WO2023138098A1 - User group attribute analysis system and method based on online network - Google Patents

User group attribute analysis system and method based on online network Download PDF

Info

Publication number
WO2023138098A1
WO2023138098A1 PCT/CN2022/122430 CN2022122430W WO2023138098A1 WO 2023138098 A1 WO2023138098 A1 WO 2023138098A1 CN 2022122430 W CN2022122430 W CN 2022122430W WO 2023138098 A1 WO2023138098 A1 WO 2023138098A1
Authority
WO
WIPO (PCT)
Prior art keywords
module
mobile device
user
terminal
attribute analysis
Prior art date
Application number
PCT/CN2022/122430
Other languages
French (fr)
Chinese (zh)
Inventor
刘长征
张荣华
袁李萌子
邵闻珠
刘雅辉
刘昭
Original Assignee
石河子大学
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 石河子大学 filed Critical 石河子大学
Priority to GB2217795.0A priority Critical patent/GB2618868A/en
Publication of WO2023138098A1 publication Critical patent/WO2023138098A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance

Definitions

  • the invention relates to the technical field of network big data capture, in particular to an online network-based user group attribute analysis system and method.
  • the present invention provides an online network-based user group attribute analysis system and method, which solves the problem that the current technology cannot better guide students' online behaviors, causing students to have wrong outlooks on life and values under the influence of unfavorable physical and mental health data in network information due to their contact with the Internet.
  • an online network-based user group attribute analysis system includes:
  • the system terminal is the general control terminal of the system, which is used to issue execution commands for execution by the lower-level modules;
  • An implant module used to implant the system on the mobile device used by the user;
  • a retrieval module configured to retrieve stored data in the storage space of the mobile device
  • the evaluation module is used to evaluate whether there is any abnormality in the content of the stored data in the retrieval module, and the proportion of abnormal data;
  • a judging module used for judging the attributes of the system end users
  • a coordination module configured to receive the user attributes determined by the determination module, and coordinate the evaluation indicators of the evaluation module according to the user attributes;
  • the reporting module is used to send the coordination results of the coordination module to the superior system terminal and the control terminal; the system terminal is a post-setting report, and selectively reports to the system terminal after the control terminal receives the report result.
  • the wireless network is used to establish a security system in the implanted module, including:
  • the stealth module is used to hide the system in the mobile device loaded with the system
  • the secret key source library is used to randomly generate time-limited secret keys in real time for the use of the control terminal, and log in to the system to control the system terminal;
  • the authorization module is used to authorize the security system to obtain the usage record of the main system
  • the keyword library is used to store abnormal words for statistics after comparison by the statistics module
  • the statistical module is used to count the number of targets matching the keyword library in the usage records of the main system acquired by the authorization module.
  • the retrieval module establishes a connection with the statistics module through a wireless network for data transmission, and synchronously obtains the target quantity in the usage records of the main system obtained in the statistics module that matches the keyword library when the retrieval module is running, and further participates in the operation of the evaluation module.
  • the evaluation module and the judgment module are connected in parallel to the main control module through a medium, and are used to replace the evaluation module and the judgment module for execution, and the main control system modifies or matches the end user attributes of the system.
  • the first to fourth grades of evaluation indicators in the evaluation module correspond to: primary school, junior high school, high school, university and above.
  • an online network-based user group attribute analysis method includes the following steps:
  • Step1 Implant the system in the mobile device of the client, so that the system enters a stealth state and cannot be retrieved by the system program in the mobile device;
  • Step2 Set up the recording program, connect the trusted device to connect to the stealth system in the client mobile device;
  • Step3 Set the abnormal behavior capture trigger conditions, match the abnormal behavior capture trigger conditions with the level of the mobile device client, and actively coordinate the compatibility between the trigger conditions and the mobile device client level after logging in on the trusted device;
  • Step4 Trust the device side to periodically use the secret key to verify the identity and log in to the control side to retrieve the relevant report files of the user side in the database for attribute analysis and evaluation;
  • Step5 The trusted device operation terminal establishes a communication connection with the user terminal to guide it according to the attribute analysis and evaluation results of the relevant report file of the corresponding user terminal.
  • the trusted device connects to the hidden system in the mobile device through the public key of the local wireless network.
  • the trusted device uses the secret key to verify the identity of the operator.
  • the hidden system in the user's mobile device includes a recording program.
  • the user's mobile device and the trusted device are in the same local area network, it automatically corrects and establishes a data transmission channel. After the data transmission channel is established, the user's mobile device transmits the recording program record data to the trusted device.
  • step Step2 includes a recording program, including the following steps:
  • Step21 Analyze the attributes of the user terminal, match the abnormal behavior capture authority of the mobile device of the user terminal, and capture the operation behavior of the user terminal on its mobile device that meets the characteristics of abnormal behavior according to the abnormal behavior capture authority matched by the mobile device of the user terminal;
  • Step22 Summarize the abnormal behavior of the mobile device on the client side to generate a report file, compare the selectivity of the report file with the abnormal behavior capture permission, and send it to the trusted device for waiting;
  • Step23 Create a database, and after the trusted device confirms the report file, transfer the report file to the database to create a root directory storage.
  • step Step5 includes a sub-step Step51: check the abnormal behavior captured in the report file, retrieve the network IP address related to the abnormal behavior for further analysis, and perform adaptive processing on the content of the network IP address related to the retrieved abnormal behavior;
  • the adaptive processing plan for the network IP address content related to abnormal behavior includes: reporting, banning, jumping and synchronous feedback.
  • Step 2 when the user of the trusted device is online, the abnormal behavior prediction function formula is selectively used to calculate the next occurrence probability of abnormal behavior of the mobile device of the user, the formula is as follows:
  • P(B i ), P(B j ) are the basic probability
  • B i ) is the hit rate
  • B j ) is the false alarm rate.
  • the present invention provides an online network user group attribute analysis system.
  • the system is aimed at students who are in the student period.
  • the system can supervise the electronic devices that can be connected to the Internet to a certain extent.
  • the system can be hidden in the electronic devices without being discovered, and the users can be supervised within the scope of authority, thereby avoiding the resistance of students.
  • it protects the privacy of students, assists parents and teachers, and can provide more appropriate care and guidance for students, as well as correct guidance on the road of life, to ensure their healthy growth.
  • the present invention can be adapted according to the stage of the student's goal, so that the privacy of the student is further protected during use, and the use is relatively safe, and parents or teachers can only get the final report result. While respecting the student, it ensures that the student's improper behavior is caught, so that the parent or teacher can guide the student in a more timely manner.
  • the trusted device-side control user can be in charge, and the actual inspection is carried out according to the data reported by the system, so as to ensure that even if there is an error in the data obtained by the system, the trusted device-side control user can detect even if there is an error, so as to make more accurate judgments and actual actions.
  • the present invention provides an online network user group attribute analysis method. Through this method, parents of students can understand their children better, and teachers can understand their students better, so as to make some predictive and reasonable guiding interventions, so that students can proactively reject the next bad information in the network that will occur next time, so as to achieve the purpose of establishing a correct outlook on life and values more independently.
  • Fig. 1 is the structural representation of the user group attribute analysis system based on online network
  • Fig. 2 is a schematic flow chart of a user group attribute analysis method based on an online network
  • the labels in the figure respectively represent: 1. system terminal; 11. control terminal; 2. implant module; 21. security system; 211. stealth module; 212. secret key source library; 213. authorization module; 214. keyword library; 215. statistics module;
  • the online network-based user group attribute analysis system of the present embodiment includes:
  • the system terminal 1 is the general control terminal of the system, and is used to issue execution commands for execution by the lower-level modules.
  • the implant module 2 is used for implanting the system in the mobile device used by the user.
  • Compatible module 3 is used to obtain configuration data of mobile devices implanted in the system.
  • the retrieval module 4 is configured to retrieve the stored data in the storage space of the mobile device.
  • the evaluation module 5 is used to evaluate whether there is any abnormality in the content of the data stored in the retrieval module 4, and the proportion of abnormal data.
  • the determination module 6 is used to determine the user attribute of the system terminal 1 .
  • the coordination module 7 is configured to receive the user attributes determined by the determination module 6, and coordinate the evaluation indicators of the evaluation module 5 according to the user attributes.
  • the reporting module 8 is used to report the coordination results of the coordination module 7 to the superior system terminal 1 and the control terminal 11; wherein the system terminal 1 is a post-setting report, and selectively reports to the system terminal 1 after the control terminal 11 receives the report result.
  • the system is installed in the mobile device used by the client through the implant module 2, and the configuration data of the mobile device implanted in the system can be obtained through the compatible module 3, and the existing content in the mobile device is obtained, and then the existing stored data content is retrieved through the retrieval module 4, so that the data is evaluated by the evaluation module 5, and whether there is abnormality in the stored data content in the retrieval module 4, and the proportion of abnormal data, so that the attribute of the user of the system terminal 1 and the user terminal can be determined through the determination module 6.
  • the system can coordinate the evaluation index of the evaluation module 5 according to user attributes through the coordination module 7 .
  • reporting module 8 can report the coordination result of the coordination module 7 to the superior system terminal 1 and the control terminal 11, so that the management user at the trusted end knows in real time whether there is any abnormal behavior in the process of operating the mobile device at the user end.
  • the implanted module 2 establishes a security system 21 with a wireless network, including:
  • the stealth module 211 is used to hide the system in the mobile device loaded with the system.
  • the key source library 212 is used to randomly generate a time-limited key in real time for use by the control terminal 11 , and the system terminal 1 is used to control the login system.
  • the authorization module 213 is configured to authorize the security system 21 to obtain the master system use record.
  • the keyword library 214 is used to store abnormal words for the statistics module 215 to perform comparison and statistics.
  • the statistical module 215 is configured to count the number of targets matched with the keyword database 214 in the master system usage records acquired by the authorization module 213 .
  • the stealth module 211 serves the main system so that the system can be hidden in the mobile device without being noticed. Every time the trusted device user needs to enter the system to view the data information in the system terminal 1 obtained and recorded in the system, he can randomly generate a time-limited key through the key source library 212 for the trusted device to perform identity verification and then enter the system.
  • the keyword library 214 is used synchronously to compare with the data information captured in the system, and then the statistical module 215 is used to obtain statistical results, so as to assist and trust the device-side users to judge whether the system terminal 1 has abnormal behavior during the use of mobile devices, so as to take actions according to the actual situation to ensure that the users of the system terminal 1 use the network under a healthy, safe and stable network.
  • the retrieval module 4 establishes a connection with the statistical module 215 through a wireless network for data transmission.
  • the retrieval module 4 When the retrieval module 4 is running, it simultaneously obtains the target quantity that matches the keyword library 214 in the main system usage records obtained in the statistical module 215, and further participates in the operation of the evaluation module 5.
  • This setting can provide the evaluation module 5 with an accurate evaluation target, and assist the evaluation module 5 to make a more accurate judgment.
  • the evaluation module 5 and the determination module 6 are connected in parallel to the main control module 561 through a medium, and are used to replace the evaluation module 5 and the determination module 6 for execution.
  • the main control system ie, the main control module 561 modifies or matches the user attributes of the system terminal 1.
  • the trusted device side and the control terminal 11 can be used to control the system in two ways, so as to provide convenience for the control terminal 11 and enable the system to be used better.
  • the first to fourth grades of evaluation indicators in the evaluation module 5 correspond to: primary school, junior high school, high school, university and above.
  • this embodiment further specifically explains the user group attribute analysis system of the online network in Embodiment 1 with reference to FIG. 1.
  • the user group attribute analysis method based on the online network includes the following steps:
  • Step1 Implant the system in the mobile device of the user end, so that the system enters a stealth state and cannot be retrieved by the system program in the mobile device.
  • Step2 Set up the recording program, connect the trusted device to connect to the stealth system in the client mobile device.
  • Step3 Set the abnormal behavior capture trigger conditions, match the abnormal behavior capture trigger conditions and the level of the mobile device client, and actively coordinate the compatibility between the trigger conditions and the mobile device client level after logging in on the trusted device.
  • Step4 Trust the device side to periodically use the secret key to verify the identity and log in to the control side to retrieve the relevant report files of the user side in the database for attribute analysis and evaluation.
  • Step5 The operation terminal of the trusted device establishes a communication connection with the user terminal to guide it according to the analysis and evaluation results of the relevant report file attributes of the corresponding user terminal.
  • the trusted device connects to the hidden system in the mobile device through the public key of the local wireless network.
  • the trusted device uses the secret key to verify the identity of the operator.
  • the hidden system in the user's mobile device includes a recording program.
  • the user's mobile device and the trusted device are in the same local area network, it automatically corrects and establishes a data transmission channel. After the data transmission channel is established, the user's mobile device transmits the recording program record data to the trusted device.
  • the step Step2 includes a recording program, including the following steps:
  • Step21 Analyze the attributes of the user terminal, match the abnormal behavior capture authority of the user terminal mobile device, and capture the operation behavior that the user terminal uses on its mobile device that meets the characteristics of abnormal behavior according to the abnormal behavior capture authority matched by the user terminal mobile device.
  • Step22 Summarize the abnormal behavior of the mobile device on the client side to generate a report file, compare the selectivity of the report file with the abnormal behavior capture permission, and send it to the trusted device for waiting.
  • Step23 Create a database, and after the trusted device confirms the report file, transfer the report file to the database to create a root directory storage.
  • step Step5 includes sub-step Step51: check the abnormal behavior captured in the report file, retrieve the network IP address related to the abnormal behavior for further analysis, and perform adaptive processing on the content of the network IP address related to the retrieved abnormal behavior.
  • the adaptive processing plan for the network IP address content related to abnormal behavior includes: reporting, banning, jumping and synchronous feedback.
  • Step 2 when the user of the trusted device is online, the abnormal behavior prediction function formula is selectively used to calculate the next abnormal behavior occurrence probability of the mobile device of the user, the formula is as follows:
  • P(B i ), P(B j ) are the basic probability; P(A
  • the user of the trusted device can perform further calculations to calculate the abnormal behavior that may occur in the next period of time when the mobile device of the user is used by the user, thereby assisting the user of the trusted device to conduct reasonable supervision on the users of the mobile device of the user, so as to guide the abnormal behavior before it occurs, so that the user of the mobile device of the user can obtain a better growth environment.
  • the present invention provides an online network user group attribute analysis system.
  • the system is aimed at students who are in the student period, and can supervise their electronic devices that can be connected to the Internet to a certain extent.
  • the system can be hidden in electronic devices without being discovered, and supervise users within the scope of authority, thereby avoiding students' resistance, while protecting students' privacy, assisting parents and teachers, and providing more appropriate care and teaching for students, correct guidance on the road of life, and ensuring their healthy growth;
  • the present invention can carry out adaptive allocation according to the stage of the student's goal, thereby further protecting the privacy of the students during use, and the use is relatively safe, and the parents or teachers can only get the final report result, while respecting the students, it ensures that the students' improper behaviors are caught, so that the parents or teachers can guide the students in a more timely manner; Discovery, so as to make more accurate judgments and practical actions.
  • the present invention provides an online network user group attribute analysis method. Through this method, parents of students can better understand their children, and teachers can better understand their students, so as to make some predictable and reasonable guiding interventions, so that students can proactively reject the next bad information in the network that will occur next time, so as to achieve the purpose of establishing a correct outlook on life and values more independently.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Primary Health Care (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Marketing (AREA)
  • Human Resources & Organizations (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the technical field of network big data capture, and in particular to a user group attribute analysis system and method based on an online network. The system comprises: a system terminal which is a master control end of the system and is used for issuing an execution command for each lower-level module to execute; an implanting module used for implanting the system to a mobile device used by a user; a compatible module used for obtaining configuration data of the mobile device into which the system is implanted; and a retrieving module used for retrieving stored data in a storage space of the mobile device. The present invention provides a user group attribute analysis system based on an online network. The system can supervise, to a certain extent, electronic devices which are used by people in a student period and can be networked, and the system is hidden in the electronic devices and cannot be found, so that the conflict psychology of the students is avoided, the privacy of the students is protected, parents and teachers are assisted, the students can be cared and taught more appropriately and can be guided correctly, and healthy growth of the students can be guaranteed.

Description

基于在线网络的用户群体属性分析系统及方法System and method for user group attribute analysis based on online network
本申请要求于2022年01月20日提交中国专利局、申请号为202210067593.8、发明名称为“基于在线网络的用户群体属性分析系统及方法”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 202210067593.8 and the invention title "Online Network-Based User Group Attribute Analysis System and Method" submitted to the China Patent Office on January 20, 2022, the entire contents of which are incorporated in this application by reference.
技术领域technical field
本发明涉及网络大数据捕捉技术领域,具体涉及基于在线网络的用户群体属性分析系统及方法。The invention relates to the technical field of network big data capture, in particular to an online network-based user group attribute analysis system and method.
背景技术Background technique
随着社会的发展与进步,电子设备的使用逐渐低龄化,除学前教育外,孩童、青少年、青年基本均已配备手机,然而手机等相关电子设备在连接网络的情况下可从网络搜集大量的数据信息,其中不乏含杂有一些不健康、观念不正当的信息,若被不具有足够正当辨识及观念的未成年及弱冠人群所阅览可能会导致其被错误的引导,因而降低了教育的所能树立的正当观点,从而使得其误入歧途概率增加。With the development and progress of society, the use of electronic devices has gradually become younger. Except for preschool education, children, adolescents, and young people are basically equipped with mobile phones. However, mobile phones and other related electronic devices can collect a large amount of data from the Internet when they are connected to the Internet. Many of them contain some unhealthy and improper ideas. .
现如今,对于家长、老师能够给予学生人群的引导有限,若学生处于叛逆期,采用网络限制的方法无法根治问题之关键,对于网络方面如何循循善诱学生树立正确的人生观、价值观是现今教育的一大难题。Nowadays, parents and teachers can give limited guidance to students. If students are in a rebellious period, the key to the problem cannot be solved by using network restrictions. How to guide students to establish a correct outlook on life and values in the network is a major problem in today's education.
发明内容Contents of the invention
解决的技术问题Technical issues resolved
针对现有技术所存在的上述缺点,本发明提供了基于在线网络的用户群体属性分析系统及方法,解决了现今技术无法较佳的引导学生的在网行为,导致学生因接触网络而被网络信息中不利身心健康数据影响下产生错误人生观、价值观的问题。Aiming at the above-mentioned shortcomings in the prior art, the present invention provides an online network-based user group attribute analysis system and method, which solves the problem that the current technology cannot better guide students' online behaviors, causing students to have wrong outlooks on life and values under the influence of unfavorable physical and mental health data in network information due to their contact with the Internet.
技术方案Technical solutions
为实现以上目的,本发明通过以下技术方案予以实现:To achieve the above object, the present invention is achieved through the following technical solutions:
第一方面,基于在线网络的用户群体属性分析系统,包括:In the first aspect, an online network-based user group attribute analysis system includes:
系统终端,是系统的总控制端,用于发出执行命令供下级各模块执行;The system terminal is the general control terminal of the system, which is used to issue execution commands for execution by the lower-level modules;
植入模块,用于植入系统载于用户所用的移动设备;An implant module, used to implant the system on the mobile device used by the user;
兼容模块,用于获取植入该系统移动设备配置数据;Compatible module, used to obtain configuration data of mobile devices implanted in the system;
检索模块,用于检索移动设备存储空间中的存储数据;A retrieval module, configured to retrieve stored data in the storage space of the mobile device;
评估模块,用于评估检索模块中存储数据内容是否存在异常,及异常数据占比;The evaluation module is used to evaluate whether there is any abnormality in the content of the stored data in the retrieval module, and the proportion of abnormal data;
判定模块,用于判定系统终端用户属性;A judging module, used for judging the attributes of the system end users;
协调模块,用于接收判定模块判定的用户属性,根据用户属性对评估模块的评估指标进行协调;A coordination module, configured to receive the user attributes determined by the determination module, and coordinate the evaluation indicators of the evaluation module according to the user attributes;
汇报模块,用于将协调模块协调结果向上级系统终端及控制终端;其中系统终端为后置位汇报,在控制终端接收汇报结果后选择性向系统终端汇报。The reporting module is used to send the coordination results of the coordination module to the superior system terminal and the control terminal; the system terminal is a post-setting report, and selectively reports to the system terminal after the control terminal receives the report result.
更进一步地,所述植入模块中以无线网络建立安全系统,包括:Furthermore, the wireless network is used to establish a security system in the implanted module, including:
隐身模块,用于隐身系统在载入该系统的移动设备中;The stealth module is used to hide the system in the mobile device loaded with the system;
秘钥源库,用于实时随机生成限时秘钥供控制终端使用,登录系统以系统终端进行操控;The secret key source library is used to randomly generate time-limited secret keys in real time for the use of the control terminal, and log in to the system to control the system terminal;
授权模块,用于授权安全系统获取主系统使用记录;The authorization module is used to authorize the security system to obtain the usage record of the main system;
关键词库,用于存储异常词汇供统计模块进行比对后统计;The keyword library is used to store abnormal words for statistics after comparison by the statistics module;
统计模块,用于统计授权模块获取到的主系统使用记录中与关键词库相匹配的目标数量。The statistical module is used to count the number of targets matching the keyword library in the usage records of the main system acquired by the authorization module.
更进一步地,所述检索模块通过无线网络与统计模块建立连接进行数据传输,在检索模块运行时同步获取统计模块中获取到的主系统使用记录中与关键词库相匹配的目标数量,并进一步参与评估模块运行。Furthermore, the retrieval module establishes a connection with the statistics module through a wireless network for data transmission, and synchronously obtains the target quantity in the usage records of the main system obtained in the statistics module that matches the keyword library when the retrieval module is running, and further participates in the operation of the evaluation module.
更进一步地,所述评估模块与判定模块通过介质并联连接主控模块,用于代替评估模块与判定模块执行,主控系统对系统终端用户属性进行修改或匹配制定。Furthermore, the evaluation module and the judgment module are connected in parallel to the main control module through a medium, and are used to replace the evaluation module and the judgment module for execution, and the main control system modifies or matches the end user attributes of the system.
更进一步地,所述评估模块中评估指标一至四级分别对应:小学、初中、高中、大学及以上。Furthermore, the first to fourth grades of evaluation indicators in the evaluation module correspond to: primary school, junior high school, high school, university and above.
第二方面,基于在线网络的用户群体属性分析方法,包括以下步骤:In the second aspect, an online network-based user group attribute analysis method includes the following steps:
Step1:在用户端的移动设备中植入系统,使系统进入隐身状态无法被移动设备中系统程序所检索;Step1: Implant the system in the mobile device of the client, so that the system enters a stealth state and cannot be retrieved by the system program in the mobile device;
Step2:设置记录程序,连接信任设备对接用户端移动设备中隐身系统;Step2: Set up the recording program, connect the trusted device to connect to the stealth system in the client mobile device;
Step3:设置异常行为捕捉触发条件,匹配异常行为捕捉触发条件与移动设备用户端的等级,在信任设备端登录后主动性协调触发条件与移动设备用户端的等级兼容度;Step3: Set the abnormal behavior capture trigger conditions, match the abnormal behavior capture trigger conditions with the level of the mobile device client, and actively coordinate the compatibility between the trigger conditions and the mobile device client level after logging in on the trusted device;
Step4:信任设备端周期制使用秘钥验证身份登录控制端调取数据库中用户端相关汇报文件进行属性分析评估;Step4: Trust the device side to periodically use the secret key to verify the identity and log in to the control side to retrieve the relevant report files of the user side in the database for attribute analysis and evaluation;
Step5:信任设备操作端根据对应用户端相关汇报文件属性分析评估结果与用户端建立通讯连接对其进行引导。Step5: The trusted device operation terminal establishes a communication connection with the user terminal to guide it according to the attribute analysis and evaluation results of the relevant report file of the corresponding user terminal.
更进一步地,步骤Step2中,信任设备连接移动设备中隐身的系统通过局域无线网络公用秘钥进行连接,信任设备每次与用户的移动设备建立连接时,使用秘钥验证操作者身份,用户端移动设备中所隐身的系统包括记录程序,在用户端移动设备与信任设备处于同一局域网络下自动校正建立数据传输通道,在数据传输通道建立结束后用户端移动设备向信任设备端传输记录程序记录数据。Furthermore, in Step 2, the trusted device connects to the hidden system in the mobile device through the public key of the local wireless network. When the trusted device establishes a connection with the user's mobile device, it uses the secret key to verify the identity of the operator. The hidden system in the user's mobile device includes a recording program. When the user's mobile device and the trusted device are in the same local area network, it automatically corrects and establishes a data transmission channel. After the data transmission channel is established, the user's mobile device transmits the recording program record data to the trusted device.
更进一步地,步骤Step2中包含有记录程序,包括以下步骤:Furthermore, the step Step2 includes a recording program, including the following steps:
Step21:分析用户端属性,匹配用户端移动设备异常行为捕捉权限,根据用户端移动设备所匹配的异常行为捕捉权限捕捉用户端在其移动设备上使用的符合异常行为特征的操作行为;Step21: Analyze the attributes of the user terminal, match the abnormal behavior capture authority of the mobile device of the user terminal, and capture the operation behavior of the user terminal on its mobile device that meets the characteristics of abnormal behavior according to the abnormal behavior capture authority matched by the mobile device of the user terminal;
Step22:汇总用户端移动设备异常行为生成汇报文件,将汇报文件选择性与异常行为捕捉权限进行比对后发送至信任设备中等待;Step22: Summarize the abnormal behavior of the mobile device on the client side to generate a report file, compare the selectivity of the report file with the abnormal behavior capture permission, and send it to the trusted device for waiting;
Step23:建立数据库,在信任设备确认汇报文件后,将汇报文件传输至数据库中建立根录存储。Step23: Create a database, and after the trusted device confirms the report file, transfer the report file to the database to create a root directory storage.
更进一步地,步骤Step5中包含有子步骤Step51:查看汇报文件中捕捉到的异常行为,检索异常行为相关网络IP地址做进一步分析,对经检索异常行为相关网络IP地址内容进行适配性处理;Furthermore, step Step5 includes a sub-step Step51: check the abnormal behavior captured in the report file, retrieve the network IP address related to the abnormal behavior for further analysis, and perform adaptive processing on the content of the network IP address related to the retrieved abnormal behavior;
其中,异常行为相关网络IP地址内容进行适配性处理方案包括:举报、禁用、跳转及同步反馈。Among them, the adaptive processing plan for the network IP address content related to abnormal behavior includes: reporting, banning, jumping and synchronous feedback.
更进一步地,步骤Step2中信任设备端用户处于在线状态下,选择性使用异常行为预测函数公式计算用户端移动设备接下来的异常行为出现概率,公式如下:Furthermore, in Step 2, when the user of the trusted device is online, the abnormal behavior prediction function formula is selectively used to calculate the next occurrence probability of abnormal behavior of the mobile device of the user, the formula is as follows:
Figure PCTCN2022122430-appb-000001
Figure PCTCN2022122430-appb-000001
式中:P(B i)、P(B j)为基础概率; In the formula: P(B i ), P(B j ) are the basic probability;
P(A|B i)为击中率; P(A|B i ) is the hit rate;
P(A|B j)为误报率。 P(A|B j ) is the false alarm rate.
有益效果Beneficial effect
采用本发明提供的技术方案,与已知的公有技术相比,具有如下有益效果:Compared with the known public technology, the technical solution provided by the invention has the following beneficial effects:
1、本发明提供一种在线网络的用户群体属性分析系统,该系统针对于处于学生时期的人群,能够对其使用的能够联网的电子设备进行一定程度的监管,该系统能够藏匿于电子设备中不被发现,对使用者进行权限范围内的监管,从而避免了学生的抵触心理,同时保护了学生的隐私,辅助家长老师,能够对学生进行更加贴切的关怀与教导、人生道路上的正确引导,保证其健康成长。1. The present invention provides an online network user group attribute analysis system. The system is aimed at students who are in the student period. The system can supervise the electronic devices that can be connected to the Internet to a certain extent. The system can be hidden in the electronic devices without being discovered, and the users can be supervised within the scope of authority, thereby avoiding the resistance of students. At the same time, it protects the privacy of students, assists parents and teachers, and can provide more appropriate care and guidance for students, as well as correct guidance on the road of life, to ensure their healthy growth.
2、本发明能够根据学生目标的所处阶段进行适应性的调配,从而在使用时更进一步保护了学生的隐私,使用较为安全,且家长或老师仅能得到最终的汇报结果,在尊重学生的同时保证了学生的不正当行为得到捕捉,使得家长或老师更加及时的对学生进行引导。2. The present invention can be adapted according to the stage of the student's goal, so that the privacy of the student is further protected during use, and the use is relatively safe, and parents or teachers can only get the final report result. While respecting the student, it ensures that the student's improper behavior is caught, so that the parent or teacher can guide the student in a more timely manner.
3、本发明在使用过程中信任设备端控制用户能够主控,根据系统所汇报的数据进行实际的查验,保证系统的所得数据结果即使出现误差也能够被信任设备端控制用户即使发觉,从而做出更加准确的判断与实际行动。3. In the process of using the present invention, the trusted device-side control user can be in charge, and the actual inspection is carried out according to the data reported by the system, so as to ensure that even if there is an error in the data obtained by the system, the trusted device-side control user can detect even if there is an error, so as to make more accurate judgments and actual actions.
4、本发明提供一种在线网络的用户群体属性分析方法,通过该方法,可以使得学生家长能够更加了解自己的孩子、老师能够更加了解自己的学生,从而以此做出一些具有预判性的合理的引导干涉,使得学生能够在面对下一次将要发生的网络中不良信息时,主动性地拒绝,从而达到更加自主的树立正确的人生观、价值观的目的。4. The present invention provides an online network user group attribute analysis method. Through this method, parents of students can understand their children better, and teachers can understand their students better, so as to make some predictive and reasonable guiding interventions, so that students can proactively reject the next bad information in the network that will occur next time, so as to achieve the purpose of establishing a correct outlook on life and values more independently.
说明书附图Instructions attached
为了更清楚地说明本发明或现有技术中的技术方案,下面将对实施例 或现有技术描述中所需要使用的附图作简单地介绍。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the present invention or the technical solution in the prior art more clearly, the accompanying drawings that need to be used in the description of the embodiments or the prior art will be briefly introduced below. Apparently, the drawings in the following description are only some embodiments of the present invention, and those skilled in the art can obtain other drawings according to these drawings without creative efforts.
图1为基于在线网络的用户群体属性分析系统的结构示意图;Fig. 1 is the structural representation of the user group attribute analysis system based on online network;
图2为基于在线网络的用户群体属性分析方法的流程示意图;Fig. 2 is a schematic flow chart of a user group attribute analysis method based on an online network;
图中的标号分别代表:1、系统终端;11、控制终端;2、植入模块;21、安全系统;211、隐身模块;212、秘钥源库;213、授权模块;214、关键词库;215、统计模块;3、兼容模块;4、检索模块;5、评估模块;6、判定模块;561、主控模块;7、协调模块;8、汇报模块。The labels in the figure respectively represent: 1. system terminal; 11. control terminal; 2. implant module; 21. security system; 211. stealth module; 212. secret key source library; 213. authorization module; 214. keyword library; 215. statistics module;
具体实施方式Detailed ways
为使本发明的目的、技术方案和优点更加清楚,下面将结合本发明中的附图,对本发明中的技术方案进行清楚、完整地描述。显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the present invention. Apparently, the described embodiments are some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.
下面结合实施例对本发明作进一步的描述。The present invention will be further described below in conjunction with embodiment.
实施例1Example 1
本实施例的基于在线网络的用户群体属性分析系统,如图1所示,包括:The online network-based user group attribute analysis system of the present embodiment, as shown in Figure 1, includes:
系统终端1,是系统的总控制端,用于发出执行命令供下级各模块执行。The system terminal 1 is the general control terminal of the system, and is used to issue execution commands for execution by the lower-level modules.
植入模块2,用于植入系统载于用户所用的移动设备。The implant module 2 is used for implanting the system in the mobile device used by the user.
兼容模块3,用于获取植入该系统移动设备配置数据。 Compatible module 3 is used to obtain configuration data of mobile devices implanted in the system.
检索模块4,用于检索移动设备存储空间中的存储数据。The retrieval module 4 is configured to retrieve the stored data in the storage space of the mobile device.
评估模块5,用于评估检索模块4中存储数据内容是否存在异常,及异常数据占比。The evaluation module 5 is used to evaluate whether there is any abnormality in the content of the data stored in the retrieval module 4, and the proportion of abnormal data.
判定模块6,用于判定系统终端1用户属性。The determination module 6 is used to determine the user attribute of the system terminal 1 .
协调模块7,用于接收判定模块6判定的用户属性,根据用户属性对评估模块5的评估指标进行协调。The coordination module 7 is configured to receive the user attributes determined by the determination module 6, and coordinate the evaluation indicators of the evaluation module 5 according to the user attributes.
汇报模块8,用于将协调模块7协调结果向上级系统终端1及控制终 端11汇报;其中系统终端1为后置位汇报,在控制终端11接收汇报结果后选择性向系统终端1汇报。The reporting module 8 is used to report the coordination results of the coordination module 7 to the superior system terminal 1 and the control terminal 11; wherein the system terminal 1 is a post-setting report, and selectively reports to the system terminal 1 after the control terminal 11 receives the report result.
在本实施例使用时,该系统通过植入模块2安装于用户端所用的移动设备中,通过兼容模块3能够获取到植入该系统移动设备配置数据,得到移动设备中已有内容,进而通过检索模块4对存储已有的存储数据内容进行检索,使得数据被评估模块5进行评估,判断检索模块4中存储数据内容是否存在异常,及异常数据占比,从而得以通过判定模块6判定系统终端1用户及用户端的属性。When used in this embodiment, the system is installed in the mobile device used by the client through the implant module 2, and the configuration data of the mobile device implanted in the system can be obtained through the compatible module 3, and the existing content in the mobile device is obtained, and then the existing stored data content is retrieved through the retrieval module 4, so that the data is evaluated by the evaluation module 5, and whether there is abnormality in the stored data content in the retrieval module 4, and the proportion of abnormal data, so that the attribute of the user of the system terminal 1 and the user terminal can be determined through the determination module 6.
进一步,当系统终端1所服务的目标成长,该系统能够通过协调模块7根据用户属性对评估模块5的评估指标进行协调。Further, when the target served by the system terminal 1 grows, the system can coordinate the evaluation index of the evaluation module 5 according to user attributes through the coordination module 7 .
并且,汇报模块8能够将协调模块7协调结果向上级系统终端1及控制终端11汇报,从而使得信任端的管理用户实时知晓用户端操作移动设备的过程中是否存在异常行为。In addition, the reporting module 8 can report the coordination result of the coordination module 7 to the superior system terminal 1 and the control terminal 11, so that the management user at the trusted end knows in real time whether there is any abnormal behavior in the process of operating the mobile device at the user end.
实施例2Example 2
在具体实施层面,本实施例中图1中所示,植入模块2中以无线网络建立安全系统21,包括:In terms of specific implementation, as shown in Figure 1 in this embodiment, the implanted module 2 establishes a security system 21 with a wireless network, including:
隐身模块211,用于隐身系统在载入该系统的移动设备中。The stealth module 211 is used to hide the system in the mobile device loaded with the system.
秘钥源库212,用于实时随机生成限时秘钥供控制终端11使用,登录系统以系统终端1进行操控。The key source library 212 is used to randomly generate a time-limited key in real time for use by the control terminal 11 , and the system terminal 1 is used to control the login system.
授权模块213,用于授权安全系统21获取主系统使用记录。The authorization module 213 is configured to authorize the security system 21 to obtain the master system use record.
关键词库214,用于存储异常词汇供统计模块215进行比对后统计。The keyword library 214 is used to store abnormal words for the statistics module 215 to perform comparison and statistics.
统计模块215,用于统计授权模块213获取到的主系统使用记录中与关键词库214相匹配的目标数量。The statistical module 215 is configured to count the number of targets matched with the keyword database 214 in the master system usage records acquired by the authorization module 213 .
在本实施例使用过程中,隐身模块211服务于主系统使得系统能够藏匿于移动设备中不被察觉,在每次信任设备端用户需要进入系统查看系统中所获取记录到的系统终端1中的数据信息时,即可通过秘钥源库212随机生成限时秘钥供信任设备端进行身份验证后进入系统。During the use of this embodiment, the stealth module 211 serves the main system so that the system can be hidden in the mobile device without being noticed. Every time the trusted device user needs to enter the system to view the data information in the system terminal 1 obtained and recorded in the system, he can randomly generate a time-limited key through the key source library 212 for the trusted device to perform identity verification and then enter the system.
同时在进入系统后,同步的使用关键词库214与系统中所捕捉到的数据信息进行运算比对,再有统计模块215得出统计结果,以此辅助与信任设备端用户,判断系统终端1是否在使用移动设备期间,存在异常行为, 从而根据实际情况做出行动,保证系统终端1的用户处于一个健康、安全稳定网络下对网络进行使用。At the same time, after entering the system, the keyword library 214 is used synchronously to compare with the data information captured in the system, and then the statistical module 215 is used to obtain statistical results, so as to assist and trust the device-side users to judge whether the system terminal 1 has abnormal behavior during the use of mobile devices, so as to take actions according to the actual situation to ensure that the users of the system terminal 1 use the network under a healthy, safe and stable network.
如图1所示,检索模块4通过无线网络与统计模块215建立连接进行数据传输,在检索模块4运行时同步获取统计模块215中获取到的主系统使用记录中与关键词库214相匹配的目标数量,并进一步参与评估模块5运行。As shown in FIG. 1 , the retrieval module 4 establishes a connection with the statistical module 215 through a wireless network for data transmission. When the retrieval module 4 is running, it simultaneously obtains the target quantity that matches the keyword library 214 in the main system usage records obtained in the statistical module 215, and further participates in the operation of the evaluation module 5.
通过该设置能够提供评估模块5以精准的评估目标,辅助评估模块5做出更加精确的判断。This setting can provide the evaluation module 5 with an accurate evaluation target, and assist the evaluation module 5 to make a more accurate judgment.
如图1所示,评估模块5与判定模块6通过介质并联连接主控模块561,用于代替评估模块5与判定模块6执行,主控系统(即主控模块561)对系统终端1用户属性进行修改或匹配制定。As shown in FIG. 1 , the evaluation module 5 and the determination module 6 are connected in parallel to the main control module 561 through a medium, and are used to replace the evaluation module 5 and the determination module 6 for execution. The main control system (ie, the main control module 561) modifies or matches the user attributes of the system terminal 1.
通过该设置能提供信任设备端及控制终端11以两种方式来对系统进行需求性的主控,从而为控制终端11提供便利,使得该系统能够更好的被使用。Through this setting, the trusted device side and the control terminal 11 can be used to control the system in two ways, so as to provide convenience for the control terminal 11 and enable the system to be used better.
如图1所示,评估模块5中评估指标一至四级分别对应:小学、初中、高中、大学及以上。As shown in Figure 1, the first to fourth grades of evaluation indicators in the evaluation module 5 correspond to: primary school, junior high school, high school, university and above.
实施例3Example 3
在具体实施层面,在实施例1的基础上,本实施例参照图1所示对实施例1中在线网络的用户群体属性分析系统做进一步具体说明,如图2所示,基于在线网络的用户群体属性分析方法,包括以下步骤:At the specific implementation level, on the basis of Embodiment 1, this embodiment further specifically explains the user group attribute analysis system of the online network in Embodiment 1 with reference to FIG. 1. As shown in FIG. 2, the user group attribute analysis method based on the online network includes the following steps:
Step1:在用户端的移动设备中植入系统,使系统进入隐身状态无法被移动设备中系统程序所检索。Step1: Implant the system in the mobile device of the user end, so that the system enters a stealth state and cannot be retrieved by the system program in the mobile device.
Step2:设置记录程序,连接信任设备对接用户端移动设备中隐身系统。Step2: Set up the recording program, connect the trusted device to connect to the stealth system in the client mobile device.
Step3:设置异常行为捕捉触发条件,匹配异常行为捕捉触发条件与移动设备用户端的等级,在信任设备端登录后主动性协调触发条件与移动设备用户端的等级兼容度。Step3: Set the abnormal behavior capture trigger conditions, match the abnormal behavior capture trigger conditions and the level of the mobile device client, and actively coordinate the compatibility between the trigger conditions and the mobile device client level after logging in on the trusted device.
Step4:信任设备端周期制使用秘钥验证身份登录控制端调取数据库中用户端相关汇报文件进行属性分析评估。Step4: Trust the device side to periodically use the secret key to verify the identity and log in to the control side to retrieve the relevant report files of the user side in the database for attribute analysis and evaluation.
Step5:信任设备操作端根据对应用户端相关汇报文件属性分析评估 结果与用户端建立通讯连接对其进行引导。Step5: The operation terminal of the trusted device establishes a communication connection with the user terminal to guide it according to the analysis and evaluation results of the relevant report file attributes of the corresponding user terminal.
如图2所示,步骤Step2中,信任设备连接移动设备中隐身的系统通过局域无线网络公用秘钥进行连接,信任设备每次与用户的移动设备建立连接时,使用秘钥验证操作者身份,用户端移动设备中所隐身的系统包括记录程序,在用户端移动设备与信任设备处于同一局域网络下自动校正建立数据传输通道,在数据传输通道建立结束后用户端移动设备向信任设备端传输记录程序记录数据。As shown in Figure 2, in Step 2, the trusted device connects to the hidden system in the mobile device through the public key of the local wireless network. When the trusted device establishes a connection with the user's mobile device, it uses the secret key to verify the identity of the operator. The hidden system in the user's mobile device includes a recording program. When the user's mobile device and the trusted device are in the same local area network, it automatically corrects and establishes a data transmission channel. After the data transmission channel is established, the user's mobile device transmits the recording program record data to the trusted device.
如图2所示,步骤Step2中包含有记录程序,包括以下步骤:As shown in Figure 2, the step Step2 includes a recording program, including the following steps:
Step21:分析用户端属性,匹配用户端移动设备异常行为捕捉权限,根据用户端移动设备所匹配的异常行为捕捉权限捕捉用户端在其移动设备上使用的符合异常行为特征的操作行为。Step21: Analyze the attributes of the user terminal, match the abnormal behavior capture authority of the user terminal mobile device, and capture the operation behavior that the user terminal uses on its mobile device that meets the characteristics of abnormal behavior according to the abnormal behavior capture authority matched by the user terminal mobile device.
Step22:汇总用户端移动设备异常行为生成汇报文件,将汇报文件选择性与异常行为捕捉权限进行比对后发送至信任设备中等待。Step22: Summarize the abnormal behavior of the mobile device on the client side to generate a report file, compare the selectivity of the report file with the abnormal behavior capture permission, and send it to the trusted device for waiting.
Step23:建立数据库,在信任设备确认汇报文件后,将汇报文件传输至数据库中建立根录存储。Step23: Create a database, and after the trusted device confirms the report file, transfer the report file to the database to create a root directory storage.
如图2所示,步骤Step5中包含有子步骤Step51:查看汇报文件中捕捉到的异常行为,检索异常行为相关网络IP地址做进一步分析,对经检索异常行为相关网络IP地址内容进行适配性处理。As shown in Figure 2, step Step5 includes sub-step Step51: check the abnormal behavior captured in the report file, retrieve the network IP address related to the abnormal behavior for further analysis, and perform adaptive processing on the content of the network IP address related to the retrieved abnormal behavior.
其中,异常行为相关网络IP地址内容进行适配性处理方案包括:举报、禁用、跳转及同步反馈。Among them, the adaptive processing plan for the network IP address content related to abnormal behavior includes: reporting, banning, jumping and synchronous feedback.
另外,步骤Step2中信任设备端用户处于在线状态下,选择性使用异常行为预测函数公式计算用户端移动设备接下来的异常行为出现概率,公式如下:In addition, in Step 2, when the user of the trusted device is online, the abnormal behavior prediction function formula is selectively used to calculate the next abnormal behavior occurrence probability of the mobile device of the user, the formula is as follows:
Figure PCTCN2022122430-appb-000002
Figure PCTCN2022122430-appb-000002
式中:P(B i)、P(B j)为基础概率;P(A|B i)为击中率;P(A|B j)为误报率。 In the formula: P(B i ), P(B j ) are the basic probability; P(A|B i ) is the hit rate; P(A|B j ) is the false alarm rate.
通过该公式,信任设备端用户可进行进一步的计算,从而计算用户端移动设备在被用户使用时,接下来一段时间可能出现的异常行为,从而辅助信任设备用户端对用户端移动设备所使用的用户进行合理的监管,从而 在异常行为出现之前加以引导,使得用户端移动设备使用用户得到更加良好的成长环境。Through this formula, the user of the trusted device can perform further calculations to calculate the abnormal behavior that may occur in the next period of time when the mobile device of the user is used by the user, thereby assisting the user of the trusted device to conduct reasonable supervision on the users of the mobile device of the user, so as to guide the abnormal behavior before it occurs, so that the user of the mobile device of the user can obtain a better growth environment.
综上而言,本发明提供一种在线网络的用户群体属性分析系统,该系统针对于处于学生时期的人群,能够对其使用的能够联网的电子设备进行一定程度的监管,该系统能够藏匿于电子设备中不被发现,对使用者进行权限范围内的监管,从而避免了学生的抵触心理,同时保护了学生的隐私,辅助家长老师,能够对学生进行更加贴切的关怀与教导、人生道路上的正确引导,保证其健康成长;To sum up, the present invention provides an online network user group attribute analysis system. The system is aimed at students who are in the student period, and can supervise their electronic devices that can be connected to the Internet to a certain extent. The system can be hidden in electronic devices without being discovered, and supervise users within the scope of authority, thereby avoiding students' resistance, while protecting students' privacy, assisting parents and teachers, and providing more appropriate care and teaching for students, correct guidance on the road of life, and ensuring their healthy growth;
且本发明能够根据学生目标的所处阶段进行适应性的调配,从而在使用时更进一步保护了学生的隐私,使用较为安全,且家长或老师仅能得到最终的汇报结果,在尊重学生的同时保证了学生的不正当行为得到捕捉,使得家长或老师更加及时的对学生进行引导;本发明在使用过程中信任设备端控制用户能够主控,根据系统所汇报的数据进行实际的查验,保证系统的所的数据结果即使出现误差也能够被信任设备端控制用户即使发觉,从而做出更加准确的判断与实际行动。Moreover, the present invention can carry out adaptive allocation according to the stage of the student's goal, thereby further protecting the privacy of the students during use, and the use is relatively safe, and the parents or teachers can only get the final report result, while respecting the students, it ensures that the students' improper behaviors are caught, so that the parents or teachers can guide the students in a more timely manner; Discovery, so as to make more accurate judgments and practical actions.
并且本发明提供一种在线网络的用户群体属性分析方法,通过该方法,可以使得学生家长能够更加了解自己的孩子、老师能够更加了解自己的学生,从而以此做出一些具有预判性的合理的引导干涉,使得学生能够在面对下一次将要发生的网络中不良信息时,主动性地拒绝,从而达到更加自主的树立正确的人生观、价值观的目的。Moreover, the present invention provides an online network user group attribute analysis method. Through this method, parents of students can better understand their children, and teachers can better understand their students, so as to make some predictable and reasonable guiding interventions, so that students can proactively reject the next bad information in the network that will occur next time, so as to achieve the purpose of establishing a correct outlook on life and values more independently.
以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不会使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。The above embodiments are only used to illustrate the technical solutions of the present invention, not to limit them; although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: it can still modify the technical solutions described in the foregoing embodiments, or perform equivalent replacements to some of the technical features; and these modifications or replacements will not make the essence of the corresponding technical solutions deviate from the spirit and scope of the technical solutions of the various embodiments of the present invention.

Claims (10)

  1. 基于在线网络的用户群体属性分析系统,其特征在于,包括:The online network-based user group attribute analysis system is characterized in that it includes:
    系统终端(1),是系统的总控制端,用于发出执行命令供下级各模块执行;The system terminal (1) is the general control terminal of the system, which is used to issue execution commands for execution by the lower-level modules;
    植入模块(2),用于植入系统载于用户所用的移动设备;An implant module (2), used for implanting the system on the mobile device used by the user;
    兼容模块(3),用于获取植入该系统移动设备配置数据;A compatible module (3), used to obtain the configuration data of the mobile device implanted in the system;
    检索模块(4),用于检索移动设备存储空间中的存储数据;A retrieval module (4), configured to retrieve stored data in the storage space of the mobile device;
    评估模块(5),用于评估检索模块(4)中存储数据内容是否存在异常,及异常数据占比;An evaluation module (5), configured to evaluate whether there is anomaly in the content of the stored data in the retrieval module (4), and the proportion of abnormal data;
    判定模块(6),用于判定系统终端(1)用户属性;A judging module (6), used for judging the user attributes of the system terminal (1);
    协调模块(7),用于接收判定模块(6)判定的用户属性,根据用户属性对评估模块(5)的评估指标进行协调;A coordination module (7), configured to receive the user attributes determined by the determination module (6), and coordinate the evaluation indicators of the evaluation module (5) according to the user attributes;
    汇报模块(8),用于将协调模块(7)协调结果向上级系统终端(1)及控制终端(11);其中系统终端(1)为后置位汇报,在控制终端(11)接收汇报结果后选择性向系统终端(1)汇报。The reporting module (8) is used to send the coordination result of the coordination module (7) to the superior system terminal (1) and the control terminal (11); wherein the system terminal (1) is a post-set report, and selectively reports to the system terminal (1) after the control terminal (11) receives the report result.
  2. 根据权利要求1所述的基于在线网络的用户群体属性分析系统,其特征在于,所述植入模块(2)中以无线网络建立安全系统(21),包括:The user group attribute analysis system based on the online network according to claim 1, wherein, in the implanted module (2), a safety system (21) is set up with a wireless network, including:
    隐身模块(211),用于隐身系统在载入该系统的移动设备中;Stealth module (211), used for the stealth system in the mobile device loaded with the system;
    秘钥源库(212),用于实时随机生成限时秘钥供控制终端(11)使用,登录系统以系统终端(1)进行操控;The secret key source library (212), which is used to randomly generate a time-limited secret key in real time for use by the control terminal (11), and the system terminal (1) is used to log in to the system for manipulation;
    授权模块(213),用于授权安全系统(21)获取主系统使用记录;An authorization module (213), configured to authorize the security system (21) to obtain the use record of the main system;
    关键词库(214),用于存储异常词汇供统计模块(215)进行比对后统计;The keyword library (214) is used to store abnormal words for the statistical module (215) to perform comparison and statistics;
    统计模块(215),用于统计授权模块(213)获取到的主系统使用记录中与关键词库(214)相匹配的目标数量。A statistical module (215), configured to count the number of targets matched with the keyword library (214) in the master system usage records acquired by the authorization module (213).
  3. 根据权利要求1所述的基于在线网络的用户群体属性分析系统,其特征在于,所述检索模块(4)通过无线网络与统计模块(215)建立连接进行数据传输,在检索模块(4)运行时同步获取统计模块(215)中获取到的主系统使用记录中与关键词库(214)相匹配的目标数量,并进一步参与评估模块(5)运行。The online network-based user group attribute analysis system according to claim 1, wherein the retrieval module (4) establishes a connection with the statistical module (215) through a wireless network to perform data transmission, and synchronously acquires the target quantity matched with the keyword library (214) in the main system usage record obtained in the statistical module (215) when the retrieval module (4) runs, and further participates in the operation of the evaluation module (5).
  4. 根据权利要求1所述的基于在线网络的用户群体属性分析系统,其特征在于,所述评估模块(5)与判定模块(6)通过介质并联连接主控模块(561),用于代替评估模块(5)与判定模块(6)执行,主控系统对系统终端(1)用户属性进行修改或匹配制定。The online network-based user group attribute analysis system according to claim 1, wherein the evaluation module (5) and the judgment module (6) are connected in parallel to the main control module (561) through a medium, and are used to replace the evaluation module (5) and the judgment module (6) for execution, and the main control system modifies or matches the user attributes of the system terminal (1).
  5. 根据权利要求1所述的基于在线网络的用户群体属性分析系统,其特征在于,所述评估模块(5)中评估指标一至四级分别对应:小学、初中、高中、大学及以上。The online network-based user group attribute analysis system according to claim 1, characterized in that the first to fourth grades of evaluation indicators in the evaluation module (5) respectively correspond to: primary school, junior high school, high school, university and above.
  6. 基于在线网络的用户群体属性分析方法,所述方法是对如权利要求1-5中任意一项所述的在线网络的用户群体属性分析系统的实施方法,其特征在于,包括以下步骤:The user group attribute analysis method based on online network, described method is the implementation method to the user group attribute analysis system of online network according to any one of claims 1-5, it is characterized in that, comprises the following steps:
    Step1:在用户端的移动设备中植入系统,使系统进入隐身状态无法被移动设备中系统程序所检索;Step1: Implant the system in the mobile device of the client, so that the system enters a stealth state and cannot be retrieved by the system program in the mobile device;
    Step2:设置记录程序,连接信任设备对接用户端移动设备中隐身系统;Step2: Set up the recording program, connect the trusted device to connect to the stealth system in the client mobile device;
    Step3:设置异常行为捕捉触发条件,匹配异常行为捕捉触发条件与 移动设备用户端的等级,在信任设备端登录后主动性协调触发条件与移动设备用户端的等级兼容度;Step3: Set the abnormal behavior capture trigger conditions, match the abnormal behavior capture trigger conditions and the level of the mobile device client, and actively coordinate the compatibility between the trigger conditions and the mobile device client level after logging in on the trusted device;
    Step4:信任设备端周期制使用秘钥验证身份登录控制端调取数据库中用户端相关汇报文件进行属性分析评估;Step4: Trust the device side to periodically use the secret key to verify the identity and log in to the control side to retrieve the relevant report files of the user side in the database for attribute analysis and evaluation;
    Step5:信任设备操作端根据对应用户端相关汇报文件属性分析评估结果与用户端建立通讯连接对其进行引导。Step5: The trusted device operation terminal establishes a communication connection with the user terminal to guide it according to the attribute analysis and evaluation results of the relevant report file of the corresponding user terminal.
  7. 根据权利要求6所述的基于在线网络的用户群体属性分析方法,其特征在于,步骤Step2中,信任设备连接移动设备中隐身的系统通过局域无线网络公用秘钥进行连接,信任设备每次与用户的移动设备建立连接时,使用秘钥验证操作者身份,用户端移动设备中所隐身的系统包括记录程序,在用户端移动设备与信任设备处于同一局域网络下自动校正建立数据传输通道,在数据传输通道建立结束后用户端移动设备向信任设备端传输记录程序记录数据。The user group attribute analysis method based on an online network according to claim 6, wherein in step Step2, the trusted device connects to the invisible system in the mobile device through the public key of the local wireless network. When the trusted device establishes a connection with the user's mobile device, the identity of the operator is verified using the secret key. The hidden system in the user's mobile device includes a recording program. When the user's mobile device and the trusted device are in the same local area network, it automatically corrects and establishes a data transmission channel. data.
  8. 根据权利要求6所述的基于在线网络的用户群体属性分析方法,其特征在于,步骤Step2中包含有记录程序,包括以下步骤:The user group attribute analysis method based on online network according to claim 6, wherein the step Step2 includes a recording program, comprising the following steps:
    Step21:分析用户端属性,匹配用户端移动设备异常行为捕捉权限,根据用户端移动设备所匹配的异常行为捕捉权限捕捉用户端在其移动设备上使用的符合异常行为特征的操作行为;Step21: Analyze the attributes of the user terminal, match the abnormal behavior capture authority of the mobile device of the user terminal, and capture the operation behavior of the user terminal on its mobile device that meets the characteristics of abnormal behavior according to the abnormal behavior capture authority matched by the mobile device of the user terminal;
    Step22:汇总用户端移动设备异常行为生成汇报文件,将汇报文件选择性与异常行为捕捉权限进行比对后发送至信任设备中等待;Step22: Summarize the abnormal behavior of the mobile device on the client side to generate a report file, compare the selectivity of the report file with the abnormal behavior capture permission, and send it to the trusted device for waiting;
    Step23:建立数据库,在信任设备确认汇报文件后,将汇报文件传输至数据库中建立根录存储。Step23: Create a database, and after the trusted device confirms the report file, transfer the report file to the database to create a root directory storage.
  9. 根据权利要求6所述的基于在线网络的用户群体属性分析方法,其特征在于,步骤Step5中包含有子步骤Step51:查看汇报文件中捕捉到的异常行为,检索异常行为相关网络IP地址做进一步分析,对经检索异常行为相关网络IP地址内容进行适配性处理;The online network-based user group attribute analysis method according to claim 6, characterized in that step Step5 includes substep Step51: check the abnormal behavior captured in the report file, retrieve the network IP address related to the abnormal behavior for further analysis, and perform adaptive processing on the content of the network IP address related to the retrieved abnormal behavior;
    其中,异常行为相关网络IP地址内容进行适配性处理方案包括:举报、禁用、跳转及同步反馈。Among them, the adaptive processing plan for the network IP address content related to abnormal behavior includes: reporting, banning, jumping and synchronous feedback.
  10. 根据权利要求6所述的基于在线网络的用户群体属性分析方法,其特征在于,步骤Step2中信任设备端用户处于在线状态下,选择性使用异常行为预测函数公式计算用户端移动设备接下来的异常行为出现概率,公式如下:The user group attribute analysis method based on online network according to claim 6, characterized in that, in the step Step2, the trusted device end user is in an online state, and selectively uses the abnormal behavior prediction function formula to calculate the next abnormal behavior occurrence probability of the user end mobile device, and the formula is as follows:
    Figure PCTCN2022122430-appb-100001
    Figure PCTCN2022122430-appb-100001
    式中:P(B i)、P(B j)为基础概率; In the formula: P(B i ), P(B j ) are the basic probability;
    P(A|B i)为击中率; P(A|B i ) is the hit rate;
    P(A|B j)为误报率。 P(A|B j ) is the false alarm rate.
PCT/CN2022/122430 2022-01-20 2022-09-29 User group attribute analysis system and method based on online network WO2023138098A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB2217795.0A GB2618868A (en) 2022-01-20 2022-09-29 User group attribute analysis system and method based on online network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210067593.8A CN114372204B (en) 2022-01-20 2022-01-20 User group attribute analysis system and method based on online network
CN202210067593.8 2022-01-20

Publications (1)

Publication Number Publication Date
WO2023138098A1 true WO2023138098A1 (en) 2023-07-27

Family

ID=81145064

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/122430 WO2023138098A1 (en) 2022-01-20 2022-09-29 User group attribute analysis system and method based on online network

Country Status (2)

Country Link
CN (1) CN114372204B (en)
WO (1) WO2023138098A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116707145A (en) * 2023-08-08 2023-09-05 山东尊品佳茗网络科技发展有限公司 Intelligent electric energy monitoring system and method based on Internet of things

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114372204B (en) * 2022-01-20 2024-03-08 石河子大学 User group attribute analysis system and method based on online network
CN116522416B (en) * 2023-05-09 2023-11-24 深圳市银闪科技有限公司 Mobile storage security intelligent supervision system and method based on big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103763124A (en) * 2013-12-26 2014-04-30 孙伟力 Internet user behavior analyzing and early-warning system and method
CN103841192A (en) * 2014-03-05 2014-06-04 天闻数媒科技(北京)有限公司 Method and system for remotely controlling application software of mobile terminal
US20150007307A1 (en) * 2013-03-10 2015-01-01 eBravium, Inc. Method and System for Integration of Instruction and Task Completion Based Access to Mobile Device Operating Systems
WO2017008404A1 (en) * 2015-07-16 2017-01-19 中兴通讯股份有限公司 Mobile terminal control method, device and system
CN109862512A (en) * 2018-12-12 2019-06-07 南京友众力信息技术有限公司 The information monitoring control system and method, computer program of minor's communication
CN114372204A (en) * 2022-01-20 2022-04-19 石河子大学 User group attribute analysis system and method based on online network

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2016259426A1 (en) * 2011-10-11 2016-12-08 Desire2Learn Incorporated Systems and methods for monitoring eLearning system data and generating recommendations
CN102694853A (en) * 2012-05-18 2012-09-26 何丽英 Remote monitoring management system for student computer
CN104750458A (en) * 2013-12-26 2015-07-01 三亚中兴软件有限责任公司 Control method, control device, monitoring processing method and monitoring processing device for terminal application
CN105376322A (en) * 2015-11-30 2016-03-02 上海方正信息安全技术有限公司 Remote massive data monitoring system and method for children's network behaviours
CN107369114A (en) * 2017-07-21 2017-11-21 安徽中杰信息科技有限公司 The children monitoring system of campus network, mobile network and guardian's network share
CN108376158B (en) * 2018-02-09 2020-04-14 江西航智信息技术有限公司 Student mobile terminal behavior log analysis method, device and system
CN108304298B (en) * 2018-02-09 2021-03-16 北京航智信息技术有限公司 Supervision system for realizing multi-management-end student mobile terminal based on education industry
US20200251012A1 (en) * 2019-02-04 2020-08-06 Strongmind, Inc. Educational monitoring and notification system
CN110070468A (en) * 2019-03-30 2019-07-30 程慧玲 A kind of cell phone software behavioral data extraction system
CN112765003B (en) * 2020-12-31 2021-09-14 北方工业大学 Risk prediction method based on APP behavior log
CN113129186A (en) * 2021-04-22 2021-07-16 深圳市微幼科技有限公司 Education platform interactive system based on Internet of things

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150007307A1 (en) * 2013-03-10 2015-01-01 eBravium, Inc. Method and System for Integration of Instruction and Task Completion Based Access to Mobile Device Operating Systems
CN103763124A (en) * 2013-12-26 2014-04-30 孙伟力 Internet user behavior analyzing and early-warning system and method
CN103841192A (en) * 2014-03-05 2014-06-04 天闻数媒科技(北京)有限公司 Method and system for remotely controlling application software of mobile terminal
WO2017008404A1 (en) * 2015-07-16 2017-01-19 中兴通讯股份有限公司 Mobile terminal control method, device and system
CN109862512A (en) * 2018-12-12 2019-06-07 南京友众力信息技术有限公司 The information monitoring control system and method, computer program of minor's communication
CN114372204A (en) * 2022-01-20 2022-04-19 石河子大学 User group attribute analysis system and method based on online network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116707145A (en) * 2023-08-08 2023-09-05 山东尊品佳茗网络科技发展有限公司 Intelligent electric energy monitoring system and method based on Internet of things
CN116707145B (en) * 2023-08-08 2023-10-20 山东尊品佳茗网络科技发展有限公司 Intelligent electric energy monitoring system and method based on Internet of things

Also Published As

Publication number Publication date
CN114372204A (en) 2022-04-19
CN114372204B (en) 2024-03-08

Similar Documents

Publication Publication Date Title
WO2023138098A1 (en) User group attribute analysis system and method based on online network
US11372709B2 (en) Automated testing error assessment system
CN107276982B (en) Abnormal login detection method and device
Kayes et al. The social world of content abusers in community question answering
US10355924B1 (en) Systems and methods for hybrid content provisioning with dual recommendation engines
US10296841B1 (en) Systems and methods for automatic cohort misconception remediation
CN104809933B (en) A kind of power grid is without script emergency drilling system, drilling method and equipment
Sundar A comparative study for predicting students academic performance using Bayesian network classifiers
CN105243910A (en) Fighting and passing-through practice system based on mobile application
US10965595B1 (en) Automatic determination of initial content difficulty
CN109086422B (en) Machine bullet screen user identification method, device, server and storage medium
CN106204847B (en) Access control system, background server and its self-learning method
CN109753783A (en) A kind of single-point logging method based on machine learning, device and computer readable storage medium
CN106485261A (en) A kind of method and apparatus of image recognition
US20190280986A1 (en) Systems and methods for data packet metadata stabilization
CN116016198B (en) Industrial control network topology security assessment method and device and computer equipment
CN104601532B (en) A kind of method and device of logon account
CN109194675A (en) A kind of education cloud platform based on education big data
US10116563B1 (en) System and method for automatically updating data packet metadata
US20190019097A1 (en) Method and system for bayesian network-based standard or skill mastery determination using a collection of interim assessments
US10735402B1 (en) Systems and method for automated data packet selection and delivery
US20180316582A1 (en) Method and system for bayesian network-based standard or skill mastery determination using a collection of interim assessments
GB2618868A (en) User group attribute analysis system and method based on online network
Fichman Information quality on yahoo! answers
CN111724284A (en) Educational institution management platform system

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 202217795

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20220929

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22921525

Country of ref document: EP

Kind code of ref document: A1