CN101931646A - Internet brows management method, system and terminal - Google Patents

Internet brows management method, system and terminal Download PDF

Info

Publication number
CN101931646A
CN101931646A CN201010245265XA CN201010245265A CN101931646A CN 101931646 A CN101931646 A CN 101931646A CN 201010245265X A CN201010245265X A CN 201010245265XA CN 201010245265 A CN201010245265 A CN 201010245265A CN 101931646 A CN101931646 A CN 101931646A
Authority
CN
China
Prior art keywords
data
flame
network data
rule
flame data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201010245265XA
Other languages
Chinese (zh)
Inventor
郭少华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201010245265XA priority Critical patent/CN101931646A/en
Publication of CN101931646A publication Critical patent/CN101931646A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses an Internet brows management method, which comprises the following steps of: acquiring network data in real time when a home terminal browses the Internet; transmitting the network data to a monitoring end; receiving a feedback processing command returned by the monitoring end, wherein the feedback processing command comprises at least one bad information data and a management rule of the bad information data; and managing the bad information data according to the feedback processing command. Correspondingly, the embodiment of the invention also discloses an Internet brows management method, an Internet brows management system and an Internet brows management terminal. The Internet brows management method can realize terminal interaction, manage the bad information data and update a network shield list according to the terminal interaction, better realize Internet brows management and improve the user experience.

Description

A kind of internet brows management method, system and terminal
Technical field
The present invention relates to networking technology area, relate in particular to a kind of internet brows management method, system and terminal.
Background technology
Along with Internet development, utilize various terminals (such as computer, mobile phone etc.), can get access to a large amount of informations from the Internet, made things convenient for people's life.When the Internet offers convenience to people, exist potential danger again, such as: be flooded with a large amount of flames on the Internet, comprise information such as violence or pornographic, these flames are given the network user, and the particularly minor network user has brought great harm.In order to evade this potential hazard, the mode of existing internet browsing management mainly is: install shielding software additional in various terminals, realize shielding and filtration to flame.
The inventor finds that mainly there is following defective in existing internet browsing Managed Solution:
1, rule is not comprehensive.The rule of existing internet browsing Managed Solution utilization shielding software forbids that the visit of specific website or identification flame are also shielded.Because when installing shielding software additional, rule by software development person rule of thumb or statistics pre-establish, there are not the media file of flame in the website in rule or some when there being some, shielding software does not possess screening ability, can't well realize the browsing management of the Internet;
2, can't realize terminal interaction.When teenage user uses the terminal view Internet, the guardian wants teenage user's network behavior is carried out stealth monitoring and management, need set up the information interaction of monitoring client and monitored end, but existing internet browsing Managed Solution can't provide the interaction mechanism of this terminal, has reduced user experience.
Summary of the invention
Problem to be solved by this invention is, a kind of internet brows management method, system and terminal are provided, can realize the mutual of terminal, and realize the management of flame data and the renewal of net mask tabulation according to terminal interaction, well realize the internet browsing management, improve user experience.
In order to realize addressing the above problem, the embodiment of the invention provides a kind of internet brows management method, comprising:
Network data when gathering the local terminal view Internet in real time;
Send described network data to monitoring client, receive the feedback processing order that described monitoring client returns, described feedback processing order comprises: the rule of at least one flame data and described flame data;
According to described feedback processing order, described flame data are managed.
Wherein, described according to described feedback processing order, described flame data are managed, comprising:
According to described feedback processing order, search the current described flame data that whether exist in the described feedback processing order of local terminal;
When finding described flame data, shield described flame data according to rule corresponding in the described feedback processing order, and the rule of described flame data and described flame data is added in the net mask tabulation of local terminal;
When not finding described flame data, the rule of described flame data in the described feedback command and described flame data is added in the net mask tabulation of local terminal.
Wherein, the network data during described real-time collection local terminal view Internet comprises any one or more of following real-time acquisition mode: the login record of preserving the website of being logined in real time; The network address of the webpage that real-time storage is visited; The network file information that real time record is opened; The picture of the video file that intercepting is in real time opened.
Wherein, the rule of described flame data comprises in the following rule any one or more: forbid logining the website that comprises described flame data; Forbid connecting the webpage that comprises described flame data; Deletion comprises the network file or the video file of described flame data; For network file or the video file that comprises described flame data is provided with the file corruption sign.
Wherein, described before monitoring client sends described network data, also comprise: receive the monitoring order of monitoring client, trigger local terminal and send described network data to monitoring client.
Wherein, described before monitoring client sends described network data, also comprise: default monitoring rule, according to described monitoring rule, trigger local terminal and send described network data to monitoring client; Described monitoring rule comprises: send network data on schedule, press pre-determined number and send network data, and send in the network data any one or more when collecting tentation data.
Correspondingly, the embodiment of the invention also provides another kind of internet brows management method, comprising:
Receive the network data that monitored end is gathered, analyze whether comprise the flame data in the described network data;
When in analyzing described network data, comprising the flame data, extract described flame data;
For the flame data of described extraction are determined rule, generate the feedback processing order, and return described feedback processing order to described monitored end, to control described monitored end described flame data are managed.
Wherein, before the network data that the monitored end of described reception is gathered, also comprise:, trigger monitored end and send described network data to local terminal to the order of monitored end transmitting supervisory.
Correspondingly, the embodiment of the invention also provides a kind of terminal, comprising:
Acquisition module, the network data when being used for gathering the local terminal view Internet in real time;
Interactive module is used for sending the network data that described acquisition module is gathered to monitoring client, and receives the feedback processing order that described monitoring client returns, and described feedback processing order comprises: the rule of at least one flame data and described flame data;
Administration module is used for the feedback processing order according to described interactive module reception, and described flame data are managed.
Wherein, described administration module comprises:
Search the unit, be used for feedback processing order, search the current described flame data that whether exist in the described feedback processing order of local terminal according to described interactive module reception;
First administrative unit, be used for when described when searching the unit and finding described flame data, shield described flame data according to rule corresponding in the described feedback processing order, and the rule of described flame data and described flame data is added in the net mask tabulation of local terminal;
Second administrative unit is used for, the rule of described flame data in the feedback command and described flame data being added in the net mask tabulation of local terminal when searching the unit and not finding described flame data when described.
Wherein, described terminal also comprises: presetting module, be used for default monitoring rule, and described monitoring rule comprises: send network data on schedule, press pre-determined number and send network data, and when collecting tentation data, send in the network data any one or more;
Trigger module is used for when described interactive module receives the monitoring order of monitoring client, triggers local terminal and sends described network data to monitoring client; Or the monitoring rule default according to described presetting module triggers local terminal and sends described network data to monitoring client.
Correspondingly, the embodiment of the invention also provides another kind of terminal, comprising:
Receiver module is used to receive the network data that monitored end is gathered;
Analysis module is used for analyzing the network data that described receiver module receives and whether comprises the flame data;
Extraction module is used for analyzing described network data when comprising the flame data when described analysis module, extracts described flame data;
Monitoring module, the flame data that are used to described extraction module to extract are determined rule, generate the feedback processing order, and return described feedback processing order to monitored end, to control described monitored end described flame data are managed.
Wherein, described terminal also comprises: sending module, be used for to the order of monitored end transmitting supervisory, and trigger described monitored end and send described network data to local terminal.
Correspondingly, the embodiment of the invention also provides a kind of internet browsing management system, comprising: monitoring client and monitored end, wherein:
Described monitored end, network data when being used for gathering the local terminal view Internet in real time, and send described network data to described monitoring client, receive the feedback processing order that described monitoring client returns, and, described flame data are managed according to described feedback processing order;
Described monitoring client, be used to receive the network data that described monitored end is gathered, analyze and whether comprise the flame data in the described network data, when in analyzing described network data, comprising the flame data, extract described flame data,, generate the feedback processing order for the flame data of described extraction are determined rule, and return described feedback processing order to described monitored end, to control described monitored end described flame data are managed;
Described monitoring client and monitored end comprise: PDA (Personal Digital Assistant, personal digital assistant), mobile phone, smart mobile phone, palmtop PC, any one or more terminal of laptop computer and PC (Personal Computer, PC) machine.
Implement the embodiment of the invention, have following beneficial effect:
Network data when 1, gathering the local terminal view Internet by monitored end, and this network data issued monitoring client, carry out the analysis and the extraction of flame data by monitoring client, realized the mutual of terminal, promoted user experience;
2, monitored end manages the flame data under the feedback processing order control of monitoring client, and real-time and effective has realized the renewal of net mask tabulation simultaneously, has well realized the internet browsing management to monitored end subscriber.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the structural representation of the embodiment of internet browsing management system of the present invention;
Fig. 2 is the structural representation of first embodiment of terminal of the present invention;
Fig. 3 is the structural representation of embodiment of the administration module of the terminal among Fig. 2 embodiment;
Fig. 4 is the structural representation of second embodiment of terminal of the present invention;
Fig. 5 is the flow chart of first embodiment of internet brows management method of the present invention;
Fig. 6 is the flow chart of second embodiment of internet brows management method of the present invention;
Fig. 7 is the flow chart of the 3rd embodiment of internet brows management method of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
See also Fig. 1, be the structural representation of the embodiment of internet browsing management system of the present invention; Described system comprises: monitored end 10 and monitoring client 20.
Described monitored end 10, the network data when being used for gathering the local terminal view Internet in real time, and to the described network data of described monitoring client 20 transmissions; Receive the feedback processing order that described monitoring client 20 returns, described flame data are managed according to described feedback processing order;
In the specific implementation, described flame data include but not limited to: the network data that contains violence information, the network data that contains pornographic information, contain the network data of terrified information and contain in the network data of homicide information any one or more, perhaps the illegal data of other legal provisions.
Described monitoring client 20, be used to receive the network data that described monitored end 10 is gathered, analyze and whether comprise the flame data in the described network data, and when analyzing when comprising the flame data, extract described flame data, and the flame data of described extraction are determined rule, generate corresponding feedback processing order; Return described feedback processing order to described monitored end 10, manage to control 10 pairs of described flame data of described monitored end.
In the specific implementation, described monitored end 10 and monitoring client 20 are a kind of terminal, and it includes but not limited to: PDA, mobile phone, smart mobile phone, palmtop PC, laptop computer, communication terminals such as PC.Preferably, described monitored end 10 and monitoring client 20 all can communicate with the Internet, realize functions such as internet browsing.In order to realize the secure communication of the Internet, described monitored end 10 and monitoring client 20 have all been preset net mask tabulation separately, and described net mask tabulation comprises flame data and corresponding rule, specifically can see table shown in one:
Table one: net mask tabulation
Figure BSA00000216918700061
Be understandable that, above-mentioned net mask tabulation is only for giving an example, the net mask tabulation that its shielding software that can be described monitored end 10 and monitoring client 20 are pre-installed respectively carries, also can preset by the terminal use, wherein, being provided with of the net mask of monitored end 10 and monitoring client 20 tabulation can different, also can be identical.The setting of above-mentioned net mask tabulation, its purpose be when monitored end 10 and monitoring client 20 during respectively with internet communication, can be according to certain rule interception network flame data, the filtration and the shielding of realization flame data.
In the embodiment of the invention, the network data of (when surfing the Net) when monitored end 10 is gathered the local terminal view Internet, and send to monitoring client 20, monitoring client 20 analyzes in this network data whether comprise the flame data, when analyzing when having the flame data, extract this flame data, and the rule of definite these flame data, generate corresponding feedback processing order, return this feedback processing order to monitored end, if there are these flame data in current monitored end 10, then shield its existing flame data, simultaneously the rule of these flame data and described flame data is added in the net mask tabulation of local terminal according to corresponding rule in this order.If there are not this flame data in current monitored end 10, then directly the rule of these flame data and described flame data is added in the net mask tabulation of local terminal according to this order; When monitored end carries out internet browsing 10 next times, if collect this flame data once more, then can be directly according in the net mask tabulation of local terminal to the rule of these flame data, shield this flame data.
Be understandable that, the feedback processing order that described monitoring client 20 is returned, be not limited in and comprise and return this execution mode of flame data, can also comprise: return the network address of the webpage that comprises the flame data or comprise the filename etc. of the file of flame data, to point out monitored end 10 which Web content to comprise the flame data, but above-mentioned situation similar analysis is not given unnecessary details at this.
Particularly, described monitored end 10 is applicable to that the teenage children under guardianship of grade use, described monitoring client 20 is applicable to guardian's uses such as the head of a family, monitoring by 20 pairs of described monitored end 10 internet browsings of described monitoring client, the guardian can understand and monitor children under guardianship's internet behavior in real time, evades the harm that bad network data is brought to children under guardianship.
For clearer explanation the present invention, will describe in detail to monitored end 10 of the present invention below.
See also Fig. 2, be the structural representation of first embodiment of terminal of the present invention; Terminal shown in Figure 2 is the monitored end 10 in the system shown in Figure 1.Described terminal 10 comprises: acquisition module 101, interactive module 102 and administration module 103.
Described acquisition module 101, the network data when being used for gathering the local terminal view Internet in real time;
In the specific implementation, described network data comprises but is not limited to: the login record of website, the network address of webpage, the filename of network file, crucial words or key sentence, and video file filename, crucial words or key sentence, and data such as picture.When described monitored end 10 view Internets, the network data when described acquisition module 101 is gathered the local terminal view Internet in real time, its real-time acquisition mode includes but not limited to any one or more in the following mode:
Preserve in real time the login record of institute's Website login, comprise the log-on message when preserving on the local terminal Website login in the network process, and the page info during login;
The network address of real-time storage institute accessed web page;
The network file information that real time record is opened comprises the filename that writes down the network file of being opened in the local terminal online process, and some crucial words or key sentence of being comprised in the file;
The picture of the video file that extract real-time is opened, particularly, when opening certain video file in the network process on the local terminal, filename, crucial words or the key sentence of the video file that record is opened, trigger the corresponding sectional drawing instrument of local terminal simultaneously and constantly intercept the picture that this video file is play, and the picture of intercepting is preserved.
Particularly, described acquisition module 101 is stored in the network data of above-mentioned real-time collection in the memory of local terminal, and described memory is the memory space that terminal carries the expansion card of internal memory and/or terminal support.Be understandable that, because local terminal has been preset the net mask tabulation, when described acquisition module 101 collects the network data of the flame Data Matching in the net mask tabulation of presetting with local terminal, directly carry out shielding processing by corresponding rule, it is not stored in the memory.In addition, when the network data of being preserved in the described memory after described interactive module 102 is sent to described monitoring client 20, described memory is deleted the corresponding network data of being stored voluntarily, to guarantee the network data of gathering next time enough memory spaces is arranged.
Described interactive module 102 is used for sending the network data that described acquisition module 101 is gathered to monitoring client 20, and receives the feedback processing order that described monitoring client 20 returns;
In the specific implementation, at dissimilar terminals, modes such as described interactive module 102 can corresponding selection note, multimedia message or Email send the network data that described acquisition module 101 is gathered and preserved to described monitoring client 20, particularly, when described monitoring client 20 and monitored end 10 were mobile phone terminal, described interactive module 102 can select the multimedia message mode to send network data.The feedback processing order that the described monitoring client 20 that described interactive module 102 receives returns comprises: the rule of at least one flame data and described flame data, and described rule includes but not limited to any one or more in the following stated rule:
Forbid logining the website that comprises described flame data;
Forbid connecting the webpage that comprises described flame data;
Deletion comprises the network file or the video file of described flame data;
For network file or the video file that comprises described flame data is provided with the file corruption sign.
Such as: described interactive module 102 is after monitoring client 20 sends described network data, described monitoring client 20 analyzes and comprises an illegal picture in this network data, described monitoring client 20 extracts this illegal picture, and stipulate that the rule to this illegal picture is " deletion comprises the file of this picture ", above-mentioned illegal picture and corresponding rule are generated a feedback processing order, return to described interactive module 102.In like manner, when described monitoring client 20 analyzes when comprising a plurality of flame data in the network data, carry out above-mentioned similar processing, will handle each flame data and feedback processing order of the common generation of corresponding rule then, return to described interactive module 102.
Particularly, described interactive module 102 also was used for before monitor procedure takes place, and received the monitoring connection request that monitoring client 20 sends, and connected with realization and described monitoring client 20; In addition, described interactive module 102, also be used at monitor procedure, receive the monitoring order of monitoring client 20,, trigger this module and send network data to monitoring client 20 with according to this monitoring order, be understandable that, the transmission-receiving function of described interactive module 102 is not limited to above-mentioned several, and it is the information bridge of monitored end 10 and monitoring client 20, has realized all information interactions between local terminal (being monitored end 10) and the monitoring client 20.
Described administration module 103 is used for the feedback processing order according to described interactive module 102 receptions, and described flame data are managed.
