CN102664895B - Partition echoing posting-before-verifying commenting system - Google Patents

Partition echoing posting-before-verifying commenting system Download PDF

Info

Publication number
CN102664895B
CN102664895B CN201210128991.2A CN201210128991A CN102664895B CN 102664895 B CN102664895 B CN 102664895B CN 201210128991 A CN201210128991 A CN 201210128991A CN 102664895 B CN102664895 B CN 102664895B
Authority
CN
China
Prior art keywords
user
comment
server
address
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210128991.2A
Other languages
Chinese (zh)
Other versions
CN102664895A (en
Inventor
郭一兵
杨旭
乔宇
林杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHUHAI NEWSPAPER CULTURE COMMUNICATION CO Ltd
Original Assignee
ZHUHAI NEWSPAPER CULTURE COMMUNICATION CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZHUHAI NEWSPAPER CULTURE COMMUNICATION CO Ltd filed Critical ZHUHAI NEWSPAPER CULTURE COMMUNICATION CO Ltd
Priority to CN201210128991.2A priority Critical patent/CN102664895B/en
Publication of CN102664895A publication Critical patent/CN102664895A/en
Application granted granted Critical
Publication of CN102664895B publication Critical patent/CN102664895B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a partition echoing posting-before-verifying commenting system which comprises a user terminal and a server. An internet protocol (IP) address base is stored in the server, and IP addresses are divided into different blocks based on adjacent closeness of users; a browsing user can require to check unverified and verified comments in the block if the browsing user belongs to the same block with a posting user; and the browsing user can only require to check the verified comments if the browsing user belongs to a different block. Compared with the prior art, the partition echoing posting-before-verifying commenting system achieves maximization of user experience and information security effectively, and reduces uncontrollable factors to the minimum.

Description

Subregion echo first send out careful Commentary Systems rear
Technical field
The present invention relates to network communication technology field, particularly relate to a kind of network comment information classifying indication method and system.
Background technology
Commentary Systems on existing network common platform mainly contain three kinds of models:
1, first send out careful type rear: this is early stage universal model, Information issued flow process is user's release news without the need to through auditing flow, direct echo is in all terminals, background audit personnel timing releases news to user and audits, namely security information is audited and is passed through, and namely harmful information gives delete processing.
2, first post-trial hair style: this is the universal model after improving, Information issued flow process is that user releases news need through auditing flow, by the information of examination & verification just echo in all terminals, background audit personnel timing releases news to user and audits, namely security information is audited and is passed through, and namely harmful information gives delete processing.
3, user rs authentication type: this is the examination & verification model be based upon on user rs authentication basis, Information issued flow process is that user completes registration register in advance, release news determines auditing flow according to authority setting, general lower-level user takes first post-trial strategy, higher-level user takes first to send out rear careful strategy.
The technical problem that above-mentioned three kinds of existing models are existed and defect as follows:
1, first send out careful type rear: this pattern still has large-scale website to adopt now, and advantage is that Information issued is efficient, release experience is friendly, new user's entry threshold is low; Shortcoming is examination & verification high cost, cannot the safety of real-time ensuring information, is easily attacked by malicious user, becomes the source of junk information, harmful information, harm network environment.
2, first post-trial hair style: this pattern is adopted by general middle-size and small-size website, advantage is that to audit cost low, ensure that the safety of information; Shortcoming is that user-friendliness is low, if user send out content through long-time all cannot echo in terminal, will the enthusiasm issued of serious blow user, very unfavorable to raising website user liveness.
3, user rs authentication type: this is that pattern is extensively adopted by large-scale website, general and forum integrates, and is applicable to having the website of a large amount of fixed-line subscriber to adopt.Advantage is for different user colony, gives different signal auditing strategies, also reduces the risk of information security while alleviating examination & verification pressure; Although shortcoming is the risk reducing information security, is unidirectional trust to user, there is account number deception or malicious attack possibility.For the user do not trusted, can produce and discriminate against psychology, serious blow enthusiasm, is unfavorable for developing new user, is unfavorable for expansion and the development of website.
Summary of the invention
Technical problem to be solved by this invention overcomes the deficiencies in the prior art, provides a kind of maximization effectively achieving Consumer's Experience and information security, the subregion echo that uncontrollable factor is farthest reduced first send out careful Commentary Systems rear.
The technical solution adopted in the present invention is: the subregion echo that the present invention relates to first send out careful Commentary Systems rear, comprise user terminal and server, IP address base is contained in this server memory, and its IP address is divided into different blocks according to the adjacent tightness of each user, and the display packing of the network comment of these Commentary Systems comprises issuing steps and step display;
Issuing steps:
A1: user issues comment by user terminal to server, sends content and comprises IP address and comment content;
B1: server receives the IP address of this user terminal uploads and comment content, then IP address and comment content is put in storage, and marks this comment content for not audit; Then the signal auditing person on backstage according to the actual conditions of comment content, can do examination & verification process to comment content;
Step display:
A2: user obtains the data of comment content to server request, and server is compared to the IP address of the user received and IP address base, judges the block at this user place;
B2: server, according to block classification, retrieves and not the auditing the data of commenting on content and allly audited the data commenting on content of this request user same block;
C2: if request user belongs to same block with issue user, then server is by the transfer of data of all for this block comment contents to the user terminal displays of request user, comprises and does not audit comment and audit comment; If the user of request does not belong to same block with issue user, then this block has only been audited the user terminal displays of transfer of data to request user of comment by server.
Further, be: according to the neighbouring relations of the actual geographic position of each user to divide IP address field that scope is from the loosest same area just outside a city gate system to identical ip addresses relation the most closely by the specific practice that IP address is divided into different blocks according to the adjacent tightness of each user.
Further, in described step C2, request user can be same user with issue user.
The invention has the beneficial effects as follows: compared with the prior art, the maximization first sending out careful Commentary Systems rear and effectively achieve Consumer's Experience and information security of subregion echo.It had both had the advantage that Information issued is efficient, release experience is friendly, new user's entry threshold is low that tradition first sends out careful model rear, and the examination & verification cost again with first post-trial model is low, the advantage that information security rank is high; Avoid tradition first send out careful model rear cannot real-time ensuring information security, easily attacked by malicious user, the defect that user-friendliness is low, if avoid first post-trial model user institute send out content process for a long time all cannot echo in terminal, the shortcoming of the enthusiasm that user issues will be hit, the user rs authentication that it also avoid user rs authentication model is unidirectional trust, there is the possibility of account number deception or malicious attack.
Accompanying drawing explanation
Fig. 1 is the realization flow figure of system of the present invention.
Embodiment
In order to make technical scheme of the present invention and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Accompanying drawing 1 illustrates the realization flow of the network comment display packing that the embodiment of present system provides, and is below that word is described in detail.
One, the handling process of [A. publisher's terminal] and [B. server]:
In step 1, [A. publisher's terminal] newly issues comment to [B. server], sends content and comprises IP address and comment content;
In step 2, [B. server] receives IP address, the comment content of [A. publisher's terminal], then IP address and content is put in storage, and mark comment content is not for audit;
In step 5, [B. server] compares to the IP address received and IP address base, judges the block at user place.The user being divided into same block is neighbouring relations, neighboring user relation is relatively close, live as belonged to a company work together or belonging to a community together, the compactness of user's neighbouring relations can arrange according to actual conditions (neighbourship degree in such as geographical position), and the scope that arranges is from the loosest same area just outside a city gate system to identical ip addresses relation the most closely;
In step 6, according to block classification, retrieve and do not comment on and all data of having audited comment with auditing of user terminal same block;
In step 7, [B. server] the data retrieved to [A. publisher's terminal] transmission, for [A. publisher's terminal] oneself, the comment that he issues shows in real time, without the need to review operations, can reach good Consumer's Experience.
Two, the handling process of [C. same district user terminal] and [B. server]:
In step 3, [C. same district user terminal] to [B. server] sends the request and the IP address of oneself that obtain comment data;
In step 5, [B. server] compares to the IP address received and IP address base, judges the block at user place;
In step 6, according to block classification, retrieve and do not comment on and all data of having audited comment with auditing of user terminal same block;
In step 8, [B. server] transmits the data retrieved to [C. same district user terminal], for [C. same district user terminal], what he got place block does not allly audit comment and audits comment with all, and wherein content includes the unauthorized content that [A. publisher's terminal] issue certainly.
Three, the handling process of [D. different district user terminal] and [B. server]:
In step 4, [D. different district user terminal] to [B. server] sends the request and the IP address of oneself that obtain comment data;
In step 5, [B. server] compares to the IP address received and IP address base, judges the block at user place;
In step 6, according to block classification, retrieve and do not comment on and all data of having audited comment with auditing of user terminal same block;
In step 9, [B. server], the data of auditing comment retrieved to [D. different district user terminal] transmission, for [D. different district user terminal], the comment that he gets all is through examination & verification, ensure that the safety of information.
In step 10, the signal auditing person on backstage can, according to the actual conditions of comment content, determine to do by examination & verification or delete processing comment.
It should be noted that, above-mentioned steps 3,4 is carried out simultaneously, the role of [C. same district user terminal], [D. different district user terminal] may be repetition in actual applications, namely user is the same district user of A publisher simultaneously, is also the different district user of another one publisher such as B publisher.

Claims (3)

1. a subregion echo first send out careful Commentary Systems rear, comprise user terminal and server, IP address base is contained in this server memory, and its IP address is divided into different blocks according to the adjacent tightness of each user, it is characterized in that, the display packing of the network comment of these Commentary Systems comprises issuing steps and step display;
Issuing steps:
A1: user issues comment by user terminal to server, sends content and comprises IP address and comment content;
B1: server receives the IP address of this user terminal uploads and comment content, then IP address and comment content is put in storage, and marks this comment content for not audit; Then the signal auditing person on backstage according to the actual conditions of comment content, can do examination & verification process to comment content;
Step display:
A2: user obtains the data of comment content to server request, and server is compared to the IP address of the user received and IP address base, judges the block at this user place;
B2: server, according to block classification, retrieves and not the auditing the data of commenting on content and allly audited the data commenting on content of this request user same block;
C2: if request user belongs to same block with issue user, then server is by the transfer of data of all for this block comment contents to the user terminal displays of request user, comprises and does not audit comment and audit comment; If the user of request does not belong to same block with issue user, then this block has only been audited the user terminal displays of transfer of data to request user of comment by server.
2. subregion echo according to claim 1 first send out careful Commentary Systems rear, it is characterized in that, be: according to the neighbouring relations of the actual geographic position of each user to divide IP address field that scope is from the loosest same area just outside a city gate system to identical ip addresses relation the most closely by the specific practice that IP address is divided into different blocks according to the adjacent tightness of each user.
3. subregion echo according to claim 1 first send out careful Commentary Systems rear, it is characterized in that, in described step C2, request user with issue user and can be same user.
CN201210128991.2A 2012-04-28 2012-04-28 Partition echoing posting-before-verifying commenting system Expired - Fee Related CN102664895B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210128991.2A CN102664895B (en) 2012-04-28 2012-04-28 Partition echoing posting-before-verifying commenting system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210128991.2A CN102664895B (en) 2012-04-28 2012-04-28 Partition echoing posting-before-verifying commenting system

Publications (2)

Publication Number Publication Date
CN102664895A CN102664895A (en) 2012-09-12
CN102664895B true CN102664895B (en) 2015-03-11

Family

ID=46774305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210128991.2A Expired - Fee Related CN102664895B (en) 2012-04-28 2012-04-28 Partition echoing posting-before-verifying commenting system

Country Status (1)

Country Link
CN (1) CN102664895B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106648283B (en) * 2015-11-02 2019-08-13 腾讯科技(北京)有限公司 A kind of barrage information processing method and server
US11334639B2 (en) * 2018-11-16 2022-05-17 Wudzy Pty. Limited Systems and methods for image capture and identification
CN109684589B (en) * 2018-12-25 2020-02-28 北京微播视界科技有限公司 Client comment data processing method and device and computer storage medium
CN110134880B (en) * 2019-05-20 2022-04-15 北京字节跳动网络技术有限公司 Comment data providing method, comment data displaying method, comment data providing device, comment data displaying device, electronic equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854581A (en) * 2009-03-31 2010-10-06 联想(北京)有限公司 Method for setting security level of mobile terminal on basis of position information and mobile terminal
CN102098548A (en) * 2010-12-26 2011-06-15 青岛海信宽带多媒体技术有限公司 Method and device for displaying electronic program guide (EPG) on digital television

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101854581A (en) * 2009-03-31 2010-10-06 联想(北京)有限公司 Method for setting security level of mobile terminal on basis of position information and mobile terminal
CN102098548A (en) * 2010-12-26 2011-06-15 青岛海信宽带多媒体技术有限公司 Method and device for displaying electronic program guide (EPG) on digital television

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
新疆高校教学资源库管理系统的设计与实现;王瑞锦;《电子科技大学工程硕士学位论文》;20120315;第31页第1-6段、第46页第2段、第49页最后一段至51页第1段 *

Also Published As

Publication number Publication date
CN102664895A (en) 2012-09-12

Similar Documents

Publication Publication Date Title
CN109714174B (en) Internet of things equipment digital identity management system and method based on block chain
CN107770182B (en) Data storage method of home gateway and home gateway
EP3906652B1 (en) Protecting a telecommunications network using network components as blockchain nodes
CN101959183B (en) Mobile user identification code IMSI protection method based on pseudonym
CN108564182B (en) Equipment full life cycle management system and method based on block chain technology
CN105337941B (en) A kind of device identification providing method and device
CN107566381A (en) Equipment safety control method, apparatus and system
CN102404741B (en) Method and device for detecting abnormal online of mobile terminal
CN102594823A (en) Trusted system for remote secure access of intelligent home
CN102664895B (en) Partition echoing posting-before-verifying commenting system
CN103297437A (en) Safety server access method for mobile intelligent terminal
CN104184713A (en) Terminal identification method, machine identification code registration method, and corresponding system and equipment
CN104333562A (en) Data packet transmission method and device
CN112468504B (en) Industrial control network access control method based on block chain
CN105007301A (en) Electronic evidence processing system and method based on social platform
CN111510298A (en) Cross-domain trusted data exchange method and system based on block chain
CN113111386A (en) Privacy protection method for block chain transaction data
CN104410642B (en) Equipment access cognitive method based on ARP protocol
CN108011873A (en) A kind of illegal connection determination methods based on set covering
CN105474585A (en) Private tokens in electronic messages
CN102098285B (en) Method and device for preventing phishing attacks
CN103401686A (en) User Internet identity authentication system and application method thereof
CN107979845A (en) The indicating risk method and apparatus of wireless access point
CN101989975A (en) Distributed method for blocking access of illegal computers
CN107770183A (en) A kind of data transmission method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150311

Termination date: 20190428

CF01 Termination of patent right due to non-payment of annual fee