CN107766329B - Blacklist configuration method and device - Google Patents

Blacklist configuration method and device Download PDF

Info

Publication number
CN107766329B
CN107766329B CN201711005801.7A CN201711005801A CN107766329B CN 107766329 B CN107766329 B CN 107766329B CN 201711005801 A CN201711005801 A CN 201711005801A CN 107766329 B CN107766329 B CN 107766329B
Authority
CN
China
Prior art keywords
comment
comment message
message
server
illegal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711005801.7A
Other languages
Chinese (zh)
Other versions
CN107766329A (en
Inventor
钟雨莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711005801.7A priority Critical patent/CN107766329B/en
Publication of CN107766329A publication Critical patent/CN107766329A/en
Application granted granted Critical
Publication of CN107766329B publication Critical patent/CN107766329B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/284Lexical analysis, e.g. tokenisation or collocates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • G06F40/289Phrasal analysis, e.g. finite state techniques or chunking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application discloses a blacklist configuration method and a device, comprising the following steps: detecting at least one comment message for the application resource that has been posted during a second period of time at a first period of time, the second period of time being earlier than the first period of time, and the server being offline during the second period of time; when a target comment message meeting a first preset condition in the at least one comment message is detected, identifying the target comment message as an illegal comment message; and adding the international mobile equipment identification IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist. The embodiment of the application is beneficial to reducing the system resource occupation of the server and improving the accuracy and the efficiency of the blacklist configuration.

