking, etc. For users with high security levels, most operations of the user's terminal device can be monitored Even all operations.
  • Step 503 The terminal device uploads a screen image to the monitoring system.
  • the uploading of the screen image to the monitoring system by the terminal device may be immediately after the screen image is obtained, or may be detected whether the image uploading condition is met, and the uploading condition may be a time condition or an environmental condition, and the time condition may be, for example, a preset.
  • the uploading condition may be a time condition or an environmental condition, and the time condition may be, for example, a preset.
  • the environmental condition may be, for example, uploading when the network connection of the terminal device is Wi-Fi.
  • Step 504 The monitoring system acquires content displayed by the terminal device when performing the specified operation according to the screen image.
  • the monitoring system may analyze the screen image by using an image recognition technology, and acquire and store the content displayed by the terminal device included in the screen image when performing the specified operation, and the image recognition
  • the technique may be, for example, OCR (Optical Character Recognition) technology.
  • Step 505 The monitoring system determines whether there is a violation content in the content displayed by the terminal device when performing the specified operation.
  • a pre-established compliance policy can be stored on the monitoring system, which is used to determine whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation.
  • the compliance policy can include pre-set violations and penalties after violations.
  • the content displayed by the terminal device when performing the specified operation is compared with the previously set violation content, and is displayed when the terminal device performs the specified operation.
  • the pre-set violation content may be a keyword set in advance, and when there is content matching the preset keyword among the content displayed by the terminal device when performing the specified operation, it may be determined that the violation content exists.
  • the operation of the terminal device can be monitored, and the content involved in the terminal device can be obtained and judged whether there is a violation content.
  • the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the problem. Monitor the operation of the terminal device. Further, after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, the following terminal device may also be punished.
  • Step 506 The monitoring system sends a warning message to the terminal device, where the warning information is used to notify the user that the specified operation involves the content of the violation.
  • the terminal can display the warning message after receiving the warning message.
  • the alarm information can be "Your current operation involves illegal content, please stop immediately.” In order to warn the current user to stop the violation.
  • the content of the foregoing alarm information is merely exemplary and is not limited thereto.
  • step 507 may be performed after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation.
  • the monitoring system described in step 506 may be first sent to the terminal device to send warning information. If the warning is invalid, for example, after the warning information is sent, it is determined that the terminal device has performed the violation operation again, and then step 507 may be performed.
  • the monitoring system may send a warning instruction to the terminal device, and the terminal device displays the warning message after receiving the warning instruction.
  • Step 507 The monitoring system sends a locking instruction to the terminal device, where the locking instruction is used to indicate that the designated function of the terminal device is locked.
  • locking the designated function of the terminal device may include, for example, at least one of locking the call function of the terminal device, locking the short message function of the terminal device, locking the Internet access function of the terminal device, locking the entire terminal device, and the like.
  • the monitoring method of the terminal device acquires a screen image when the terminal device detects that the terminal device performs a specified operation, so that the terminal device can be obtained.
  • a screen image of the content displayed when the operation is performed and then uploaded to the monitoring system, the screen image is analyzed by the monitoring system to obtain the content displayed by the terminal device when the operation is performed, thereby determining that the terminal device displays when performing the operation. Whether there is a violation in the content. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the monitoring effect on the operation of the terminal device.
  • FIG. 6 is a flowchart of another method for monitoring a terminal device according to another embodiment of the present disclosure. Can be applied to the implementation environment shown in Figure 1, see Figure 6, the method includes:
  • Step 601 The terminal device monitors an operation state of the terminal device.
  • Step 602 The terminal device acquires a screen image of the terminal device when the terminal device performs the specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation.
  • steps 601-602 are the same as those described in steps 501-502, and reference may be made to steps 501-502, and details are not described herein.
  • Step 603 The terminal device acquires content displayed by the terminal device when performing the specified operation according to the screen image.
  • Step 604 The terminal device determines whether there is a violation content in the content displayed by the terminal device when performing the specified operation.
  • the method of the steps 603-604 is the same as the method described in the steps 504-505 except that the execution process is performed by the terminal device, and the steps 504-505 can be referred to, and details are not described herein.
  • the following terminal device may also be punished by the following steps.
  • step 605 the terminal device generates warning information.
  • Step 607 The terminal device displays a warning message, and the warning information is used to notify the user that the specified operation involves the content of the violation.
  • the alarm information can be "Your current operation involves illegal content, please stop immediately.” In order to warn the current user to stop the violation.
  • the content of the foregoing alarm information is merely exemplary and is not limited thereto.
  • steps 608 to 609 may be performed after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation.
  • the generation of the warning information described in steps 606-607 may be performed first, and if the warning is invalid, for example, after the warning information is displayed, it is determined that the terminal device has performed the violation operation again, and steps 608-609 may be performed.
  • Step 608 The terminal device generates a lock instruction, where the lock command is used to indicate that the designated function of the terminal device is locked.
  • Step 609 The terminal device locks the designated function in response to the lock instruction.
  • locking the designated function of the terminal device may include, for example, at least one of locking the call function of the terminal device, locking the short message function of the terminal device, locking the Internet access function of the terminal device, locking the entire terminal device, and the like.
  • the monitoring method of the terminal device detects that the terminal device acquires a screen image when performing the specified operation, so that the screen image can be analyzed to obtain the terminal device displaying when performing the operation. Content, and determine whether there is a violation content in the content displayed by the terminal device when performing the operation. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the monitoring effect on the operation of the terminal device.
  • FIG. 7 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the device 700 may be applied to a terminal device, and may be used to execute the method shown in FIG. 2 or FIG. 5.
  • the device 700 may be implemented by software or The hardware or a combination of the two forms part or all of the terminal device.
  • the terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 7, the device 700 may include:
  • the monitoring module 710 is configured to monitor an operation state of the terminal device.
  • the image acquisition module 720 is configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
  • the uploading module 730 is configured to upload the screen image to the monitoring system.
  • the screen image is used by the monitoring system to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • the screen image is used by the monitoring system to display the screen image through the display terminal device.
  • the monitoring module 710 is configured to:
  • the operating state of the terminal device is monitored in response to the monitoring instruction.
  • the monitoring module 710 is configured to:
  • the operating state of the terminal device is monitored.
  • FIG. 8 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the apparatus 700 further includes:
  • the receiving module 740 is configured to receive warning information sent by the monitoring system
  • the display module 750 is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the offending content.
  • Or receiving module 740 configured to receive a warning instruction sent by the monitoring system
  • the warning information is also displayed.
  • FIG. 9 is a block diagram of still another monitoring device of the terminal device according to an embodiment of the present disclosure.
  • the device 700 further includes:
  • the instruction receiving module 760 is configured to receive a locking instruction sent by the monitoring system, where the locking instruction is used to indicate that the designated function of the terminal device is locked;
  • the management module 770 is configured to lock the designated function in response to the locking instruction.
  • FIG. 10 is a block diagram of a monitoring apparatus for a terminal device according to an embodiment of the present disclosure.
  • the device 1000 can be applied to a monitoring system, and can be used to execute the method shown in FIG. 3 or FIG. 5.
  • the device 1000 can be implemented by software or The hardware or a combination of the two forms part or all of the server.
  • the server may be the monitoring system 200 shown in FIG. 1. Referring to FIG. 10, the device 1000 may include:
  • the receiving module 1010 is configured to receive a screen image uploaded by the terminal device, where the screen image is an image obtained by the terminal device when the terminal device performs a specified operation, and the screen image includes the terminal device What is displayed when the specified operation is performed;
  • the analysis module 1020 is configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • FIG. 11 is a block diagram of an analysis module shown in the embodiment shown in FIG. 10.
  • the analysis module 1020 includes:
  • the image recognition sub-module 1021 is configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
  • the content analysis sub-module 1022 is configured to compare the content displayed by the terminal device when performing the specified operation with the content of the violation set in advance;
  • a determining sub-module 1023 configured to determine, when the terminal device has content that matches the preset violation content in the content displayed when the specified operation is performed, determine the content displayed by the terminal device when performing the specified operation There is a violation of the content.
  • FIG. 12 is a block diagram of another monitoring device of a terminal device according to an embodiment of the present disclosure.
  • the device 1000 further includes: a warning module 1030, configured to:
  • the terminal device After determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, sending the warning information to the terminal device, the warning information being used to notify the user that the specified operation involves the offending content; or The terminal device transmits a warning command for the terminal device to display the warning information according to the warning instruction.
  • FIG. 13 is a block diagram of another monitoring apparatus for a terminal device according to an embodiment of the present disclosure.
  • the device 1000 further includes:
  • the locking module 1040 is configured to send a lock instruction to the terminal device after determining that the content is violated in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate the designated function of the terminal device locking.
  • FIG. 14 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the device 1400 may be applied to a terminal device, and may be used to execute the method shown in FIG. 4 or FIG.
  • the hardware or a combination of the two forms part or all of the terminal device.
  • the terminal device may be the terminal device 100 shown in FIG. 1.
  • the device 1400 may include:
  • the monitoring module 1410 is configured to monitor an operating state of the terminal device.
  • the image acquisition module 1420 is configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
  • the analyzing module 1430 is configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  • FIG. 15 is a block diagram of an analysis module shown in the embodiment shown in FIG. 15.
  • the analysis module 1430 includes:
  • the image recognition sub-module 1431 is configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
  • the content analysis sub-module 1432 is configured to compare the content displayed by the terminal device when performing the specified operation with the content of the violation set in advance;
  • FIG. 16 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the device 1400 further includes:
  • the information generating module 1440 is configured to generate warning information after determining that the content is violated in the content displayed by the terminal device when performing the specified operation;
  • the warning module 1450 is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the offending content.
  • FIG. 17 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the device 1400 further includes:
  • the instruction generating module 1460 is configured to generate a lock instruction, after the determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate that the specified function of the terminal device is locked;
  • the locking module 1470 is configured to lock the designated function in response to the locking instruction.
  • the monitoring device of the terminal device detects that the terminal device acquires a screen image when performing the specified operation, so that the screen image can be analyzed to obtain that the terminal device displays when performing the operation. Content, and determine whether there is a violation content in the content displayed by the terminal device when performing the operation. It can be seen that the present disclosure can solve the existing pair The content involved in the operation performed by the terminal device cannot implement effective monitoring, and the monitoring effect of the operation of the terminal device can be realized.
  • FIG. 18 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the device 1800 may be a terminal device. As shown in FIG. 18, the device 1800 may include: a processor 1801, a memory 1802, and a multimedia component. 1803, an input/output (I/O) interface 1804, and a communication component 1805.
  • a processor 1801 a memory 1802
  • a multimedia component. 1803 an input/output (I/O) interface 1804
  • I/O input/output
  • the processor 1801 is configured to control the overall operation of the device 1800 to complete all or part of the steps of the monitoring method of the terminal device shown in FIG. 2, FIG. 3, FIG. 4 or FIG.
  • Memory 1802 is used to store various types of data to support operations at the device 1800, such as may include instructions for any application or method operating on the device 1800, as well as application related data, such as Contact data, sent and received messages, pictures, audio, video, and more.
  • the memory 1802 can be implemented by any type of volatile or non-volatile storage terminal device or a combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read only memory.
  • SRAM Static Random Access Memory
  • the multimedia component 1803 can include a screen and audio components.
  • the screen may be, for example, a touch screen, and the audio component is used to output and/or input an audio signal.
  • the audio component can include a microphone for receiving an external audio signal.
  • the received audio signal may be further stored in memory 1802 or transmitted via communication component 1805.
  • the audio component also includes at least one speaker for outputting an audio signal.
  • the I/O interface 1804 provides an interface between the processor 1801 and other interface modules, such as a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or entities Button.
  • Communication component 1805 is used for wired or wireless communication between the device 1800 and other terminal devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so the corresponding communication component 1805 can include: Wi-Fi module, Bluetooth module, NFC module.
  • the device 1800 may be configured by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and digital signal processing terminals (Digital).
  • ASICs Application Specific Integrated Circuits
  • DSPs Digital Signal Processors
  • Digital Digital Signal Processing Device
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • controller microcontroller, microprocessor or other electronic components Implemented to perform the monitoring method of the terminal device described above.
  • non-transitory computer readable storage medium comprising instructions, such as a memory 1802 comprising instructions executable by processor 1801 of apparatus 1800 to perform the terminal device described above Monitoring method.
  • the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage terminal device.
  • FIG. 19 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
  • the device 1900 may be a monitoring system, and the monitoring system may be a server, a server cluster composed of several servers, or may be a Cloud Computing Service Center.
  • apparatus 1900 includes a processor 1901, a memory 1902, an I/O interface 1903, and a network interface 1904, where the memory 1902 can be used to store instructions executable by the processor 1901, which the processor 1902 can execute to The monitoring method of the terminal device shown in FIG. 3 or FIG. 5 described above is executed. Additionally, the apparatus 1900 can operate based on an operating system stored in the memory 1902, including but not limited to Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
  • the embodiment of the present disclosure further provides a monitoring system, which may include at least one terminal device; and a monitoring system;
  • the monitoring device 1800 of the foregoing terminal device may be included in each terminal device, and the monitoring system may include the monitoring device 1900 of the terminal device described above.
  • An embodiment of the present disclosure further provides a non-transitory computer readable storage medium, comprising: a non-transitory computer readable storage medium, wherein the non-transitory computer readable storage medium includes one or more programs, One or more programs for performing a monitoring method of a terminal device, the method comprising:
  • Monitoring a working state of the terminal device acquiring a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation; Upload the screen image to the monitoring system.
  • the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine whether the content displayed by the terminal device when performing the specified operation exists.
  • the violation content; or the screen image is used by the monitoring system to display the screen image through the display terminal device.
  • the monitoring the operating status of the terminal device includes:
  • the monitoring the operating status of the terminal device includes:
  • the method further includes:
  • warning information sent by the monitoring system Receiving warning information sent by the monitoring system; displaying the warning information, the warning information is used to notify a user that the specified operation involves illegal content; or
  • the method further includes:
  • the lock instruction is used to indicate that a specified function of the terminal device is locked; and the specified function is locked in response to the lock instruction.
  • the one or more programs may be used to perform another monitoring method of the terminal device, and the method includes:
  • Monitoring an operation state of the terminal device acquiring a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
  • the screen image acquires content displayed by the terminal device when performing the specified operation, and determines whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
  • the acquiring, according to the screen image, the content that is displayed when the terminal device performs the specified operation, to determine whether the content of the violation is displayed in the content that is displayed when the terminal device performs the specified operation includes:
  • the method further includes:
  • the method further includes:
  • An embodiment of the present disclosure further provides a terminal device, where the terminal device includes:
  • An embodiment of the present disclosure further provides another non-transitory computer readable storage medium including one or more programs for executing a terminal Device monitoring method, the method includes:
  • the obtaining, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determining whether the content of the violation is included in the content that is displayed when the terminal device performs the specified operation includes:
  • the method further includes:
  • the warning information is used to notify the user that the specified operation involves the offending content; or sending a warning instruction to the terminal device, the warning instruction being used by the terminal device according to the warning
  • the instruction displays the warning message.
  • the method further includes:
  • An embodiment of the present disclosure further provides a monitoring system, where the monitoring system includes:

