1305328 九、發明說明: 【發明所屬之技術領域】 本發明提出-種企業内應用程式使用狀態監控 方法,尤指-種針對企業内各部門員玉使用應用程式 之監看記錄之方法’以掌握企業内各部門員工使用應 用程式之情形及各不同部門間所分配使用之各類應 用程式之使用率。 【先前技術】 由於近年來政府推動商業自動化政策,鼓勵企業 電細化,在邁入企業E化的時代,隨著整個產業資訊 2的洪:L:國内各型企業E化的腳步不曾停過,企業 貝汛人員永遠要在有限的經費下,追求更快、更新、 更好的資訊軟硬體應用。由於國内I商企業以中小企 業經營型態為主,在衡量成本效益與資訊專業人力狀 :下’多數企業以採用購置套裝軟體作為實施業務電 :化之主要策略。另一方面,以現在的企業工作環 境,個人電腦再加上幾台專用的祠服器,已是相當旅 遍的IT架構’較有規模的企業還會再加上資料 統、一些代管的網站飼 網…… 機甚至於多層網域的 衣兄。由於企業内部員工電腦上的應用程式或軟 -“木用網路系統’電腦網路化,讓軟體管理的工 雜’電腦主機越多,雖然代表公司對於電腦化 軟體因:二為一部主機至少安裝作業系統和辦公室 MIS人員實在難以瞭解每一個人的電腦 1305328 軟體的使用狀況,許多企章 點在個人電腦上面的軟體業:是1: = ^ -台電腦-台電腦地杳牛A帛’不僅要 直是不可能的任務。而―二;辦:^ 對公司提出採購需求外,還 《,除了必須 同的需求者取得其工作所善部署軟體’讓不 賭需求的授權數,而即使;二用,而不超過採 成’也很難擔保使用者 :盆:體都安裝完 軟體。 目仃女裝其它版權不明的1305328 IX. Description of the Invention: [Technical Fields of the Invention] The present invention proposes a method for monitoring the state of use of an application in an enterprise, and in particular, a method for monitoring the use of an application program by various departments in the enterprise. The use of applications by employees in various departments within the company and the usage of various applications distributed among different departments. [Prior technology] In recent years, the government promoted the business automation policy and encouraged the enterprise to refine the electricity. In the era of entering the enterprise E, with the entire industry information 2: L: the pace of domestic E-type enterprises has not stopped After all, the company's staff will always pursue faster, newer and better information software and hardware applications under limited funding. Since domestic I-business companies focus on SMEs' business models, they are measuring cost-effectiveness and information professional manpower: the majority of companies adopt the purchase package software as the main strategy for implementing business electricity. On the other hand, with the current corporate work environment, personal computers plus a few dedicated server devices, it is already a travel IT infrastructure. More scale enterprises will also add data and some escrow Website feed network... Machine even the multi-layer domain of the brother. Due to the application software on the computer of the company's internal employees or the soft--"wooden network system" computer network, the software management is more complicated, the more computer hosts, although the representative company for computerized software: two is a host At least installing the operating system and office MIS personnel is difficult to understand the use of each computer's computer 1305328 software, many of the software in the personal computer above the software industry: is 1: = ^ - computer - computer computer yak A 帛 ' It is not only a task that is impossible, but also a task that is impossible. In addition to the procurement requirements of the company, in addition to the need for the same demanders to get their work well deployed software, let the number of licenses not to be gambling demand, and even Second use, not more than mining 'It is difficult to guarantee the user: Pot: The body is installed with software. See other women's copyright unknown.
除了可以避免因Γ 業内部所有電腦的狀態 八ηη 自行安褒未授權之軟體,而影 譽,降低企業侵權的風險外,若:; :地八配?:求而進行應用程式或軟體選購及 :避二權付:f部門物之實際工作需求,同 .^ _ °卩門人員需依分配使用之應用程式 進行註冊登記以取得使用授權,因此In addition to avoiding the status of all computers in the industry, the company is not authorized to install software, but the reputation is reduced, and the risk of corporate infringement is reduced. : Request for application or software purchase and : Avoid the second payment: the actual work requirements of the f department, the same as .^ _ ° The door personnel need to register according to the application to be used to obtain the authorization for use.
二ΓΙ古 需求向軟體供應商集中採購,以' 直\、式’取得以量㈣的優勢或提升顧客: 置與使用授權等成本==斤扣’降低_ 用程式或軟體。m有效率地使用相關的) 【發明内容】 有,於此本發明提出一種企業内應用程式使用In the second place, the demand is centralized from the software suppliers, and the advantages of the quantity (4) or the customers are improved by the 'straight' and the type: the cost of setting and using the license == 斤 ’ 〖 reduction _ program or software. m efficient use of relevant) [Summary of the invention] Yes, the present invention proposes an application within the enterprise
狀態監控方法,其主I 、王要目的在於如供一種跨視窗系統 7 1305328 的所有平台,對其執行之應用程式作一使用之監控, 並於一特定時段内監控記錄每一應用程式執行之狀The state monitoring method, the main purpose of the main I, Wang is to monitor the application of the application executed by the platform for all the platforms of the cross-window system 7 1305328, and monitor and record the execution of each application within a certain period of time. shape
態及使用情形,俾利於企業管理者或資訊管理MIS 人員,掌握企業内各部門員工使用應用程式之情形, 及各不同部門間所使用之各類應用程式之情形,以確 實了解各部Η間所授權使用之應隸式軟體之使用 ,,並隨時取得即時應用程式的分配使用狀況,方便 管理各部門間所授權使用之應用程式軟體 否恰當。 &本务明之第二目的’係提供應用程式谓測的功 ^透過餘程式登錄純監看部門員丄之資訊處理 、’可以收集並統計公司内部所有授權軟體之使用 與未授權軟體之安裝與使用之狀況,可以協助企業管 ==產’解決傳統的軟體資產盤點或軟體清 一寺今易么生錯誤、費時及費力等缺失。 理Mts發三目的’係提供企業管理者或資訊管 訊處理裝置m少—個部門員工之使用者設定資 的看方式’其可由設定於特定時間點 設定以特定的時間週期(如每半小 時母】小時之時間週期),或設 上班時間鹰9:00〜PM6:0 、、疋寺&内(如 傳統的軟體資產盤點或軟體二仃易:看二錄’解決 不勝防的窘境。 —;生鈿抓老鼠防 本發明之第 四目的,係當監測到部門 員工安裝或 8 ^05328 使用未經授權之藤 未授權程式之執行狀^的情形時’可提供持續監看 的執行‘二當該未經授權之應用程式 執行動作。 動作史更時,記錄應用程式變更之 表工更:供’資料統計的功能’透過管理報 提供軟體資產查构及=所有軟體資產的狀況’並 軟體資產評估的效益及可靠性。另外 ==可以根據需求自行設定,並有一些事 好的軏本,例如以邱 〜 司整體性的盤點表° !為主的稽核清單’或者是公 、、主*或疋以軟體類別區分的軟體使用 /月早’’疋個別電腦上的軟體清單,更增加了管理上 的彈性。 .根據本發明所揭露之其方法,至少包含下列步 驟· 1.於-飼服1§端建立至少—個—授權程式表並存於 一伺服器端資料庫; 2·於該伺服器端設定至少一個一監看規則並存於該 飼服器端資料庫; 3. 該伺服器端接受至少一個一使用者端登入; 4. 偵測該使用者端是否安裝一監測記錄模組; 5 .啟動5亥監测記錄模組; 6.將該授權程式表與該監看規則傳&至該監測記錄 模組; 1305328 :亥瓜测π己錄模組依該監看規則監看該使用者端執 行之程式; 以判斷該使用者端執行之程式 比對該授權程式表 是否為授權程式; 之授權程式執行 9.該監測記錄模組記錄該使用者端 狀態;及 10.該監測記錄模!且將記錄資料回存至該飼服 料庫。 貝 有關本發明之詳細内容及技術,兹京尤配合圖 明如下: ° _ 【實施方式】 本發明係為-種企業内應用程式使用狀態監控 方法’在介紹本發明的方法前,先陳述本發明的基本 系統架構’請參照第i圖’係為本發明企業内應用程· 式使用狀態監控方法之系統架構圖,其說明如下: 本發明之系統架構係由伺服器端j 〇〇與至少一個 使用者端200所構成,而使用者端2〇〇與伺服器端籲 1 〇〇係透過區域網路(Local Area Netw〇rk,lan)或廣 域網路(Wide Area Network,WAN)加以連結,藉由該 使用者端200之監測記錄模組21〇,依企業管理者設^ 定之一監看規則及一授權程式表,針對至少一個該使 用者端進行應用程式使用狀態之監看與記錄,並將記 錄資料回存至一伺服器端資料庫12〇,以便曰後可作 記錄資料之統計、查詢。 1305328 其中’該伺服器端100至少包含(1)管理介面模組 Π0、⑺伺服器端資料庫120、(3)統計模組13()及(4) 伺服器端通訊介面140,進一步說明如下: (1) 管理介面模組110 ’係提供一管理介面,讓 系統操作人員可直接下達指令並管理伺服器端1〇〇。 (2) 伺服器端資料庫12〇,係提供一空間存放伺 服器端100之資料與其他外來輸入的資料,並使其資 料可直接存取。 八、 (3) 統計模組130,係可透過系統操作人員選擇 之記錄資料查詢指令,讀取伺服器端資料庫12〇中之 相關記錄資料,並依查詢指令顯示資料統計結果。 (4) 伺服器端通訊介面14〇,係接收使用者端1〇〇 之資料並回存至伺服器端資料庫120及傳送伺服器 100所欲發出之資料。 210、 240, 而該使用者端200至少包含⑴監測記錄模組 ⑺資訊處理單元22Q及(3)使用者端通訊介面 進一步說明如下··And the use cases, which are beneficial to business managers or information management MIS personnel, to grasp the situation in which employees in various departments of the enterprise use applications, and the various types of applications used by different departments to truly understand the various departments. Authorized use of the use of the software, and at any time to obtain the real-time application distribution status, to facilitate the management of the application software authorized by the various departments is appropriate. & The second purpose of this service is to provide the application of the predicate. ^ Through the rest of the program, log in to the pure supervisor to see the information processing of the department staff, 'can collect and count the use of all authorized software within the company and the installation of unauthorized software. And the use of the situation, can help the enterprise management == production 'solve the traditional software asset inventory or software Qingyi Temple today is a mistake, time-consuming and laborious. The Mts sends a three-purpose "providing a business manager or a small number of information management devices" - a way for users of a departmental staff to set a capital - which can be set at a specific time point for a specific time period (eg, every half hour) Mother] hour time period), or set the working time eagle 9:00~PM6:0, 疋寺 & (such as the traditional software asset inventory or software two :: see two records to solve the unpredictable dilemma. - 钿 钿 老鼠 老鼠 老鼠 防 防 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠 老鼠2. When the unauthorized application performs the action. When the history of the action is changed, the record of the application change is recorded: for the function of 'data statistics' to provide software asset search and = status of all software assets through the management report' The effectiveness and reliability of the evaluation of software assets. In addition, == can be set according to the needs, and there are some good transcripts, such as the inventory list based on the overall inventory of Qiu ~ Division. The software is used by the public, the main*, or the soft-skinned software. The monthly software list is used to increase the flexibility of management. The method according to the present invention includes at least the following Step 1. Create at least one-authorized program table on the § end of the feeding service and store it in a server-side database; 2. Set at least one monitoring rule on the server side and store the information on the server-side device. 3. The server end accepts at least one user-side login; 4. detects whether the user terminal installs a monitoring record module; 5. starts the 5-week monitoring record module; 6. the authorization program The table and the monitoring rule pass & to the monitoring record module; 1305328: the cu cu pi recording module monitors the program executed by the user terminal according to the monitoring rule; to determine the program executed by the user terminal Whether the authorized program is an authorized program; the authorized program is executed 9. The monitoring record module records the state of the user terminal; and 10. the monitoring record mode! and the recorded data is returned to the feeding library. Bay related to the details of the invention And the technology, Zijingyou cooperates with the following figure: ° _ [Embodiment] The present invention is an in-house application use state monitoring method 'Before introducing the method of the present invention, the basic system architecture of the present invention is stated. Referring to FIG. 1 is a system architecture diagram of an application monitoring method in the enterprise according to the present invention, which is described as follows: The system architecture of the present invention is composed of a server terminal j and at least one user terminal 200. The user terminal 2 is connected to the server terminal through a local area network (Local Area Netw〇rk, lan) or