Description

Blacklist configuration method and device
Technical Field
The application relates to the technical field of mobile terminals, in particular to a blacklist configuration method and device.
Background
With the rapid development of smart phones, mobile phones become necessities in the hands of people, more and more applications are installed in user mobile phones, such as reading applications, payment applications, game applications, music applications and the like, and people's clothes and food residents are inseparable from the mobile phones.
At present, when people install applications, people need to obtain the applications through an application store in a smart phone, and people can selectively install the needed applications according to comment contents of the applications in the application store, so that comment messages in the application store have a large influence on the installation rate of each application.
Disclosure of Invention
The embodiment of the application provides a blacklist configuration method and device, which can reduce system resource occupation of a server and improve accuracy and efficiency of blacklist configuration.
In a first aspect, an embodiment of the present application provides a blacklist configuration method, which is applied to a server, where the server is configured to push an application resource to a mobile terminal, and the method includes:
detecting at least one comment message for the application resource that has been posted during a second period of time at a first period of time, the second period of time being earlier than the first period of time, and the server being offline during the second period of time;
when a target comment message meeting a first preset condition in the at least one comment message is detected, identifying the target comment message as an illegal comment message;
and adding the international mobile equipment identification IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist.
In a second aspect, an embodiment of the present application provides a blacklist configuration method, which is applied to a mobile terminal, where the mobile terminal is configured to receive an application resource of a server, and the method includes:
obtaining comment information aiming at the application resource;
sending the comment message to the server, wherein the comment message is used for detecting at least one comment message issued by the server in a second time period in a first time period, the second time period is earlier than the first time period, the server is in an offline state in the second time period, when a target comment message meeting a first preset condition in the comment message is detected, the target comment message is identified as an illegal comment message, and an International Mobile Equipment Identifier (IMEI) and an account ID of a mobile terminal sending the target comment message are added into a blacklist;
and updating the comment content in the comment page of the application resource according to the received comment set from the server.
In a third aspect, an embodiment of the present application provides a server, including a detection unit, an identification unit, and a configuration unit, where,
the detection unit is used for detecting at least one comment message which is issued for the application resource in a second period of time in a first period of time, wherein the second period of time is earlier than the first period of time, and the server is in an offline state in the second period of time;
the identification unit is used for identifying the target comment message as an illegal comment message when the detection unit detects that the target comment message meets a first preset condition in the at least one comment message;
the configuration unit is used for adding the international mobile equipment identification IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist.
In a fourth aspect, an embodiment of the present application provides a mobile terminal, including an obtaining unit, a sending unit, and an updating unit, wherein,
the obtaining unit is used for obtaining comment messages aiming at the application resources;
the sending unit is configured to send the comment message acquired by the acquiring unit to the server, where the comment message is used for the server to detect at least one comment message that has been issued in a second time period in a first time period, where the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and when a target comment message that meets a first preset condition in the at least one comment message is detected, identify the target comment message as an illegal comment message, and add an international mobile equipment identifier IMEI and an account ID of a mobile terminal that sent the target comment message to a blacklist;
the updating unit is used for updating the comment content in the comment page of the application resource according to the received comment set from the server.
In a fifth aspect, the present embodiment provides a blacklist configuration system, including the server according to the third aspect of the embodiment of the present application and the mobile terminal according to the fourth aspect.
In a sixth aspect, an embodiment of the present application provides a server, including a processor, a memory, and a program, where the program is stored in the memory, and the processor calls the program to execute the instructions of the steps in any of the methods of the first aspect of the embodiment of the present application.
In a seventh aspect, an embodiment of the present application provides a mobile terminal, including a processor, a memory, and a program, where the program is stored in the memory, and the processor calls the program to execute instructions of the steps in any method in the second aspect of the embodiment of the present application.
In an eighth aspect, this application provides a computer-readable storage medium, where the computer-readable storage medium stores a program, where the program makes a computer perform part or all of the steps described in any one of the methods of the first aspect or the second aspect of this application.
In a ninth aspect, embodiments of the present application provide a computer program product, wherein the computer program product comprises a non-transitory computer-readable storage medium storing a computer program, the computer program being operable to cause a computer to perform some or all of the steps as described in any of the methods of the first or second aspects of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the present application, a server first detects at least one comment message issued for an application resource in a second time period, where the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and then, when a target comment message meeting a first preset condition is detected in the at least one comment message, identifies the target comment message as an illegal comment message, and finally, adds an international mobile equipment identifier IMEI and an account ID of a mobile terminal that sends the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic system architecture diagram of a blacklist configuration system according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a blacklist configuration method according to an embodiment of the present application;
FIG. 3 is a flowchart illustrating another blacklist configuration method disclosed in an embodiment of the present application;
FIG. 4 is a flowchart illustrating another blacklist configuration method disclosed in an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a server disclosed in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a mobile terminal disclosed in an embodiment of the present application;
FIG. 7 is a block diagram of functional units of a server according to an embodiment of the present disclosure;
fig. 8 is a block diagram illustrating functional units of a mobile terminal according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of a smart phone disclosed in an embodiment of the present application;
fig. 10 is a system architecture diagram of a blacklist configuration system according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The Mobile terminal according to the embodiment of the present application may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like. For convenience of description, the above-mentioned devices are collectively referred to as a mobile terminal. The following describes embodiments of the present application in detail.
As shown in fig. 1, fig. 1 is a schematic system architecture diagram of a blacklist configuration system according to an embodiment of the present application. The system comprises a server and a mobile terminal, wherein the server can establish communication connection with the mobile terminal through a communication network (such as various wireless mobile communication networks), the server runs application resource search master software and is used for providing application resource search and push services, the mobile terminal runs application resource search slave software and is used for providing a user interaction interface for a user to search application resources and outputting search results for the user to look up and the like, and the specific names and the expression forms of the application resource search master software and the application resource search slave software are not uniquely limited.
Embodiments of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 2, fig. 2 is a schematic flowchart of a blacklist configuration method provided in an embodiment of the present application, and is applied to a server, where the server is configured to push application resources to a mobile terminal, and the blacklist configuration method includes:
s201, the server detects at least one comment message which is issued in a second time period and aims at the application resource in a first time period;
wherein the second period is earlier than the first period, and the server is in an offline state during the second period.
The first period detecting the second period may detect, for example, all comment messages posted on the previous day for a certain period of the current date, or may detect all comment messages posted in the morning period for the afternoon period of each day, which is not limited herein.
The offline state may be a dormant state of the server, or may be a state when the server does not process new data, which is not limited herein.
The application resource includes an application installation package or an application update package, and the type of the application resource includes a game type, an instant messaging type, a video type, and the like, which is not limited herein.
The comment information refers to comment content of a comment interface of the application resource, the comment information comprises a plurality of characters, and the types of the characters comprise at least one of the following types: numbers, letters, punctuation, emoticons, and words.
S202, when detecting a target comment message meeting a first preset condition in the at least one comment message, the server identifies the target comment message as an illegal comment message;
the first preset condition may be various, for example, the first preset condition may be a preset vocabulary, and for example, the first preset condition may be that a plurality of comment messages are issued continuously by the same account within a preset time period, which is not limited herein.
Wherein the first preset condition is preset in the server by a technician.
After the server identifies the comment message as an illegal comment message, the illegal comment message is deleted from the comment page of the corresponding application resource.
S203, the server adds the international mobile equipment identification IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist.
The specific implementation manner of adding, by the server, the International Mobile Equipment Identity IMEI and the account ID of the Mobile terminal that sends the target comment message to the blacklist may be to acquire the Mobile terminal (International Mobile Equipment Identity, IMEI) and the account ID associated with the target comment message, and add the IMEI and the ID to the blacklist.
The IMEI and the ID may be obtained in various manners, for example, the IMEI and the ID associated with the comment message carried in the comment message may be stored in the server when the server receives the comment message sent by the mobile terminal, or the IMEI of the mobile terminal that logs in the ID may be pre-recorded by the server when the mobile terminal logs in the ID, and when any comment message is received, the associated ID is first obtained, and then the IMEI corresponding to the ID is searched, which is not limited uniquely herein.
It can be seen that, in the embodiment of the present application, a server first detects at least one comment message issued for an application resource in a second time period, where the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and then, when a target comment message meeting a first preset condition is detected in the at least one comment message, identifies the target comment message as an illegal comment message, and finally, adds an international mobile equipment identifier IMEI and an account ID of a mobile terminal that sends the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
In one possible example, the identifying, by the server, when a target comment message satisfying a first preset condition is detected from the at least one comment message, the target comment message as an illegal comment message includes:
acquiring a first comment message set associated with each IMEI or each ID in the at least one comment message, wherein the number of characters of each comment message in the first comment message set is greater than a first preset number of characters, and the difference between the receiving time of any two comment messages is less than a first preset time length;
and identifying comment messages of which the number is larger than a first preset number in the first comment message set as illegal comment messages, wherein the similarity of any two comment messages in the illegal comment messages is larger than a preset similarity.
The number of the comment messages in the first comment message set is greater than or equal to two, the first preset number of characters may be 10, or 15, the first preset duration may be 1 minute, 1 hour, 1 day, 1 month, and the like, the similarity may be 70%, 80%, and the like, and the first preset number may be 2, 3, 10, 30, and the like, for example.
For example, the illegal comment message is more than two comment messages with more than 10 words issued by the same IMEI or the same ID within one minute and with similarity greater than 70%; or more than 3 comment messages with the same IMEI or ID issued with more than 10 words and similarity greater than 70% in one hour; or more than 10 comment messages with similarity larger than 70% and the number of words issued by the same IMEI or the same ID is more than 10 words in one day; or more than 30 comment messages with the same IMEI or ID issued with more than 10 words and the similarity of more than 70% in a month can be used, and the comment messages meeting any one of the four conditions can be illegal comment messages.
As can be seen, in this example, the server determines whether the comment message issued in the second time period is an illegal comment message according to a first preset condition and multiple preset criteria, which is beneficial to improving the comprehensiveness of the blacklist setting.
In one possible example, the method further comprises:
when a comment message sent by the mobile terminal is received, matching the comment message with a reference comment message in an illegal word bank;
and when the comment message is successfully matched with the reference comment message, rejecting to publish the comment message.
The illegal word bank comprises a plurality of illegal words or illegal sentences, the illegal words comprise phrases preset by technical personnel, the illegal phrases determined by the server according to the issued comment messages, and words with identification, including keywords such as illegal, political, yellow-involved, gambling and gun-involved words or junk words with strong identification, such as 'guns' words.
And the comment message is matched with the reference comment message successfully, and the comment message comprises the reference comment message.
After the comment message is refused to be published, the comment message is not updated to the comment message set of the corresponding application resource any more, and the comment message cannot be displayed on the comment page of the corresponding application resource.
As can be seen, in this example, when the server receives the comment message sent by the mobile terminal, the server online detects whether the reference comment message in the illegal thesaurus of the comment message is matched, and rejects the publication of the comment message, which is beneficial to improving the timeliness of processing the illegal comment message and improving the comprehensiveness of eliminating the illegal comment message.
In one possible example, after detecting, at a first time period, at least one comment message for the application resource that has been posted at a second time period, the method further comprises:
when the reference comment message meeting a second preset condition in the at least one comment message is detected, adding the reference comment message to an illegal word bank of the server, wherein the reference comment message is used for the server to judge whether to refuse to publish any received comment message.
Wherein the second preset condition is preset in the server by a technician, and is not limited herein.
As can be seen, in this example, the server determines the reference comment message according to the second preset condition to supplement the illegal thesaurus, which is beneficial to improving the richness and comprehensiveness of the illegal thesaurus, and further can improve the accuracy of black list configuration.
In this possible example, the method further comprises: when detecting a reference comment message meeting a second preset condition in the at least one comment message, adding the reference comment message to an illegal thesaurus of the server, including:
