CN117520544A - Information identification method and device based on artificial intelligence and computer equipment - Google Patents

Information identification method and device based on artificial intelligence and computer equipment Download PDF

Info

Publication number
CN117520544A
CN117520544A CN202311477156.4A CN202311477156A CN117520544A CN 117520544 A CN117520544 A CN 117520544A CN 202311477156 A CN202311477156 A CN 202311477156A CN 117520544 A CN117520544 A CN 117520544A
Authority
CN
China
Prior art keywords
information
input
authentication
identification
text
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311477156.4A
Other languages
Chinese (zh)
Inventor
邓书凡
董志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202311477156.4A priority Critical patent/CN117520544A/en
Publication of CN117520544A publication Critical patent/CN117520544A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/35Clustering; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/60Information retrieval; Database structures therefor; File system structures therefor of audio data
    • G06F16/63Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/73Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present application relates to an artificial intelligence based information authentication method, apparatus, computer device, storage medium and computer program product. The method comprises the following steps: displaying an information identification interaction area, wherein the information identification interaction area comprises an information input inlet suitable for inputting information of at least one information category; responding to an information input operation triggered by the information input entrance, and displaying an identification description area; in the authentication description area, information authentication results for describing the credibility of the input information are displayed; the input information is information to be identified which is input by an information input operation through an information input entrance; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing credibility quantization information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information. The method can improve the processing efficiency of information identification.

Description

Information identification method and device based on artificial intelligence and computer equipment
Technical Field
The present application relates to the field of computer technology, and in particular, to an information authentication method, apparatus, computer device, storage medium and computer program product based on artificial intelligence.
Background
As internet technology goes deep into the aspects of people's life, the events of manufacturing false information, that is, misleading the audience's information by distorting, kneading or forging facts, the spread of false information presents a blowout growth, which brings a potential risk to network security.
At present, the reliability identification of various network information generally depends on checking information of various sources, but various information data needing to be checked are huge in data quantity, complex and various in data types, and complex in information identification operation, so that the information identification processing efficiency is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an artificial intelligence-based information authentication method, apparatus, computer device, computer-readable storage medium, and computer program product that can improve the efficiency of information authentication processing.
In a first aspect, the present application provides an artificial intelligence based information authentication method. The method comprises the following steps:
displaying an information identification interaction area, wherein the information identification interaction area comprises an information input inlet suitable for inputting information of at least one information category;
responding to an information input operation triggered by the information input entrance, and displaying an identification description area;
In the authentication description area, information authentication results for describing the credibility of the input information are displayed;
the information is input and is information to be identified which is input by an information input operation through an information input inlet; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing credibility quantization information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information.
In one embodiment, the artificial intelligence based information authentication method further comprises: displaying information authentication operation prompts in an authentication prompt area of the information authentication interaction area; and the information identification operation prompt is used for guiding the information to be identified to be input through the information input entrance for information identification.
In one embodiment, the method further comprises: presenting at least one access entry associated with the authentication by content in an authentication description area; in response to a triggering operation of the access portal, at least one authentication basis content is accessed.
In one embodiment, the information authentication interaction area includes an information source replenishment entry therein; the method further comprises the steps of: responding to an information source editing operation triggered by the information source supplementing inlet, and displaying the information source of the input information edited by the information source editing operation; displaying the source identification result in an identification description area; the source authentication result is used for describing the credibility of the information source of the input information.
In one embodiment, the entered information includes at least two; in the authentication description area, an information authentication result for describing the credibility of the input information is presented, including: in the identification description area, according to the respective credibility quantization information of at least two pieces of input information, information identification results for describing the credibility of the at least two pieces of input information are arranged and displayed. In a second aspect, the present application also provides an information authentication device based on artificial intelligence. The device comprises:
the identification interaction region display module is used for displaying an information identification interaction region, and the information identification interaction region comprises an information input inlet suitable for inputting information of at least one information category;
the identification description area display module is used for responding to the information input operation triggered by the information input entrance and displaying an identification description area;
the information identification result display module is used for displaying an information identification result for describing the credibility of the input information in the identification description area;
the information is input and is information to be identified which is input by an information input operation through an information input inlet; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing credibility quantization information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the steps of the above artificial intelligence based information authentication method when the processor executes the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the above artificial intelligence based information authentication method.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of the artificial intelligence based information authentication method above.
The above-described artificial intelligence-based information authentication method, apparatus, computer device, storage medium, and computer program product, display an authentication description area in response to an information entry operation triggered to an information entry in a displayed information authentication interaction area, and display an information authentication result in the authentication description area, the information authentication result describing a degree of reliability of the entered information entered by the information entry operation, the information authentication result including a first information authentication result describing reliability quantization information of the entered information, and a second information authentication result describing a reliability analysis process for the entered information. In the information identification processing process, the information to be identified is input through the information input entry triggering information input operation, so that the information identification processing aiming at the credibility of the information to be identified is realized, the information identification operation is simplified, and the information identification processing efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the related art, the drawings that are required to be used in the embodiments or the related technical descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the drawings without inventive effort for a person having ordinary skill in the art.
FIG. 1 is a diagram of an application environment for an artificial intelligence based information authentication method in one embodiment;
FIG. 2 is a flow diagram of an artificial intelligence based information authentication method in one embodiment;
FIG. 3 is a schematic diagram of interface changes for an artificial intelligence based information authentication method in one embodiment;
FIG. 4 is a schematic diagram of an interface for information authentication result display in one embodiment;
FIG. 5 is a flow chart showing information authentication results in one embodiment;
FIG. 6 is a schematic diagram of interface changes for entering information through an information entry portal in one embodiment;
FIG. 7 is a diagram of an interface for authenticating a presentation according to content in one embodiment;
FIG. 8 is a schematic diagram of an interface for authenticating a carefully report in one embodiment;
FIG. 9 is an interface diagram of an information reliability verification system in one embodiment;
FIG. 10 is a schematic diagram of an interface for information authentication result display in another embodiment;
FIG. 11 is a schematic interface diagram of a human authentication in one embodiment;
FIG. 12 is a flow chart of an artificial intelligence based information authentication method in another embodiment;
FIG. 13 is a block diagram of an information authentication device based on artificial intelligence in one embodiment;
fig. 14 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a machine controlled by a digital computer to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use the knowledge to obtain optimal results. In other words, artificial intelligence is an integrated technology of computer science that attempts to understand the essence of intelligence and to produce a new intelligent machine that can react in a similar way to human intelligence. Artificial intelligence, i.e. research on design principles and implementation methods of various intelligent machines, enables the machines to have functions of sensing, reasoning and decision.
The artificial intelligence technology is a comprehensive subject, and relates to the technology with wide fields, namely the technology with a hardware level and the technology with a software level. Artificial intelligence infrastructure technologies generally include, for example, sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, pre-training model technologies, operation/interaction systems, mechatronics, and the like. The pre-training model is also called a large model and a basic model, which refers to a deep neural network (Deep neural network, DNN) with large parameters, the deep neural network is trained on massive unlabeled data, the PTM extracts common characteristics on the data by utilizing the function approximation capability of the large-parameter DNN, and the deep neural network is suitable for downstream tasks through technologies such as fine tuning (fine tuning), efficient fine tuning (PEFT) and prompt-tuning. Therefore, the pre-training model can achieve ideal effects in a small sample (Few-shot) or Zero sample (Zero-shot) scene. PTM can be classified according to the data modality of the process into a language model (ELMO, BERT, GPT), a visual model (swin-transducer, viT, V-MOE), a speech model (VALL-E), a multi-modal model (ViBERT, CLIP, flamingo, gato), etc., wherein a multi-modal model refers to a model that builds a representation of the characteristics of two or more data modalities. The pre-training model is an important tool for outputting Artificial Intelligence Generation Content (AIGC), and can also be used as a general interface for connecting a plurality of specific task models. The artificial intelligence software technology mainly comprises a computer vision technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
Computer Vision (CV) is a science of studying how to "look" a machine, and more specifically, to replace human eyes with a camera and a Computer to perform machine Vision such as recognition, following and measurement on a target, and further perform graphic processing, so that the Computer is processed into an image more suitable for human eyes to observe or transmit to an instrument to detect. As a scientific discipline, computer vision research-related theory and technology has attempted to build artificial intelligence systems that can acquire information from images or multidimensional data. The large model technology brings important innovation for the development of computer vision technology, and a pre-trained model in the vision fields of swin-transformer, viT, V-MOE, MAE and the like can be rapidly and widely applied to downstream specific tasks through fine tuning. Computer vision techniques typically include image processing, image recognition, image semantic understanding, image retrieval, OCR, video processing, video semantic understanding, video content/behavior recognition, three-dimensional object reconstruction, 3D techniques, virtual reality, augmented reality, synchronous positioning, and map construction, among others, as well as common biometric recognition techniques such as face recognition, fingerprint recognition, and others.
Key technologies to the speech technology (Speech Technology) are automatic speech recognition technology (ASR) and speech synthesis technology (TTS) and voiceprint recognition technology. The method can enable the computer to listen, watch, say and feel, is the development direction of human-computer interaction in the future, and voice becomes one of the best human-computer interaction modes in the future. The large model technology brings revolution for the development of the voice technology, and WavLM, uniSpeech and other pre-training models which use a transducer architecture have strong generalization and universality and can excellently finish voice processing tasks in all directions.
Natural language processing (Nature Language processing, NLP) is an important direction in the fields of computer science and artificial intelligence. It is studying various theories and methods that enable effective communication between a person and a computer in natural language. The natural language processing relates to natural language, namely the language used by people in daily life, and is closely researched with linguistics; and also to computer science and mathematics. An important technical pre-training model for artificial intelligence domain model training is developed from a large language model (Large Language Model) in the NLP domain. Through fine tuning, the large language model can be widely applied to downstream tasks. Natural language processing techniques typically include text processing, semantic understanding, machine translation, robotic questions and answers, knowledge graph techniques, and the like.
Machine Learning (ML) is a multi-domain interdisciplinary, involving multiple disciplines such as probability theory, statistics, approximation theory, convex analysis, algorithm complexity theory, etc. It is specially studied how a computer simulates or implements learning behavior of a human to acquire new knowledge or skills, and reorganizes existing knowledge structures to continuously improve own performance. Machine learning is the core of artificial intelligence, a fundamental approach to letting computers have intelligence, which is applied throughout various areas of artificial intelligence. Machine learning and deep learning typically include techniques such as artificial neural networks, confidence networks, reinforcement learning, transfer learning, induction learning, teaching learning, and the like. The pre-training model is the latest development result of deep learning, and integrates the technology.
With research and advancement of artificial intelligence technology, research and application of artificial intelligence technology is being developed in various fields, such as common smart home, smart wearable devices, virtual assistants, smart speakers, smart marketing, unmanned, autopilot, unmanned, digital twin, virtual man, robot, artificial Intelligence Generated Content (AIGC), conversational interactions, smart medical, smart customer service, game AI, etc., and it is believed that with the development of technology, artificial intelligence technology will be applied in more fields and with increasing importance value.
The scheme provided by the embodiment of the application relates to the technologies of artificial intelligence, such as computer vision technology, voice technology, natural language processing technology, machine learning technology and the like, so as to identify the credibility of various kinds of information, and is specifically described by the following embodiment.
The information identification method based on artificial intelligence provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be provided separately, may be integrated on the server 104, and may be located on a cloud or other server. When information identification processing is required, a user can trigger information input through the terminal 102, an information identification interaction area can be displayed in the specific terminal 102, an information input inlet suitable for inputting information of at least one information category is included in the information identification interaction area, information input operation can be triggered aiming at the information input inlet in the information identification interaction area, the terminal 102 responds to the information input operation triggered by the user on the information input inlet, an identification description area is displayed, an information identification result is displayed in the identification description area, and the information identification result describes the credibility of input information input by the information input operation. Specifically, the information authentication result may include a first information authentication result for describing reliability quantization information of the input information and a second information authentication result; the second information authentication result is used for describing a credibility analysis process for the input information. The information authentication result may be obtained by the server 104 for authentication analysis, the specific terminal 102 may send the input information to the server 104, the server 104 performs information authentication on the input information, and feeds back the obtained information authentication result to the terminal 102, where the terminal 102 displays the information authentication result fed back by the server 104 in an authentication description area. In addition, the information authentication result may also be directly obtained by the terminal 102 for performing authentication analysis, that is, the terminal 102 may perform information authentication on the input information alone, and display the obtained information authentication result in the authentication description area.
The terminal 102 may be, but not limited to, various desktop computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In an exemplary embodiment, as shown in fig. 2, an information authentication method based on artificial intelligence is provided, where the method is performed by a computer device, specifically, may be performed by a computer device such as a terminal or a server, or may be performed by the terminal and the server together, and in this embodiment, the method is applied to the terminal in fig. 1, and is described by taking the following steps 202 to 206 as an example. Wherein:
step 202, displaying an information identification interaction area, wherein the information identification interaction area comprises an information input port suitable for inputting information of at least one information category.
Wherein, the information authentication refers to the process of authenticating the information credibility of various kinds of information, and the various kinds of information can include but are not limited to at least one of text, image, audio or video. Information credibility refers to the credibility or reliability of the information, and is also called the authenticity, accuracy, credibility or reliability of the information. In the process of information transmission and sharing, the information credibility is a very important factor, and directly influences the acceptance and use of information by people. Verifiability of information is also an important factor in the trustworthiness of information. If the information can be verified or validated, the credibility of the information is correspondingly improved; conversely, if the information cannot be verified or validated, the trustworthiness of the information is also reduced. In the information transmission and sharing process, attention is required to improve the credibility of the information so as to ensure the accuracy and reliability of the information.
The information authentication interaction area is an area supporting the user to perform information authentication interaction operation, and may specifically include an information authentication interaction interface. The information category refers to the category of information, and can be specifically classified according to the mode of the information, for example, various information can be classified into text, image, audio or video. The information input inlet is used for inputting information to carry out information identification, a user can input information required for carrying out credibility identification through the information input inlet, and the information input inlet can be particularly displayed in various forms such as an input box, an uploading control and the like.
Specifically, the terminal may display the information authentication interaction area, and specifically, may indicate that the information authentication process is required when the user needs to perform the information authentication, for example, when the user triggers an operation for an information authentication entry in the terminal, and the terminal may display the information authentication interaction area. An information entry portal may be included in the information authentication interaction region, the information entry portal being adapted for entry of information of at least one information category. In a specific implementation, the information authentication interaction area may include at least one information entry portal, and each information entry portal may support entry of information of at least one information category. For example, 1 information entry portal may be included in the information authentication interaction region, the information entry portal supporting entry of information of one or at least two categories of information; for another example, the information authentication interaction area may include at least two information input entries, where each information input entry may support the input of information of one or at least two information categories, respectively. Information belonging to different information categories can be input through information input inlets in different forms, and the forms of the information input inlets in the information identification interaction area can be flexibly configured according to the information categories supported to be input.
Step 204, displaying an authentication description area in response to an information entry operation triggered for the information entry portal.
The information input operation can be used for triggering corresponding identification processing aiming at the input information, and specifically can be realized by triggering aiming at the information input entrance by a user, for example, the user can click the information input entrance to trigger the information input operation. The authentication description area is used for displaying authentication results for the entered information.
Optionally, the user may trigger interaction with respect to the information input portal, for example, the user may trigger information input operations such as clicking, long pressing, double clicking, dragging, etc. with respect to the information input portal, and the terminal displays an identification description area for displaying an identification result in response to the information input operation of the user. In a specific application, the identification description area may be directly displayed in an interface to which the information identification interaction area belongs, or may be displayed in an interface different from the interface to which the information identification interaction area belongs. The display mode, the position distribution and the like of the identification description area can be configured according to actual needs.
Step 206, displaying an information authentication result for describing the credibility of the input information in the authentication description area; the information is input and is information to be identified which is input by an information input operation through an information input inlet; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing credibility quantization information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information.
The information identification result is used for describing the credibility of the input information, namely the information identification result is an identification result for carrying out credibility identification on the input information. The input information is information to be authenticated, and is specifically input by an information input operation through an information input entrance. The identification description area may include at least one area to display different kinds of information identification results, and the specific identification description area may include a first description area and a second description area to display two different information identification results, i.e., a first information identification result and a second information identification result. The shapes, sizes, distributions, etc. of the first description area and the second description area may be configured according to actual needs.
The first information identification result describes reliability quantization information of the input information, the reliability quantization information can be quantization results obtained by quantizing the reliability of the input information, the reliability of the input information can be intuitively evaluated from a quantization angle through the reliability quantization information, and the reliability quantization information can specifically comprise various types of quantization results such as scores, levels and the like of the reliability. The second information authentication result is used for describing a reliability analysis process for the input information, wherein the reliability analysis process is a process for analyzing the reliability of the input information by a pointer, and specifically can comprise a process for performing reliability analysis by utilizing the reference information. Through the second information identification result, the credibility analysis process for the input information can be intuitively displayed, so that the identification process of the information identification result can be clearly determined.
The terminal displays, in the authentication description area, an information authentication result for the input information, which is to be authenticated, input by the information input operation through the information input portal, the information authentication result describing the credibility of the input information. For example, the information authentication result may include at least one of a reliability score of the entered information or a reliability analysis process record of the entered information. In a specific implementation, the terminal can detect an information input operation triggered by a user aiming at the information input entrance so as to determine input information to be authenticated, which is input by the user through the information input entrance, according to the information input operation, the terminal can send the input information to the server so as to carry out information authentication on the input information by the server and feed back an information authentication result to the terminal, and the terminal can also directly carry out information authentication on the obtained input information so as to obtain an information authentication result. And for the obtained information authentication result, the terminal displays the information authentication result in an authentication description area.
In a specific application, as shown in fig. 3, an information identification interaction area 301 is displayed in the terminal, and the information identification interaction area 301 includes an information input entry 302, where the information input entry 302 is used for inputting information to be identified, and in particular, information editing or uploading can be performed by clicking the information input entry 302. After the user inputs the input information to be authenticated through the information input entry 302 and clicks "submit", an information input operation is triggered, and the terminal displays an authentication description area 303 in the floating layer interface in response to the information input operation. In the authentication description area 303, an information authentication result 304 describing the credibility of the entered information is shown.
Further, the identification description area displayed by the terminal comprises a first description area, the terminal can display a first information identification result describing the credibility quantization information of the input information in the first description area, and particularly can display a text, a picture, a video and the like describing the credibility score of the input information. In a specific implementation, after the terminal obtains the information identification result aiming at the input information, the terminal can divide the information identification result into types so as to divide corresponding description areas according to the types of the information identification result included in the information identification result and display the information identification result aiming at the information identification result. Specifically, when determining the first information authentication result including the reliability quantization information describing the entry information in the information authentication result, the terminal may determine the first description area from the authentication description area and display the first information authentication result in the first description area.
The identification description area displayed by the terminal comprises a second description area, the terminal can display a second information identification result describing a credibility analysis process aiming at the input information in the second description area, and particularly can display a comparison record for comparing the input information with various reference information to carry out credibility identification aiming at the input information. In a specific implementation, after the terminal obtains the information authentication result for the input information and determines that the information authentication result includes a second information authentication result describing a credibility analysis process for the input information, the terminal may determine a second description area from the authentication description area and display the second information authentication result in the second description area.
In a specific application, as shown in fig. 4, the authentication description area 401 includes a first description area 403 and a second description area 404, and the terminal may display a first information authentication result describing the reliability quantization information of the input information in the first description area 403, and may specifically display a description sentence of "the reliability of the input information is 80%"; the terminal may present in the second description area 404 a second information authentication result describing a process of reliability analysis for the input information, which may describe a process of reliability analysis for the input information by a sentence. The first information identification result describing the credibility quantification information of the input information and the second information identification result describing the credibility analysis process of the input information are respectively displayed in different areas of the identification description area, so that the information identification results aiming at different dimensions of the input information can be intuitively displayed, the operation of information identification under different dimensions is simplified, and the processing efficiency of information identification is improved.
In the above-described information authentication method based on artificial intelligence, in response to an information input operation triggered to an information input entry in a displayed information authentication interaction area, an authentication description area is displayed, and an information authentication result is displayed in the authentication description area, the information authentication result describing the credibility of input information input by the information input operation, the information authentication result including a first information authentication result describing credibility quantization information of the input information, and a second information authentication result describing a credibility analysis process for the input information. In the information identification processing process, the information to be identified is input through the information input entry triggering information input operation, so that the information identification processing aiming at the credibility of the information to be identified is realized, the information identification operation is simplified, and the information identification processing efficiency is improved.
In an exemplary embodiment, the first information authentication result includes first focus content; the second information identification result comprises second focus content; as shown in fig. 5, the process of displaying the information authentication result, that is, in the authentication description area, displaying the information authentication result for describing the credibility of the input information, includes:
step 502, in a first description area of the identification description area, highlighting and displaying the first focus content according to a focus displaying mode matched with the first focus content, and displaying the content except the first focus content in the first information identification result according to a non-focus displaying mode.
The information identification result may include focal content having a critical importance, where the focal content included in the first information identification result is a first focal content. The focus display mode is a display mode for highlighting focus content by a pointer, and specifically, the focus display mode can include one or more display modes, and specifically can include at least one of thickening, changing font color, changing font size, adding underlining, tilting font, and adding background color for text. The focus presentation mode is more prominently presented than the non-focus presentation mode, thereby efficiently presenting the focus content. The respective display modes of the focus display mode and the non-focus display mode can be flexibly configured according to actual needs.
Alternatively, the first information authentication result may include a first focus content and a first non-focus content, the first focus content being a content of high importance in the first information authentication result, and the first non-focus content being a content other than the first focus content in the first information authentication result. For the first focus content, the terminal can perform highlighting display according to a focus display mode of photographic adaptation in a first description area; for the first non-focus content, the terminal can display the first non-focus content according to a non-focus display mode in the first description area. In a specific implementation, the terminal may determine whether the first information authentication result includes the first focus content, and the first focus content may be determined based on keyword analysis with respect to the first information authentication result. When the first information identification result is determined to include the first focus content, the terminal can query a focus display mode matched with the first focus content and highlight the first focus content in the first description area according to the focus display mode. And for the contents except the first focus content in the first information identification result, the terminal can determine a non-focus display mode and display the first non-focus content in the first description area according to the non-focus display mode.
And 504, highlighting and displaying the second focus content in a second description area of the identification description area according to a focus display mode matched with the second focus content, and displaying the contents except the second focus content in the second information identification result according to a non-focus display mode.
Wherein the focal content included in the second information authentication result is the second focal content. Specifically, the second information authentication result may include second focus content and second non-focus content, the second focus content being content of high importance in the second information authentication result, and the second non-focus content being content other than the second focus content in the second information authentication result. For the second focus content, the terminal can perform highlighting in a second description area according to a focus display mode of photographic adaptation; for the second non-focus content, the terminal may display the second non-focus content in the second description area according to the non-focus display mode. In a specific implementation, the terminal may determine whether the second focus content is included in the second information authentication result, and the second focus content may be determined based on keyword analysis with respect to the second information authentication result. And when the second information identification result comprises the second focus content, the terminal can inquire a focus display mode matched with the second focus content and highlight the second focus content in the second description area according to the focus display mode. And for the contents except the second focus content in the second information identification result, the terminal can determine a non-focus display mode and display the second non-focus content in the second description area according to the non-focus display mode.
In a specific application, as shown in fig. 4, the first focal content in the first information authentication result may be a confidence score, and in the first description area 403, the first focal content, that is, the confidence score "80%" may be highlighted in a focal display manner of a larger font. For the second focus content included in the second information authentication result, the terminal may also focus on highlighting in the second description area 404 by italics, underline addition, font thickening, and other focus display manners.
In this embodiment, the terminal highlights and displays the focal content in each of the first information authentication result and the second information authentication result according to the respective adaptive focal display mode, which is favorable for efficiently displaying the focal content with high importance in the information authentication result and improving the display effect of the information authentication result.
In one exemplary embodiment, an authentication details entry is included in the authentication description area; the information identification method based on artificial intelligence further comprises the following steps: displaying an authentication detail information area in response to a triggering operation of the authentication detail entry; in the authentication detail information area, an information authentication detail record for the input information is displayed.
The identification description area further comprises an identification detail inlet, wherein the identification detail inlet is an inlet for triggering to check information identification detail records aiming at the input information, and the identification detail inlet can specifically comprise various interface interaction elements such as various buttons, switches and the like. The information authentication details record records the detailed content of the information authentication processing for the input information, and the source of the information authentication result can be determined through the information authentication details record. The authentication detail information area is an area for showing information authentication detail records.
The terminal also displays an identification detail entry in the identification description area, and the user can trigger the identification detail entry, for example, the user can click on the identification detail entry, the terminal responds to the trigger operation of the user for the identification detail entry to display an identification detail information area, and the terminal displays an information identification detail record for the input information in the identification detail information area, so that an identification detailed process of how to obtain the information identification result is displayed through the information identification detail record. In specific implementation, the terminal can detect the identification detail entrance to determine whether the user triggers the operation for the identification detail entrance, and when detecting the triggering operation for the identification detail entrance by the user, the terminal displays the identification detail information area according to a preset area display mode, wherein the area display mode can comprise information such as an interface displayed by the identification detail information area, and the shape, the size, the distribution position and the like of the identification detail information area. The terminal further acquires information identification detail records of the input information, and arranges and displays the acquired information identification detail records in an identification detail information area.
In one specific application, as shown in fig. 4, an identification details entry 402 is further included in the identification description area 401, the identification details entry 402 is specifically an interface interaction element in the form of a button, the user can click on the identification details entry 402, the terminal displays an identification details information area in response to a triggering operation of the user, and an information identification details record of the input information is displayed in the identification details information area.
In this embodiment, the terminal displays the identification details information area in response to a trigger operation for the identification details entry in the identification description area, and displays the information identification details record of the input information in the identification details information area, thereby supporting efficient and intuitive display of the identification details process for obtaining the information identification result.
In one exemplary embodiment, displaying an authentication description area in response to an information entry operation triggered for an information entry portal includes: responding to an information input operation triggered by an information input entry, and displaying input information input through the information input operation; an authentication description area is displayed in response to an information authentication trigger event for the entered information.
The input information is input through the information input entrance by information input operation. The information identification triggering event is an event triggering information identification processing aiming at the input information, and specifically can comprise various types of events such as input information submitting operation triggered by a user, meeting input information submitting conditions and the like. The information authentication triggering event can be set according to actual needs, and can be set to be generated by interaction operation triggering of a user or set to be generated by automatic triggering when preset conditions such as time, place and authority are met.
The user can trigger an information input operation on the information input entrance to input the information to be identified through the information input entrance, the terminal responds to the information input operation triggered by the information input entrance to acquire the input information input through the information input operation, and the terminal can display the acquired input information so as to timely feed back the input condition of the user. The terminal can detect whether an information authentication triggering event is generated, and when the information authentication triggering event is detected, the terminal can display an authentication description area according to the information authentication processing aiming at the input information. In a specific application, before the information identification triggering event is detected, the terminal keeps displaying the recorded recording information and supports the user to modify and adjust the recorded recording information, and when the information identification triggering event is detected, the identification description area is displayed again so as to display the information identification result of the recording information.
In a specific application, as shown in fig. 6, two information input entries, namely a text input box 602 and a media uploading control 603, are displayed in the information authentication interaction area 601, and when a user inputs information to be authenticated through the respective information input entries, the terminal can display the input information in the information authentication interaction area 601, and can specifically display that the recorded hundred-meter record of the character "a university" to be authenticated is x. "and the medium to be authenticated, may include, in particular, images, audio, video, etc.
In the embodiment, the terminal displays the input information input through the information input operation, and responds to the information authentication triggering event to display the authentication description area, so that the input information can be displayed in time, the accuracy of the input information can be ensured, and the reliability of information authentication is ensured.
In one exemplary embodiment, the information entry portal includes a text entry box; in response to an information entry operation triggered for an information entry, presenting entry information entered by the information entry operation, comprising: displaying text to be identified input through the text editing operation in the text input box in response to the text editing operation triggered for the text input box; in response to an information authentication trigger event for the entered information, displaying an authentication description area comprising: and displaying an identification description area in response to a text identification triggering event of the text to be identified.
The information input entry comprises a text input box, wherein the text input box is used for editing and inputting texts to be identified. The text editing operation is an operation of performing text editing with respect to a text input box, through which a text to be authenticated can be input in the text input box. The text to be authenticated is text-like information entered by the user that needs to be directed to the trust authentication process. The text authentication triggering event is an event that triggers information authentication processing for an inputted text to be authenticated.
Specifically, the user can trigger a text editing operation on a text input box in the information input inlet so as to input the information to be identified through the text input box, the terminal responds to the text editing operation triggered by the text input box to acquire the text to be identified input through the text editing operation, and the terminal can display the acquired text to be identified in the text input box in real time so as to feed back the input condition of the user in time. The terminal can detect whether a text authentication triggering event is generated, and when the text authentication triggering event is detected, the terminal can display an authentication description area according to the information authentication processing of the text to be authenticated.
In a specific application, as shown in fig. 6, an information entry in the form of a text input box 602 is displayed in the information authentication interaction area 601, a user can click on the text input box 602 to perform text editing, and the terminal displays the input text 602a to be authenticated in the text input box 602 in response to the user's text editing operation for the text input box 602. Upon detection of a text authentication triggering event, the terminal may further display an authentication description area.
In this embodiment, the terminal displays the text to be identified input through the text editing operation in the text input box, and displays the identification description area in response to the text identification triggering event, so that the input text to be identified can be displayed in time, the accuracy of the text to be identified can be ensured, and the reliability of identification of the text information is ensured.
In one exemplary embodiment, the information entry portal includes a media upload control; in response to an information entry operation triggered for an information entry, presenting entry information entered by the information entry operation, comprising: responding to the triggering operation for the media uploading control, and displaying a media selecting operation area; responding to the media selection operation triggered in the media selection operation area, and displaying the media mark of the media to be authenticated, which is selected and uploaded by the media selection operation; in response to an information authentication trigger event for the entered information, displaying an authentication description area comprising: in response to a media authentication trigger event for a media flag, an authentication description area is displayed.
The information input inlet comprises a media uploading control, wherein the media uploading control is used for uploading various media to be authenticated, and can specifically comprise at least one of images, audios and videos. The media selection operation area is an operation area in which a user performs media selection, and in the media selection operation area, the user can select media that needs to be uploaded for authentication processing. The media selecting operation is an operation of selecting media to be authenticated, which is triggered in a media selecting operation area, and the media local to the terminal can be uploaded for authentication processing through the media selecting operation. The media to be identified is media information which is selected by a user and needs to be uploaded for identification processing, and the media mark is mark information for identifying each media to be identified, and can be specifically various mark information such as a shrinkage chart, an icon and the like. Different media to be authenticated can be configured with different media tags, so that different media to be authenticated can be effectively distinguished by the media tags. The media authentication triggering event is an event that triggers information authentication processing for the uploaded media to be authenticated.
Optionally, the user may trigger an operation on a media upload control in the information input portal, the terminal responds to the trigger operation to display a media selection operation area, the user may locally select media upload from the terminal through the media selection operation in the media selection operation area to perform authentication processing, and the terminal responds to the media selection operation triggered by the user in the media selection operation area to fetch the media to be authenticated selected to be uploaded through the media selection operation. For the media to be identified, the terminal can allocate a corresponding media mark and instantly display the media mark of the media to be identified so as to feed back the uploading condition of the user in time. The terminal can detect whether a media identification triggering event aiming at the media mark is generated, and when the media identification triggering event is detected, the terminal indicates that information identification processing can be carried out aiming at the media to be identified which is indicated by the media mark, and the terminal displays an identification description area.
In a specific application, as shown in fig. 6, an information input port in the form of a media uploading control 603 is displayed in the information authentication interaction area 601, a user may click on the media uploading control 603 to trigger media uploading, and the terminal displays a media identifier of the media to be authenticated in the information authentication interaction area 601, specifically may include an image identifier 603a, an audio identifier 603b and a video identifier 603c for the media to be authenticated selected to be uploaded by the user. Upon detection of a media authentication trigger event, the terminal may further display an authentication description area.
In this embodiment, the terminal displays the media identifier of the media to be authenticated, which is uploaded through the media uploading control, and displays the authentication description area in response to the media authentication triggering event, so that the uploaded media to be authenticated can be identified in time, the accuracy of the media to be authenticated can be ensured, and the reliability of media information authentication is ensured.
In one exemplary embodiment, the presentation information identifies an interaction area, comprising: responsive to an information authentication triggering event, displaying an information authentication interaction region; wherein the information authentication interaction area comprises at least one information entry portal, each of the at least one information entry portal being adapted to enter information of at least one information category.
The information authentication triggering event is an event triggering information authentication processing, and specifically may be generated by triggering through interactive operation by a user, or may be generated by automatically triggering when a preset condition is reached, such as reaching a preset time and place.
For example, the terminal may detect whether an information authentication trigger event is generated, and upon detecting the information authentication trigger event, the terminal may present an information authentication interaction region. In the information authentication interaction area, one or more information entry ports are included, each of which is adapted to enter information of at least one information category.
In this embodiment, the terminal responds to the information authentication triggering event, displays the information authentication interaction area including at least one information input port, and each information input port is suitable for inputting information of at least one information category, so as to support a user to input at least one or at least one information through the information input port, and simplify the operation of information authentication, thereby being beneficial to improving the processing efficiency of information authentication.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: displaying information authentication operation prompts in an authentication prompt area of the information authentication interaction area; and the information identification operation prompt is used for guiding the information to be identified to be input through the information input entrance for information identification.
The information identification interaction area further comprises an identification prompt area, and the identification prompt area is used for displaying information identification operation prompts for guiding information to be identified to be input through the information input entrance. Specifically, the terminal can display an information authentication operation prompt in an authentication prompt area of the information authentication interaction area so as to guide a user to input information to be authenticated through the information input entrance through the information authentication operation prompt for information authentication. For example, the information authentication operation prompt may include a description sentence, and specifically may include "operation instruction: please input the information to be identified, click to confirm the completion of the information input, the system will perform the automatic identification.
In this embodiment, the terminal prompts through the information authentication operation to guide the user to input the information to be authenticated through the information input port for information authentication, which is beneficial to reducing the learning difficulty of the information authentication operation and improving the processing efficiency of information authentication.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: responding to a manual identification triggering event aiming at the authority account, and displaying a manual identification operation area aiming at the authority account; responding to manual identification editing operation of the authority account number aiming at the input information in a manual identification operation area, and displaying a manual identification result obtained through the manual identification editing operation; responding to a confirmation event of the manual identification result, and displaying a feedback result of the manual identification result; the manual authentication result is used as an information authentication result to be displayed in the authentication description area.
The manual identification triggering event is an event for triggering manual identification of the information to be identified, and specifically can be generated by actively triggering a right account with triggering authority, or can be generated by triggering when a preset condition is met, for example, when the information to be identified is determined to belong to sensitive information, the manual identification condition can be considered to be met, so that the manual identification triggering event is generated; in other words, when the automatic identification of the information to be identified is abnormal, and the specific error is generated, the manual identification condition can be considered to be satisfied, so that a manual identification triggering event is generated. For manual identification of information to be identified, a right account with manual identification right is required to be processed. The manual authentication operation area is an operation area for a user holding a right account to manually authenticate information to be authenticated. The manual identification editing operation is identification processing triggered by a user with a permission account for information to be identified, and a manual identification result is obtained through the manual identification editing operation. The manual authentication result may be an information authentication result obtained by manually authenticating the information to be authenticated by the user who holds the authority account. The confirmation event is an event for confirming the manual identification result by a pointer, for example, the confirmation event can be generated according to the confirmation operation of the user with the authority account for the manual identification result, and can also be automatically generated when a confirmation condition is met, for example, the confirmation event can be generated for the manual identification result by the terminal when a preset time length is reached after the manual identification editing operation of the user with the authority account is finished, and the confirmation condition is met. The feedback result is used for describing the result of feeding back the manual identification result, and specifically can comprise various types of results such as successful submission of the manual identification result, failure in submission of the manual identification result, submission of the manual identification result and the like.
The terminal may detect whether a manual authentication trigger event is generated for a right account with manual authentication, and upon detecting the manual authentication trigger event, the terminal may display a manual authentication operation area for the right account, so that a user holding the right account performs manual authentication for input information in the manual authentication operation area. The user with the authority account can trigger manual identification editing operation aiming at the input information in the manual identification operation area to perform manual identification, and the terminal acquires the manual identification result generated through the manual identification editing operation and displays the manual identification result. The user with the permission account can confirm the manual identification result, for example, the user can trigger the confirmation operation on the manual identification result so as to generate a confirmation event, and when the terminal detects the confirmation event, the user can feed back the manual identification result to the terminal initiating the input information and display the obtained feedback result. After the manual identification result is fed back to the terminal initiating the input information, the manual identification result can be used as the information identification result to be displayed in an identification description area of the terminal initiating the input information.
In this embodiment, the terminal supports the permission account with the manual identification permission to perform manual identification on the input information, so that the accuracy of information identification can be further ensured.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: displaying at least one authentication basis content in an authentication description area; the information authentication result is obtained for the input information by referring to at least one authentication basis content.
The information authentication result is obtained for the input information by referring to at least one authentication basis content, wherein the authentication basis content is referred to when the information authentication is carried out for the input information, namely, the credibility authentication for the input information is realized by referring to at least one authentication basis content. For example, if the input information is text a, the at least one authentication basis may include information of various sources and various forms, so that the information authentication result for the text a is obtained by checking the at least one authentication basis for the text a to determine the credibility of the information authentication result.
Alternatively, the terminal may present at least one authentication basis content for the input information in the authentication description area so that the user can further confirm the information authentication result based on the authentication basis content. In specific implementation, the number of the authentication basis contents can be displayed according to actual needs, and the displayed authentication basis contents can comprise various contents such as key contents of the corresponding authentication basis, sources of the authentication basis and the like. In one specific application, as shown in fig. 7, an authentication description area 702 and a presentation area 703 are included in the authentication description area 701; the terminal displays the information authentication result describing the credibility of the input information in the authentication description area 702, and the terminal can display the authentication basis content for the input information in the basis display area 703, and specifically displays four authentication basis contents for the input information. In the basis presentation area 703, at least part of the contents are presented for each authentication basis content, respectively, and a source description of each authentication basis content is presented.
In this embodiment, the terminal displays at least one identification basis content for the input information, so that the validity of the information identification result can be quickly confirmed, and the accuracy of information identification can be improved.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: presenting at least one access entry associated with the authentication by content in an authentication description area; in response to a triggering operation of the access portal, at least one authentication basis content is accessed.
The access entry is associated with the authentication-based content and is used for directly and quickly accessing the original content of the authentication-based content. For example, authentication by content 1 comes from the A website, then authentication by content 1 can be accessed by quickly entering the A website through the access portal associated with authentication by content 1. The specific form of the access entrance can be flexibly set according to actual needs, such as buttons, hyperlinks and the like.
Alternatively, the terminal may present an access entry associated with the authentication-based content in the authentication description area, e.g. may present a hyperlink associated with the authentication-based content in the authentication description area, through which quick access may be made to the associated authentication-based content. In a specific application, an associated access entry may be set for each authentication basis content, i.e. the authentication basis content corresponds one-to-one to the access entries, each access entry being used for accessing the associated authentication basis content. In addition, access portals supporting bulk access may be provided, i.e. each access portal may be associated with a plurality of authentication basis contents, through which the plurality of authentication basis contents may be accessed quickly. In specific implementation, the association relationship between the access entry supporting batch access and the plurality of authentication basis contents can be set by default, and the adjustment is supported by the user, that is, the user can adjust the association relationship between the access entry and each authentication basis content, so as to adjust each authentication basis content accessible through the access entry. The user can trigger operation aiming at the displayed access entrance, for example, the user can click on the access entrance, the terminal responds to the triggering operation of the user on the access entrance, the terminal accesses the authentication basis content associated with the access entrance with the triggering operation, the specific terminal can determine the authentication basis content needing to be accessed according to the association relation between the access entrance and the authentication basis content, inquire the access address of the authentication basis content, and access the corresponding authentication basis content through the access address.
In one specific application, as shown in fig. 7, an authentication description area 702 and a presentation area 703 are included in the authentication description area 701; the terminal displays the information authentication result describing the credibility of the input information in the authentication description area 702, and the terminal can display the authentication basis content for the input information in the basis display area 703, and specifically displays four authentication basis contents for the input information. In the basis presentation area 703 in the authentication description area 701, an associated access entry 704 is also presented for each authentication basis content, and the user can trigger access to the corresponding authentication basis content by clicking on the access entry 704, and the terminal jumps to display the access result for the corresponding authentication basis content.
In this embodiment, the terminal displays the access entry associated with the authentication basis content, and responds to the triggering operation of the access entry, and the terminal accesses the corresponding authentication basis content, so that quick access to the authentication basis content can be realized.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: responsive to a formatting triggering operation for an information authentication result, displaying an authentication report for formatting of the entered information; the authentication report includes at least one of authenticity evaluation information, credibility quantization information, authentication basis content, authentication time or credibility analysis process record of the input information.
The formatting triggering operation is an operation of triggering information authentication results aiming at input information to convert and generate formatted contents, and specifically, a formatting conversion control aiming at the information authentication results can be set, and a user clicks the formatting conversion control to realize the formatting triggering operation aiming at the information authentication results, so that the information authentication results are converted and generate formatted contents. The authentication report is a formatted content generated by converting the information authentication result of the input information, and the authentication report can carry out authentication description on the information authentication result of the input information according to a preset fixed format. The authenticity evaluation information may be information for performing overall evaluation on the authenticity of the input information, such as "true" or "false", etc.; the reliability quantization information may be a quantization result obtained by quantizing the reliability of the input information; the authentication basis content is referred to when information authentication is performed on the input information; the authentication time can be the time for performing authentication aiming at the triggering of the input information, specifically can be the triggering time of the information input operation, can also be the generation time of the information authentication result, and the like; the reliability analysis process record is descriptive of the reliability analysis process for the entered information.
Specifically, the user may interact with the information authentication result, and may specifically generate a format trigger operation with respect to the information authentication result, e.g., the user may click on a format conversion control associated with the information authentication result. And the terminal responds to the formatting triggering operation of the user for the information authentication result, and displays the formatted authentication report for the input information. The authentication report may be generated according to a preset fixed format based on the input information and the information authentication result, and specifically may be generated according to a preset report template based on the input information and the information authentication result. When the terminal detects the formatting triggering operation of the user, the terminal can determine the corresponding target report template based on the formatting triggering operation, and adjust the input information and the information authentication result according to the fixed format in the target report template, so as to generate a formatted authentication report. The authentication report may include at least one of authenticity evaluation information, reliability quantification information, authentication basis content, authentication time, and reliability analysis process record of the input information. The user can utilize the authentication report to conduct the treatment such as rhyme and clarification aiming at the authenticity of the input information.
In one specific application, as shown in fig. 8, in an authentication report 801 generated for the input information, the input information for the authentication, specifically, text information 802, is displayed, and a hundred meter record of "university a" is x. The authentication report 801 also displays a seal content 803, and the seal content 803 includes the authenticity evaluation information of the input information and the authentication time, the authenticity evaluation information of the text information 802 is "true", and the authentication time is "2023.10.27". Also displayed in the certification authority report 801 is certification authority content 804, which specifically includes 4 pieces of certification authority content of different sources.
In this embodiment, the terminal responds to a formatted triggering operation of the user on the information authentication result, and displays a formatted authentication report, where the authentication report may include at least one of authenticity evaluation information, reliability quantification information, authentication basis content, authentication time or reliability analysis process record of the input information, so as to facilitate the processing such as daylighting and clarification of the information authentication result of the input information by the formatted authentication report.
In one exemplary embodiment, the information authentication interaction area includes an information source replenishment entry therein; the information identification method based on artificial intelligence further comprises the following steps: responding to an information source editing operation triggered by the information source supplementing inlet, and displaying the information source of the input information edited by the information source editing operation; displaying the source identification result in an identification description area; the source authentication result is used for describing the credibility of the information source of the input information.
Wherein the information source supplementing portal is a portal for supplementing the source of the entered information, through which the user can supplement the source of the entered information for authentication of the source of the entered information. The information source editing operation is an operation triggered by the information source supplementing inlet and is used for supplementing editing for the source of the input information. The information sources are sources added by a user for input information through an information source supplement inlet, and can specifically comprise various information platforms. The source identification result is an identification result obtained by identifying the information source of the input information, the source identification result is used for describing the credibility of the information source of the input information, and the higher the credibility of the information source of the input information is, the higher the credibility of the input information is.
Illustratively, the information source supplement entry is further included in the information authentication interaction area, and the user may trigger an information source editing operation for the information source supplement entry, for example, the user may click on the information source supplement entry to edit the information source, and the terminal may display, in response to the information source editing operation, the information source of the input information edited by the information source editing operation, where the information source may specifically be a network address, an information platform name, or the like. When the user triggers an information input operation for an information input entrance, the terminal responds to the information input operation and displays a source identification result for describing the credibility of the information source of input information in an identification description area. The identification result type in the source identification result can be at least partially the same as the information identification result, can be completely different, and can be specifically configured according to actual needs. For example, the source authentication result shown in the authentication description area may include reliability quantization information of the information source, and the specific reliability score may be 99.8%. In specific application, the source identification result can be used for carrying out auxiliary identification on the input information, namely the source identification result is combined for carrying out identification on the input information, and the higher the credibility of the information source is, the higher the credibility of the input information is.
In this embodiment, the terminal supports the user to edit the information source of the input information through the information source supplement portal, and displays the source identification result describing the credibility of the information source of the input information in the identification description area in response to the information source editing operation of the user, so that identification can be performed on the source of the input information, the applicable scene of information identification is expanded, and the accuracy of information identification is improved.
In one exemplary embodiment, the entered information includes at least two; in the authentication description area, an information authentication result for describing the credibility of the input information is presented, including: in the identification description area, according to the respective credibility quantization information of at least two pieces of input information, information identification results for describing the credibility of the at least two pieces of input information are arranged and displayed.
The input information input by the user through the information input inlet comprises at least two pieces, namely, the user inputs a plurality of pieces of information to be identified for batch identification. Specifically, in the batch authentication processing for a plurality of pieces of input information, each piece of input information includes respective corresponding information authentication results, and the information authentication results of the respective pieces of input information may be displayed in an arrangement in the authentication description area. The specific terminal can determine the respective credibility quantization information of each input information, and arrange and display the corresponding information identification results according to the credibility quantization information, for example, the information identification results of each input information can be arranged and displayed successively according to the sequence from large to small or from small to large of the credibility quantization information.
In this embodiment, for batch identification processing for multiple pieces of input information, the terminal arranges and displays the information identification results of each piece of input information according to the respective reliability quantization information of each piece of input information, so that multiple pieces of information can be displayed in order, and the display effect of each information identification result is improved.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: determining similar information matched with the input information from an information base; based on the historical information identification result of the similar information and text information determined according to the input information, generating corpus data to be identified, which is associated with the input information; and carrying out credibility identification according to the corpus data to be identified to obtain an information identification result.
The information base is a database for storing various historical information for completing authentication, and the historical information can comprise information of various modes such as texts, images, audios and videos. The similarity information is the history information which is determined from the information base and matched with the input information, and specifically can be the history information which meets the similarity judgment condition with the input information, for example, the similarity information can be the history information with the similarity exceeding the similarity threshold value with the input information. The history information authentication result is an information authentication result obtained by authenticating similar information in a history. The text information is determined based on the input information, and the text information specifically can comprise text content carried in the input information, for example, when the input information is a text to be identified, the text information can comprise the text to be identified and also can comprise keywords in the text to be identified. For another example, when the input information is the medium to be identified, the text information may include text content extracted based on the medium to be identified, e.g., for an image to be identified, the text information may be text content identified in the image to be identified; for the video to be identified, the text information may be text content identified in each frame of image of the video to be identified; for the audio to be authenticated, the text information may be text content obtained by speech recognition based on the audio to be authenticated. The corpus data to be identified is generated based on the historical information identification result and the text information of the input information, the corpus data to be identified is used for carrying out information identification processing on the input information, and the corpus data to be identified can comprise natural sentences expressed according to a preset corpus format, namely, credibility identification is carried out based on the corpus data to be identified so as to obtain the information identification result of the input information.
For example, when performing authentication processing for the input information input by the user, the terminal may determine similar information matched with the input information from the information base, and the specific terminal may match the input information with each history information in the information base, so as to determine the similar information from the information base according to the matching result. The terminal can acquire the historical information identification result of the similar information, and particularly can acquire the historical information identification result of the similar information by inquiring based on the similar information. In a specific implementation, the historical information identification results of each historical information can also be stored in the information base, and then the terminal can directly inquire from the information base to obtain the historical information identification results of similar information. The terminal obtains text information determined from the entered information, which may include text content extracted from the entered information. The terminal generates corpus data to be identified which is associated with the input information based on the historical information identification result and the text information of the similar information, specifically, the corpus data to be identified can be generated according to a preset corpus format and the historical information identification result and the text information, and the corpus data to be identified can comprise natural sentences expressed according to the corpus format. The terminal can perform credibility identification on the input information based on the generated corpus data to be identified, for example, the terminal can perform credibility identification on the corpus data to be identified through a credibility identification model which is completed through pre-training, and an information identification result for describing the credibility of the input information is obtained.
In this embodiment, the terminal may generate the corpus data to be identified according to the historical information identification result of the similar information matched with the input information and the text information determined according to the input information, perform reliability identification on the input information through the corpus data to be identified, and integrate the historical information identification result of the similar information and the text information to generate the corpus data to be identified to perform reliability identification, thereby being beneficial to improving accuracy of information identification.
In one exemplary embodiment, determining similar information from the information repository that matches the entered information includes: extracting input information characteristics of input information; performing feature matching on the input information features and the information features of each piece of history information in the information base to obtain feature matching results; and determining the historical information associated with the feature matching result of the characteristic feature matching as similar information matched with the input information.
The input information features are used for representing the characteristics of input information, different input information can have different input information features, and input information of different information types can be extracted by different feature extraction modes. For example, for the entry information of a video category, the entry information features may include, but are not limited to, at least one of color histogram features, optical flow features, deep learning features. The feature matching result is a result of feature matching between the input information feature and the information feature of each history information, and specifically may include, but is not limited to, at least one of a similarity value and a feature distance. The feature matching result can represent the feature matching degree between the input information and each piece of history information, and the similar information matched with the input information can be determined based on the feature matching result, for example, the history information corresponding to the feature matching result with the similarity value exceeding the similarity threshold value can be determined as the similar information matched with the input information; for another example, the history information corresponding to the feature matching result with the feature distance smaller than the distance threshold may be determined as similar information matched with the input information.
The terminal may perform feature extraction for the input information, and may specifically extract the input information feature from the input information by adopting a feature extraction manner adapted to the information category of the input information. For example, for the input information of the image category, the terminal can extract input information features such as a color histogram, texture features, shape features and the like from the input information according to a corresponding feature extraction algorithm; for the input information of the text category, the terminal can extract input information features from the input information by at least one of a Word bag model, a TF-IDF model (term frequency-inverse text frequency index) and a Word2Vec model. The terminal acquires the information characteristics of each piece of history information in the information base, and performs characteristic matching on the input information characteristics of the input information and the information characteristics of each piece of history information, for example, characteristic matching processing such as characteristic distance calculation or similarity calculation can be performed, and a characteristic matching result is obtained. The terminal determines the representation meaning of each feature matching result, and determines the historical information associated with the feature matching result of the feature matching as similar information matched with the input information.
In the embodiment, the terminal performs feature matching by using the input information features of the input information and the information features of the history information, and determines similar information matched with the input information based on the feature matching result, so that the similar information can be accurately determined from the information base based on the feature matching to perform information identification, and the accuracy of information identification is facilitated to be ensured.
In an exemplary embodiment, generating corpus data to be authenticated associated with the input information based on the historical information authentication result of the similar information and text information determined according to the input information includes: acquiring a historical information identification result of similar information, and determining text information according to the input information; determining a corpus format matched with the information category of the input information; and generating corpus data to be identified, which accords with the corpus format, based on the historical information identification result and the text information.
The terminal can acquire the historical information identification result of the similar information so as to utilize the historical information identification result of the similar information to carry out information identification processing on the input information. The corpus format is matched with the information category of the input information, and different information categories can correspond to different corpus formats, namely, corpus data to be identified in different corpus formats can be generated. The corpus format may represent sentence expressions of the corpus data to be identified. For example, for a video category, the corpus format may be "the existing video a, after the video is subjected to video similarity search, the similarity between the video and another video B is found to be%x, the text information of the video B is%y, the reliability of the video B is%z, the reliability analysis of the video B is%m, the text information of the current video a is%n, please help me to determine, the reliability of the video a and what is the basis of the reliability analysis? "
Specifically, the terminal may obtain a historical information identification result of the similar information, and specifically may directly query from an information base to which the similar information belongs to obtain the historical information identification result of the similar information. The terminal determines text information based on the input information, and specifically, can perform text analysis on the input information to obtain the text information. The terminal may determine the information category of the entered information and determine a corpus format that matches the information category of the entered information. The mapping relation between different information categories and corresponding corpus formats can be configured in advance according to actual needs. The terminal generates to-be-identified corpus data of the input information according to the corpus format based on the historical information identification result and the text information, wherein the to-be-identified corpus data accords with the corpus format matched with the information category of the input information.
In this embodiment, the terminal generates the corpus data to be identified according to the corpus format matched with the information category of the input information based on the historical information identification result of the similar information and the text information of the input information, so that the formatted corpus data to be identified is used for carrying out information identification on the input information, the pertinence of the corpus data to be identified can be improved, the expression capability of the corpus data to be identified can be enhanced, and the accuracy of information identification can be improved.
In one exemplary embodiment, determining text information from the entered information includes: determining a text information extraction mode matched with the information category of the input information; and obtaining the text information of the input information according to the text information extraction mode.
The text information extraction mode is an extraction mode for extracting text information aiming at the input information, and different information types can be suitable for different text information extraction modes, so that accurate text information can be extracted from the input information based on the specific text information extraction mode. Alternatively, the terminal may determine the information category of the input information and determine a text information extraction manner matching the information category of the input information. The mapping relation between different information categories and corresponding text information extraction modes can be configured in advance according to actual needs. The terminal obtains the text information of the input information according to the determined text information extraction mode, and specifically, text extraction can be carried out on the input information according to the text information extraction mode to obtain the text information. For example, for the input information of the video category, the terminal may decompose the video into images of one frame by one frame so as to perform text recognition on each frame, specifically, may perform text detection on each frame of image, find out text regions in each frame of image, perform text recognition on each text region, and convert each text region into a text format readable by a computer, thereby obtaining text information of the input information of the video category.
In the embodiment, the terminal obtains the text information of the input information according to the text information extraction mode matched with the information category of the input information, and can extract the accurate text information from the input information based on the text information extraction mode with pertinence, thereby ensuring the accuracy of information identification based on the text information.
In an exemplary embodiment, performing reliability identification according to corpus data to be identified to obtain an information identification result, including: acquiring a credibility identification model obtained based on historical corpus data training; and carrying out credibility identification on the corpus data to be identified through a credibility identification model to obtain an information identification result.
The reliability identification model is a model which is trained in advance based on historical corpus data, and specifically can be obtained by training various neural network algorithms, such as at least one algorithm selected from a cyclic neural network (RNN, recurrent Neural Network), a convolutional neural network (CNN, convolutional Neural Networks), a attention mechanism (transducer), a multi-layer perceptron (MLP, multilayer Perceptron), a Long Short-Term Memory (LSTM) or a gate-controlled cyclic unit (GRU, gate Recurrent Unit). The credibility identification model can be a natural language processing model, in particular a large language model, the working principle of the large language model is that text data is input, and after preprocessing, a neural network is used for training, so that a model capable of generating new text is finally obtained. The model can be applied to the fields of natural language generation, machine translation, voice recognition and the like.
Illustratively, the terminal may query the reliability evaluation model trained in advance based on the historical corpus data, e.g., the terminal may obtain a large language model trained in advance based on the historical corpus data. The terminal can perform reliability identification on the corpus data to be identified through a reliability identification model, specifically, the corpus data to be identified can be input into a large language model, so that the reliability identification is performed on the corpus data to be identified through the large language model, and an information identification result of input information is obtained through output of the large language model.
In this embodiment, the terminal performs the credibility identification on the corpus data to be identified through the credibility identification model obtained through pre-training, so that the processing efficiency of information identification can be effectively improved based on the neural network model.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: and storing the input information and the information authentication result into an information authentication database.
The information identification database is a database for storing input information and corresponding information identification results, and the information identification database can be an information database for storing historical information. Specifically, the terminal may query a preset information authentication database, and store the input information and the information authentication result into the information authentication database. In a specific application, the information authentication database may be an information database storing historical information, and the terminal may store the input information and the corresponding information authentication result into the information database.
In this embodiment, the terminal stores the input information and the information authentication result in the information authentication database to store the information authentication result, so that the data security of the information authentication result can be ensured.
In an exemplary embodiment, the artificial intelligence based information authentication method further includes: and generating an information identification log of the input information according to the input information and the information identification result.
The information identification log is a log for recording credibility identification processing aiming at the input information, and can be specifically generated according to the input information and the information identification result. Specifically, the terminal may generate an information authentication log of the input information based on the input information and the information authentication result, and the information authentication log may be used to record the present authentication process of the input information in detail. In the embodiment, the terminal records the input information and the information identification result through the information identification log, so that the information identification log can be used for carrying out formatting management on the input information and the information identification result, and obstacle removal and state recording on the information identification processing are facilitated.
The application scene is provided with the information identification method based on artificial intelligence. Specifically, the application of the information identification method based on artificial intelligence in the application scene is as follows:
False information or inheritance of no facts generally refers to misleading the audience's information by distorting, kneading or forging facts. As internet technology goes deep into the aspects of people's life, the events of making false information increase dramatically, and the spread of false information presents a blowout growth, which brings potential risks to social stability. At present, the rumor act relies mainly on manual verification to clarify and rumor, but official rumors are often delayed, and no actual inauguration may have been caused. In addition, the massive and complex social media data presents a great challenge to traditional manual rhyme and false information detection techniques.
The information identification method provided by the embodiment provides an information credibility identification tool and system based on a large language model, and the information credibility is rapidly analyzed and judged by combining two technical means of information similarity retrieval and large language model assistance.
Specifically, for the information similarity retrieval part, the information identification method provided by the embodiment realizes similarity retrieval of videos, pictures and texts. In video similarity retrieval, similarity between two videos is calculated by converting the videos into a digital format, extracting key frames or key points, converting the key frames or key points into feature vectors which can be calculated, and using a similarity algorithm such as cosine similarity, euclidean distance, and the like. In picture similarity retrieval, similarity between two or more pictures is calculated using a similarity algorithm by converting the pictures into a digital format and extracting key points or feature vectors. In text similarity retrieval, similarity between two or more texts is calculated by converting the texts into a digital format and using a similarity algorithm.
Specifically for the large language model analysis section, the news information without the fact basis is collected, and the news information includes news contents without the fact basis, propagation paths, audiences and the like. A large language model is constructed based on the deep learning technology, and the model can automatically learn the rules and modes of the language, so that high-quality texts are generated. The collected biography information without the fact is input into a language model, so that the model automatically learns the characteristics and modes of the biography without the fact, and the model can automatically generate the rumor information according to the learned characteristics and modes of the biography without the fact. Such information includes facts, evidence, sources, etc. to allow the audience to understand and accept. The large language model is a natural language processing technology based on deep learning, and can predict and generate texts by training a large amount of corpus data. The large language model generally adopts a cyclic neural network or variant, such as a long-short-time memory network and a gating cyclic unit, so as to capture context information in a text sequence, thereby realizing the tasks of natural language text generation, language model evaluation, text classification, emotion analysis and the like. In the field of natural language processing, large language models have been widely used, such as speech recognition, machine translation, automatic abstracts, dialog systems, intelligent questions and answers, and the like.
Under the business scene of network ballad, the current solution completely depends on manual information retrieval and reliability judgment, an operator needs to watch videos, pictures or texts, understand the information by human brain, analyze the information, and assist in searching related data to assist in analysis, and finally obtain a reliability conclusion, but the method has the problems of complex operation, low efficiency and insufficient accuracy.
The information authentication method provided in this embodiment will be improved from these 3 aspects: 1, operation is simplified: according to the information identification method provided by the embodiment, only an operator is required to input data to be analyzed into the platform, all follow-up actions are automatic tasks, and no complex operation is required as an operator; 2, efficiency is improved: the similarity retrieval related to the information identification method provided by the embodiment is completed through a big data storage analysis platform, the reliability analysis relies on the judgment of a big language model, manual intervention is not needed at all, all operation flows are automatically executed, and the efficiency is greatly improved through the methods; 3, accuracy enhancement: the similarity retrieval of the information identification method provided by the embodiment is completed through the big data storage analysis platform, manual similarity comparison is not relied on, retrieval deviation cannot be caused by personal perception of different operators, in addition, the reliability analysis relies on judgment of a big language model, manual intervention is not needed at all, and reliability analysis fluctuation cannot be caused by different personal analysis capacities of different operators. The accuracy guarantee of the credibility analysis is realized through the two key points.
As shown in fig. 9, the operation page for reliability identification according to the present embodiment may display a plurality of information input entries on an operation interface of the information reliability identification system, where each information input entry may support information of one information category to be input. The user can fill in the form in the operation interface of the information credibility authentication system, specifically after inputting the text to be authenticated, uploading the picture or video, clicking "submit" to complete the data input. As shown in fig. 10, an interface of the information reliability appraisal result is an interface for judging input information by calling a large language model, reliability (values 0 to 100) and reliability analysis text content are output, and a user can obtain the reliability analysis result on a front end interface of WEB service. Information identification results for the input information can be displayed below an operation interface of the information credibility identification system, and specifically can include "through detailed analysis of the information credibility identification system, you input new information credibility is: 80%; the credibility analysis is as follows: XXX … … ' interactive control of ' view details ' can be displayed on the operation interface of the information credibility identification system, and a user can click on the control to trigger to view the detailed analysis content aiming at the input information.
Further, as shown in fig. 11, in the case that the system reliability cannot be confirmed, the reliability information is required to be manually input into the page, if necessary, the reliability and reliability analysis text after manual analysis are input, and click submission is completed to input analysis information. If the confidence level and the confidence level analysis text cannot be obtained after the confidence level analysis is performed by scheduling the large language model, a manual analysis process is required to be performed. After manually analyzing the text, the picture and the video, the user inputs the text, the picture and the video on a manual analysis interface, and clicks and submits the text, the picture and the video to finish inputting analysis information.
Further, as shown in fig. 12, a flow chart of the information authentication method in this embodiment specifically includes the following steps:
in step 1201, information input is triggered, specifically, the user triggers to enter in the information authentication interaction area. When the user needs to carry out information authentication, the terminal can display an information authentication interaction area, and an information input inlet can be included in the information authentication interaction area and is suitable for inputting information of at least one information category.
Step 1202, determining whether the input information is video file information, i.e. determining whether the input information is information of a video category;
Step 1203, obtaining video content and history identification information similar to the input video from the information base, specifically, when the input information is information of video category, searching for video similarity, thereby obtaining video content and history identification information similar to the input video.
Specifically, the user can trigger interaction aiming at the information input entrance, such as the user can trigger clicking, long-pressing, double-clicking, dragging and other information input operations aiming at the information input entrance, so as to input the information to be identified. The terminal can identify the category to which the input information belongs. When the input information is determined to be the information of the video category, the terminal can determine similar information matched with the input information from the information base, and particularly aims at video similarity retrieval, so that video content and history identification information similar to the input video are obtained.
Step 1204, determining whether the input information is picture file information, i.e. determining whether the input information is information of a picture category;
step 1205, obtaining the picture content and the history identification information similar to the input picture from the information base, specifically, when the input information is the information of the picture category, searching the picture similarity, thereby obtaining the picture content and the history identification information similar to the input picture;
Specifically, for the input information to be authenticated, which is input by the user, the terminal can identify the category to which the input information belongs. When the input information is determined to be the information of the picture category, the terminal can determine similar information matched with the input information from the information base, and particularly, the terminal performs picture similarity retrieval, so that picture content and history identification information similar to the input picture are obtained.
Step 1206, determining whether the input information is text information, i.e. determining whether the input information is text category information;
step 1207, obtaining text content and history identification information similar to the input text from the information base, specifically, when the input information is text category information, searching for text similarity, thereby obtaining text content and history identification information similar to the input text;
specifically, for the input information to be authenticated, which is input by the user, the terminal can identify the category to which the input information belongs. When the input information is determined to be the text type information, the terminal can determine similar information matched with the input information from the information base, and particularly aims at text similarity retrieval, so that text content and history identification information similar to the input text are obtained.
At step 1208, upon detecting that no valid data input is directly ignored, the flow is forcibly terminated, thereby ending the process. If no effective data input is detected, the user can be considered to input effective input information, and the information identification processing cannot be performed, so that the information identification processing flow can be finished in time.
Step 1209, constructing a targeted corpus, including similarity search results and data of the input information.
Specifically, after determining similar information matched with the input information, the terminal may generate corpus data to be identified associated with the input information based on a historical information identification result of the similar information and text information determined according to the input information. The corpus data to be identified can comprise natural sentences expressed according to a preset corpus format, namely, credibility identification is carried out based on the corpus data to be identified so as to obtain an information identification result of the input information. The specific terminal can execute corpus construction engineering, namely, the promtt engineering according to the input information, and the corpus construction engineering content can comprise at least one of similarity retrieval result data, similarity values, text information, credibility or credibility analysis to construct corresponding corpus, namely, the Prompt corpus, so as to obtain corpus data to be identified, which are associated with the input information.
Step 1210, calling a large language model, inputting the corpus and the required text into the large language model to obtain credibility and credibility analysis results, and specifically, carrying out credibility identification on the constructed corpus and the required text through the large language model trained in advance;
and the terminal performs credibility identification according to the corpus data to be identified associated with the input information to obtain an information identification result of the input information. Specifically, the terminal performs credibility identification on corpus data to be identified through a credibility identification model which is completed through pre-training, and an information identification result for describing credibility of input information is obtained. The credibility identification model can be a natural language processing model, and concretely can be a large language model, the working principle of the large language model is that text data is input, after pretreatment, a neural network is used for training, and finally a model capable of generating new text is obtained, so that corpus and required text are input into the large language model through calling the large language model, credibility and credibility analysis results can be obtained, and information identification results aiming at input information are obtained.
Step 1211, it is determined whether or not the reliability and reliability analysis result are obtained.
In step 1212, the system directly displays the credibility and the credibility analysis result after the analysis of the large language model on the interface, that is, when the credibility and the credibility analysis result are obtained, the system can directly display.
Specifically, when the terminal determines that the credibility and the credibility analysis result are obtained based on the large language model, that is, the information identification result for the input information is obtained, the terminal can display an identification description area, and display the information identification result for describing the credibility of the input information in the identification description area. The information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing credibility quantization information of the input information, and specifically can comprise credibility in a numerical form; the second information authentication result is used for describing a credibility analysis process for the input information, and specifically may include an analysis statement of credibility.
In step 1213, a manual analysis is introduced, and the system obtains the credibility and credibility analysis content of the manual analysis, that is, when the credibility and credibility analysis result is not obtained, a manual identification can be introduced.
When the terminal determines that the credibility and the credibility analysis result are not obtained based on the large language model, the terminal can introduce manual analysis. Specifically, when the manual authentication triggering event is detected, the terminal can display a manual authentication operation area aiming at the authority account, so that a user holding the authority account can perform manual authentication aiming at the input information in the manual authentication operation area. The user with the authority account can trigger manual identification editing operation aiming at the input information in the manual identification operation area to perform manual identification, and the terminal acquires the manual identification result generated through the manual identification editing operation and displays the manual identification result as the information identification result aiming at the input information.
Step 1214, storing the input information and the large language model analysis result or the manual analysis result thereof to the data storage management platform, thereby realizing the data storage aiming at the information identification result.
The terminal can query an information authentication database preset by the data storage management platform and store the input information and the information authentication result into the information authentication database. The information authentication database may be an information database storing history information, and the terminal may store the input information and the corresponding information authentication result into the information database.
And 1215, writing the execution result into a database after the execution is completed, and recording log information in a log file.
Specifically, the terminal may generate an information authentication log of the input information based on the input information and the information authentication result, and record the present authentication processing of the input information in the form of a log file through the information authentication log.
Further, the process of invoking the large language model to perform credibility authentication, that is, step 1210 may specifically include: step 1210a, training data preparation, specifically preparing a large amount of text data as training data and industry technical data; step 1210b, creating a dictionary, specifically counting and counting the vocabulary appearing in all text fragments, and creating the dictionary for training; step 1210c, constructing a model, specifically using a neural network to construct a large language model, and setting parameters such as the size of a hidden layer, learning rate, etc. when constructing the model; step 1210d, training the model, specifically inputting the prepared training data into the model for training, and using the methods of dropout, batch normalization and the like to improve the training effect; and step 1210e, predicting, namely converting the text segment into a digital sequence after specific training is completed, and inputting the digital sequence into a large language model for calculation to obtain a prediction result, wherein the prediction result specifically comprises a credibility and credibility analysis result aiming at the input information.
Specifically, for the information input section, by building a web service, an information input page is provided which allows a user to input characters, pictures, and videos on one page. After the user inputs the text, the picture and the video to be authenticated, the related information enters the background of the information authentication method system provided by the embodiment, and specific authentication operation is performed.
For video similarity retrieval processing, the type of information input by a user is specifically determined, if a video file is input, video similarity retrieval is firstly carried out, and video content and history identification information similar to the input video are obtained from an information base of a data storage management platform.
Video similarity retrieval is a retrieval method based on video content, which can quickly find videos similar to given videos in a large-scale video library, and the main idea is to convert the videos into digital feature vectors and then perform retrieval by calculating the similarity between the feature vectors. The method comprises the following specific steps:
(1) Video segmentation: the video is divided into a plurality of short time segments, typically each segment having a length of a few seconds to tens of seconds.
(2) Feature extraction: for each video clip, it is converted to a digital feature vector using video processing techniques. The feature extraction method used in the information authentication method provided in this embodiment includes a color histogram, an optical flow feature, a deep learning feature, and the like.
(3) Feature matching: and comparing the feature vectors of the video to be retrieved with the feature vectors of all videos in the video library, and calculating the similarity between the feature vectors. The similarity calculation method used in the information identification method provided by the embodiment includes euclidean distance, cosine similarity, correlation coefficient and the like, and specifically three kinds of similarity calculation are adopted respectively to obtain a similarity value and average the similarity value.
(4) Search and sequencing: and ordering the videos in the video library according to the similarity calculation result, and ordering the video most similar to the video to be searched in the front. The information authentication method provided in this embodiment takes one result with the highest similarity, the obtained similarity analysis result is shown in table 1 below,
TABLE 1
(5) Extracting characters: the video is preprocessed, including noise removal, brightness and contrast adjustment, and the like, so as to improve the accuracy of character recognition. Then, the video is decomposed into images frame by frame so as to perform character recognition on each frame, then each frame of image is subjected to character detection, the character areas are found out, each character area is subjected to character recognition, and the character areas are converted into a computer-readable text format. And finally, correcting the recognized text to improve the recognition accuracy. The video text information is used as a material of a prompt project when a large language model is called.
For the picture similarity retrieval processing, the type of information input by a user is specifically determined, if a picture file is input, picture similarity retrieval is firstly carried out, and picture content and history identification information similar to the input picture are obtained from an information base of a data storage management platform.
Picture similarity retrieval is a retrieval method based on image content, which can quickly find images similar to a given image in a large-scale image library, and the main idea is to convert the images into digital feature vectors and then perform retrieval by calculating the similarity between the feature vectors. The method comprises the following steps:
(1) Feature extraction: the image is converted into digital feature vectors using image processing techniques. The feature extraction method adopted by the information identification method provided by the embodiment includes a color histogram, texture features, shape features, and the like.
(2) Feature matching: and comparing the feature vectors of the images to be retrieved with the feature vectors of all the images in the image library, and calculating the similarity between the feature vectors. The similarity calculation method used in the information identification method provided by the embodiment includes euclidean distance, cosine similarity, correlation coefficient and the like, and specifically three kinds of similarity calculation are adopted respectively to obtain a similarity value and average the similarity value.
(3) Search and sequencing: and ordering the images in the image library according to the similarity calculation result, and arranging the image most similar to the image to be retrieved in the front. The information authentication method provided in this embodiment takes one result with the highest similarity, the obtained similarity analysis result is shown in table 2 below,
TABLE 2
Picture ID ID of picture stored in database
Picture linking Picture download link capable of downloading artificial analysis
Similarity degree Similarity score between 0 and 100
Literal information Text content in pictures
Confidence level Confidence score, between 0 and 100
Reliability analysis Manually analyzing content and marker information for confidence scores
(4) Extracting characters: firstly, preprocessing the picture, including removing noise, adjusting brightness and contrast and the like, so as to improve the accuracy of character recognition. The picture is then split into individual characters or words for text recognition of each character or word. Each character or word is then text-recognized and converted to a computer-readable text format. And correcting the recognized text to improve the recognition accuracy. And finally combining the texts identified in each character or word to form complete picture text information. The picture text information is used as a prompt engineering material in the calling large language model.
And for text similarity retrieval processing, specifically determining the type of information input by a user, if text content is input, performing text similarity retrieval, and acquiring text content and history identification information similar to the input text from a data storage management platform information base.
Natural language text similarity retrieval is a text content-based retrieval method that can quickly find text similar to a given text in a large-scale text library, the main idea being to convert the text into digital feature vectors and then retrieve by calculating the similarity between the feature vectors. The method comprises the following steps:
(1) Text preprocessing: for the text to be retrieved and all the texts in the text library, some preprocessing work needs to be performed, including word segmentation, stop word removal, stem extraction and the like.
(2) Feature extraction: text is converted to digital feature vectors using natural language processing techniques. The feature extraction method adopted by the information identification method provided by the embodiment comprises a Word bag model, a TF-IDF model, a Word2Vec model and the like.
(3) Feature matching: and comparing the feature vectors of the text to be retrieved with the feature vectors of all texts in the text library, and calculating the similarity between the feature vectors. The similarity calculation method of the information identification method provided by the embodiment includes cosine similarity, jaccard similarity, editing distance and the like, and specifically includes that three kinds of similarity calculation are adopted respectively to obtain similarity values and average values.
(4) Search and sequencing: and sequencing the texts in the text library according to the similarity calculation result, and sequencing the text most similar to the text to be searched in the front. The information authentication method provided in this embodiment takes one result with the highest similarity, the obtained similarity analysis result is shown in table 3 below,
TABLE 3 Table 3
Text ID Text stored ID in database
Text linking Text download link capable of downloading manual analysis
Similarity degree Similarity score between 0 and 100
Literal information Specific content of text
Confidence level Confidence score, between 0 and 100
Reliability analysis Manually analyzing content and marker information for confidence scores
The text information is used as a prompt engineering material for calling a large language model.
For the Prompt engineering process, the Prompt of a large language model refers to a text segment or Prompt provided to launch the large language model. The prompt may be a word, a phrase, a sentence, a paragraph, or even an entire article. The large language model will generate a complete text from the prompt that will conform as much as possible to the topic, mood and style of the prompt. In practice, the promtt is often carefully designed according to the user's needs and application scenario to ensure that the generated text meets the specific needs and requirements.
In the information identification method provided by the embodiment, different Prompt information modes are required to be respectively constructed for videos, pictures and characters to be transmitted, so that a large language model can globally know all relevant information in the credibility verification process, and a more complete question-answering effect is obtained.
(1) Video Prompt corpus example:
in the prior art, after video similarity retrieval is performed on a video A, the similarity between the video A and another video B is found to be%x, the text information of the video B is%y, the reliability of the video B is%z, the reliability analysis of the video B is%m, the text information of the current video A is%n, please help me judge, and the reliability of the video A and the reliability analysis basis are described?
(2) Picture Prompt corpus example:
in the prior art, after searching the picture similarity, finding the similarity between the picture and another picture B as%x, the text information of the picture B as%y, the reliability of the picture B as%z, the reliability analysis of the picture B as%m, the text information of the current picture A as%n, please help me judge, the reliability of the picture A and explain what is the basis of the reliability analysis?
(3) Text promtt corpus example:
in the prior art, after video similarity retrieval is performed on a video, the similarity between the video and another text B is found to be%x, the text information of the text B is%y, the reliability of the text B is%z, the reliability analysis of the text B is%m, the text information of the current text A is%n, please help me judge, the reliability of the text frequency A and explain the reliability analysis basis is?
For the process of calling the large language model, a request is initiated to the large language model specifically carrying the Prompt information, and finally the large language model predicts and generates an answer. The working principle of the large language model is simply to input text data, and training is performed by using a neural network after preprocessing, so that a model capable of generating a new text is finally obtained. The model can be applied to the fields of natural language generation, machine translation, voice recognition and the like. The large language model is a natural language processing model based on a neural network, and the working principle of the large language model can be summarized into the following steps:
(1) Training data preparation: first, a large amount of text data, which is a technical corpus related to instruction execution of the information authentication method provided in the present embodiment, is purposefully added in addition to conventional natural corpus (web page, news, novel, etc.), needs to be prepared as training data. And (3) carrying out preprocessing work such as cleaning, word segmentation, stop word removal and the like on the data to obtain a series of text fragments.
(2) Establishing a dictionary: and counting the words appearing in all the text fragments, and establishing a dictionary, wherein each word in the dictionary generates a unique number for subsequent training.
(3) And (3) constructing a model: the neural network is used to construct large language models, most commonly a Recurrent Neural Network (RNN), which has memory capabilities that can memorize previous inputs, thereby affecting subsequent outputs. In building the model, parameters such as the size of the hidden layer, the learning rate, etc. need to be set.
(4) Training a model: the prepared training data is input into the model for training, and the model continuously adjusts parameters so as to minimize errors between predicted results and actual results of the model. In the training process, skills such as dropout, batch normalization and the like are used to improve the training effect of the model.
(5) And (3) predicting: after training is completed, the model can make predictions. For a given text segment, the text segment may be converted to a digital sequence and input into a model for calculation to obtain a predicted result.
When the model is specifically called, the input parameters are sent to the large language model to obtain the model understanding and predicting results, the large language model obtaining model is packaged by the information authentication method provided by the embodiment, and the calling mode of an HTTP (Hypertext Transfer Protocol ) interface is externally provided, so that an HTTP request is directly constructed, and the input parameters are written in the Body part of the HTTP request message. The large language model firstly analyzes the HTTP request, extracts the input parameters in the Body message, then carries out understanding and prediction, and returns the final result to the calling party in the mode of HTTP Response message.
In the information authentication method provided in this embodiment, by calling a large language model, input information is determined, and confidence (value 0 to 100) and confidence analysis text content are output, so that a user can obtain a confidence analysis result on a front-end interface of WEB page service
For data storage processing, in the information storage functional module, the information authentication method provided by the embodiment constructs a special data storage management platform based on cloud computing and distributed storage technology, and can support operations such as storage, management, query and the like of a large amount of multimedia data such as texts, pictures and videos. The following is the working principle of the large text picture video storage management platform in the information authentication method provided by the embodiment:
for data storage processing, a specific platform uses a distributed storage technology to store data in a scattered manner on a plurality of nodes so as to improve the reliability and access speed of the data. Data storage typically employs object storage technology in which data is stored in object storage devices, each object having a unique identifier through which the data can be accessed and managed.
For data management processes, the platform provides a series of data management functions including data upload, download, delete, copy, move, etc. Data management typically operates using a Web interface or API (Application Programming Interface ) interface, and a user can manage his own data by a simple operation.
For data query processing, the platform supports functions of full text retrieval, metadata query and the like of data, and a user can query own data through conditions of keywords, tags, time and the like. Data queries typically employ search engine technology in which metadata of the data is stored for quick retrieval and querying.
For data security processing, the platform adopts multi-level security measures to protect the data security of users. The data security includes measures such as data backup, data encryption, access control and the like to protect the user's data from risks such as damage, loss, illegal access and the like.
For data analysis processing, the platform supports analysis and mining of data so that users find valuable information from the data. Data analysis typically employs data mining and machine learning techniques to cluster, classify, predict, etc., data to provide more accurate data analysis results.
Aiming at videos, pictures and texts, the information authentication method provided by the embodiment designs three different storage structures in a large data storage management platform:
the video may be as shown in table 4 below,
TABLE 4 Table 4
Video ID Video stored ID in database
Video data Video data body for similarity retrieval
Literal information Text content in video
Confidence level Confidence score, between 0 and 100
Reliability analysis Manually analyzing content and marker information for confidence scores
The pictures can be as shown in table 5 below,
TABLE 5
Picture ID ID of picture stored in database
Picture data Picture data body for similarity retrieval
Literal information Text content in pictures
Confidence level Confidence score, between 0 and 100
Reliability analysis Manually analyzing content and marker information for confidence scores
As can be seen from table 6 below,
TABLE 6
Through the structured storage structure, efficient retrieval processing such as video similarity retrieval, picture similarity retrieval, text similarity retrieval and the like can be realized. And outputting contents such as data ID, data connection, data similarity, credibility analysis and the like after each retrieval is completed.
And in the running process of the information credibility identification system, the log information is recorded in detail in the log file. The log rank may be as shown in table 7 below, with log information being recorded in detail in the log file during system operation.
TABLE 7
The log is mainly used for system daily barrier removal and status record, the classification of log content can be shown in the following table 8,
TABLE 8
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides an artificial intelligence based information authentication device for implementing the above mentioned information authentication method based on artificial intelligence. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitations in the embodiments of one or more artificial intelligence based information authentication devices provided below may be referred to above for limitations of the artificial intelligence based information authentication method, and will not be described herein.
In one exemplary embodiment, as shown in fig. 13, there is provided an artificial intelligence based information authentication apparatus 1300, comprising: an authentication interaction region presentation module 1302, an authentication description region presentation module 1304, and an information authentication result presentation module 1306, wherein:
the identification interaction region display module 1302 is configured to display an information identification interaction region, where the information identification interaction region includes an information input entry suitable for inputting information of at least one information category;
an authentication description area presentation module 1304 for displaying an authentication description area in response to an information entry operation triggered for an information entry portal;
an information authentication result display module 1306, configured to display, in an authentication description area, an information authentication result for describing the credibility of the input information; the information is input and is information to be identified which is input by an information input operation through an information input inlet; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing credibility quantization information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information.
In one embodiment, the first information authentication result includes first focus content; the second information identification result comprises second focus content; the information authentication result display module 1306 is further configured to highlight and display, in a first description area of the authentication description area, the first focal content according to a focal display manner adapted to the first focal content, and display, in a non-focal display manner, contents other than the first focal content in the first information authentication result; and in a second description area of the identification description area, highlighting and displaying the second focus content according to a focus display mode matched with the second focus content, and displaying the contents except the second focus content in the second information identification result according to a non-focus display mode.
In one embodiment, the authentication description area includes an authentication detail entry therein; the authentication detail interaction module is used for responding to the triggering operation of the authentication detail entry and displaying an authentication detail information area; in the authentication detail information area, an information authentication detail record for the input information is displayed.
In one embodiment, the authentication description area presentation module 1304 is further configured to, in response to an information entry operation triggered for the information entry portal, present the entry information entered by the information entry operation; an authentication description area is displayed in response to an information authentication trigger event for the entered information.
In one embodiment, the information entry portal includes a text entry box; the authentication description area presenting module 1304 is further configured to present, in response to a text editing operation triggered for the text input box, the text to be authenticated input through the text editing operation in the text input box; and displaying an identification description area in response to a text identification triggering event of the text to be identified.
In one embodiment, the information entry portal includes a media upload control; the authentication description area display module 1304 is further configured to display a media selection operation area in response to a trigger operation for the media upload control; responding to the media selection operation triggered in the media selection operation area, and displaying the media mark of the media to be authenticated, which is selected and uploaded by the media selection operation; in response to a media authentication trigger event for a media flag, an authentication description area is displayed.
In one embodiment, the authentication interaction zone presentation module 1302 is further configured to present the information authentication interaction zone in response to an information authentication triggering event; wherein the information authentication interaction area comprises at least one information entry portal, each of the at least one information entry portal being adapted to enter information of at least one information category.
In one embodiment, the system further comprises a manual authentication module for displaying a manual authentication operation area for the authority account in response to a manual authentication trigger event for the authority account; responding to manual identification editing operation of the authority account number aiming at the input information in a manual identification operation area, and displaying a manual identification result obtained through the manual identification editing operation; responding to a confirmation event of the manual identification result, and displaying a feedback result of the manual identification result; the manual authentication result is used as an information authentication result to be displayed in the authentication description area.
In one embodiment, the method further comprises an authentication basis module for displaying at least one authentication basis content in an authentication description area; the information authentication result is obtained for the input information by referring to at least one authentication basis content.
In one embodiment, the method further comprises an access portal interaction module for exposing at least one access portal associated with the authentication basis in the authentication description area; in response to a triggering operation of the access portal, at least one authentication basis content is accessed.
In one embodiment, the system further comprises an authentication reporting module for, in response to a formatted triggering operation for the information authentication result, presenting a formatted authentication report for the entered information; the authentication report includes at least one of authenticity evaluation information, credibility quantization information, authentication basis content, authentication time or credibility analysis process record of the input information.
In one embodiment, the information authentication interaction area includes an information source replenishment entry therein; the system further comprises a source identification module, a source editing module and a source identification module, wherein the source identification module is used for responding to an information source editing operation triggered by the information source supplementing inlet and displaying the information source of the input information edited by the information source editing operation; displaying the source identification result in an identification description area; the source authentication result is used for describing the credibility of the information source of the input information.
In one embodiment, the entered information includes at least two; the information authentication result display module 1306 is further configured to, in the authentication description area, display, in an array, information authentication results for describing the credibility of the at least two pieces of input information according to the credibility quantization information of each of the at least two pieces of input information.
In one embodiment, the system further comprises a credibility authentication module for determining similar information matched with the input information from the information base; based on the historical information identification result of the similar information and text information determined according to the input information, generating corpus data to be identified, which is associated with the input information; and carrying out credibility identification according to the corpus data to be identified to obtain an information identification result.
In one embodiment, the credibility authentication module is further used for extracting input information characteristics of the input information; performing feature matching on the input information features and the information features of each piece of history information in the information base to obtain feature matching results; and determining the historical information associated with the feature matching result of the characteristic feature matching as similar information matched with the input information.
In one embodiment, the credibility identification module is further used for acquiring historical information identification results of the similar information and determining text information according to the input information; determining a corpus format matched with the information category of the input information; and generating corpus data to be identified, which accords with the corpus format, based on the historical information identification result and the text information.
In one embodiment, the credibility identification module is further used for determining a text information extraction mode matched with the information category of the input information; and obtaining the text information of the input information according to the text information extraction mode.
In one embodiment, the credibility identification module is further used for acquiring a credibility identification model obtained based on the training of the historical corpus data; and carrying out credibility identification on the corpus data to be identified through a credibility identification model to obtain an information identification result.
In one embodiment, the method further comprises a storage module for storing the input information and the information authentication result in an information authentication database.
In one embodiment, the method further comprises a log processing module for generating an information authentication log of the input information according to the input information and the information authentication result.
The above-described modules in the artificial intelligence-based information authentication apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 14. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an artificial intelligence based information authentication method. The display unit of the computer equipment is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device, wherein the display screen can be a liquid crystal display screen or an electronic ink display screen, the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on a shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 14 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In an embodiment, there is also provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the method embodiments described above when the computer program is executed.
In one embodiment, a computer-readable storage medium is provided, storing a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method embodiments described above.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use, and processing of the related data are required to meet the related regulations.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (20)

1. An artificial intelligence based information authentication method, the method comprising:
displaying an information identification interaction area, wherein the information identification interaction area comprises an information input inlet suitable for inputting information of at least one information category;
responding to an information input operation triggered by the information input entrance, and displaying an identification description area;
Displaying an information authentication result for describing the credibility of the input information in the authentication description area;
the input information is information to be identified which is input by the information input operation through the information input entrance; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing reliability quantification information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information.
2. The method of claim 1, wherein the first information authentication result includes first focus content; the second information identification result comprises second focus content; and displaying an information authentication result for describing the credibility of the input information in the authentication description area, wherein the information authentication result comprises:
in a first description area of the identification description area, highlighting the first focus content according to a focus display mode matched with the first focus content, and displaying the content except the first focus content in the first information identification result according to a non-focus display mode;
And in a second description area of the identification description area, highlighting the second focus content according to a focus display mode matched with the second focus content, and displaying the contents except the second focus content in the second information identification result according to a non-focus display mode.
3. The method of claim 1, wherein the authentication description area includes an authentication detail entry therein; the method further comprises the steps of:
displaying an identification detail information area in response to a triggering operation of the identification detail inlet;
in the authentication detail information area, an information authentication detail record for the input information is displayed.
4. The method of claim 1, wherein the displaying an authentication description area in response to an information entry operation triggered for the information entry portal comprises:
responding to an information input operation triggered by the information input entrance, and displaying input information input through the information input operation;
an authentication description area is displayed in response to an information authentication trigger event for the entered information.
5. The method of claim 4, wherein the information entry portal comprises a text entry box; the responding to the information input operation triggered by the information input entrance shows the input information input by the information input operation, and comprises the following steps:
Displaying text to be authenticated input through the text editing operation in the text input box in response to the text editing operation triggered for the text input box;
said displaying an authentication description area in response to an information authentication trigger event for said entered information, comprising:
and displaying an identification description area in response to a text identification triggering event of the text to be identified.
6. The method of claim 4, wherein the information entry portal comprises a media upload control; the responding to the information input operation triggered by the information input entrance shows the input information input by the information input operation, and comprises the following steps:
responding to the triggering operation for the media uploading control, and displaying a media selecting operation area;
responsive to a media selection operation triggered in the media selection operation area, displaying a media flag of media to be authenticated selected for uploading by the media selection operation;
said displaying an authentication description area in response to an information authentication trigger event for said entered information, comprising:
an authentication description area is displayed in response to a media authentication trigger event for the media flag.
7. The method of claim 1, wherein the presentation information identifies an interaction region, comprising:
responsive to an information authentication triggering event, displaying an information authentication interaction region;
wherein the information authentication interaction area comprises at least one information entry portal, each of the at least one information entry portal being adapted to enter information of at least one information category.
8. The method according to claim 1, wherein the method further comprises:
responding to a manual identification triggering event aiming at a right account, and displaying a manual identification operation area aiming at the right account;
responding to manual identification editing operation of the authority account number aiming at the input information in the manual identification operation area, and displaying a manual identification result obtained through the manual identification editing operation;
responding to a confirmation event of the manual identification result, and displaying a feedback result of the manual identification result; the manual identification result is used as an information identification result to be displayed in the identification description area.
9. The method according to claim 1, wherein the method further comprises:
Displaying at least one authentication basis content in the authentication description area; the information authentication result is obtained for the input information according to content by referring to the at least one authentication basis.
10. The method according to claim 1, wherein the method further comprises:
responsive to a formatting triggering operation for the information authentication result, displaying a formatted authentication report for the entered information;
the authentication report comprises at least one of authenticity evaluation information, credibility quantification information, authentication basis content, authentication time or credibility analysis process record of the input information.
11. The method according to any one of claims 1 to 10, further comprising:
determining similar information matched with the input information from an information base;
generating corpus data to be identified, which is associated with the input information, based on the historical information identification result of the similar information and text information determined according to the input information;
and carrying out credibility identification according to the corpus data to be identified to obtain the information identification result.
12. The method of claim 11, wherein determining similar information from a library that matches the entered information comprises:
Extracting the input information characteristics of the input information;
performing feature matching on the input information features and the information features of each piece of history information in the information base to obtain feature matching results;
and determining historical information associated with the feature matching result of the characteristic feature matching as similar information matched with the input information.
13. The method of claim 11, wherein the generating corpus data to be identified associated with the input information based on the historical information authentication results of the similar information and the text information determined from the input information comprises:
acquiring a historical information identification result of the similar information, and determining text information according to the input information;
determining a corpus format matched with the information category of the input information;
and generating corpus data to be identified, which accords with the corpus format, based on the historical information identification result and the text information.
14. The method of claim 13, wherein said determining text information from said entered information comprises:
determining a text information extraction mode matched with the information category of the input information;
And obtaining the text information of the input information according to the text information extraction mode.
15. The method of claim 11, wherein the performing reliability identification according to the corpus data to be identified to obtain the information identification result includes:
acquiring a credibility identification model obtained based on historical corpus data training;
and carrying out credibility identification on the corpus data to be identified through the credibility identification model to obtain the information identification result.
16. The method of claim 1, further comprising at least one of:
storing the input information and the information identification result into an information identification database;
and generating an information identification log of the input information according to the input information and the information identification result.
17. An artificial intelligence based information authentication apparatus, the apparatus comprising:
the identification interaction region display module is used for displaying an information identification interaction region, and the information identification interaction region comprises an information input inlet suitable for inputting information of at least one information category;
the identification description area display module is used for responding to the information input operation triggered by the information input entrance and displaying an identification description area;
The information identification result display module is used for displaying information identification results for describing the credibility of the input information in the identification description area;
the input information is information to be identified which is input by the information input operation through the information input entrance; the information identification result comprises a first information identification result and a second information identification result; the first information identification result is used for describing reliability quantification information of the input information; the second information authentication result is used for describing a credibility analysis process for the input information.
18. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 16 when the computer program is executed.
19. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 16.
20. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the method of any one of claims 1 to 16.
CN202311477156.4A 2023-11-06 2023-11-06 Information identification method and device based on artificial intelligence and computer equipment Pending CN117520544A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311477156.4A CN117520544A (en) 2023-11-06 2023-11-06 Information identification method and device based on artificial intelligence and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311477156.4A CN117520544A (en) 2023-11-06 2023-11-06 Information identification method and device based on artificial intelligence and computer equipment

Publications (1)

Publication Number Publication Date
CN117520544A true CN117520544A (en) 2024-02-06

Family

ID=89744973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311477156.4A Pending CN117520544A (en) 2023-11-06 2023-11-06 Information identification method and device based on artificial intelligence and computer equipment

Country Status (1)

Country Link
CN (1) CN117520544A (en)

Similar Documents

Publication Publication Date Title
Mu A survey of recommender systems based on deep learning
CN111753060B (en) Information retrieval method, apparatus, device and computer readable storage medium
CN111708873B (en) Intelligent question-answering method, intelligent question-answering device, computer equipment and storage medium
US11645314B2 (en) Interactive information retrieval using knowledge graphs
WO2020147428A1 (en) Interactive content generation method and apparatus, computer device, and storage medium
US9965717B2 (en) Learning image representation by distilling from multi-task networks
CN112131350B (en) Text label determining method, device, terminal and readable storage medium
WO2021000497A1 (en) Retrieval method and apparatus, and computer device and storage medium
US10776707B2 (en) Language translation based on search results and user interaction data
US11769018B2 (en) System and method for temporal attention behavioral analysis of multi-modal conversations in a question and answer system
CN109034203B (en) Method, device, equipment and medium for training expression recommendation model and recommending expression
CN112231569B (en) News recommendation method, device, computer equipment and storage medium
US20220138432A1 (en) Relying on discourse analysis to answer complex questions by neural machine reading comprehension
US20220050833A1 (en) Dynamically suppressing query answers in search
US20200012862A1 (en) Multi-model Techniques to Generate Video Metadata
CN112307770A (en) Sensitive information detection method and device, electronic equipment and storage medium
WO2021129411A1 (en) Text processing method and device
WO2023173554A1 (en) Inappropriate agent language identification method and apparatus, electronic device and storage medium
CN117520544A (en) Information identification method and device based on artificial intelligence and computer equipment
Ding et al. DialogueINAB: an interaction neural network based on attitudes and behaviors of interlocutors for dialogue emotion recognition
CN112861474A (en) Information labeling method, device, equipment and computer readable storage medium
US20240121125A1 (en) Data analytics platform for stateful, temporally-augmented observability, explainability and augmentation in web-based interactions and other user media
CN117649567B (en) Data labeling method, device, computer equipment and storage medium
Chennam Lakhsmikumar Fake news detection a deep neural network
Gowroju et al. Artificial Intelligence–Based Active Virtual Voice Assistant

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication