CN104954360B - Sharing contents screen method and device - Google Patents

Sharing contents screen method and device Download PDF

Info

Publication number
CN104954360B
CN104954360B CN201510184660.4A CN201510184660A CN104954360B CN 104954360 B CN104954360 B CN 104954360B CN 201510184660 A CN201510184660 A CN 201510184660A CN 104954360 B CN104954360 B CN 104954360B
Authority
CN
China
Prior art keywords
sharing contents
user
propagation
target
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510184660.4A
Other languages
Chinese (zh)
Other versions
CN104954360A (en
Inventor
查文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510184660.4A priority Critical patent/CN104954360B/en
Publication of CN104954360A publication Critical patent/CN104954360A/en
Application granted granted Critical
Publication of CN104954360B publication Critical patent/CN104954360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of sharing contents screen method and devices, belong to information security field.The method includes:At least one target sharing contents shielded are obtained, target sharing contents are the sharing contents for forbidding propagating in social class is applied according to shielding rules;According to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;Propagation chain is that each user passed through when target sharing contents are propagated in the application of social class based on relation chain is formed by user's chain;Propagation of the source user to other target sharing contents is propagated in shielding.The present invention, which solves the prior art, in target sharing contents can only be transmitted certain number or after the time, the problem of could being shielded to the target sharing contents;The target sharing contents shared for propagating source user are reached, can have been shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.

Description

Sharing contents screen method and device
Technical field
The present invention relates to information security field, more particularly to a kind of sharing contents screen method and device.
Background technology
With the development of internet, user can propagate sharing contents based on the relation chain in the application of social class, for example, User A forwards a sharing contents to forward sharing contents to good friend user C again to good friend user B, user B, which can To be microblogging, article, application program etc..
But some criminals also can be using relation chain come communication target sharing contents, server needs to share target Content is shielded.A kind of screen method includes:Whether the hop count of server detection sharing contents reaches predetermined threshold, and Sensitive keys word is carried in the sharing contents;If testing result, which is the hop count of the sharing contents, has reached predetermined threshold And carry sensitive keys word, then server determines that the sharing contents are target sharing contents, and to the target sharing contents into Row shielding.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
Above-mentioned technology can only be transmitted certain number in target sharing contents or after the time, could share to the target Content is shielded, and target sharing contents cause harm in certain spread scope at this time.
Invention content
In target sharing contents it can only be transmitted certain number or after the time to solve above-mentioned technology, it could be to this The problem of target sharing contents are shielded, an embodiment of the present invention provides a kind of sharing contents screen method and devices.It is described Technical solution is as follows:
In a first aspect, providing a kind of sharing contents screen method, this method includes:
Obtain at least one target sharing contents shielded;
According to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;The propagation chain is Each user that the target sharing contents are passed through when being propagated based on relation chain in the application of social class is formed by use Family chain;
Shield propagation of the propagation source user to other target sharing contents.
Second aspect, provides a kind of sharing contents screening arrangement, which includes:
Content obtaining module, for obtaining at least one target sharing contents shielded;
Source user determining module, for the propagation chain according at least one target sharing contents, analysis is propagated Source user;The propagation chain is that the target sharing contents are passed through when being propagated based on relation chain in the application of social class Each user is formed by user's chain;
Shroud module, for shielding propagation of the propagation source user to other target sharing contents.
The advantageous effect that technical solution provided in an embodiment of the present invention is brought is:
By the propagation chain of the multiple target sharing contents shielded, analysis is generated or is spread target sharing contents Source user is propagated, is shielded for propagating other target sharing contents that source user is subsequently shared;Solves the prior art only It can be transmitted certain number in target sharing contents or after the time, what could be shielded to the target sharing contents asks Topic;The target sharing contents shared for propagating source user are reached, can have been shielded before sharing, avoid mesh as possible The effect that mark sharing contents are propagated in relation chain.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, other are can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is propagation schematic diagram when sharing contents provided by one embodiment of the present invention are propagated based on relation chain;
Fig. 2 is the flow chart of sharing contents screen method provided by one embodiment of the present invention;
Fig. 3 is the flow chart of sharing contents screen method provided by one embodiment of the present invention;
Fig. 4 is the flow chart of sharing contents screen method provided by one embodiment of the present invention;
Fig. 5 is the block diagram of sharing contents screening arrangement provided by one embodiment of the present invention;
Fig. 6 is the block diagram of sharing contents screening arrangement provided by one embodiment of the present invention;
Fig. 7 is the block diagram of sharing contents screening arrangement provided by one embodiment of the present invention.
Specific implementation mode
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
In the application of social class, customer relationship chain is the chain being made of the specified relationship between two two users, this is specified Relationship includes but not limited to that friend relation between two users, a user pay close attention to the relationship of another user, a user Possess the relationship of message etc. for consulting another user publication.
Each user can be based on customer relationship chain and propagate sharing contents.For example, a user is by the sharing contents of oneself The sharing contents are checked or obtained to publication in the Twitter message of itself by other users with concern relation.For another example, One user issues sharing contents in social information display platform, by with friend relation and with the other of acquisition permission User checks or obtains the sharing contents.
But in view of many reasons such as politics, business, individual privacy, a part of sharing contents are inhibited in social class application In propagated, such as:The photo etc. for being related to the speech of political sensitivity topic, being related to pornographic picture and text, being related to star's privacy. In embodiments of the present invention, the sharing contents propagated in social class is applied will be forbidden to be referred to as target according to shielding rules to share Content.The shielding rules can be formulated by the maintenance personnel that social class is applied, it is possibility to have User Defined.The shielding rules are also Can based on multiple users to the report of same sharing contents come dynamic generation.
When target sharing contents are propagated in the application of social class, propagated based on customer relationship chain.As shown in Figure 1, with Family 1 possesses friend relation with user 2, user 3, user 4, and user 2 and user 5, user 6, user 7 possess friend relation, and user 3 With user 8 there is friend relation, user 4 with user 9 to 22 there is friend relation, user 9 to have friend relation with user 23.It is false If each user forwards the target sharing contents, then after user 1 shares a target sharing contents, the target sharing contents Propagation chain it is as follows:
1 → user of user, 2 → user 5;
1 → user of user, 2 → user 6;
1 → user of user, 2 → user 7;
1 → user of user, 3 → user 8;
9 → user of user 1 → user, 4 → user 23;
1 → user of user, 4 → user 10;
、、、
1 → user of user, 4 → user 21;
1 → user of user, 4 → user 22.
The propagation chain is analyzed it is found that the propagation of target sharing contents there are following features:
First, target sharing contents always after the more user's forwarding of good friend user, obtain the diffusion of large area, than After being shared by user 4 such as target sharing contents, there are 14 people to have received the target sharing contents.
Second, in addition to the original user of target sharing contents, other users are usually the sharing contents in good friend user In find target sharing contents after forward.
Namely, if it is desired to the propagation of limited target sharing contents, on the one hand, be as possible in the original of target sharing contents It is shielded at user, such as at user 1;On the other hand, the target is limited as possible at the more user of good friend user At the forwarding of sharing contents, such as user 4.
In the embodiment of the present invention, by the original user of target sharing contents and forward the target sharing contents after diffusion model The use enclosed more than certain threshold value is considered to propagate source user per family.
Referring to FIG. 2, it illustrates the flow charts of sharing contents screen method provided by one embodiment of the present invention.This reality Example is applied with the sharing contents screen method applied to coming for example, this method includes in the server of communication platform:
Step 202, at least one target sharing contents shielded are obtained, target sharing contents are prohibited according to shielding rules The sharing contents only propagated in the application of social class.
Step 204, according to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;Propagation chain is Each user that target sharing contents are passed through when being propagated based on relation chain in the application of social class is formed by user's chain.
Step 206, propagation of the source user to other target sharing contents is propagated in shielding.
In conclusion sharing contents screen method provided in this embodiment, passes through the multiple target sharing contents shielded Propagation chain, analysis obtains generating the propagation source user of target sharing contents, for propagating other mesh for subsequently sharing of source user Mark sharing contents are shielded;Certain number or time can only be transmitted in target sharing contents by solving the prior art Afterwards, the problem of which could being shielded;Reach the target sharing contents shared for propagating source user, It can be shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Referring to FIG. 3, the flow chart of the sharing contents screen method provided it illustrates another embodiment of the present invention.This reality Example is applied with the sharing contents screen method applied to coming for example, this method includes in the server of communication platform:
Step 301, at least one target sharing contents shielded are obtained, target sharing contents are prohibited according to shielding rules The sharing contents only propagated in the application of social class;
Server obtains at least one target sharing contents shielded.Target sharing contents are more, the propagation determined Source user is more accurate.Each target sharing contents can be different.
The form of target sharing contents can be at least one in text, image, voice, video, webpage and application program Kind.
Step 302, the propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Server also obtains the propagation chain of each target sharing contents, the propagation chain more than one of each target sharing contents Item.For example, target sharing contents shown in figure 1 have 18 propagation chains.
Step 303, occurrence number of each user in propagation chain is counted;
Server also counts occurrence number of each user in each propagation chain of each target sharing contents.
For example, the occurrence number such as following table one of propagation chain of each user shown in figure 1 in target sharing contents:
User 1 User 2 User 3 User 4 User 5 User 6 User 7 User 8 User 9 User 10 User 11 User 12
18 3 1 14 1 1 1 1 1 1 1 1
User 13 User 14 User 15 User 16 User 17 User 18 User 19 User 20 User 21 User 22 User 23
1 1 1 1 1 1 1 1 1 1 1
Table one
Certainly, usually there are many items in the target sharing contents shielded, and each target sharing contents are usually constructed with very A plurality of propagation chain.Above-mentioned table one is only to schematically illustrate.
Step 304, the user for by occurrence number being more than first threshold is determined as propagation source user;Or, occurrence number is arranged Sequence is determined as propagating source user in preceding n of user;
Occurrence number can be more than that the user of first threshold is determined as propagating source user, for example first threshold is by server 10 times, then user 1 and user 4 are determined as propagating source user.Wherein, user 1 is the original user of target sharing contents, and uses Family 4 is the user that the range of scatter after forwarding the target sharing contents is more than 10.
Alternatively, server can be ranked up each user according to occurrence number, sequence is determined in preceding n of user To propagate source user.For example, when target sharing contents are many, server can will sort true in preceding 100 users It is set to propagation source user.
Optionally, the number correlation of the size of first threshold and target sharing contents, or, first threshold is big The small item number correlation with propagation chain.
Likewise, the number correlation of the size of n and target sharing contents, or, the item of the size of n and propagation chain Number correlation.
Server, which can be shielded directly, propagates all sharing contents that source user is shared.Alternatively, server can will be propagated Source user is included in anti-target monitoring list, and the sharing contents shared positioned at the user of the anti-target monitoring list need server Carry out anti-target monitoring.Here " sharing " include:Original sharing contents are delivered, or, forwarding the sharing contents of other users.
Server will propagate source user, and to be included in the operation after anti-target monitoring list as follows.
Step 305, receive propagation source user transmission shares request, shares request and carries the sharing contents for needing to be shared;
What server received that each user sends shares request;Server detects whether each user belongs to anti-target monitoring List;If belonging to anti-target monitoring list, server determine receive propagate source user send share request.
This is shared request and carries the sharing contents for needing to be shared.The form of sharing contents include but not limited to text, image, At least one of voice, video, webpage and application program.
Step 306, whether detection sharing contents belong to target sharing contents;
Server can be by maintenance personnel manual examination and verification or preset algorithm, to detect whether sharing contents belong to mesh Mark sharing contents.
The preset algorithm can be the key content recognizer based on corpus, for example, text recognition algorithms, image are known Other algorithm, audio and video recognizer etc..The corpus is established based on the target sharing contents shielded.Since the corpus can be with Constantly expanded based on follow-up newfound target sharing contents, thus preset algorithm be according to the target sharing contents shielded into The learning-oriented algorithm that row is continued to optimize.
Newfound target sharing contents can be obtained by the manual examination and verification of user's report or maintenance personnel.
For example, it is that " May 1, various jewellery can wipe away tears clearance sale that one, which is propagated the sharing contents shared of source user request, , 1 folding of the whole audience ".Server detects that the sharing contents include target keywords " clearance sale of wiping away tears ", " 1 by preset algorithm Folding ", then server detects that sharing contents belong to target sharing contents.
The embodiment of the present invention is not specifically limited server using which kind of detection mode.
Step 307, if sharing contents belong to target sharing contents, the sharing contents are shielded.
If the testing result of server, which is sharing contents, belongs to target sharing contents, sharing contents are shielded.
The mode of sharing contents is shielded, including but not limited to:
Forbid sharing the sharing contents;
Or, only to propagate source user visible for the sharing contents;
Or, deleting the sharing contents.
In conclusion sharing contents screen method provided in this embodiment, passes through the multiple target sharing contents shielded Propagation chain, analysis generated or spread the propagation source users of target sharing contents, propagation source user is subsequently shared Other target sharing contents are shielded;Solve the prior art can only target sharing contents be transmitted certain number or After time, the problem of could being shielded to the target sharing contents;Reach and has shared for propagating the target that source user is shared Content, can be shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Sharing contents screen method provided in this embodiment, also by counting propagation of each user in target sharing contents Occurrence number on chain, analysis obtain propagating source user, can find out the original user for propagating source user, and can search Go out to spread the more serious user of target sharing contents, target point can be carried out on the crucial node of each comparison of propagation chain The shielding for enjoying content has reached with less manpower or computing resource, to realize shield effectiveness as well as possible.
As a kind of possible realization method, the step 304 in Fig. 3 can be implemented as step 304a to step by replacement 304c, as shown in Figure 4.
Step 304a counts the propagating influence of each user;
The relation chain that is possessed by each user is simultaneously differed, each user possessed propagation in the application of social class Influence power is also different.
For example, a user is star, there are more than one hundred million followers in microblog, then the user shares microblogging Propagating influence is bigger.
For another example, a user only has 5 good friends, even if the user shares a target sharing contents, whole 5 good friends It is all forwarded, range of scatter is still limited, so the propagating influence of the user is relatively low.
Optionally, server counts the propagating influence of each user, attribute information according to the attribute information of each user Including:At least one information in user gradation, user type, good friend's quantity and concern number.
The definition of user gradation and user type in different social class applications can be different.For example, in microblog In, user type can be divided into through " big V " user of real-name authentication and ordinary user;For another example, in wechat platform, user Type can be divided into public platform and common account number.
Each attribute information can correspond to respective weight and quantized value, server according to the weight of each attribute information and Quantized value calculates propagating influence.
