Unlock instant, AI-driven research and patent intelligence for your innovation.

System security method and device, computer device and storage medium

A system security and user technology, applied in the field of network security, can solve problems such as poor growth of young people

Pending Publication Date: 2019-02-12
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventors of the present invention have found in their research that computers are one of the most important information tools in today's society, and completely prohibiting the use of computers is not conducive to the growth of young people.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System security method and device, computer device and storage medium
  • System security method and device, computer device and storage medium
  • System security method and device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0074] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a system security method and device, a computer device and a storage medium. The method comprises the following steps of obtaining a picture screenshot of a display picture of a display area; inputting the picture screenshot into a preset first neural network model, and obtaining a first classification result of the picture screenshot output from the firstneural network model; comparing the first classification result with the preset behavior planning information, and responding to a user instruction of the user when the first classification result coincides with the behavior planning information. The result of classification is the user behavior information represented by screen shots, namely, what the user is doing with the computer equipment, and by comparing whether the behavior planning information set by the user when using the computer is consistent with the classification result, whether the user uses the computer to perform the behavior operation in the planning instead of using the computer to perform other operation contents can be determined, and the task of helping the user to stop the improper use of the computer can be realized.

Description

technical field [0001] The embodiments of the present invention relate to the field of network security, in particular to a system security method, device, computer equipment and storage medium. Background technique [0002] With the popularity of computer equipment in people's lives, the number of people who use computers is rapidly expanding, and young people are the mainstream group of new computer users. With the acceleration of computer popularization, the age of young people using computers is decreasing year by year. Due to the lack of self-control among young people, excessive use of computers on the Internet will cause young people to suffer from "Internet addiction", which will make them lack interest in learning and other matters in life, which will have a negative impact on the growth of young people. [0003] In the prior art, the general way to prevent teenagers from surfing the Internet is to check their identity information before surfing the Internet, and pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06K9/62
CPCG06F21/32G06F18/24
Inventor 李其刚
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN