CN104954360B - Sharing contents screen method and device - Google Patents
Sharing contents screen method and device Download PDFInfo
- Publication number
- CN104954360B CN104954360B CN201510184660.4A CN201510184660A CN104954360B CN 104954360 B CN104954360 B CN 104954360B CN 201510184660 A CN201510184660 A CN 201510184660A CN 104954360 B CN104954360 B CN 104954360B
- Authority
- CN
- China
- Prior art keywords
- sharing contents
- user
- propagation
- target
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of sharing contents screen method and devices, belong to information security field.The method includes:At least one target sharing contents shielded are obtained, target sharing contents are the sharing contents for forbidding propagating in social class is applied according to shielding rules;According to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;Propagation chain is that each user passed through when target sharing contents are propagated in the application of social class based on relation chain is formed by user's chain;Propagation of the source user to other target sharing contents is propagated in shielding.The present invention, which solves the prior art, in target sharing contents can only be transmitted certain number or after the time, the problem of could being shielded to the target sharing contents;The target sharing contents shared for propagating source user are reached, can have been shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Description
Technical field
The present invention relates to information security field, more particularly to a kind of sharing contents screen method and device.
Background technology
With the development of internet, user can propagate sharing contents based on the relation chain in the application of social class, for example,
User A forwards a sharing contents to forward sharing contents to good friend user C again to good friend user B, user B, which can
To be microblogging, article, application program etc..
But some criminals also can be using relation chain come communication target sharing contents, server needs to share target
Content is shielded.A kind of screen method includes:Whether the hop count of server detection sharing contents reaches predetermined threshold, and
Sensitive keys word is carried in the sharing contents;If testing result, which is the hop count of the sharing contents, has reached predetermined threshold
And carry sensitive keys word, then server determines that the sharing contents are target sharing contents, and to the target sharing contents into
Row shielding.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
Above-mentioned technology can only be transmitted certain number in target sharing contents or after the time, could share to the target
Content is shielded, and target sharing contents cause harm in certain spread scope at this time.
Invention content
In target sharing contents it can only be transmitted certain number or after the time to solve above-mentioned technology, it could be to this
The problem of target sharing contents are shielded, an embodiment of the present invention provides a kind of sharing contents screen method and devices.It is described
Technical solution is as follows:
In a first aspect, providing a kind of sharing contents screen method, this method includes:
Obtain at least one target sharing contents shielded;
According to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;The propagation chain is
Each user that the target sharing contents are passed through when being propagated based on relation chain in the application of social class is formed by use
Family chain;
Shield propagation of the propagation source user to other target sharing contents.
Second aspect, provides a kind of sharing contents screening arrangement, which includes:
Content obtaining module, for obtaining at least one target sharing contents shielded;
Source user determining module, for the propagation chain according at least one target sharing contents, analysis is propagated
Source user;The propagation chain is that the target sharing contents are passed through when being propagated based on relation chain in the application of social class
Each user is formed by user's chain;
Shroud module, for shielding propagation of the propagation source user to other target sharing contents.
The advantageous effect that technical solution provided in an embodiment of the present invention is brought is:
By the propagation chain of the multiple target sharing contents shielded, analysis is generated or is spread target sharing contents
Source user is propagated, is shielded for propagating other target sharing contents that source user is subsequently shared;Solves the prior art only
It can be transmitted certain number in target sharing contents or after the time, what could be shielded to the target sharing contents asks
Topic;The target sharing contents shared for propagating source user are reached, can have been shielded before sharing, avoid mesh as possible
The effect that mark sharing contents are propagated in relation chain.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for
For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is propagation schematic diagram when sharing contents provided by one embodiment of the present invention are propagated based on relation chain;
Fig. 2 is the flow chart of sharing contents screen method provided by one embodiment of the present invention;
Fig. 3 is the flow chart of sharing contents screen method provided by one embodiment of the present invention;
Fig. 4 is the flow chart of sharing contents screen method provided by one embodiment of the present invention;
Fig. 5 is the block diagram of sharing contents screening arrangement provided by one embodiment of the present invention;
Fig. 6 is the block diagram of sharing contents screening arrangement provided by one embodiment of the present invention;
Fig. 7 is the block diagram of sharing contents screening arrangement provided by one embodiment of the present invention.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention
Formula is described in further detail.
In the application of social class, customer relationship chain is the chain being made of the specified relationship between two two users, this is specified
Relationship includes but not limited to that friend relation between two users, a user pay close attention to the relationship of another user, a user
Possess the relationship of message etc. for consulting another user publication.
Each user can be based on customer relationship chain and propagate sharing contents.For example, a user is by the sharing contents of oneself
The sharing contents are checked or obtained to publication in the Twitter message of itself by other users with concern relation.For another example,
One user issues sharing contents in social information display platform, by with friend relation and with the other of acquisition permission
User checks or obtains the sharing contents.
But in view of many reasons such as politics, business, individual privacy, a part of sharing contents are inhibited in social class application
In propagated, such as:The photo etc. for being related to the speech of political sensitivity topic, being related to pornographic picture and text, being related to star's privacy.
In embodiments of the present invention, the sharing contents propagated in social class is applied will be forbidden to be referred to as target according to shielding rules to share
Content.The shielding rules can be formulated by the maintenance personnel that social class is applied, it is possibility to have User Defined.The shielding rules are also
Can based on multiple users to the report of same sharing contents come dynamic generation.
When target sharing contents are propagated in the application of social class, propagated based on customer relationship chain.As shown in Figure 1, with
Family 1 possesses friend relation with user 2, user 3, user 4, and user 2 and user 5, user 6, user 7 possess friend relation, and user 3
With user 8 there is friend relation, user 4 with user 9 to 22 there is friend relation, user 9 to have friend relation with user 23.It is false
If each user forwards the target sharing contents, then after user 1 shares a target sharing contents, the target sharing contents
Propagation chain it is as follows:
1 → user of user, 2 → user 5;
1 → user of user, 2 → user 6;
1 → user of user, 2 → user 7;
1 → user of user, 3 → user 8;
9 → user of user 1 → user, 4 → user 23;
1 → user of user, 4 → user 10;
、、、
1 → user of user, 4 → user 21;
1 → user of user, 4 → user 22.
The propagation chain is analyzed it is found that the propagation of target sharing contents there are following features:
First, target sharing contents always after the more user's forwarding of good friend user, obtain the diffusion of large area, than
After being shared by user 4 such as target sharing contents, there are 14 people to have received the target sharing contents.
Second, in addition to the original user of target sharing contents, other users are usually the sharing contents in good friend user
In find target sharing contents after forward.
Namely, if it is desired to the propagation of limited target sharing contents, on the one hand, be as possible in the original of target sharing contents
It is shielded at user, such as at user 1;On the other hand, the target is limited as possible at the more user of good friend user
At the forwarding of sharing contents, such as user 4.
In the embodiment of the present invention, by the original user of target sharing contents and forward the target sharing contents after diffusion model
The use enclosed more than certain threshold value is considered to propagate source user per family.
Referring to FIG. 2, it illustrates the flow charts of sharing contents screen method provided by one embodiment of the present invention.This reality
Example is applied with the sharing contents screen method applied to coming for example, this method includes in the server of communication platform:
Step 202, at least one target sharing contents shielded are obtained, target sharing contents are prohibited according to shielding rules
The sharing contents only propagated in the application of social class.
Step 204, according to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;Propagation chain is
Each user that target sharing contents are passed through when being propagated based on relation chain in the application of social class is formed by user's chain.
Step 206, propagation of the source user to other target sharing contents is propagated in shielding.
In conclusion sharing contents screen method provided in this embodiment, passes through the multiple target sharing contents shielded
Propagation chain, analysis obtains generating the propagation source user of target sharing contents, for propagating other mesh for subsequently sharing of source user
Mark sharing contents are shielded;Certain number or time can only be transmitted in target sharing contents by solving the prior art
Afterwards, the problem of which could being shielded;Reach the target sharing contents shared for propagating source user,
It can be shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Referring to FIG. 3, the flow chart of the sharing contents screen method provided it illustrates another embodiment of the present invention.This reality
Example is applied with the sharing contents screen method applied to coming for example, this method includes in the server of communication platform:
Step 301, at least one target sharing contents shielded are obtained, target sharing contents are prohibited according to shielding rules
The sharing contents only propagated in the application of social class;
Server obtains at least one target sharing contents shielded.Target sharing contents are more, the propagation determined
Source user is more accurate.Each target sharing contents can be different.
The form of target sharing contents can be at least one in text, image, voice, video, webpage and application program
Kind.
Step 302, the propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Server also obtains the propagation chain of each target sharing contents, the propagation chain more than one of each target sharing contents
Item.For example, target sharing contents shown in figure 1 have 18 propagation chains.
Step 303, occurrence number of each user in propagation chain is counted;
Server also counts occurrence number of each user in each propagation chain of each target sharing contents.
For example, the occurrence number such as following table one of propagation chain of each user shown in figure 1 in target sharing contents:
User 1 | User 2 | User 3 | User 4 | User 5 | User 6 | User 7 | User 8 | User 9 | User 10 | User 11 | User 12 |
18 | 3 | 1 | 14 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
User 13 | User 14 | User 15 | User 16 | User 17 | User 18 | User 19 | User 20 | User 21 | User 22 | User 23 | |
1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
Table one
Certainly, usually there are many items in the target sharing contents shielded, and each target sharing contents are usually constructed with very
A plurality of propagation chain.Above-mentioned table one is only to schematically illustrate.
Step 304, the user for by occurrence number being more than first threshold is determined as propagation source user;Or, occurrence number is arranged
Sequence is determined as propagating source user in preceding n of user;
Occurrence number can be more than that the user of first threshold is determined as propagating source user, for example first threshold is by server
10 times, then user 1 and user 4 are determined as propagating source user.Wherein, user 1 is the original user of target sharing contents, and uses
Family 4 is the user that the range of scatter after forwarding the target sharing contents is more than 10.
Alternatively, server can be ranked up each user according to occurrence number, sequence is determined in preceding n of user
To propagate source user.For example, when target sharing contents are many, server can will sort true in preceding 100 users
It is set to propagation source user.
Optionally, the number correlation of the size of first threshold and target sharing contents, or, first threshold is big
The small item number correlation with propagation chain.
Likewise, the number correlation of the size of n and target sharing contents, or, the item of the size of n and propagation chain
Number correlation.
Server, which can be shielded directly, propagates all sharing contents that source user is shared.Alternatively, server can will be propagated
Source user is included in anti-target monitoring list, and the sharing contents shared positioned at the user of the anti-target monitoring list need server
Carry out anti-target monitoring.Here " sharing " include:Original sharing contents are delivered, or, forwarding the sharing contents of other users.
Server will propagate source user, and to be included in the operation after anti-target monitoring list as follows.
Step 305, receive propagation source user transmission shares request, shares request and carries the sharing contents for needing to be shared;
What server received that each user sends shares request;Server detects whether each user belongs to anti-target monitoring
List;If belonging to anti-target monitoring list, server determine receive propagate source user send share request.
This is shared request and carries the sharing contents for needing to be shared.The form of sharing contents include but not limited to text, image,
At least one of voice, video, webpage and application program.
Step 306, whether detection sharing contents belong to target sharing contents;
Server can be by maintenance personnel manual examination and verification or preset algorithm, to detect whether sharing contents belong to mesh
Mark sharing contents.
The preset algorithm can be the key content recognizer based on corpus, for example, text recognition algorithms, image are known
Other algorithm, audio and video recognizer etc..The corpus is established based on the target sharing contents shielded.Since the corpus can be with
Constantly expanded based on follow-up newfound target sharing contents, thus preset algorithm be according to the target sharing contents shielded into
The learning-oriented algorithm that row is continued to optimize.
Newfound target sharing contents can be obtained by the manual examination and verification of user's report or maintenance personnel.
For example, it is that " May 1, various jewellery can wipe away tears clearance sale that one, which is propagated the sharing contents shared of source user request,
, 1 folding of the whole audience ".Server detects that the sharing contents include target keywords " clearance sale of wiping away tears ", " 1 by preset algorithm
Folding ", then server detects that sharing contents belong to target sharing contents.
The embodiment of the present invention is not specifically limited server using which kind of detection mode.
Step 307, if sharing contents belong to target sharing contents, the sharing contents are shielded.
If the testing result of server, which is sharing contents, belongs to target sharing contents, sharing contents are shielded.
The mode of sharing contents is shielded, including but not limited to:
Forbid sharing the sharing contents;
Or, only to propagate source user visible for the sharing contents;
Or, deleting the sharing contents.
In conclusion sharing contents screen method provided in this embodiment, passes through the multiple target sharing contents shielded
Propagation chain, analysis generated or spread the propagation source users of target sharing contents, propagation source user is subsequently shared
Other target sharing contents are shielded;Solve the prior art can only target sharing contents be transmitted certain number or
After time, the problem of could being shielded to the target sharing contents;Reach and has shared for propagating the target that source user is shared
Content, can be shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Sharing contents screen method provided in this embodiment, also by counting propagation of each user in target sharing contents
Occurrence number on chain, analysis obtain propagating source user, can find out the original user for propagating source user, and can search
Go out to spread the more serious user of target sharing contents, target point can be carried out on the crucial node of each comparison of propagation chain
The shielding for enjoying content has reached with less manpower or computing resource, to realize shield effectiveness as well as possible.
As a kind of possible realization method, the step 304 in Fig. 3 can be implemented as step 304a to step by replacement
304c, as shown in Figure 4.
Step 304a counts the propagating influence of each user;
The relation chain that is possessed by each user is simultaneously differed, each user possessed propagation in the application of social class
Influence power is also different.
For example, a user is star, there are more than one hundred million followers in microblog, then the user shares microblogging
Propagating influence is bigger.
For another example, a user only has 5 good friends, even if the user shares a target sharing contents, whole 5 good friends
It is all forwarded, range of scatter is still limited, so the propagating influence of the user is relatively low.
Optionally, server counts the propagating influence of each user, attribute information according to the attribute information of each user
Including:At least one information in user gradation, user type, good friend's quantity and concern number.
The definition of user gradation and user type in different social class applications can be different.For example, in microblog
In, user type can be divided into through " big V " user of real-name authentication and ordinary user;For another example, in wechat platform, user
Type can be divided into public platform and common account number.
Each attribute information can correspond to respective weight and quantized value, server according to the weight of each attribute information and
Quantized value calculates propagating influence.
Schematically, the user gradation of a user is 10 grades, and user type is " big V " user, and good friend's quantity is 200
People, concern number are 50000 people, then the propagating influence that server calculates the user is:
10* weight 1+1* weight 2+200* weight 3+50000* weights 4.
Wherein, 1 be " big V " user quantized value, weight 1 is the corresponding weight of user gradation, and weight 2 is user type pair
The weight answered, weight 3 are the corresponding weights of good friend's quantity, and weight 4 is the corresponding weight of concern number.
Step 304b calculates the harm that each user shares target sharing contents according to occurrence number and propagating influence
Index;
Server can also directly calculate the product of occurrence number and propagating influence, share target point as each user
Enjoy the hazard index of content.
Optionally, occurrence number is also corresponding with weight a, and propagating influence is also corresponding with weight b, and server calculates each use
The hazard index that target sharing contents are shared at family is:
Occurrence number * weight a+ propagating influence * weights b.
Step 304c, the user for by hazard index being more than second threshold are determined as propagation source user.
In conclusion sharing contents screen method provided in this embodiment, also by combining occurrence number and propagation effect
Power analyzes propagation source user, can more accurately analyze propagation source user.Whether original user, or diffusion target point
The more serious user of content is enjoyed, can be identified by server rapidly under the amplification of respective weights, to improve
The accuracy of follow-up shielding process.
As alternatively possible realization method, since mistake may occur for the testing result in step 306.In Fig. 3
Step 306 after further include step 308 to step 311, as shown in Figure 5.
Step 308, if sharing contents are not belonging to target sharing contents, allow sharing for sharing contents;
If the testing result of server within step 306 is to be not belonging to target sharing contents, server allows this point
Enjoy sharing for content.
Step 309, record the sharing contents shares number;
For server after allowing to share the sharing contents, also record the sharing contents shares number.
Step 310, detection shares whether number reaches third threshold value;
Step 311, if it is more than third threshold value to share number, detect whether sharing contents belong in target shares again
Hold.
That is, if the number of sharing of the sharing contents is more than third threshold value, it is that comparison is popular to represent the sharing contents
, alternatively, potential become more popular sharing contents, server detects whether sharing contents belong to target point again at this time
Enjoy content.
If it is, entering step 307;If it is not, then entering step 308, but step 309 is no longer executed later.
Optionally, in detection process again, detection mode is different from the detection mode of last time detection process.For example, step
It is detected using preset algorithm in rapid 306, the artificial detection of maintenance personnel is used in step 311.
Optionally, in detection process again, server still uses whether preset algorithm detection sharing contents belong to mesh
Mark sharing contents.But since preset algorithm is the learning-oriented calculation continued to optimize according to the target sharing contents shielded
Method, if there is new corpus is added in detection process twice, then detection process still is possible to eliminate last time detection again
The detection mistake of process.
In conclusion sharing contents screen method provided in this embodiment, by replacing detection method or using study
The preset algorithm of type is checked again so that and target sharing contents are before a wide range of propagate, by detection process twice,
Reduce the diffusion possibility of target sharing contents.And in the prior art, due to being judged for every sharing contents, such as
Fruit carries out detection process twice, can consume a large amount of computing resource.The sharing contents that the present embodiment is only shared to propagating source user
In, there are the sharing contents of suspicion to carry out detection process twice, under the premise of using less computing resource, realizes more smart
The shielding of accurate target sharing contents.
The content not being described in detail in device embodiment is also asked for the device embodiment of the embodiment of the present invention below
With reference to above-mentioned one-to-one embodiment of the method.
Referring to FIG. 6, it illustrates the block diagrams of sharing contents screening arrangement provided by one embodiment of the present invention.
The sharing contents screening arrangement being implemented in combination in the server as communication platform by software, hardware or both
All or part of, which includes:
Content obtaining module 620, for obtaining at least one target sharing contents shielded
Source user determining module 640, for the propagation chain according at least one target sharing contents, analysis is passed
Broadcast source user;The propagation chain is that the target sharing contents are passed through when being propagated based on relation chain in the application of social class
Each user be formed by user's chain.
Shroud module 660, for shielding propagation of the propagation source user to other target sharing contents.
In conclusion sharing contents screening arrangement provided in this embodiment, passes through the multiple target sharing contents shielded
Propagation chain, analysis generated or spread the propagation source users of target sharing contents, propagation source user is subsequently shared
Other target sharing contents are shielded;Solve the prior art can only target sharing contents be transmitted certain number or
After time, the problem of could being shielded to the target sharing contents;Reach and has shared for propagating the target that source user is shared
Content, can be shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Referring to FIG. 7, it illustrates the block diagrams of sharing contents screening arrangement provided by one embodiment of the present invention.
The sharing contents screening arrangement being implemented in combination in the server as communication platform by software, hardware or both
All or part of, which includes:
Content obtaining module 620, for obtaining at least one target sharing contents shielded.
Source user determining module 640, for the propagation chain according at least one target sharing contents, analysis is passed
Broadcast source user;The propagation chain is that the target sharing contents are passed through when being propagated based on relation chain in the application of social class
Each user be formed by user's chain.
Shroud module 660, for shielding propagation of the propagation source user to other target sharing contents.
Optionally, the source user determining module 640, including:
Propagation chain acquiring unit 642, the propagation chain for obtaining each target sharing contents, obtains at least one biography
Broadcast chain.
Number statistic unit 644, for counting occurrence number of each user in the propagation chain.
First determination unit 646, the user for by the occurrence number being more than first threshold are determined as the propagating source
User;Or, the occurrence number is sorted is determined as the propagation source user in preceding n of user, n is positive integer.
Optionally, the source user determining module 640, including:
Propagation chain acquiring unit 642, the propagation chain for obtaining each target sharing contents, obtains at least one biography
Broadcast chain.
Number statistic unit 644, for counting occurrence number of each user in the propagation chain.
Influence power statistic unit 645, the propagating influence for counting each user.
Exponent calculation unit 647, for according to the occurrence number and the propagating influence, calculating each user and sharing
The hazard index of the target sharing contents.
Second determination unit 649, the user for by the hazard index being more than second threshold are determined as the propagating source
User.
Optionally, the exponent calculation unit 647, the biography for counting each user according to the attribute information of each user
Influence power is broadcast, the attribute information includes:At least one letter in user gradation, user type, good friend's quantity and concern number
Breath.
Optionally, the shroud module 660, including:
Request reception unit 662, the request of sharing for receiving the propagation source user transmission are described to share request carrying
Need the sharing contents shared.
Content detection unit 664, for detecting whether the sharing contents belong to the target sharing contents.
Content screen unit 666 belongs to if the testing result for the content detection unit is the sharing contents
The target sharing contents, then shield the sharing contents.
Optionally, the shroud module 660 further includes:
Allow shares unit 663, if for the content detection unit 666 testing result be the sharing contents not
Belong to the target sharing contents, then allows sharing for the sharing contents.
Number computing unit 665 shares number for record the sharing contents.
Threshold detection unit 667 described shares whether number reaches third threshold value for detecting.
Detection unit 669 again, if the testing result for the threshold detection unit 667 is to share number more than third
Threshold value then executes the step of whether the detection sharing contents belong to the target sharing contents again.
Sharing contents screening arrangement provided in this embodiment, also by counting propagation of each user in target sharing contents
Occurrence number on chain, analysis obtain propagating source user, can find out the original user for propagating source user, and can search
Go out to spread the more serious user of target sharing contents, target point can be carried out on the crucial node of each comparison of propagation chain
The shielding for enjoying content has reached with less manpower or computing resource, to realize shield effectiveness as well as possible.
Sharing contents screening arrangement provided in this embodiment, also by being passed in conjunction with occurrence number and propagating influence to analyze
Source user is broadcast, propagation source user can be more accurately analyzed.Whether original user, or diffusion target sharing contents compare
Serious user can be identified by server rapidly under the amplification of respective weights, subsequently be shielded to improve
The accuracy of journey.
Sharing contents screening arrangement provided in this embodiment, by replacing detection method or using learning-oriented pre- imputation
Method is checked again so that target sharing contents, by detection process twice, reduce target before a wide range of propagate
The diffusion possibility of sharing contents.And in the prior art, due to being judged for every sharing contents, if carried out twice
Detection process can consume a large amount of computing resource.The present embodiment is only to propagating in the sharing contents that source user is shared, and there are suspicion
Sharing contents carry out detection process twice, under the premise of using less computing resource, realize more accurately target point
Enjoy the shielding of content.
It should be noted that:The sharing contents screening arrangement that above-described embodiment provides is when shielding target sharing contents, only
The example of the division of the above functional modules, in practical application, can as needed and by above-mentioned function distribution by
Different function modules is completed, i.e., the internal structure of equipment is divided into different function modules, described above complete to complete
Portion or partial function.In addition, sharing contents screening arrangement and sharing contents screen method embodiment that above-described embodiment provides
Belong to same design, specific implementation process refers to embodiment of the method, and which is not described herein again.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.
Claims (9)
1. a kind of sharing contents screen method, which is characterized in that the method includes:
At least one target sharing contents shielded are obtained, the target sharing contents are forbidden in social activity according to shielding rules
The sharing contents propagated in class application;
According to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;The propagation chain is described
Each user that target sharing contents are passed through when being propagated based on relation chain in the application of social class is formed by user's chain;
The request of sharing of the propagation source user transmission is received, it is described to share the sharing contents for asking carrying to need to be shared;
Detect whether the sharing contents belong to the target sharing contents;
If the sharing contents belong to the target sharing contents, the sharing contents are shielded;
If the sharing contents are not belonging to the target sharing contents, allow sharing for the sharing contents;
Record the sharing contents shares number;
Share whether number reaches third threshold value described in detection;
If the number of sharing is more than third threshold value, execute whether the detection sharing contents belong to the target again
The step of sharing contents.
2. according to the method described in claim 1, it is characterized in that, according to the propagation of at least one target sharing contents
Chain, analysis obtain propagating source user, including:
The propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Count occurrence number of each user in the propagation chain;
The user for by the occurrence number being more than first threshold is determined as the propagation source user;Or, the occurrence number is arranged
Sequence is determined as the propagation source user in preceding n of user, and n is positive integer.
3. according to the method described in claim 1, it is characterized in that, according to the propagation of at least one target sharing contents
Chain, analysis obtain propagating source user, including:
The propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Count occurrence number of each user in the propagation chain;
Count the propagating influence of each user;
According to the occurrence number and the propagating influence, calculates each user and share the harm of the target sharing contents and refer to
Number;
The user for by the hazard index being more than second threshold is determined as the propagation source user.
4. according to the method described in claim 3, it is characterized in that, count the propagating influence of each user, including:
The propagating influence of each user is counted according to the attribute information of each user, the attribute information includes:User gradation,
At least one information in user type, good friend's quantity and concern number.
5. a kind of sharing contents screening arrangement, which is characterized in that described device includes:
Content obtaining module, for obtaining at least one target sharing contents shielded;
Source user determining module, for the propagation chain according at least one target sharing contents, analysis obtains propagating source use
Family;The propagation chain is the target sharing contents passed through when being propagated based on relation chain in the application of social class it is each
User is formed by user's chain;
Request reception unit shares request for receive that the propagation source user sends, described to share request carrying and need point
The sharing contents enjoyed;
Content detection unit, for detecting whether the sharing contents belong to the target sharing contents;
Content screen unit, if the testing result for the content detection unit, which is the sharing contents, belongs to the target
Sharing contents then shield the sharing contents;
Allow shares unit, if the testing result for the content detection unit, which is the sharing contents, is not belonging to the mesh
Sharing contents are marked, then allow sharing for the sharing contents;
Number computing unit shares number for record the sharing contents;
Threshold detection unit described shares whether number reaches third threshold value for detecting;
Detection unit again, if the testing result for the threshold detection unit is to share number more than third threshold value, then
It is secondary that the step of whether the detection sharing contents belong to the target sharing contents executed.
6. device according to claim 5, which is characterized in that the source user determining module, including:
Propagation chain acquiring unit, the propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Number statistic unit, for counting occurrence number of each user in the propagation chain;
First determination unit, the user for by the occurrence number being more than first threshold are determined as the propagation source user;Or,
The occurrence number is sorted and is determined as the propagation source user in preceding n of user, n is positive integer.
7. device according to claim 5, which is characterized in that the source user determining module, including:
Propagation chain acquiring unit, the propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Number statistic unit, for counting occurrence number of each user in the propagation chain;
Influence power statistic unit, the propagating influence for counting each user;
Exponent calculation unit, for according to the occurrence number and the propagating influence, calculating each user and sharing the mesh
Mark the hazard index of sharing contents;
Second determination unit, the user for by the hazard index being more than second threshold are determined as the propagation source user.
8. device according to claim 7, which is characterized in that the exponent calculation unit, for according to each user's
Attribute information counts the propagating influence of each user, and the attribute information includes:User gradation, user type, good friend's quantity
With at least one information in concern number.