Schematically, the user gradation of a user is 10 grades, and user type is " big V " user, and good friend's quantity is 200 People, concern number are 50000 people, then the propagating influence that server calculates the user is:
10* weight 1+1* weight 2+200* weight 3+50000* weights 4.
Wherein, 1 be " big V " user quantized value, weight 1 is the corresponding weight of user gradation, and weight 2 is user type pair The weight answered, weight 3 are the corresponding weights of good friend's quantity, and weight 4 is the corresponding weight of concern number.
Step 304b calculates the harm that each user shares target sharing contents according to occurrence number and propagating influence Index;
Server can also directly calculate the product of occurrence number and propagating influence, share target point as each user Enjoy the hazard index of content.
Optionally, occurrence number is also corresponding with weight a, and propagating influence is also corresponding with weight b, and server calculates each use The hazard index that target sharing contents are shared at family is:
Occurrence number * weight a+ propagating influence * weights b.
Step 304c, the user for by hazard index being more than second threshold are determined as propagation source user.
In conclusion sharing contents screen method provided in this embodiment, also by combining occurrence number and propagation effect Power analyzes propagation source user, can more accurately analyze propagation source user.Whether original user, or diffusion target point The more serious user of content is enjoyed, can be identified by server rapidly under the amplification of respective weights, to improve The accuracy of follow-up shielding process.
As alternatively possible realization method, since mistake may occur for the testing result in step 306.In Fig. 3 Step 306 after further include step 308 to step 311, as shown in Figure 5.
Step 308, if sharing contents are not belonging to target sharing contents, allow sharing for sharing contents;
If the testing result of server within step 306 is to be not belonging to target sharing contents, server allows this point Enjoy sharing for content.
Step 309, record the sharing contents shares number;
For server after allowing to share the sharing contents, also record the sharing contents shares number.
Step 310, detection shares whether number reaches third threshold value;
Step 311, if it is more than third threshold value to share number, detect whether sharing contents belong in target shares again Hold.
That is, if the number of sharing of the sharing contents is more than third threshold value, it is that comparison is popular to represent the sharing contents , alternatively, potential become more popular sharing contents, server detects whether sharing contents belong to target point again at this time Enjoy content.
If it is, entering step 307;If it is not, then entering step 308, but step 309 is no longer executed later.
Optionally, in detection process again, detection mode is different from the detection mode of last time detection process.For example, step It is detected using preset algorithm in rapid 306, the artificial detection of maintenance personnel is used in step 311.
Optionally, in detection process again, server still uses whether preset algorithm detection sharing contents belong to mesh Mark sharing contents.But since preset algorithm is the learning-oriented calculation continued to optimize according to the target sharing contents shielded Method, if there is new corpus is added in detection process twice, then detection process still is possible to eliminate last time detection again The detection mistake of process.
In conclusion sharing contents screen method provided in this embodiment, by replacing detection method or using study The preset algorithm of type is checked again so that and target sharing contents are before a wide range of propagate, by detection process twice, Reduce the diffusion possibility of target sharing contents.And in the prior art, due to being judged for every sharing contents, such as Fruit carries out detection process twice, can consume a large amount of computing resource.The sharing contents that the present embodiment is only shared to propagating source user In, there are the sharing contents of suspicion to carry out detection process twice, under the premise of using less computing resource, realizes more smart The shielding of accurate target sharing contents.
The content not being described in detail in device embodiment is also asked for the device embodiment of the embodiment of the present invention below With reference to above-mentioned one-to-one embodiment of the method.
Referring to FIG. 6, it illustrates the block diagrams of sharing contents screening arrangement provided by one embodiment of the present invention. The sharing contents screening arrangement being implemented in combination in the server as communication platform by software, hardware or both All or part of, which includes:
Content obtaining module 620, for obtaining at least one target sharing contents shielded
Source user determining module 640, for the propagation chain according at least one target sharing contents, analysis is passed Broadcast source user;The propagation chain is that the target sharing contents are passed through when being propagated based on relation chain in the application of social class Each user be formed by user's chain.
Shroud module 660, for shielding propagation of the propagation source user to other target sharing contents.
In conclusion sharing contents screening arrangement provided in this embodiment, passes through the multiple target sharing contents shielded Propagation chain, analysis generated or spread the propagation source users of target sharing contents, propagation source user is subsequently shared Other target sharing contents are shielded;Solve the prior art can only target sharing contents be transmitted certain number or After time, the problem of could being shielded to the target sharing contents;Reach and has shared for propagating the target that source user is shared Content, can be shielded before sharing, the effect for avoiding target sharing contents to be propagated in relation chain as possible.
Referring to FIG. 7, it illustrates the block diagrams of sharing contents screening arrangement provided by one embodiment of the present invention. The sharing contents screening arrangement being implemented in combination in the server as communication platform by software, hardware or both All or part of, which includes:
Content obtaining module 620, for obtaining at least one target sharing contents shielded.
Source user determining module 640, for the propagation chain according at least one target sharing contents, analysis is passed Broadcast source user;The propagation chain is that the target sharing contents are passed through when being propagated based on relation chain in the application of social class Each user be formed by user's chain.
Shroud module 660, for shielding propagation of the propagation source user to other target sharing contents.
Optionally, the source user determining module 640, including:
Propagation chain acquiring unit 642, the propagation chain for obtaining each target sharing contents, obtains at least one biography Broadcast chain.
Number statistic unit 644, for counting occurrence number of each user in the propagation chain.
First determination unit 646, the user for by the occurrence number being more than first threshold are determined as the propagating source User;Or, the occurrence number is sorted is determined as the propagation source user in preceding n of user, n is positive integer.
Optionally, the source user determining module 640, including:
Propagation chain acquiring unit 642, the propagation chain for obtaining each target sharing contents, obtains at least one biography Broadcast chain.
Number statistic unit 644, for counting occurrence number of each user in the propagation chain.
Influence power statistic unit 645, the propagating influence for counting each user.
Exponent calculation unit 647, for according to the occurrence number and the propagating influence, calculating each user and sharing The hazard index of the target sharing contents.
Second determination unit 649, the user for by the hazard index being more than second threshold are determined as the propagating source User.
Optionally, the exponent calculation unit 647, the biography for counting each user according to the attribute information of each user Influence power is broadcast, the attribute information includes:At least one letter in user gradation, user type, good friend's quantity and concern number Breath.
Optionally, the shroud module 660, including:
Request reception unit 662, the request of sharing for receiving the propagation source user transmission are described to share request carrying Need the sharing contents shared.
Content detection unit 664, for detecting whether the sharing contents belong to the target sharing contents.
Content screen unit 666 belongs to if the testing result for the content detection unit is the sharing contents The target sharing contents, then shield the sharing contents.
Optionally, the shroud module 660 further includes:
Allow shares unit 663, if for the content detection unit 666 testing result be the sharing contents not Belong to the target sharing contents, then allows sharing for the sharing contents.
Number computing unit 665 shares number for record the sharing contents.
Threshold detection unit 667 described shares whether number reaches third threshold value for detecting.
Detection unit 669 again, if the testing result for the threshold detection unit 667 is to share number more than third Threshold value then executes the step of whether the detection sharing contents belong to the target sharing contents again.
Sharing contents screening arrangement provided in this embodiment, also by counting propagation of each user in target sharing contents Occurrence number on chain, analysis obtain propagating source user, can find out the original user for propagating source user, and can search Go out to spread the more serious user of target sharing contents, target point can be carried out on the crucial node of each comparison of propagation chain The shielding for enjoying content has reached with less manpower or computing resource, to realize shield effectiveness as well as possible.
Sharing contents screening arrangement provided in this embodiment, also by being passed in conjunction with occurrence number and propagating influence to analyze Source user is broadcast, propagation source user can be more accurately analyzed.Whether original user, or diffusion target sharing contents compare Serious user can be identified by server rapidly under the amplification of respective weights, subsequently be shielded to improve The accuracy of journey.
Sharing contents screening arrangement provided in this embodiment, by replacing detection method or using learning-oriented pre- imputation Method is checked again so that target sharing contents, by detection process twice, reduce target before a wide range of propagate The diffusion possibility of sharing contents.And in the prior art, due to being judged for every sharing contents, if carried out twice Detection process can consume a large amount of computing resource.The present embodiment is only to propagating in the sharing contents that source user is shared, and there are suspicion Sharing contents carry out detection process twice, under the premise of using less computing resource, realize more accurately target point Enjoy the shielding of content.
It should be noted that:The sharing contents screening arrangement that above-described embodiment provides is when shielding target sharing contents, only The example of the division of the above functional modules, in practical application, can as needed and by above-mentioned function distribution by Different function modules is completed, i.e., the internal structure of equipment is divided into different function modules, described above complete to complete Portion or partial function.In addition, sharing contents screening arrangement and sharing contents screen method embodiment that above-described embodiment provides Belong to same design, specific implementation process refers to embodiment of the method, and which is not described herein again.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent replacement, improvement and so on should all be included in the protection scope of the present invention.

Claims (9)

1. a kind of sharing contents screen method, which is characterized in that the method includes:
At least one target sharing contents shielded are obtained, the target sharing contents are forbidden in social activity according to shielding rules The sharing contents propagated in class application;
According to the propagation chain of at least one target sharing contents, analysis obtains propagating source user;The propagation chain is described Each user that target sharing contents are passed through when being propagated based on relation chain in the application of social class is formed by user's chain;
The request of sharing of the propagation source user transmission is received, it is described to share the sharing contents for asking carrying to need to be shared;
Detect whether the sharing contents belong to the target sharing contents;
If the sharing contents belong to the target sharing contents, the sharing contents are shielded;
If the sharing contents are not belonging to the target sharing contents, allow sharing for the sharing contents;
Record the sharing contents shares number;
Share whether number reaches third threshold value described in detection;
If the number of sharing is more than third threshold value, execute whether the detection sharing contents belong to the target again The step of sharing contents.
2. according to the method described in claim 1, it is characterized in that, according to the propagation of at least one target sharing contents Chain, analysis obtain propagating source user, including:
The propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Count occurrence number of each user in the propagation chain;
The user for by the occurrence number being more than first threshold is determined as the propagation source user;Or, the occurrence number is arranged Sequence is determined as the propagation source user in preceding n of user, and n is positive integer.
3. according to the method described in claim 1, it is characterized in that, according to the propagation of at least one target sharing contents Chain, analysis obtain propagating source user, including:
The propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Count occurrence number of each user in the propagation chain;
Count the propagating influence of each user;
According to the occurrence number and the propagating influence, calculates each user and share the harm of the target sharing contents and refer to Number;
The user for by the hazard index being more than second threshold is determined as the propagation source user.
4. according to the method described in claim 3, it is characterized in that, count the propagating influence of each user, including:
The propagating influence of each user is counted according to the attribute information of each user, the attribute information includes:User gradation, At least one information in user type, good friend's quantity and concern number.
5. a kind of sharing contents screening arrangement, which is characterized in that described device includes:
Content obtaining module, for obtaining at least one target sharing contents shielded;
Source user determining module, for the propagation chain according at least one target sharing contents, analysis obtains propagating source use Family;The propagation chain is the target sharing contents passed through when being propagated based on relation chain in the application of social class it is each User is formed by user's chain;
Request reception unit shares request for receive that the propagation source user sends, described to share request carrying and need point The sharing contents enjoyed;
Content detection unit, for detecting whether the sharing contents belong to the target sharing contents;
Content screen unit, if the testing result for the content detection unit, which is the sharing contents, belongs to the target Sharing contents then shield the sharing contents;
Allow shares unit, if the testing result for the content detection unit, which is the sharing contents, is not belonging to the mesh Sharing contents are marked, then allow sharing for the sharing contents;
Number computing unit shares number for record the sharing contents;
Threshold detection unit described shares whether number reaches third threshold value for detecting;
Detection unit again, if the testing result for the threshold detection unit is to share number more than third threshold value, then It is secondary that the step of whether the detection sharing contents belong to the target sharing contents executed.
6. device according to claim 5, which is characterized in that the source user determining module, including:
Propagation chain acquiring unit, the propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Number statistic unit, for counting occurrence number of each user in the propagation chain;
First determination unit, the user for by the occurrence number being more than first threshold are determined as the propagation source user;Or, The occurrence number is sorted and is determined as the propagation source user in preceding n of user, n is positive integer.
7. device according to claim 5, which is characterized in that the source user determining module, including:
Propagation chain acquiring unit, the propagation chain for obtaining each target sharing contents, obtains at least one propagation chain;
Number statistic unit, for counting occurrence number of each user in the propagation chain;
Influence power statistic unit, the propagating influence for counting each user;
Exponent calculation unit, for according to the occurrence number and the propagating influence, calculating each user and sharing the mesh Mark the hazard index of sharing contents;
Second determination unit, the user for by the hazard index being more than second threshold are determined as the propagation source user.
8. device according to claim 7, which is characterized in that the exponent calculation unit, for according to each user's Attribute information counts the propagating influence of each user, and the attribute information includes:User gradation, user type, good friend's quantity With at least one information in concern number.
9. a kind of computer readable storage medium, which is characterized in that it has program stored therein in the computer readable storage medium, institute Program is stated to be loaded by processor and executed to realize such as Claims 1-4 any one of them sharing contents screen method.
CN201510184660.4A 2015-04-17 2015-04-17 Sharing contents screen method and device Active CN104954360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510184660.4A CN104954360B (en) 2015-04-17 2015-04-17 Sharing contents screen method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510184660.4A CN104954360B (en) 2015-04-17 2015-04-17 Sharing contents screen method and device

Publications (2)

Publication Number Publication Date
CN104954360A CN104954360A (en) 2015-09-30
CN104954360B true CN104954360B (en) 2018-09-04

Family

ID=54168714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510184660.4A Active CN104954360B (en) 2015-04-17 2015-04-17 Sharing contents screen method and device

Country Status (1)

Country Link
CN (1) CN104954360B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682008A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Friend circle information classification method and device
CN105681563B (en) * 2016-01-26 2019-04-09 深圳市美贝壳科技有限公司 The implementation method of intelligent hardware devices picture sharing permission
CN106127535A (en) * 2016-08-24 2016-11-16 四川众缆科技有限公司 Advertisement push system based on mobile terminal and method
CN107818514B (en) * 2016-09-12 2022-01-14 腾讯科技(深圳)有限公司 Method, device and terminal for controlling information propagation of online social network
CN106921565B (en) * 2017-03-30 2019-12-13 北京奇艺世纪科技有限公司 Junk information identification method and device
CN108900408A (en) * 2018-05-24 2018-11-27 四川斐讯信息技术有限公司 The method and system of friend information in a kind of shielding social platform
CN111447137A (en) * 2020-02-29 2020-07-24 中国平安人寿保险股份有限公司 Browsing condition data analysis method and device, server and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136255A (en) * 2011-11-30 2013-06-05 腾讯科技(深圳)有限公司 Method and device for information management
CN104182457A (en) * 2014-07-14 2014-12-03 上海交通大学 Poisson-process-model-based method for predicting event popularity in social network

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273673A1 (en) * 2004-05-19 2005-12-08 Paul Gassoway Systems and methods for minimizing security logs
CN102262681B (en) * 2011-08-19 2015-12-02 南京大学 A kind of blog information identifies the method for crucial blog collection in propagating
CN103906066B (en) * 2012-12-27 2016-03-23 腾讯科技(北京)有限公司 The harassing and wrecking screen method that a kind of user-generated content is mentioned and device
CN103927398B (en) * 2014-05-07 2016-12-28 中国人民解放军信息工程大学 The microblogging excavated based on maximum frequent itemsets propagandizes colony's discovery method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136255A (en) * 2011-11-30 2013-06-05 腾讯科技(深圳)有限公司 Method and device for information management
CN104182457A (en) * 2014-07-14 2014-12-03 上海交通大学 Poisson-process-model-based method for predicting event popularity in social network

Also Published As

Publication number Publication date
CN104954360A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN104954360B (en) Sharing contents screen method and device
Alothali et al. Detecting social bots on twitter: a literature review
Hine et al. Kek, cucks, and god emperor trump: A measurement study of 4chan’s politically incorrect forum and its effects on the web
Aghasian et al. Scoring users’ privacy disclosure across multiple online social networks
Alrubaian et al. Reputation‐based credibility analysis of Twitter social network users
US10412185B2 (en) Event information system classifying messages using machine learning classification model and pushing selected messages to user
Messias et al. You followed my bot! Transforming robots into influential users in Twitter.
Miller et al. Twitter spammer detection using data stream clustering
US9262537B2 (en) Systems and methods for dynamically determining influencers in a social data network using weighted analysis
Singh et al. Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time
US9146943B1 (en) Determining user content classifications within an online community
Kauk et al. Understanding and countering the spread of conspiracy theories in social networks: Evidence from epidemiological models of Twitter data
Ng et al. Cross-platform information spread during the January 6th capitol riots
KR101869815B1 (en) Method and apparatus for spotting fake news using collective intelligence
CN108829769B (en) Suspicious group discovery method and device
Maleki et al. Using an epidemiological model to study the spread of misinformation during the black lives matter movement
Webberley et al. Retweeting beyond expectation: Inferring interestingness in Twitter
Derczynski et al. Misinformation on Twitter during the Danish national election: A case study
Folke et al. An evaluation of digital partner notification tool engagement and impact for patients diagnosed with gonorrhea and syphilis
Babcock et al. Pretending positive, pushing false: Comparing captain marvel misinformation campaigns
Bohl et al. Improved measures of racial mixing among men who have sex with men using Newman's assortativity coefficient
US8874651B2 (en) Federating open social networks for analyses
Perez et al. A dynamic approach to detecting suspicious profiles on social platforms
Jendoubi et al. Classification of message spreading in a heterogeneous social network
Van Meeteren et al. Mapping communities in large virtual social networks: Using Twitter data to find the Indie Mac community

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant