CN102664895B - Partition echoing posting-before-verifying commenting system - Google Patents
Partition echoing posting-before-verifying commenting system Download PDFInfo
- Publication number
- CN102664895B CN102664895B CN201210128991.2A CN201210128991A CN102664895B CN 102664895 B CN102664895 B CN 102664895B CN 201210128991 A CN201210128991 A CN 201210128991A CN 102664895 B CN102664895 B CN 102664895B
- Authority
- CN
- China
- Prior art keywords
- user
- comment
- server
- address
- content
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a partition echoing posting-before-verifying commenting system which comprises a user terminal and a server. An internet protocol (IP) address base is stored in the server, and IP addresses are divided into different blocks based on adjacent closeness of users; a browsing user can require to check unverified and verified comments in the block if the browsing user belongs to the same block with a posting user; and the browsing user can only require to check the verified comments if the browsing user belongs to a different block. Compared with the prior art, the partition echoing posting-before-verifying commenting system achieves maximization of user experience and information security effectively, and reduces uncontrollable factors to the minimum.
Description
Technical field
The present invention relates to network communication technology field, particularly relate to a kind of network comment information classifying indication method and system.
Background technology
Commentary Systems on existing network common platform mainly contain three kinds of models:
1, first send out careful type rear: this is early stage universal model, Information issued flow process is user's release news without the need to through auditing flow, direct echo is in all terminals, background audit personnel timing releases news to user and audits, namely security information is audited and is passed through, and namely harmful information gives delete processing.
2, first post-trial hair style: this is the universal model after improving, Information issued flow process is that user releases news need through auditing flow, by the information of examination & verification just echo in all terminals, background audit personnel timing releases news to user and audits, namely security information is audited and is passed through, and namely harmful information gives delete processing.
3, user rs authentication type: this is the examination & verification model be based upon on user rs authentication basis, Information issued flow process is that user completes registration register in advance, release news determines auditing flow according to authority setting, general lower-level user takes first post-trial strategy, higher-level user takes first to send out rear careful strategy.
The technical problem that above-mentioned three kinds of existing models are existed and defect as follows:
1, first send out careful type rear: this pattern still has large-scale website to adopt now, and advantage is that Information issued is efficient, release experience is friendly, new user's entry threshold is low; Shortcoming is examination & verification high cost, cannot the safety of real-time ensuring information, is easily attacked by malicious user, becomes the source of junk information, harmful information, harm network environment.
2, first post-trial hair style: this pattern is adopted by general middle-size and small-size website, advantage is that to audit cost low, ensure that the safety of information; Shortcoming is that user-friendliness is low, if user send out content through long-time all cannot echo in terminal, will the enthusiasm issued of serious blow user, very unfavorable to raising website user liveness.
3, user rs authentication type: this is that pattern is extensively adopted by large-scale website, general and forum integrates, and is applicable to having the website of a large amount of fixed-line subscriber to adopt.Advantage is for different user colony, gives different signal auditing strategies, also reduces the risk of information security while alleviating examination & verification pressure; Although shortcoming is the risk reducing information security, is unidirectional trust to user, there is account number deception or malicious attack possibility.For the user do not trusted, can produce and discriminate against psychology, serious blow enthusiasm, is unfavorable for developing new user, is unfavorable for expansion and the development of website.
Summary of the invention
Technical problem to be solved by this invention overcomes the deficiencies in the prior art, provides a kind of maximization effectively achieving Consumer's Experience and information security, the subregion echo that uncontrollable factor is farthest reduced first send out careful Commentary Systems rear.
The technical solution adopted in the present invention is: the subregion echo that the present invention relates to first send out careful Commentary Systems rear, comprise user terminal and server, IP address base is contained in this server memory, and its IP address is divided into different blocks according to the adjacent tightness of each user, and the display packing of the network comment of these Commentary Systems comprises issuing steps and step display;
Issuing steps:
A1: user issues comment by user terminal to server, sends content and comprises IP address and comment content;
B1: server receives the IP address of this user terminal uploads and comment content, then IP address and comment content is put in storage, and marks this comment content for not audit; Then the signal auditing person on backstage according to the actual conditions of comment content, can do examination & verification process to comment content;
Step display:
A2: user obtains the data of comment content to server request, and server is compared to the IP address of the user received and IP address base, judges the block at this user place;
B2: server, according to block classification, retrieves and not the auditing the data of commenting on content and allly audited the data commenting on content of this request user same block;
C2: if request user belongs to same block with issue user, then server is by the transfer of data of all for this block comment contents to the user terminal displays of request user, comprises and does not audit comment and audit comment; If the user of request does not belong to same block with issue user, then this block has only been audited the user terminal displays of transfer of data to request user of comment by server.
Further, be: according to the neighbouring relations of the actual geographic position of each user to divide IP address field that scope is from the loosest same area just outside a city gate system to identical ip addresses relation the most closely by the specific practice that IP address is divided into different blocks according to the adjacent tightness of each user.