In the specific implementation, described administration module 103 is according to described feedback processing order, at first search the current flame data that whether exist in this order of local terminal, and carry out corresponding operating according to lookup result, specific as follows: as described above, suppose that the flame data in the feedback processing order are illegal picture, rule is " deletion comprises the file of this picture ", if described administration module 103 finds the video file that this end subscriber browsing comprises this picture, promptly find these flame data of the current existence of local terminal, then described administration module 103 is deleted this video file according to the rule in the feedback processing order, after the deletion, this video file of this end subscriber browsing will be closed and can't open again; Simultaneously, described administration module 103 adds this illegal picture and corresponding rule in the net mask tabulation of local terminal to.If described administration module 103 does not find described illegal picture in that local terminal is current, be that current local terminal does not exist described flame data, then described administration module 103 directly adds this illegal picture and corresponding rule in the net mask tabulation of local terminal to, when this end subscriber is browsed the file that comprises this illegal picture next time, this document can be shielded automatically by local terminal, makes the user can't find the file of above-mentioned conductively-closed.
See also Fig. 2 again, described terminal 10 also comprises: presetting module 104 and trigger module 105.
Described presetting module 104 is used for default monitoring rule; Described monitoring rule comprises: send network data on schedule, press pre-determined number and send network data, and send in the network data any one or more when collecting tentation data.
In the specific implementation, described presetting module 104 also is used for the net mask tabulation of the default local terminal of terminal use, specifically tabulates as above shown in the table one, does not give unnecessary details at this.
Described trigger module 105 is used for when described interactive module 102 receives the monitoring order of monitoring client 20, triggers local terminal and sends described network data to monitoring client 20; Or, according to the monitoring rule that described presetting module 104 is preset, trigger local terminal and send described network data to monitoring client 20.
In the specific implementation, it can be active mode that monitored end 10 sends described network data to monitoring client 20, also can be passive mode.When described interactive module 102 receives the monitoring order of monitoring client 20, can trigger monitored end 10 and send described network data to monitoring client 20, this mode is passive mode, is that the monitoring order to monitoring client 20 (or claims: a kind of response monitoring request).In addition, monitored end 10 (local terminal) also can be by the presetting module 104 default monitoring rules of local terminal, such as: the predeterminable transmission network data of pressing a day three times, the network data that described acquisition module 101 is gathered, after default net mask tabulation (table one) screening of local terminal, promptly be stored in the local terminal memory, and trigger described interactive module 102 and send the network data of storing in these memories, repeat to stop to send behind the said process three times to monitoring client 20; For another example: predeterminable by per 10 minutes frequency transmission network data, when then first 10 minutes arrive, trigger described interactive module 102 and send the network data of storing in the primary memory to monitoring client 20, during second arrival in 10 minutes, trigger described interactive module 102 once more and send the network data of storing in the primary memory to monitoring client 20, by that analogy, this mode is active mode, monitor the prediction of rule according to actual needs by the presetting module 104 of local terminal, when satisfying the monitoring rule, local terminal promptly initiatively reports the internet browsing situation of local terminal to monitoring client 20.
For clearer explanation the present invention, will the administration module 103 in the above-mentioned terminal (monitored end 10) be described in detail below.
See also Fig. 3, be the structural representation of the embodiment of the administration module of the terminal among Fig. 2 embodiment; Described administration module 103 comprises: search unit 31, the first administrative units 32 and second administrative unit 33,
The described unit 31 of searching is used for the feedback processing order according to described interactive module 102 receptions, searches the current described flame data that whether exist in the described feedback processing order of local terminal;
In the specific implementation, because monitored end 10 can be according to default monitoring rule, or send network datas to monitoring client 10 according to the monitoring order of monitoring client 20, therefore, its the possibility of result is: the current Web content of having closed the network data correspondence that sends of the user of monitored end 10, and the network data that the memory of monitored end 10 will send automatically deletion then makes described monitored end 10 current corresponding network data (comprising described flame data) and the Web contents of not existing.The described unit 31 of searching promptly needs to carry out corresponding searching, and whether has described flame data to determine that described monitored end 10 is current.
Described first administrative unit 32, be used for when described when searching unit 31 and finding described flame data, shield described flame data according to rule corresponding in the described feedback processing order, and the rule of described flame data and described flame data is added in the net mask tabulation of local terminal;
Described second administrative unit 33 is used for, the rule of described flame data in the feedback command and described flame data being added in the net mask tabulation of local terminal when searching unit 31 and not finding described flame data when described.
Network data when the embodiment of the invention is gathered the local terminal view Internet by monitored end, and this network data issued monitoring client, carry out the analysis and the extraction of flame data by monitoring client, realized the mutual of terminal, promoted user experience; Monitored end manages the flame data under the feedback processing order control of monitoring client, and real-time and effective has realized the renewal of net mask tabulation simultaneously, has well realized monitored end subscriber internet browsing management has been improved user experience.
For clearer explanation the present invention, will describe in detail to monitoring client 20 of the present invention below.
See also Fig. 4, be the structural representation of second embodiment of terminal of the present invention; Terminal shown in Figure 4 is the monitoring client 20 in the system shown in Figure 1, and described terminal 20 comprises: receiver module 201, analysis module 202, extraction module 203 and monitoring module 204.
Described receiver module 201 is used to receive the network data that monitored end 10 is gathered;
As mentioned above, monitored end 10 can select modes such as note, multimedia message or Email to send described network data, and described receiver module 201 receives note, multimedia message or the Email etc. that comprise described network data.
Described analysis module 202 is used for analyzing the network data that described receiver module 201 received and whether comprises the flame data.
In the specific implementation, mainly there is dual mode in the analysis of 202 pairs of described network datas of described analysis module, one is: by aforementioned, described monitoring client 20 has been preset the net mask tabulation shown in the table one, flame data in network data that described analysis module 202 receives described receiving element 201 and the tabulation of the net mask of local terminal compare, when find to exist with described net mask tabulation in flame data when being complementary the network data of (same or similar), described analysis module 202 promptly analyzes and comprises the flame data in the described network data.It two is: described analysis module 202 with described receiving element 201 receive network data by the display screen of terminal be shown to described monitoring client 20 the user (such as: the guardian), by whether comprising the flame data in this network data of described customer analysis, described analysis module 202 receives the analysis result of user's input or affirmation, and determines whether comprise the flame data in the described network data according to described analysis result.
Be understandable that above-mentioned dual mode can be selected for use by user flexibility, also can be used in combination.
Described extraction module 203 is used for analyzing described network data when having the flame data when described analysis module 202, and described flame data extract is come out;
In the specific implementation, when described analysis module 202 analyzed a plurality of flame data, described extraction module 203 extracted each flame data one by one, transfers to follow-up monitoring module 204 and carries out respective handling.
Described monitoring module 204, the flame data that are used to described extraction module 203 to extract determine or regulation to the rule of these flame data, generate the feedback processing order according to these flame data and corresponding rule, return described feedback processing order to monitored end 10, manage to control 10 pairs of described flame data of described monitored end.
In the specific implementation, above-mentioned two kinds of analysis modes according to described analysis module 202, described monitoring module 204 determines that the rule of described flame data also comprises dual mode: one is: when described analysis module 202 analyzes described flame data according to the net mask tabulation of local terminal, described monitoring module 204 determines that the rule of these flame data is: in the described net mask tabulation with the corresponding rule of these flame data; It two is: when described analysis module 202 is determined described flame data according to the analysis result of this end subscriber input, described monitoring module 204 receives the processing mode that described user imports or confirms the flame data of its analysis, and determines the rule of described flame data according to described processing mode.
When described extraction module 203 extracted a plurality of flame data, described monitoring module 204 carried out above-mentioned similar processing, and the result after will handling then is common to generate a feedback processing order.Particularly, described feedback processing order comprises: the rule of at least one flame data and described flame data.
See also Fig. 4 again, described terminal 20 also comprises: sending module 205.
Described sending module 205 is used for triggering described monitored end 10 and sending described network data to local terminal to monitored end 10 transmitting supervisory orders.
In the specific implementation, it can be passive mode that monitored end 10 sends described network data to monitoring client 20, by the sending module 205 of monitoring client 20 to monitored end 10 transmitting supervisory orders, this monitoring order is a monitoring request, ask monitored end 10 to send network data to local terminal, after described monitored end 10 is received the monitoring order of described sending module 205 transmissions, trigger monitored end 10 and send network datas to monitoring client 20.Particularly, at different terminals, described sending module 205 can adopt note, mode such as multimedia message or Email, when described monitored end 10 and monitoring client 20 are mobile phone terminal, described sending module 205 can adopt short message mode to send this monitoring order to monitored end 10, need to prove, in order to realize the stealth monitoring or the background monitoring of 20 pairs of monitored ends 10 of monitoring client, after described monitored end 10 receives described monitoring order, the backstage responds this monitoring order, will not monitor the order be shown to monitored end 10 the user (such as: children under guardianship), make children under guardianship not know that the guardian is using 20 couples of children under guardianship's of monitoring client internet browsing behavior to monitor, thereby reach of the infringement of stealthy isolated flame data children under guardianship.
The embodiment of the invention has realized the mutual of terminal, has well realized monitored end subscriber internet browsing management has been promoted user experience.
For clearer explanation the present invention, will describe in detail to the internet brows management method of realizing by monitored end 10 of the present invention below.
See also Fig. 5, be the flow chart of first embodiment of internet brows management method of the present invention; Described method comprises:
S101, the network data when gathering the local terminal view Internet in real time;
In the specific implementation, described network data comprises but is not limited to: the login record of website, the network address of webpage, the filename of network file, crucial words or key sentence, and video file filename, crucial words or key sentence, and data such as picture.When described monitored end view Internet, the network data when described S101 gathers the local terminal view Internet in real time, its real-time acquisition mode includes but not limited to any one or more in the following mode:
Preserve in real time the login record of institute's Website login, comprise the log-on message when preserving on the local terminal Website login in the network process, and the page info during login;
The network address of real-time storage institute accessed web page;
The network file information that real time record is opened comprises the filename that writes down the network file of being opened in the local terminal online process, and some crucial words or key sentence of being comprised in the file;
The picture of the video file that extract real-time is opened, particularly, when opening certain video file in the network process on the local terminal, filename, crucial words or the key sentence of the video file that record is opened, trigger the corresponding sectional drawing instrument of local terminal simultaneously and constantly intercept the picture that this video file is play, and the picture of intercepting is preserved.
Particularly, described S101 is stored in the network data of above-mentioned real-time collection in the memory of local terminal, and described memory is the memory space that terminal carries the expansion card of internal memory and/or terminal support.Be understandable that, because local terminal has been preset the net mask tabulation, when described S101 collects the network data of the flame Data Matching in the net mask tabulation of presetting with local terminal, directly carry out shielding processing by corresponding rule, it is not stored in the memory.In addition, after the network data of being preserved in the described memory was sent to described monitoring client, described memory was deleted the corresponding network data of being stored voluntarily, to guarantee the network data of gathering next time enough memory spaces was arranged.
S102 sends described network data to monitoring client;
In the specific implementation, at dissimilar terminals, modes such as described S102 can corresponding selection note, multimedia message or Email send the network data that described S101 gathers and preserves to described monitoring client, particularly, when described monitoring client and monitored end were mobile phone terminal, described S102 can select the multimedia message mode to send network data.
S103 receives the feedback processing order that described monitoring client returns;
The feedback processing order that the described monitoring client that described S103 receives returns comprises: the rule of at least one flame data and described flame data, and described rule includes but not limited to any one or more in the following stated rule:
Forbid logining the website that comprises described flame data;
Forbid connecting the webpage that comprises described flame data;
Deletion comprises the network file or the video file of described flame data;
For network file or the video file that comprises described flame data is provided with the file corruption sign.
Such as: described S102 is after monitoring client sends described network data, described monitoring client analyzes and comprises an illegal picture in this network data, described monitoring client extracts this illegal picture, and stipulate that the rule to this illegal picture is " deletion comprises the file of this picture ", above-mentioned illegal picture and corresponding rule are generated a feedback processing order, return to described S103.In like manner,, carry out above-mentioned similar processing, will handle then that each flame data and corresponding rule are common to generate a feedback processing order, return to described S103 when described monitoring client analyzes when comprising a plurality of flame data in the network data.
S104 according to described feedback processing order, manages described flame data.
In the specific implementation, described S104 is according to described feedback processing order, at first search the current flame data that whether exist in this order of local terminal, and carry out corresponding operating according to lookup result, specific as follows: as described above, suppose that the flame data in the feedback processing order are illegal picture, rule is " deletion comprises the file of this picture ", if described S104 finds the video file that this end subscriber browsing comprises this picture, promptly find these flame data of the current existence of local terminal, then described S104 deletes this video file according to the rule in the feedback processing order, after the deletion, this video file of this end subscriber browsing will be closed and can't open again; Simultaneously, described S104 adds this illegal picture and corresponding rule in the net mask tabulation of local terminal to.If described S104 does not find described illegal picture in that local terminal is current, be that current local terminal does not exist described flame data, then described S104 directly adds this illegal picture and corresponding rule in the net mask tabulation of local terminal to, when this end subscriber is browsed the file that comprises this illegal picture next time, this document can be shielded automatically by local terminal, makes the user can't find the file of above-mentioned conductively-closed.
The present invention can realize the mutual of terminal, and according to alternately the flame data being managed of terminal, real-time and effective has realized the renewal of net mask tabulation simultaneously, has well realized the internet browsing management, has improved user experience.
For clearer explanation the present invention, will describe in detail to the internet brows management method of realizing by monitoring client 20 of the present invention below.
See also Fig. 6, be the flow chart of second embodiment of internet brows management method of the present invention; Described method comprises:
S201 receives the network data that monitored end is gathered;
As mentioned above, monitored end can select modes such as note, multimedia message or Email to send described network data, described S201 receives note, multimedia message or the Email etc. that comprise described network data, particularly, when described monitored end and monitoring client were mobile phone terminal, described monitored end adopted multimedia message mode and described monitoring client to carry out the transmitting-receiving of network data.
S202 analyzes whether comprise the flame data in the described network data;
In the specific implementation, mainly there is dual mode in described S202 to the analysis of described network data, one is: by aforementioned, described monitoring client has been preset the net mask tabulation shown in the table one, flame data in network data that described S202 receives described S201 and the tabulation of the net mask of local terminal compare, when find to exist with described net mask tabulation in flame data when being complementary the network data of (same or similar), described S202 promptly analyzes and comprises the flame data in the described network data.It two is: described S202 with described S201 receive network data by the display screen of terminal be shown to described monitoring client the user (such as: the guardian), by whether comprising the flame data in this network data of described customer analysis, described S202 receives the analysis result of user's input or affirmation, and determines whether comprise the flame data in the described network data according to described analysis result.Be understandable that above-mentioned dual mode can be selected for use by user flexibility, also can be used in combination.
S203 when comprising the flame data in analyzing described network data, extracts described flame data;
In the specific implementation, when described S202 analyzed a plurality of flame data, described S203 extracted each flame data one by one, transfers to follow-up S204 and carries out respective handling.
S204 for the flame data of described extraction are determined rule, generates the feedback processing order, and returns described feedback processing order to described monitored end.
In the specific implementation, above-mentioned two kinds of analysis modes according to S202, described S204 determines that the rule of described flame data also comprises dual mode: one is: tabulation analyzes described flame data according to the net mask of local terminal as described S202, and described S204 determines that the rule of these flame data is: in the described net mask tabulation with the corresponding rule of these flame data; It two is: when described S202 determines described flame data according to the analysis result of this end subscriber input, described S204 receives the processing mode that described user imports or confirms the flame data of its analysis, and determines the rule of described flame data according to described processing mode.
When described S203 extracted a plurality of flame data, described S204 carried out above-mentioned similar processing, and the result after will handling then is common to generate a feedback processing order.Particularly, described feedback processing order comprises: the rule of at least one flame data and described flame data.
The present invention can realize the mutual of terminal, and according to alternately the flame data being managed of terminal, real-time and effective has realized the renewal of net mask tabulation simultaneously, has well realized the internet browsing management, has improved user experience.
For clearer explanation the present invention, will describe in detail by monitored end 10 and the monitoring client 20 mutual internet brows management methods of realizing to of the present invention below.
See also Fig. 7, be the flow chart of the 3rd embodiment of internet brows management method of the present invention; Described method comprises:
S301, monitoring client sends the monitoring connection request to monitored end;
Need to prove, at different terminals, described S301 can adopt note, mode such as multimedia message or Email, when described monitored end and monitoring client are mobile phone terminal, described S301 can adopt short message mode to send the monitoring connection request to monitored end, in order to realize stealth monitoring or the background monitoring of monitoring client to monitored end, after described monitored termination is received the monitoring connection request, be not prompted to monitored end the user (such as: children under guardianship), make children under guardianship not know that the guardian is using monitoring client that children under guardianship's internet browsing behavior is monitored, thereby reach of the infringement of stealthy isolated flame data children under guardianship.
S302 judges whether monitored end starts shooting, if, then carry out S303, otherwise, finish;
In the specific implementation, if monitored end is not started shooting, then according to the note principle, server can be after monitored end start, and in described S301, the monitoring connection request that monitoring client sent sends to monitored end.
S303, monitored end confirm to reply, and set up monitoring with monitoring client and are connected;
S304 judges whether monitoring client surfs the Net, if, then carry out S305, otherwise, finish;
S305, the network data when monitored end is gathered the local terminal internet browsing;
S306 judges whether transmitting supervisory order of monitoring client, if then carry out S309; Otherwise, carry out S307;
In the specific implementation, it can be passive mode that monitored end sends described network data to monitoring client, monitoring client is to the order of monitored end transmitting supervisory, this monitoring order is a monitoring request, ask monitored end to send network data to local terminal, after described monitored end is received described monitoring order, trigger monitored end and send network data to monitoring client.Particularly, at different terminals, described monitoring client can adopt note, mode such as multimedia message or Email, when described monitored end and monitoring client are mobile phone terminal, described monitoring client can adopt short message mode to send this monitoring order to monitored end, need to prove, in order to realize stealth monitoring or the background monitoring of monitoring client to monitored end, after described monitored termination is received described monitoring order, the backstage responds this monitoring order, will not monitor the order be shown to monitored end the user (such as: children under guardianship), make children under guardianship not know that the guardian is using monitoring client that children under guardianship's internet browsing behavior is monitored, thereby reach of the infringement of stealthy isolated flame data children under guardianship.
S307, whether default monitoring is regular to judge monitored end, if then carry out S308; Otherwise, finish;
Described monitoring rule comprises: send network data on schedule, press pre-determined number and send network data, and send in the network data any one or more when collecting tentation data.
S308 judges whether to reach the monitoring rule, if then carry out S309; Otherwise, finish;
S309, monitored end send the network data of gathering to monitoring client;
In the specific implementation, it can be active mode that monitored end sends described network data to monitoring client.Such as: the predeterminable transmission network data of pressing a day three times, collect network data, after default net mask tabulation (table one) screening of local terminal, promptly be stored in the local terminal memory, and trigger S309 and send the network data of storing in this memory to monitoring client, repeat to stop to send behind the said process three times; For another example: predeterminable by per 10 minutes frequency transmission network data, when then first 10 minutes arrive, trigger described S309 and send the network data of storing in the primary memory to monitoring client, during second arrival in 10 minutes, trigger described S309 once more and send the network data of storing in the primary memory to monitoring client, by that analogy, this mode is active mode, monitor the prediction of rule according to actual needs by local terminal, when satisfying the monitoring rule, local terminal promptly initiatively reports the internet browsing situation of local terminal to monitoring client.
S310, the flame data of described network data are extracted in the monitoring client analysis, return the feedback processing order of these flame data to monitored end;
S311 judges that monitored end is current and whether has described flame data, if the judgment is Yes, carries out S312; Otherwise, carry out S313;
In the specific implementation, because monitored end can be according to default monitoring rule, or send network data to monitoring client according to the monitoring order of monitoring client, therefore, its the possibility of result is: the current Web content of having closed the network data correspondence that sends of the user of monitored end, and the network data that the memory of monitored end will send automatically deletion then makes current corresponding network data (comprising described flame data) and the Web content of not existing of described monitored end.Described S311 promptly needs to carry out corresponding judgement, whether has described flame data to determine that described monitored end is current.
S312, monitored end shields described flame data according to corresponding rule in the described feedback processing order;
S313, monitored end adds the rule of described flame data and described flame data in the net mask tabulation of local terminal to.
With an instantiation internet brows management method of the present invention is described below:
Suppose that children under guardianship are using mobile phone A (being monitored end) browsing video file on the internet, the guardian wants to utilize the mobile phone B (being monitoring client) of oneself that children under guardianship's network behavior is monitored, and it is as follows specifically to monitor flow process:
Mobile phone B sends the monitoring connection request to mobile phone A, and after the affirmation that receives mobile phone A is replied, sets up monitoring with mobile phone A and be connected, and children under guardianship also do not know being connected between mobile phone A and the mobile phone B;
Mobile phone B is after monitoring connects foundation, to the order of mobile phone A transmitting supervisory; Mobile phone A is extracted the picture of the video file that children under guardianship open automatically, and this picture is sent to mobile phone B in the mode of multimedia message according to monitoring order, mobile phone B is with the net mask tabulation comparison of the picture and the local terminal of this multimedia message, or by the picture of guardian according to this multimedia message, judge whether this picture is the flame data, if then return the feedback processing order to mobile phone by mobile phone B; If not, then ignore this multimedia message.
Suppose that the guardian judges that this picture is the flame data, then mobile phone B is extracted this picture, and according to the net mask tabulation of local terminal or the processing mode of importing according to the user to this picture, determine the rule of this picture to be: " deletion comprises the order of the video file of this picture ", generate the feedback processing order, return the feedback processing order to mobile phone A; After mobile phone A receives this feedback processing order, at first search local terminal and whether have flame data in this feedback processing order, when mobile phone A finds children under guardianship's browsing when comprising the video file of this illegal picture, then this video file is deleted according to the rule in the feedback processing order, after the deletion, this video file of children under guardianship's browsing will be closed and can't open again; Simultaneously, mobile phone A is added this illegal picture and corresponding rule in the net mask tabulation of local terminal to.Do not browse the Web content that comprises this illegal picture when children under guardianship are current, mobile phone A is current when local terminal does not find this illegal picture, directly this illegal picture and corresponding rule are added in the net mask tabulation of local terminal, when children under guardianship browse the file that comprises this illegal picture next time, this document can be shielded automatically by local terminal, makes children under guardianship can't find the file of above-mentioned conductively-closed.
Description by the various embodiments described above, network data when the embodiment of the invention is gathered the local terminal view Internet by monitored end, and this network data issued monitoring client, carry out the analysis and the extraction of flame data by monitoring client, realize the mutual of terminal, promoted user experience; Monitored end is under the feedback processing order control of monitoring client, the flame data are carried out shielding processing, and these flame data are added in the network management rule of local terminal, real-time and effective has realized the renewal of rule and to the filtration of flame data, well realized monitored end subscriber internet browsing management has been improved user experience.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in the foregoing description method, be to instruct relevant hardware to finish by computer program, described program can be stored in the computer read/write memory medium, this program can comprise the flow process as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only storage memory body (Read-Only Memory, ROM) or at random store memory body (Random Access Memory, RAM) etc.
Above disclosed only is preferred embodiment of the present invention, certainly can not limit the present invention's interest field with this, one of ordinary skill in the art will appreciate that all or part of flow process that realizes the foregoing description, and, still belong to the scope that invention is contained according to the equivalent variations that claim of the present invention is done.

Claims (14)

1. internet brows management method is characterized in that:
Network data when gathering the local terminal view Internet in real time;
Send described network data to monitoring client, receive the feedback processing order that described monitoring client returns, described feedback processing order comprises: the rule of at least one flame data and described flame data;
According to described feedback processing order, described flame data are managed.
2. the method for claim 1 is characterized in that, and is described according to described feedback processing order, and described flame data are managed, and comprising:
According to described feedback processing order, search the current described flame data that whether exist in the described feedback processing order of local terminal;
When finding described flame data, shield described flame data according to rule corresponding in the described feedback processing order, and the rule of described flame data and described flame data is added in the net mask tabulation of local terminal;
When not finding described flame data, the rule of described flame data in the described feedback command and described flame data is added in the net mask tabulation of local terminal.
3. method as claimed in claim 2 is characterized in that, the network data during described real-time collection local terminal view Internet comprises any one or more of following real-time acquisition mode:
Preserve the login record of the website of being logined in real time;
The network address of the webpage that real-time storage is visited;
The network file information that real time record is opened;
The picture of the video file that intercepting is in real time opened.
4. method as claimed in claim 3 is characterized in that, the rule of described flame data comprises in the following rule any one or more:
Forbid logining the website that comprises described flame data;
Forbid connecting the webpage that comprises described flame data;
Deletion comprises the network file or the video file of described flame data;
For network file or the video file that comprises described flame data is provided with the file corruption sign.
5. as each described method of claim 1-4, it is characterized in that, described before monitoring client sends described network data, also comprise:
Receive the monitoring order of monitoring client, trigger local terminal and send described network data to monitoring client.
6. as each described method of claim 1-4, it is characterized in that, described before monitoring client sends described network data, also comprise:
Default monitoring rule according to described monitoring rule, triggers local terminal and sends described network data to monitoring client;
Described monitoring rule comprises: send network data on schedule, press pre-determined number and send network data, and send in the network data any one or more when collecting tentation data.
7. internet brows management method is characterized in that:
Receive the network data that monitored end is gathered, analyze whether comprise the flame data in the described network data;
When in analyzing described network data, comprising the flame data, extract described flame data;
For the flame data of described extraction are determined rule, generate the feedback processing order, and return described feedback processing order to described monitored end, to control described monitored end described flame data are managed.
8. method as claimed in claim 7 is characterized in that, before the network data that the monitored end of described reception is gathered, also comprises:
To the order of monitored end transmitting supervisory, trigger monitored end and send described network data to local terminal.
9. a terminal is characterized in that, comprising:
Acquisition module, the network data when being used for gathering the local terminal view Internet in real time;
Interactive module is used for sending the network data that described acquisition module is gathered to monitoring client, and receives the feedback processing order that described monitoring client returns, and described feedback processing order comprises: the rule of at least one flame data and described flame data;
Administration module is used for the feedback processing order according to described interactive module reception, and described flame data are managed.
10. terminal as claimed in claim 9 is characterized in that, described administration module comprises:
Search the unit, be used for feedback processing order, search the current described flame data that whether exist in the described feedback processing order of local terminal according to described interactive module reception;
First administrative unit, be used for when described when searching the unit and finding described flame data, shield described flame data according to rule corresponding in the described feedback processing order, and the rule of described flame data and described flame data is added in the net mask tabulation of local terminal;
Second administrative unit is used for, the rule of described flame data in the feedback command and described flame data being added in the net mask tabulation of local terminal when searching the unit and not finding described flame data when described.
11. as claim 9 or 10 described terminals, it is characterized in that, also comprise:
Presetting module is used for default monitoring rule, and described monitoring rule comprises: send network data on schedule, press pre-determined number and send network data, and send in the network data any one or more when collecting tentation data;
Trigger module is used for when described interactive module receives the monitoring order of monitoring client, triggers local terminal and sends described network data to monitoring client; Or the monitoring rule default according to described presetting module triggers local terminal and sends described network data to monitoring client.
12. a terminal is characterized in that, comprising:
Receiver module is used to receive the network data that monitored end is gathered;
Analysis module is used for analyzing the network data that described receiver module receives and whether comprises the flame data;
Extraction module is used for analyzing described network data when comprising the flame data when described analysis module, extracts described flame data;
Monitoring module, the flame data that are used to described extraction module to extract are determined rule, generate the feedback processing order, and return described feedback processing order to monitored end, to control described monitored end described flame data are managed.
13. terminal as claimed in claim 12 is characterized in that, also comprises:
Sending module is used for to the order of monitored end transmitting supervisory, triggers described monitored end and sends described network data to local terminal.
14. an internet browsing management system is characterized in that, comprising: monitoring client and monitored end, wherein:
Described monitored end, network data when being used for gathering the local terminal view Internet in real time, and send described network data to described monitoring client, receive the feedback processing order that described monitoring client returns, and, described flame data are managed according to described feedback processing order;
Described monitoring client, be used to receive the network data that described monitored end is gathered, analyze and whether comprise the flame data in the described network data, when in analyzing described network data, comprising the flame data, extract described flame data,, generate the feedback processing order for the flame data of described extraction are determined rule, and return described feedback processing order to described monitored end, to control described monitored end described flame data are managed;
Described monitoring client and monitored end comprise: personal digital assistant PDA, mobile phone, smart mobile phone, palmtop PC, any one or more terminal of laptop computer and PC PC.
CN201010245265XA 2010-08-04 2010-08-04 Internet brows management method, system and terminal Pending CN101931646A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010245265XA CN101931646A (en) 2010-08-04 2010-08-04 Internet brows management method, system and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010245265XA CN101931646A (en) 2010-08-04 2010-08-04 Internet brows management method, system and terminal

Publications (1)

Publication Number Publication Date
CN101931646A true CN101931646A (en) 2010-12-29

Family

ID=43370571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010245265XA Pending CN101931646A (en) 2010-08-04 2010-08-04 Internet brows management method, system and terminal

Country Status (1)

Country Link
CN (1) CN101931646A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143271A (en) * 2011-04-25 2011-08-03 北京百纳威尔科技有限公司 Method and system for monitoring mobile terminal to surf internet
WO2014121631A1 (en) * 2013-02-05 2014-08-14 Tencent Technology (Shenzhen) Company Limited Cloud based method and apparatus for monitoring internet usage
CN104410628A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Fingerprint verification-based internet management system with filtering function
CN104410629A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Network management system based on iris verification
CN104410624A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Internet data management system
CN104410627A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Fingerprint verification based internet management system
CN104410905A (en) * 2014-09-10 2015-03-11 中国人民解放军信息工程大学 An IP video real time monitoring method and system
CN106970942A (en) * 2017-02-20 2017-07-21 绿网天下(福建)网络科技股份有限公司 A kind of method and terminal for relating to yellow content Initiative Defense
CN107046573A (en) * 2017-04-05 2017-08-15 成都爱途享科技有限公司 A kind of supervising device cross-platform on radio communication
CN107248974A (en) * 2017-04-21 2017-10-13 上海掌门科技有限公司 A kind of information uploading method, terminal device and storage medium
CN107426239A (en) * 2017-08-17 2017-12-01 绿网天下(福建)网络科技股份有限公司 A kind of method and terminal for relating to yellow content active interception
CN107547555A (en) * 2017-09-11 2018-01-05 北京匠数科技有限公司 A kind of web portal security monitoring method and device
CN107728974A (en) * 2017-09-11 2018-02-23 北京匠数科技有限公司 A kind of personal electronic equipments and malicious information filtering method
CN108494823A (en) * 2018-02-13 2018-09-04 苏州小雨伞网络科技有限公司 The children's mobile management terminal business model system synchronized based on three end datas
CN110493645A (en) * 2019-08-20 2019-11-22 安徽抖范视频科技有限公司 A kind of method and limitation system of limitation video playing
CN110781200A (en) * 2019-10-30 2020-02-11 百度在线网络技术(北京)有限公司 Processing method, device, equipment and medium for block chain abnormal data
CN111507706A (en) * 2019-01-31 2020-08-07 华为技术有限公司 Data browsing and storing method and device, computer equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549127A (en) * 2003-05-07 2004-11-24 李孟熙 Internet access protecting system
CN101072198A (en) * 2007-03-30 2007-11-14 腾讯科技(深圳)有限公司 Information interactive control method and communication system and management server
CN101359329A (en) * 2008-04-01 2009-02-04 北京恒金恒泰信息技术有限公司 Plugin for filtrating erotic software based on browser
CN101521793A (en) * 2009-03-17 2009-09-02 中兴通讯股份有限公司 Terminal and method for shielding mobile telephone television channels for broadcasting programs

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549127A (en) * 2003-05-07 2004-11-24 李孟熙 Internet access protecting system
CN101072198A (en) * 2007-03-30 2007-11-14 腾讯科技(深圳)有限公司 Information interactive control method and communication system and management server
CN101359329A (en) * 2008-04-01 2009-02-04 北京恒金恒泰信息技术有限公司 Plugin for filtrating erotic software based on browser
CN101521793A (en) * 2009-03-17 2009-09-02 中兴通讯股份有限公司 Terminal and method for shielding mobile telephone television channels for broadcasting programs

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143271A (en) * 2011-04-25 2011-08-03 北京百纳威尔科技有限公司 Method and system for monitoring mobile terminal to surf internet
WO2014121631A1 (en) * 2013-02-05 2014-08-14 Tencent Technology (Shenzhen) Company Limited Cloud based method and apparatus for monitoring internet usage
CN104410905A (en) * 2014-09-10 2015-03-11 中国人民解放军信息工程大学 An IP video real time monitoring method and system
CN104410628A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Fingerprint verification-based internet management system with filtering function
CN104410629A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Network management system based on iris verification
CN104410624A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Internet data management system
CN104410627A (en) * 2014-11-27 2015-03-11 柳州市网中网络策划中心 Fingerprint verification based internet management system
CN106970942B (en) * 2017-02-20 2020-08-11 绿网天下(福建)网络科技股份有限公司 Method and terminal for actively defending yellow-related content
CN106970942A (en) * 2017-02-20 2017-07-21 绿网天下(福建)网络科技股份有限公司 A kind of method and terminal for relating to yellow content Initiative Defense
CN107046573A (en) * 2017-04-05 2017-08-15 成都爱途享科技有限公司 A kind of supervising device cross-platform on radio communication
CN107248974A (en) * 2017-04-21 2017-10-13 上海掌门科技有限公司 A kind of information uploading method, terminal device and storage medium
CN107426239A (en) * 2017-08-17 2017-12-01 绿网天下(福建)网络科技股份有限公司 A kind of method and terminal for relating to yellow content active interception
CN107728974A (en) * 2017-09-11 2018-02-23 北京匠数科技有限公司 A kind of personal electronic equipments and malicious information filtering method
CN107547555A (en) * 2017-09-11 2018-01-05 北京匠数科技有限公司 A kind of web portal security monitoring method and device
CN108494823A (en) * 2018-02-13 2018-09-04 苏州小雨伞网络科技有限公司 The children's mobile management terminal business model system synchronized based on three end datas
CN111507706A (en) * 2019-01-31 2020-08-07 华为技术有限公司 Data browsing and storing method and device, computer equipment and storage medium
CN111507706B (en) * 2019-01-31 2024-04-26 华为技术有限公司 Method, device, computer equipment and storage medium for browsing and storing data
CN110493645A (en) * 2019-08-20 2019-11-22 安徽抖范视频科技有限公司 A kind of method and limitation system of limitation video playing
CN110781200A (en) * 2019-10-30 2020-02-11 百度在线网络技术(北京)有限公司 Processing method, device, equipment and medium for block chain abnormal data
CN110781200B (en) * 2019-10-30 2022-07-08 百度在线网络技术(北京)有限公司 Processing method, device, equipment and medium for block chain abnormal data

Similar Documents

Publication Publication Date Title
CN101931646A (en) Internet brows management method, system and terminal
CN104182488B (en) Searching method, server and client
CN101771676B (en) Setting and authentication method for cross-domain authorization and relevant device and system
US20090174551A1 (en) Internet activity evaluation system
KR20080078431A (en) System and method for keyword searching in messenger and computer readable medium processing the method
CN106055603B (en) Browser access network address recommended method, client and system based on VPN
CN102497632A (en) Smart-phone-based webpage access control method, system and smart phone
CN110321479A (en) A kind of secret protection Information Mobile Service recommended method and client, recommender system
WO2021073002A1 (en) Terminal page access method and system
EP2862338A1 (en) Method, server, and client for pushing and displaying splash screen
KR102107303B1 (en) System and method for providing product manual based on chatbot
CN103793838A (en) Advertisement intercepting method and device
KR20130065312A (en) System and method for collecting url information using retrieval service of social network service
CN103561063B (en) A kind of method of Register top box and terminal
CN105681107A (en) Wireless router management method and system
Emms et al. Electronic footprints in the sand: Technologies for assisting domestic violence survivors
CN105871921A (en) Data processing method and device
CN107133245A (en) Presence information management system, method and electronic equipment
CN103020126A (en) Network content access control method and device
CN103179152B (en) Business information delivery method, system and business platform
Napoli et al. Second Class Netizens: Race and the Emerging Mobile Internet Underclass 1
CN105007212B (en) The methods of exhibiting and device of message feedback item in social network message issue
US20070011170A1 (en) Systems and methods for granting access to data on a website
CN105939222B (en) A method of based on open network and station acquisition App information
US8180771B2 (en) Search activity eraser

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20101229