CN104036037A - Method and device for processing junk user - Google Patents

Method and device for processing junk user Download PDF

Info

Publication number
CN104036037A
CN104036037A CN201410306731.9A CN201410306731A CN104036037A CN 104036037 A CN104036037 A CN 104036037A CN 201410306731 A CN201410306731 A CN 201410306731A CN 104036037 A CN104036037 A CN 104036037A
Authority
CN
China
Prior art keywords
user
described user
insincere
keyword
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410306731.9A
Other languages
Chinese (zh)
Inventor
韩博颖
陈冬梁
翁海斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410306731.9A priority Critical patent/CN104036037A/en
Publication of CN104036037A publication Critical patent/CN104036037A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a method and device for processing a junk user. The method for processing the junk user comprises the steps that the archive data of the user are acquired, and the archive data comprise at least one of the personal information, historical approved memo and historical behavior information of the user; whether the user is an unauthentic user or not is analyzed according to the archive data; when the user is the unauthentic user, the behavior of the user is limited. According to the technical scheme, the reliability of the user is analyzed according to the archive data of the user, and therefore the behavior of the user is limited according to the reliability of the user, the threshold for the unauthentic user using a social application is increased, the harassment of the unauthentic user to a normal user is reduced, and the social application can actively recognize and shield the unauthentic user. Therefore, advertisements, political communication and other illegal information are filtered out more effectively, and high practicality is achieved.