Further, in described step C2, request user can be same user with issue user.
The invention has the beneficial effects as follows: compared with the prior art, the maximization first sending out careful Commentary Systems rear and effectively achieve Consumer's Experience and information security of subregion echo.It had both had the advantage that Information issued is efficient, release experience is friendly, new user's entry threshold is low that tradition first sends out careful model rear, and the examination & verification cost again with first post-trial model is low, the advantage that information security rank is high; Avoid tradition first send out careful model rear cannot real-time ensuring information security, easily attacked by malicious user, the defect that user-friendliness is low, if avoid first post-trial model user institute send out content process for a long time all cannot echo in terminal, the shortcoming of the enthusiasm that user issues will be hit, the user rs authentication that it also avoid user rs authentication model is unidirectional trust, there is the possibility of account number deception or malicious attack.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of system of the present invention.
Embodiment
In order to make technical scheme of the present invention and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Accompanying drawing 1 illustrates the realization flow of the network comment display packing that the embodiment of present system provides, and is below that word is described in detail.
One, the handling process of [A. publisher's terminal] and [B. server]:
In step 1, [A. publisher's terminal] newly issues comment to [B. server], sends content and comprises IP address and comment content;
In step 2, [B. server] receives IP address, the comment content of [A. publisher's terminal], then IP address and content is put in storage, and mark comment content is not for audit;
In step 5, [B. server] compares to the IP address received and IP address base, judges the block at user place.The user being divided into same block is neighbouring relations, neighboring user relation is relatively close, live as belonged to a company work together or belonging to a community together, the compactness of user's neighbouring relations can arrange according to actual conditions (neighbourship degree in such as geographical position), and the scope that arranges is from the loosest same area just outside a city gate system to identical ip addresses relation the most closely;
In step 6, according to block classification, retrieve and do not comment on and all data of having audited comment with auditing of user terminal same block;
In step 7, [B. server] the data retrieved to [A. publisher's terminal] transmission, for [A. publisher's terminal] oneself, the comment that he issues shows in real time, without the need to review operations, can reach good Consumer's Experience.
Two, the handling process of [C. same district user terminal] and [B. server]:
In step 3, [C. same district user terminal] to [B. server] sends the request and the IP address of oneself that obtain comment data;
In step 5, [B. server] compares to the IP address received and IP address base, judges the block at user place;
In step 6, according to block classification, retrieve and do not comment on and all data of having audited comment with auditing of user terminal same block;
In step 8, [B. server] transmits the data retrieved to [C. same district user terminal], for [C. same district user terminal], what he got place block does not allly audit comment and audits comment with all, and wherein content includes the unauthorized content that [A. publisher's terminal] issue certainly.
Three, the handling process of [D. different district user terminal] and [B. server]:
In step 4, [D. different district user terminal] to [B. server] sends the request and the IP address of oneself that obtain comment data;
In step 5, [B. server] compares to the IP address received and IP address base, judges the block at user place;
In step 6, according to block classification, retrieve and do not comment on and all data of having audited comment with auditing of user terminal same block;
In step 9, [B. server], the data of auditing comment retrieved to [D. different district user terminal] transmission, for [D. different district user terminal], the comment that he gets all is through examination & verification, ensure that the safety of information.
In step 10, the signal auditing person on backstage can, according to the actual conditions of comment content, determine to do by examination & verification or delete processing comment.
It should be noted that, above-mentioned steps 3,4 is carried out simultaneously, the role of [C. same district user terminal], [D. different district user terminal] may be repetition in actual applications, namely user is the same district user of A publisher simultaneously, is also the different district user of another one publisher such as B publisher.
Claims (3)
1. a subregion echo first send out careful Commentary Systems rear, comprise user terminal and server, IP address base is contained in this server memory, and its IP address is divided into different blocks according to the adjacent tightness of each user, it is characterized in that, the display packing of the network comment of these Commentary Systems comprises issuing steps and step display;
Issuing steps:
A1: user issues comment by user terminal to server, sends content and comprises IP address and comment content;
B1: server receives the IP address of this user terminal uploads and comment content, then IP address and comment content is put in storage, and marks this comment content for not audit; Then the signal auditing person on backstage according to the actual conditions of comment content, can do examination & verification process to comment content;
Step display:
A2: user obtains the data of comment content to server request, and server is compared to the IP address of the user received and IP address base, judges the block at this user place;
B2: server, according to block classification, retrieves and not the auditing the data of commenting on content and allly audited the data commenting on content of this request user same block;
C2: if request user belongs to same block with issue user, then server is by the transfer of data of all for this block comment contents to the user terminal displays of request user, comprises and does not audit comment and audit comment; If the user of request does not belong to same block with issue user, then this block has only been audited the user terminal displays of transfer of data to request user of comment by server.
2. subregion echo according to claim 1 first send out careful Commentary Systems rear, it is characterized in that, be: according to the neighbouring relations of the actual geographic position of each user to divide IP address field that scope is from the loosest same area just outside a city gate system to identical ip addresses relation the most closely by the specific practice that IP address is divided into different blocks according to the adjacent tightness of each user.
3. subregion echo according to claim 1 first send out careful Commentary Systems rear, it is characterized in that, in described step C2, request user with issue user and can be same user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210128991.2A CN102664895B (en) | 2012-04-28 | 2012-04-28 | Partition echoing posting-before-verifying commenting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210128991.2A CN102664895B (en) | 2012-04-28 | 2012-04-28 | Partition echoing posting-before-verifying commenting system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102664895A CN102664895A (en) | 2012-09-12 |
CN102664895B true CN102664895B (en) | 2015-03-11 |
Family
ID=46774305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210128991.2A Expired - Fee Related CN102664895B (en) | 2012-04-28 | 2012-04-28 | Partition echoing posting-before-verifying commenting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102664895B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106648283B (en) * | 2015-11-02 | 2019-08-13 | 腾讯科技(北京)有限公司 | A kind of barrage information processing method and server |
US11334639B2 (en) * | 2018-11-16 | 2022-05-17 | Wudzy Pty. Limited | Systems and methods for image capture and identification |
CN109684589B (en) * | 2018-12-25 | 2020-02-28 | 北京微播视界科技有限公司 | Client comment data processing method and device and computer storage medium |
CN110134880B (en) * | 2019-05-20 | 2022-04-15 | 北京字节跳动网络技术有限公司 | Comment data providing method, comment data displaying method, comment data providing device, comment data displaying device, electronic equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101854581A (en) * | 2009-03-31 | 2010-10-06 | 联想(北京)有限公司 | Method for setting security level of mobile terminal on basis of position information and mobile terminal |
CN102098548A (en) * | 2010-12-26 | 2011-06-15 | 青岛海信宽带多媒体技术有限公司 | Method and device for displaying electronic program guide (EPG) on digital television |
-
2012
- 2012-04-28 CN CN201210128991.2A patent/CN102664895B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101854581A (en) * | 2009-03-31 | 2010-10-06 | 联想(北京)有限公司 | Method for setting security level of mobile terminal on basis of position information and mobile terminal |
CN102098548A (en) * | 2010-12-26 | 2011-06-15 | 青岛海信宽带多媒体技术有限公司 | Method and device for displaying electronic program guide (EPG) on digital television |
Non-Patent Citations (1)
Title |
---|
新疆高校教学资源库管理系统的设计与实现;王瑞锦;《电子科技大学工程硕士学位论文》;20120315;第31页第1-6段、第46页第2段、第49页最后一段至51页第1段 * |
Also Published As
Publication number | Publication date |
---|---|
CN102664895A (en) | 2012-09-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109714174B (en) | Internet of things equipment digital identity management system and method based on block chain | |
CN107770182B (en) | Data storage method of home gateway and home gateway | |
EP3906652B1 (en) | Protecting a telecommunications network using network components as blockchain nodes | |
CN101959183B (en) | Mobile user identification code IMSI protection method based on pseudonym | |
CN108564182B (en) | Equipment full life cycle management system and method based on block chain technology | |
CN105337941B (en) | A kind of device identification providing method and device | |
CN107566381A (en) | Equipment safety control method, apparatus and system | |
CN102404741B (en) | Method and device for detecting abnormal online of mobile terminal | |
CN102594823A (en) | Trusted system for remote secure access of intelligent home | |
CN102664895B (en) | Partition echoing posting-before-verifying commenting system | |
CN103297437A (en) | Safety server access method for mobile intelligent terminal | |
CN104184713A (en) | Terminal identification method, machine identification code registration method, and corresponding system and equipment | |
CN104333562A (en) | Data packet transmission method and device | |
CN112468504B (en) | Industrial control network access control method based on block chain | |
CN105007301A (en) | Electronic evidence processing system and method based on social platform | |
CN111510298A (en) | Cross-domain trusted data exchange method and system based on block chain | |
CN113111386A (en) | Privacy protection method for block chain transaction data | |
CN104410642B (en) | Equipment access cognitive method based on ARP protocol | |
CN108011873A (en) | A kind of illegal connection determination methods based on set covering | |
CN105474585A (en) | Private tokens in electronic messages | |
CN102098285B (en) | Method and device for preventing phishing attacks | |
CN103401686A (en) | User Internet identity authentication system and application method thereof | |
CN107979845A (en) | The indicating risk method and apparatus of wireless access point | |
CN101989975A (en) | Distributed method for blocking access of illegal computers | |
CN107770183A (en) | A kind of data transmission method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20150311 Termination date: 20190428 |
|
CF01 | Termination of patent right due to non-payment of annual fee |