a wide area network (WAN), by the user terminal 200. The monitoring record module 21, according to one of the monitoring rules and an authorization program table set by the enterprise manager, monitors and records the usage state of the application for at least one of the user terminals, and saves the recorded data to the A server-side database is 12〇, so that it can be used for statistics and query of recorded data. 1305328 wherein the server end 100 includes at least (1) a management interface module Π0, (7) a server-side database 120, (3) a statistic module 13 (), and (4) a server-side communication interface 140, further illustrated as follows : (1) The Management Interface Module 110' provides a management interface that allows system operators to directly issue commands and manage server-side devices. (2) The server-side database 12 provides a space for storing the data of the server terminal 100 and other externally input data, and making the data directly accessible. VIII. (3) The statistical module 130 can read the relevant record data in the server-side database through the record data query command selected by the system operator, and display the data statistics result according to the query instruction. (4) The server-side communication interface 14 receives the data of the user terminal 1 and stores it back to the server-side database 120 and the data to be sent by the server 100. 210, 240, and the user terminal 200 includes at least (1) monitoring recording module (7) information processing unit 22Q and (3) user terminal communication interface.
(1) 測記錄模組21 〇,係為 - 安裝並常駐於 使用者端200之—句服叙4? /么冰 叼服転式,係與該伺服器端之間 由網路通訊傳輸資料,係裎徂 貝针係徒供監控並記錄該使用者 2 0 0之資訊處理模矣且勃j干劣呈斗、 轨仃転式,同時將記錄資料回 至該飼服器端資料庫之目的者。 (2)資訊處理單元2 ^ ^ ^ ^ 你马利用可連接至網 之貝5孔處理裝置,可你占L Jtii ^ 了從桌上型電腦、筆記型電 11 1305328 (NB)、個人數位助理(PDA)、行動電話及掌上型資訊 處理裝置的組合中任意擇一。 (3)使用者端通訊介面230,係接收伺服器端1 之資料及傳送使用者端200所欲發出之資料。 〇〇有了上述的系統後,便可針對企業内的資訊處理. 單元中應用程式使用狀態進行記錄、監控,接著茲就 針對本發明之企業内應用程式使用狀態監控方法的 步驟流程,做更進一步詳細之說明,請參照第2a、2b、 2c圖,係為本發明之監看一使用者端之應用程式使用 狀態之步驟流程圖,其說明詳述如下: 首先,先於一伺服器端100建立至少一個一授權 程式表並存於一伺服器端資料庫120(步驟300);再於 該伺服器端100設定至少一個一監看規則並存於該-伺服器端資料4 120(步驟31〇);接著,該飼服器端. 100接受至少一個一使用者端200登入(步驟32〇);待 該使用者端200成功登入該伺服器端1〇〇後,即透過 該伺服器端通訊介面140與該使用者端通訊介面_ 230,偵測該使用者端2〇〇是否安裝一監測記錄模組 210(步驟330)’於此步驟若判斷該使用者端2〇〇未安 裝該監測記錄模組21〇,則自動自該伺服器端1〇〇下 載並安裝該監測記錄模組21〇(步驟331),然後繼續步 驟340,但右於前述步驟330中判斷該使用者端2〇〇 已安裝該監測記錄模組21〇,職動該監測記錄模組 210(步驟340),並透過該伺服器端通訊介面14〇與該 12 1305328 使用者端通訊介面230,將該授權程式表與該監看規 則傳送至該監測記錄模組21 〇(步驟350);而後,該監 測記錄模組210依該監看規則監看該使用者端2〇〇執 行之程式(步驟360);接著,透過該監測記錄模組21〇 比對該授權程式表以判斷該使用者端執行之程 式是否為授權程式(步驟370),若前述步驟37〇判斷 結果為是,則該監測記錄模組21〇記錄授權程式執行 狀態(步驟380);但若前述步驟37〇之判斷結果為否, 則進入流程A係為針對未授權程式之監看記錄方 式,請配合參照m,首先,依監看規則是否持 續&看未杈權程式之執行(步驟371),若為“否”, 則透過該監測記錄模組21〇記錄未授權程式之 狀態(步驟374);但若上述步驟371的判斷為“是,, ^續監看未授權程式之執行狀態是否變更執行動 乍驟⑺),若未授權程叙執行㈣未變更3 仍舊繼續執行步驟372 ’持續監看未授權程式之執: 狀態是否變更執行動作·而m丰峨隹扭式之執仃 未授權程式之執行= 步驟372中監看到 μ订狀悲變更’則記錄變更 :辦然後接回步驟390。最後== 己錄資料回存該健器端資料庫12。(步: 390),並結束流程, 〇驟 查詢。 乂便日後可作錢資料之統計、 -中步驟3〇〇中之該監看規則 錄模組210監看該使 ’、為肩诚娜記 用者^ 200之該資訊處理模級執 13 1305328 二^規則’並由管理者於該伺服器針對至少-個 =者端,設定該資訊處理模組之一監看方 期、内定:間點、設定以特定時間週 内)進行監看的方;彳立上班時間AM9:G。〜PM6:00 還看 式中思擇―,同時該監看規則, 的,看方:含設牛定是否持續監看未授權程式之執行 監_中之該授權程式表’係為該 Γ:且210用以比對以判斷該使用者端200執 服哭Γ’授權狀之程式碼列表’並由管理者於該伺 卢二二1〇0針對至少一個該使用者端2〇0建立該資訊 讀授權使用之程式列表。另,步驟32〇之谓 =使用者端200是否安裝—記錄模組,係透過祠服 二通訊介Φ 140發出搜尋指令至使用者端通訊介 〇 ’以搜尋該使用者端是否安裝該監測記錄 並可再進一步包含主動自該飼服器端10〇 …、並安裝該監測記錄模组21〇。❿步驟咖之該監 I己錄模組210依該監看規則監看該使用者端執 =之耘式之步驟,係擷取該使用者端2⑻之資訊處理 22G中之程式執行仵列。步驟請之該比對該授 權程式表以判斷該使用者端_執行之程式是否為 &權程式之步驟’係比對程式執行仔列中之程式與該 授振程式表中之程式是否相符。步驟⑽之該監測記 錄模組210記錄該使用者端2 〇 〇之授權程式執行狀態 之步驟’係可透過該監測記錄模組2 i 〇建立一程式狀 14 1305328 悲表以作記錄,而发 腦名稱、部門、^中该程式狀態表,係至少包含電 第4圖所示)。步工1稱、時間、狀態之記錄表(如 步驟,係可透過含亥臣、3之該記錄變更之執行動作之 式動作表,以記己錄模組210新增一未授權程 1更之執行動作, 程式動作表係至少禾㈣ 包含電腦名稱、部門、未授權程式 驟374之該監心己^之讀(如弟5圖所示)。而步 > t # J 5己錄模組210記錄該未授權程式之執 打狀態之步驟,係开从# 个催狂叭^轨 係了於该程式狀態表新增攔位(如第4 圖所示)以記錄未授權程式之執行狀態。曰船(如弟4 狀離針對運用本發明之企業内應用程式使用 控方法,當企業管理者或資訊管理廳人員, 狀態的流程步驟,工之應用程式使用 人 ^更進一步洋細之說明,請繼續配 Γ己n #、為本發明之查詢應用程式使用狀態 β錄貧料的步驟流程圖,其詳細說明如下: 玲七Γ先’透過一管理介面模組110選擇記錄資料查 戚次步驟400),透過一統計模組130自該飼服器 X貝料庫120、中讀取單-使用者端之記錄資料 二驟410) ’或透過該統計模組13〇自該飼服器端資 枓庫12”讀取單-部門之記錄資料(步驟420)’·待 選擇查詢方式後’即透過一統計模組13〇自該飼服器 端資料庫120中讀取記錄資料,並依記錄資料的展現 方式,顯示記錄資料統計結果(步驟44〇),並中該统 15 1305328 計模組130,係自該伺服器端資料庫12〇中讀取 資料以作統計並顯示資料統計結果之目的者。其頻^ 記錄資料的方式’可依單一使用者(如 、示; 任-方…Λ 計結果或以記錄報表的 的方“設計者自行規劃定義其展現 用狀=2:”解本發明之企業内應用程式使 :狀:控方法為符合企業對於程式 求’具有以下特點: 幻而 *監控之依據來自於授 監控,具有統計效果; 非早純的歷裎 * m根據不同部門屬性來設定特定時間監 工’在特疋時間内亦可選擇性的開放; *對於外接的f訊處 恭廿忠壯於., 』王勁由伺服器端下 '貝,圮錄模組來強迫監控,以確保企章 内部資訊安全;及 雉保止業 * =之結果可利用監測記錄模組直接建立程式狀 二、'表中會直接針對各種程式的使用次數、狀 ::以統計,可直接顯示或列印提供企業執行者 =然本發明以前述之較佳實施例揭露如上, =θγ限定本發明’任何熟習此技藝者,在不脫離 因此本發明之佯;圍二’當可作些許之更動與_, 保5楚乾圍當視後附之申請專利範園所 16 1305328 界定者為準。 【圖式簡單說明】 第1圖係為本發明之系統架構圖; =2' 2b、2c圖係為本發明之監看一使用者端之應 用程式使用狀態之步驟流程圖; 第3圖係為本發明之查詢應用程式使用狀態記錄資 料的步驟流程圖;及 第4至6圖係為本發明之監看使用者端應用程式之使 用狀態與記錄資料。 【主要元件符號說明】 100 伺服器端 110 管理介面模組 120 伺服器端資料庫 130 統計模組 140 伺服器端通訊介面 200 使用者端 210 220 230 步驟300 步驟310 步驟320 監測記錄模組 資訊處理單元 使用者端通訊介面 於一伺服器端建立至少一個一授權程 式表並存於一伺服器端資料庫 於該伺服器端冑定至少一個一監看規 貝J並存於該伺服器端資料庫 該伺服器端接受至少一個一使用者端 17 1305328 步驟330 步驟331 步驟340 步驟350 步驟360 步驟370 步驟371 步驟372 步驟373 步驟374 步驟380 步驟390 步驟4〇〇 登入 债測該使用者端是否絲-監測記錄 模組 自該伺服器端下載並安裝該監測記錄 模組 啟動該監測記錄模組 將該授權程式表與該監看規則傳送至 該監測記錄模組 該監測記錄模組依該監看規則監看該 使用者端執行之程气 比對該授權程式表^判斷該使用者端 執行之程式是否為授權程式 依皿看規貞彳是否持續監看未授權程式 之執行 監看未授權程式之執行狀態是否變更 執行動作 記錄變更之執行動作 透過該監__組記錄未授權程式 之執行狀態 該監測記錄模組記缝權程式之執行 狀態 仃 該監測記錄模組將記錄資料回存至 伺服器端資料庫 / 透過一管理介面模组選擇記錄資料查 18 1305328 步驟410 詢方式 透過一統計模組自該伺服器端資料庫 中讀取單一使用者端之記錄資料 步驟420 透過一統計模組自該伺服器端資料庫 中讀取單一部門之記錄資料 步驟43 0 顯示記錄資料統計結果 流程A 針對未授權程式之監看記錄方式 19(1) The recording module 21 is configured to be installed and resident in the user terminal 200 - the sentence service description 4 / / hailing service type, is transmitted by the network communication between the server and the server end The mussel needle is used for monitoring and recording the user's information processing model of the user, and the log data is returned to the feeding device database. Target person. (2) Information processing unit 2 ^ ^ ^ ^ You can use the 5 hole processing device that can be connected to the net, you can take up L Jtii ^ from the desktop computer, notebook type 11 1305328 (NB), personal digital assistant Any combination of (PDA), mobile phone and handheld information processing device. (3) The user terminal communication interface 230 receives the data of the server terminal 1 and transmits the data to be sent by the user terminal 200. 〇〇With the above system, you can record and monitor the application usage status in the enterprise. The process flow of the status monitoring method for the in-house application of the present invention is further improved. For further details, please refer to the figures 2a, 2b, and 2c, which are flowcharts of the steps of monitoring the usage state of a user end of the present invention, and the description thereof is as follows: First, prior to a server end 100 is configured to establish at least one authorization program table and store the data in a server-side database 120 (step 300); and then set at least one monitoring rule on the server terminal 100 and store the data in the server-side data 4 120 (step 31). Then, the server server 100 receives at least one user terminal 200 login (step 32); after the user terminal 200 successfully logs in to the server terminal, the server communicates through the server. The interface 140 and the user terminal communication interface _ 230, detecting whether the user terminal 2 is equipped with a monitoring recording module 210 (step 330) 'in this step, if the user terminal 2 is not installed, the monitoring is not installed. recording The module 21A automatically downloads and installs the monitoring record module 21 from the server terminal 1 (step 331), and then proceeds to step 340, but determines the user terminal 2 in the foregoing step 330. The monitoring record module 21 is installed, and the monitoring record module 210 is operated (step 340), and the server terminal communication interface 14 is connected to the 12 1305328 user terminal communication interface 230 to The monitoring rule is transmitted to the monitoring record module 21 (step 350); then, the monitoring record module 210 monitors the program executed by the user terminal 2 according to the monitoring rule (step 360); The monitoring record module 21 compares the authorization program table to determine whether the program executed by the user terminal is an authorization program (step 370). If the result of the foregoing step 37 is YES, the monitoring record module 21〇 Recording the authorization program execution status (step 380); but if the judgment result in the foregoing step 37 is no, the flow entry A is the monitoring record mode for the unauthorized program, please refer to the reference m, first, according to whether the monitoring rule is Continue & see the future Execution of the program (step 371), if "No", the status of the unauthorized program is recorded through the monitoring record module 21 (step 374); but if the judgment of the above step 371 is "Yes," If the execution status of the unauthorized program is changed, the execution step (7)), if the authorization is not executed, (4) is not changed, 3 continues to execute step 372 'Continuously monitor the execution of the unauthorized program: Whether the status changes the execution action · Execution of the unauthorised program of the twisted type = Step 372, the monitor sees the change of the μ sorrow change' then records the change: then the process returns to step 390. Finally == the recorded data is returned to the health end database 12 . (Step: 390), and end the process, step query.乂 可 日 日 日 日 日 日 日 日 日 日 日 日 日 日 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 210 The second rule 'is set by the administrator to the server for at least one of the parties, and the party that monitors one of the information processing modules, the default: the point, and the setting to monitor within a certain time period) Standing time AM9: G. ~PM6:00 Also look at the choices in the style, and at the same time the monitoring rules, the party: including the establishment of the cattle to continue to monitor the unauthorized execution of the program _ in the authorization program table _ is: And 210 is used to compare to determine that the user terminal 200 is obeying the crying 'authorization code list' and the administrator establishes the at least one of the user terminals 2〇0 at the server. A list of programs used for information read authorization. In addition, the step 32 is to say whether the user terminal 200 is installed or not. The recording module sends a search command to the user terminal via the service provider Φ 140 to search whether the user terminal installs the monitoring record. And further comprising actively loading the end of the feeding device 10, and installing the monitoring record module 21〇. The step-by-step procedure of the user-recorded module 210 monitors the user-side command in accordance with the monitoring rule, and retrieves the program execution queue in the information processing 22G of the user terminal 2 (8). The step of the step of determining whether the program of the user terminal _executing program is a & the right program is to match whether the program in the program is in accordance with the program in the vibration table. . The step (10) of the monitoring record module 210 recording the execution status of the authorization program of the user terminal 2 can establish a pattern 14 1305328 sorrow through the monitoring record module 2 i for recording. The name list of the program in the brain name, department, and ^ is at least included in Figure 4). The record of the 1 step, time, and status of the step 1 (for example, the action table of the execution action including the record change of the record of Haichen, 3, and the addition of an unauthorized process 1 to the record module 210 The execution action, the program action table is at least (4) including the computer name, department, unauthorized program 374, the supervisor has read (as shown in Figure 5). Step > t # J 5 has recorded The group 210 records the steps of the unauthorized program's execution status, and the system opens a new block from the program status table (as shown in FIG. 4) to record the execution of the unauthorized program. State. Barge (such as brother 4 from the application of the application method for the application of the invention, when the enterprise manager or information management staff, the state of the process steps, the application of the application user ^ further Explain, please continue to match the nn#, the flow chart of the steps of the inquiry application using the state β recording and depleting material for the present invention, which is described in detail as follows: 玲七Γ先'Selecting a record data through a management interface module 110 Sub-step 400), through a statistical module 130 From the feeding machine X shell library 120, reading the single-user end record data step 410) 'or reading the single through the statistical module 13 from the feeding machine end asset library 12" - The record data of the department (step 420) 'after the selected query mode' is read through the statistical module 13 to read the record data from the feed server end database 120, and display the record data according to the manner in which the record data is displayed. The statistical result (step 44〇), and the system 15 1305328 meter module 130, is the person who reads the data from the server end database 12〇 for statistics and displays the statistical result of the data. The way 'can be based on a single user (such as, show; 任-方... 结果 或 或 或 或 或 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录 记录: Shape: Control method is in line with the company's requirements for the program' has the following characteristics: Magic and * monitoring is based on monitoring, with statistical effects; non-early pure calendar * m set specific time supervision according to different department attributes ' Optional opening during special time * For the external f-consultation, Gong Zhe is strong and strong., "Wang Jin is forced to monitor by the server under the 'Bei, 圮 模组 module to ensure the internal information security of the company; and 雉 业 业 ** The result can be directly established by using the monitoring record module. The number of times that the table will directly be used for various programs, and the like:: by statistics, can be directly displayed or printed to provide the enterprise performer = the present invention is compared with the foregoing The preferred embodiment discloses that, as described above, = θ γ defines the present invention 'anyone skilled in the art, and does not deviate from the invention as a result of the invention; the second two can be used to make some changes and _, Bao 5 Chu Ganwei attached to the application Patent Specification No. 16 1305328 is defined as follows. [Simplified illustration] Figure 1 is a system architecture diagram of the present invention; =2' 2b, 2c diagram is a user-side application of the present invention. A flow chart of the steps of using the state; FIG. 3 is a flow chart of the steps of using the state record data by the query application of the present invention; and FIGS. 4 to 6 are the use states and records of the monitoring client application of the present invention. data. [Main component symbol description] 100 server end 110 management interface module 120 server end database 130 statistical module 140 server side communication interface 200 user end 210 220 230 step 300 step 310 step 320 monitoring recording module information processing The unit user terminal communication interface establishes at least one authorization program table on a server end and stores it in a server end database, and at least one monitoring module J is set on the server side and stored in the server end database. The server end accepts at least one user end 17 1305328 Step 330 Step 331 Step 340 Step 350 Step 360 Step 370 Step 371 Step 372 Step 373 Step 374 Step 380 Step 390 Step 4 〇〇 Login to check whether the user end is silk- The monitoring record module downloads and installs the monitoring record module from the server end, and the monitoring record module transmits the authorization program table and the monitoring rule to the monitoring record module. The monitoring record module is in accordance with the monitoring rule. Monitoring whether the program executed by the user side determines whether the program executed by the user end is determined by the authorization program table Authorization program depends on whether the monitoring of the unauthorized program is continuously monitored. The execution status of the unauthorized program is changed. The execution action record is changed. The execution status of the unauthorized program is recorded by the supervisor. Execution status of the module splicing right program 仃 The monitoring record module restores the logged data to the server side database / selects the record data through a management interface module. 18 1305328 Step 410 Query mode through a statistic module Reading the record data of a single user terminal in the server-side database Step 420: Reading the record data of a single department from the server-side database through a statistical module Step 43 0 Displaying the record data statistics result A for unauthorized Program monitoring record mode 19