9. a kind of computer readable storage medium, which is characterized in that it has program stored therein in the computer readable storage medium, institute
Program is stated to be loaded by processor and executed to realize such as Claims 1-4 any one of them sharing contents screen method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510184660.4A CN104954360B (en) | 2015-04-17 | 2015-04-17 | Sharing contents screen method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510184660.4A CN104954360B (en) | 2015-04-17 | 2015-04-17 | Sharing contents screen method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104954360A CN104954360A (en) | 2015-09-30 |
CN104954360B true CN104954360B (en) | 2018-09-04 |
Family
ID=54168714
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510184660.4A Active CN104954360B (en) | 2015-04-17 | 2015-04-17 | Sharing contents screen method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104954360B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682008A (en) * | 2015-11-06 | 2017-05-17 | 北京奇虎科技有限公司 | Friend circle information classification method and device |
CN105681563B (en) * | 2016-01-26 | 2019-04-09 | 深圳市美贝壳科技有限公司 | The implementation method of intelligent hardware devices picture sharing permission |
CN106127535A (en) * | 2016-08-24 | 2016-11-16 | 四川众缆科技有限公司 | Advertisement push system based on mobile terminal and method |
CN107818514B (en) * | 2016-09-12 | 2022-01-14 | 腾讯科技(深圳)有限公司 | Method, device and terminal for controlling information propagation of online social network |
CN106921565B (en) * | 2017-03-30 | 2019-12-13 | 北京奇艺世纪科技有限公司 | Junk information identification method and device |
CN108900408A (en) * | 2018-05-24 | 2018-11-27 | 四川斐讯信息技术有限公司 | The method and system of friend information in a kind of shielding social platform |
CN111447137A (en) * | 2020-02-29 | 2020-07-24 | 中国平安人寿保险股份有限公司 | Browsing condition data analysis method and device, server and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103136255A (en) * | 2011-11-30 | 2013-06-05 | 腾讯科技(深圳)有限公司 | Method and device for information management |
CN104182457A (en) * | 2014-07-14 | 2014-12-03 | 上海交通大学 | Poisson-process-model-based method for predicting event popularity in social network |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050273673A1 (en) * | 2004-05-19 | 2005-12-08 | Paul Gassoway | Systems and methods for minimizing security logs |
CN102262681B (en) * | 2011-08-19 | 2015-12-02 | 南京大学 | A kind of blog information identifies the method for crucial blog collection in propagating |
CN103906066B (en) * | 2012-12-27 | 2016-03-23 | 腾讯科技(北京)有限公司 | The harassing and wrecking screen method that a kind of user-generated content is mentioned and device |
CN103927398B (en) * | 2014-05-07 | 2016-12-28 | 中国人民解放军信息工程大学 | The microblogging excavated based on maximum frequent itemsets propagandizes colony's discovery method |
-
2015
- 2015-04-17 CN CN201510184660.4A patent/CN104954360B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103136255A (en) * | 2011-11-30 | 2013-06-05 | 腾讯科技(深圳)有限公司 | Method and device for information management |
CN104182457A (en) * | 2014-07-14 | 2014-12-03 | 上海交通大学 | Poisson-process-model-based method for predicting event popularity in social network |
Also Published As
Publication number | Publication date |
---|---|
CN104954360A (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104954360B (en) | Sharing contents screen method and device | |
Alothali et al. | Detecting social bots on twitter: a literature review | |
Hine et al. | Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web | |
Aghasian et al. | Scoring users’ privacy disclosure across multiple online social networks | |
Alrubaian et al. | Reputation‐based credibility analysis of Twitter social network users | |
US10412185B2 (en) | Event information system classifying messages using machine learning classification model and pushing selected messages to user | |
Messias et al. | You followed my bot! Transforming robots into influential users in Twitter. | |
Miller et al. | Twitter spammer detection using data stream clustering | |
US9262537B2 (en) | Systems and methods for dynamically determining influencers in a social data network using weighted analysis | |
Singh et al. | Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time | |
US9146943B1 (en) | Determining user content classifications within an online community | |
Kauk et al. | Understanding and countering the spread of conspiracy theories in social networks: Evidence from epidemiological models of Twitter data | |
Ng et al. | Cross-platform information spread during the January 6th capitol riots | |
KR101869815B1 (en) | Method and apparatus for spotting fake news using collective intelligence | |
CN108829769B (en) | Suspicious group discovery method and device | |
Maleki et al. | Using an epidemiological model to study the spread of misinformation during the black lives matter movement | |
Webberley et al. | Retweeting beyond expectation: Inferring interestingness in Twitter | |
Derczynski et al. | Misinformation on Twitter during the Danish national election: A case study | |
Folke et al. | An evaluation of digital partner notification tool engagement and impact for patients diagnosed with gonorrhea and syphilis | |
Babcock et al. | Pretending positive, pushing false: Comparing captain marvel misinformation campaigns | |
Bohl et al. | Improved measures of racial mixing among men who have sex with men using Newman's assortativity coefficient | |
US8874651B2 (en) | Federating open social networks for analyses | |
Perez et al. | A dynamic approach to detecting suspicious profiles on social platforms | |
Jendoubi et al. | Classification of message spreading in a heterogeneous social network | |
Van Meeteren et al. | Mapping communities in large virtual social networks: Using Twitter data to find the Indie Mac community |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |