Movatterモバイル変換


[0]ホーム

URL:


CN112995149A - Computer network information management system - Google Patents

Computer network information management system
Download PDF

Info

Publication number
CN112995149A
CN112995149ACN202110168444.6ACN202110168444ACN112995149ACN 112995149 ACN112995149 ACN 112995149ACN 202110168444 ACN202110168444 ACN 202110168444ACN 112995149 ACN112995149 ACN 112995149A
Authority
CN
China
Prior art keywords
computer
detection signal
software
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110168444.6A
Other languages
Chinese (zh)
Other versions
CN112995149B (en
Inventor
王香丽
赵艳艳
徐桂芳
秦连铭
李志敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Polytechnic Institute
Original Assignee
Henan Polytechnic Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Polytechnic InstitutefiledCriticalHenan Polytechnic Institute
Priority to CN202110168444.6ApriorityCriticalpatent/CN112995149B/en
Publication of CN112995149ApublicationCriticalpatent/CN112995149A/en
Application grantedgrantedCritical
Publication of CN112995149BpublicationCriticalpatent/CN112995149B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The invention discloses a computer network information management system, which belongs to the technical field of computer network information management and aims to solve the problems of how to increase the security of user files and how to solve the problem of advertisement pop-up, and comprises a server, a storage module, an advertisement interception module, a network diagnosis module, a fault maintenance module and an information encryption module; the advertisement blocking module comprises a blocking unit, a display unit and a software recommending unit, and the advertisement popped up in the computer is blocked by the blocking unit, because the advertisement popped up in the computer is very annoying to users, and when the users are not at present, sensitive information pops up, and the users are very embarrassed when being seen by colleagues and family members, the advertisement popped up in the computer needs to be blocked; recommending software to the client through the software recommending unit, unloading the software after intercepting the advertisement, and recommending the software which does not pop up the advertisement to the client according to the information of the unloaded software.

Description

Computer network information management system
Technical Field
The invention belongs to the technical field of computer network information management; in particular to a computer network information management system.
Background
The computer network system is a system which interconnects a plurality of computer systems with different geographic positions and independent functions by utilizing communication equipment and lines, and realizes resource sharing and information transmission in the network by network software with complete functions. The communication between the computers is realized through the interconnection of the computers, thereby realizing the functions of sharing, cooperative work and the like of information, software and equipment resources between computer systems.
Patent publication No. CN206835116U discloses a computer network management system, which includes: the router is connected with the network equipment through a network cable or wifi; the accommodating shell is fixed with a wall body and is provided with four side plates and a back plate, a supporting body is arranged in the accommodating shell, an object placing space matched with the router in shape is limited in the supporting body, a plurality of network cable channels are formed in the outer edge position of the object placing space, and the network cable channels penetrate through the four side plates and the back plate; the transparent acrylic door panel is pivoted on the front side edge of the storage shell, and a sealing strip is further arranged on the inner side edge of the transparent acrylic door panel. The computer network management system provided by the invention can be used for a long time and has good heat dissipation.
However, the above patent does not solve the problem of how to increase the security of the user file and how to solve the problem of advertisement pop-up.
Disclosure of Invention
The invention aims to provide a computer network information management system, which solves the problems of how to increase the security of user files and how to solve the problem of advertisement pop-up.
The purpose of the invention can be realized by the following technical scheme:
a computer network information management system comprises a server, a storage module, an advertisement interception module, a network diagnosis module, a fault maintenance module and an information encryption module;
the advertisement blocking module comprises a blocking unit, a display unit and a software recommending unit, wherein the display unit is used for displaying the received information to a user for viewing, the blocking unit is used for blocking the advertisements popped up in the computer, and the specific blocking method comprises the following steps:
step S11: when the advertisement is popped out from the computer, blocking information is generated and sent to the display unit, when the user selects permission, the advertisement popped out from the computer is not blocked, and when the user selects blocking, the same advertisement can be blocked in the future;
step S12: the method comprises the steps of obtaining an advertisement source, sending the advertisement source to a display module, unloading software of the advertisement source when a user needs to solve the problem of advertisement pop-up permanently, and not operating when the user does not need to solve the problem of advertisement pop-up permanently;
the information encryption module is used for encrypting the user file, and the specific encryption method comprises the following steps:
step S61: moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password;
step S62: setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three levels, a first level and a third level are both provided with jigsaw patterns by a user, a second level is an encryption password for piecing up the folder, each level is completed with three options, the game is quitted, the next level and the storage and sharing are finished, when the second level is finished, the game is quitted when the game is selected to quit, the third level is entered when the next level is selected, and the hidden folder is entered when the storage and sharing are selected;
step S63: put the jigsaw game into other folders.
Further, the software recommending unit is used for recommending the computer software to the user, and the specific recommending method comprises the following steps:
step S21: acquiring the information of the uninstalled advertisement source software and sending the information of the advertisement source software to a display unit; setting all software information to correspond to a threshold, wherein the value range of the threshold is greater than zero and less than one, matching the software information with all the software information to obtain the corresponding threshold and marking the threshold as i, wherein i is 1, 2, … … and n, and n is a positive integer;
step S22: acquiring the requirement of a user on required software, matching the requirement of the user on the required software with all computer software to obtain a matching degree, and marking the matching degree as Pi;
step S23: acquiring user scores of computer software, and marking the user scores as Hi;
step S24: acquiring a memory required by installing computer software, and marking the required memory as Ki; removing dimensions of the software information, the matching degree, the user score and the required memory, and taking the numerical value for calculation;
step S25: according to the formula Qi ═ λ [ e ]b1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2Obtaining a priority value Qi, wherein b1, b2 and b3 are all proportionality coefficients, and the value range is that b1 is more than or equal to 1<2,0<b2≤1,0<b3 is less than or equal to 1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S26: and arranging according to the size of the priority value Qi, and sending the arranged first five software information to a display unit.
Further, the network diagnosis module is used for diagnosing the network speed of the network, the network diagnosis module comprises a network speed detection unit and a network overhaul unit, the network speed detection unit is used for detecting the network speed in the computer, and the specific detection method comprises the following steps:
step S31: establishing a downloading node, wherein the downloading node is used for counting the time required for downloading the specified file;
step S32: acquiring the current network speed through a downloading node, and marking the current network speed as V;
step S33: acquiring the broadband speed of the computer, and marking the broadband speed of the computer as C;
step S34: obtaining a computer network speed warning value according to a formula Z ═ alphaC, wherein alpha is a proportionality coefficient, and 0< alpha < 1; when Z is less than or equal to V, the computer network speed is normal, and when V is less than Z, the computer network speed influences the operation of the computer.
Further, the network overhaul unit is used for overhauling the speed problem of the computer network, and the specific overhauling method comprises the following steps:
step S41: setting a detection signal sending point, a plurality of detection signal transfer points and a detection signal receiving point in a computer network; only one piece of computer software is arranged between adjacent transfer points of the detection signals;
step S42: the method comprises the steps that a detection signal sending point sends a detection signal, and the detection signal is finally received by a detection signal receiving point, so that the time consumed by the fact that the detection signal is sent from the detection signal sending point to the detection signal receiving point and the time consumed by the fact that the detection signal passes through two adjacent signal transfer nodes is obtained;
step S43: acquiring the time consumed by a detection signal from a detection signal sending point to a detection signal receiving point when the network speed is normal, and the time consumed by the detection signal passing through two adjacent signal transfer nodes;
step S44: comparing the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point and the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point when the network speed is normal, wherein when the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal is longer than the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal when the network speed is normal, the network speed has a problem;
step S45: comparing the time consumed by all detection signals at two adjacent signal transfer nodes with the time consumed by the detection signals from the detection signal sending point to the detection signal receiving point to obtain the broadband network speed ratio occupied by the computer software between the two adjacent signal transfer nodes;
step S46: and sending the broadband network speed ratio occupied by each software in the computer to a display unit.
Further, the fault maintenance module is used for maintaining the computer fault problem, and the specific maintenance method comprises the following steps:
step S51: when a user computer fails, directly sending a fault maintenance request to a fault maintenance module;
step S52: carrying out preliminary fault problem information acquisition on a user computer, and estimating maintenance duration of the preliminarily acquired fault problems;
step S53: acquiring user information with computer faults, setting all the user information to correspond to a threshold, wherein the value range of the threshold is larger than zero and smaller than one, matching the user information with all the user information to acquire the corresponding threshold and marking the threshold as j, wherein j is 1, 2, … … and m, and m is a positive integer;
step S54: acquiring position information of a maintenance worker on duty, acquiring a distance between the maintenance worker and a computer user needing to be maintained, and marking the distance between the maintenance worker and the computer user needing to be maintained as Lj;
step S55: acquiring estimated maintenance time of the fault problem, and marking the estimated maintenance time as Wj; removing dimension and taking numerical value calculation of user information, the distance between a maintenance worker and a computer user needing maintenance and the estimated maintenance duration;
step S56: according to the formula Rj ═ λ [ e ]10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]Obtaining a maintenance value Rj, wherein b4 and b5 are proportional coefficients and have a value range of 0<b4<1,0<b5<1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S57: and dispatching maintenance workers to perform maintenance according to the height of the maintenance value Rj.
The invention has the beneficial effects that: the advertisement popped up in the computer is intercepted through the intercepting unit, because the advertisement popped up in the computer is very annoying to the user, and the user pops up sensitive information when the user is not present, so that the user is very embarrassed when being seen by colleagues and family members, and therefore the advertisement popped up in the computer needs to be intercepted; recommending software to a client through a software recommending unit, unloading the software after intercepting the advertisement, and recommending the software which does not pop up the advertisement to the client according to the information of the unloaded software; encrypting a user file through an information encryption module, moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password; setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three levels, a first level and a third level are both provided with jigsaw patterns by a user, a second level is an encryption password for piecing up the folder, each level is completed with three options, the game quits, the next level and the storage and sharing are finished, when the second level is finished, the game quits when the game quits is selected, the third level enters when the next level is selected, and the hidden folder enters when the storage and sharing are selected; the puzzle game is placed in other folders, so that the safety of the user for hiding the files is greatly improved, and the puzzle game cannot be found by other people.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic block diagram of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a computer network information management system includes a server, a storage module, an advertisement blocking module, a network diagnosis module, a fault maintenance module, and an information encryption module;
the advertisement blocking module comprises a blocking unit, a display unit and a software recommending unit, the display unit is used for displaying the received information to a user for viewing, the blocking unit is used for blocking the advertisements popped up in the computer, because the advertisements popped up in the computer are very annoying to the user, and when the user is not at present, the advertisements pop up sensitive information and are very embarrassed when being seen by colleagues and family members, therefore, the advertisements popped up in the computer need to be blocked, and the specific blocking method comprises the following steps:
step S11: when the computer pops out the advertisement, blocking information is generated, wherein the blocking information comprises permission selection and blocking selection and is used for selecting the user, because some users do not want to block the advertisement and send the blocking information to the display unit, when the user selects permission, the advertisement popped out of the computer is not blocked, and when the user selects blocking, the same advertisement is blocked in the future;
step S12: acquiring an advertisement source, popping up the advertisement source from what software, sending the advertisement source to a display module, unloading the software of the advertisement source when a user needs to solve the problem of the advertisement pop-up permanently, and not operating when the user does not need to solve the problem of the advertisement pop-up permanently;
the software recommending unit is used for recommending the computer software to the user, and the specific recommending method comprises the following steps:
step S21: acquiring information of the uninstalled advertisement source software, wherein the information of the advertisement source software comprises a software type and a software purpose, and sending the information of the advertisement source software to a display unit; software usage and type for client-aware offloading; setting all software information to correspond to a threshold, wherein the value range of the threshold is greater than zero and less than one, matching the software information with all the software information to obtain the corresponding threshold and marking the threshold as i, wherein i is 1, 2, … … and n, and n is a positive integer; the software information includes a software type;
step S22: acquiring the requirement of a user on required software, such as no advertisement pop-up and no user agreeing to install the software privately, matching the requirement of the user on the required software with all computer software to obtain a matching degree, and marking the matching degree as Pi;
step S23: acquiring user scores of computer software, and marking the user scores as Hi;
step S24: acquiring a memory required by installing computer software, and marking the required memory as Ki; removing dimensions of the software information, the matching degree, the user score and the required memory, and taking the numerical value for calculation;
step S25: according to the formula Qi ═ λ [ e ]b1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2Obtaining a priority value Qi, wherein b1, b2 and b3 are all proportionality coefficients, and the value range is that b1 is more than or equal to 1<2,0<b2≤1,0<b3 is less than or equal to 1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S26: arranging according to the priority value Qi, and sending the arranged first five software information to a display unit;
the network diagnosis module is used for diagnosing the network speed of the network, the network diagnosis module comprises a network speed detection unit and a network maintenance unit, the network speed detection unit is used for detecting the network speed in the computer, and the specific detection method comprises the following steps:
step S31: establishing a downloading node, wherein the downloading node is used for counting the time required for downloading the specified file, and the specified file is a file carried in the downloading node;
step S32: acquiring the current network speed through a downloading node, and marking the current network speed as V;
step S33: acquiring the broadband speed of the computer, and marking the broadband speed of the computer as C;
step S34: obtaining a computer network speed warning value according to a formula Z ═ alphaC, wherein alpha is a proportionality coefficient, and 0< alpha < 1; when Z is less than or equal to V, the computer network speed is normal, and when V is less than Z, the computer network speed influences the computer operation, for example, the computer is jammed when used, the refreshing is slow, and the use of a user is influenced;
the network maintenance unit is used for maintaining the speed problem of the computer network, and the specific maintenance method comprises the following steps:
step S41: setting a detection signal sending point, a plurality of detection signal transfer points and a detection signal receiving point in a computer network; the detection signal sending point is arranged at the broadband entrance of the computer; only one piece of computer software is arranged between the transfer points of the adjacent detection signals;
step S42: the method comprises the steps that a detection signal sending point sends a detection signal, and the detection signal is finally received by a detection signal receiving point, so that the time consumed by the fact that the detection signal is sent from the detection signal sending point to the detection signal receiving point and the time consumed by the fact that the detection signal passes through two adjacent signal transfer nodes is obtained;
step S43: acquiring the time consumed by a detection signal from a detection signal sending point to a detection signal receiving point when the network speed is normal, and the time consumed by the detection signal passing through two adjacent signal transfer nodes; this time is detected at a normal limit of network speed;
step S44: comparing the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point and the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point when the network speed is normal, wherein when the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal is longer than the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal when the network speed is normal, the network speed has a problem; otherwise, there is no problem;
step S45: comparing the time consumed by all detection signals at two adjacent signal transfer nodes with the time consumed by the detection signals from the detection signal sending point to the detection signal receiving point to obtain the broadband network speed ratio occupied by the computer software between the two adjacent signal transfer nodes;
step S46: the broadband network speed proportion occupied by each software in the computer is sent to the display unit, so that a user can conveniently check the broadband network speed use condition;
the fault maintenance module is used for maintaining the computer fault problem, and the specific maintenance method comprises the following steps:
step S51: when a user computer fails, directly sending a fault maintenance request to a fault maintenance module;
step S52: carrying out preliminary fault problem information acquisition on a user computer, wherein the fault problem information comprises fault reasons sent by a user; estimating the maintenance time length of the preliminarily collected fault problems; estimating the maintenance time length of the same fault problems in the current period, for example, taking the average value of the maintenance time of the same fault problems in the current period;
step S53: acquiring user information with computer faults, wherein the user information comprises user living addresses, setting all the user information to correspond to a threshold, the value range of the threshold is larger than zero and smaller than one, matching the user information with all the user information to acquire the corresponding threshold and marking the threshold as j, wherein j is 1, 2, … … and m, and m is a positive integer;
step S54: acquiring position information of a maintenance worker on duty, acquiring a distance between the maintenance worker and a computer user needing to be maintained, and marking the distance between the maintenance worker and the computer user needing to be maintained as Lj;
step S55: acquiring estimated maintenance time of the fault problem, and marking the estimated maintenance time as Wj; removing dimension and taking numerical value calculation of user information, the distance between a maintenance worker and a computer user needing maintenance and the estimated maintenance duration;
step S56: according to the formula Rj ═ λ [ e ]10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]Obtaining a maintenance value Rj, wherein b4 and b5 are proportional coefficients and have a value range of 0<b4<1,0<b5<1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S57: dispatching maintenance workers to perform maintenance according to the height of the maintenance value Rj;
the information encryption module is used for encrypting the user file, and the specific encryption method comprises the following steps:
step S61: moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password;
step S62: setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three levels, a first level and a third level are both provided with jigsaw patterns by a user, a second level is an encryption password for piecing up the folder, each level is completed with three options, the game quits, the next level and the storage and sharing are finished, when the second level is finished, the game quits when the game quits is selected, the third level enters when the next level is selected, and the hidden folder enters when the storage and sharing are selected;
step S63: put the jigsaw game into other folders.
The above formulas are all calculated by removing dimensions and taking values thereof, the formula is one closest to the real situation obtained by collecting a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
When the system is used, the advertisement popped up in the computer is intercepted through the intercepting unit, the intercepting information is generated and sent to the display unit when the advertisement is popped up in the computer, when the user selects permission, the advertisement popped up in the computer is not intercepted, and when the user selects interception, the same advertisement can be intercepted in the future; the method comprises the steps of obtaining an advertisement source, sending the advertisement source to a display module, unloading software of the advertisement source when a user needs to solve the problem of advertisement pop-up permanently, and not operating when the user does not need to solve the problem of advertisement pop-up permanently; recommending computer software to a user through a software recommending unit, acquiring uninstalled advertisement source software information, sending the advertisement source software information to a display unit, and according to a formula Qi-lambda eb1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2Acquiring a priority value Qi, arranging according to the priority value Qi, and sending the arranged first five software information to a display unit; detecting the network speed in the computer through a network speed detection unit, establishing a downloading node, wherein the downloading node is used for counting the time required for downloading the specified file, acquiring the current network speed through the downloading node, and marking the current network speed as V; acquiring the broadband speed of the computer, and marking the broadband speed of the computer as C; obtaining the computer network speed warning value according to the formula Z ═ alphaC, when Z is less than or equal to V, then the computer networkNormal speed when V<When Z is needed, the computer network speed influences the operation of the computer;
the method comprises the steps that a network maintenance unit is used for maintaining the speed problem of a computer network, a detection signal is sent by a detection signal sending point and finally received by a detection signal receiving point, and the time consumed by the current detection signal from the detection signal sending point to the detection signal receiving point and the time consumed by the current detection signal passing through two adjacent signal transfer nodes are obtained; acquiring the time consumed by a detection signal from a detection signal sending point to a detection signal receiving point when the network speed is normal, and the time consumed by the detection signal passing through two adjacent signal transfer nodes; comparing the time consumed by all detection signals at two adjacent signal transfer nodes with the time consumed by the detection signals from the detection signal sending point to the detection signal receiving point to obtain the broadband network speed ratio occupied by the computer software between the two adjacent signal transfer nodes; the broadband network speed proportion occupied by each software in the computer is sent to the display unit, so that a user can conveniently check the broadband network speed use condition;
the computer fault problem is maintained through the fault maintenance module, and when the user computer has a fault, a fault maintenance request is directly sent to the fault maintenance module; carrying out preliminary fault problem information acquisition on a user computer, and estimating maintenance duration of the preliminarily acquired fault problems; according to the formula Rj ═ λ [ e ]10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]Obtaining a maintenance value Rj, and dispatching maintenance workers to maintain according to the height of the maintenance value Rj; encrypting a user file through an information encryption module, moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password; setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three stages, a first stage and a third stage are both provided with jigsaw patterns by a user, a second stage is an encryption password for piecing up the folder, each stage is provided with three options for finishing, quitting the game, next stage and storing and sharing, when the second stage is finished, the game is quitted when the game is selected to quit, and the game is selected to quitEntering a third gate when the next gate is closed, and entering a hidden folder when the sharing is selected to be stored; put the jigsaw game into other folders.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (5)

Translated fromChinese
1.一种计算机网络信息管理系统,其特征在于,包括服务器、储存模块、广告拦截模块、网络诊断模块、故障维修模块和信息加密模块;1. a computer network information management system, is characterized in that, comprises server, storage module, advertisement interception module, network diagnosis module, fault maintenance module and information encryption module;所述广告拦截模块包括拦截单元、显示单元、软件推荐单元,所述显示单元用于将接收到的信息显示给用户查看,所述拦截单元用于拦截计算机中弹出的广告,具体拦截方法包括以下步骤:The advertisement interception module includes an interception unit, a display unit, and a software recommendation unit. The display unit is used to display the received information to the user for viewing. The interception unit is used to intercept pop-up advertisements in the computer. The specific interception method includes the following: step:步骤S11:当计算机中弹出广告时,生成拦截信息,并将拦截信息发送至显示单元,当用户选择允许时,对计算机中弹出的广告不进行拦截,当用户选择拦截时,今后将会对相同的广告进行拦截;Step S11: when the advertisement pops up in the computer, generate interception information, and send the interception information to the display unit. When the user chooses to allow, the advertisement that pops up in the computer is not intercepted. When the user chooses to intercept, the same ad blocking;步骤S12:获取广告来源,并将广告来源发送至显示模块,当用户要永久解决广告弹出问题时,将广告来源的软件进行卸载,当客户不需要永久解决广告弹出问题时,不进行操作;Step S12: obtaining the advertisement source, and sending the advertisement source to the display module, when the user wants to permanently solve the advertisement pop-up problem, uninstall the software of the advertisement source, and when the customer does not need to permanently solve the advertisement pop-up problem, do not operate;所述信息加密模块用于对用户文件进行加密,具体加密方法包括以下步骤:The information encryption module is used to encrypt user files, and the specific encryption method includes the following steps:步骤S61:将需要加密的文件全部移动到一个文件夹中,对文件夹进行加密,设置加密密码;Step S61: Move all the files to be encrypted into a folder, encrypt the folder, and set an encryption password;步骤S62:设置拼图游戏,将文件夹隐藏到拼图游戏中,所述拼图游戏有三个关卡,第一关与第三关均由用户设置拼图图案,第二关是拼凑文件夹的加密密码,完成每一个关卡都有三个选项,退出游戏、下一关和保存分享,当完成第二关时,选择退出游戏时退出游戏,选择下一关时进入第三关,选择保存分享时进入隐藏文件夹;Step S62: Set up a jigsaw puzzle and hide the folder in the jigsaw puzzle game. The jigsaw puzzle game has three levels, the first level and the third level are both set by the user to set the puzzle pattern, and the second level is to make up the encrypted password of the folder, complete Each level has three options, exit the game, next level and save and share. When the second level is completed, exit the game when you choose to exit the game, enter the third level when you select the next level, and enter the hidden folder when you choose to save and share. ;步骤S63:将拼图游戏放到其他文件夹中。Step S63: Put the jigsaw puzzles in other folders.2.根据权利要求1所述的一种计算机网络信息管理系统,其特征在于,所述软件推荐单元用于向用户推荐计算机软件,具体推荐方法包括以下步骤:2. a kind of computer network information management system according to claim 1 is characterized in that, described software recommendation unit is used for recommending computer software to user, and concrete recommendation method comprises the following steps:步骤S21:获取卸载的广告来源软件信息,并将广告来源软件信息发送至显示单元;设定所有软件信息均对应一个阈值,其中阈值取值范围为大于零且小于一,将软件信息与所有软件信息匹配获取到对应的阈值并标记为i,其中,i=1、2、……、n,n为正整数;Step S21: Obtain the uninstalled advertisement source software information, and send the advertisement source software information to the display unit; set all software information to correspond to a threshold, wherein the threshold value range is greater than zero and less than one, and compare the software information with all software. Information matching obtains the corresponding threshold and marks it as i, where i=1, 2, ..., n, and n is a positive integer;步骤S22:获取用户对所需软件的要求,将用户对所需软件的要求与所有计算机软件进行匹配,获得匹配度,并将匹配度标记为Pi;Step S22: obtaining the user's requirements for the required software, matching the user's requirements for the required software with all computer software, obtaining the matching degree, and marking the matching degree as Pi;步骤S23:获取计算机软件的用户评分,并将用户评分标记为Hi;Step S23: obtaining the user rating of the computer software, and marking the user rating as Hi;步骤S24:获取安装计算机软件所需内存,并将所需内存标记为Ki;将软件信息、匹配度、用户评分和所需内存进行去除量纲取其数值计算;Step S24: Obtain the memory required for installing the computer software, and mark the required memory as Ki; remove the dimension and calculate the numerical value of the software information, matching degree, user score and required memory;步骤S25:根据公式Qi=λ*[eb1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2获取得到优先值Qi,其中,b1、b2、b3均为比例系数,取值范围为1≤b1<2,0<b2≤1,0<b3≤1,λ为修正因子,取值范围为0<λ≤1;Step S25: Obtain the priority value Qi according to the formula Qi=λ*[eb1*Pi *(b2*Hi)1/2 ]/(b3*Ki)1/2 , wherein b1, b2 and b3 are proportional coefficients , the value range is 1≤b1<2, 0<b2≤1, 0<b3≤1, λ is the correction factor, and the value range is 0<λ≤1;步骤S26:根据优先值Qi的大小进行排列,并将排列后的前五个软件信息发送至显示单元。Step S26: Arrange according to the size of the priority value Qi, and send the first five pieces of software information after the arrangement to the display unit.3.根据权利要求1所述的一种计算机网络信息管理系统,其特征在于,所述网络诊断模块用于对网络网速进行诊断,网络诊断模块包括网速检测单元和网络检修单元,所述网速检测单元用于检测计算机中的网络速度,具体检测方法包括以下步骤:3. A computer network information management system according to claim 1, wherein the network diagnosis module is used for diagnosing the network speed, and the network diagnosis module comprises a network speed detection unit and a network maintenance unit. The network speed detection unit is used to detect the network speed in the computer, and the specific detection method includes the following steps:步骤S31:建立下载节点,所述下载节点用于统计下载指定文件所需的时间;Step S31: establishing a download node, the download node is used to count the time required for downloading a specified file;步骤S32:通过下载节点获取现在的网络速度,并将现在的网络速度标记为V;Step S32: Obtain the current network speed through the download node, and mark the current network speed as V;步骤S33:获取计算机的宽带速度,并将计算机的宽带速度标记为C;Step S33: obtaining the broadband speed of the computer, and marking the broadband speed of the computer as C;步骤S34:根据公式Z=αC获得计算机网络速度警戒值,其中,α为比例系数,0<α<1;当Z≤V时,则计算机网络速度正常,当V<Z时,则计算机网络速度影响计算机运行。Step S34: Obtain the computer network speed warning value according to the formula Z=αC, where α is a proportional coefficient, 0<α<1; when Z≤V, the computer network speed is normal, and when V<Z, the computer network speed affect computer operation.4.根据权利要求3所述的一种计算机网络信息管理系统,其特征在于,所述网络检修单元用于对计算机网络速度问题进行检修,具体检修方法包括以下步骤:4. a kind of computer network information management system according to claim 3 is characterized in that, described network overhaul unit is used for overhauling computer network speed problem, and concrete overhauling method comprises the following steps:步骤S41:在计算机网络中设置检测信号发送点、若干个检测信号中转点和检测信号接收点;相邻所述检测信号中转点之间只有一个计算机软件;Step S41: setting up a detection signal transmission point, a plurality of detection signal transfer points and detection signal reception points in the computer network; there is only one computer software between adjacent detection signal transfer points;步骤S42:由检测信号发送点发送一个检测信号,最终被检测信号接收点接收,获取现在检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间,以及现在检测信号通过相邻两个信号中转节点所耗费的时间;Step S42: A detection signal is sent by the detection signal transmission point, and finally received by the detection signal reception point, obtains the time taken for the detection signal to be sent from the detection signal transmission point to the reception point of the detection signal reception point, and the current detection signal passes through the adjacent The time spent by the two signal relay nodes;步骤S43:获取在网络速度正常时,检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间,以及检测信号通过相邻两个信号中转节点所耗费的时间;Step S43: Obtain the time taken for the detection signal to be sent from the detection signal sending point to the received point of the detected signal receiving point when the network speed is normal, and the time it takes for the detection signal to pass through two adjacent signal transit nodes;步骤S44:将现在检测的检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间与网络速度正常时检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间进行对比,当现在检测的检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间比网络速度正常时检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间长时,则网络速度有问题;Step S44 : the time taken for the currently detected detection signal to be sent from the detection signal sending point to the detection signal receiving point and the time taken for the detection signal to be sent from the detection signal transmission point to the detection signal receiving point when the network speed is normal For comparison, when the detected detection signal is sent from the detection signal sending point to the detection signal receiving point, the time taken is longer than when the network speed is normal. For a long time, there is a problem with the network speed;步骤S45:将所有检测信号在相邻两个信号中转节点所耗费的时间与检测信号从检测信号发送点发出到被检测信号接收点接收所耗费的时间进行对比,获得相邻两个信号中转节点之间计算机软件所占用的宽带网速比例;Step S45: Compare the time spent by all the detection signals at two adjacent signal relay nodes with the time spent by the detection signals from the detection signal sending point to the detection signal reception point, and obtain two adjacent signal relay nodes. The proportion of broadband network speed occupied by computer software;步骤S46:将计算机中各个软件所占用的宽带网速比例发送至显示单元。Step S46: Send the proportion of the broadband network speed occupied by each software in the computer to the display unit.5.根据权利要求1所述的一种计算机网络信息管理系统,其特征在于,所述故障维修模块用于维修计算机故障问题,具体维修方法包括以下步骤:5. a kind of computer network information management system according to claim 1, is characterized in that, described fault repair module is used for repairing computer failure problem, and concrete repair method comprises the following steps:步骤S51:当用户计算机出现故障时,直接向故障维修模块发送故障维修请求;Step S51: when the user's computer is faulty, directly send a fault maintenance request to the fault maintenance module;步骤S52:对用户计算机进行初步的故障问题信息采集,并对初步采集到的故障问题进行预估维修时长;Step S52: Collect preliminary fault problem information on the user's computer, and estimate the maintenance time for the preliminary collected fault problems;步骤S53:获取拥有计算机故障的用户信息,设定所有用户信息均对应一个阈值,其中阈值取值范围为大于零且小于一,将用户信息与所有用户信息匹配获取到对应的阈值并标记为j,其中j=1、2、……、m,m为正整数;Step S53: Obtain user information with computer failures, set all user information to correspond to a threshold, wherein the threshold value range is greater than zero and less than one, match the user information with all user information to obtain the corresponding threshold and mark it as j , where j=1, 2, ..., m, where m is a positive integer;步骤S54:获取正在上班的维修工人位置信息,获取维修工人与需要维修计算机用户之间的距离,并将维修工人与需要维修计算机用户之间的距离标记为Lj;Step S54: acquiring the location information of the maintenance worker who is going to work, acquiring the distance between the maintenance worker and the computer user who needs to be repaired, and marking the distance between the maintenance worker and the computer user who needs to be repaired as Lj;步骤S55:获取故障问题预估维修时长,并将预估维修时长标记为Wj;将用户信息、维修工人与需要维修计算机用户之间的距离和预估维修时长进行去除量纲取其数值计算;Step S55: Obtain the estimated maintenance duration for the fault problem, and mark the estimated maintenance duration as Wj; remove the dimension and calculate the numerical value of the user information, the distance between the maintenance worker and the user of the computer requiring maintenance, and the estimated maintenance duration;步骤S56:根据公式Rj=λ*[e10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]获取得到维修值Rj,其中,b4、b5均为比例系数,取值范围为0<b4<1,0<b5<1,λ为修正因子,取值范围为0<λ≤1;Step S56: Obtain the maintenance value Rj according to the formula Rj=λ*[e10*(b4+b5) /(b4*Lj)1/2 *(b5*Wj)2/3 ], where b4 and b5 are both Proportional coefficient, the value range is 0<b4<1, 0<b5<1, λ is the correction factor, and the value range is 0<λ≤1;步骤S57:根据维修值Rj的高低进行派遣维修工人进行维修。Step S57: Dispatch maintenance workers to perform maintenance according to the level of maintenance value Rj.
CN202110168444.6A2021-02-072021-02-07 A computer network information management systemActiveCN112995149B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110168444.6ACN112995149B (en)2021-02-072021-02-07 A computer network information management system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110168444.6ACN112995149B (en)2021-02-072021-02-07 A computer network information management system

Publications (2)

Publication NumberPublication Date
CN112995149Atrue CN112995149A (en)2021-06-18
CN112995149B CN112995149B (en)2022-04-22

Family

ID=76348854

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110168444.6AActiveCN112995149B (en)2021-02-072021-02-07 A computer network information management system

Country Status (1)

CountryLink
CN (1)CN112995149B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102857559A (en)*2012-08-152013-01-02腾讯科技(深圳)有限公司Method and system for recommending software, and client end
EP3051453A1 (en)*2015-01-272016-08-03Alun MackrillElectronic puzzle messaging
CN107193889A (en)*2017-05-022017-09-22努比亚技术有限公司Ad blocking method, terminal and computer-readable recording medium
CN109842617A (en)*2019-01-032019-06-04深圳壹账通智能科技有限公司Ad blocking method, apparatus and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102857559A (en)*2012-08-152013-01-02腾讯科技(深圳)有限公司Method and system for recommending software, and client end
EP3051453A1 (en)*2015-01-272016-08-03Alun MackrillElectronic puzzle messaging
CN107193889A (en)*2017-05-022017-09-22努比亚技术有限公司Ad blocking method, terminal and computer-readable recording medium
CN109842617A (en)*2019-01-032019-06-04深圳壹账通智能科技有限公司Ad blocking method, apparatus and storage medium

Also Published As

Publication numberPublication date
CN112995149B (en)2022-04-22

Similar Documents

PublicationPublication DateTitle
US8238263B2 (en)Network status detection
Kim et al.Detection for non-technical loss by smart energy theft with intermediate monitor meter in smart grid
US20130007127A1 (en)Determination of a spammer through social network characterization
US7894357B2 (en)Capability-based testing and evaluation of network performance
JP5886210B2 (en) Method for determining position, server device, and computer program
CN110209820A (en)User identifier detection method, device and storage medium
CN110533789A (en)A kind of equipment routing inspection management method and device based on block chain
CN107066839A (en)The license distribution carried out for the third party&#39;s service operated in association with licensed first party service
CN106790659A (en)A kind of space time information cloud storage management method
US8307219B2 (en)Enterprise black box system and method for data centers
CN105207835A (en)Determination method of network element working state of wireless local area network and apparatus thereof
CN106878316A (en)A kind of risk quantification method and device
Kaviani et al.Identifying an exploitable structure for the core problem of load-redistribution attack problems
CN112995149A (en)Computer network information management system
Bellin et al.A preliminary study on the power consumption of virtualized edge 5g core networks
Halabi et al.Evaluation and selection of Cloud security services based on Multi-Criteria Analysis MCA
CN115372694A (en)Non-technical loss detection method for power distribution system, electronic device, and storage medium
CN111953516A (en) Network fault detection method, device, computer equipment and storage medium
CN106204143A (en)Acquisition equipment characteristic ID method and system and with the method for judgement virtual unit
CN117556429A (en)Safety protection capability evaluation method and system for public safety video image system
CN106992993B (en)Method, system and equipment for detecting exception of outsourcing list output
JP2009053896A (en)Unauthorized operation detector and program
Dobrea et al.Data Security in Smart Grid
Chang et al.Detection of Sybil attacks in participatory sensing using cloud based trust management system
CN115348266B (en)Scheduling method and related device of electric power system based on cloud edge cooperation

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp