CN115237998A - Information auditing processing method and device - Google Patents

Information auditing processing method and device Download PDF

Info

Publication number
CN115237998A
CN115237998A CN202110443633.XA CN202110443633A CN115237998A CN 115237998 A CN115237998 A CN 115237998A CN 202110443633 A CN202110443633 A CN 202110443633A CN 115237998 A CN115237998 A CN 115237998A
Authority
CN
China
Prior art keywords
audited
task
content
audit
auditing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110443633.XA
Other languages
Chinese (zh)
Inventor
张睿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN202110443633.XA priority Critical patent/CN115237998A/en
Publication of CN115237998A publication Critical patent/CN115237998A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/288Entity relationship models

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure relates to a processing method for information auditing, which comprises the following steps: acquiring at least two tasks to be audited; forming a related audit task based on the to-be-audited task corresponding to the same to-be-audited content according to the modification information of the to-be-audited content of the to-be-audited task; determining a target audit task from the associated audit tasks according to the generation time of the task to be audited; and acquiring the auditing result of the target auditing task, and synchronizing the auditing result to the associated auditing task. By adopting the method, the processing mechanism of information auditing is optimized, the time and the cost for auditing the content are saved, and the use experience of a user is improved.

Description

Information auditing processing method and device
Technical Field
The present disclosure relates to the field of information security, and in particular, to a method and an apparatus for processing information audit.
Background
At present, with the development of the diversity of the social modes of the internet, the threshold and the cost of producing contents by a large number of users through the internet are gradually reduced. When the content security supervision of the nationwide pressing users is carried out, violation information needs to be screened from numerous contents, and the violation contents need to be guaranteed to be fed back and intercepted efficiently.
For example, the UGC Content (User Generated Content) is an important ring of a community Content system, and users participate in a large amount of magnitude and a large number of types, and an information auditing task is formed when each User feeds back information, so that information auditing is performed one by one, and resource waste is caused. Therefore, when processing a task of user feedback information, a highly efficient and traceable processing method for information auditing needs to be formulated, a processing mechanism for user feedback information is optimized, and the technical problem of large platform resource load is solved.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a processing method and apparatus for information auditing.
According to a first aspect of the embodiments of the present disclosure, there is provided a processing method for information auditing, the method including:
acquiring at least two tasks to be audited;
forming a related audit task based on the to-be-audited task corresponding to the same to-be-audited content according to the modification information of the to-be-audited content of the to-be-audited task;
determining a target audit task from the associated audit tasks according to the generation time of the task to be audited;
and acquiring the auditing result of the target auditing task, and synchronizing the auditing result to the associated auditing task.
In some embodiments, the forming, according to the modification condition of the content to be audited of the task to be audited, a related audit task based on the task to be audited corresponding to the same content to be audited includes:
acquiring the to-be-audited content of the to-be-audited task;
when the same content to be checked is requested for a plurality of times and is not modified, a plurality of unmodified tasks to be checked corresponding to the same content to be checked are used as the associated checking tasks, and/or,
and when the same content to be audited is requested for a plurality of times and is modified, taking a plurality of tasks to be audited corresponding to the same content to be audited as the associated auditing tasks.
In some embodiments, the obtaining at least two tasks to be audited includes: and periodically acquiring the at least two tasks to be audited.
In some embodiments, the determining a target audit task from the associated audit tasks according to the generation time of the to-be-audited task includes:
acquiring the generation time of the associated audit task;
dividing the tasks to be audited with the same content to be audited in the associated audition tasks into an audition task group;
determining an audit task group where the task to be audited with the latest generation time in the current period is located as a target audit task group;
determining the task to be audited with the earliest generation time in the target audit task group as the target audit task;
or the like, or, alternatively,
acquiring the generation time of the associated audit task and the creation time of the content to be audited of the associated audit task;
and determining the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and generating the task to be audited with the earliest creation time as the target audit task.
In some embodiments, the method further comprises:
and after the target audit task is determined, locking the associated audit task and/or the tasks to be audited in the audit task group except the target audit task.
In some embodiments, the method further comprises:
determining the content to be audited of the task to be audited in the next period;
when the content to be audited of the task to be audited of the next period is the same as the content to be audited in the associated audit task, synchronizing the audit result of the associated audit task to the task to be audited of the next period;
and when the content to be audited of the task to be audited in the next period is different from the content to be audited in the associated audit task, pushing the task to be audited in the next period to the information audit processing flow in the next period.
In some embodiments, the method further comprises:
acquiring a credit value of a user;
and determining the auditing sequence of the tasks to be audited of the user according to the credit value of the user, wherein the credit value of the user is positively correlated with the auditing sequence of the tasks to be audited of the user.
In some embodiments, the method further comprises:
and when the credit value of the user is higher than a preset value, pre-shielding the to-be-audited content of the to-be-audited task of the user.
In some embodiments, the method further comprises:
determining violation information according to a historical task auditing result, and establishing a content auditing model of the task to be audited;
determining whether the content generated by the user belongs to the violation information or not according to the content auditing model;
and intercepting the user generated content when the user generated content belongs to the violation information.
According to a second aspect of the embodiments of the present disclosure, there is provided an apparatus for processing information audit, the apparatus comprising:
the acquisition module is used for acquiring at least two tasks to be audited;
the correlation module is used for forming a correlation audit task based on the to-be-audited task corresponding to the same to-be-audited content according to the modification information of the to-be-audited content of the to-be-audited task;
the determining module is used for determining a target audit task from the associated audit tasks according to the generation time of the task to be audited;
and the first synchronization module is used for acquiring the auditing result of the target auditing task and synchronizing the auditing result to the associated auditing task.
In some embodiments, the association module is to:
acquiring the to-be-audited content of the to-be-audited task;
when the same content to be checked is requested for a plurality of times and is not modified, a plurality of unmodified tasks to be checked corresponding to the same content to be checked are used as the associated checking tasks, and/or,
and when the same content to be audited is requested for multiple times and is modified, taking the multiple tasks to be audited corresponding to the same content to be audited as the associated auditing tasks.
In some embodiments, the obtaining module is configured to: and periodically acquiring the at least two tasks to be audited.
In some embodiments, the determining module is to: acquiring the generation time of the associated audit task;
dividing the tasks to be audited with the same content to be audited in the associated audition tasks into an audition task group;
determining an audit task group where the task to be audited with the latest generation time in the current period is located as a target audit task group;
determining the task to be audited with the earliest generation time in the target audit task group as the target audit task;
or the like, or, alternatively,
acquiring the generation time of the associated audit task and the creation time of the content to be audited of the associated audit task;
and determining the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and generating the task to be audited with the earliest creation time as the target auditing task.
In some embodiments, the apparatus further comprises:
and the locking module is used for locking the associated audit task and/or the tasks to be audited in the audit task group except the target audit task after the target audit task is determined.
In some embodiments, the apparatus further comprises:
the second synchronization module is used for determining the content to be audited of the task to be audited in the next period;
when the to-be-audited content of the to-be-audited task in the next period is the same as the to-be-audited content in the associated audit task, synchronizing the audit result of the associated audit task to the to-be-audited task in the next period;
and when the to-be-audited content of the to-be-audited task in the next period is different from the to-be-audited content in the associated audit task, pushing the to-be-audited task in the next period to the information audit processing flow in the next period.
In some embodiments, the apparatus further comprises:
the user credit module is used for acquiring a credit value of a user;
and determining the auditing sequence of the tasks to be audited of the user according to the credit value of the user, wherein the credit value of the user is positively correlated with the auditing sequence of the tasks to be audited of the user.
In some embodiments, the user credit module further comprises:
and the shielding module is used for shielding the content to be audited of the task to be audited of the user in advance when the credit value of the user is higher than a preset value.
In some embodiments, the apparatus further comprises:
the judging and intercepting module is used for determining violation information according to a historical task auditing result and establishing a content auditing model of the task to be audited;
determining whether the content generated by the user belongs to the violation information or not according to the content auditing model;
and intercepting the user generated content when the user generated content belongs to the violation information.
According to a third aspect of the embodiments of the present disclosure, there is provided an information auditing processing apparatus, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the processing method for information auditing as described in the first aspect when executing the executable instructions.
According to a fourth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium, wherein instructions, when executed by a processor of an apparatus, enable the apparatus to perform the processing method of information auditing as described in the first aspect above.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
in the embodiment of the disclosure, especially under the condition that the number of users is large and the content to be audited is complicated, by acquiring and associating the tasks to be audited, selecting one target audit task from the associated tasks to be audited as the audit object, and synchronizing and referring the audit result of the audit object, the flow of dispatching and dispatching the information audit can be optimized, the dispatching and auditing of each task to be audited by a client are not needed, the auditing of the tasks to be audited with repeated content is also not needed, so that the flow of the information audit is more intelligent and simplified, the audit tasks submitted by the users are completed more efficiently, and the load pressure of an audit task system is saved.
It should be noted here that, when a user performs an operation of requesting to check specific content at a client operated by the user, a server or a terminal for information checking receives or generates a task to be checked. After a target audit task is determined, the server or the terminal sends the selected target audit task to a content audit client, and the content audit client performs audit on specific content. The server or terminal for information auditing and the auditing client for specific content auditing form an information auditing system.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a flowchart illustrating a processing method of information auditing according to an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a method of processing an information audit in accordance with an exemplary embodiment.
Fig. 3 is a flow chart illustrating a method of processing an information audit according to another exemplary embodiment.
FIG. 4 is a flow diagram illustrating a method of processing an information audit in accordance with an exemplary embodiment.
Fig. 5 is a block diagram illustrating an information auditing processing device according to an example embodiment.
