CN103220288B - Safe-operation method of social platform - Google Patents

Safe-operation method of social platform Download PDF

Info

Publication number
CN103220288B
CN103220288B CN201310126562.6A CN201310126562A CN103220288B CN 103220288 B CN103220288 B CN 103220288B CN 201310126562 A CN201310126562 A CN 201310126562A CN 103220288 B CN103220288 B CN 103220288B
Authority
CN
China
Prior art keywords
social platform
mobile terminal
social
user
safe operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310126562.6A
Other languages
Chinese (zh)
Other versions
CN103220288A (en
Inventor
汪德嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing tongfudun Artificial Intelligence Technology Co., Ltd
JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.
Original Assignee
JIANGSU PAYEGIS INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU PAYEGIS INFORMATION TECHNOLOGY Co Ltd filed Critical JIANGSU PAYEGIS INFORMATION TECHNOLOGY Co Ltd
Priority to CN201310126562.6A priority Critical patent/CN103220288B/en
Publication of CN103220288A publication Critical patent/CN103220288A/en
Application granted granted Critical
Publication of CN103220288B publication Critical patent/CN103220288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a safe-operation method of a social platform. The safe-operation method of the social platform is characterized in that a user registration controlling module, a user login controlling module, a data mining module, a risk rating module and a data base are arranged in a social platform server. The safe-operation method of the social platform includes the following steps of device fingerprint identification of a mobile terminal; data mining and risk evaluation; and track of the mobile terminal, wherein each ID corresponding to each device is only allowed to register less than three effective accounts, the data mining module conducts keyword search on interaction information occurring on the social platform, the risk rating module is used for conducting risk evaluation on interaction information which relates to sensitive information keywords on the social platform, and the ID of a corresponding device is tracked by means of the effective accounts. Due to the fact that the safe-operation method of the social platform is applied to soft hardware transformation of the social platform server and the mobile terminal, the phenomenon of counterfeit fans is effectively restrained, spreading of false commercial advertising which violates commercial ethics and social morality and political propaganda information is contained, and safe and healthy operation of social contact is promoted.

Description

A kind of method for safe operation of social platform
Technical field
The present invention relates to a kind of safe operation mechanism, particularly relate to a kind of method for safe operation being applicable to the network social intercourse platforms such as micro-letter, microblogging, refer in particular to for preventing business from swindling and avoiding the software and hardware defense mechanism of political hidden danger.
Background technology
The social main activities item having become modern's life, worked indispensable.Along with Facebook formally reached the standard grade on February 4th, 2004, Twitter formally sets up in June, 2006 and puts into operation, and these two social networking service instruments are just promoted with high popularity growth rate in the world and come.They utilize wireless network, cable network, the communication technology carries out instant messaging, allow user that the latest tendency of oneself and idea are carried picture and sent with note form the group feature user be shared with under social networks, then cause other people to pay close attention to, comment on and share, thus the people's distance being in various places is furthered, allow people stay indoors can to understand local conditions and customs all over the world.
Under normal circumstances, Facebook introduces and grows prosperity in Taiwan, and the common people are referred to as " face book "; And from Continental Area, domestic well-known net business is in those early years just proposed microblogging, the time just causes great upsurge, and blog quantity increases by geometric progression.Just the means of life that young man at present must grasp is become in short time.And the appearance of micro-letter greatly obtains youthful pursuing especially.Realize aspect from technology and external application presents aspect, microblogging and micro-letter and Facebook, Twitter rarely have difference, are have much representational localization social platform.
But, along with the surge of number of users, when this network social intercourse platform is in applying, have the phenomenon of off-design original intention to occur.Due to social platform application model, bean vermicelli attention rate embodies the identity of a user in social platform, popularity or status to a certain extent.Therefore, false bean vermicelli brush attention rate is just arisen at the historic moment, and What is more lists business in the e-commerce websites such as Taobao, speculates.In addition, separately have two aspect problems affecting the normal, healthy of social platform with growing in intensity to run.The business fraud concerns that one is is representative with vacation marketing, lawless person utilizes the larger masses' attention rate of microblogging, micro-letter to release the commercial offer not meeting truth, and the masses that many hobbies are coveted little advantage just can be attracted by it, fall into and finally gained pile by cheating among trap layer by layer, the pornographic card of micro-letter or cause health damage because purchased commodity eat by mistake.It two is instigate political potential problem into one of the form of expression with politics, the words and deeds deed of social ethics, guidance handle the speech of the will of the people, western thought infiltration or the speech etc. to the obvious illegal query of government offices' public credibility is run counter to by issuing at microblogging, micro-letter, broad masses are lost the confidence to social security, turmoil is produced worried, greatly be exaggerated the social effectiveness of local event, shake popular feelings centripetal force.And due under existing social platform, effective account of microblogging, micro-letter is very easily stolen, and the traceable mark of user's distributing interaction poor information identity, system of real name registration not solves the most perfect mode of this problem.In the face of false business information and bad political point view are difficult to management, follow the trail of, only eliminate business and political impact is obviously insufficient Security mechanism by deleting afterwards.
Summary of the invention
The present invention is because the disappearance of above-mentioned present situation, and innovation proposes a kind of method for safe operation of social platform, to solve the secret protection that social platform issues user, the interactive information health problem issued, ensures that society is towards healthy, harmonious future development.
Above-mentioned purpose of the present invention, a kind of method for safe operation of social platform, relate to the mobile terminal of social platform server and user, the application tool of described social platform at least comprises microblogging and micro-letter, its technical solution is from feature: in described social platform server, establish user to register control module, user logs in control module, data-mining module, risk rating module and database, described database is used for the user profile that is associated of storage service and information of mobile terminal, described method for safe operation comprises the steps: the device-fingerprint identification step of mobile terminal, based on the device id of mobile terminal institute tool uniqueness, user registers in control module and arranges corresponding each device id and only allow the effective account of registration less than three.
Data mining and risk assessment step, arrange and regular update sensitive information keyword in social platform server, described data-mining module carries out keyword retrieval to the interactive information betided in social platform, and adopts risk rating module to carry out risk assessment to interactive information social platform relating to sensitive information keyword.
The tracing step of mobile terminal, user to log in control module the corresponding each effective account login event of record occur corresponding to device id and be synchronized in database, send device id corresponding to the time-tracking of interactive information according to each effective account number in social platform.
Further, in the device-fingerprint identification step of mobile terminal, a corresponding device id only allows to register and binds a unique effective account.
Further, in the device-fingerprint identification step of mobile terminal, a corresponding device id allows register and bind three effective accounts.
Further, in data mining and risk assessment step, mobile terminal and social platform server sync risk rating module and sensitive information keyword, and mobile terminal utilizes risk rating module to make risk Pre-Evaluation to the current edit file do not delivered of user, present assessment result on mobile terminals, the reference before delivering for user.
Further, in data mining and risk assessment step, described sensitive information keyword is commercial fraud poster, at least comprises prize-winning, arrearage, arbitrage or tobacco and wine and one of to reclaim or multiple combination.
Further, in data mining and risk assessment step, described sensitive information keyword is political slogan, comprise run counter to social ethics words and deeds deed, guidance handle the speech of the will of the people, western thought infiltration or speech to the obvious illegal query of government offices' public credibility.
Further, in data mining and risk assessment step, described social platform server real-time update sensitive information keyword.
Further, in data mining and risk assessment step, described social platform server presses some cycles controlled renewal sensitive information keyword, and the described cycle is in the controlled setting of some hours ~ some moons.
Further, in the device-fingerprint identification step of mobile terminal, the effective account registered adopts irreversible cipher mode to carry out password setting.
Applying method for safe operation of the present invention: by carrying out software and hardware transformation to the interconnected social platform server of mutual communication, user terminal, effectively having raised the technical threshold of the false bean vermicelli of microblogging, there is the false bean vermicelli effect of certain suppression; And by the security mechanism that data mining and risk assessment combine, effectively contain the false commercial advertisement against business ethics, social ethics and political propaganda information, facilitate social safe, harmonious, healthy operation.
specific implementation method
The present invention is directed to the many bad and abnormal phenomenon that current day by day fashionable and new network social platform that is that have considerable amount user group reflects, innovation proposes a kind of method for safe operation of social platform.The method can stop the phenomenon that the false bean vermicelli of microblogging spreads unchecked conscientiously, and purifies business, the living atmosphere of social platform, promotes the doings that broad masses are healthy, safe.
The method for safe operation of a kind of social platform of the present invention, relate to the mobile terminal of social platform server and the user be connected by the Internet or communication network, having much representational in the application tool of many social platform is microblogging and micro-letter, certain technical solution of the present invention also can be applicable to the application of other principle of similitude and appearance form, from the technology of the present invention solution from feature: establish user to register control module in social platform server, user logs in control module, data-mining module, risk rating module and database, wherein database is used for the user profile that is associated of storage service and information of mobile terminal, and this method for safe operation mainly comprises following three large key steps, each step in the specific implementation order is not limit.
First, the device-fingerprint identification step of mobile terminal, based on the device id of mobile terminal institute tool uniqueness, user registers in control module and arranges corresponding each device id and only allow the effective account of registration less than three.Namely device-fingerprint (device id) is utilized to set up limited binding relationship with effective account number of social platform, unique user can be avoided to a certain extent frequently to register on a mobile terminal, nullify net nationality information, the burden causing social platform active account to manage and the system redundancy of invalid account.Generally, a corresponding device id allows register and bind three effective accounts; But under the false bean vermicelli requirement of suppression of high request, a corresponding device id can only allow to register and bind a unique effective account.Take this, can effectively suppress growing of false bean vermicelli, maintain the development order that social platform is good, healthy.
Secondly, data mining and risk assessment step, arrange and regular update sensitive information keyword in social platform server, data-mining module carries out keyword retrieval to the interactive information betided in social platform, and adopts risk rating module to carry out risk assessment to interactive information social platform relating to sensitive information keyword.
As the preferred version of this step, namely data mining and risk assessment can be carried out on customer mobile terminal.Implementation is, mobile terminal and social platform server sync risk rating module and sensitive information keyword, and mobile terminal utilizes risk rating module to make risk Pre-Evaluation to the current edit file do not delivered of user, present assessment result on mobile terminals, the reference before delivering for user.Utilize mobile terminal to edit in the application of social platform in the required information process issued user, mobile terminal backstage is also simultaneously to carrying out data mining and risk assessment operation in information.When assessment result is determined as the content with commercial fraud or political reactionary quality, just can present on mobile terminals, thus user whether can revise information as reference decision or whether decision is delivered.Especially, while presenting assessment result on mobile terminals, the corresponding legal liabilities born needed for also can presenting to user and consequence etc.
Above-mentioned sensitive information keyword is that commercial fraud poster at least comprises prize-winning, arrearage, one of arbitrage or tobacco and wine recovery or multiple combination.And political slogan comprise run counter to social ethics words and deeds deed, guidance handle the speech of the will of the people, western thought infiltration or speech to the obvious illegal query of government offices' public credibility.These are all the roots causing the bad development of social platform.Birth speed due to networks enjoy popularity word is inconceivable, unforeseen, and in order to make social platform continue healthy operation, above-mentioned sensitive information keyword also needs to upgrade in time, in order to avoid lawless person has an opportunity to take advantage of.Therefore, social platform server real-time update sensitive information keyword, or social platform server presses some cycles controlled renewal sensitive information keyword, and the described cycle is in the controlled setting of some hours ~ some moons.
Finally, the tracing step of mobile terminal, user to log in control module the corresponding each effective account login event of record occur corresponding to device id and be synchronized in database, send device id corresponding to the time-tracking of interactive information according to each effective account number in social platform.This step follows the trail of the use of the user issuing this information after issuing mainly for bad interactive information, and follows the trail of its law or criminal responsibility.Due in prior art, effective account of such social platform and password are easy to stolen, and therefore, the present invention is in the device-fingerprint identification step of mobile terminal, and the effective account registered adopts irreversible cipher mode to carry out password setting.Adds somewhat to hacker intercepts account number cipher difficulty by wooden horse.And another difficulty of user tracking is the user identity released news examines, although progressively promote now effective account to adopt real name registration, but it must be admitted that, and broad masses do not admit by the way of oneself ID card information as registration necessary condition, and bear the same name in social platform, close there are plenty of such people for appearance, very easily cause and illegally rob registration, falsely claim as one's own the malignant event that other people identity issues harmful information.And the mode that the present invention adopts device id and active account to bind mutually, this false claiming identity and illegal rush-register can be overcome to a certain extent.
Can be known by above many-sided step detailed description and understand, the present invention is by transforming the software and hardware of existing network social platform, the technical solution of complete set is proposed from aspects such as false bean vermicelli, business swindle information overflow, political setting purification, safety of account number cipher maintenances, effectively raise the technical threshold of the false bean vermicelli of microblogging, there is the false bean vermicelli effect of certain suppression; And by the security mechanism that data mining and risk assessment combine, effectively contain the false commercial advertisement against business ethics, social ethics and political propaganda information, facilitate social safe, harmonious, healthy operation.

Claims (9)

1. the method for safe operation of a social platform, relate to the mobile terminal of social platform server and user, the application tool of described social platform at least comprises microblogging and micro-letter, it is characterized in that: in described social platform server, establish that user registers control module, user logs in control module, data-mining module, risk rating module and database, described database is used for the user profile that is associated of storage service and information of mobile terminal, and described method for safe operation comprises the steps:
The device-fingerprint identification step of mobile terminal, based on the device id of mobile terminal institute tool uniqueness, user registers in control module and arranges corresponding each device id and only allow the effective account of registration less than three;
Data mining and risk assessment step, arrange and regular update sensitive information keyword in social platform server, described data-mining module carries out keyword retrieval to the interactive information betided in social platform, and adopts risk rating module to carry out risk assessment to interactive information social platform relating to sensitive information keyword;
The tracing step of mobile terminal, user to log in control module the corresponding each effective account login event of record occur corresponding to device id and be synchronized in database, send device id corresponding to the time-tracking of interactive information according to each effective account number in social platform.
2. the method for safe operation of social platform according to claim 1, is characterized in that: in the device-fingerprint identification step of mobile terminal, and a corresponding device id only allows to register and binds a unique effective account.
3. the method for safe operation of social platform according to claim 1, is characterized in that: in the device-fingerprint identification step of mobile terminal, and a corresponding device id allows register and bind three effective accounts.
4. the method for safe operation of social platform according to claim 1, it is characterized in that: in data mining and risk assessment step, mobile terminal and social platform server sync risk rating module and sensitive information keyword, and mobile terminal utilizes risk rating module to make risk Pre-Evaluation to the current edit file do not delivered of user, present assessment result on mobile terminals, the reference before delivering for user.
5. the method for safe operation of social platform according to claim 1 or 4, it is characterized in that: in data mining and risk assessment step, described sensitive information keyword is commercial fraud poster, at least comprises prize-winning, arrearage, one of arbitrage or tobacco and wine recovery or multiple combination.
6. the method for safe operation of social platform according to claim 1 or 4, it is characterized in that: in data mining and risk assessment step, described sensitive information keyword is political slogan, comprise run counter to social ethics words and deeds deed, guidance handle the speech of the will of the people, western thought infiltration or speech to the obvious illegal query of government offices' public credibility.
7. the method for safe operation of social platform according to claim 1, is characterized in that: in data mining and risk assessment step, described social platform server real-time update sensitive information keyword.
8. the method for safe operation of social platform according to claim 1, it is characterized in that: in data mining and risk assessment step, described social platform server presses some cycles controlled renewal sensitive information keyword, and the described cycle is in the controlled setting of some hours ~ some moons.
9. the method for safe operation of social platform according to claim 1, it is characterized in that: in the device-fingerprint identification step of mobile terminal, the effective account registered adopts irreversible cipher mode to carry out password setting.
CN201310126562.6A 2013-04-12 2013-04-12 Safe-operation method of social platform Active CN103220288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310126562.6A CN103220288B (en) 2013-04-12 2013-04-12 Safe-operation method of social platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310126562.6A CN103220288B (en) 2013-04-12 2013-04-12 Safe-operation method of social platform

Publications (2)

Publication Number Publication Date
CN103220288A CN103220288A (en) 2013-07-24
CN103220288B true CN103220288B (en) 2015-01-28

Family

ID=48817752

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310126562.6A Active CN103220288B (en) 2013-04-12 2013-04-12 Safe-operation method of social platform

Country Status (1)

Country Link
CN (1) CN103220288B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104683286B (en) * 2013-11-27 2018-01-02 中国银联股份有限公司 Security information interaction system and device
CN104408659B (en) * 2014-10-29 2017-12-19 国家计算机网络与信息安全管理中心 Appraisal procedure and system based on social networking application information disclosure model
CN106685894B (en) * 2015-11-09 2020-07-31 阿里巴巴集团控股有限公司 Risk identification method, device and system
CN106992958B (en) * 2016-01-21 2020-11-06 阿里巴巴集团控股有限公司 Method and system for positioning malicious account through lost account
CN107645483B (en) * 2016-07-22 2021-03-19 创新先进技术有限公司 Risk identification method, risk identification device, cloud risk identification device and system
CN108280139B (en) * 2017-12-28 2022-01-28 百度在线网络技术(北京)有限公司 POI data processing method, device, equipment and computer readable storage medium
CN109670665A (en) * 2018-09-26 2019-04-23 平安普惠企业管理有限公司 Method, assessment equipment and the storage medium of identification terminal batch registration account behavior

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510195A (en) * 2008-02-15 2009-08-19 刘峰 Website safety protection and test diagnosis system structure method based on crawler technology
CN101686239A (en) * 2009-05-26 2010-03-31 中山大学 Trojan discovery system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510195A (en) * 2008-02-15 2009-08-19 刘峰 Website safety protection and test diagnosis system structure method based on crawler technology
CN101686239A (en) * 2009-05-26 2010-03-31 中山大学 Trojan discovery system

Also Published As

Publication number Publication date
CN103220288A (en) 2013-07-24

Similar Documents

Publication Publication Date Title
CN103220288B (en) Safe-operation method of social platform
Kagan et al. Zooming into video conferencing privacy
Irshad et al. Identity theft and social media
Trottier Policing social media
Kshetri Cybercrime and cybersecurity in the global south
Mendel et al. Global survey on internet privacy and freedom of expression
Lemley The contradictions of platform regulation
JP2021530907A (en) Decentralized cyber secure privacy network for cloud communications, computing, and global e-commerce
Lemley The splinternet
CN106850622A (en) A kind of user identity management method based on license chain
Shulman The underground credentials market
US11526906B2 (en) System and method for secure content streaming, governance, fraud prevention, and the embedding artificial intelligence into content
KR102620268B1 (en) Blockchain - based phishing prevention system, apparatus, and method thereof
Michota Digital security concerns and threats facing women entrepreneurs
O'Connor Understanding online platform competition: common misunderstandings
CN103166968B (en) Effectively realize the method for Real-name Registration
Gasser et al. Internet monitor 2013: Reflections on the digital world
CN111476640A (en) Authentication method, system, storage medium and big data authentication platform
Schell The internet and society: A reference handbook
CN110351267B (en) Method and device for determining social media account number stolen
McGuire Social media platforms and the cybercrime economy
CN104361519B (en) A kind of implementation method of social networking service platform and social networking service platform
Tang et al. Development Report on China's New Media
Yue et al. Social media users send promotional links to strangers: legitimate promotion or security vulnerability?
CN107273384A (en) The determination method and apparatus of crowd's attribute

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: WANG DEJIA

Free format text: FORMER OWNER: SUZHOU PAYEGIS INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20140212

COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 215123 SUZHOU, JIANGSU PROVINCE TO: 215125 SUZHOU, JIANGSU PROVINCE

TA01 Transfer of patent application right

Effective date of registration: 20140212

Address after: Xinping Street Industrial Park of Suzhou city in Jiangsu province 215125 No. 388 takeoff Innovation Park Building 6 4F, 5F

Applicant after: Wang Dejia

Address before: Xinghu Street Industrial Park of Suzhou city in Jiangsu province 215123 No. 328 Creative Industry Park 1-B501

Applicant before: Suzhou PayEgis Information Technology Co., Ltd.

TA01 Transfer of patent application right
ASS Succession or assignment of patent right

Owner name: JIANGSU TONGFUDUN INFORMATION TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: WANG DEJIA

Effective date: 20141114

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20141114

Address after: Xinping Street Industrial Park of Suzhou city in Jiangsu province 215125 No. 388 takeoff Innovation Park Building 6 4F, 5F

Applicant after: JIANGSU PAYEGIS INFORMATION TECHNOLOGY CO., LTD.

Address before: Xinping Street Industrial Park of Suzhou city in Jiangsu province 215125 No. 388 takeoff Innovation Park Building 6 4F, 5F

Applicant before: Wang Dejia

C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: SUZHOU PAYEGIS INFORMATION TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: JIANGSU TONGFUDUN INFORMATION TECHNOLOGY CO., LTD.

Effective date: 20150824

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150824

Address after: Xinping Street Industrial Park of Suzhou city in Jiangsu province 215125 No. 388 takeoff Innovation Park Building 6 5F

Patentee after: Suzhou PayEgis Information Technology Co., Ltd.

Address before: Xinping Street Industrial Park of Suzhou city in Jiangsu province 215125 No. 388 takeoff Innovation Park Building 6 4F, 5F

Patentee before: JIANGSU PAYEGIS INFORMATION TECHNOLOGY CO., LTD.

C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: Suzhou City, Jiangsu province 215125 Industrial Park Suzhou Xinping Street No. 388 innovation park off No. 6 Building 5 floor

Patentee after: JIANGSU PAYEGIS TECHNOLOGY CO., LTD.

Address before: Xinping Street Industrial Park of Suzhou city in Jiangsu province 215125 No. 388 takeoff Innovation Park Building 6 5F

Patentee before: Suzhou PayEgis Information Technology Co., Ltd.

TR01 Transfer of patent right

Effective date of registration: 20201029

Address after: 4f, building C2, Suzhou 2.5 Industrial Park, 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province, 215000

Patentee after: JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.

Patentee after: Beijing tongfudun Artificial Intelligence Technology Co., Ltd

Address before: Suzhou City, Jiangsu province 215125 Industrial Park Suzhou Xinping Street No. 388 innovation park off No. 6 Building 5 floor

Patentee before: JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right