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A method, an apparatus, and a system for monitoring a terminal device, relating to the field of device management. The method comprises: A terminal device acquiring, when performing a specified operation, a screen image, such that the screen image containing the contents displayed when the terminal device is performing the operation can be obtained, then uploading same to a monitoring system, the monitoring system analyzing the screen image so as to obtain the contents displayed when the terminal device is performing the operation, thereby determining whether there is any unauthorized content in the contents displayed when the terminal device is performing the operation. The invention is able to solve the problem that the contents relating to the operation performed by the terminal device cannot be effectively monitored, and achieve the monitoring on the operation of the terminal device. The invention is used for monitoring a terminal device.

Description

终端设备的监控方法及装置Terminal device monitoring method and device 技术领域Technical field
本公开涉及设备管理领域,尤其涉及一种终端设备的监控方法及装置。The present disclosure relates to the field of device management, and in particular, to a method and device for monitoring a terminal device.
背景技术Background technique
EMM(Enterprise Mobile Management,企业移动管理)是当前企业在移动信息化运营过程可以借助的管理平台,来完成对企业应用的部署、管控的技术。例如,其中的MDM(Mobile Device Management,移动设备管理)能够对企业终端设备和员工自带终端设备进行基于角色的管理、配置和安全设置。特别是对于军队、政府或者其他需要对员工的终端设备进行控制和内容审计的企业具有重要的意义。EMM (Enterprise Mobile Management) is a management platform that enterprises can use in the process of mobile information operation to complete the deployment and control of enterprise applications. For example, MDM (Mobile Device Management) enables role-based management, configuration, and security settings for enterprise end devices and employee-owned end devices. Especially for the military, the government or other enterprises that need to control and audit the terminal equipment of employees, it is of great significance.
由于目前的终端设备在某些方面的数据是加密的,因此无法通过解析数据来识别终端设备所执行操作涉及的内容,因此对于终端设备所执行操作涉及的内容不能实现有效监控。Since the data of the current terminal device is encrypted in some aspects, it is impossible to identify the content involved in the operation performed by the terminal device by parsing the data, and therefore the content involved in the operation performed by the terminal device cannot be effectively monitored.
发明内容Summary of the invention
本公开提供一种终端设备的监控方法及装置,用于解决现有的对于终端设备所执行操作涉及的内容不能实现有效监控的问题。The present disclosure provides a method and a device for monitoring a terminal device, which are used to solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored.
为了实现上述目的,第一方面,本公开提供一种终端设备的监控方法,应用于终端设备,所述方法包括:In order to achieve the above object, in a first aspect, the present disclosure provides a method for monitoring a terminal device, which is applied to a terminal device, where the method includes:
监控所述终端设备的操作状态;Monitoring an operation state of the terminal device;
当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行所述指定操作时显示的内容;Obtaining, when the terminal device performs the specified operation, a screen image of the terminal device, where the screen image includes content displayed by the terminal device when performing the specified operation;
向监控系统上传所述屏幕图像。 Upload the screen image to the monitoring system.
可选的,所述屏幕图像用于所述监控系统根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容;或者,Optionally, the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine whether the content displayed by the terminal device when performing the specified operation exists. Violating content; or,
所述屏幕图像用于所述监控系统通过显示终端设备显示所述屏幕图像。The screen image is used by the monitoring system to display the screen image through a display terminal device.
可选的,所述监控所述终端设备的操作状态包括:Optionally, the monitoring the operating status of the terminal device includes:
接收所述监控系统发送的监控指令;Receiving a monitoring instruction sent by the monitoring system;
响应于所述监控指令,监控所述终端设备的操作状态。The operating state of the terminal device is monitored in response to the monitoring instruction.
可选的,所述监控所述终端设备的操作状态包括:Optionally, the monitoring the operating status of the terminal device includes:
监控所述终端设备是否运行了指定应用程序;Monitoring whether the terminal device runs a specified application;
当监测到所述终端设备运行了所述指定应用程序时,监控所述终端设备的操作状态。When it is detected that the terminal device runs the specified application, the operating state of the terminal device is monitored.
可选的,所述方法还包括:Optionally, the method further includes:
接收所述监控系统发送的警告信息;Receiving warning information sent by the monitoring system;
显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,Displaying the warning information, the warning information is used to notify the user that the specified operation involves the offending content; or
接收所述监控系统发送的警告指令;Receiving a warning instruction sent by the monitoring system;
响应于所述警告指令,显示所述警告信息。The warning information is displayed in response to the warning instruction.
可选的,所述方法还包括:Optionally, the method further includes:
接收所述监控系统发送的锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;Receiving a lock instruction sent by the monitoring system, where the lock instruction is used to indicate that a specified function of the terminal device is locked;
响应于所述锁定指令,将所述指定功能进行锁定。The specified function is locked in response to the lock instruction.
第二方面,本公开还提供另一种终端设备的监控方法,应用于监控系统,所述方法包括:In a second aspect, the present disclosure further provides another monitoring method for a terminal device, which is applied to a monitoring system, where the method includes:
接收终端设备上传的所述终端设备的屏幕图像,所述屏幕图像是所述终端设备监测到所述终端设备执行指定操作时获取的,所述屏幕图像中包含所 述终端设备在执行所述指定操作时显示的内容;Receiving a screen image of the terminal device uploaded by the terminal device, where the screen image is acquired when the terminal device detects that the terminal device performs a specified operation, where the screen image includes Describe the content displayed by the terminal device when performing the specified operation;
根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。Acquiring the content displayed by the terminal device when performing the specified operation according to the screen image, and determining whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
可选的,所述根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容包括:Optionally, the obtaining, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determining whether the content of the violation is included in the content that is displayed when the terminal device performs the specified operation includes:
利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;And analyzing the screen image by using an image recognition technology, and acquiring content displayed by the terminal device included in the screen image when performing a specified operation;
将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;Comparing the content displayed by the terminal device when performing the specified operation with the pre-set violation content;
当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。When there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation, it is determined that the content is displayed in the content displayed by the terminal device when performing the specified operation.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:Optionally, after determining that the content is displayed in the content that is displayed when the terminal device performs the specified operation, the method further includes:
向所述终端设备发送警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,向所述终端设备发送警告指令,所述警告指令用于所述终端设备根据所述警告指令显示所述警告信息。Sending warning information to the terminal device, the warning information is used to notify the user that the specified operation involves the offending content; or sending a warning instruction to the terminal device, the warning instruction being used by the terminal device according to the warning The instruction displays the warning message.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:Optionally, after determining that the content is displayed in the content that is displayed when the terminal device performs the specified operation, the method further includes:
向所述终端设备发送锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定。And sending a lock instruction to the terminal device, the lock instruction being used to indicate that the specified function of the terminal device is locked.
第三方面,本公开还提供又一种终端设备的监控方法,应用于终端设备,所述方法包括:In a third aspect, the present disclosure further provides a monitoring method for a terminal device, which is applied to a terminal device, where the method includes:
监控所述终端设备的操作状态; Monitoring an operation state of the terminal device;
当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;Obtaining, when the terminal device performs the specified operation, a screen image of the terminal device, where the screen image includes content displayed by the terminal device when performing a specified operation;
根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。Acquiring the content displayed by the terminal device when performing the specified operation according to the screen image, and determining whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
可选的,所述根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,以判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容包括:Optionally, the acquiring, according to the screen image, the content that is displayed when the terminal device performs the specified operation, to determine whether the content of the violation is displayed in the content that is displayed when the terminal device performs the specified operation includes:
利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;And analyzing the screen image by using an image recognition technology, and acquiring content displayed by the terminal device included in the screen image when performing a specified operation;
将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;Comparing the content displayed by the terminal device when performing the specified operation with the pre-set violation content;
当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。When there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation, it is determined that the content is displayed in the content displayed by the terminal device when performing the specified operation.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:Optionally, after determining that the content is displayed in the content that is displayed when the terminal device performs the specified operation, the method further includes:
生成警告信息;Generate a warning message;
显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。The warning information is displayed, the warning information being used to notify the user that the specified operation involves a violation of content.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:Optionally, after determining that the content is displayed in the content that is displayed when the terminal device performs the specified operation, the method further includes:
生成锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;Generating a lock instruction for indicating that the specified function of the terminal device is locked;
响应于所述锁定指令,将所述指定功能进行锁定。The specified function is locked in response to the lock instruction.
第四方面,本公开提供一种终端设备的监控装置,应用于终端设备,所 述装置包括:In a fourth aspect, the present disclosure provides a monitoring apparatus for a terminal device, which is applied to a terminal device. The device includes:
监控模块,用于监控所述终端设备的操作状态;a monitoring module, configured to monitor an operating state of the terminal device;
图像获取模块,用于当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;An image acquisition module, configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
上传模块,用于向监控系统上传所述屏幕图像。The uploading module is configured to upload the screen image to the monitoring system.
可选的,所述屏幕图像用于所述监控系统根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容;或者,Optionally, the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine whether the content displayed by the terminal device when performing the specified operation exists. Violating content; or,
所述屏幕图像用于所述监控系统通过显示终端设备显示所述屏幕图像。The screen image is used by the monitoring system to display the screen image through a display terminal device.
可选的,所述监控模块用于:Optionally, the monitoring module is configured to:
接收所述监控系统发送的监控指令;Receiving a monitoring instruction sent by the monitoring system;
响应于所述监控指令,监控所述终端设备的操作状态。The operating state of the terminal device is monitored in response to the monitoring instruction.
可选的,所述监控模块用于:Optionally, the monitoring module is configured to:
监控所述终端设备是否运行了指定应用程序;Monitoring whether the terminal device runs a specified application;
当监测到所述终端设备运行了所述指定应用程序时,监控所述终端设备的操作状态。When it is detected that the terminal device runs the specified application, the operating state of the terminal device is monitored.
可选的,所述装置还包括:Optionally, the device further includes:
接收模块,用于接收所述监控系统发送的警告信息;a receiving module, configured to receive warning information sent by the monitoring system;
显示模块,用于显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,a display module, configured to display the warning information, the warning information is used to notify a user that the specified operation involves a violation of content; or
所述接收模块,还用于接收所述监控系统发送的警告指令;The receiving module is further configured to receive a warning instruction sent by the monitoring system;
所述显示模块,还用于响应于所述警告指令,显示所述警告信息。The display module is further configured to display the warning information in response to the warning instruction.
可选的,所述装置还包括:Optionally, the device further includes:
指令接收模块,用于接收所述监控系统发送的锁定指令,所述锁定指令 用于指示将所述终端设备的指定功能锁定;An instruction receiving module, configured to receive a locking instruction sent by the monitoring system, the locking instruction Used to indicate that the specified function of the terminal device is locked;
管理模块,用于响应于所述锁定指令,将所述指定功能进行锁定。And a management module, configured to lock the specified function in response to the locking instruction.
第五方面,本公开还提供另一种终端设备的监控装置,应用于监控系统,所述装置包括:In a fifth aspect, the present disclosure further provides another monitoring device for a terminal device, which is applied to a monitoring system, and the device includes:
接收模块,用于接收终端设备上传的屏幕图像,所述屏幕图像是所述终端设备监测到所述终端设备执行指定操作时进行截屏得到的图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;a receiving module, configured to receive a screen image uploaded by the terminal device, where the screen image is an image obtained by the terminal device when the terminal device performs a specified operation, and the screen image includes the terminal device being executed Specify what is displayed during the operation;
分析模块,用于根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。And an analysis module, configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
可选的,所述分析模块包括:Optionally, the analyzing module includes:
图像识别子模块,用于利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;An image recognition sub-module, configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
内容分析子模块,用于将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;a content analysis sub-module, configured to compare content displayed by the terminal device when performing a specified operation with pre-set violation content;
确定子模块,用于当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。Determining a sub-module for determining that the terminal device exists in the content displayed when performing the specified operation when there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation Violation of content.
可选的,所述装置还包括:警告模块,用于:Optionally, the device further includes: a warning module, configured to:
在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,向所述终端设备发送警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,向所述终端设备发送警告指令,所述警告指令用于所述终端设备根据所述警告指令显示所述警告信息。After determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, sending the warning information to the terminal device, the warning information being used to notify the user that the specified operation involves the offending content; or The terminal device transmits a warning command for the terminal device to display the warning information according to the warning instruction.
可选的,所述装置还包括:Optionally, the device further includes:
锁定模块,用于在确定所述终端设备在执行指定操作时显示的内容中存 在违规内容之后,向所述终端设备发送锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定。a locking module, configured to store in the content that is displayed when the terminal device performs the specified operation After the offending content, a lock command is sent to the terminal device, the lock command being used to indicate that the specified function of the terminal device is locked.
第六方面,本公开还提供又一种终端设备的监控装置,应用于终端设备,所述装置包括:In a sixth aspect, the present disclosure further provides a monitoring device for a terminal device, which is applied to a terminal device, where the device includes:
监控模块,用于监控所述终端设备的操作状态;a monitoring module, configured to monitor an operating state of the terminal device;
图像获取模块,用于当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;An image acquisition module, configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
分析模块,用于根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。And an analysis module, configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
可选的,所述分析模块包括:Optionally, the analyzing module includes:
图像识别子模块,用于利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;An image recognition sub-module, configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
内容分析子模块,用于将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;a content analysis sub-module, configured to compare content displayed by the terminal device when performing a specified operation with pre-set violation content;
确定子模块,用于当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。Determining a sub-module for determining that the terminal device exists in the content displayed when performing the specified operation when there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation Violation of content.
可选的,所述装置还包括:Optionally, the device further includes:
信息生成模块,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,生成警告信息;An information generating module, configured to generate warning information after determining that the content that is violated when the terminal device displays the specified operation;
警告模块,用于显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。The warning module is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the content of the violation.
可选的,所述装置还包括: Optionally, the device further includes:
指令生成模块,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,生成锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;An instruction generating module, configured to generate a lock instruction, after the determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate that the specified function of the terminal device is locked;
锁定模块,用于响应于所述锁定指令,将所述指定功能进行锁定。And a locking module, configured to lock the specified function in response to the locking instruction.
第七方面,提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行第一方面所述的方法,或用于执行第三方面所述的方法。In a seventh aspect, a non-transitory computer readable storage medium is provided, the non-transitory computer readable storage medium comprising one or more programs, the one or more programs for performing the first aspect A method, or for performing the method of the third aspect.
第八方面,提供一种终端设备,所述终端设备包括:In an eighth aspect, a terminal device is provided, where the terminal device includes:
第七方面所述的非临时性计算机可读存储介质;以及a non-transitory computer readable storage medium according to the seventh aspect;
一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。One or more processors for executing a program in the non-transitory computer readable storage medium.
第九方面,提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行第二方面所述的方法。A ninth aspect, a non-transitory computer readable storage medium comprising one or more programs for performing the second aspect method.
第十方面,提供一种监控系统,所述监控系统包括:In a tenth aspect, a monitoring system is provided, the monitoring system comprising:
第九方面所述的非临时性计算机可读存储介质;以及The non-transitory computer readable storage medium of the ninth aspect;
一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。One or more processors for executing a program in the non-transitory computer readable storage medium.
通过上述技术方案,在终端设备监测到该终端设备在执行指定操作时,获取屏幕图像,从而可以得到包含该终端设备在执行该操作时显示的内容的屏幕图像,而后上传至监控系统由监控系统对屏幕图像进行分析以获得该终端设备在执行该操作时显示的内容,从而判断该终端设备在执行该操作时显示的内容中是否存在违规内容,其中上述的对屏幕图像进行分析的过程也可以由终端设备在本地进行。由此可见,本公开能够解决现有的对于终端设备所执行操作涉及的内容不能实现有效监控的问题,实现了能够对终端设备的 操作进行监控效果。Through the above technical solution, when the terminal device detects that the terminal device performs the specified operation, acquires a screen image, so that a screen image containing the content displayed by the terminal device when performing the operation may be obtained, and then uploaded to the monitoring system by the monitoring system. Performing an analysis on the screen image to obtain content displayed by the terminal device when performing the operation, thereby determining whether the content displayed by the terminal device in the content displayed when the operation is performed, wherein the process of analyzing the screen image may also be performed. It is performed locally by the terminal device. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and the device capable of implementing the terminal device can be realized. The operation is monitored.
本公开的其他特征和优点将在随后的具体实施方式部分予以详细说明。Other features and advantages of the present disclosure will be described in detail in the detailed description which follows.
附图说明DRAWINGS
附图是用来提供对本公开的进一步理解,并且构成说明书的一部分,与下面的具体实施方式一起用于解释本公开,但并不构成对本公开的限制。在附图中:The drawings are intended to provide a further understanding of the disclosure, and are in the In the drawing:
图1是本公开各个实施例所涉及的一种实施环境的结构示意图;1 is a schematic structural diagram of an implementation environment involved in various embodiments of the present disclosure;
图2是本公开一实施例提供一种终端设备的监控方法的流程图;FIG. 2 is a flowchart of a method for monitoring a terminal device according to an embodiment of the present disclosure;
图3是本公开一实施例提供另一种终端设备的监控方法的流程图;FIG. 3 is a flowchart of another method for monitoring a terminal device according to an embodiment of the present disclosure;
图4是本公开另一实施例提供一种终端设备的监控方法的流程图;FIG. 4 is a flowchart of a method for monitoring a terminal device according to another embodiment of the present disclosure;
图5是本公开又一实施例提供一种终端设备的监控方法的流程图;FIG. 5 is a flowchart of a method for monitoring a terminal device according to still another embodiment of the present disclosure;
图6是本公开又一实施例提供另一种终端设备的监控方法的流程图;6 is a flowchart of another method for monitoring a terminal device according to still another embodiment of the present disclosure;
图7是本公开一实施例提供的一种终端设备的监控装置的框图;FIG. 7 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图8是本公开一实施例提供的另一种终端设备的监控装置的框图;FIG. 8 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图9是本公开一实施例提供的又一种终端设备的监控装置的框图;FIG. 9 is a block diagram of still another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图10是本公开一实施例提供的一种终端设备的监控装置的框图;FIG. 10 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图11是图10所示实施例示出的一种分析模块的框图;Figure 11 is a block diagram of an analysis module shown in the embodiment of Figure 10;
图12是本公开一实施例提供的另一种终端设备的监控装置的框图;FIG. 12 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图13是本公开一实施例提供的另一种终端设备的监控装置的框图;FIG. 13 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图14是本公开一实施例提供的一种终端设备的监控装置的框图;FIG. 14 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图15是图14所示实施例示出的一种分析模块的框图;Figure 15 is a block diagram of an analysis module shown in the embodiment of Figure 14;
图16是本公开一实施例提供的另一种终端设备的监控装置的框图;FIG. 16 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图17是本公开一实施例提供的另一种终端设备的监控装置的框图;FIG. 17 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图18是本公开一实施例提供的另一种终端设备的监控装置的框图; FIG. 18 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure;
图19是本公开一实施例提供的另一种终端设备的监控装置的框图。FIG. 19 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure.
具体实施方式detailed description
以下结合附图对本公开的具体实施方式进行详细说明。应当理解的是,此处所描述的具体实施方式仅用于说明和解释本公开,并不用于限制本公开。The specific embodiments of the present disclosure will be described in detail below with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are not to be construed
在介绍本公开提供的终端设备的监控方法之前,首先对本公开所涉及应用场景进行介绍,图1是本公开各个实施例所涉及的一种实施环境的结构示意图。参见图1,该实施环境可以包括:终端设备100,以及监控系统200,终端设备100上安装用于监控该终端设备100操作的应用程序,例如SDK(Software Development Kit,软件开发包工具),该应用程序还可以对终端设备100进行截屏操作。其中,终端设备100例如可以是智能手机、功能平板电脑、智能可穿戴终端设备(例如智能手表)、PDA(Personal Digital Assistant,个人数字助理)、便携计算机,或台式计算机等。监控系统200中存储有预先制定好的合规策略,用于判断终端设备操作所涉及的内容是否违规,以及对于违规的惩处,该监控系统200可以包括一台服务器,或者由若干台服务器组成的服务器集群,或者可以是一个云计算服务中心。Before introducing the monitoring method of the terminal device provided by the present disclosure, the application scenario of the present disclosure is first introduced. FIG. 1 is a schematic structural diagram of an implementation environment involved in various embodiments of the present disclosure. Referring to FIG. 1 , the implementation environment may include: a terminal device 100, and a monitoring system 200. The terminal device 100 is installed with an application for monitoring the operation of the terminal device 100, such as an SDK (Software Development Kit). The application can also perform a screen capture operation on the terminal device 100. The terminal device 100 may be, for example, a smart phone, a function tablet, a smart wearable terminal device (such as a smart watch), a PDA (Personal Digital Assistant), a portable computer, or a desktop computer. The monitoring system 200 stores a pre-established compliance policy for judging whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation, the monitoring system 200 may include a server or a server. A server cluster, or it can be a cloud computing service center.
图2是本公开一实施例提供一种终端设备的监控方法的流程图,该方法可以应用于终端设备,该终端设备可以是图1所示的终端设备100,参见图2,该方法包括:FIG. 2 is a flowchart of a method for monitoring a terminal device according to an embodiment of the present disclosure. The method may be applied to a terminal device. The terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 2, the method includes:
步骤201,监控终端设备的操作状态。Step 201: Monitor an operation state of the terminal device.
示例地,该终端设备的操作状态,可以包括该终端设备在执行指定操作或未执行操作,该指定操作可以是用户在使用终端设备时在产生的任意操作,例如可以是唤醒屏幕、解锁、开启某一应用程序、打字、发送或者接收 消息、保存等等,该指定操作可以由该终端设备的制造商,或者是该监控系统的管理者,或者是该终端的用户。可选的,所述的监控终端设备的操作状态的步骤可以是基于服务器发送的监控指令实现的,也可以是监测到终端设备运行某一指定类型的应用程序后触发的。For example, the operating state of the terminal device may include that the terminal device performs a specified operation or does not perform an operation, and the specified operation may be any operation generated by the user when using the terminal device, for example, may wake up the screen, unlock, and open. An application, typing, sending or receiving Message, save, etc., the specified operation may be by the manufacturer of the terminal device, or the manager of the monitoring system, or the user of the terminal. Optionally, the step of monitoring the operating state of the terminal device may be implemented based on a monitoring instruction sent by the server, or may be triggered after detecting that the terminal device runs a certain type of application.
步骤202,当监测到终端设备执行指定操作时获取该终端设备的屏幕图像,屏幕图像中包含终端设备在执行指定操作时显示的内容。Step 202: Acquire a screen image of the terminal device when the terminal device performs the specified operation, and the screen image includes the content displayed by the terminal device when performing the specified operation.
示例的,所述当监测到终端设备执行指定操作时获取该终端设备的屏幕图像可以包括:首先,判断是否监测到终端设备执行指定操作,该指定操作例如发送或者接收消息,当监测到终端设备执行的是该指定操作时,获取该终端设备的屏幕图像,示例的,获取该终端设备的屏幕图像可以包括截屏操作或者录屏操作,当为截屏操作时,该终端设备的屏幕图像为该终端设备执行的该制定操作时的截图,当录屏操作时,该终端设备的屏幕图像为从该终端设备开始执行该指定操作起一段时间内的视频。For example, the acquiring the screen image of the terminal device when the terminal device performs the specified operation may include: first, determining whether the terminal device is monitored to perform a specified operation, for example, sending or receiving a message, when the terminal device is detected. When the specified operation is performed, the screen image of the terminal device is obtained. For example, the screen image of the terminal device may include a screen capture operation or a screen recording operation. When the screen capture operation is performed, the screen image of the terminal device is the terminal. A screenshot of the device performing the operation, when the screen operation is performed, the screen image of the terminal device is a video within a period of time from the start of the specified operation of the terminal device.
步骤203,向监控系统上传屏幕图像。 Step 203, uploading a screen image to the monitoring system.
该屏幕图像上传至监控系统后,监控系统可以根据屏幕图像获取该终端设备在执行指定操作时显示的内容,并判断该终端设备在执行指定操作时显示的内容中是否存在违规内容。或者该监控系统也可以通过显示终端设备该屏幕图像,从而由可以监控人员来分析该终端设备在执行指定操作时显示的内容中是否存在违规内容。After the screen image is uploaded to the monitoring system, the monitoring system can obtain the content displayed by the terminal device when performing the specified operation according to the screen image, and determine whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation. Alternatively, the monitoring system may display the screen image of the terminal device, so that the monitoring personnel can analyze whether the content displayed by the terminal device during the execution of the specified operation is illegal.
其中,监控系统上可以存储有预先制定的合规策略,该策略用于判断终端设备的操作所涉及的内容是否违规,以及对于违规的惩处。The monitoring system may store a pre-established compliance policy, which is used to determine whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation.
图3是本公开一实施例提供另一种终端设备的监控方法的流程图,该方法可以应用于监控系统,该监控系统可以是图1所示的监控系统200,参见图3,该方法包括: FIG. 3 is a flowchart of another method for monitoring a terminal device according to an embodiment of the present disclosure. The method may be applied to a monitoring system. The monitoring system may be the monitoring system 200 shown in FIG. 1. Referring to FIG. 3, the method includes :
步骤301,接收终端设备上传的屏幕图像,该屏幕图像是该终端设备监测到该终端设备执行指定操作时获取的该终端设备的屏幕图像,该屏幕图像中包含该终端设备在执行指定操作时显示的内容。Step 301: Receive a screen image uploaded by the terminal device, where the screen image is a screen image of the terminal device that is acquired when the terminal device detects the terminal device performing the specified operation, where the screen image includes the terminal device displaying when performing the specified operation. Content.
步骤302,根据屏幕图像获取该终端设备在执行指定操作时显示的内容,并判断该终端设备在执行指定操作时显示的内容中是否存在违规内容。Step 302: Acquire, according to the screen image, content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
或者,或者该监控系统也可以通过显示终端设备该屏幕图像,从而由可以监控人员来分析该终端设备在执行指定操作时显示的内容中是否存在违规内容。Alternatively, the monitoring system may also display the screen image of the terminal device, so that the monitoring personnel can analyze whether the content of the violation displayed by the terminal device during the execution of the specified operation is present.
或者,在另一种实现方式中,上述步骤302所示的方法也可以由终端设备在本地执行,因此,如图4所示的实施例:Alternatively, in another implementation manner, the method shown in step 302 above may also be performed locally by the terminal device. Therefore, the embodiment shown in FIG. 4:
图4是本公开另一实施例提供一种终端设备的监控方法的流程图,该方法可以应用于终端设备,该终端设备可以是图1所示的终端设备100,参见图4,该方法包括:FIG. 4 is a flowchart of a method for monitoring a terminal device according to another embodiment of the present disclosure. The method may be applied to a terminal device. The terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 4, the method includes :
步骤401,监控终端设备的操作状态。Step 401: Monitor an operation state of the terminal device.
步骤402,当监测到终端设备执行指定操作时获取该终端设备的屏幕图像,该屏幕图像中包含该终端设备在执行指定操作时显示的内容。Step 402: Acquire a screen image of the terminal device when the terminal device is configured to perform the specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation.
其中,步骤401和步骤402的内容与步骤201与步骤202的内容相同,不再赘述。The content of the steps 401 and 402 is the same as the content of the step 201 and the step 202, and details are not described herein again.
步骤403,根据屏幕图像获取该终端设备在执行指定操作时显示的内容,并判断该终端设备在执行指定操作时显示的内容中是否存在违规内容。Step 403: Acquire, according to the screen image, content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
在此实施方式中,在该终端设备上可以存储有预先制定的合规策略,该策略用于判断终端设备的操作所涉及的内容是否违规,以及对于违规的惩处。In this embodiment, a pre-established compliance policy may be stored on the terminal device, and the policy is used to determine whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation.
综上,本公开实施例提供的终端设备的监控方法,在终端设备监测到该终端设备在执行指定操作时,获取屏幕图像,从而可以得到包含该终端设备 在执行该操作时显示的内容的屏幕图像,而后上传至监控系统由监控系统对屏幕图像进行分析以获得该终端设备在执行该操作时显示的内容,从而判断该终端设备在执行该操作时显示的内容中是否存在违规内容,其中上述的对屏幕图像进行分析的过程也可以由终端设备在本地进行。由此可见,本公开能够解决现有的对于终端设备所执行操作涉及的内容不能实现有效监控的问题,实现了能够对终端设备的操作进行监控效果。In summary, the monitoring method of the terminal device provided by the embodiment of the present disclosure acquires a screen image when the terminal device detects that the terminal device performs a specified operation, so that the terminal device can be obtained. a screen image of the content displayed when the operation is performed, and then uploaded to the monitoring system, the screen image is analyzed by the monitoring system to obtain the content displayed by the terminal device when the operation is performed, thereby determining that the terminal device displays when performing the operation. Whether there is a violation content in the content, wherein the above process of analyzing the screen image can also be performed locally by the terminal device. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the monitoring effect on the operation of the terminal device.
图5是本公开又一实施例提供一种终端设备的监控方法的流程图,该方法可以应用于图1所示的实施环境,参见图5,该方法包括:FIG. 5 is a flowchart of a method for monitoring a terminal device according to another embodiment of the present disclosure. The method may be applied to the implementation environment shown in FIG. 1. Referring to FIG. 5, the method includes:
步骤501,终端设备监控终端设备的操作状态。Step 501: The terminal device monitors an operation state of the terminal device.
示例地,终端设备的操作状态,可以包括该终端设备在执行指定操作或未执行操作,该指定操作可以是用户在使用终端设备时在产生的任意操作,例如可以是唤醒屏幕、解锁、开启某一应用程序、打字、发送或者接收消息、保存等等。该指定操作可以由该终端设备的制造商,或者是该监控系统的管理者,或者是该终端的用户。其中,步骤501可以是实时进行的,也可以是基于监控系统发送的监控指令实现的。因此,在步骤501之前还可以包括:监控系统向终端设备发送监控指令,从而步骤501所述的监控终端设备的操作状态的步骤可以包括:终端设备接收监控系统发送的监控指令;该终端设备响应于监控指令,监控该终端设备的操作状态。这样的好处是不用一直对该终端设备进行监控,当监控系统确定有必要对该终端设备进行监控时下发监控指令,此时该终端设备再进行监控,可以降低该终端设备的进行监控时的功耗。For example, the operating state of the terminal device may include that the terminal device performs a specified operation or does not perform an operation, and the specified operation may be any operation generated by the user when using the terminal device, for example, may wake up the screen, unlock, and enable some An application, typing, sending or receiving messages, saving, and more. The specified operation may be by the manufacturer of the terminal device, or the manager of the monitoring system, or the user of the terminal. The step 501 may be performed in real time or may be implemented based on a monitoring instruction sent by the monitoring system. Therefore, before the step 501, the monitoring system may further include: the monitoring system sends a monitoring instruction to the terminal device, wherein the step of monitoring the operating state of the terminal device in step 501 may include: the terminal device receiving the monitoring instruction sent by the monitoring system; the terminal device responding Monitoring the operation status of the terminal device. The advantage is that the terminal device is not monitored all the time. When the monitoring system determines that it is necessary to monitor the terminal device, the monitoring command is sent. At this time, the terminal device performs monitoring again, which can reduce the work of the terminal device during monitoring. Consumption.
或者,步骤501也可以是基于某种监控策略实现的,例如可以是监测到终端设备运行某一指定应用程序后触发的,该监控策略可以由监控系统下发至终端设备,也可以预先设置在该终端设备中。因此,步骤501所述的终端 设备监控终端设备的操作状态的步骤可以包括:监控终端设备是否运行了指定应用程序;当监测到终端设备运行了指定应用程序时,监控终端设备的操作状态。例如,对于敏感部门而言,具有通信功能的应用程序容易泄密,所以该指定应用程序可以是具有通信功能的应用程序,比如短信、微信、QQ等即时通信应用程序、邮件类应用程序、社交平台类应用程序等等。这样的好处是不用一直对终端设备进行监控,当终端设备启动了上述的指定应用程序后再进行监控,可以降低终端设备的进行监控时的功耗。Alternatively, the step 501 may be implemented based on a certain monitoring policy, for example, it may be triggered after the terminal device runs a specified application, and the monitoring policy may be sent by the monitoring system to the terminal device, or may be preset in the terminal device. In the terminal device. Therefore, the terminal described in step 501 The step of the device monitoring the operating state of the terminal device may include: monitoring whether the terminal device runs the specified application program; and monitoring the operating state of the terminal device when the terminal device is monitored to run the specified application program. For example, for sensitive departments, communication-enabled applications are easy to leak, so the designated application can be a communication-enabled application, such as instant messaging applications such as SMS, WeChat, QQ, mail applications, and social platforms. Class applications and more. The advantage of this is that the terminal device is not monitored all the time. When the terminal device starts the above specified application program and then performs monitoring, the power consumption of the terminal device during monitoring can be reduced.
其中,监控终端设备的操作状态可以通过终端设备上安装的用于监控该终端设备操作的应用程序来实现,例如通过SDK在后台进行监控。The operating state of the monitoring terminal device can be implemented by an application installed on the terminal device for monitoring the operation of the terminal device, for example, monitoring in the background through an SDK.
步骤502,当监测到终端设备执行指定操作时获取该终端设备的屏幕图像,该屏幕图像中包含终端设备在执行指定操作时显示的内容。Step 502: Acquire a screen image of the terminal device when the terminal device is configured to perform the specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation.
其中,该指定操作可以是用户在使用终端设备时在产生的任意操作,例如可以是唤醒屏幕、解锁、开启某一应用程序、字符输入、发送或者接收消息、保存(消息、文件、图片等)、拍照等等,该指定操作可以由该终端设备的制造商,或者是该监控系统的管理者,或者是该终端的用户。The specified operation may be any operation generated by the user when using the terminal device, for example, may wake up the screen, unlock, open an application, input characters, send or receive messages, save (messages, files, pictures, etc.) The photographing operation, etc., may be performed by the manufacturer of the terminal device, or the manager of the monitoring system, or the user of the terminal.
因此,当监测到终端设备执行一操作时,可以判断是否为指定操作,当是指定操作时,获取该终端设备的屏幕图像。Therefore, when it is detected that the terminal device performs an operation, it can be determined whether it is a specified operation, and when it is a specified operation, a screen image of the terminal device is acquired.
因为并不是所有操作都是需要监控的,可以针对可能导致泄密的操作进行监控,例如向外发送信息的操作,因此该指定操作可以是发送消息。或者,可以根据终端设备所述用户的安全级别来设置指定操作,例如对于安全级别较低的用户,其所掌握的秘密信息较少,从而可以只监控该用户的终端设备的个别操作,例如为该用户的终端设备设置的指定操作可以是发送消息,对于安全级别中等的用户,可以监控该用户的终端设备的多个操作,例如为该用户的终端设备设置的指定操作可以包括:发送消息、接收消息、字符输入、拍照等。对于高安全级别的用户,可以监控该用户的终端设备的大多数操作 甚至全部操作。Since not all operations need to be monitored, it is possible to monitor operations that may result in compromise, such as an operation to send information out, so the specified operation may be to send a message. Alternatively, the specified operation may be set according to the security level of the user of the terminal device. For example, for a user with a lower security level, the secret information is less, so that only the individual operations of the user's terminal device may be monitored, for example, The specified operation of the terminal device setting of the user may be a sending message. For a user with a medium security level, multiple operations of the terminal device of the user may be monitored. For example, the specified operation set for the terminal device of the user may include: sending a message, Receive messages, character input, photo taking, etc. For users with high security levels, most operations of the user's terminal device can be monitored Even all operations.
步骤503,终端设备向监控系统上传屏幕图像。Step 503: The terminal device uploads a screen image to the monitoring system.
其中,终端设备向监控系统上传屏幕图像可以是在获得屏幕图像后立即上传,也可以先检测是否满足图像的上传条件,该上传条件可以是时间条件或者环境条件,时间条件例如可以是预设的一个或多个上传时间点,当到达上传时间点后,再将屏幕图像上传至监控系统;环境条件例如可以是当终端设备的网络连接为Wi-Fi时再进行上传。The uploading of the screen image to the monitoring system by the terminal device may be immediately after the screen image is obtained, or may be detected whether the image uploading condition is met, and the uploading condition may be a time condition or an environmental condition, and the time condition may be, for example, a preset. One or more uploading time points, when the uploading time point is reached, the screen image is uploaded to the monitoring system; the environmental condition may be, for example, uploading when the network connection of the terminal device is Wi-Fi.
步骤504,监控系统根据屏幕图像获取终端设备在执行指定操作时显示的内容。Step 504: The monitoring system acquires content displayed by the terminal device when performing the specified operation according to the screen image.
示例地,监控系统在接收到终端设备上传的屏幕图像后,可以通过图像识别技术对屏幕图像进行分析,获取屏幕图像中包含的终端设备在执行指定操作时显示的内容并进行存储,该图像识别技术例如可以是OCR(Optical Character Recognition,光学字符识别)技术。For example, after receiving the screen image uploaded by the terminal device, the monitoring system may analyze the screen image by using an image recognition technology, and acquire and store the content displayed by the terminal device included in the screen image when performing the specified operation, and the image recognition The technique may be, for example, OCR (Optical Character Recognition) technology.
步骤505,监控系统判断终端设备在执行指定操作时显示的内容中是否存在违规内容。Step 505: The monitoring system determines whether there is a violation content in the content displayed by the terminal device when performing the specified operation.
监控系统上可以存储有预先制定的合规策略,该策略用于判断终端设备的操作所涉及的内容是否违规,以及对于违规的惩处。例如,该合规策略种可以包括预先设置的违规内容,以及违规后的惩罚措施。A pre-established compliance policy can be stored on the monitoring system, which is used to determine whether the content involved in the operation of the terminal device is in violation, and the punishment for the violation. For example, the compliance policy can include pre-set violations and penalties after violations.
从而在获取屏幕图像中包含的终端设备在执行指定操作时显示的内容后,将终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比,当终端设备在执行指定操作时显示的内容中存在与预先设置的违规内容相匹配的内容时,确定终端设备在执行指定操作时显示的内容中存在违规内容。例如,预先设置的违规内容可以是预先设置的关键词,当终端设备在执行指定操作时显示的内容中存在与预先设置的关键词匹配的内容时,可以确定存在违规内容。 Therefore, after acquiring the content displayed by the terminal device in the screen image when performing the specified operation, the content displayed by the terminal device when performing the specified operation is compared with the previously set violation content, and is displayed when the terminal device performs the specified operation. When there is content matching the pre-set violation content in the content, it is determined that there is a violation content in the content displayed by the terminal device when performing the specified operation. For example, the pre-set violation content may be a keyword set in advance, and when there is content matching the preset keyword among the content displayed by the terminal device when performing the specified operation, it may be determined that the violation content exists.
由此可见,通过上述方法,可以对终端设备的操作进行监控,能够获取并判断终端设备所涉及的内容是否存在违规内容。通过此方法,无论操作过程中所涉及的内容是否加密,均可以从屏幕图像中解析出来,本公开能够解决现有的对于终端设备所执行操作涉及的内容不能实现有效监控的问题,实现了能够对终端设备的操作进行监控效果。并且进一步的,在确定终端设备在执行指定操作时显示的内容中存在违规内容之后,还可以通过以下步骤对违规的终端设备进行惩处。It can be seen that, through the above method, the operation of the terminal device can be monitored, and the content involved in the terminal device can be obtained and judged whether there is a violation content. Through this method, whether the content involved in the operation process is encrypted or not can be parsed from the screen image, and the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the problem. Monitor the operation of the terminal device. Further, after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, the following terminal device may also be punished.
步骤506,监控系统向终端设备发送警告信息,警告信息用于通知用户指定操作涉及违规内容。终端在接收到警告信息后即可显示该警告信息。Step 506: The monitoring system sends a warning message to the terminal device, where the warning information is used to notify the user that the specified operation involves the content of the violation. The terminal can display the warning message after receiving the warning message.
例如,告警信息可以为“您当前的操作涉及违规内容,请立即停止”。以便警告当前用户停止违规操作。上述的告警信息的内容仅为示例性的,不以此为限定。For example, the alarm information can be "Your current operation involves illegal content, please stop immediately." In order to warn the current user to stop the violation. The content of the foregoing alarm information is merely exemplary and is not limited thereto.
或者,还可以在确定终端设备在执行指定操作时显示的内容中存在违规内容之后执行步骤507(图5中以虚线表示)。当然,也可以先执行步骤506所述的监控系统向终端设备发送警告信息,如果警告无效,例如在发送警告信息之后确定该终端设备再次进行了违规操作,则可以进行步骤507。Alternatively, step 507 (indicated by a broken line in FIG. 5) may be performed after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation. Of course, the monitoring system described in step 506 may be first sent to the terminal device to send warning information. If the warning is invalid, for example, after the warning information is sent, it is determined that the terminal device has performed the violation operation again, and then step 507 may be performed.
或者,监控系统可以向终端设备发送警告指令,终端设备在接收到警告指令后,显示警告信息。Alternatively, the monitoring system may send a warning instruction to the terminal device, and the terminal device displays the warning message after receiving the warning instruction.
步骤507,监控系统向终端设备发送锁定指令,锁定指令用于指示将终端设备的指定功能锁定。Step 507: The monitoring system sends a locking instruction to the terminal device, where the locking instruction is used to indicate that the designated function of the terminal device is locked.
示例地,将终端设备的指定功能锁定例如可以包括以下至少一种:将终端设备的通话功能锁定、将终端设备的短信功能锁定、将终端设备的上网功能锁定、将整个终端设备锁定等等。For example, locking the designated function of the terminal device may include, for example, at least one of locking the call function of the terminal device, locking the short message function of the terminal device, locking the Internet access function of the terminal device, locking the entire terminal device, and the like.
综上,本公开实施例提供的终端设备的监控方法,在终端设备监测到该终端设备在执行指定操作时,获取屏幕图像,从而可以得到包含该终端设备 在执行该操作时显示的内容的屏幕图像,而后上传至监控系统由监控系统对屏幕图像进行分析以获得该终端设备在执行该操作时显示的内容,从而判断该终端设备在执行该操作时显示的内容中是否存在违规内容。由此可见,本公开能够解决现有的对于终端设备所执行操作涉及的内容不能实现有效监控的问题,实现了能够对终端设备的操作进行监控效果。In summary, the monitoring method of the terminal device provided by the embodiment of the present disclosure acquires a screen image when the terminal device detects that the terminal device performs a specified operation, so that the terminal device can be obtained. a screen image of the content displayed when the operation is performed, and then uploaded to the monitoring system, the screen image is analyzed by the monitoring system to obtain the content displayed by the terminal device when the operation is performed, thereby determining that the terminal device displays when performing the operation. Whether there is a violation in the content. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the monitoring effect on the operation of the terminal device.
在另一种实现方式中,可以由终端设备来进行分析屏幕图像的过程,如图6所示,图6是本公开又一实施例提供另一种终端设备的监控方法的流程图,该方法可以应用于图1所示的实施环境,参见图6,该方法包括:In another implementation manner, a process of analyzing a screen image may be performed by a terminal device, as shown in FIG. 6. FIG. 6 is a flowchart of another method for monitoring a terminal device according to another embodiment of the present disclosure. Can be applied to the implementation environment shown in Figure 1, see Figure 6, the method includes:
步骤601、终端设备监控终端设备的操作状态。Step 601: The terminal device monitors an operation state of the terminal device.
步骤602、终端设备当监测到终端设备执行指定操作时获取该终端设备的屏幕图像,该屏幕图像中包含终端设备在执行指定操作时显示的内容。Step 602: The terminal device acquires a screen image of the terminal device when the terminal device performs the specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation.
其中,步骤601~602的方法与步骤501~502所描述的方法相同,可参照步骤501~502,不再赘述。The methods of steps 601-602 are the same as those described in steps 501-502, and reference may be made to steps 501-502, and details are not described herein.
步骤603、终端设备根据屏幕图像获取终端设备在执行指定操作时显示的内容。Step 603: The terminal device acquires content displayed by the terminal device when performing the specified operation according to the screen image.
步骤604、终端设备判断终端设备在执行指定操作时显示的内容中是否存在违规内容。Step 604: The terminal device determines whether there is a violation content in the content displayed by the terminal device when performing the specified operation.
其中,步骤603~604的方法除了执行过程由终端设备执行之外,其采用的方法与步骤504~505所描述的方法相同,可参照步骤504~505,不再赘述。The method of the steps 603-604 is the same as the method described in the steps 504-505 except that the execution process is performed by the terminal device, and the steps 504-505 can be referred to, and details are not described herein.
进一步的,在确定终端设备在执行指定操作时显示的内容中存在违规内容之后,还可以通过以下步骤对违规的终端设备进行惩处。Further, after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, the following terminal device may also be punished by the following steps.
步骤605,终端设备生成警告信息。In step 605, the terminal device generates warning information.
步骤607,终端设备显示警告信息,警告信息用于通知用户所述指定操作涉及违规内容。 Step 607: The terminal device displays a warning message, and the warning information is used to notify the user that the specified operation involves the content of the violation.
例如,告警信息可以为“您当前的操作涉及违规内容,请立即停止”。以便警告当前用户停止违规操作。上述的告警信息的内容仅为示例性的,不以此为限定。For example, the alarm information can be "Your current operation involves illegal content, please stop immediately." In order to warn the current user to stop the violation. The content of the foregoing alarm information is merely exemplary and is not limited thereto.
或者,或者,还可以在确定终端设备在执行指定操作时显示的内容中存在违规内容之后执行步骤608~609(图6中以虚线表示)。当然,也可以先执行步骤606~607所述的生成并显示警告信息,如果警告无效,例如在显示警告信息之后确定该终端设备再次进行了违规操作,则可以进行步骤608~609。Alternatively, or alternatively, steps 608 to 609 (indicated by a broken line in FIG. 6) may be performed after determining that there is a violation content in the content displayed by the terminal device when performing the specified operation. Of course, the generation of the warning information described in steps 606-607 may be performed first, and if the warning is invalid, for example, after the warning information is displayed, it is determined that the terminal device has performed the violation operation again, and steps 608-609 may be performed.
步骤608,终端设备生成锁定指令,锁定指令用于指示将终端设备的指定功能锁定。Step 608: The terminal device generates a lock instruction, where the lock command is used to indicate that the designated function of the terminal device is locked.
步骤609,终端设备响应于锁定指令,将指定功能进行锁定。Step 609: The terminal device locks the designated function in response to the lock instruction.
示例地,将终端设备的指定功能锁定例如可以包括以下至少一种:将终端设备的通话功能锁定、将终端设备的短信功能锁定、将终端设备的上网功能锁定、将整个终端设备锁定等等。For example, locking the designated function of the terminal device may include, for example, at least one of locking the call function of the terminal device, locking the short message function of the terminal device, locking the Internet access function of the terminal device, locking the entire terminal device, and the like.
综上,本公开实施例提供的终端设备的监控方法,终端设备监测到该终端设备在执行指定操作时,获取屏幕图像,从而可以对屏幕图像进行分析以获得该终端设备在执行该操作时显示的内容,并判断该终端设备在执行该操作时显示的内容中是否存在违规内容。由此可见,本公开能够解决现有的对于终端设备所执行操作涉及的内容不能实现有效监控的问题,实现了能够对终端设备的操作进行监控效果。In summary, the monitoring method of the terminal device provided by the embodiment of the present disclosure, the terminal device detects that the terminal device acquires a screen image when performing the specified operation, so that the screen image can be analyzed to obtain the terminal device displaying when performing the operation. Content, and determine whether there is a violation content in the content displayed by the terminal device when performing the operation. It can be seen that the present disclosure can solve the problem that the existing content related to the operation performed by the terminal device cannot be effectively monitored, and realizes the monitoring effect on the operation of the terminal device.
图7是本公开一实施例提供的一种终端设备的监控装置的框图,该装置700可以应用于终端设备,可以用于执行图2或图5所示的方法,该装置700可以通过软件或者硬件或者二者结合的形式构成终端设备的部分或者全部,该终端设备可以是图1所示的终端设备100,参见图7,该装置700可以包括: FIG. 7 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure. The device 700 may be applied to a terminal device, and may be used to execute the method shown in FIG. 2 or FIG. 5. The device 700 may be implemented by software or The hardware or a combination of the two forms part or all of the terminal device. The terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 7, the device 700 may include:
监控模块710,用于监控终端设备的操作状态;The monitoring module 710 is configured to monitor an operation state of the terminal device.
图像获取模块720,用于当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;The image acquisition module 720 is configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
上传模块730,用于向监控系统上传所述屏幕图像。The uploading module 730 is configured to upload the screen image to the monitoring system.
可选的,屏幕图像用于所述监控系统根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容;或者,所述屏幕图像用于所述监控系统通过显示终端设备显示所述屏幕图像。Optionally, the screen image is used by the monitoring system to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation. Or the screen image is used by the monitoring system to display the screen image through the display terminal device.
可选的,该监控模块710用于:Optionally, the monitoring module 710 is configured to:
接收所述监控系统发送的监控指令;Receiving a monitoring instruction sent by the monitoring system;
响应于所述监控指令,监控所述终端设备的操作状态。The operating state of the terminal device is monitored in response to the monitoring instruction.
或者,可选的,该监控模块710用于:Alternatively, the monitoring module 710 is configured to:
监控所述终端设备是否运行了指定应用程序;Monitoring whether the terminal device runs a specified application;
当监测到所述终端设备运行了所述指定应用程序时,监控所述终端设备的操作状态。When it is detected that the terminal device runs the specified application, the operating state of the terminal device is monitored.
可选的,图8是本公开一实施例提供的另一种终端设备的监控装置的框图,参见图8,在图7的基础上,该装置700还包括:Optionally, FIG. 8 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure. Referring to FIG. 8, on the basis of FIG. 7, the apparatus 700 further includes:
接收模块740,用于接收所述监控系统发送的警告信息;The receiving module 740 is configured to receive warning information sent by the monitoring system;
显示模块750,用于显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。The display module 750 is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the offending content.
或者接收模块740,还用于接收所述监控系统发送的警告指令;Or receiving module 740, configured to receive a warning instruction sent by the monitoring system;
响应于所述警告指令750,还用于显示所述警告信息。In response to the warning instruction 750, the warning information is also displayed.
可选的,图9是本公开一实施例提供的又一种终端设备的监控装置的框图,参见图9,在图8的基础上,装置700还包括: Optionally, FIG. 9 is a block diagram of still another monitoring device of the terminal device according to an embodiment of the present disclosure. Referring to FIG. 9, on the basis of FIG. 8, the device 700 further includes:
指令接收模块760,用于接收所述监控系统发送的锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;The instruction receiving module 760 is configured to receive a locking instruction sent by the monitoring system, where the locking instruction is used to indicate that the designated function of the terminal device is locked;
管理模块770,用于响应于所述锁定指令,将所述指定功能进行锁定。The management module 770 is configured to lock the designated function in response to the locking instruction.
图10是本公开一实施例提供的一种终端设备的监控装置的框图,该装置1000可以应用于监控系统,可以用于执行图3或图5所示的方法,该装置1000可以通过软件或者硬件或者二者结合的形式构成服务器的部分或者全部,该服务器可以是图1所示的监控系统200,参见图10,该装置1000可以包括:FIG. 10 is a block diagram of a monitoring apparatus for a terminal device according to an embodiment of the present disclosure. The device 1000 can be applied to a monitoring system, and can be used to execute the method shown in FIG. 3 or FIG. 5. The device 1000 can be implemented by software or The hardware or a combination of the two forms part or all of the server. The server may be the monitoring system 200 shown in FIG. 1. Referring to FIG. 10, the device 1000 may include:
接收模块1010,用于接收终端设备上传的屏幕图像,所述屏幕图像是所述终端设备监测到所述终端设备执行指定操作时进行截屏得到的图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;The receiving module 1010 is configured to receive a screen image uploaded by the terminal device, where the screen image is an image obtained by the terminal device when the terminal device performs a specified operation, and the screen image includes the terminal device What is displayed when the specified operation is performed;
分析模块1020,用于根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。The analysis module 1020 is configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
可选的,图11是图10所示实施例示出的一种分析模块的框图,参见图11,该分析模块1020包括:Optionally, FIG. 11 is a block diagram of an analysis module shown in the embodiment shown in FIG. 10. Referring to FIG. 11, the analysis module 1020 includes:
图像识别子模块1021,用于利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;The image recognition sub-module 1021 is configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
内容分析子模块1022,用于将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;The content analysis sub-module 1022 is configured to compare the content displayed by the terminal device when performing the specified operation with the content of the violation set in advance;
确定子模块1023,用于当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。 a determining sub-module 1023, configured to determine, when the terminal device has content that matches the preset violation content in the content displayed when the specified operation is performed, determine the content displayed by the terminal device when performing the specified operation There is a violation of the content.
可选的,图12是本公开一实施例提供的另一种终端设备的监控装置的框图,参见图12,该装置1000还包括:警告模块1030,用于:Optionally, FIG. 12 is a block diagram of another monitoring device of a terminal device according to an embodiment of the present disclosure. Referring to FIG. 12, the device 1000 further includes: a warning module 1030, configured to:
在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,向所述终端设备发送警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,向所述终端设备发送警告指令,所述警告指令用于所述终端设备根据所述警告指令显示所述警告信息。After determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, sending the warning information to the terminal device, the warning information being used to notify the user that the specified operation involves the offending content; or The terminal device transmits a warning command for the terminal device to display the warning information according to the warning instruction.
可选的,图13是本公开一实施例提供的另一种终端设备的监控装置的框图,参见图13,该装置1000还包括:Optionally, FIG. 13 is a block diagram of another monitoring apparatus for a terminal device according to an embodiment of the present disclosure. Referring to FIG. 13, the device 1000 further includes:
锁定模块1040,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,向所述终端设备发送锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定。The locking module 1040 is configured to send a lock instruction to the terminal device after determining that the content is violated in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate the designated function of the terminal device locking.
图14是本公开一实施例提供的一种终端设备的监控装置的框图,该装置1400可以应用于终端设备,可以用于执行图4或图6所示的方法,该装置1400可以通过软件或者硬件或者二者结合的形式构成终端设备的部分或者全部,该终端设备可以是图1所示的终端设备100,参见图14,该装置1400可以包括:FIG. 14 is a block diagram of a monitoring apparatus of a terminal device according to an embodiment of the present disclosure. The device 1400 may be applied to a terminal device, and may be used to execute the method shown in FIG. 4 or FIG. The hardware or a combination of the two forms part or all of the terminal device. The terminal device may be the terminal device 100 shown in FIG. 1. Referring to FIG. 14, the device 1400 may include:
监控模块1410,用于监控终端设备的操作状态;The monitoring module 1410 is configured to monitor an operating state of the terminal device.
图像获取模块1420,用于当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;The image acquisition module 1420 is configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
分析模块1430,用于根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。The analyzing module 1430 is configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
可选的,图15是图14所示实施例示出的一种分析模块的框图,参见图 15,所述分析模块1430包括:Optionally, FIG. 15 is a block diagram of an analysis module shown in the embodiment shown in FIG. 15. The analysis module 1430 includes:
图像识别子模块1431,用于利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;The image recognition sub-module 1431 is configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
内容分析子模块1432,用于将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;The content analysis sub-module 1432 is configured to compare the content displayed by the terminal device when performing the specified operation with the content of the violation set in advance;
确定子模块1433,用于当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。Determining a sub-module 1433 for determining, when the content displayed by the terminal device matches the pre-set violation content in the content displayed when the specified operation is performed, determining the content displayed by the terminal device when performing the specified operation There is a violation of the content.
可选的,图16是本公开一实施例提供的另一种终端设备的监控装置的框图,参见图16,该装置1400还包括:Optionally, FIG. 16 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure. Referring to FIG. 16, the device 1400 further includes:
信息生成模块1440,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,生成警告信息;The information generating module 1440 is configured to generate warning information after determining that the content is violated in the content displayed by the terminal device when performing the specified operation;
警告模块1450,用于显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。The warning module 1450 is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the offending content.
可选的,图17是本公开一实施例提供的另一种终端设备的监控装置的框图,参见图17,该装置1400还包括:Optionally, FIG. 17 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure. Referring to FIG. 17, the device 1400 further includes:
指令生成模块1460,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,生成锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;The instruction generating module 1460 is configured to generate a lock instruction, after the determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate that the specified function of the terminal device is locked;
锁定模块1470,用于响应于所述锁定指令,将所述指定功能进行锁定。The locking module 1470 is configured to lock the designated function in response to the locking instruction.
综上,本公开实施例提供的终端设备的监控装置,终端设备监测到该终端设备在执行指定操作时,获取屏幕图像,从而可以对屏幕图像进行分析以获得该终端设备在执行该操作时显示的内容,并判断该终端设备在执行该操作时显示的内容中是否存在违规内容。由此可见,本公开能够解决现有的对 于终端设备所执行操作涉及的内容不能实现有效监控的问题,实现了能够对终端设备的操作进行监控效果。In summary, the monitoring device of the terminal device provided by the embodiment of the present disclosure detects that the terminal device acquires a screen image when performing the specified operation, so that the screen image can be analyzed to obtain that the terminal device displays when performing the operation. Content, and determine whether there is a violation content in the content displayed by the terminal device when performing the operation. It can be seen that the present disclosure can solve the existing pair The content involved in the operation performed by the terminal device cannot implement effective monitoring, and the monitoring effect of the operation of the terminal device can be realized.
图18是本公开一实施例提供的另一种终端设备的监控装置的框图,该装置1800可以是终端设备,如图18所示,该装置1800可以包括:处理器1801,存储器1802,多媒体组件1803,输入/输出(I/O)接口1804,以及通信组件1805。FIG. 18 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure. The device 1800 may be a terminal device. As shown in FIG. 18, the device 1800 may include: a processor 1801, a memory 1802, and a multimedia component. 1803, an input/output (I/O) interface 1804, and a communication component 1805.
其中,处理器1801用于控制该装置1800的整体操作,以完成上述图2、图3、图4或图6所示的终端设备的监控方法的全部或部分步骤。存储器1802用于存储各种类型的数据以支持在该装置1800的操作,这些数据的例如可以包括用于在该装置1800上操作的任何应用程序或方法的指令,以及应用程序相关的数据,例如联系人数据、收发的消息、图片、音频、视频等等。该存储器1802可以由任何类型的易失性或非易失性存储终端设备或者它们的组合实现,例如静态随机存取存储器(Static Random Access Memory,简称SRAM),电可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,简称EEPROM),可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,简称EPROM),可编程只读存储器(Programmable Read-Only Memory,简称PROM),只读存储器(Read-Only Memory,简称ROM),磁存储器,快闪存储器,磁盘或光盘。多媒体组件1803可以包括屏幕和音频组件。其中屏幕例如可以是触摸屏,音频组件用于输出和/或输入音频信号。例如,音频组件可以包括一个麦克风,麦克风用于接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1802或通过通信组件1805发送。音频组件还包括至少一个扬声器,用于输出音频信号。I/O接口1804为处理器1801和其他接口模块之间提供接口,上述其他接口模块可以是键盘,鼠标,按钮等。这些按钮可以是虚拟按钮或者实体 按钮。通信组件1805用于该装置1800与其他终端设备之间进行有线或无线通信。无线通信,例如Wi-Fi,蓝牙,近场通信(Near Field Communication,简称NFC),2G、3G或4G,或它们中的一种或几种的组合,因此相应的该通信组件1805可以包括:Wi-Fi模块,蓝牙模块,NFC模块。The processor 1801 is configured to control the overall operation of the device 1800 to complete all or part of the steps of the monitoring method of the terminal device shown in FIG. 2, FIG. 3, FIG. 4 or FIG. Memory 1802 is used to store various types of data to support operations at the device 1800, such as may include instructions for any application or method operating on the device 1800, as well as application related data, such as Contact data, sent and received messages, pictures, audio, video, and more. The memory 1802 can be implemented by any type of volatile or non-volatile storage terminal device or a combination thereof, such as Static Random Access Memory (SRAM), electrically erasable programmable read only memory. (Electrically Erasable Programmable Read-Only Memory, EEPROM for short), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM) Read-Only Memory (ROM), magnetic memory, flash memory, disk or optical disk. The multimedia component 1803 can include a screen and audio components. The screen may be, for example, a touch screen, and the audio component is used to output and/or input an audio signal. For example, the audio component can include a microphone for receiving an external audio signal. The received audio signal may be further stored in memory 1802 or transmitted via communication component 1805. The audio component also includes at least one speaker for outputting an audio signal. The I/O interface 1804 provides an interface between the processor 1801 and other interface modules, such as a keyboard, a mouse, a button, and the like. These buttons can be virtual buttons or entities Button. Communication component 1805 is used for wired or wireless communication between the device 1800 and other terminal devices. Wireless communication, such as Wi-Fi, Bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so the corresponding communication component 1805 can include: Wi-Fi module, Bluetooth module, NFC module.
在一示例性实施例中,装置1800可以被一个或多个应用专用集成电路(Application Specific Integrated Circuit,简称ASIC)、数字信号处理器(Digital Signal Processor,简称DSP)、数字信号处理终端设备(Digital Signal Processing Device,简称DSPD)、可编程逻辑器件(Programmable Logic Device,简称PLD)、现场可编程门阵列(Field Programmable Gate Array,简称FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述的终端设备的监控方法。In an exemplary embodiment, the device 1800 may be configured by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and digital signal processing terminals (Digital). Signal Processing Device (DSPD), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), controller, microcontroller, microprocessor or other electronic components Implemented to perform the monitoring method of the terminal device described above.
在另一示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1802,上述指令可由装置1800的处理器1801执行以完成上述的终端设备的监控方法。示例地,该非临时性计算机可读存储介质可以是ROM、随机存取存储器(Random Access Memory,简称RAM)、CD-ROM、磁带、软盘和光数据存储终端设备等。In another exemplary embodiment, there is also provided a non-transitory computer readable storage medium comprising instructions, such as a memory 1802 comprising instructions executable by processor 1801 of apparatus 1800 to perform the terminal device described above Monitoring method. By way of example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, and an optical data storage terminal device.
图19是本公开一实施例提供的另一种终端设备的监控装置的框图,该装置1900可以是监控系统,该监控系统可以是一个服务器,由若干台服务器组成的服务器集群,或者可以是一个云计算服务中心。参照图19,装置1900包括处理器1901、存储器1902、I/O接口1903以及网络接口1904,其中该存储器1902可以用于存储可由处理器1901的执行的指令,处理器1902可以执行这些指令,以执行上述的图3或图5所示的终端设备的监控方法。另外,该装置1900可以操作基于存储在存储器1902的操作系统进行,该操作系统包括但不限于Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等。 FIG. 19 is a block diagram of another monitoring apparatus of a terminal device according to an embodiment of the present disclosure. The device 1900 may be a monitoring system, and the monitoring system may be a server, a server cluster composed of several servers, or may be a Cloud Computing Service Center. Referring to Figure 19, apparatus 1900 includes a processor 1901, a memory 1902, an I/O interface 1903, and a network interface 1904, where the memory 1902 can be used to store instructions executable by the processor 1901, which the processor 1902 can execute to The monitoring method of the terminal device shown in FIG. 3 or FIG. 5 described above is executed. Additionally, the apparatus 1900 can operate based on an operating system stored in the memory 1902, including but not limited to Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
本公开实施例还提供一种监控系统,该监控系统可以包括至少一个终端设备;以及监控系统;The embodiment of the present disclosure further provides a monitoring system, which may include at least one terminal device; and a monitoring system;
其中,每个终端设备中可以包括上述的终端设备的监控装置1800,监控系统可以包括上述的终端设备的监控装置1900。The monitoring device 1800 of the foregoing terminal device may be included in each terminal device, and the monitoring system may include the monitoring device 1900 of the terminal device described above.
本公开一实施例还提供一种非临时性计算机可读存储介质,提供一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行一种终端设备的监控方法,该方法包括:An embodiment of the present disclosure further provides a non-transitory computer readable storage medium, comprising: a non-transitory computer readable storage medium, wherein the non-transitory computer readable storage medium includes one or more programs, One or more programs for performing a monitoring method of a terminal device, the method comprising:
监控所述终端设备的操作状态;当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行所述指定操作时显示的内容;向监控系统上传所述屏幕图像。Monitoring a working state of the terminal device; acquiring a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing the specified operation; Upload the screen image to the monitoring system.
可选的,所述屏幕图像用于所述监控系统根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容;或者,所述屏幕图像用于所述监控系统通过显示终端设备显示所述屏幕图像。Optionally, the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine whether the content displayed by the terminal device when performing the specified operation exists. The violation content; or the screen image is used by the monitoring system to display the screen image through the display terminal device.
可选的,所述监控所述终端设备的操作状态包括:Optionally, the monitoring the operating status of the terminal device includes:
接收所述监控系统发送的监控指令;响应于所述监控指令,监控所述终端设备的操作状态。Receiving a monitoring instruction sent by the monitoring system; and monitoring an operating state of the terminal device in response to the monitoring instruction.
可选的,所述监控所述终端设备的操作状态包括:Optionally, the monitoring the operating status of the terminal device includes:
监控所述终端设备是否运行了指定应用程序;当监测到所述终端设备运行了所述指定应用程序时,监控所述终端设备的操作状态。Monitoring whether the terminal device runs the specified application; and when detecting that the terminal device runs the specified application, monitoring an operation state of the terminal device.
可选的,所述方法还包括:Optionally, the method further includes:
接收所述监控系统发送的警告信息;显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者, Receiving warning information sent by the monitoring system; displaying the warning information, the warning information is used to notify a user that the specified operation involves illegal content; or
接收所述监控系统发送的警告指令;响应于所述警告指令,显示所述警告信息。Receiving a warning instruction sent by the monitoring system; displaying the warning information in response to the warning instruction.
可选的,所述方法还包括:Optionally, the method further includes:
接收所述监控系统发送的锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;响应于所述锁定指令,将所述指定功能进行锁定。Receiving a lock instruction sent by the monitoring system, the lock instruction is used to indicate that a specified function of the terminal device is locked; and the specified function is locked in response to the lock instruction.
或者,所述一个或多个程序可以用于执行另一种终端设备的监控方法,该方法包括:Alternatively, the one or more programs may be used to perform another monitoring method of the terminal device, and the method includes:
监控所述终端设备的操作状态;当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。Monitoring an operation state of the terminal device; acquiring a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation; The screen image acquires content displayed by the terminal device when performing the specified operation, and determines whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
可选的,所述根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,以判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容包括:Optionally, the acquiring, according to the screen image, the content that is displayed when the terminal device performs the specified operation, to determine whether the content of the violation is displayed in the content that is displayed when the terminal device performs the specified operation includes:
利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。And analyzing the screen image by using an image recognition technology, and acquiring content displayed by the terminal device in performing the specified operation included in the screen image; and displaying the content displayed by the terminal device when performing the specified operation and the preset Comparing the content of the violation; when there is content matching the content of the preset violation in the content displayed by the terminal device when performing the specified operation, determining that the terminal device has a violation in the content displayed when performing the specified operation content.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:Optionally, after determining that the content is displayed in the content that is displayed when the terminal device performs the specified operation, the method further includes:
生成警告信息;显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。Generating a warning message; displaying the warning message for notifying the user that the specified operation involves a violation of the content.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规 内容之后,所述方法还包括:Optionally, there is a violation in the content that is displayed when the terminal device performs the specified operation. After the content, the method further includes:
生成锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;响应于所述锁定指令,将所述指定功能进行锁定。Generating a lock instruction for indicating that the specified function of the terminal device is locked; in response to the lock instruction, the specified function is locked.
本公开一实施例还提供一种终端设备,所述终端设备包括:An embodiment of the present disclosure further provides a terminal device, where the terminal device includes:
上述的非临时性计算机可读存储介质;以及The non-transitory computer readable storage medium described above;
一个或者多个处理器,用于执行上述的非临时性计算机可读存储介质中的程序。One or more processors for executing the programs in the non-transitory computer readable storage medium described above.
本公开一实施例还提供另一种非临时性计算机可读存储介质,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行一种终端设备的监控方法,该方法包括:An embodiment of the present disclosure further provides another non-transitory computer readable storage medium including one or more programs for executing a terminal Device monitoring method, the method includes:
接收终端设备上传的所述终端设备的屏幕图像,所述屏幕图像是所述终端设备监测到所述终端设备执行指定操作时获取的,所述屏幕图像中包含所述终端设备在执行所述指定操作时显示的内容;根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。Receiving a screen image of the terminal device uploaded by the terminal device, where the screen image is acquired when the terminal device detects that the terminal device performs a specified operation, and the screen image includes the terminal device performing the designation Content displayed during operation; acquiring content displayed by the terminal device when performing the specified operation according to the screen image, and determining whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
可选的,所述根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容包括:Optionally, the obtaining, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determining whether the content of the violation is included in the content that is displayed when the terminal device performs the specified operation includes:
利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。And analyzing the screen image by using an image recognition technology, and acquiring content displayed by the terminal device in performing the specified operation included in the screen image; and displaying the content displayed by the terminal device when performing the specified operation and the preset Comparing the content of the violation; when there is content matching the content of the preset violation in the content displayed by the terminal device when performing the specified operation, determining that the terminal device has a violation in the content displayed when performing the specified operation content.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规 内容之后,所述方法还包括:Optionally, there is a violation in the content that is displayed when the terminal device performs the specified operation. After the content, the method further includes:
向所述终端设备发送警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,向所述终端设备发送警告指令,所述警告指令用于所述终端设备根据所述警告指令显示所述警告信息。Sending warning information to the terminal device, the warning information is used to notify the user that the specified operation involves the offending content; or sending a warning instruction to the terminal device, the warning instruction being used by the terminal device according to the warning The instruction displays the warning message.
可选的,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:Optionally, after determining that the content is displayed in the content that is displayed when the terminal device performs the specified operation, the method further includes:
向所述终端设备发送锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定。And sending a lock instruction to the terminal device, the lock instruction being used to indicate that the specified function of the terminal device is locked.
本公开一实施例还提供一种监控系统,所述监控系统包括:An embodiment of the present disclosure further provides a monitoring system, where the monitoring system includes:
上述的另一种非临时性计算机可读存储介质;以及Another non-transitory computer readable storage medium as described above;
一个或者多个处理器,用于执行上述的另一种非临时性计算机可读存储介质中的程序。One or more processors for executing a program in another non-transitory computer readable storage medium as described above.
以上结合附图详细描述了本公开的优选实施方式,但是,本公开并不限于上述实施方式中的具体细节,在本公开的技术构思范围内,可以对本公开的技术方案进行多种简单变型,这些简单变型均属于本公开的保护范围。The preferred embodiments of the present disclosure have been described in detail above with reference to the accompanying drawings. However, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications can be made to the technical solutions of the present disclosure within the scope of the technical idea of the present disclosure. These simple variations are all within the scope of the disclosure.
另外需要说明的是,在上述具体实施方式中所描述的各个具体技术特征,在不矛盾的情况下,可以通过任何合适的方式进行组合,为了避免不必要的重复,本公开对各种可能的组合方式不再另行说明。It should be further noted that the specific technical features described in the above specific embodiments may be combined in any suitable manner without contradiction. In order to avoid unnecessary repetition, the present disclosure is applicable to various possibilities. The combination method will not be described separately.
此外,本公开的各种不同的实施方式之间也可以进行任意组合,只要其不违背本公开的思想,其同样应当视为本公开所公开的内容。 In addition, any combination of various embodiments of the present disclosure may be made as long as it does not deviate from the idea of the present disclosure, and should also be regarded as the disclosure of the present disclosure.

Claims (32)

  1. 一种终端设备的监控方法,其特征在于,应用于终端设备,所述方法包括:A method for monitoring a terminal device, which is characterized in that it is applied to a terminal device, and the method includes:
    监控所述终端设备的操作状态;Monitoring an operation state of the terminal device;
    当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行所述指定操作时显示的内容;Obtaining, when the terminal device performs the specified operation, a screen image of the terminal device, where the screen image includes content displayed by the terminal device when performing the specified operation;
    向监控系统上传所述屏幕图像。Upload the screen image to the monitoring system.
  2. 根据权利要求1所述的方法,其特征在于,所述屏幕图像用于所述监控系统根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容;或者,所述屏幕图像用于所述监控系统通过显示终端设备显示所述屏幕图像。The method according to claim 1, wherein the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine that the terminal device is executing Specifying whether there is a violation content in the content displayed during the operation; or, the screen image is used by the monitoring system to display the screen image through the display terminal device.
  3. 根据权利要求1所述的方法,其特征在于,所述监控所述终端设备的操作状态包括:The method according to claim 1, wherein the monitoring the operating state of the terminal device comprises:
    接收所述监控系统发送的监控指令;Receiving a monitoring instruction sent by the monitoring system;
    响应于所述监控指令,监控所述终端设备的操作状态。The operating state of the terminal device is monitored in response to the monitoring instruction.
  4. 根据权利要求1所述的方法,其特征在于,所述监控所述终端设备的操作状态包括:The method according to claim 1, wherein the monitoring the operating state of the terminal device comprises:
    监控所述终端设备是否运行了指定应用程序;Monitoring whether the terminal device runs a specified application;
    当监测到所述终端设备运行了所述指定应用程序时,监控所述终端设备的操作状态。 When it is detected that the terminal device runs the specified application, the operating state of the terminal device is monitored.
  5. 根据权利要求1-4任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    接收所述监控系统发送的警告信息;Receiving warning information sent by the monitoring system;
    显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,Displaying the warning information, the warning information is used to notify the user that the specified operation involves the offending content; or
    接收所述监控系统发送的警告指令;Receiving a warning instruction sent by the monitoring system;
    响应于所述警告指令,显示所述警告信息。The warning information is displayed in response to the warning instruction.
  6. 根据权利要求1-4任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    接收所述监控系统发送的锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;Receiving a lock instruction sent by the monitoring system, where the lock instruction is used to indicate that a specified function of the terminal device is locked;
    响应于所述锁定指令,将所述指定功能进行锁定。The specified function is locked in response to the lock instruction.
  7. 一种终端设备的监控方法,其特征在于,应用于监控系统,所述方法包括:A monitoring method for a terminal device is characterized in that it is applied to a monitoring system, and the method includes:
    接收终端设备上传的所述终端设备的屏幕图像,所述屏幕图像是所述终端设备监测到所述终端设备执行指定操作时获取的,所述屏幕图像中包含所述终端设备在执行所述指定操作时显示的内容;Receiving a screen image of the terminal device uploaded by the terminal device, where the screen image is acquired when the terminal device detects that the terminal device performs a specified operation, and the screen image includes the terminal device performing the designation The content displayed during operation;
    根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。Acquiring the content displayed by the terminal device when performing the specified operation according to the screen image, and determining whether the content of the violation is present in the content displayed by the terminal device when performing the specified operation.
  8. 根据权利要求7所述的方法,其特征在于,所述根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容包括: The method according to claim 7, wherein the content that is displayed when the terminal device performs the specified operation is acquired according to the screen image, and whether the content displayed by the terminal device when performing the specified operation is determined The violations include:
    利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;And analyzing the screen image by using an image recognition technology, and acquiring content displayed by the terminal device included in the screen image when performing a specified operation;
    将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;Comparing the content displayed by the terminal device when performing the specified operation with the pre-set violation content;
    当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。When there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation, it is determined that the content is displayed in the content displayed by the terminal device when performing the specified operation.
  9. 根据权利要求7或8所述的方法,其特征在于,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:The method according to claim 7 or 8, wherein after determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the method further comprises:
    向所述终端设备发送警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,向所述终端设备发送警告指令,所述警告指令用于所述终端设备根据所述警告指令显示所述警告信息。Sending warning information to the terminal device, the warning information is used to notify the user that the specified operation involves the offending content; or sending a warning instruction to the terminal device, the warning instruction being used by the terminal device according to the warning The instruction displays the warning message.
  10. 根据权利要求7或8所述的方法,其特征在于,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:The method according to claim 7 or 8, wherein after determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the method further comprises:
    向所述终端设备发送锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定。And sending a lock instruction to the terminal device, the lock instruction being used to indicate that the specified function of the terminal device is locked.
  11. 一种终端设备的监控方法,其特征在于,应用于终端设备,所述方法包括:A method for monitoring a terminal device, which is characterized in that it is applied to a terminal device, and the method includes:
    监控所述终端设备的操作状态;Monitoring an operation state of the terminal device;
    当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;Obtaining, when the terminal device performs the specified operation, a screen image of the terminal device, where the screen image includes content displayed by the terminal device when performing a specified operation;
    根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并 判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。Acquiring, according to the screen image, content displayed by the terminal device when performing a specified operation, and Determining whether there is a violation content in the content displayed by the terminal device when performing the specified operation.
  12. 根据权利要求11所述的方法,其特征在于,所述根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,以判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容包括:The method according to claim 11, wherein the content displayed by the terminal device when performing the specified operation is acquired according to the screen image to determine whether the content displayed by the terminal device when performing the specified operation is The violations include:
    利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;And analyzing the screen image by using an image recognition technology, and acquiring content displayed by the terminal device included in the screen image when performing a specified operation;
    将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;Comparing the content displayed by the terminal device when performing the specified operation with the pre-set violation content;
    当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。When there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation, it is determined that the content is displayed in the content displayed by the terminal device when performing the specified operation.
  13. 根据权利要求11或12所述的方法,其特征在于,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:The method according to claim 11 or 12, wherein after determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the method further comprises:
    生成警告信息;Generate a warning message;
    显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。The warning information is displayed, the warning information being used to notify the user that the specified operation involves a violation of content.
  14. 根据权利要求11或12所述的方法,其特征在于,在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,所述方法还包括:The method according to claim 11 or 12, wherein after determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the method further comprises:
    生成锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;Generating a lock instruction for indicating that the specified function of the terminal device is locked;
    响应于所述锁定指令,将所述指定功能进行锁定。 The specified function is locked in response to the lock instruction.
  15. 一种终端设备的监控装置,其特征在于,应用于终端设备,所述装置包括:A monitoring device for a terminal device, which is characterized in that it is applied to a terminal device, and the device includes:
    监控模块,用于监控所述终端设备的操作状态;a monitoring module, configured to monitor an operating state of the terminal device;
    图像获取模块,用于当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;An image acquisition module, configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
    上传模块,用于向监控系统上传所述屏幕图像。The uploading module is configured to upload the screen image to the monitoring system.
  16. 根据权利要求15所述的装置,其特征在于,所述屏幕图像用于所述监控系统根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容;或者,The device according to claim 15, wherein the screen image is used by the monitoring system to acquire content displayed by the terminal device when performing a specified operation according to the screen image, and determine that the terminal device is executing Specify whether there is a violation in the content displayed during the operation; or,
    所述屏幕图像用于所述监控系统通过显示终端设备显示所述屏幕图像。The screen image is used by the monitoring system to display the screen image through a display terminal device.
  17. 根据权利要求15所述的装置,其特征在于,所述监控模块用于:The device according to claim 15, wherein the monitoring module is configured to:
    接收所述监控系统发送的监控指令;Receiving a monitoring instruction sent by the monitoring system;
    响应于所述监控指令,监控所述终端设备的操作状态。The operating state of the terminal device is monitored in response to the monitoring instruction.
  18. 根据权利要求15所述的装置,其特征在于,所述监控模块用于:The device according to claim 15, wherein the monitoring module is configured to:
    监控所述终端设备是否运行了指定应用程序;Monitoring whether the terminal device runs a specified application;
    当监测到所述终端设备运行了所述指定应用程序时,监控所述终端设备的操作状态。When it is detected that the terminal device runs the specified application, the operating state of the terminal device is monitored.
  19. 根据权利要求15-18任一项所述的装置,其特征在于,所述装置还包括: The device according to any one of claims 15 to 18, wherein the device further comprises:
    接收模块,用于接收所述监控系统发送的警告信息;a receiving module, configured to receive warning information sent by the monitoring system;
    显示模块,用于显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,a display module, configured to display the warning information, the warning information is used to notify a user that the specified operation involves a violation of content; or
    所述接收模块,还用于接收所述监控系统发送的警告指令;The receiving module is further configured to receive a warning instruction sent by the monitoring system;
    所述显示模块,还用于响应于所述警告指令,显示所述警告信息。The display module is further configured to display the warning information in response to the warning instruction.
  20. 根据权利要求15-18任一项所述的装置,其特征在于,所述装置还包括:The device according to any one of claims 15 to 18, wherein the device further comprises:
    指令接收模块,用于接收所述监控系统发送的锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;An instruction receiving module, configured to receive a lock instruction sent by the monitoring system, where the lock instruction is used to indicate that a specified function of the terminal device is locked;
    管理模块,用于响应于所述锁定指令,将所述指定功能进行锁定。And a management module, configured to lock the specified function in response to the locking instruction.
  21. 一种终端设备的监控装置,其特征在于,应用于监控系统,所述装置包括:A monitoring device for a terminal device, which is characterized in that it is applied to a monitoring system, and the device comprises:
    接收模块,用于接收终端设备上传的屏幕图像,所述屏幕图像是所述终端设备监测到所述终端设备执行指定操作时进行截屏得到的图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;a receiving module, configured to receive a screen image uploaded by the terminal device, where the screen image is an image obtained by the terminal device when the terminal device performs a specified operation, and the screen image includes the terminal device being executed Specify what is displayed during the operation;
    分析模块,用于根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在违规内容。And an analysis module, configured to acquire, according to the screen image, the content that is displayed when the terminal device performs the specified operation, and determine whether the content that is displayed when the terminal device performs the specified operation has the content of the violation.
  22. 根据权利要求21所述的装置,其特征在于,所述分析模块包括:The device according to claim 21, wherein the analysis module comprises:
    图像识别子模块,用于利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;An image recognition sub-module, configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
    内容分析子模块,用于将所述终端设备在执行指定操作时显示的内容与 预先设置的违规内容进行对比;a content analysis submodule, configured to display content that is displayed by the terminal device when performing a specified operation Pre-set violations are compared;
    确定子模块,用于当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。Determining a sub-module for determining that the terminal device exists in the content displayed when performing the specified operation when there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation Violation of content.
  23. 根据权利要求21或22所述的装置,其特征在于,所述装置还包括:警告模块,用于:The device according to claim 21 or 22, wherein the device further comprises: a warning module, configured to:
    在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,向所述终端设备发送警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容;或者,向所述终端设备发送警告指令,所述警告指令用于所述终端设备根据所述警告指令显示所述警告信息。After determining that there is a violation content in the content displayed by the terminal device when performing the specified operation, sending the warning information to the terminal device, the warning information being used to notify the user that the specified operation involves the offending content; or The terminal device transmits a warning command for the terminal device to display the warning information according to the warning instruction.
  24. 根据权利要求21或22所述的装置,其特征在于,所述装置还包括:The device according to claim 21 or 22, wherein the device further comprises:
    锁定模块,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,向所述终端设备发送锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定。a locking module, configured to send a lock instruction to the terminal device after determining that the content is violated in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate that the specified function of the terminal device is locked .
  25. 一种终端设备的监控装置,其特征在于,应用于终端设备,所述装置包括:A monitoring device for a terminal device, which is characterized in that it is applied to a terminal device, and the device includes:
    监控模块,用于监控所述终端设备的操作状态;a monitoring module, configured to monitor an operating state of the terminal device;
    图像获取模块,用于当监测到所述终端设备执行指定操作时获取所述终端设备的屏幕图像,所述屏幕图像中包含所述终端设备在执行指定操作时显示的内容;An image acquisition module, configured to acquire a screen image of the terminal device when the terminal device is configured to perform a specified operation, where the screen image includes content displayed by the terminal device when performing a specified operation;
    分析模块,用于根据所述屏幕图像获取所述终端设备在执行指定操作时显示的内容,并判断所述终端设备在执行指定操作时显示的内容中是否存在 违规内容。An analysis module, configured to acquire, according to the screen image, content displayed by the terminal device when performing a specified operation, and determine whether the content displayed by the terminal device when performing the specified operation exists Violation of content.
  26. 根据权利要求25所述的装置,其特征在于,所述分析模块包括:The device according to claim 25, wherein the analysis module comprises:
    图像识别子模块,用于利用图像识别技术对所述屏幕图像进行分析,获取所述屏幕图像中包含的所述终端设备在执行指定操作时显示的内容;An image recognition sub-module, configured to analyze the screen image by using an image recognition technology, and acquire content displayed by the terminal device included in the screen image when performing a specified operation;
    内容分析子模块,用于将所述终端设备在执行指定操作时显示的内容与预先设置的违规内容进行对比;a content analysis sub-module, configured to compare content displayed by the terminal device when performing a specified operation with pre-set violation content;
    确定子模块,用于当所述终端设备在执行指定操作时显示的内容中存在与所述预先设置的违规内容相匹配的内容时,确定所述终端设备在执行指定操作时显示的内容中存在违规内容。Determining a sub-module for determining that the terminal device exists in the content displayed when performing the specified operation when there is content matching the pre-set violation content in the content displayed by the terminal device when performing the specified operation Violation of content.
  27. 根据权利要求25或26所述的装置,其特征在于,所述装置还包括:The device according to claim 25 or 26, wherein the device further comprises:
    信息生成模块,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,生成警告信息;An information generating module, configured to generate warning information after determining that the content that is violated when the terminal device displays the specified operation;
    警告模块,用于显示所述警告信息,所述警告信息用于通知用户所述指定操作涉及违规内容。The warning module is configured to display the warning information, where the warning information is used to notify the user that the specified operation involves the content of the violation.
  28. 根据权利要求25或26所述的装置,其特征在于,所述装置还包括:The device according to claim 25 or 26, wherein the device further comprises:
    指令生成模块,用于在确定所述终端设备在执行指定操作时显示的内容中存在违规内容之后,生成锁定指令,所述锁定指令用于指示将所述终端设备的指定功能锁定;An instruction generating module, configured to generate a lock instruction, after the determining that the content is displayed in the content displayed by the terminal device when performing the specified operation, the lock instruction is used to indicate that the specified function of the terminal device is locked;
    锁定模块,用于响应于所述锁定指令,将所述指定功能进行锁定。And a locking module, configured to lock the specified function in response to the locking instruction.
  29. 一种非临时性计算机可读存储介质,其特征在于,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权 利要求1至6中任一项所述的方法,或用于执行11至14中任一项所述的方法。A non-transitory computer readable storage medium, comprising: one or more programs in the non-transitory computer readable storage medium, the one or more programs being used for execution rights The method of any one of claims 1 to 6, or the method of any one of 11 to 14.
  30. 一种终端设备,其特征在于,所述终端设备包括:A terminal device, the terminal device includes:
    权利要求29中所述的非临时性计算机可读存储介质;以及The non-transitory computer readable storage medium recited in claim 29;
    一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。One or more processors for executing a program in the non-transitory computer readable storage medium.
  31. 一种非临时性计算机可读存储介质,其特征在于,所述非临时性计算机可读存储介质中包括一个或多个程序,所述一个或多个程序用于执行权利要求7至10中任一项所述的方法。A non-transitory computer readable storage medium, characterized in that the non-transitory computer readable storage medium comprises one or more programs for performing any of claims 7 to 10. One of the methods described.
  32. 一种监控系统,其特征在于,所述监控系统包括:A monitoring system, characterized in that the monitoring system comprises:
    权利要求31中所述的非临时性计算机可读存储介质;以及The non-transitory computer readable storage medium recited in claim 31;
    一个或者多个处理器,用于执行所述非临时性计算机可读存储介质中的程序。 One or more processors for executing a program in the non-transitory computer readable storage medium.
PCT/CN2016/089660 2016-07-11 2016-07-11 Method and apparatus for monitoring terminal device WO2018010072A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680002916.8A CN107111539A (en) 2016-07-11 2016-07-11 The monitoring method and device of terminal device
PCT/CN2016/089660 WO2018010072A1 (en) 2016-07-11 2016-07-11 Method and apparatus for monitoring terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/089660 WO2018010072A1 (en) 2016-07-11 2016-07-11 Method and apparatus for monitoring terminal device

Publications (1)

Publication Number Publication Date
WO2018010072A1 true WO2018010072A1 (en) 2018-01-18

Family

ID=59676326

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/089660 WO2018010072A1 (en) 2016-07-11 2016-07-11 Method and apparatus for monitoring terminal device

Country Status (2)

Country Link
CN (1) CN107111539A (en)
WO (1) WO2018010072A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400132A (en) * 2020-03-09 2020-07-10 北京版信通技术有限公司 Automatic monitoring method and system for on-shelf APP

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110163013B (en) * 2019-05-22 2021-08-03 上海上湖信息技术有限公司 Method and equipment for detecting sensitive information
CN110519558A (en) * 2019-07-19 2019-11-29 苏州浪潮智能科技有限公司 The processing method and its Baseboard Management Controller of video data
CN110913078A (en) * 2019-12-11 2020-03-24 上海传英信息技术有限公司 Terminal control method, terminal control system, and computer-readable storage medium
CN111757058A (en) * 2020-06-18 2020-10-09 浪潮金融信息技术有限公司 Method for monitoring non-existing equipment screen
CN113568592A (en) * 2021-06-25 2021-10-29 展讯半导体(南京)有限公司 Display control method of terminal, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070234212A1 (en) * 2006-03-31 2007-10-04 Microsoft Corporation Selective window exclusion for captured content
CN102609637A (en) * 2011-12-20 2012-07-25 北京友维科软件科技有限公司 Audit protection system for data leakage
CN103581221A (en) * 2012-07-24 2014-02-12 深圳中兴网信科技有限公司 Method and device for monitoring operation of remote terminal
CN104462945A (en) * 2014-12-30 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Monitoring method of terminal and monitoring device of terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103155425B (en) * 2010-08-13 2015-07-29 Lg电子株式会社 mobile terminal, display device and control method thereof
CN104156490A (en) * 2014-09-01 2014-11-19 北京奇虎科技有限公司 Method and device for detecting suspicious fishing webpage based on character recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070234212A1 (en) * 2006-03-31 2007-10-04 Microsoft Corporation Selective window exclusion for captured content
CN102609637A (en) * 2011-12-20 2012-07-25 北京友维科软件科技有限公司 Audit protection system for data leakage
CN103581221A (en) * 2012-07-24 2014-02-12 深圳中兴网信科技有限公司 Method and device for monitoring operation of remote terminal
CN104462945A (en) * 2014-12-30 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Monitoring method of terminal and monitoring device of terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400132A (en) * 2020-03-09 2020-07-10 北京版信通技术有限公司 Automatic monitoring method and system for on-shelf APP
CN111400132B (en) * 2020-03-09 2023-08-18 北京版信通技术有限公司 Automatic monitoring method and system for on-shelf APP

Also Published As

Publication number Publication date
CN107111539A (en) 2017-08-29

Similar Documents

Publication Publication Date Title
WO2018010072A1 (en) Method and apparatus for monitoring terminal device
US10375116B2 (en) System and method to provide server control for access to mobile client data
US11307910B2 (en) Notification tagging for a workspace or application
CN107852416B (en) Monitoring the lifecycle of a computer network connection
US9703772B2 (en) System and method for automated alerts in anticipation of inappropriate communication
US11750623B2 (en) System and method for conducting a detailed computerized surveillance in a computerized environment
WO2021121244A1 (en) Alarm information generation method and apparatus, electronic device, and storage medium
WO2017107830A1 (en) Application installation method, apparatus and electronic device
US20220382884A1 (en) Method and device for parsing shared password
US10853490B2 (en) Method and apparatus for managing hardware resource access in an electronic device
WO2019228141A1 (en) Control method and apparatus for electronic device, and storage medium and electronic device
US10362065B2 (en) Management of actions initiated by applications in client devices
WO2019000820A1 (en) Method, device for processing message in screen locking interface and electronic equipment
CN104660480B (en) A kind of method, apparatus and system of account number abnormality processing
CN112115502A (en) Data processing method and device and data processing device
US20190295343A1 (en) Virtual Doors, Locks, Umbras, and Penumbras of Physical Access Control Systems and Methods of Operation
JP2017102758A (en) Authentication device, authentication method, and program
CA3071225A1 (en) Apparatuses, methods and systems for persisting values in a computing environment
WO2022193142A1 (en) Behavior monitoring method and apparatus, terminal device, and computer readable storage medium
CN110633566A (en) Intrusion detection method, device, terminal equipment and medium
Abril et al. Development and design of a unified remote video surveillance system for homes, using free software tools
CN112363917B (en) Application program debugging exception processing method and device, electronic equipment and medium
CN103207966A (en) Method and system for management of information safety
Archana et al. Multimedia messaging service (mms) based anti-theft application
CN116074046A (en) Sensitive information leakage detection method, device, equipment and medium based on full flow

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16908404

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 15/05/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16908404

Country of ref document: EP

Kind code of ref document: A1