Fig. 6 is a block diagram illustrating an information auditing processing device according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The principles of the present disclosure operate using many other general purpose or special purpose computing, communication environments or configurations. Examples of well known computing servers, environments, and configurations that may be suitable for use with the invention include, but are not limited to, personal computers, servers, multiprocessor servers, and the like.
Fig. 1 is a flowchart illustrating a processing method of information auditing according to an exemplary embodiment. As shown in fig. 1, the processing method for information auditing includes the following steps:
s11, acquiring at least two tasks to be audited;
s12, forming a related audit task based on the to-be-audited task corresponding to the same to-be-audited content according to the modification information of the to-be-audited content of the to-be-audited task;
s13, determining a target audit task from the associated audit tasks according to the generation time of the task to be audited;
and S14, obtaining the auditing result of the target auditing task, and synchronizing the auditing result to the associated auditing task.
In step S11, after the client requested by the user performs a request operation on the relevant content, the information auditing server generates relevant tasks to be audited, and determines at least two tasks to be audited. Generally, the task to be audited is generated according to the action of each user requesting the content. In an embodiment of the present disclosure, a user may request the same content to generate different tasks to be audited, or the same content may be requested by different users to generate different tasks to be audited.
Therefore, a corresponding task to be audited is generated for each request behavior of each user, and a corresponding task number to be audited is matched, wherein the task number to be audited is a unique code which is added in order.
And if the request of the client user for the relevant content is the related operation such as report of the content request, opinion feedback and the like, and if the request is the report operation, the related operation such as shielding or clearing and the like can be further executed after the request is confirmed to be valid through the auditing result.
In step S12, according to the modification information of the to-be-audited content of the to-be-audited task, a related audit task is formed based on the to-be-audited task corresponding to the same to-be-audited content.
Each task to be audited has corresponding task information to be audited, wherein the task information to be audited at least comprises the following information: the content to be checked (including editable content information such as text, picture, audio, etc.), the creator of the content to be checked, the creation time, the modification information and related records of the content to be checked, the generation time and creator of each task to be checked, etc., but is not limited to the information with identification.
When any item of information of the task information to be audited is modified, new task information to be audited is formed, for example, when a user X creates a content with X1 characters and X2 pictures at X:00 time, the content is submitted to a system for auditing by a user Y at Y:00 time. Then, the content to be checked is the content with X1 characters and X2 pictures, the creator of the content to be checked is a user X, and the creation time is X:00; the creator of the task to be audited is a user Y, and the generation time of the task to be audited is Y:00; if the content of the x2 picture with the x1 characters is forwarded by the user Z, the creator of the new content to be audited is the user Z at this time, and then the creation time of the new content to be audited appears, and relevant modification information is recorded. Therefore, if any of the above information is modified, the task information to be audited before and after modification is identified as different task information to be audited.
According to the modification condition of the information of the content to be checked, the content to be checked before modification and the modified content to be checked have certain relevance. Therefore, the associated audit task is formed based on the tasks to be audited corresponding to the same content to be audited.
In step S13, in the formed associated audit task, a target audit task is determined according to the generation time of the task to be audited.
In step S14, the selected target audit task is sent to the audit client, and the audit client performs automatic audit and/or manual audit according to the to-be-audited content of the target audit task, and determines an audit result of the target audit task.
It should be noted here that, with gradual optimization of the content audit model, audit on the content to be audited may be gradually intelligentized, or before manual audit on the relevant content is performed, the information audit server may perform automatic screening in advance according to the content audit model. And after the related server for information auditing obtains the auditing result of the target auditing task, synchronizing the target auditing result to all related auditing tasks. The client end of the content audit can automatically upload or send the audit result of the target audit task to the server of the information audit, or the server of the information audit can request to upload to obtain the audit result of the target audit task.
By adopting the method of the embodiment of the disclosure, the information auditing server obtains at least two tasks to be audited, clusters the tasks to be audited into associated auditing tasks according to the content to be audited, and selects one target auditing task in the associated auditing tasks to be sent to the content auditing client for auditing the related content. And finally, the server synchronizes the auditing results of the target auditing tasks to all the associated auditing tasks, so that all the tasks to be audited are clustered and associated, repeated order dispatching can be avoided, the request behavior of each user cannot be ignored, the process of auditing the order dispatching is optimized, and the efficiency of information auditing is improved.
In some embodiments, the method of step S12 comprises: acquiring the content to be audited of the task to be audited;
when the same content to be checked is requested for a plurality of times and is not modified, a plurality of unmodified tasks to be checked corresponding to the same content to be checked are used as related checking tasks, and/or,
and when the same content to be audited is requested for a plurality of times and is modified, taking a plurality of tasks to be audited corresponding to the same content to be audited as associated audition tasks.
In an embodiment of the disclosure, the information auditing server obtains the to-be-audited information of each to-be-audited task, analyzes the to-be-audited content corresponding to each to-be-audited task, and performs clustering according to the modification condition of the to-be-audited content.
And when the same content to be audited is requested for a plurality of times and is not modified, taking a plurality of tasks to be audited which are not modified and correspond to the same content to be audited as associated audition tasks. That is, when the content to be audited is requested for many times and is not modified, the task to be audited corresponding to the same content to be audited is used as the associated audit task.
For example: when the server for information auditing obtains a series of tasks to be audited, each content to be audited is provided with a content ID, and the ID of the content to be audited of the 1 st task to be audited is 'A1'; if the content to be audited of the acquired 2 nd task to be audited is not modified, the corresponding ID is still 'A1'; if the acquired to-be-audited content of the 3 rd to-be-audited task is not modified, the corresponding ID is still 'A1'.
Then, the 1 st, 2 nd and 3 rd tasks to be audited with the ID of the content to be audited being "A1" are formed into associated audit tasks, and because the content to be audited is not modified each time, the 1 st, 2 nd and 3 rd tasks to be audited with the ID of the content to be audited being "A1" can be further divided into an audit task group.
When the same content to be audited is requested for a plurality of times and is modified, a plurality of tasks to be audited corresponding to the same content to be audited are used as associated audition tasks, namely the tasks to be audited corresponding to the same content to be audited before modification are used as the associated audition tasks.
For example, when a server for information auditing acquires a series of tasks to be audited, each content to be audited has a content ID, and the ID of the content to be audited of the 1 st task to be audited is "A1"; if the content to be audited of the 2 nd task to be audited is not modified, the content is still 'A1'; if the content to be audited of the 3 rd task to be audited is obtained and is modified on the basis of the 'A1', the corresponding content to be audited is 'A1-1'; if the content to be audited of the 4 th task to be audited is acquired as 'A1-1'; if the content to be audited of the 5 th task to be audited is modified in the step A1-1, the corresponding content to be audited is the step A1-1-1.
Then, the 1 st, 2 nd, 3 rd, 4 th and 5 th tasks to be audited are associated to form an associated audit task, and further, the 1 st and 2 nd tasks to be audited can be combined into an audit task group, the 3 rd and 4 th tasks to be audited are combined into an audit task group, and the 5 th task to be audited is formed into an audit task group, wherein the associated audit tasks include 3 audit task groups.
By adopting the method of the embodiment of the disclosure, the server for information auditing carries out clustering association on all tasks to be audited, and carries out classification marking on each task to be audited on the basis of not neglecting each user request, so that the assignment selection work of the auditing tasks is more intelligent and simplified.
In an embodiment of the present disclosure, the method includes: and periodically acquiring the at least two tasks to be audited.
Here, in response to a request behavior of a user for the related content, a task to be checked is generated in real time at the information checking server, and the task to be checked can be periodically acquired, where the periodic acquisition is a time period in accordance with data acquisition of the related server. Different from the mode of acquiring the tasks to be audited in real time, the server for information auditing acquires the tasks to be audited in the same period, and performs clustering association through the contents to be audited of the tasks to be audited, so that a plurality of tasks to be audited are classified, and the relationship among different tasks to be audited is established according to the relevance of the contents to be audited, so that the associated tasks to be audited are associated and bound in the same period, and the tasks to be audited cannot be repeatedly dispatched.
In the embodiment of the disclosure, determining a target audit task from the associated audit tasks includes at least two ways.
FIG. 2 is a diagram of one manner of determining a target audit task from associated audit tasks, including the steps of:
and S21, acquiring the generation time of the associated audit task.
And S22, dividing the tasks to be audited with the same content in the associated audit tasks into an audit task group.
And S23, determining an audit task group where the task to be audited with the latest generation time in the current period is located as a target audit task group.
And S24, determining the task to be audited with the earliest generation time in the target audit task group as the target audit task.
In an embodiment of the present disclosure, determining a target audit task from the associated audit tasks according to the generation time of the task to be audited includes: the server for information auditing obtains the generation time information of each task to be audited, and divides the tasks to be audited, which are the same as the content to be audited in the associated tasks to be audited, into an auditing task group according to the content to be audited of the tasks to be audited. Then, at least one audit task group may be divided among each type of associated audit task, which may also be embodied in the relevant embodiment of step S12.
And the server of the information audit determines that the audit task group where the task to be audited with the latest generation time in the same period is located is the target audit task group, and selects the task to be audited with the earliest generation time in the target audit task group as the target audit task. The information auditing server selects the auditing task group where the task to be audited with the latest generation time in the current period is located as the target auditing task group, namely selects the task to be audited in the latest state, audits aiming at the auditing task in the latest state, ensures the real-time updating state of the task to be audited, and further selects the task to be audited with the earliest generation time in the target auditing task group as the target auditing task, which can ensure that the target auditing task is further selected according to the principle of the sequence of the user request time when aiming at the task to be audited corresponding to the same content to be audited.
Alternatively, fig. 3 shows another way of determining a target audit task from the associated audit tasks, which includes the following steps:
s31, acquiring generation time of the associated audit task and creation time of to-be-audited content of the associated audit task;
s32, determining the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and generating the task to be audited with the earliest creation time as the target audit task.
In an embodiment of the present disclosure, determining a target audit task from the associated audit tasks according to the generation time of the to-be-audited task includes: the information auditing server acquires the generation time information of each task to be audited and the creation time of the content to be audited of the associated auditing task, determines the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and takes the task to be audited with the earliest generation time as the target auditing task. Namely, the task to be audited corresponding to the content to be audited with the latest creation time in the current period is selected, the content to be audited in the current period is ensured to be in the latest state, and the task to be audited with the earliest user request is selected as the target audit task from the order to be audited corresponding to the content to be audited in the latest state according to the sequence of the user requests.
The server for information auditing avoids a large number of steps of independently dispatching list auditing through the correlation of tasks to be audited, and meanwhile, representative tasks to be audited in the correlated auditing tasks can be selected as target auditing objects through any one mode, so that the accuracy of content auditing is guaranteed.
In an optional embodiment of the present disclosure, the processing method for information auditing further includes:
and after the server for information auditing determines the target auditing task, locking the associated auditing task and/or the tasks to be audited in the auditing task group except the target auditing task. That is, after determining a series of associated audit tasks, the information audit server synchronously locks other associated audit tasks except the target audit task, and does not enter a series of dispatching processes such as acquiring a task to be audited, clustering association and the like, thereby avoiding repeated dispatching of the associated audit tasks.
In an exemplary embodiment, fig. 4 provides a processing method for information auditing, further including:
s41, determining the content to be audited of the task to be audited in the next period;
s42, synchronizing the auditing result of the associated auditing task to the task to be audited in the next period when the content to be audited of the task to be audited in the next period is the same as the content to be audited in the associated auditing task;
and S43, when the to-be-audited content of the to-be-audited task in the next period is different from the to-be-audited content in the associated audit task, pushing the to-be-audited task in the next period to the information audit processing flow in the next period.
After the information auditing server finishes the selection of the target auditing task in one period, when the subsequent tasks to be audited are generated, the contents to be audited of each newly generated task to be audited are analyzed.
That is, when the server for information audit judges that the to-be-audited content of the newly generated to-be-audited task is identical to the to-be-audited content of the history associated audit task, the server does not need to push the newly generated to-be-audited content to the whole processing flow of information audit, and directly synchronizes the audit result of the history associated audit task to the newly generated to-be-audited task.
And the server for information audit judges that when the to-be-audited content of the newly generated to-be-audited task is different from the to-be-audited content of the history associated audit task, in order to ensure the timeliness of the information, the server for information audit judges that the newly generated to-be-audited task is directly pushed to the processing flow of the information audit in the next period, namely the newly generated to-be-audited task needs to be processed according to the processing flow of the information audit in the disclosure.
The method aims to further improve the effective accuracy of information auditing, avoids repeatedly entering the analysis process due to a large amount of repeated and fussy contents to be audited, and saves the resources of information processing.
In another exemplary embodiment, the processing method for information auditing provided by an embodiment of the present disclosure further includes:
acquiring a credit value of a user;
and determining the auditing sequence of the tasks to be audited of the user according to the credit value of the user, wherein the credit value of the user is positively correlated with the auditing sequence of the tasks to be audited of the user.
The server for information auditing establishes a credit value of each user in each user community, and carries out weighting and scoring according to the behavior of each user in the community, for example, if the user carries out effective feedback once, the score is added, if the user carries out ineffective feedback, the score is subtracted, or historical behavior records of the user such as login duration, active information, approval, comment and the like in the community are extracted to be taken as a consideration factor for evaluating the credit score of the user.
The server for information auditing evaluates the credit value of each user in the community activity according to the credit value of the user, and can execute the activity request of the user in a grading way according to the credit value of the user. The server for information auditing can determine the auditing sequence of the information request of each user according to the credit value of each user, wherein the auditing sequence is that auditing processes with different priorities can be executed according to different credit value grades when the server acquires the task to be audited, such as a priority process for acquiring the task to be audited, a priority process for auditing the client and the like. The auditing system positively correlates the credit value of the user with the auditing and dispatching sequence of the corresponding tasks to be audited, so that the processing procedure of information auditing of community users can be further optimized.
In an optional embodiment, the processing method for information auditing further includes:
and when the credit value of the requesting user in each user community is higher than a preset value, the information auditing server conducts pre-shielding treatment on the to-be-audited content of the to-be-audited task of the user. When the credit value of the requesting user in the user community is higher than a set value, the server for information auditing can directly shield the corresponding content to be audited in advance.
A processing method for information auditing is shown according to another exemplary embodiment, and further includes:
determining violation information according to a historical task auditing result, and establishing a content auditing model of a task to be audited;
determining whether the content generated by the user belongs to violation information or not according to the content auditing model;
and intercepting the user generated content when the user generated content belongs to the violation information.
And storing the related information of the historical tasks to be audited in a specific database, and selecting the effective contents to be audited of the tasks to be audited by the information auditing server according to the auditing result of the historical tasks to be audited, namely the tasks to be audited corresponding to the contents to be audited which are determined as not compliant. Further, the server for information auditing determines violation information according to the content to be audited, and establishes an auditing model for information auditing. The server for information auditing can continuously train the contents of the tasks to be audited, which are manually audited to be effective, synchronously feed back to the content auditing model, optimize the auditing model in real time, and intercept similar contents at the generated source, so that the content auditing is more efficient and accurate.
The present disclosure also provides an information auditing processing apparatus according to an exemplary embodiment, where an apparatus 500 shown in fig. 5 includes:
an obtaining module 501, configured to obtain at least two tasks to be audited;
the association module 502 is configured to form an association audit task based on a to-be-audited task corresponding to the same to-be-audited content according to modification information of the to-be-audited content of the to-be-audited task;
a determining module 503, configured to determine a target audit task from the associated audit tasks according to the generation time of the to-be-audited task;
the first synchronization module 504 is configured to obtain an audit result of the target audit task, and synchronize the audit result to the associated audit task.
In some embodiments, the association module 502 is configured to obtain content to be audited of a task to be audited;
when the same content to be checked is requested for a plurality of times and is not modified, a plurality of unmodified tasks to be checked corresponding to the same content to be checked are used as related checking tasks, and/or,
and when the same content to be audited is requested for a plurality of times and is modified, taking a plurality of tasks to be audited corresponding to the same content to be audited as associated audition tasks.
In some embodiments, the obtaining module 501 is configured to: and periodically acquiring at least two tasks to be audited.
In some embodiments, the apparatus further comprises a determining module to:
acquiring the generation time of the associated audit task;
dividing the tasks to be audited with the same content to be audited in the associated audition tasks into an audition task group;
determining an audit task group where the task to be audited with the latest generation time in the current period is located as a target audit task group;
determining a task to be audited with the earliest generation time in the target audit task group as a target audit task;
or the like, or, alternatively,
acquiring the generation time of the associated audit task and the creation time of the content to be audited of the associated audit task;
and determining the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and generating the task to be audited with the earliest creation time as a target audit task.
In some embodiments, the apparatus further comprises:
and the locking module is used for locking the associated audit tasks and/or the tasks to be audited in the audit task group except the target audit task after the target audit task is determined.
In some embodiments, the apparatus further comprises: the second synchronization module is used for determining the content to be audited of the task to be audited in the next period;
synchronizing the auditing result of the associated auditing task to the task to be audited in the next period when the content to be audited of the task to be audited in the next period is the same as the content to be audited in the associated auditing task;
and when the to-be-audited content of the next-period to-be-audited task is different from the to-be-audited content in the associated audit task, the audit of the next-period to-be-audited task is listed in the information audit processing flow of the next-period to-be-audited task.
In some embodiments, the apparatus further comprises: the user credit module is used for acquiring a credit value of a user;
and determining the auditing sequence of the tasks to be audited of the user according to the credit value of the user, wherein the credit value of the user is positively correlated with the auditing sequence of the tasks to be audited of the user.
In some embodiments, the user credit module further comprises:
and the shielding module is used for shielding the to-be-audited content of the to-be-audited task of the user in advance when the credit value of the user is higher than the preset value.
In some embodiments, the apparatus further comprises:
the judging and intercepting module is used for determining violation information according to the historical task auditing result and establishing a content auditing model of the task to be audited;
determining whether the content generated by the user belongs to violation information or not according to the content auditing model;
and intercepting the user generated content when the user generated content belongs to the violation information.
With regard to the system in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Based on the same inventive concept, the disclosure also provides an information auditing processing device shown in an exemplary embodiment. Reference is made to fig. 6, which is a block diagram illustrating an information review processing device 600, according to an example embodiment. For example, the apparatus 600 may be provided as a server. The apparatus 600 includes a processing component 622 that further includes one or more processors and memory resources, represented by memory 632, for storing instructions, such as applications, that are executable by the processing component 622. The application programs stored in memory 632 may include one or more modules that each correspond to a set of instructions. Further, the processing component 622 is configured to execute instructions to perform the above-described methods: determining the deep color mode opening of the terminal; acquiring equipment interconnected with the terminal; determining configuration parameters of the interconnected devices corresponding to the dark mode; and sending an equipment configuration message to the interconnected equipment, wherein the equipment configuration message at least comprises the configuration parameters, so that the interconnected equipment is configured according to the configuration parameters.
The apparatus 600 may also include a power component 626 configured to perform power management of the apparatus 600, a wired or wireless network interface 650 configured to connect the apparatus 600 to a network, and an input/output (I/O) interface 658. The apparatus 600 may operate based on an operating system stored in the memory 632, such as Windows Server, mac OS XTM, unixTM, linuxTM, freeBSDTM, or the like.
In another exemplary embodiment, a non-transitory computer-readable storage medium is also provided, which contains a computer program executable by a programmable apparatus, the computer program having code portions for performing the above-described terminal configuration method when executed by the programmable apparatus.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (20)

1. A processing method for information auditing is characterized by comprising the following steps:
acquiring at least two tasks to be audited;
forming a related audit task based on the to-be-audited task corresponding to the same to-be-audited content according to the modification information of the to-be-audited content of the to-be-audited task;
determining a target audit task from the associated audit tasks according to the generation time of the task to be audited;
and obtaining the auditing result of the target auditing task, and synchronizing the auditing result to the associated auditing task.
2. The information auditing processing method of claim 1, where forming a relevant audit task based on a to-be-audited task corresponding to the same to-be-audited content according to the modification of the to-be-audited content of the to-be-audited task includes:
acquiring the to-be-audited content of the to-be-audited task;
when the same content to be audited is requested for a plurality of times and is not modified, a plurality of unmodified tasks to be audited corresponding to the same content to be audited are used as the associated auditing tasks, and/or,
and when the same content to be audited is requested for multiple times and is modified, taking the multiple tasks to be audited corresponding to the same content to be audited as the associated auditing tasks.
3. The information review processing method according to claim 1, wherein the acquiring at least two tasks to be reviewed includes: and periodically acquiring the at least two tasks to be audited.
4. The information review processing method according to claim 3, wherein the determining a target review task from the associated review tasks according to the generation time of the to-be-reviewed task includes:
acquiring the generation time of the associated audit task;
dividing the tasks to be audited with the same content to be audited in the associated audition tasks into an audition task group;
determining an audit task group where the task to be audited with the latest generation time in the current period is located as a target audit task group;
determining the task to be audited with the earliest generation time in the target audit task group as the target audit task;
or the like, or a combination thereof,
acquiring the generation time of the associated audit task and the creation time of the content to be audited of the associated audit task;
and determining the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and generating the task to be audited with the earliest creation time as the target auditing task.
5. The processing method for information audit according to any one of claims 1 to 4, wherein the method further comprises:
and after the target audit task is determined, locking the associated audit task and/or the tasks to be audited in the audit task group except the target audit task.
6. The processing method for information auditing according to claim 1, characterized in that the method further comprises:
determining the content to be audited of the task to be audited in the next period;
when the to-be-audited content of the to-be-audited task in the next period is the same as the to-be-audited content in the associated audit task, synchronizing the audit result of the associated audit task to the to-be-audited task in the next period;
and when the content to be audited of the task to be audited in the next period is different from the content to be audited in the associated audit task, pushing the task to be audited in the next period to the information audit processing flow in the next period.
7. The processing method for information auditing according to claim 1, characterized in that the method further comprises:
acquiring a credit value of a user;
and determining the auditing sequence of the tasks to be audited of the user according to the credit value of the user, wherein the credit value of the user is positively correlated with the auditing sequence of the tasks to be audited of the user.
8. The information auditing processing method of claim 7, the method further comprising:
and when the credit value of the user is higher than a preset value, pre-shielding the to-be-audited content of the to-be-audited task of the user.
9. The processing method for information auditing according to claim 1, characterized in that the method further comprises:
determining violation information according to a historical task auditing result, and establishing a content auditing model of the task to be audited;
determining whether the content generated by the user belongs to the violation information or not according to the content auditing model;
and intercepting the user generated content when the user generated content belongs to the violation information.
10. An information auditing processing apparatus, the apparatus comprising:
the acquisition module is used for acquiring at least two tasks to be audited;
the correlation module is used for forming a correlation audit task based on the to-be-audited task corresponding to the same to-be-audited content according to the modification information of the to-be-audited content of the to-be-audited task;
the determining module is used for determining a target audit task from the associated audit tasks according to the generation time of the task to be audited;
and the first synchronization module is used for acquiring the auditing result of the target auditing task and synchronizing the auditing result to the associated auditing task.
11. The information review processing apparatus of claim 10, wherein the association module is configured to:
acquiring the content to be audited of the task to be audited;
when the same content to be audited is requested for a plurality of times and is not modified, a plurality of unmodified tasks to be audited corresponding to the same content to be audited are used as the associated auditing tasks, and/or,
and when the same content to be audited is requested for multiple times and is modified, taking the multiple tasks to be audited corresponding to the same content to be audited as the associated auditing tasks.
12. The information auditing processing device of claim 10, where the acquisition module is to: and periodically acquiring the at least two tasks to be audited.
13. The information audit processing apparatus according to claim 12, wherein the determining module is configured to:
acquiring the generation time of the associated audit task;
dividing the tasks to be audited with the same content to be audited in the associated audition tasks into an audition task group;
determining an audit task group where the task to be audited with the latest generation time in the current period is located as a target audit task group;
determining the task to be audited with the earliest generation time in the target audit task group as the target audit task;
or the like, or, alternatively,
acquiring the generation time of the associated audit task and the creation time of the content to be audited of the associated audit task;
and determining the task to be audited corresponding to the content to be audited with the latest creation time in the current period, and generating the task to be audited with the earliest creation time as the target audit task.
14. A processing apparatus for information auditing according to any one of claims 10 to 13, said apparatus further comprising:
and the locking module is used for locking the associated audit task and/or the tasks to be audited in the audit task group except the target audit task after the target audit task is determined.
15. The information auditing processing apparatus according to claim 10, the apparatus further comprising:
the second synchronization module is used for determining the content to be audited of the task to be audited in the next period;
when the content to be audited of the task to be audited of the next period is the same as the content to be audited in the associated audit task, synchronizing the audit result of the associated audit task to the task to be audited of the next period;
and when the content to be audited of the task to be audited in the next period is different from the content to be audited in the associated audit task, pushing the task to be audited in the next period to the information audit processing flow in the next period.
16. The information auditing processing apparatus according to claim 10, the apparatus further comprising:
the user credit module is used for acquiring a credit value of a user;
and determining the auditing sequence of the tasks to be audited of the user according to the credit value of the user, wherein the credit value of the user is positively correlated with the auditing sequence of the tasks to be audited of the user.
17. The apparatus for processing information audit according to claim 16, wherein the user credit module further includes:
and the shielding module is used for shielding the to-be-audited content of the to-be-audited task of the user in advance when the credit value of the user is higher than a preset value.
18. The information audit processing apparatus according to claim 10, wherein the apparatus further includes:
the judging and intercepting module is used for determining violation information according to a historical task auditing result and establishing a content auditing model of the task to be audited;
determining whether the content generated by the user belongs to the violation information or not according to the content auditing model;
and intercepting the user generated content when the user generated content belongs to the violation information.
19. An information audit processing device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the processing method of the information audit according to any one of claims 1 to 9 when executing the executable instruction.
20. A non-transitory computer readable storage medium having instructions therein, which when executed by a processor of an apparatus, enable the apparatus to perform a method of processing an information audit as claimed in any one of claims 1 to 9.
CN202110443633.XA 2021-04-23 2021-04-23 Information auditing processing method and device Pending CN115237998A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110443633.XA CN115237998A (en) 2021-04-23 2021-04-23 Information auditing processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110443633.XA CN115237998A (en) 2021-04-23 2021-04-23 Information auditing processing method and device

Publications (1)

Publication Number Publication Date
CN115237998A true CN115237998A (en) 2022-10-25

Family

ID=83666437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110443633.XA Pending CN115237998A (en) 2021-04-23 2021-04-23 Information auditing processing method and device

Country Status (1)

Country Link
CN (1) CN115237998A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117669567A (en) * 2024-01-31 2024-03-08 青岛冠成软件有限公司 Document management method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117669567A (en) * 2024-01-31 2024-03-08 青岛冠成软件有限公司 Document management method
CN117669567B (en) * 2024-01-31 2024-04-23 青岛冠成软件有限公司 Document management method

Similar Documents

Publication Publication Date Title
CN107590188B (en) Crawler crawling method and management system for automatic vertical subdivision field
CN110428127B (en) Automatic analysis method, user equipment, storage medium and device
CN107766580A (en) The method for pushing and device of message
EP3617896A1 (en) Method and apparatus for intelligent response
CN110933147B (en) Information technology analysis system based on cloud computing
CN110347494B (en) Context information management method, device, system and computer readable storage medium
CN102521706A (en) KPI data analysis method and device for the same
CN114168998A (en) Data processing method and device
CN115237998A (en) Information auditing processing method and device
CN104834730A (en) Data analysis system and method
CN113901021A (en) Method and device for generating upgrading script for multi-version database and electronic equipment
CN112596723B (en) Database script generation method, device, equipment and medium
CN116909751A (en) Resource allocation method in cloud computing system
CN106992901B (en) Method and apparatus for resource scheduling analog pressure
CN109471709B (en) Scheduling method for flow task processing big data based on Apache Oozie framework
CN110909072A (en) Data table establishing method, device and equipment
CN113570114B (en) Resource service intelligent matching method, system and computer equipment
CN114265974A (en) Client portrait label recommendation system and method
CN113946363A (en) Method and device for executing and configuring service data, computer equipment and storage medium
CN114203304A (en) Information pushing method based on smart medical big data and smart medical cloud server
US20140380151A1 (en) Method and apparatus for improving the efficiency of real-time website optimization processes
CN116225441B (en) Code hosting method and system for online coding system
KR102304321B1 (en) An Apparatus And Method for Predicting Simulation Execution Time
CN111988389B (en) Request scheduling mechanism of server based on HTTP/3 protocol
CN113032089A (en) Distributed simulation service construction method based on API gateway

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination