Disclosure of Invention
The invention aims to provide a computer network information management system, which solves the problems of how to increase the security of user files and how to solve the problem of advertisement pop-up.
The purpose of the invention can be realized by the following technical scheme:
a computer network information management system comprises a server, a storage module, an advertisement interception module, a network diagnosis module, a fault maintenance module and an information encryption module;
the advertisement blocking module comprises a blocking unit, a display unit and a software recommending unit, wherein the display unit is used for displaying the received information to a user for viewing, the blocking unit is used for blocking the advertisements popped up in the computer, and the specific blocking method comprises the following steps:
step S11: when the advertisement is popped out from the computer, blocking information is generated and sent to the display unit, when the user selects permission, the advertisement popped out from the computer is not blocked, and when the user selects blocking, the same advertisement can be blocked in the future;
step S12: the method comprises the steps of obtaining an advertisement source, sending the advertisement source to a display module, unloading software of the advertisement source when a user needs to solve the problem of advertisement pop-up permanently, and not operating when the user does not need to solve the problem of advertisement pop-up permanently;
the information encryption module is used for encrypting the user file, and the specific encryption method comprises the following steps:
step S61: moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password;
step S62: setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three levels, a first level and a third level are both provided with jigsaw patterns by a user, a second level is an encryption password for piecing up the folder, each level is completed with three options, the game is quitted, the next level and the storage and sharing are finished, when the second level is finished, the game is quitted when the game is selected to quit, the third level is entered when the next level is selected, and the hidden folder is entered when the storage and sharing are selected;
step S63: put the jigsaw game into other folders.
Further, the software recommending unit is used for recommending the computer software to the user, and the specific recommending method comprises the following steps:
step S21: acquiring the information of the uninstalled advertisement source software and sending the information of the advertisement source software to a display unit; setting all software information to correspond to a threshold, wherein the value range of the threshold is greater than zero and less than one, matching the software information with all the software information to obtain the corresponding threshold and marking the threshold as i, wherein i is 1, 2, … … and n, and n is a positive integer;
step S22: acquiring the requirement of a user on required software, matching the requirement of the user on the required software with all computer software to obtain a matching degree, and marking the matching degree as Pi;
step S23: acquiring user scores of computer software, and marking the user scores as Hi;
step S24: acquiring a memory required by installing computer software, and marking the required memory as Ki; removing dimensions of the software information, the matching degree, the user score and the required memory, and taking the numerical value for calculation;
step S25: according to the formula Qi ═ λ [ e ]b1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2Obtaining a priority value Qi, wherein b1, b2 and b3 are all proportionality coefficients, and the value range is that b1 is more than or equal to 1<2,0<b2≤1,0<b3 is less than or equal to 1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S26: and arranging according to the size of the priority value Qi, and sending the arranged first five software information to a display unit.
Further, the network diagnosis module is used for diagnosing the network speed of the network, the network diagnosis module comprises a network speed detection unit and a network overhaul unit, the network speed detection unit is used for detecting the network speed in the computer, and the specific detection method comprises the following steps:
step S31: establishing a downloading node, wherein the downloading node is used for counting the time required for downloading the specified file;
step S32: acquiring the current network speed through a downloading node, and marking the current network speed as V;
step S33: acquiring the broadband speed of the computer, and marking the broadband speed of the computer as C;
step S34: obtaining a computer network speed warning value according to a formula Z ═ alphaC, wherein alpha is a proportionality coefficient, and 0< alpha < 1; when Z is less than or equal to V, the computer network speed is normal, and when V is less than Z, the computer network speed influences the operation of the computer.
Further, the network overhaul unit is used for overhauling the speed problem of the computer network, and the specific overhauling method comprises the following steps:
step S41: setting a detection signal sending point, a plurality of detection signal transfer points and a detection signal receiving point in a computer network; only one piece of computer software is arranged between adjacent transfer points of the detection signals;
step S42: the method comprises the steps that a detection signal sending point sends a detection signal, and the detection signal is finally received by a detection signal receiving point, so that the time consumed by the fact that the detection signal is sent from the detection signal sending point to the detection signal receiving point and the time consumed by the fact that the detection signal passes through two adjacent signal transfer nodes is obtained;
step S43: acquiring the time consumed by a detection signal from a detection signal sending point to a detection signal receiving point when the network speed is normal, and the time consumed by the detection signal passing through two adjacent signal transfer nodes;
step S44: comparing the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point and the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point when the network speed is normal, wherein when the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal is longer than the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal when the network speed is normal, the network speed has a problem;
step S45: comparing the time consumed by all detection signals at two adjacent signal transfer nodes with the time consumed by the detection signals from the detection signal sending point to the detection signal receiving point to obtain the broadband network speed ratio occupied by the computer software between the two adjacent signal transfer nodes;
step S46: and sending the broadband network speed ratio occupied by each software in the computer to a display unit.
Further, the fault maintenance module is used for maintaining the computer fault problem, and the specific maintenance method comprises the following steps:
step S51: when a user computer fails, directly sending a fault maintenance request to a fault maintenance module;
step S52: carrying out preliminary fault problem information acquisition on a user computer, and estimating maintenance duration of the preliminarily acquired fault problems;
step S53: acquiring user information with computer faults, setting all the user information to correspond to a threshold, wherein the value range of the threshold is larger than zero and smaller than one, matching the user information with all the user information to acquire the corresponding threshold and marking the threshold as j, wherein j is 1, 2, … … and m, and m is a positive integer;
step S54: acquiring position information of a maintenance worker on duty, acquiring a distance between the maintenance worker and a computer user needing to be maintained, and marking the distance between the maintenance worker and the computer user needing to be maintained as Lj;
step S55: acquiring estimated maintenance time of the fault problem, and marking the estimated maintenance time as Wj; removing dimension and taking numerical value calculation of user information, the distance between a maintenance worker and a computer user needing maintenance and the estimated maintenance duration;
step S56: according to the formula Rj ═ λ [ e ]10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]Obtaining a maintenance value Rj, wherein b4 and b5 are proportional coefficients and have a value range of 0<b4<1,0<b5<1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S57: and dispatching maintenance workers to perform maintenance according to the height of the maintenance value Rj.
The invention has the beneficial effects that: the advertisement popped up in the computer is intercepted through the intercepting unit, because the advertisement popped up in the computer is very annoying to the user, and the user pops up sensitive information when the user is not present, so that the user is very embarrassed when being seen by colleagues and family members, and therefore the advertisement popped up in the computer needs to be intercepted; recommending software to a client through a software recommending unit, unloading the software after intercepting the advertisement, and recommending the software which does not pop up the advertisement to the client according to the information of the unloaded software; encrypting a user file through an information encryption module, moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password; setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three levels, a first level and a third level are both provided with jigsaw patterns by a user, a second level is an encryption password for piecing up the folder, each level is completed with three options, the game quits, the next level and the storage and sharing are finished, when the second level is finished, the game quits when the game quits is selected, the third level enters when the next level is selected, and the hidden folder enters when the storage and sharing are selected; the puzzle game is placed in other folders, so that the safety of the user for hiding the files is greatly improved, and the puzzle game cannot be found by other people.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a computer network information management system includes a server, a storage module, an advertisement blocking module, a network diagnosis module, a fault maintenance module, and an information encryption module;
the advertisement blocking module comprises a blocking unit, a display unit and a software recommending unit, the display unit is used for displaying the received information to a user for viewing, the blocking unit is used for blocking the advertisements popped up in the computer, because the advertisements popped up in the computer are very annoying to the user, and when the user is not at present, the advertisements pop up sensitive information and are very embarrassed when being seen by colleagues and family members, therefore, the advertisements popped up in the computer need to be blocked, and the specific blocking method comprises the following steps:
step S11: when the computer pops out the advertisement, blocking information is generated, wherein the blocking information comprises permission selection and blocking selection and is used for selecting the user, because some users do not want to block the advertisement and send the blocking information to the display unit, when the user selects permission, the advertisement popped out of the computer is not blocked, and when the user selects blocking, the same advertisement is blocked in the future;
step S12: acquiring an advertisement source, popping up the advertisement source from what software, sending the advertisement source to a display module, unloading the software of the advertisement source when a user needs to solve the problem of the advertisement pop-up permanently, and not operating when the user does not need to solve the problem of the advertisement pop-up permanently;
the software recommending unit is used for recommending the computer software to the user, and the specific recommending method comprises the following steps:
step S21: acquiring information of the uninstalled advertisement source software, wherein the information of the advertisement source software comprises a software type and a software purpose, and sending the information of the advertisement source software to a display unit; software usage and type for client-aware offloading; setting all software information to correspond to a threshold, wherein the value range of the threshold is greater than zero and less than one, matching the software information with all the software information to obtain the corresponding threshold and marking the threshold as i, wherein i is 1, 2, … … and n, and n is a positive integer; the software information includes a software type;
step S22: acquiring the requirement of a user on required software, such as no advertisement pop-up and no user agreeing to install the software privately, matching the requirement of the user on the required software with all computer software to obtain a matching degree, and marking the matching degree as Pi;
step S23: acquiring user scores of computer software, and marking the user scores as Hi;
step S24: acquiring a memory required by installing computer software, and marking the required memory as Ki; removing dimensions of the software information, the matching degree, the user score and the required memory, and taking the numerical value for calculation;
step S25: according to the formula Qi ═ λ [ e ]b1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2Obtaining a priority value Qi, wherein b1, b2 and b3 are all proportionality coefficients, and the value range is that b1 is more than or equal to 1<2,0<b2≤1,0<b3 is less than or equal to 1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S26: arranging according to the priority value Qi, and sending the arranged first five software information to a display unit;
the network diagnosis module is used for diagnosing the network speed of the network, the network diagnosis module comprises a network speed detection unit and a network maintenance unit, the network speed detection unit is used for detecting the network speed in the computer, and the specific detection method comprises the following steps:
step S31: establishing a downloading node, wherein the downloading node is used for counting the time required for downloading the specified file, and the specified file is a file carried in the downloading node;
step S32: acquiring the current network speed through a downloading node, and marking the current network speed as V;
step S33: acquiring the broadband speed of the computer, and marking the broadband speed of the computer as C;
step S34: obtaining a computer network speed warning value according to a formula Z ═ alphaC, wherein alpha is a proportionality coefficient, and 0< alpha < 1; when Z is less than or equal to V, the computer network speed is normal, and when V is less than Z, the computer network speed influences the computer operation, for example, the computer is jammed when used, the refreshing is slow, and the use of a user is influenced;
the network maintenance unit is used for maintaining the speed problem of the computer network, and the specific maintenance method comprises the following steps:
step S41: setting a detection signal sending point, a plurality of detection signal transfer points and a detection signal receiving point in a computer network; the detection signal sending point is arranged at the broadband entrance of the computer; only one piece of computer software is arranged between the transfer points of the adjacent detection signals;
step S42: the method comprises the steps that a detection signal sending point sends a detection signal, and the detection signal is finally received by a detection signal receiving point, so that the time consumed by the fact that the detection signal is sent from the detection signal sending point to the detection signal receiving point and the time consumed by the fact that the detection signal passes through two adjacent signal transfer nodes is obtained;
step S43: acquiring the time consumed by a detection signal from a detection signal sending point to a detection signal receiving point when the network speed is normal, and the time consumed by the detection signal passing through two adjacent signal transfer nodes; this time is detected at a normal limit of network speed;
step S44: comparing the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point and the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point when the network speed is normal, wherein when the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal is longer than the time spent on sending the detection signal from the detection signal sending point to the detection signal receiving point to receive the detection signal when the network speed is normal, the network speed has a problem; otherwise, there is no problem;
step S45: comparing the time consumed by all detection signals at two adjacent signal transfer nodes with the time consumed by the detection signals from the detection signal sending point to the detection signal receiving point to obtain the broadband network speed ratio occupied by the computer software between the two adjacent signal transfer nodes;
step S46: the broadband network speed proportion occupied by each software in the computer is sent to the display unit, so that a user can conveniently check the broadband network speed use condition;
the fault maintenance module is used for maintaining the computer fault problem, and the specific maintenance method comprises the following steps:
step S51: when a user computer fails, directly sending a fault maintenance request to a fault maintenance module;
step S52: carrying out preliminary fault problem information acquisition on a user computer, wherein the fault problem information comprises fault reasons sent by a user; estimating the maintenance time length of the preliminarily collected fault problems; estimating the maintenance time length of the same fault problems in the current period, for example, taking the average value of the maintenance time of the same fault problems in the current period;
step S53: acquiring user information with computer faults, wherein the user information comprises user living addresses, setting all the user information to correspond to a threshold, the value range of the threshold is larger than zero and smaller than one, matching the user information with all the user information to acquire the corresponding threshold and marking the threshold as j, wherein j is 1, 2, … … and m, and m is a positive integer;
step S54: acquiring position information of a maintenance worker on duty, acquiring a distance between the maintenance worker and a computer user needing to be maintained, and marking the distance between the maintenance worker and the computer user needing to be maintained as Lj;
step S55: acquiring estimated maintenance time of the fault problem, and marking the estimated maintenance time as Wj; removing dimension and taking numerical value calculation of user information, the distance between a maintenance worker and a computer user needing maintenance and the estimated maintenance duration;
step S56: according to the formula Rj ═ λ [ e ]10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]Obtaining a maintenance value Rj, wherein b4 and b5 are proportional coefficients and have a value range of 0<b4<1,0<b5<1, lambda is a correction factor and has a value range of 0<λ≤1;
Step S57: dispatching maintenance workers to perform maintenance according to the height of the maintenance value Rj;
the information encryption module is used for encrypting the user file, and the specific encryption method comprises the following steps:
step S61: moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password;
step S62: setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three levels, a first level and a third level are both provided with jigsaw patterns by a user, a second level is an encryption password for piecing up the folder, each level is completed with three options, the game quits, the next level and the storage and sharing are finished, when the second level is finished, the game quits when the game quits is selected, the third level enters when the next level is selected, and the hidden folder enters when the storage and sharing are selected;
step S63: put the jigsaw game into other folders.
The above formulas are all calculated by removing dimensions and taking values thereof, the formula is one closest to the real situation obtained by collecting a large amount of data and performing software simulation, and the preset parameters in the formula are set by the technical personnel in the field according to the actual situation.
When the system is used, the advertisement popped up in the computer is intercepted through the intercepting unit, the intercepting information is generated and sent to the display unit when the advertisement is popped up in the computer, when the user selects permission, the advertisement popped up in the computer is not intercepted, and when the user selects interception, the same advertisement can be intercepted in the future; the method comprises the steps of obtaining an advertisement source, sending the advertisement source to a display module, unloading software of the advertisement source when a user needs to solve the problem of advertisement pop-up permanently, and not operating when the user does not need to solve the problem of advertisement pop-up permanently; recommending computer software to a user through a software recommending unit, acquiring uninstalled advertisement source software information, sending the advertisement source software information to a display unit, and according to a formula Qi-lambda eb1*Pi*(b2*Hi)1/2]/(b3*Ki)1/2Acquiring a priority value Qi, arranging according to the priority value Qi, and sending the arranged first five software information to a display unit; detecting the network speed in the computer through a network speed detection unit, establishing a downloading node, wherein the downloading node is used for counting the time required for downloading the specified file, acquiring the current network speed through the downloading node, and marking the current network speed as V; acquiring the broadband speed of the computer, and marking the broadband speed of the computer as C; obtaining the computer network speed warning value according to the formula Z ═ alphaC, when Z is less than or equal to V, then the computer networkNormal speed when V<When Z is needed, the computer network speed influences the operation of the computer;
the method comprises the steps that a network maintenance unit is used for maintaining the speed problem of a computer network, a detection signal is sent by a detection signal sending point and finally received by a detection signal receiving point, and the time consumed by the current detection signal from the detection signal sending point to the detection signal receiving point and the time consumed by the current detection signal passing through two adjacent signal transfer nodes are obtained; acquiring the time consumed by a detection signal from a detection signal sending point to a detection signal receiving point when the network speed is normal, and the time consumed by the detection signal passing through two adjacent signal transfer nodes; comparing the time consumed by all detection signals at two adjacent signal transfer nodes with the time consumed by the detection signals from the detection signal sending point to the detection signal receiving point to obtain the broadband network speed ratio occupied by the computer software between the two adjacent signal transfer nodes; the broadband network speed proportion occupied by each software in the computer is sent to the display unit, so that a user can conveniently check the broadband network speed use condition;
the computer fault problem is maintained through the fault maintenance module, and when the user computer has a fault, a fault maintenance request is directly sent to the fault maintenance module; carrying out preliminary fault problem information acquisition on a user computer, and estimating maintenance duration of the preliminarily acquired fault problems; according to the formula Rj ═ λ [ e ]10*(b4+b5)/(b4*Lj)1/2*(b5*Wj)2/3]Obtaining a maintenance value Rj, and dispatching maintenance workers to maintain according to the height of the maintenance value Rj; encrypting a user file through an information encryption module, moving all files to be encrypted into a folder, encrypting the folder, and setting an encryption password; setting a jigsaw game, hiding a folder in the jigsaw game, wherein the jigsaw game has three stages, a first stage and a third stage are both provided with jigsaw patterns by a user, a second stage is an encryption password for piecing up the folder, each stage is provided with three options for finishing, quitting the game, next stage and storing and sharing, when the second stage is finished, the game is quitted when the game is selected to quit, and the game is selected to quitEntering a third gate when the next gate is closed, and entering a hidden folder when the sharing is selected to be stored; put the jigsaw game into other folders.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.