Description

Disposal of refuse user's method and device
Technical field
The disclosure relates to social application, relates in particular to a kind of disposal of refuse user's method and device.
Background technology
The social activity application of communicating by letter between social platform, mail etc. are for user; conventionally can receive the automatic information sending of many advertisements, violated information or pseudo-terminal etc.; these information are nonsensical for the user of receiving end; and cause interference can to user's proper communication, this just need to carry out shielding processing to the user who sends this category information.
In correlation technique, the mode shielding sending the user of above-mentioned improper information, only limit to by users, the report of improper information be shielded, although this shielding mode can mask rubbish message to a certain extent, but depend on user's report behavior, can not initiatively rubbish user be identified and be shielded, thereby can not effectively shield improper information, practicality be lower.
Summary of the invention
For overcoming the problem existing in correlation technique, the disclosure provides a kind of disposal of refuse user's method and device.
According to the first aspect of disclosure embodiment, a kind of disposal of refuse user method is provided, comprising:
Obtain user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
According to described file data, analyze described user and whether belong to insincere user;
In the time that described user belongs to insincere user, described user is carried out to behavior restriction.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: the confidence level of carrying out analysis user according to user's file data, thereby the confidence level by user is carried out behavior restriction to user, increase the threshold that insincere user uses social application, reduce the harassing and wrecking of insincere user to normal users, realize initiatively identification and the shielding to insincere user of social application, thereby more effectively filtering advertisements and politics propagation wait invalid information, have higher practicality.
Optionally, in the time of personal information that described file data comprises described user, described according to described file data, analyze described user and whether belong to insincere user, comprising:
Whether the personal information of analyzing described user comprises default insincere information;
In the time that described user's personal information comprises described insincere information, determine that described user belongs to insincere user.
In possibility, by the data analysis user in user's personal information, judge quickly and easily user and whether belong to insincere user.
Optionally, in the time of historical audit logging that described file data comprises described user, described according to described file data, analyze described user and whether belong to insincere user, comprising:
Being closed record, deleted Message Record, hit junk information keyword record and being reported that whether the quantity of at least one record in record exceedes default threshold value, determines whether described user belongs to insincere user according to described user;
Wherein, described user's historical audit logging comprises: described user is closed record, deleted Message Record, hits junk information keyword record and by least one record in report record.
In possibility, by the data analysis user in user's historical audit logging, judge quickly and easily user and whether belong to insincere user.
Optionally, in the time of historical behavior information that described file data comprises described user, described according to described file data, analyze described user and whether belong to insincere user, comprising:
Whether there is default insincere behavior according to user described in described user's historical behavior information analysis;
In the time that described user has described insincere behavior, determine whether described user belongs to insincere user.
In possibility, by the data analysis user in user's historical behavior information, judge quickly and easily user and whether belong to insincere user.
Optionally, described in the time that described user is insincere user, described user is carried out to behavior restriction, comprising:
In the time that described user is insincere user, analyze described user's kind;
According to described user's kind, described user is carried out to the behavior restriction of different brackets.
In possibility, for insincere user, further judge user's kind, thereby different types of user is carried out to the behavior restriction of different brackets, the clear and definite processing mode to insincere user, reduces the harassing and wrecking of insincere user to normal users.
Optionally, described user's personal information comprises described user's trade information;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to described user's trade information, judge described user's industry kind;
According to described user's industry kind, determine described user's kind.
In possibility, can judge according to the industry kind in userspersonal information user's kind, and then according to user's kind, user be carried out to corresponding behavior restriction.
Optionally, described user's historical audit logging comprises and hits rubbish message keyword record;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to the described rubbish message keyword record that hits, the kind of the described rubbish message keyword that judgement is hit;
According to the kind of described rubbish message keyword, determine described user's kind.
In possibility, can judge according to the kind of the rubbish message keyword hitting in user's history message user's kind, and then according to user's kind, user be carried out to corresponding behavior restriction.
Optionally, the kind of described rubbish message keyword comprises: the keyword of the keyword of the keyword of commercial paper, the keyword of illegal class, political class or swindle class;
Described according to the kind of described rubbish message keyword, determine described user's kind, comprising:
In the time of keyword that described rubbish message keyword is commercial paper, determine that described user is advertisement user;
In the time of keyword that described rubbish message keyword is illegal class, determine that described user is disabled user;
In the time of keyword that described rubbish message keyword is political class, determine that described user is political user;
In the time that described rubbish message keyword is the keyword of swindle class, determine that described user is for swindle user.
Optionally, described user's historical behavior information comprises: interest distributed intelligence and/or good friend's distributed intelligence;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to described interest distributed intelligence and/or good friend's distributed intelligence, judge described user's interest types and/or good friend's kind;
According to described user's interest types and/or good friend's kind, determine described user's kind.
In possibility, can judge user's kind according to user's interest types or good friend's kind, and then according to user's kind, user be carried out to corresponding behavior restriction.
Optionally, described according to described user's kind, the behavior restriction that described user is carried out to different brackets, comprising:
According to described user's kind, described user is warned to the processing of closing of processing and/or default duration.
In possibility, insincere user is carried out different types of warning or closes processing, increase the threshold that insincere user uses social application, the harassing and wrecking of insincere user to normal users are reduced, realize initiatively identification and the shielding to insincere user of social application, thereby more effectively filtering advertisements and politics propagation wait invalid information, have higher practicality.
Optionally, described method also comprises:
In the time that described user belongs to insincere user, delete the message that described user sends.
In possibility, delete the message that insincere user sends to normal users, reduce the harassing and wrecking of insincere user to normal users.
According to the second aspect of disclosure embodiment, a kind of disposal of refuse user's device is provided, comprising:
Acquisition module, for obtaining user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
Analysis module, for the described file data obtaining according to described acquisition module, analyzes described user and whether belongs to insincere user;
Limiting module, while belonging to insincere user, carries out behavior restriction to described user for analyzing described user when described analysis module.
Optionally, described analysis module comprises:
The first analytic unit, for comprise described user when described file data personal information time, whether the personal information of analyzing described user comprises default insincere information;
The first determining unit, while comprising described insincere information, determines that described user belongs to insincere user for the personal information of analyzing described user when described the first analytic unit.
Optionally, described analysis module, also for comprise described user when described file data historical audit logging time, the described user who obtains according to described acquisition module is closed record, deleted Message Record, hit junk information keyword record and whether is exceeded default threshold value by the quantity of at least one record in report record, determines whether described user belongs to insincere user;
Wherein, described user's historical audit logging comprises: described user is closed record, deleted Message Record, hits junk information keyword record and by least one record in report record.
Optionally, described analysis module comprises:
The second analytic unit, for comprise described user when described file data historical behavior information time, whether have default insincere behavior according to user described in described user's historical behavior information analysis;
The second determining unit, while having described insincere behavior, determines whether described user belongs to insincere user for analyzing described user when described the second analytic unit.
Optionally, described limiting module comprises:
The 3rd analytic unit, in the time that described user is insincere user, analyzes described user's kind;
Limiting unit, for according to the described user's of described the 3rd analytic unit analysis kind, carries out the behavior restriction of different brackets to described user.
Optionally, described the 3rd analytic unit comprises:
The first judgment sub-unit, for according to described user's trade information, judges described user's industry kind;
First determines subelement, for according to the described user's of described the first judgment sub-unit judgement industry kind, determines described user's kind.Optionally,
Described the 3rd analytic unit comprises:
The second judgment sub-unit, for hitting rubbish message keyword record described in basis, the kind of the described rubbish message keyword that judgement is hit;
Second determines subelement, for according to the kind of the described rubbish message keyword of described the second judgment sub-unit judgement, determines described user's kind.
Optionally, described second determine subelement also for,
When keyword that the described rubbish message keyword judging when described the second judgment sub-unit is commercial paper, determine that described user is advertisement user;
When keyword that the described rubbish message keyword judging when described the second judgment sub-unit is illegal class, determine that described user is disabled user;
When keyword that the described rubbish message keyword judging when described the second judgment sub-unit is political class, determine that described user is political user;
The described rubbish message keyword judging when described the second judgment sub-unit is while swindling the keyword of class, determines that described user is for swindle user.
Optionally, described the 3rd analytic unit comprises:
The 3rd judgment sub-unit, for according to described interest distributed intelligence and/or good friend's distributed intelligence, judges described user's interest types and/or good friend's kind;
The 3rd determines subelement, for according to the described user's of described the 3rd judgment sub-unit judgement interest types and/or good friend's kind, determines described user's kind.
Optionally,
Described limiting unit, for according to the described user's of described the 3rd analytic unit analysis kind, warns the processing of closing of processing and/or default duration to described user.
Optionally, described device also comprises:
Removing module, while belonging to insincere user, deletes the message that described user sends for analyzing described user when described analysis module.
According to the third aspect of disclosure embodiment, a kind of disposal of refuse user's device is provided, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
According to described file data, analyze described user and whether belong to insincere user;
In the time that described user belongs to insincere user, described user is carried out to behavior restriction.Should be understood that, it is only exemplary and explanatory that above general description and details are hereinafter described, and can not limit the disclosure.
Brief description of the drawings
Accompanying drawing is herein merged in instructions and forms the part of this instructions, shows embodiment according to the invention, and is used from and explains principle of the present invention with instructions one.
Fig. 1 is according to the process flow diagram of the method for a kind of disposal of refuse user shown in an exemplary embodiment;
Fig. 2 is according to the process flow diagram of the method for a kind of disposal of refuse user shown in another exemplary embodiment;
Fig. 3 is according to the block diagram of the device of a kind of disposal of refuse user shown in an exemplary embodiment;
Fig. 4 is according to the block diagram of the analysis module shown in an exemplary embodiment;
Fig. 5 is according to the block diagram of the limiting module shown in an exemplary embodiment;
Fig. 6 is according to the block diagram of the 3rd analytic unit shown in an exemplary embodiment;
Fig. 7 is according to the block diagram of a kind of device shown in an exemplary embodiment.
Embodiment
Here will at length describe exemplary embodiment, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the present invention.On the contrary, they are only and the example of apparatus and method as consistent in some aspects that described in detail in appended claims, of the present invention.
Fig. 1 is according to the process flow diagram of the method for a kind of disposal of refuse user shown in an exemplary embodiment, and as shown in Figure 1, a kind of disposal of refuse user method, for terminal, comprises the following steps:
Step S11, obtains user's file data, at least one information in the personal information that file data comprises user, historical audit logging and historical behavior information;
Step S12, according to file data, whether analysis user belongs to insincere user;
Step S13, in the time that family belongs to insincere user, carries out behavior restriction to user.
The disposal of refuse user's that disclosure embodiment provides method, carry out the confidence level of analysis user according to user's file data, thereby the confidence level by user is carried out behavior restriction to user, increase the threshold that insincere user uses social application, reduce the harassing and wrecking of insincere user to normal users, realized initiatively identification and the shielding to insincere user of social application, thereby more effectively filtering advertisements waits invalid information with political propagation, has higher practicality.
In step S11, user's file data obtains from server, and user's personal information can comprise user's signature, company, industry, school, interest, age or name etc.; User's historical audit logging can comprise being closed record, deleted Message Record, hit junk information keyword record and being reported at least one record in record of user; User's historical behavior information can comprise user interpolation good friend behavioural information, line duration distributed intelligence, function usage behavior information, good friend's distributed intelligence, interest distributed intelligence, send message behavioural information, buy at least one information in product behavioural information and down load application program information.
In one embodiment, in the time that user enters certain social application, the client of social application will be set up prestige archives to user, according to the information in user's prestige archives, judges whether user belongs to insincere user.
In step S12, the Main Basis whether analysis user belongs to insincere user is at least one information in user's included in above-mentioned file data personal information, historical audit logging and historical behavior information.Can carry out analysis user according in three information and whether belong to insincere user, also can carry out analysis user according to two in three information or three s' combination and whether belong to insincere user.
In the time whether belonging to insincere user according to the personal information analysis user in file data, can implement in the following manner: whether the personal information of analysis user comprises default insincere information; In the time that user's personal information comprises insincere information, determine that user belongs to insincere user.Wherein, for example, user's industry is to comprise dealing information etc. in " sale ", user's signature to default insincere information.
In the time whether belonging to insincere user according to the historical audit logging analysis user in file data, can carry out according to the quantity of every record in the historical audit logging of user the confidence level of analysis user,, being closed record, deleted Message Record, hit junk information keyword record and being reported that whether the quantity of at least one record in record exceedes default threshold value, determines whether user belongs to insincere user according to user.
Wherein, default threshold value can be set as required, and said method is specifically implemented as follows:
When the number of times of being closed as user exceedes the first predetermined threshold value, determine that user belongs to insincere user.For example, the first predetermined threshold value is set to 2, and in the time that user enters social application, client is obtained the number of times that this user closed and exceeded at twice o'clock, determines that the user is insincere user.
In the time that the number of times of the deleted message of user exceedes the second predetermined threshold value, determine that user belongs to insincere user.For example, the second predetermined threshold value is set to 5, in the time that user enters social application, when the number of times that client is obtained the deleted message of this user exceedes 5 times, determines that the user is insincere user.
In the time that the number of times that hits rubbish message keyword in the message that user sends exceedes the 3rd predetermined threshold value, determine that user belongs to insincere user.For example, the 3rd predetermined threshold value is set to 5, in the time that user enters social application, when client is obtained the number of times that hits rubbish message keyword in the message that this user sends and exceeded 5 times, determines that the user is insincere user.
In the time that user is reported that number of times exceedes the 4th predetermined threshold value, determine that user belongs to insincere user.For example, the 4th predetermined threshold value is set to 3, and, in the time that user enters social application, client is obtained this user and reported when number of times exceedes 3 times, determines that the user is insincere user.
In the time whether belonging to insincere user according to the historical behavior information analysis user in file data, can implement in the following manner: whether have default insincere behavior according to user's historical behavior information analysis user; In the time that user has described insincere behavior, determine whether user belongs to insincere user.Wherein, default insincere behavior for example, such as, comprises invalid message etc. in the history message that user's line duration distributes undesired (line duration is the late into the night), user sends.
In addition, whether belong to insincere with outdoor except above-mentioned according to an information analysis user in file data, also can carry out analysis user according to two in three information or three s' combination and whether belong to insincere user.For example, carry out analysis user with user's personal information and the combination of historical behavior information and whether belong to insincere user, when the industry of obtaining user according to user's personal information is for selling, when the history message simultaneously sending according to user's historical behavior acquisition of information user is sell goods and so on message, can judge that user belongs to insincere user.
In one embodiment, said method, in the time of implementation step S13, also can, by the kind of analysis user, carry out behavior restriction in various degree to user.Specifically can be embodied as following steps:
Steps A 1, in the time that user is insincere user, the kind of analysis user;
Steps A 2, according to user's kind, carries out the behavior restriction of different brackets to user.
This kind of mode, for insincere user, further judges user's kind, thereby different types of user is carried out to the behavior restriction of different brackets, and the clear and definite processing mode to insincere user, reduces the harassing and wrecking of insincere user to normal users.
In steps A 1, analysis user kind according to can be also user's file data.For example, can carry out according to insincere user's head portrait, ID, the reason of being reported or historical behavior information the kind of analysis user.
Whether to belong to insincere user identical with analysis user, and analysis user kind also can be analyzed according to an information in file data or the combination of multinomial information.The kind of analysis user is described by specific embodiment below.
In one embodiment, user's personal information comprises user's trade information, can directly carry out the kind of analysis user according to the trade information in user's personal information, is embodied as following steps:
Steps A 11, according to user's trade information, judges user's industry kind;
Steps A 12, according to user's industry kind, determines user's kind.
For example, in the time that user's industry is sale, the kind that can determine user is advertisement user.
In one embodiment, user's historical audit logging comprises and hits rubbish message keyword record, can directly carry out the kind of analysis user according to the record that hits rubbish message keyword in user's historical audit logging, is embodied as following steps:
Step B11, according to hitting rubbish message keyword record, the kind of the rubbish message keyword that judgement is hit;
Step B12, according to the kind of rubbish message keyword, determines user's kind.
For example, the kind of rubbish message keyword is divided into: the keyword of the keyword of the keyword of commercial paper, the keyword of illegal class, political class or swindle class, step B13 can implement in the following manner: in the time of keyword that rubbish message keyword is commercial paper, determine that user is advertisement user; In the time of keyword that rubbish message keyword is illegal class, determine that user is disabled user; In the time of keyword that rubbish message keyword is political class, determine that user is political user; In the time that rubbish message keyword is the keyword of swindle class, determine that user is swindle user.
In one embodiment, user's historical behavior information comprises interest distributed intelligence and/or good friend's distributed intelligence, can be directly carry out the kind of analysis user according to the interest distributed intelligence in user's historical behavior information and/or good friend's distributed intelligence, be embodied as following steps:
Step C11, according to interest distributed intelligence and/or good friend's distributed intelligence, judges user's interest types and/or good friend's kind;
Step C12, according to user's interest types and/or good friend's kind, determines user's kind.
For example, in the time that user's interest is shopping or sale, can determine that user belongs to advertisement user; Or, in the time of good friend that user's good friend is political class, can determine that user belongs to political user; Or, when user's interest is sale, when user's good friend is also mostly the user of sales industry simultaneously, can determine that user belongs to advertisement user.
In one embodiment, in historical audit logging with user, hit being combined into according to analysis user kind of rubbish message keyword record and interest distributed intelligence, when hitting the keyword that the kind of rubbish message keyword is commercial paper, when user's interest is for shopping or sale simultaneously, can determine that user belongs to advertisement user.
In steps A 2, the behavior restriction of different brackets can comprise the processing of closing of warning processing and/or default duration.The grade of behavior restriction is determined according to user's kind.For example, for advertisement user, can be set as user to warn processing; For disabled user, can be set as user to carry out the processing of closing of 1-15 days; For political user, can be set as user to carry out the processing of closing of 7-30 days; For swindle user, can forever close processing to user.
This kind of mode, insincere user is carried out different types of warning or closes processing, increase the threshold that insincere user uses social application, the harassing and wrecking of insincere user to normal users are reduced, realize initiatively identification and the shielding to insincere user of social application, thereby more effectively filtering advertisements and politics propagation wait invalid information, have higher practicality.
Table 1 is depicted as the table of comparisons that according to user types, user is carried out the behavior restriction of different brackets in an embodiment.
Table 1
User types Behavior restriction
Advertisement user Warn processing
Disabled user Give the processing of closing of 10 days
Politics user Give the processing of closing of 20 days
Swindle user Give forever to close processing
In one embodiment, said method, in implementation step S13, when insincere user being carried out to behavior restriction, also can delete the message that this user sends, thereby reduce the harassing and wrecking of insincere user to normal users.
A kind of method that disposal of refuse user is described by specific embodiment below, as shown in Figure 2, comprises the steps S21-S26.In this embodiment, judge user's kind according to user's the kind of hitting rubbish message keyword in rubbish message keyword record.
Step S21, when user enters social application, obtains user's file data;
Step S22, according to user's file data, judges whether user belongs to insincere user; If user belongs to insincere user, perform step S23; If user does not belong to insincere user, perform step S26;
Step S23, according to hitting rubbish message keyword record, the kind of the rubbish message keyword that judgement is hit in subscriber profile data;
Step S24, according to the kind of rubbish message keyword, determines user's kind;
Step S25, according to user's kind, the behavior of user being carried out to different brackets limits and deletes the information that user sends;
Step S26, user normally uses social application.
In step S23, except determining the kind of rubbish message keyword according to the rubbish message keyword record that hits in subscriber profile data, and then outside definite user's kind, also can judge according to other information in file data user's kind.Wherein, phasing is corresponding really with user's kind for the information of institute's foundation, selects the different information in file data, takes different modes to determine user's kind.For example, if judge user's industry kind in step S23 according to the trade information of user in file data, corresponding, in step S24, according to user's industry kind, determine user's kind.
In this embodiment, carry out the confidence level of analysis user according to user's file data, and record according to user's the rubbish message keyword that hits the kind that further judges insincere user, thereby by user's kind, user is carried out the behavior restriction of different brackets, increase the threshold that insincere user uses social application, reduce the harassing and wrecking of insincere user to normal users, realize initiatively identification and the shielding to insincere user of social application, thereby more effectively filtering advertisements and politics propagation wait invalid information, have higher practicality.
Fig. 3 is according to the device block diagram of a kind of disposal of refuse user shown in an exemplary embodiment.With reference to Fig. 3, this device comprises:
Acquisition module 31, for obtaining user's file data, at least one information in the personal information that file data comprises described user, historical audit logging and historical behavior information;
Analysis module 32, for the file data obtaining according to acquisition module 31, analyzes described user and whether belongs to insincere user;
Limiting module 33, in the time that analysis module 32 analysis user belong to insincere user, carries out behavior restriction to user;
Removing module 34, in the time that analysis module 32 analysis user belong to insincere user, deletes the message that user sends.
In one embodiment, analysis module 32, for when the historical audit logging that file data comprises user, the user who obtains according to acquisition module 31 is closed record, deleted Message Record, hit junk information keyword record and whether is exceeded default threshold value by the quantity of at least one record in report record, determines whether user belongs to insincere user; Wherein, user's historical audit logging comprises: user is closed record, deleted Message Record, hits junk information keyword record and by least one record in report record.
In one embodiment, as shown in Figure 4, analysis module 32 also comprises:
The first analytic unit 321, for comprise user when file data personal information time, whether the personal information of analysis user comprises default insincere information;
The first determining unit 322, in the time that the personal information of the first analytic unit 321 analysis user comprises insincere information, determines that user belongs to insincere user;
The second analytic unit 323, for comprise user when file data historical behavior information time, whether have default insincere behavior according to user's historical behavior information analysis user;
The second determining unit 324, in the time that the second analytic unit 323 analysis user have insincere behavior, determines whether user belongs to insincere user.
In one embodiment, as shown in Figure 5, limiting module 33 comprises with lower unit:
The 3rd analytic unit 331, in the time that user is insincere user, the kind of analysis user;
Limiting unit 332, for the user's that analyzes according to the 3rd analytic unit 331 kind, carries out the behavior restriction of different brackets to user.
In one embodiment, the 3rd analytic unit 331 comprises following subelement, as shown in Figure 6:
The first judgment sub-unit 3311, for according to user's trade information, judges user's industry kind;
First determines subelement 3312, for the kind of the rubbish message keyword that judges according to the first judgment sub-unit 3311, determines user's kind;
The second judgment sub-unit 3313, for according to hitting rubbish message keyword record, judges the kind of the rubbish message keyword hitting;
Second determines subelement 3314, for the kind of the rubbish message keyword that judges according to the second judgment sub-unit 3313, determines user's kind;
The 3rd judgment sub-unit 3315, for according to interest distributed intelligence and/or good friend's distributed intelligence, judges user's interest types and/or good friend's kind;
The 3rd determines subelement 3316, for the user's that judges according to the 3rd judgment sub-unit 3315 interest types and/or good friend's kind, determines user's kind.In one embodiment, second determines subelement 3314, when the keyword that is also commercial paper for the rubbish message keyword judging when the second judgment sub-unit 3313, determines that user is advertisement user; When keyword that the rubbish message keyword judging when the second judgment sub-unit 3313 is illegal class, determine that user is disabled user; When keyword that the rubbish message keyword judging when the second judgment sub-unit 3313 is political class, determine that user is political user; The rubbish message keyword judging when the second judgment sub-unit 3313 is while swindling the keyword of class, determines that user is swindle user.
In one embodiment, limiting unit 332, for the user's that analyzes according to the 3rd analytic unit 331 kind, to user warn process and/or default duration close processing.
The disposal of refuse user's that the disclosure provides device, carry out the confidence level of analysis user according to user's file data, thereby the confidence level by user is carried out behavior restriction to user, increase the threshold that insincere user uses social application, reduce the harassing and wrecking of insincere user to normal users, realized initiatively identification and the shielding to insincere user of social application, thereby more effectively filtering advertisements waits invalid information with political propagation, has higher practicality.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations have been described in detail in the embodiment about the method, will not elaborate explanation herein.
Fig. 7 is according to the block diagram of a kind of device 800 for the treatment of rubbish user shown in an exemplary embodiment.For example, device 800 can be mobile phone, computing machine, digital broadcast terminal, information receiving and transmitting equipment, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 7, device 800 can comprise following one or more assembly: processing components 802, storer 804, power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of I/O (I/O), sensor module 814, and communications component 816.
The integrated operation of processing components 802 common control device 800, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Treatment element 802 can comprise that one or more processors 820 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 802 can comprise one or more modules, is convenient to mutual between processing components 802 and other assemblies.For example, processing element 802 can comprise multi-media module, to facilitate mutual between multimedia groupware 808 and processing components 802.
Storer 804 is configured to store various types of data to be supported in the operation of equipment 800.The example of these data comprises for any application program of operation on device 800 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 804 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
Electric power assembly 806 provides electric power for installing 800 various assemblies.Electric power assembly 806 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for device 800.
Multimedia groupware 808 is included in the screen that an output interface is provided between described device 800 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.Described touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to described touch or slide.In certain embodiments, multimedia groupware 808 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 800 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 comprises a microphone (MIC), and when device 800 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal receiving can be further stored in storer 804 or be sent via communications component 816.In certain embodiments, audio-frequency assembly 810 also comprises a loudspeaker, for output audio signal.
I/O interface 812 is for providing interface between processing components 802 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 814 comprises one or more sensors, is used to device 800 that the state estimation of various aspects is provided.For example, sensor module 814 can detect the opening/closing state of equipment 800, the relative positioning of assembly, for example described assembly is display and the keypad of device 800, the position of all right pick-up unit 800 of sensor module 814 or 800 1 assemblies of device changes, user is with device 800 existence that contact or do not have the temperature variation of device 800 orientation or acceleration/deceleration and device 800.Sensor module 814 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 814 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 814 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to be convenient to the communication of wired or wireless mode between device 800 and other equipment.Device 800 wireless networks that can access based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 816 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, described communication component 816 also comprises near-field communication (NFC) module, to promote junction service.For example, can be based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be realized by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the storer 804 of instruction, above-mentioned instruction can have been carried out said method by the processor 820 of device 800.For example, described non-provisional computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage equipment etc.
A kind of non-provisional computer-readable recording medium, in the time that the instruction in described storage medium is carried out by the processor of mobile terminal, makes mobile terminal can carry out a kind of disposal of refuse user method, and described method comprises:
Obtain user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
According to described file data, analyze described user and whether belong to insincere user;
In the time that described user belongs to insincere user, described user is carried out to behavior restriction.
In the time of personal information that described file data comprises described user, described according to described file data, analyze described user and whether belong to insincere user, comprising:
Whether the personal information of analyzing described user comprises default insincere information;
In the time that described user's personal information comprises described insincere information, determine that described user belongs to insincere user.
In the time of historical audit logging that described file data comprises described user, described according to described file data, analyze described user and whether belong to insincere user, comprising:
Being closed record, deleted Message Record, hit junk information keyword record and being reported that whether the quantity of at least one record in record exceedes default threshold value, determines whether described user belongs to insincere user according to described user;
Wherein, described user's historical audit logging comprises: described user is closed record, deleted Message Record, hits junk information keyword record and by least one record in report record.
In the time of historical behavior information that described file data comprises described user, described according to described file data, analyze described user and whether belong to insincere user, comprising:
Whether there is default insincere behavior according to user described in described user's historical behavior information analysis;
In the time that described user has described insincere behavior, determine whether described user belongs to insincere user.
Described in the time that described user is insincere user, described user is carried out to behavior restriction, comprising:
In the time that described user is insincere user, analyze described user's kind;
According to described user's kind, described user is carried out to the behavior restriction of different brackets.
Described user's personal information comprises described user's trade information;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to described user's trade information, judge described user's industry kind;
According to described user's industry kind, determine described user's kind.Described user's historical audit logging comprises and hits rubbish message keyword record;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to the described rubbish message keyword record that hits, the kind of the described rubbish message keyword that judgement is hit;
According to the kind of described rubbish message keyword, determine described user's kind.
The kind of described rubbish message keyword comprises: the keyword of the keyword of the keyword of commercial paper, the keyword of illegal class, political class or swindle class;
Described according to the kind of described rubbish message keyword, determine described user's kind, comprising:
In the time of keyword that described rubbish message keyword is commercial paper, determine that described user is advertisement user;
In the time of keyword that described rubbish message keyword is illegal class, determine that described user is disabled user;
In the time of keyword that described rubbish message keyword is political class, determine that described user is political user;
In the time that described rubbish message keyword is the keyword of swindle class, determine that described user is for swindle user.
Described user's historical behavior information comprises: interest distributed intelligence and/or good friend's distributed intelligence;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to described interest distributed intelligence and/or good friend's distributed intelligence, judge described user's interest types and/or good friend's kind;
According to described user's interest types and/or good friend's kind, determine described user's kind.
The behavior restriction described according to described user's kind, described user is carried out to different brackets, comprising:
According to described user's kind, described user is warned to the processing of closing of processing and/or default duration.
Described method also comprises:
In the time that described user belongs to insincere user, delete the message that described user sends.
Those skilled in the art, considering instructions and putting into practice after invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Instructions and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendments and change not departing from its scope.Scope of the present invention is only limited by appended claim.

