User behavior control method and system, and safe desktop

A control method and control system technology, applied in the Internet field, can solve problems such as affecting the normal learning of minors

Inactive Publication Date: 2016-11-09
中青奇未(北京)网络科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when parents limit minors' access to online games by means of restricting access to the terminal, they also restrict minors' online learning behavior, which seriously affects the normal learning of minors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior control method and system, and safe desktop
  • User behavior control method and system, and safe desktop
  • User behavior control method and system, and safe desktop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] refer to figure 1 , shows a schematic flowchart of steps of a user behavior control method in Embodiment 1 of the present invention. In this embodiment, the user behavior control method includes:

[0107] Step 102, receiving a request for exchanging the first online time corresponding to the first user behavior with the second online time corresponding to the second user behavior.

[0108] With the development of the Internet, users can accomplish more and more things through the Internet, such as online learning, online office, browsing various web pages, playing games, listening to songs and watching movies, etc. through the Internet. The activities performed by users through the Internet can be defined as user behaviors.

[0109] In this embodiment, user behaviors can be divided into two categories: first user behaviors and second user behaviors. Among them, activities such as online learning, online office, and searching for work or study materials through the In...

Embodiment 2

[0120] refer to figure 2 , which shows a schematic flowchart of steps of a user behavior control method in Embodiment 2 of the present invention. In this embodiment, the user behavior control method can be applied to a third-party desktop. Wherein, the third-party desktop has a management mode and at least one managed mode, and the management mode can be used to control the first user behavior and the second user behavior corresponding to the at least one managed mode.

[0121] Wherein, the user behavior control method includes:

[0122] Step 202, respectively determine the first online time and the second online time according to the user attribute information.

[0123] In this embodiment, the first surfing time may specifically be the surfing time corresponding to the first user behavior, and the second surfing time may specifically be the surfing time corresponding to the second user behavior. Wherein, the first user behavior includes but not limited to: work and / or stu...

Embodiment 3

[0169] In combination with the foregoing embodiments, this embodiment uses a specific example to describe the user behavior control method in detail. In this embodiment, the user behavior control method can be specifically implemented through a third-party desktop set in the terminal, the third-party desktop includes a control mode and a controlled mode, and its specific application scenario is the first user-the first user Two users, the first user may be a parent, and the second user may be a child.

[0170] refer to image 3 , which shows a schematic flowchart of steps of a user behavior control method in Embodiment 3 of the present invention. In this embodiment, the user behavior control method may specifically include:

[0171] Step 302, receiving an input request for user attribute information of a second user.

[0172] In this embodiment, the first user can log in to the management and control mode of the third-party desktop by inputting a login password, and in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a user behavior control method and system, as well as a secure desktop, wherein the method includes: receiving the interaction between the first online time corresponding to the first user behavior and the second online time corresponding to the second user behavior exchange request; respectively update the first online time and the second online time according to the exchange request to obtain the first update time and the second update time; according to the first update time and the second update time The first user behavior and the second user behavior are respectively controlled. Independent control of different user behaviors is realized through the technical solution of the present invention, the control is more reasonable and accurate, user behaviors do not affect each other, and user experience is improved.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a user behavior control method and system, and a secure desktop. Background technique [0002] With the development of the Internet, users can accomplish more and more things through the Internet, such as online learning, online office, browsing various web pages, playing games, listening to songs and watching movies, etc., and the number of users is also increasing. The closer it is to getting younger, more and more minors are starting to use the Internet. [0003] However, because minors often lack self-control, they are easily affected by a bad network environment, for example, being addicted to online games. In order to protect minors, parents usually limit minors' access to online games by means of restricting terminal access to the Internet. However, while parents limit minors' access to online games by means of restricting access to the terminal, they also restrict ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/10H04L63/107H04L67/08
Inventor 郝宪强谢鹏齐向东金东
Owner 中青奇未(北京)网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products