WO2019061379A1 - 一种网络终端及其互联网行为的约束方法 - Google Patents
一种网络终端及其互联网行为的约束方法 Download PDFInfo
- Publication number
- WO2019061379A1 WO2019061379A1 PCT/CN2017/104717 CN2017104717W WO2019061379A1 WO 2019061379 A1 WO2019061379 A1 WO 2019061379A1 CN 2017104717 W CN2017104717 W CN 2017104717W WO 2019061379 A1 WO2019061379 A1 WO 2019061379A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- behavior
- internet
- user
- current user
- data
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000006399 behavior Effects 0.000 claims description 180
- 230000003542 behavioural effect Effects 0.000 claims description 46
- 238000000605 extraction Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 5
- 230000003247 decreasing effect Effects 0.000 claims description 4
- 238000012544 monitoring process Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 238000011161 development Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000011156 evaluation Methods 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 206010012335 Dependence Diseases 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 239000003814 drug Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/302—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/308—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information retaining data, e.g. retaining successful, unsuccessful communication attempts, internet access, or e-mail, internet telephony, intercept related information or call content
Definitions
- the present invention relates to the field of computer technologies, and in particular, to a method for constraining a network terminal and its Internet behavior.
- the network is a virtual platform for information transmission, reception, and sharing. It connects various points, surfaces, and body information to achieve the sharing of these resources.
- the Internet is the most important invention in the history of human development, which has improved the development of science and technology and human society.
- the technical problem to be solved by the present invention is to provide a network terminal and a method for constraining the behavior of the Internet, which can restrict the behavior of the user on the Internet according to the behavior standard data, so as to prevent the user from making Internet behaviors that are unfavorable to themselves or others. Conducive to purifying the network and creating a healthy network environment.
- a technical solution adopted by the present invention is to provide a method for constraining Internet behavior, the method comprising: acquiring behavior of a current user in the Internet; and using the pre-established behavior standard data for the current user in the Internet The behavior is constrained.
- another technical solution adopted by the present invention is to provide a computer readable storage medium for storing a computer program, when executed by a processor, to implement Internet behavior as described above. Constraint method.
- a network terminal which includes an input device, an output device, a memory, and a processor, where the memory stores pre-defined behavior standard data, and the processor uses Execution: Get the current user's behavior on the Internet; constrain the current user's behavior on the Internet according to pre-defined behavioral criteria data.
- the invention has the beneficial effects that the method for restricting the behavior of the Internet provided by the present invention includes: obtaining the behavior of the current user in the Internet; and the behavior of the current user in the Internet according to the pre-established behavior standard data according to the prior art. Make constraints.
- the behavior of the user on the Internet can be restricted according to the behavior standard data, so as to prevent the user from making Internet behaviors that are unfavorable to themselves or others, and it is beneficial to purify the network and create a healthy network environment.
- FIG. 1 is a schematic flow chart of an embodiment of a method for constraining Internet behavior provided by the present invention
- FIG. 2 is a schematic flow chart of another embodiment of a method for restricting Internet behavior provided by the present invention.
- FIG. 3 is a schematic flow chart of still another embodiment of a method for constraining Internet behavior provided by the present invention.
- FIG. 4 is a schematic structural diagram of an embodiment of a network terminal provided by the present invention.
- FIG. 5 is a schematic structural diagram of an embodiment of a network system provided by the present invention.
- FIG. 1 is a schematic flowchart of an embodiment of a method for constraining Internet behavior provided by the present invention, where the method includes:
- Step 11 Obtain the behavior of the current user on the Internet.
- the behavior of the user in the Internet may be an Internet behavior generated by the user operating the network terminal.
- the user may log in to the account, perform speaking, forwarding, commenting, and browsing multimedia information (including videos, novels, pictures, music). Etc.), conduct shopping or virtual currency transactions, and conduct online games.
- the user can perform the above Internet behavior by entering the corresponding website or logging in to the corresponding application.
- obtaining the current user's behavior in the Internet may be obtained by operating or interpreting the instruction of the network terminal. For example, when browsing a microblog, a user wants to forward a certain microblog. When the user clicks the forward button with a mouse, the current behavior of the current user's forwarding microblog is obtained. For another example, when the user purchases the specified item in the shopping cart, when the payment is made, the confirmation button is clicked to obtain the Internet behavior of the current user's online shopping.
- Step 12 Constrain the current user's behavior on the Internet based on pre-defined behavioral criteria data.
- the behavioral standard data may be formulated in advance according to the corresponding laws and regulations, behavioral norms, classical masterpieces, famous sayings, etc., for example, according to Confucianism, interpretation, Taoism, medicine, Wu, music, customs, science, business, etc.
- Classical masterpieces are used to develop behavioral standard data and to classify behavioral criteria data.
- the pre-defined behavior standard data is read-only data stored in the memory, and is unchangeable; of course, in other embodiments, the behavioral standard data may also be based on network development. And the progress of civilization is changed.
- the behavioral standard data is customized by the basic information of the current user, wherein the basic information includes at least one or a combination of occupation, age, income, and marital status.
- different users can apply to different behavioral criteria data. For example, if user A is a middle school student and is under the age of 18, the behavior standard data applicable to user A needs to prohibit user A from browsing unhealthy web pages, and restricts user A's online time and game time; user B has lower income. The behavior standard data applicable to User B needs to prohibit User B from making high consumption or purchasing luxury goods on the shopping website.
- the first method it is possible to first determine whether the behavior of the user in the Internet conforms to the pre-established behavioral standard data, and to evaluate, record, or correct the behavior when the pre-established behavioral standard data is not met.
- a prompting interface may be popped up on the webpage to remind the user that the viewed page is not suitable for viewing, and the user's online recording is performed. Save for background management to manage.
- the background administrator can be a minor guardian or a government regulatory agency.
- a prompt interface may be popped up on the webpage to remind the user that the page being viewed is not suitable for viewing during work hours.
- the user's online record is saved for the background management personnel to manage.
- the background administrator can be the company boss or the company administrative staff.
- the user's online behavior can also be blocked based on compliance with pre-established behavioral criteria data to prevent the continuation of Internet behavior in which the user does not comply with the behavioral standard data.
- a user's income is relatively low, and the user's behavioral standard data on consumption requires that the user's monthly online shopping consumption of less than 2,000 yuan is in line with the "diligence and family" behavior standard data.
- the online shopping process of the user it is detected that the user adds a product of 3,000 yuan to the shopping cart and makes a payment, and when the payment is made, the user is directly prevented from entering the transaction password, thereby preventing the transaction.
- the method for restricting Internet behavior in this embodiment includes: obtaining the behavior of the current user in the Internet; and constraining the behavior of the current user in the Internet according to the pre-established behavior standard data.
- the behavior of the user on the Internet can be restricted according to the behavior standard data, so as to prevent the user from making Internet behaviors that are unfavorable to themselves or others, and it is beneficial to purify the network and create a healthy network environment.
- FIG. 2 is a schematic flowchart diagram of another embodiment of a method for restricting Internet behavior provided by the present invention, where the method includes:
- Step 21 Develop behavioral criteria data and collect behavioral samples that meet the behavioral criteria data.
- the behavior sample that satisfies the behavioral standard data refers to the Internet behavior that satisfies the data of the specific behavior standard.
- the behaviors consistent with the standard data of “patriotic law-abiding” behaviors may include reporting illegal Internet behaviors, posting posts on patriotic law-abiding, etc.; texts that meet the standard data of “diligence and housekeeping” behaviors may be compared to three when shopping, and the price is selected. Cheaper items, etc.
- step 21 may be specifically: determining a user sample that satisfies behavior standard data, and monitoring an Internet behavior of the user sample to obtain a behavior sample.
- user A For example, if user A meets certain behavior standard data, user A's Internet behavior is monitored, and user A's Internet behavior is taken as a behavioral sample.
- user A's Internet behavior is taken as a behavioral sample.
- step 21 may specifically include: collecting hot topics in the network, and obtaining public evaluation or official interpretation; extracting behavior standard data from public evaluation or official interpretation, and extracting from hot topics Behavioral sample.
- Step 22 Perform feature extraction on the behavior sample and train the behavior classifier.
- Step 23 Obtain the behavior of the current user on the Internet.
- Step 24 Feature extraction of the behavior of the current user on the Internet, and classifying by using the behavior classifier to determine whether the behavior standard data is satisfied.
- the characteristics of Internet behavior can be determined by specific Internet behavior.
- its features may include game type, game time, game consumption, and the like.
- the features may include the type of the product, the price of the product, the sales volume of the product, and the like.
- Step 25 When the current user's behavior in the Internet does not satisfy the behavior standard data, the user's related Internet rights are restricted.
- step 25 may be specifically: when the behavior of the current user in the Internet does not satisfy the behavior standard data, at least one of the following is performed: prohibiting the user from logging in, prohibiting the user from posting, forwarding, or commenting, and prohibiting the user from logging in to set the webpage. Users are prohibited from using online banking.
- the images and videos of violence, pornography, etc. are not allowed in underage data that meets the criteria for underage health online.
- User A is a minor and can obtain the identity information of User A in advance.
- User A and User B receive a network link of a movie (a movie that does not meet the standard data of the underage health online behavior) sent by User B.
- User A clicks the link to open the corresponding web page to view the movie.
- step 23 the Internet behavior of the user A is obtained, and the user A is prohibited from opening the movie webpage.
- FIG. 3 is a schematic flowchart diagram of still another embodiment of a method for constraining Internet behavior provided by the present invention, where the method includes:
- Step 31 Assign the current user a uniquely identifiable account.
- Step 32 Obtain the behavior of the current user on the Internet.
- Step 33 Constrain the behavior of the current user on the Internet according to the pre-established behavior standard data.
- the behavioral standard data is customized by the current user's basic information, wherein the basic information includes at least one or a combination of occupation, age, income, and marital status.
- Step 34 Associate the current user's behavior and constraint records on the Internet with a uniquely identifiable account.
- the current Internet behavior of the current user may be bound in conjunction with historical Internet behavior and/or historical constraint records associated with the unique identifiable account.
- user A is a minor.
- user A's online game time is 2 hours (the time of the behavior standard data is assumed to be within 1 hour). If the behavior standard data is not met, the user can be reminded on the Internet. Stopping the Internet; User A's online game time is still more than 1 hour on the following day. According to the preset behavior standard data, it should be reminded, but user A is not the first time this is related to its historical Internet behavior. Internet behavior, therefore, it is possible to force the game to be closed or to disable the login of the game.
- the method may further comprise the step of: increasing or decreasing the moral score associated with the uniquely identified account according to the constraint record, the moral score setting being visible to other users, and at least associated with the Internet rights.
- the initial state of each user's moral integration is 100 points.
- the moral integral is increased or decreased according to the result of the constraint.
- the degree of the reduction can be based on the user's behavior and behavior standard data in the Internet.
- the degree of matching is determined, or based on the degree of constraint on its Internet behavior.
- the present invention also provides a computer readable storage medium for storing a computer program executed by a processor to implement a constraint method of Internet behavior provided in the above embodiments. It is to be understood that the computer program stored in the readable storage medium in this embodiment is similar to the method for restricting the behavior of the Internet provided by the foregoing embodiments, and the principles and steps are the same, and details are not described herein again.
- the storage medium includes: a U disk, a mobile hard disk, and a read only memory (ROM, Read-Only) Memory, random access memory (RAM), disk or optical disk, and other media that can store program code.
- ROM read only memory
- RAM random access memory
- FIG. 4 is a schematic structural diagram of an embodiment of a network terminal provided by the present invention.
- the network terminal 40 includes an input device 41, an output device 42, a memory 43, and a processor 44.
- the memory 43 stores predetermined behavior standard data.
- the behavioral standard data is customized by the current user's basic information, wherein the basic information includes at least one or a combination of occupation, age, income, and marital status.
- the processor 44 is configured to: obtain the behavior of the current user in the Internet; and restrict the behavior of the current user in the Internet according to the pre-established behavior standard data.
- the processor 44 is further configured to: generate behavior standard data, and collect behavior samples that satisfy the behavior standard data; perform feature extraction on the behavior sample, and train the behavior classifier; The behavior in the Internet is extracted, and the behavior classifier is used to classify to determine whether it meets the behavior standard data.
- the user's relevant Internet authority is restricted.
- the processor 44 is further configured to: when the behavior of the current user in the Internet does not satisfy the behavior standard data, perform at least one of the following: prohibiting the user from logging in, prohibiting the user from posting, forwarding, or Comments, prohibit users from logging in to set up web pages, and prohibit users from using online banking.
- the processor 44 is further configured to: determine a user sample that satisfies the behavior criterion data, and monitor an Internet behavior of the user sample to obtain a behavior sample.
- the processor 44 is further configured to: collect hot topics in the network, and obtain public evaluation or official interpretation; extract behavior standard data from public evaluation or official interpretation, and discuss from the hot Topic extraction behavior sample.
- the processor 44 is further configured to: assign a unique identifiable account to the current user; associate the current user's behavior and constraint record in the Internet with the unique identifiable account.
- the processor 44 is further configured to: perform binding on the current Internet behavior of the current user in conjunction with historical Internet behavior and/or historical constraint records associated with the unique identifiable account.
- the processor 44 is specifically configured to: increase or decrease ethical points associated with the uniquely identified account according to the constraint record, set the ethical points to be visible to other users, and at least relate to Internet rights. Union.
- the network terminal 40 may be a user terminal, such as a computer, a mobile phone, a smart wearable device, or the like, and may also be a terminal such as a server or a base station, for remotely evaluating the behavior of the user on the Internet. .
- the network terminal provided by this embodiment is a device based on the method for evaluating the behavior of the Internet according to the foregoing embodiment, and the implementation principle and steps are similar, and details are not described herein again.
- FIG. 5 is a schematic structural diagram of an embodiment of a network system according to the present invention.
- the network system includes a network terminal 51 and a server 52.
- the network terminal 51 is configured to acquire the behavior of the current user in the Internet, and send the Internet behavior to the server.
- the server 52 is configured to restrict the current user's behavior in the Internet according to the pre-defined behavior standard data.
- the behavior of the user in the Internet is restricted by the server 52 in this embodiment.
- the method for limiting the server 52 in this embodiment can refer to the network terminal in the foregoing embodiment, and its structure and working principle are similar, and details are not described herein again.
- the disclosed method and apparatus may be implemented in other manners.
- the device implementations described above are merely illustrative.
- the division of the modules or units is only a logical function division.
- there may be another division manner for example, multiple units or components may be used. Combinations can be integrated into another system, or some features can be ignored or not executed.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Evolutionary Computation (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本发明公开了一种网络终端及其互联网行为的约束方法,该互联网行为的约束方法包括:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对所述当前用户在互联网中的行为进行约束。通过上述方式,本发明能够根据行为标准数据对用户在互联网中的行为作出限制,以防止用户作出对自身或他人不利的互联网行为,有利于净化网络,创建健康的网络环境。
Description
【技术领域】
本发明涉及计算机技术领域,特别是涉及一种网络终端及其互联网行为的约束方法。
【背景技术】
网络是信息传输、接收、共享的虚拟平台,通过它把各个点、面、体的信息联系到一起,从而实现这些资源的共享。网络是人类发展史来最重要的发明,提高了科技和人类社会的发展。
用户通过网络终端连接网络,可以进行信息的接收和传播,也称“上网”。随着计算机和网络技术的发展,现在用户可以通过上网进行社交、娱乐、交易、工作等。
【发明内容】
本发明主要解决的技术问题是提供一种网络终端及其互联网行为的约束方法,能够根据行为标准数据对用户在互联网中的行为作出限制,以防止用户作出对自身或他人不利的互联网行为,有利于净化网络,创建健康的网络环境。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种互联网行为的约束方法,该方法包括:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。
为解决上述技术问题,本发明采用的另一个技术方案是:提供一种计算机可读存储介质,用于存储计算机程序,该计算机程序在被处理器执行时,用以实现如上述的互联网行为的约束方法。
为解决上述技术问题,本发明采用的另一个技术方案是:提供一种网络终端,该网络终端包括输入装置、输出装置、存储器和处理器,存储器中存储有预先制定的行为标准数据,处理器用于执行:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。
本发明的有益效果是:区别于现有技术的情况,本发明提供的互联网行为的约束方法包括:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。通过上述方式,能够根据行为标准数据对用户在互联网中的行为作出限制,以防止用户作出对自身或他人不利的互联网行为,有利于净化网络,创建健康的网络环境。
【附图说明】
图1是本发明提供的互联网行为的约束方法一实施例的流程示意图;
图2是本发明提供的互联网行为的约束方法另一实施例的流程示意图;
图3是本发明提供的互联网行为的约束方法又一实施例的流程示意图;
图4是本发明提供的网络终端一实施例的结构示意图;
图5是本发明提供的网络系统一实施例的结构示意图。
【具体实施方式】
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的本发明的实施例例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
参阅图1,图1是本发明提供的互联网行为的约束方法一实施例的流程示意图,该方法包括:
步骤11:获取当前用户在互联网中的行为。
其中,用户在互联网中的行为可以是用户操作网络终端所产生的互联网行为,举例而言,可以包括:用户登录账户,进行发言、转发、评论,浏览多媒体信息(包括视频、小说、图片、音乐等),进行购物或虚拟货币的交易,进行网络游戏。其中,用户可以通过进入相应的网站或者登陆相应的应用来执行上述互联网行为。
可选的,获取当前用户在互联网中的行为具体可以通过或者操作网络终端的指令,并对该指令解析获得的。比如,用户在浏览微博时,想对某一条微博进行转发,当用户用鼠标点击转发按钮时,即获取到当前用户的转发微博的互联网行为。再比如,用户在网上购物时,将指定物品加入购物车后,在付款时,点击确认按钮,即获取到当前用户的网上购物的互联网行为。
步骤12:根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。
其中,行为标准数据可以是预先根据相应的法律法规、行为规范、古典名著、名言警句等作为参考来制定,例如,可以根据儒、释、道、医、武、乐、俗、科、商等方面的古典名著来制定行为标准数据,并对行为标准数据进行分类。
可选的,在一实施例中,该预先制定的行为标准数据是存储在存储器中的只读数据,是不可更改的;当然,在其他实施例中,该行为标准数据也可以根据网络的发展和文明的进步进行更改。
其中,行为标准数据由当前用户的基本信息客制化而成,其中基本信息包括职业、年龄、收入以及婚姻状况的至少一个或组合。
举例而言,不同的用户可以适用于不同的行为标准数据。例如,用户A为中学生,未满18岁,则适用于用户A的行为标准数据则需要禁止用户A浏览不健康的网页,并对用户A的上网时间和游戏时间进行限制;用户B收入较低,则适用于用户B的行为标准数据则需要禁止用户B在购物网站进行高消费或购买奢侈品。
在对用户在互联网中的行为进行约束时,可以采取多种方式,下面以两种方式进行举例:
在第一种方式中,可以先判断用户在互联网中的行为是否符合预先制定的行为标准数据,在不符合预先制定的行为标准数据时,对其进行评价记录、指导或矫正。
例如,未成年人登录不健康网页,不符合针对未成年人预先制定的行为标准数据,则可以在网页上弹出提示界面,以提醒用户所浏览的页面并不适合观看,并且对用户的上网记录进行保存以便后台管理人员进行管理,此时,后台管理员可以是未成年人监护人或者政府监管部门。
再比如,公司员工在上班时间登陆跟工作无关的网页,不符合针对公司员工预先制定的行为标准数据,则可以在网页上弹出提示界面,以提醒用户所浏览的页面并不适合上班时间观看,并且对用户的上网记录进行保存以便后台管理人员进行管理,此时,后台管理员可以是公司老板或者公司行政管理人员。
在另一种方式中,也可以根据符合预先制定的行为标准数据来阻止用户的网上行为,以防止用户不符合行为标准数据的互联网行为的继续。
例如,一用户的收入较低,针对该用户的关于消费的行为标准数据中要求该用户每月的网购消费小于2000元是符合“勤俭持家”行为标准数据的。则在该用户的网购过程中,检测到用户将一3000元的商品加入购物车并进行付款,在付款时,直接阻止用户输入交易密码,防止了这次交易。
区别于现有技术,本实施例的互联网行为的约束方法包括:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。通过上述方式,能够根据行为标准数据对用户在互联网中的行为作出限制,以防止用户作出对自身或他人不利的互联网行为,有利于净化网络,创建健康的网络环境。
参阅图2,图2是本发明提供的互联网行为的约束方法另一实施例的流程示意图,该方法包括:
步骤21:制定行为标准数据,并收集满足行为标准数据的行为样本。
其中,满足行为标准数据的行为样本是指满足具体行为标准数据的互联网行为。例如,符合“爱国守法”行为标准数据的行为可以有对违法的网络行为进行举报,发布有关爱国守法的帖子等;符合“勤俭持家”行为标准数据的行文可以有购物时货比三家,挑选价格较便宜的商品等。
可选的,在一实施例中,步骤21可以具体为:确定满足行为标准数据的用户样本,对用户样本的互联网行为进行监控,以获取行为样本。
例如,用户A符合某一行为标准数据,则对用户A的互联网行为进行监控,将用户A的互联网行为作为行为样本。当然,也可以选择大量的符合该行为标准数据的用户,对所有用户的行为进行监控,并将所有用户在互联网中的行为作为行为样本,或将所有用户的相同/相似的互联网行为作为行为样本。
可选的,在另一实施例中,步骤21可以具体包括:收集网络中的热议话题,并获取大众评价或官方解读;从大众评价或官方解读提取行为标准数据,并从热议话题提取行为样本。
例如,网络中出现了“网络游戏防沉迷”的热议话题,其中针对未成年人的网络游戏类型、时间均有讨论。在本实施例中,就可以收集网友或官方对“网络游戏防沉迷”的看法和建议,进而从该热议话题的讨论中得到样本行为。
具体举例而言,若在大众热议中,大多数网友或官方认为12-16岁的未成年人每天的游戏时间不应该超过1小时,则把游戏时间小于1小时的互联网行为作为12-16岁的用户符合行为标准数据的样本行为。
步骤22:对行为样本进行特征提取,并训练行为分类器。
步骤23:获取当前用户在互联网中的行为。
步骤24:对当前用户在互联网中的行为进行特征提取,并利用行为分类器进行分类,以判断其是否满足行为标准数据。
互联网行为的特征可以根据具体的互联网行为来定。以上述网络游戏的例子来说,其特征可以包括游戏类型、游戏时间、游戏消费等。以网上购物为例,其特征可以包括商品类型、商品价格、商品的销量等。
步骤25:在当前用户在互联网中的行为不满足行为标准数据时,对用户的相关互联网权限进行限制。
可选的,步骤25可以具体为:在当前用户在互联网中的行为不满足行为标准数据时,至少执行以下一种:禁止用户登录,禁止用户发帖、转发或评论,禁止用户登录设定网页,禁止用户使用网银。
下面以一个具体的例子对上述实施例进行说明:
首先,根据步骤21和步骤22,符合未成年健康上网的行为标准数据中不允许未成年观看暴力、色情等图片和视频。
用户A为未成年人,可以预先获取用户A的身份信息。用户A与用户B在网络聊天过程中,接收到了用户B发送的一电影(不符合未成年健康上网行为标准数据的电影)的网络链接,用户A点击链接欲打开相应的网页观看该电影。则在步骤23中获取到用户A的该互联网行为,则禁止用户A打开该电影网页。
参阅图3,图3是本发明提供的互联网行为的约束方法又一实施例的流程示意图,该方法包括:
步骤31:为当前用户分配唯一可识别账户。
步骤32:获取当前用户在互联网中的行为。
步骤33:根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。
其中,该行为标准数据由当前用户的基本信息客制化而成,其中基本信息包括职业、年龄、收入以及婚姻状况的至少一个或组合。
步骤34:将当前用户在互联网中的行为和约束记录与唯一可识别账户进行关联。
可选的,在步骤33中,可以结合唯一可识别账户所关联的历史互联网行为和/或历史约束记录对当前用户的当前互联网行为进行约束。
例如,用户A为未成年人,某一天用户A网络游戏时间为2小时(符合行为标准数据的时间假设为1小时之内),不符合行为标准数据,则可以对其进行上网提醒,建议其停止上网;其后的某一天用户A网络游戏时间仍然超过1小时,按照预先设置的行为标准数据,应当对其进行提醒,但相对于其历史互联网行为,用户A并不是第一次出现这种互联网行为,因此,可以强制性关闭游戏,或者禁止游戏的登录。
可选的,在一实施例中,该方法还可以包括步骤:根据约束记录对唯一识别账户所关联的道德积分进行增加或减少,道德积分设置为其他用户可见,并至少与互联网权限相关联。
例如,每一个用户的道德积分初始状态为满分100分,在约束后,根据约束的结果对其道德积分进行增减,其中,减分的程度可以根据用户在互联网中的行为与行为标准数据的匹配程度来决定,或者根据对其互联网行为的约束程度。在用户的积分减小到第一设定值(例如60分)时,对用户在互联网中的行为进行部分限制,在用户的积分减小到第二设定值(例如0分)时,禁止用户上网。
本发明还提供一种计算机可读存储介质,该计算机可读存储介质用于存储计算机程序,该计算机程序被处理器执行以实现上述实施例中提供的互联网行为的约束方法。可以理解的,在本实施例中的可读存储介质存储的计算机程序,所用来执行的方法与上述实施例提供的互联网行为的约束方法类似,其原理和步骤相同,这里不再赘述。
其中,该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only
Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
参阅图4,图4是本发明提供的网络终端一实施例的结构示意图,该网络终端40包括输入装置41、输出装置42、存储器43和处理器44。
其中,存储器43中存储有预先制定的行为标准数据。
可选的,该行为标准数据由当前用户的基本信息客制化而成,其中基本信息包括职业、年龄、收入以及婚姻状况的至少一个或组合。
其中,处理器44用于执行:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。
可选的,在另一实施例中,处理器44还用于执行:制定行为标准数据,并收集满足行为标准数据的行为样本;对行为样本进行特征提取,并训练行为分类器;对当前用户在互联网中的行为进行特征提取,并利用行为分类器进行分类,以判断其是否满足行为标准数据;在当前用户在互联网中的行为不满足行为标准数据时,对用户的相关互联网权限进行限制。
可选的,在另一实施例中,处理器44还用于执行:在当前用户在互联网中的行为不满足行为标准数据时,至少执行以下一种:禁止用户登录,禁止用户发帖、转发或评论,禁止用户登录设定网页,禁止用户使用网银。
可选的,在另一实施例中,处理器44还用于执行:确定满足行为标准数据的用户样本,对用户样本的互联网行为进行监控,以获取行为样本。
可选的,在另一实施例中,处理器44还用于执行:收集网络中的热议话题,并获取大众评价或官方解读;从大众评价或官方解读提取行为标准数据,并从热议话题提取行为样本。
可选的,在另一实施例中,处理器44还用于执行:为当前用户分配唯一可识别账户;将当前用户在互联网中的行为和约束记录与唯一可识别账户进行关联。
可选的,在另一实施例中,处理器44还用于执行:结合唯一可识别账户所关联的历史互联网行为和/或历史约束记录对当前用户的当前互联网行为进行约束。
可选的,在另一实施例中,处理器44具体用于执行:根据约束记录对唯一识别账户所关联的道德积分进行增加或减少,道德积分设置为其他用户可见,并至少与互联网权限相关联。
可以理解的,本实施提供的网络终端40可以是用户终端,例如电脑、手机、智能穿戴设备等可以上网的终端,也可以服务器、基站等终端,用于远程对用户在互联网中的行为进行评价。
本实施例提供的网络终端是基于上述实施例的互联网行为的评价方法的一设备,其实施原理和步骤类似,这里不再赘述。
参阅图5,图5是本发明提供的网络系统一实施例的结构示意图,该网络系统包括网络终端51和服务器52。
其中,网络终端51用于获取当前用户在互联网中的行为,并将该互联网行为发送给服务器,服务器52用于根据预先制定的行为标准数据对当前用户在互联网中的行为进行约束。
不同于上述实施例,本实施例中通过服务器52来对用户在互联网中的行为进行约束。
可以理解的,本实施例中服务器52的约束方法可以参考上述实施例中的网络终端,其结构和工作原理类似,这里不再赘述。
在本发明所提供的几个实施方式中,应该理解到,所揭露的方法以及设备,可以通过其它的方式实现。例如,以上所描述的设备实施方式仅仅是示意性的,例如,所述模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施方式方案的目的。
另外,在本发明各个实施方式中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
以上所述仅为本发明的实施方式,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
Claims (19)
- 一种互联网行为的约束方法,其特征在于,所述方法包括:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对所述当前用户在互联网中的行为进行约束。
- 根据权利要求1所述的方法,其特征在于,在所述获取当前用户在互联网中的行为的步骤之前进一步包括:制定行为标准数据,并收集满足所述行为标准数据的行为样本;对所述行为样本进行特征提取,并训练行为分类器;所述根据预先制定的行为标准数据对所述当前用户在互联网中的行为进行约束的步骤进一步包括:对所述当前用户在互联网中的行为进行特征提取,并利用所述行为分类器进行分类,以判断其是否满足所述行为标准数据;在所述当前用户在互联网中的行为不满足所述行为标准数据时,对所述用户的相关互联网权限进行限制。
- 根据权利要求2所述的方法,其特征在于,所述在所述当前用户在互联网中的行为不满足所述行为标准数据时,对所述用户的相关互联网权限进行限制的步骤包括:在所述当前用户在互联网中的行为不满足所述行为标准数据时,至少执行以下一种:禁止用户登录,禁止用户发帖、转发或评论,禁止用户登录设定网页,禁止用户使用网银。
- 根据权利要求2所述的方法,其特征在于,所述制定行为标准数据,并收集满足所述行为标准数据的行为样本的步骤进一步包括:确定满足所述行为标准数据的用户样本,对所述用户样本的互联网行为进行监控,以获取所述行为样本。
- 根据权利要求2所述的方法,其特征在于,所述制定行为标准数据,并收集满足所述行为标准数据的行为样本的步骤进一步包括:收集网络中的热议话题,并获取大众评价或官方解读;从所述大众评价或官方解读提取所述行为标准数据,并从所述热议话题提取所述行为样本。
- 根据权利要求1所述的方法,其特征在于,在所述获取当前用户在互联网中的行为的步骤之前进一步包括:为所述当前用户分配唯一可识别账户;所述根据预先制定的行为标准数据对所述当前用户在互联网中的行为进行约束的步骤之后进一步包括:将所述当前用户在互联网中的行为和约束记录与所述唯一可识别账户进行关联。
- 根据权利要求6所述的方法,其特征在于,所述在所述获取当前用户在互联网中的行为的步骤之前进一步包括:结合所述唯一可识别账户所关联的历史互联网行为和/或历史约束记录对所述当前用户的当前互联网行为进行约束。
- 根据权利要求6所述的方法,其特征在于,所述方法进一步包括:根据所述约束记录对所述唯一识别账户所关联的道德积分进行增加或减少,所述道德积分设置为其他用户可见,并至少与互联网权限相关联。
- 根据权利要求1所述的方法,其特征在于,所述行为标准数据由所述当前用户的基本信息客制化而成,其中所述基本信息包括职业、年龄、收入以及婚姻状况的至少一个或组合。
- 一种计算机可读存储介质,用于存储计算机程序,其特征在于,所述计算机程序在被处理器执行时,用以实现如权利要求1-9任一项所述的互联网行为的约束方法。
- 一种网络终端,其特征在于,包括输入装置、输出装置、存储器和处理器,所述存储器中存储有预先制定的行为标准数据,所述处理器用于执行:获取当前用户在互联网中的行为;根据预先制定的行为标准数据对所述当前用户在互联网中的行为进行约束。
- 根据权利要求11所述的网络终端,其特征在于,所述处理器还用于执行:制定行为标准数据,并收集满足所述行为标准数据的行为样本;对所述行为样本进行特征提取,并训练行为分类器;对所述当前用户在互联网中的行为进行特征提取,并利用所述行为分类器进行分类,以判断其是否满足所述行为标准数据;在所述当前用户在互联网中的行为不满足所述行为标准数据时,对所述用户的相关互联网权限进行限制。
- 根据权利要求12所述的网络终端,其特征在于,所述处理器具体用于执行:在所述当前用户在互联网中的行为不满足所述行为标准数据时,至少执行以下一种:禁止用户登录,禁止用户发帖、转发或评论,禁止用户登录设定网页,禁止用户使用网银。
- 根据权利要求12所述的网络终端,其特征在于,所述处理器具体用于执行:确定满足所述行为标准数据的用户样本,对所述用户样本的互联网行为进行监控,以获取所述行为样本。
- 根据权利要求12所述的网络终端,其特征在于,所述处理器还用于执行:收集网络中的热议话题,并获取大众评价或官方解读;从所述大众评价或官方解读提取所述行为标准数据,并从所述热议话题提取所述行为样本。
- 根据权利要求11所述的网络终端,其特征在于,所述处理器还用于执行:为所述当前用户分配唯一可识别账户;将所述当前用户在互联网中的行为和约束记录与所述唯一可识别账户进行关联。
- 根据权利要求16所述的网络终端,其特征在于,所述处理器还用于执行:结合所述唯一可识别账户所关联的历史互联网行为和/或历史约束记录对所述当前用户的当前互联网行为进行约束。
- 根据权利要求16所述的网络终端,其特征在于,所述处理器还用于执行:根据所述约束记录对所述唯一识别账户所关联的道德积分进行增加或减少,所述道德积分设置为其他用户可见,并至少与互联网权限相关联。
- 根据权利要求11所述的网络终端,其特征在于,所述行为标准数据由所述当前用户的基本信息客制化而成,其中所述基本信息包括职业、年龄、收入以及婚姻状况的至少一个或组合。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201780037096.0A CN109416659A (zh) | 2017-09-30 | 2017-09-30 | 一种网络终端及其互联网行为的约束方法 |
PCT/CN2017/104717 WO2019061379A1 (zh) | 2017-09-30 | 2017-09-30 | 一种网络终端及其互联网行为的约束方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/104717 WO2019061379A1 (zh) | 2017-09-30 | 2017-09-30 | 一种网络终端及其互联网行为的约束方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019061379A1 true WO2019061379A1 (zh) | 2019-04-04 |
Family
ID=65462998
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/104717 WO2019061379A1 (zh) | 2017-09-30 | 2017-09-30 | 一种网络终端及其互联网行为的约束方法 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109416659A (zh) |
WO (1) | WO2019061379A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113313350A (zh) * | 2021-04-23 | 2021-08-27 | 武汉瑞安科技发展有限公司 | 一种物联网数据采集分析管理系统 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103930921A (zh) * | 2011-11-11 | 2014-07-16 | 迈克菲股份有限公司 | 用于社交媒体身份的信誉服务 |
CN105590055A (zh) * | 2014-10-23 | 2016-05-18 | 阿里巴巴集团控股有限公司 | 用于在网络交互系统中识别用户可信行为的方法及装置 |
CN105893407A (zh) * | 2015-11-12 | 2016-08-24 | 乐视云计算有限公司 | 个体用户画像方法和系统 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130346917A1 (en) * | 2012-06-22 | 2013-12-26 | Microsoft Corporation | Client application analytics |
CN103853841A (zh) * | 2014-03-19 | 2014-06-11 | 北京邮电大学 | 一种社交网用户异常行为的分析方法 |
CN106257507B (zh) * | 2015-06-18 | 2021-09-24 | 创新先进技术有限公司 | 用户行为的风险评估方法及装置 |
-
2017
- 2017-09-30 WO PCT/CN2017/104717 patent/WO2019061379A1/zh active Application Filing
- 2017-09-30 CN CN201780037096.0A patent/CN109416659A/zh active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103930921A (zh) * | 2011-11-11 | 2014-07-16 | 迈克菲股份有限公司 | 用于社交媒体身份的信誉服务 |
CN105590055A (zh) * | 2014-10-23 | 2016-05-18 | 阿里巴巴集团控股有限公司 | 用于在网络交互系统中识别用户可信行为的方法及装置 |
CN105893407A (zh) * | 2015-11-12 | 2016-08-24 | 乐视云计算有限公司 | 个体用户画像方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
CN109416659A (zh) | 2019-03-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mai | Big data privacy: The datafication of personal information | |
Li et al. | Characterizing information propagation patterns in emergencies: A case study with Yiliang Earthquake | |
Kostkova et al. | # swineflu: The use of twitter as an early warning and risk communication tool in the 2009 swine flu pandemic | |
West | Press exceptionalism | |
Ding et al. | Editorial perspective: assessing developmental risk in cultural context: the case of ‘left behind’children in rural China | |
WO2014203659A1 (ja) | テキストマッチング装置および方法、並びにテキスト分類装置および方法 | |
CN107533698A (zh) | 社交媒体事件的检测与验证 | |
Kostkova et al. | Major infection events over 5 years: how is media coverage influencing online information needs of health care professionals and the public? | |
Rogers | Parents who wait: Acknowledging the support needs and vulnerabilities of approved adopters during their wait to become adoptive parents | |
Goel et al. | Understanding the metoo movement through the lens of the twitter | |
Novitzky et al. | A systematic review of ethical challenges and opportunities of addressing domestic violence with AI-technologies and online tools | |
Cheng et al. | Topic relevance of public health emergencies influence on internet public opinion resonance: simulation based on Langevin’s equation | |
WO2019061379A1 (zh) | 一种网络终端及其互联网行为的约束方法 | |
Edwards | Relative placement: The best answer for our foster care system | |
WO2019061376A1 (zh) | 一种互联网行为的评价方法以及网络终端 | |
Tahamtan et al. | # Cyberbullying in the digital age: Exploring people's opinions with text mining | |
Oldmeadow et al. | Classifying Australian citizens' responses to COVID‐19 preventative behaviour directives: A latent class approach | |
Budak et al. | Citizens’ online surveillance concerns in Croatia | |
WO2016080699A1 (ko) | 소셜 네트워크 서비스 기반의 자전적 콘텐츠 전문 플랫폼 서비스 제공 시스템 | |
WO2019061377A1 (zh) | 一种互联网行为的分类训练方法以及网络终端 | |
Ihm et al. | Multi-source food hazard event extraction for public health | |
Appel et al. | VRCT: Randomized controlled trial evaluating the impact of virtual reality therapy on BPSD and QoL of acute care in‐patients with dementia | |
Hazelkorn | Do dentists have sufficient information about their patients to control infection? | |
Htait et al. | DataMirror: Reflecting on One's Data Self: A Tool for Social Media Users to Explore Their Digital Footprints | |
Pfeiffer et al. | Discussion of “A formal causal interpretation of the case‐crossover design” by Zach Shahn, Miguel A. Hernan, and James M. Robins |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 29.09.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17926757 Country of ref document: EP Kind code of ref document: A1 |