Claims (23)

1. disposal of refuse user's a method, is characterized in that, comprising:
Obtain user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
According to described file data, analyze described user and whether belong to insincere user;
In the time that described user belongs to insincere user, described user is carried out to behavior restriction.
2. method according to claim 1, is characterized in that, in the time of personal information that described file data comprises described user, described according to described file data, analyzes described user and whether belongs to insincere user, comprising:
Whether the personal information of analyzing described user comprises default insincere information;
In the time that described user's personal information comprises described insincere information, determine that described user belongs to insincere user.
3. method according to claim 1, is characterized in that, in the time of historical audit logging that described file data comprises described user, described according to described file data, analyzes described user and whether belongs to insincere user, comprising:
Being closed record, deleted Message Record, hit junk information keyword record and being reported that whether the quantity of at least one record in record exceedes default threshold value, determines whether described user belongs to insincere user according to described user;
Wherein, described user's historical audit logging comprises: described user is closed record, deleted Message Record, hits junk information keyword record and by least one record in report record.
4. method according to claim 1, is characterized in that, in the time of historical behavior information that described file data comprises described user, described according to described file data, analyzes described user and whether belongs to insincere user, comprising:
Whether there is default insincere behavior according to user described in described user's historical behavior information analysis;
In the time that described user has described insincere behavior, determine whether described user belongs to insincere user.
5. method according to claim 1, is characterized in that, described in the time that described user is insincere user, and described user is carried out to behavior restriction, comprising:
In the time that described user is insincere user, analyze described user's kind;
According to described user's kind, described user is carried out to the behavior restriction of different brackets.
6. method according to claim 5, is characterized in that, described user's personal information comprises described user's trade information;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to described user's trade information, judge described user's industry kind;
According to described user's industry kind, determine described user's kind.
7. method according to claim 5, is characterized in that, described user's historical audit logging comprises and hits rubbish message keyword record;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to the described rubbish message keyword record that hits, the kind of the described rubbish message keyword that judgement is hit;
According to the kind of described rubbish message keyword, determine described user's kind.
8. method according to claim 7, is characterized in that, the kind of described rubbish message keyword comprises: the keyword of the keyword of the keyword of commercial paper, the keyword of illegal class, political class or swindle class;
Described according to the kind of described rubbish message keyword, determine described user's kind, comprising:
In the time of keyword that described rubbish message keyword is commercial paper, determine that described user is advertisement user;
In the time of keyword that described rubbish message keyword is illegal class, determine that described user is disabled user;
In the time of keyword that described rubbish message keyword is political class, determine that described user is political user;
In the time that described rubbish message keyword is the keyword of swindle class, determine that described user is for swindle user.
9. method according to claim 5, is characterized in that, described user's historical behavior information comprises: interest distributed intelligence and/or good friend's distributed intelligence;
Described in the time that described user is insincere user, analyze described user's kind, comprising:
According to described interest distributed intelligence and/or good friend's distributed intelligence, judge described user's interest types and/or good friend's kind;
According to described user's interest types and/or good friend's kind, determine described user's kind.
10. method according to claim 5, is characterized in that, described according to described user's kind, and the behavior restriction that described user is carried out to different brackets, comprising:
According to described user's kind, described user is warned to the processing of closing of processing and/or default duration.
11. methods according to claim 1, is characterized in that, described method also comprises:
In the time that described user belongs to insincere user, delete the message that described user sends.
12. 1 kinds of disposal of refuse users' device, is characterized in that, comprising:
Acquisition module, for obtaining user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
Analysis module, for the described file data obtaining according to described acquisition module, analyzes described user and whether belongs to insincere user;
Limiting module, while belonging to insincere user, carries out behavior restriction to described user for analyzing described user when described analysis module.
13. devices according to claim 12, is characterized in that, described analysis module comprises:
The first analytic unit, for comprise described user when described file data personal information time, whether the personal information of analyzing described user comprises default insincere information;
The first determining unit, while comprising described insincere information, determines that described user belongs to insincere user for the personal information of analyzing described user when described the first analytic unit.
14. devices according to claim 12, it is characterized in that, described analysis module, also for comprise described user when described file data historical audit logging time, the described user who obtains according to described acquisition module is closed record, deleted Message Record, hit junk information keyword record and whether is exceeded default threshold value by the quantity of at least one record in report record, determines whether described user belongs to insincere user;
Wherein, described user's historical audit logging comprises: described user is closed record, deleted Message Record, hits junk information keyword record and by least one record in report record.
15. devices according to claim 12, is characterized in that, described analysis module comprises:
The second analytic unit, for comprise described user when described file data historical behavior information time, whether have default insincere behavior according to user described in described user's historical behavior information analysis;
The second determining unit, while having described insincere behavior, determines whether described user belongs to insincere user for analyzing described user when described the second analytic unit.
16. devices according to claim 12, is characterized in that, described limiting module comprises:
The 3rd analytic unit, in the time that described user is insincere user, analyzes described user's kind;
Limiting unit, for according to the described user's of described the 3rd analytic unit analysis kind, carries out the behavior restriction of different brackets to described user.
17. devices according to claim 16, is characterized in that, described the 3rd analytic unit comprises:
The first judgment sub-unit, for according to described user's trade information, judges described user's industry kind;
First determines subelement, for according to the described user's of described the first judgment sub-unit judgement industry kind, determines described user's kind.
18. devices according to claim 16, is characterized in that, described the 3rd analytic unit comprises:
The second judgment sub-unit, for hitting rubbish message keyword record described in basis, the kind of the described rubbish message keyword that judgement is hit;
Second determines subelement, for according to the kind of the described rubbish message keyword of described the second judgment sub-unit judgement, determines described user's kind.
19. devices according to claim 18, is characterized in that, described second determine subelement also for,
When keyword that the described rubbish message keyword judging when described the second judgment sub-unit is commercial paper, determine that described user is advertisement user;
When keyword that the described rubbish message keyword judging when described the second judgment sub-unit is illegal class, determine that described user is disabled user;
When keyword that the described rubbish message keyword judging when described the second judgment sub-unit is political class, determine that described user is political user;
The described rubbish message keyword judging when described the second judgment sub-unit is while swindling the keyword of class, determines that described user is for swindle user.
20. devices according to claim 16, is characterized in that, described the 3rd analytic unit comprises:
The 3rd judgment sub-unit, for according to described interest distributed intelligence and/or good friend's distributed intelligence, judges described user's interest types and/or good friend's kind;
The 3rd determines subelement, for according to the described user's of described the 3rd judgment sub-unit judgement interest types and/or good friend's kind, determines described user's kind.
21. devices according to claim 16, is characterized in that,
Described limiting unit, for according to the described user's of described the 3rd analytic unit analysis kind, warns the processing of closing of processing and/or default duration to described user.
22. devices according to claim 12, is characterized in that, described device also comprises:
Removing module, while belonging to insincere user, deletes the message that described user sends for analyzing described user when described analysis module.
23. 1 kinds of disposal of refuse users' device, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Obtain user's file data, at least one information in the personal information that described file data comprises described user, historical audit logging and historical behavior information;
According to described file data, analyze described user and whether belong to insincere user;
In the time that described user belongs to insincere user, described user is carried out to behavior restriction.
CN201410306731.9A 2014-06-30 2014-06-30 Method and device for processing junk user Pending CN104036037A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410306731.9A CN104036037A (en) 2014-06-30 2014-06-30 Method and device for processing junk user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410306731.9A CN104036037A (en) 2014-06-30 2014-06-30 Method and device for processing junk user

Publications (1)

Publication Number Publication Date
CN104036037A true CN104036037A (en) 2014-09-10

Family

ID=51466807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410306731.9A Pending CN104036037A (en) 2014-06-30 2014-06-30 Method and device for processing junk user

Country Status (1)

Country Link
CN (1) CN104036037A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104735048A (en) * 2014-12-02 2015-06-24 北京奇虎科技有限公司 Method and device for monitoring issued information in game
CN105262672A (en) * 2015-08-31 2016-01-20 小米科技有限责任公司 Intra-group anti-harassment method and device
CN105389704A (en) * 2015-11-16 2016-03-09 小米科技有限责任公司 Method and device for judging authenticity of users
CN105450510A (en) * 2015-12-18 2016-03-30 小米科技有限责任公司 Friend management method, device and server for social network platform
CN105553918A (en) * 2014-10-28 2016-05-04 广州华多网络科技有限公司 Method and apparatus for recognizing malicious information
CN105718501A (en) * 2014-12-19 2016-06-29 三星电子株式会社 Electronic apparatus and user profile estimating method thereof
CN105959213A (en) * 2016-07-22 2016-09-21 王晓光 Classification storage method and system for local email data
WO2016188334A1 (en) * 2015-05-22 2016-12-01 阿里巴巴集团控股有限公司 Method and device for processing application access data
CN106571933A (en) * 2016-11-03 2017-04-19 广州酷狗计算机科技有限公司 Service processing method and device
CN106897729A (en) * 2016-06-28 2017-06-27 阿里巴巴集团控股有限公司 Information identifying method, model training method, device and processing equipment
CN107079033A (en) * 2016-11-30 2017-08-18 深圳市大疆创新科技有限公司 Control method, control device and electronic installation
CN107656918A (en) * 2017-05-10 2018-02-02 平安科技(深圳)有限公司 Obtain the method and device of targeted customer
CN107729538A (en) * 2017-10-31 2018-02-23 广东欧珀移动通信有限公司 comment information processing method, device, terminal device and storage medium
CN108280139A (en) * 2017-12-28 2018-07-13 百度在线网络技术(北京)有限公司 Processing method, device, equipment and the computer readable storage medium of POI data
CN108880989A (en) * 2018-06-13 2018-11-23 佛山市澄澜点寸科技有限公司 It is a kind of for select receive information processing method and processing device
CN109831682A (en) * 2018-12-28 2019-05-31 广州华多网络科技有限公司 Signal auditing method, device, electronic equipment and storage medium
CN111626888A (en) * 2020-04-13 2020-09-04 北京达佳互联信息技术有限公司 Social interaction processing method, device, terminal, server, system and medium
CN112765487A (en) * 2021-01-25 2021-05-07 深圳市爱聊科技有限公司 Interaction method, interaction device, electronic equipment and computer storage medium
CN113300939A (en) * 2021-04-26 2021-08-24 国家计算机网络与信息安全管理中心 Development method of instant messaging software interactive robot

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113098A1 (en) * 2006-12-11 2011-05-12 Qurio Holdings, Inc. System and method for social network trust assessment
CN102315952A (en) * 2010-06-29 2012-01-11 百度在线网络技术(北京)有限公司 Method and device for detecting junk posts in community network
CN103516586A (en) * 2012-06-30 2014-01-15 北京神州泰岳软件股份有限公司 Online user behavior analysis system of instant messaging system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113098A1 (en) * 2006-12-11 2011-05-12 Qurio Holdings, Inc. System and method for social network trust assessment
CN102315952A (en) * 2010-06-29 2012-01-11 百度在线网络技术(北京)有限公司 Method and device for detecting junk posts in community network
CN103516586A (en) * 2012-06-30 2014-01-15 北京神州泰岳软件股份有限公司 Online user behavior analysis system of instant messaging system

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553918B (en) * 2014-10-28 2019-07-02 广州华多网络科技有限公司 A kind of method and device identifying fallacious message
CN105553918A (en) * 2014-10-28 2016-05-04 广州华多网络科技有限公司 Method and apparatus for recognizing malicious information
CN104735048A (en) * 2014-12-02 2015-06-24 北京奇虎科技有限公司 Method and device for monitoring issued information in game
CN104735048B (en) * 2014-12-02 2019-02-12 北京奇虎科技有限公司 The monitoring method and device to release news in a kind of game
CN105718501B (en) * 2014-12-19 2020-08-11 三星电子株式会社 Electronic device and user profile estimation method thereof
CN105718501A (en) * 2014-12-19 2016-06-29 三星电子株式会社 Electronic apparatus and user profile estimating method thereof
WO2016188334A1 (en) * 2015-05-22 2016-12-01 阿里巴巴集团控股有限公司 Method and device for processing application access data
CN105262672A (en) * 2015-08-31 2016-01-20 小米科技有限责任公司 Intra-group anti-harassment method and device
CN105389704B (en) * 2015-11-16 2020-01-10 小米科技有限责任公司 Method and device for judging authenticity of user
CN105389704A (en) * 2015-11-16 2016-03-09 小米科技有限责任公司 Method and device for judging authenticity of users
CN105450510B (en) * 2015-12-18 2019-03-01 小米科技有限责任公司 Friend management method, device and server for social network-i i-platform
CN105450510A (en) * 2015-12-18 2016-03-30 小米科技有限责任公司 Friend management method, device and server for social network platform
CN106897729A (en) * 2016-06-28 2017-06-27 阿里巴巴集团控股有限公司 Information identifying method, model training method, device and processing equipment
CN106897729B (en) * 2016-06-28 2020-09-11 阿里巴巴集团控股有限公司 Information identification method, model training method, device and processing equipment
CN105959213A (en) * 2016-07-22 2016-09-21 王晓光 Classification storage method and system for local email data
CN106571933A (en) * 2016-11-03 2017-04-19 广州酷狗计算机科技有限公司 Service processing method and device
CN106571933B (en) * 2016-11-03 2020-12-04 广州酷狗计算机科技有限公司 Service processing method and device
CN107079033A (en) * 2016-11-30 2017-08-18 深圳市大疆创新科技有限公司 Control method, control device and electronic installation
WO2018098710A1 (en) * 2016-11-30 2018-06-07 深圳市大疆创新科技有限公司 Control method, control apparatus, and electronic apparatus
CN107656918A (en) * 2017-05-10 2018-02-02 平安科技(深圳)有限公司 Obtain the method and device of targeted customer
CN107729538A (en) * 2017-10-31 2018-02-23 广东欧珀移动通信有限公司 comment information processing method, device, terminal device and storage medium
CN108280139A (en) * 2017-12-28 2018-07-13 百度在线网络技术(北京)有限公司 Processing method, device, equipment and the computer readable storage medium of POI data
CN108280139B (en) * 2017-12-28 2022-01-28 百度在线网络技术(北京)有限公司 POI data processing method, device, equipment and computer readable storage medium
CN108880989A (en) * 2018-06-13 2018-11-23 佛山市澄澜点寸科技有限公司 It is a kind of for select receive information processing method and processing device
CN109831682A (en) * 2018-12-28 2019-05-31 广州华多网络科技有限公司 Signal auditing method, device, electronic equipment and storage medium
CN109831682B (en) * 2018-12-28 2021-07-23 广州方硅信息技术有限公司 Information auditing method and device, electronic equipment and storage medium
CN111626888A (en) * 2020-04-13 2020-09-04 北京达佳互联信息技术有限公司 Social interaction processing method, device, terminal, server, system and medium
CN112765487A (en) * 2021-01-25 2021-05-07 深圳市爱聊科技有限公司 Interaction method, interaction device, electronic equipment and computer storage medium
CN113300939A (en) * 2021-04-26 2021-08-24 国家计算机网络与信息安全管理中心 Development method of instant messaging software interactive robot

Similar Documents

Publication Publication Date Title
CN104036037A (en) Method and device for processing junk user
CN104079962B (en) A kind of method and device for pushing recommendation information
CN104035979B (en) The method and relevant apparatus of object recommendation
CN106528709A (en) Social information recommendation method and apparatus
CN105653323A (en) Application program management method and device
CN104021350A (en) Privacy-information hiding method and device
CN104933170A (en) Information exhibition method and device
CN104156233B (en) Light application off-line update method, device and terminal
CN104038412A (en) Method and device for filtering spam messages
CN105262672A (en) Intra-group anti-harassment method and device
CN104639745B (en) Phonetic prompt method and device
CN105224349A (en) The deletion reminding method of application program and device
CN105468695A (en) Information display method and apparatus
CN106204097A (en) Information-pushing method, device and mobile terminal
CN105323244A (en) Method and device for network identification
CN105516944A (en) Short message canceling method and device
CN105162984A (en) Telephone number identification method and device
CN105335062A (en) Information editing operation processing method and apparatus
CN106446185A (en) Product recommendation method and device and server
CN104063654A (en) Monitoring method and device for application program
CN105205086A (en) Sharing method and device for application program using information
CN104331503A (en) Information push method and device
CN104932897A (en) Processing method of notification information and processing device of notification information
CN105100193A (en) Cloud business card recommendation method and device
CN106130873A (en) Information processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20140910

RJ01 Rejection of invention patent application after publication