acquiring a second comment message set with the same comment content in the at least one comment message, wherein the number of characters of each comment message in the second comment message set is greater than a second preset number of characters, the difference value of the receiving time of any two comment messages is less than a second preset duration, and the number of comment messages in the second comment message set is greater than the second preset number;
and adding any one comment message in the second comment message set to an illegal word bank of the server.
The second preset number of characters may be 10, or 15, etc., the second preset duration may be 1 minute, 1 hour, 1 day, etc., and the second preset number may be 2, 3, 10, 30, etc., for example.
Wherein, the comment content is the same for each character of the comment message.
Any comment message in the second comment message set is added to the illegal word bank of the server, all characters of the any comment message are added to the illegal word bank and serve as an integral word segment for the server to judge whether to reject to publish the received any comment message.
For example, the second comment message set is a comment message set composed of more than 2 identical comment messages with a word number of more than 10 words in one minute; or, a comment message set consisting of more than 3 identical comment messages with more than 10 words in one hour; or may be a comment message set composed of 10 or more identical comment messages in which the number of words is 10 or more words in a day.
As can be seen, in this example, the server determines, according to the second preset condition, the reference comment message that meets the illegal thesaurus standard through the multiple preset standards, and adds the reference comment message to the illegal thesaurus, which is beneficial to improving the accuracy of determining the illegal comment message.
Referring to fig. 3, fig. 3 is a schematic flowchart of a blacklist configuration method provided in an embodiment of the present application, and the method is applied to a mobile terminal, where the mobile terminal is configured to receive an application resource of a server. As shown in the figure, the blacklist configuration method includes:
s301, the mobile terminal acquires comment information aiming at application resources;
wherein the comment information includes a plurality of characters, and the type of the character includes at least one of: numbers, letters, punctuation, emoticons, and words.
In specific implementation, the mobile terminal obtains comment content entered by the user for the target application resource.
S302, the mobile terminal sends the comment message to a server, the comment message is used for the server to detect at least one comment message which is issued in a second time interval in a first time interval, the second time interval is earlier than the first time interval, the server is in an offline state in the second time interval, when a target comment message meeting a first preset condition in the comment message is detected, the target comment message is identified as an illegal comment message, and an international mobile equipment identifier and an account ID of the mobile terminal sending the target comment message are added into a blacklist IMEI;
s303, the mobile terminal updates comment content in the comment page of the application resource according to the received comment set from the server.
It can be seen that, in the embodiment of the present application, a mobile terminal first obtains comment information for an application resource, then sends the comment information to a server, and finally updates comment content of a comment page of the application resource according to the comment information, where the comment information is used for the server to detect at least one comment message that has been issued in a second time period in a first time period, the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and when a target comment message that meets a first preset condition in the at least one comment message is detected, identifies the target comment message as an illegal comment message, and adds an international mobile equipment identifier IMEI and an account ID of the mobile terminal that sent the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
Referring to fig. 4, please refer to fig. 4 in accordance with the embodiment shown in fig. 2, where fig. 4 is a schematic flowchart of a blacklist configuration method provided in the embodiment of the present application, and is applied to a mobile terminal and a server. As shown in the figure, the blacklist configuration method includes:
s401, the mobile terminal acquires comment information aiming at application resources;
s402, the mobile terminal sends the comment message to the server;
s403, the server receives the comment message aiming at the application resource;
s404, the mobile terminal updates comment contents in the comment page of the application resource according to the received comment set from the server;
s405, the server detects at least one comment message issued for the application resource in a second time period in a first time period, wherein the second time period is earlier than the first time period, and the server is in an offline state in the second time period;
s406, when detecting a target comment message meeting a first preset condition in the at least one comment message, the server identifies the target comment message as an illegal comment message;
s407, the server adds the international mobile equipment identity IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist.
In the embodiment of the application, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced.
Consistent with the embodiments shown in fig. 2, fig. 3, and fig. 4, please refer to fig. 5, and fig. 5 is a schematic structural diagram of a server provided in the embodiments of the present application, where the server runs one or more application programs and an operating system, and as shown, the server includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are different from the one or more application programs, and the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the following steps;
detecting at least one comment message for the application resource that has been posted during a second period of time at a first period of time, the second period of time being earlier than the first period of time, and the server being offline during the second period of time;
when a target comment message meeting a first preset condition in the at least one comment message is detected, identifying the target comment message as an illegal comment message;
and adding the international mobile equipment identification IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist.
It can be seen that, in the embodiment of the present application, a server first detects at least one comment message issued for an application resource in a second time period, where the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and then, when a target comment message meeting a first preset condition is detected in the at least one comment message, identifies the target comment message as an illegal comment message, and finally, adds an international mobile equipment identifier IMEI and an account ID of a mobile terminal that sends the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
In one possible example, in the aspect that when a target comment message satisfying a first preset condition is detected from the at least one comment message, the target comment message is identified as an illegal comment message, the instructions in the program are specifically configured to perform the following operations: acquiring a first comment message set associated with each IMEI or each ID in the at least one comment message, wherein the number of characters of each comment message in the first comment message set is greater than a first preset number of characters, and the difference between the receiving time of any two comment messages is less than a first preset time length; and the comment information identification module is used for identifying comment information, of which the number is larger than a first preset number, in the first comment information set as the illegal comment information, and the similarity of any two comment information in the illegal comment information is larger than a preset similarity.
In one possible example, the program further comprises instructions for performing the steps of: when a comment message sent by the mobile terminal is received, matching the comment message with a reference comment message in an illegal word bank; and the comment information is used for refusing to publish the comment information when the comment information is successfully matched with the reference comment information.
In one possible example, the program further comprises instructions for performing the steps of: after detecting at least one comment message issued in a second time period in the first time period and aiming at the application resource, when detecting the reference comment message meeting a second preset condition in the at least one comment message, adding the reference comment message to an illegal thesaurus of the server, wherein the reference comment message is used for the server to judge whether to refuse to issue any received comment message.
In this possible example, in the aspect that when a reference comment message satisfying a second preset condition is detected from among the at least one comment message, the reference comment message is added to the illegal thesaurus of the server, the instructions in the program are specifically configured to perform the following operations: acquiring a second comment message set with the same comment content in the at least one comment message, wherein the number of characters of each comment message in the second comment message set is greater than a second preset number of characters, the difference value of the receiving time of any two comment messages is less than a second preset duration, and the number of comment messages in the second comment message set is greater than the second preset number; and an illegal thesaurus for adding any one comment message in the second comment message set to the server.
Consistent with the embodiments shown in fig. 2, fig. 3, and fig. 4, please refer to fig. 6, and fig. 6 is a schematic structural diagram of a mobile terminal provided in an embodiment of the present application, where the mobile terminal runs one or more application programs and an operating system, and as shown, the mobile terminal includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are different from the one or more application programs, and the one or more programs are stored in the memory and configured to be executed by the processor, and the programs include instructions for performing the following steps;
obtaining comment information aiming at the application resource;
sending the comment message to the server, wherein the comment message is used for detecting at least one comment message issued by the server in a second time period in a first time period, the second time period is earlier than the first time period, the server is in an offline state in the second time period, when a target comment message meeting a first preset condition in the comment message is detected, the target comment message is identified as an illegal comment message, and an International Mobile Equipment Identifier (IMEI) and an account ID of a mobile terminal sending the target comment message are added into a blacklist;
and updating the comment content in the comment page of the application resource according to the received comment set from the server.
It can be seen that, in the embodiment of the present application, a mobile terminal first obtains comment information for an application resource, then sends the comment information to a server, and finally updates comment content of a comment page of the application resource according to the comment information, where the comment information is used for the server to detect at least one comment message that has been issued in a second time period in a first time period, the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and when a target comment message that meets a first preset condition in the at least one comment message is detected, identifies the target comment message as an illegal comment message, and adds an international mobile equipment identifier IMEI and an account ID of the mobile terminal that sent the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
The above embodiments mainly introduce the scheme of the embodiments of the present application from the perspective of the method-side implementation process. It is understood that the mobile terminal or the server includes a hardware structure and/or a software module for performing the respective functions in order to implement the above-described functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the mobile terminal or the server may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
The following is an embodiment of the apparatus of the present application, which is used to execute the method implemented by the embodiment of the method of the present application. As shown in fig. 7, an embodiment of the present application provides a server, which may include a detection unit 701, an identification unit 702, and a configuration unit 703, wherein,
the detecting unit 701 is configured to detect, at a first time interval, at least one comment message for the application resource that has been issued at a second time interval, where the second time interval is earlier than the first time interval, and the server is in an offline state at the second time interval;
the identifying unit 702 is configured to, when the detecting unit 701 detects a target comment message that meets a first preset condition in the at least one comment message, identify the target comment message as an illegal comment message;
the configuration unit 703 is configured to add an international mobile equipment identity IMEI and an account ID of the mobile terminal that sends the target comment message to a blacklist.
It can be seen that, in the embodiment of the present application, a server first detects at least one comment message issued for an application resource in a second time period, where the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and then, when a target comment message meeting a first preset condition is detected in the at least one comment message, identifies the target comment message as an illegal comment message, and finally, adds an international mobile equipment identifier IMEI and an account ID of a mobile terminal that sends the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
In a possible example, in the aspect that when a target comment message satisfying a first preset condition is detected from the at least one comment message, the target comment message is identified as an illegal comment message, the identifying unit 702 is specifically configured to: acquiring a first comment message set associated with each IMEI or each ID in the at least one comment message, wherein the number of characters of each comment message in the first comment message set is greater than a first preset number of characters, and the difference between the receiving time of any two comment messages is less than a first preset time length; and the comment information identification module is used for identifying comment information, of which the number is larger than a first preset number, in the first comment information set as the illegal comment information, and the similarity of any two comment information in the illegal comment information is larger than a preset similarity.
In one possible example, the server further comprises a receiving unit and a control unit, wherein,
the receiving unit is used for matching the comment message with a reference comment message in an illegal word bank when the comment message sent by the mobile terminal is received;
the control unit is used for refusing to publish the comment message when the comment message is successfully matched with the reference comment message.
In one possible example, the server further comprises an adding unit, wherein,
the adding unit is configured to, after the detecting unit 701 detects at least one comment message issued in a second time period in a first time period and for the application resource, add the reference comment message to an illegal thesaurus of the server when the reference comment message meeting a second preset condition is detected in the at least one comment message, where the reference comment message is used by the server to determine whether to refuse to issue any received comment message.
In this possible example, in the aspect that when a reference comment message satisfying a second preset condition is detected from among the at least one comment message, the reference comment message is added to the illegal thesaurus of the server, the adding unit is specifically configured to: acquiring a second comment message set with the same comment content in the at least one comment message, wherein the number of characters of each comment message in the second comment message set is greater than a second preset number of characters, the difference value of the receiving time of any two comment messages is less than a second preset duration, and the number of comment messages in the second comment message set is greater than the second preset number; and an illegal thesaurus for adding any one comment message in the second comment message set to the server.
It should be noted that the server described in the embodiments of the apparatus of the present application is presented in the form of a functional unit. The term "unit" as used herein is to be understood in its broadest possible sense, and objects used to implement the functions described by the respective "unit" may be, for example, an integrated circuit ASIC, a single circuit, a processor (shared, dedicated, or chipset) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
Specifically, the detecting unit 701, the identifying unit 702, and the configuring unit 703 may be processors.
The following is an embodiment of the apparatus of the present application, which is used to execute the method implemented by the embodiment of the method of the present application. As shown in fig. 8, the present embodiment provides a mobile terminal, which may include an obtaining unit 801, a sending unit 802, and an updating unit 803, wherein,
the obtaining unit 801 is configured to obtain a comment message for the application resource;
the sending unit 802 is configured to send the comment message acquired by the acquiring unit 801 to the server, where the comment message is used for the server to detect at least one comment message that has been issued in a second time period in a first time period, where the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and when a target comment message that meets a first preset condition in the at least one comment message is detected, identify the target comment message as an illegal comment message, and add an international mobile equipment identifier IMEI and an account ID of a mobile terminal that sends the target comment message to a blacklist;
the updating unit 803 is configured to update the comment content in the comment page of the application resource according to the received comment set from the server.
It can be seen that, in the embodiment of the present application, a mobile terminal first obtains comment information for an application resource, then sends the comment information to a server, and finally updates comment content of a comment page of the application resource according to the comment information, where the comment information is used for the server to detect at least one comment message that has been issued in a second time period in a first time period, the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and when a target comment message that meets a first preset condition in the at least one comment message is detected, identifies the target comment message as an illegal comment message, and adds an international mobile equipment identifier IMEI and an account ID of the mobile terminal that sent the target comment message to a blacklist. Therefore, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced, besides, the content of the blacklist is determined through offline detection according to the first preset condition, accuracy of blacklist configuration is improved, the server automatically adds the content of the blacklist according to a detection result, but not manually adds the content of the blacklist by a developer, and efficiency of blacklist configuration is improved.
It should be noted that the mobile terminal described in the embodiments of the apparatus of the present application is presented in the form of a functional unit. The term "unit" as used herein is to be understood in its broadest possible sense, and objects used to implement the functions described by the respective "unit" may be, for example, an integrated circuit ASIC, a single circuit, a processor (shared, dedicated, or chipset) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
Specifically, the acquiring unit 801 and the sending unit 802 may be communication interfaces of the mobile terminal, and the updating unit 803 may be a processor of the mobile terminal.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a smart phone 900 according to an embodiment of the present application, where the smart phone 900 includes: casing 910, touch-control display screen 920, mainboard 930, battery 940 and subplate 950, be provided with leading camera 931, treater 932, memory 933, power management chip 934 on the mainboard 930 etc. be provided with oscillator 951, integrative sound chamber 952, VOOC flash interface 953 and fingerprint identification module 954 on the subplate.
The smart phone runs an operating system and application resource searching software, and specifically executes the following operations: obtaining comment information aiming at the application resource;
sending the comment message to the server, wherein the comment message is used for detecting at least one comment message issued by the server in a second time period in a first time period, the second time period is earlier than the first time period, the server is in an offline state in the second time period, when a target comment message meeting a first preset condition in the comment message is detected, the target comment message is identified as an illegal comment message, and an International Mobile Equipment Identifier (IMEI) and an account ID of a mobile terminal sending the target comment message are added into a blacklist;
and updating the comment content in the comment page of the application resource according to the received comment set from the server.
The processor 932 is a control center of the smart phone, connects various parts of the whole smart phone by using various interfaces and lines, and executes various functions and processes data of the smart phone by running or executing software programs and/or modules stored in the memory 933 and calling data stored in the memory 933, thereby integrally monitoring the smart phone. Optionally, processor 932 may include one or more processing units; preferably, the processor 932 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor may not be integrated into processor 932. The Processor 932 may be, for example, a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others.
The memory 933 may be used to store software programs and modules, and the processor 932 may execute various functional applications and data processing of the smart phone by operating the software programs and modules stored in the memory 933. The memory 933 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the smartphone, and the like. Further, the memory 933 can include high-speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device. The Memory 933 may be, for example, a Random Access Memory (RAM), a flash Memory, a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a register, a hard disk, a removable hard disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art.
Referring to fig. 10, an embodiment of the present application further provides a blacklist configuration system 1000, which may include: a server 1010 and a mobile terminal 1020, wherein,
the mobile terminal 1020 is configured to obtain a comment message for the application resource; sending the comment message to the server, wherein the comment message is used for detecting at least one comment message issued by the server in a second time period in a first time period, the second time period is earlier than the first time period, the server is in an offline state in the second time period, when a target comment message meeting a first preset condition in the comment message is detected, the target comment message is identified as an illegal comment message, and an International Mobile Equipment Identifier (IMEI) and an account ID of a mobile terminal sending the target comment message are added into a blacklist; and updating the comment content in the comment page of the application resource according to the received comment set from the server.
The server 1010 is configured to detect at least one comment message issued for the application resource in a second period of time, where the second period of time is earlier than the first period of time, and the server is in an offline state in the second period of time; when a target comment message meeting a first preset condition in the at least one comment message is detected, identifying the target comment message as an illegal comment message; and adding the international mobile equipment identification IMEI and the account ID of the mobile terminal sending the target comment message into a blacklist.
In the embodiment of the application, the server detects the published comment message to determine the blacklist in an offline state, but not detects the comment message online when receiving the comment message sent by the mobile terminal, so that resource occupation of a system of the server is reduced.
Embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the methods as described in the above method embodiments.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A blacklist configuration method is applied to a server, wherein the server is used for pushing application resources to a mobile terminal, and the method comprises the following steps:
detecting at least one comment message which is issued in a second time period and aims at the application resource in a first time period, wherein the second time period is earlier than the first time period, and the server is in an offline state in the second time period, the comment message refers to comment content of a comment interface of the application resource, and the comment message comprises a plurality of characters;
when a target comment message meeting a first preset condition in the at least one comment message is detected, identifying the target comment message as an illegal comment message, and adding an International Mobile Equipment Identifier (IMEI) and an account ID of a mobile terminal sending the target comment message into a blacklist;
when detecting that a reference comment message meeting a second preset condition in the at least one comment message is received, adding the reference comment message to an illegal thesaurus of the server, where the reference comment message is used by the server to determine whether to reject to publish any received comment message, the reference comment message is any comment message in a second comment message set, the second comment message set is a set of comment messages with the same comment content in the at least one comment message, the number of characters of each comment message in the second comment message set is greater than a second preset number of characters, the difference between the receiving times of any two comment messages is less than a second preset duration, and the number of comment messages in the second comment message set is greater than a second preset number.
2. The method of claim 1, wherein when a target comment message satisfying a first preset condition is detected from the at least one comment message, identifying the target comment message as an illegal comment message comprises:
acquiring a first comment message set associated with each IMEI or each ID in the at least one comment message, wherein the number of characters of each comment message in the first comment message set is greater than a first preset number of characters, and the difference between the receiving time of any two comment messages is less than a first preset time length;
and identifying comment messages of which the number is larger than a first preset number in the first comment message set as illegal comment messages, wherein the similarity of any two comment messages in the illegal comment messages is larger than a preset similarity.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
when a comment message sent by the mobile terminal is received, matching the comment message with a reference comment message in an illegal word bank;
and when the comment message is successfully matched with the reference comment message, rejecting to publish the comment message.
4. A blacklist configuration method is applied to a mobile terminal, wherein the mobile terminal is used for receiving application resources of a server, and the method comprises the following steps:
obtaining comment information aiming at the application resource;
sending the comment message to the server, where the comment message is used for the server to detect at least one comment message that has been published in a second period of time in a first period of time, the second period of time is earlier than the first period of time, and the server is in an offline state in the second period of time, the comment message refers to comment content of a comment interface of the application resource, the comment message includes a plurality of characters, and when a target comment message that satisfies a first preset condition in the at least one comment message is detected, the target comment message is identified as an illegal comment message, and a mobile terminal international mobile equipment identifier IMEI and an account ID that send the target comment message are added to a blacklist, and when a reference comment message that satisfies a second preset condition in the at least one comment message is detected, the reference comment message is added to an illegal thesaurus of the server, the reference comment message is used for the server to judge whether to refuse to publish any received comment message, the reference comment message is any comment message in a second comment message set, the second comment message set is a set of comment messages with the same comment content in the at least one comment message, the number of characters of each comment message in the second comment message set is larger than a second preset number of characters, the difference value of the receiving time of any two comment messages is smaller than a second preset time length, and the number of comment messages in the second comment message set is larger than the second preset number;
and updating the comment content in the comment page of the application resource according to the received comment set from the server.
5. A server is characterized by comprising a detection unit, an identification unit, a configuration unit and an addition unit, wherein,
the detection unit is used for detecting at least one comment message which is issued in a second time interval and aims at the application resource in a first time interval, the second time interval is earlier than the first time interval, the server is in an offline state in the second time interval, the comment message refers to comment content of a comment interface of the application resource, and the comment message comprises a plurality of characters;
the identification unit is used for identifying the target comment message as an illegal comment message when the detection unit detects that the target comment message meets a first preset condition in the at least one comment message;
the configuration unit is used for adding an International Mobile Equipment Identifier (IMEI) and an account ID of the mobile terminal for sending the target comment message into a blacklist;
the adding unit is configured to add, when a reference comment message meeting a second preset condition in the at least one comment message is detected, the reference comment message to an illegal thesaurus of the server, where the reference comment message is used by the server to determine whether to reject to publish any one received comment message, the reference comment message is any one comment message in a second comment message set, the second comment message set is a set of comment messages with the same comment content in the at least one comment message, the number of characters of each comment message in the second comment message set is greater than a second preset number of characters, a difference between receiving times of any two comment messages is smaller than a second preset duration, and the number of comment messages in the second comment message set is greater than a second preset number.
6. A mobile terminal comprising an acquisition unit, a transmission unit and an update unit, wherein,
the obtaining unit is used for obtaining a comment message aiming at the application resource, wherein the comment message refers to comment content of a comment interface of the application resource, and the comment message comprises a plurality of characters;
the sending unit is configured to send the comment message acquired by the acquiring unit to a server, where the comment message is used for the server to detect at least one comment message that has been issued in a second time period in a first time period, the second time period is earlier than the first time period, and the server is in an offline state in the second time period, and when a target comment message that satisfies a first preset condition in the at least one comment message is detected, identify the target comment message as an illegal comment message, add an International Mobile Equipment Identifier (IMEI) and an account ID of a mobile terminal that sent the target comment message to a blacklist, and when a reference comment message that satisfies a second preset condition in the at least one comment message is detected, add the reference comment message to an illegal thesaurus of the server, where the reference comment message is used for the server to determine whether to issue any received comment message or not, the reference comment message is any one comment message in a second comment message set, the second comment message set is a set of comment messages with the same comment content in the at least one comment message, the number of characters of each comment message in the second comment message set is greater than a second preset number of characters, the difference value of receiving time of any two comment messages is less than a second preset duration, and the number of comment messages in the second comment message set is greater than a second preset number;
the updating unit is used for updating the comment content in the comment page of the application resource according to the received comment set from the server.
7. A server, comprising a processor, a memory, and a program, wherein the program is stored in the memory, and wherein the processor invokes the program for executing the instructions of the steps in the method of any of claims 1-3.
8. A mobile terminal comprising a processor, a memory, and a program, wherein the program is stored in the memory, and wherein the processor invokes the program to perform the instructions of the steps of the method of claim 4.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a program, wherein the program causes a computer to execute the method according to any one of claims 1 to 3.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a program, wherein the program causes a computer to execute the method according to claim 4.
CN201711005801.7A 2017-10-23 2017-10-23 Blacklist configuration method and device Active CN107766329B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711005801.7A CN107766329B (en) 2017-10-23 2017-10-23 Blacklist configuration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711005801.7A CN107766329B (en) 2017-10-23 2017-10-23 Blacklist configuration method and device

Publications (2)

Publication Number Publication Date
CN107766329A CN107766329A (en) 2018-03-06
CN107766329B true CN107766329B (en) 2021-08-06

Family

ID=61270243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711005801.7A Active CN107766329B (en) 2017-10-23 2017-10-23 Blacklist configuration method and device

Country Status (1)

Country Link
CN (1) CN107766329B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694673A (en) * 2011-03-25 2012-09-26 腾讯科技(深圳)有限公司 Network speech monitoring method, equipment and system thereof
CN103198161A (en) * 2013-04-28 2013-07-10 中国科学院计算技术研究所 Microblog ghostwriter identifying method and device
CN104866468A (en) * 2015-04-08 2015-08-26 清华大学深圳研究生院 Method for identifying false Chinese customer reviews
CN104881795A (en) * 2015-05-16 2015-09-02 成都数联铭品科技有限公司 E-commerce false comment judging and recognizing method
CN106648283A (en) * 2015-11-02 2017-05-10 腾讯科技(北京)有限公司 Pop-up screen information processing method and server

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8135848B2 (en) * 2007-05-01 2012-03-13 Venkat Ramaswamy Alternate to email for messages of general interest
US9336310B2 (en) * 2009-07-06 2016-05-10 Google Inc. Monitoring of negative feedback systems
CN104123328A (en) * 2013-04-28 2014-10-29 北京千橡网景科技发展有限公司 Method and device used for inhibiting spam comments in website
CN104867017A (en) * 2015-05-16 2015-08-26 成都数联铭品科技有限公司 Electronic commerce client false evaluation identification system
US10216803B2 (en) * 2015-11-16 2019-02-26 Facebook, Inc. Ranking and filtering comments based on author and content
CN105516820A (en) * 2015-12-10 2016-04-20 腾讯科技(深圳)有限公司 Barrage interaction method and device
CN105592331B (en) * 2015-12-16 2019-09-27 广州华多网络科技有限公司 A kind of processing method, relevant device and the system of barrage message
CN105657471B (en) * 2016-01-29 2018-06-15 广州酷狗计算机科技有限公司 A kind of method and apparatus of account executive
CN107229608A (en) * 2016-03-23 2017-10-03 阿里巴巴集团控股有限公司 Comment spam recognition methods and device
CN106021231B (en) * 2016-05-24 2019-03-05 武汉斗鱼网络科技有限公司 A kind of detection repeats the method and device of chat content
CN106101848B (en) * 2016-06-08 2019-03-01 维沃移动通信有限公司 A kind of barrage display methods and electronic equipment
CN106341703A (en) * 2016-08-30 2017-01-18 乐视控股(北京)有限公司 Bullet screen processing method and device
CN106708966B (en) * 2016-11-29 2023-04-25 中国计量大学 Junk comment detection method based on similarity calculation

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102694673A (en) * 2011-03-25 2012-09-26 腾讯科技(深圳)有限公司 Network speech monitoring method, equipment and system thereof
CN103198161A (en) * 2013-04-28 2013-07-10 中国科学院计算技术研究所 Microblog ghostwriter identifying method and device
CN104866468A (en) * 2015-04-08 2015-08-26 清华大学深圳研究生院 Method for identifying false Chinese customer reviews
CN104881795A (en) * 2015-05-16 2015-09-02 成都数联铭品科技有限公司 E-commerce false comment judging and recognizing method
CN106648283A (en) * 2015-11-02 2017-05-10 腾讯科技(北京)有限公司 Pop-up screen information processing method and server

Also Published As

Publication number Publication date
CN107766329A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN104320756B (en) A kind of variation and device of account information
CN108616654B (en) Message reminding method, device, terminal and computer readable storage medium
CN106155789B (en) Application freezing method and mobile terminal
CN113412608B (en) Content pushing method and device, server and storage medium
CN105224201A (en) A kind of method of interface display and terminal
CN103037072A (en) Implementation method of extracting short message contents to apply to scene
CN109271768A (en) Release news management method, device, storage medium and terminal
CN110377376B (en) Interface message refreshing method and device, computer device and readable storage medium
CN110740088B (en) Method, device, terminal and medium for recommending and adding social resources
CN104283765A (en) Information display method and device and terminal equipment
CN106227483B (en) Display control method and mobile terminal
CN111049822A (en) Short message verification code sending method and device, short message server and storage medium
CN108227953B (en) Character input method and related product
CN108241515B (en) Application shortcut establishing method and terminal
CN107766329B (en) Blacklist configuration method and device
CN107979529B (en) Information processing method, information processing apparatus, computer apparatus, and computer-readable storage medium
CN110771113B (en) Brushing amount terminal detection method and device
CN113505272B (en) Control method and device based on behavior habit, electronic equipment and storage medium
CN112261595A (en) Event reminding method and device, storage medium and mobile terminal
CN105681523A (en) Method and apparatus for sending birthday blessing short message automatically
CN116303937A (en) Reply method, reply device, electronic equipment and readable storage medium
CN107864275B (en) Application setting method and device, mobile terminal and computer readable storage medium
CN108037839B (en) Character input method and related product
CN109561406B (en) SIM card selection method, device, system, electronic equipment and medium
CN106844396B (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co.,Ltd.

Address before: No.18, Wusha Haibin Road, Chang'an Town, Dongguan City, Guangdong Province

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant