CN104954360A - Method and device for blocking shared content - Google Patents

Method and device for blocking shared content Download PDF

Info

Publication number
CN104954360A
CN104954360A CN201510184660.4A CN201510184660A CN104954360A CN 104954360 A CN104954360 A CN 104954360A CN 201510184660 A CN201510184660 A CN 201510184660A CN 104954360 A CN104954360 A CN 104954360A
Authority
CN
China
Prior art keywords
user
sharing contents
propagation
target sharing
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510184660.4A
Other languages
Chinese (zh)
Other versions
CN104954360B (en
Inventor
查文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510184660.4A priority Critical patent/CN104954360B/en
Publication of CN104954360A publication Critical patent/CN104954360A/en
Application granted granted Critical
Publication of CN104954360B publication Critical patent/CN104954360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The invention discloses a method and a device for blocking shared content, belonging to the information security field. The method comprises: obtaining at least one piece of target shared content which is already blocked, wherein the target shared content refers to shared content which is not allowed to be spread in social applications according to blocking rules; analyze to get a spread source user according to at least one spread link of the target shared content, wherein the spread link is a user link formed by all users who access the target shared content when the target shared content is being spread in the social applications based on a relationship link; and blocking other target shared content that is spread by the spread source user. The invention solves the problem that in the prior art the target shared content can be blocked only when the target shared content has already been spread for a specified number of times or a specified time period, and achieves the effect of blocking the target shared content that is shared by spread source users before sharing so as to try to prevent the target shared content from being spread in the relationship link.

Description

Sharing contents screen method and device
Technical field
The present invention relates to information security field, particularly a kind of sharing contents screen method and device.
Background technology
Along with the development of the Internet, user can propagate sharing contents based on the relation chain in social class application, and such as, user A forwards a sharing contents to good friend user B, user B forwards sharing contents again to good friend user C, and this sharing contents can be microblogging, article, application program etc.
But some lawless person also can utilize relation chain to carry out communication target sharing contents, server needs target sharing contents to shield.A kind of screen method comprises: whether the hop count that server detects sharing contents reaches predetermined threshold, and carries sensitive keys word in this sharing contents; Reach predetermined threshold if testing result is the hop count of this sharing contents and carries sensitive keys word, then server determines that this sharing contents is target sharing contents, and shields this target sharing contents.
Realizing in process of the present invention, inventor finds that prior art at least exists following problem:
Above-mentioned technology can only at target sharing contents by propagation certain number of times or after the time, could shield this target sharing contents, now target sharing contents causes harm in certain spread scope.
Summary of the invention
Can only at target sharing contents by propagation certain number of times or after the time, the problem that could shield this target sharing contents, embodiments provides a kind of sharing contents screen method and device in order to solve above-mentioned technology.Described technical scheme is as follows:
First aspect, provide a kind of sharing contents screen method, the method comprises:
Obtain at least one the target sharing contents shielded;
According to the propagation chain of target sharing contents described at least one, analyze and obtain propagating source user; Described propagation chain when to be described target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process;
Shield described propagating source user to the propagation of other target sharing contents.
Second aspect, provide a kind of sharing contents screening arrangement, this device comprises:
Content obtaining module, for obtaining at least one the target sharing contents shielded;
Source user determination module, for the propagation chain according to target sharing contents described at least one, analyzes and obtains propagating source user; Described propagation chain when to be described target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process;
Shroud module, for shielding described propagating source user to the propagation of other target sharing contents.
The beneficial effect that the technical scheme that the embodiment of the present invention provides is brought is:
By the propagation chain of multiple target sharing contents shielded, analyze the propagating source user being produced or spread target sharing contents, follow-up other target sharing contents shared of propagating source user is shielded; Solving prior art can only at target sharing contents by the certain number of times of propagation or after the time, the problem that could shield this target sharing contents; Reach the target sharing contents that propagating source user is shared, just can shield before sharing, avoid target sharing contents in relation chain, carry out the effect propagated as far as possible.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is sharing contents that one embodiment of the invention provides propagation schematic diagram when propagating based on relation chain;
Fig. 2 is the flow chart of the sharing contents screen method that one embodiment of the invention provides;
Fig. 3 is the flow chart of the sharing contents screen method that one embodiment of the invention provides;
Fig. 4 is the flow chart of the sharing contents screen method that one embodiment of the invention provides;
Fig. 5 is the block diagram of the sharing contents screening arrangement that one embodiment of the invention provides;
Fig. 6 is the block diagram of the sharing contents screening arrangement that one embodiment of the invention provides;
Fig. 7 is the block diagram of the sharing contents screening arrangement that one embodiment of the invention provides.
Embodiment
For making the object, technical solutions and advantages of the present invention clearly, below in conjunction with accompanying drawing, embodiment of the present invention is described further in detail.
In social class application, customer relationship chain be by two two users between the chain that forms of specified relationship, this specified relationship includes but not limited to friend relation between two users, user pays close attention to the relation of another user, a user has relation of consulting the message that another user issues etc.
Each user can propagate sharing contents based on customer relationship chain.Such as, the sharing contents of oneself is distributed in the Twitter message of self by a user, is checked or obtain this sharing contents by other user with concern relation.Again such as, sharing contents is distributed in social information display platform by a user, checks by having friend relation and having other user obtaining authority or obtains this sharing contents.
But in view of many reasons such as politics, business, individual privacies, a part of sharing contents is inhibited in the application of social class and propagates, such as: relate to the speech of political sensitivity topic, relate to pornographic picture and text, the photo relating to star's privacy etc.In embodiments of the present invention, will forbid that according to shielding rules the sharing contents propagated in social class application is referred to as target sharing contents.The attendant that this shielding rules can be applied by social class formulates, and also can have User Defined.This shielding rules dynamically can also generate the report of same sharing contents based on multiple user.
When target sharing contents is propagated in social class application, propagate based on customer relationship chain.As shown in Figure 1, user 1 and user 2, user 3, user 4 have friend relation, and user 2 and user 5, user 6, user 7 have friend relation, and user 3 and user 8 have friend relation, user 4 and user 9 to 22 have friend relation, and user 9 and user 23 have friend relation.If each user forwards this target sharing contents, then, after user 1 shares a target sharing contents, the propagation chain of this target sharing contents is as follows:
User 1 → user 2 → user 5;
User 1 → user 2 → user 6;
User 1 → user 2 → user 7;
User 1 → user 3 → user 8;
User 1 → user 4 → user 9 → user 23;
User 1 → user 4 → user 10;
、、、
User 1 → user 4 → user 21;
User 1 → user 4 → user 22.
Analyze this propagation chain known, the propagation of target sharing contents has following features:
The first, target sharing contents always, after the user that good friend user is many forwards, obtains large-area diffusion, after such as target sharing contents is shared by user 4, has 14 people to have received this target sharing contents.
The second, except the original user of target sharing contents, other user forwards find target sharing contents in the sharing contents of good friend user after.
Also namely, if want the propagation of limited target sharing contents, on the one hand, shield at the original user place of target sharing contents, such as user 1 place as far as possible; On the other hand, as far as possible at the user place that good friend user is many, the forwarding of this target sharing contents to be limited, such as user 4 place.
In the embodiment of the present invention, the use that the original user of target sharing contents and the range of scatter after forwarding this target sharing contents exceed certain threshold value is thought propagating source user per family.
Please refer to Fig. 2, it illustrates the flow chart of the sharing contents screen method that one embodiment of the invention provides.The present embodiment is applied in the server of communication platform with this sharing contents screen method and illustrates, the method comprises:
Step 202, obtains at least one the target sharing contents shielded, and target sharing contents is the sharing contents forbidding propagation in social class application according to shielding rules.
Step 204, according to the propagation chain of at least one target sharing contents, analyzes and obtains propagating source user; Propagation chain when to be target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process.
Step 206, user is to the propagation of other target sharing contents for shielding propagating source.
In sum, the sharing contents screen method that the present embodiment provides, by the propagation chain of multiple target sharing contents shielded, analyze the propagating source user obtaining producing target sharing contents, follow-up other target sharing contents shared of propagating source user is shielded; Solving prior art can only at target sharing contents by the certain number of times of propagation or after the time, the problem that could shield this target sharing contents; Reach the target sharing contents that propagating source user is shared, just can shield before sharing, avoid target sharing contents in relation chain, carry out the effect propagated as far as possible.
Please refer to Fig. 3, it illustrates the flow chart of the sharing contents screen method that another embodiment of the present invention provides.The present embodiment is applied in the server of communication platform with this sharing contents screen method and illustrates, the method comprises:
Step 301, obtains at least one the target sharing contents shielded, and target sharing contents is the sharing contents forbidding propagation in social class application according to shielding rules;
Server obtains at least one the target sharing contents shielded.Target sharing contents is more, and the propagating source user determined is more accurate.Each target sharing contents can be different.
The form of target sharing contents can be at least one in text, image, voice, video, webpage and application program.
Step 302, obtains the propagation chain of each target sharing contents, obtains at least one propagation chain;
Server also obtains the propagation chain of each target sharing contents, more than one of the propagation chain of each target sharing contents.Such as, target sharing contents illustrated in fig. 1 has 18 propagation chain.
Step 303, adds up the occurrence number of each user in propagation chain;
Server also adds up the occurrence number of each user in each propagation chain of each target sharing contents.
Such as, each user illustrated in fig. 1 in the occurrence number of the propagation chain of target sharing contents as following table one:
User 1 User 2 User 3 User 4 User 5 User 6 User 7 User 8 User 9 User 10 User 11 User 12
18 3 1 14 1 1 1 1 1 1 1 1
User 13 User 14 User 15 User 16 User 17 User 18 User 19 User 20 User 21 User 22 User 23
1 1 1 1 1 1 1 1 1 1 1
Table one
Certainly, usually have a lot of bar at the target sharing contents shielded, and each target sharing contents there is a lot of bar propagation chain usually.Above-mentioned table one is only and schematically illustrates.
Step 304, user occurrence number being exceeded first threshold is defined as propagating source user; Or, occurrence number sequence is defined as propagating source user the user of front n position;
The user that occurrence number can be exceeded first threshold by server is defined as propagating source user, and such as first threshold is 10 times, then user 1 and user 4 are defined as propagating source user.Wherein, user 1 is the original user of target sharing contents, and user 4 is the range of scatter users more than 10 after forwarding this target sharing contents.
Or server can sort to each user according to occurrence number, sequence is defined as propagating source user the user of front n position.Such as, when target sharing contents is a lot of, the user sorted at first 100 can be defined as propagating source user by server.
Alternatively, the size of first threshold and the number correlation of target sharing contents, or, the size of first threshold and the number correlation of propagation chain.
Same, the size of n and the number correlation of target sharing contents, or, the size of n and the number correlation of propagation chain.
Server directly can shield all sharing contents that propagating source user shares.Or propagating source user can be listed in anti-target monitoring list by server, and the sharing contents that the user being positioned at this anti-target monitoring list shares needs server to carry out anti-target monitoring.Here " sharing " comprising: deliver original sharing contents, or, forward the sharing contents of other user.
The operation that propagating source user lists in after anti-target monitoring list by server is as follows.
Step 305, what receive propagating source user transmission shares request, shares request and carries the sharing contents needing to be shared;
Server receive each user send share request; Server detects each user and whether belongs to anti-target monitoring list; If belong to anti-target monitoring list, then server determines to receive that propagating source user sends shares request.
This is shared request and carries the sharing contents needing to be shared.The form of sharing contents includes but not limited at least one in text, image, voice, video, webpage and application program.
Step 306, detects sharing contents and whether belongs to target sharing contents;
Server by the manual examination and verification of attendant or preset algorithm, can detect sharing contents and whether belongs to target sharing contents.
This preset algorithm can be the key content recognizer based on corpus, such as, and text recognition algorithms, image recognition algorithm, audio frequency and video recognizer etc.This corpus is set up based on the target sharing contents shielded.Because this corpus constantly can expand based on follow-up newfound target sharing contents, so preset algorithm carries out according to the target sharing contents that shielded the learning-oriented algorithm continued to optimize.
Newfound target sharing contents can be reported by user or the manual examination and verification of attendant obtain.
Such as, propagating source user asks the sharing contents shared to be " May 1, various jewellery can be wiped away tears clearance sale, the whole audience 1 folding ".By preset algorithm, server detects that this sharing contents comprises target keywords " clearance sale of wiping away tears ", " 1 folding ", then server detects that sharing contents belongs to target sharing contents.
Which kind of detection mode is the embodiment of the present invention adopt be not specifically limited to server.
Step 307, if sharing contents belongs to target sharing contents, then shields this sharing contents.
If the testing result of server is sharing contents belong to target sharing contents, then shield sharing contents.
The mode of shielding sharing contents, includes but not limited to:
Forbid sharing this sharing contents;
Or only propagating source user is visible for this sharing contents;
Or, delete this sharing contents.
In sum, the sharing contents screen method that the present embodiment provides, by the propagation chain of multiple target sharing contents shielded, analyze the propagating source user being produced or spread target sharing contents, follow-up other target sharing contents shared of propagating source user is shielded; Solving prior art can only at target sharing contents by the certain number of times of propagation or after the time, the problem that could shield this target sharing contents; Reach the target sharing contents that propagating source user is shared, just can shield before sharing, avoid target sharing contents in relation chain, carry out the effect propagated as far as possible.
The sharing contents screen method that the present embodiment provides, also by the occurrence number of each user of statistics on the propagation chain of target sharing contents, analysis obtains propagating source user, namely the original user of propagating source user can be found out, the user that diffusion target sharing contents is more serious can be found out again, the shielding of target sharing contents can be carried out on each more crucial node of propagation chain, reach with less manpower or computational resource, realize shield effectiveness as well as possible.
As a kind of possible implementation, the step 304 in Fig. 3 replaced realization can become step 304a to step 304c, as shown in Figure 4.
Step 304a, adds up the propagation effect power of each user;
The relation chain had due to each user is not identical, and the propagation effect power that each user has in social class application is also different.
Such as, a user is star, has more than one hundred million follower in microblog, then this user to share the propagation effect force rate of a microblogging larger.
Again such as, a user only has 5 good friends, even if this user shares a target sharing contents, whole 5 good friends forward, and range of scatter is still limited, so the propagation effect power of this user is lower.
Alternatively, server adds up the propagation effect power of each user according to the attribute information of each user, and attribute information comprises: at least one information in user gradation, user type, good friend's quantity and concern number.
User gradation and the definition of user type in different social class application can be different.Such as, in microblog, user type can be divided into " large V " user by real-name authentication and domestic consumer; Again such as, in micro-letter platform, user type can be divided into public number and common account number.
Every attribute information can corresponding respective weight and quantized value, and server calculates propagation effect power according to the weight of every attribute information and quantized value.
Schematically, the user gradation of a user is 10 grades, and user type is " large V " user, and good friend's quantity is 200 people, and concern number is 50000 people, then server calculates the propagation effect power of this user and is:
10* weight 1+1* weight 2+200* weight 3+50000* weight 4.
Wherein, 1 is the quantized value of " large V " user, and weight 1 is the weight that user gradation is corresponding, and weight 2 is weights corresponding to user type, and weight 3 is weights corresponding to good friend's quantity, and weight 4 is weights corresponding to concern number.
Step 304b, according to occurrence number and propagation effect power, calculates the hazard index that each user shares target sharing contents;
Server directly can also calculate the product of occurrence number and propagation effect power, shares the hazard index of target sharing contents as each user.
Alternatively, occurrence number also correspondence has weight a, and propagation effect power also correspondence has weight b, and server calculates the hazard index that each user shares target sharing contents and is:
Occurrence number * weight a+ propagation effect power * weight b.
Step 304c, user hazard index being exceeded Second Threshold is defined as propagating source user.
In sum, the sharing contents screen method that the present embodiment provides, also by analyzing propagating source user in conjunction with occurrence number and propagation effect power, can analyze propagating source user more accurately.No matter be original user, or the user that diffusion target sharing contents is more serious, can under the amplification of respective weights, rapid serviced device identified, thus improves the accuracy of follow-up shielding process.
As the implementation that another kind is possible, because the testing result in step 306 may make a mistake.Step 308 is also comprised to step 311, as shown in Figure 5 after step 306 in Fig. 3.
Step 308, if sharing contents does not belong to target sharing contents, then allows sharing of sharing contents;
If server testing result is not within step 306 for belong to target sharing contents, then server allows sharing of this sharing contents.
Step 309, that records this sharing contents shares number of times;
Server is after allowing to share this sharing contents, and that also records this sharing contents shares number of times.
Step 310, detection is shared number of times and whether is reached the 3rd threshold value;
Step 311, if share number of times more than the 3rd threshold value, then again detects sharing contents and whether belongs to target sharing contents.
Also namely, if this sharing contents share number of times more than the 3rd threshold value, then it is more popular for representing this sharing contents, or potentially become more popular sharing contents, now server again detects sharing contents and whether belongs to target sharing contents.
If so, then step 307 is entered; If not, then enter step 308, but no longer perform step 309 afterwards.
Alternatively, in testing process again, detection mode is different from the detection mode of testing process last time.Such as, use preset algorithm to detect in step 306, in step 311, adopt the manual detection of attendant.
Alternatively, in testing process again, server still adopts preset algorithm to detect sharing contents whether to belong to target sharing contents.But because preset algorithm carries out according to the target sharing contents that shielded the learning-oriented algorithm continued to optimize, if there is new corpus to add in twice testing process, then testing process still likely eliminates the detection mistake of testing process last time again.
In sum, the sharing contents screen method that the present embodiment provides, by changing detection method or using learning-oriented preset algorithm again to check, makes target sharing contents on a large scale before propagating, through twice testing process, reduce the diffusion possibility of target sharing contents.And in prior art, owing to being judge for every bar sharing contents, if carry out twice testing process, a large amount of computational resources can be consumed.In the sharing contents that the present embodiment is only shared propagating source user, the sharing contents that there is suspicion carries out twice testing process, under the prerequisite using less computational resource, realizes the shielding of target sharing contents more accurately.
Be below the device embodiment of the embodiment of the present invention, for the content do not described in detail in device embodiment, also please refer to above-mentioned embodiment of the method one to one.
Please refer to Fig. 6, it illustrates the block diagram of the sharing contents screening arrangement that one embodiment of the invention provides.This sharing contents screening arrangement can by software, hardware or both combinations realize becoming in the server of communication platform all or part of, this device comprises:
Content obtaining module 620, for obtaining at least one the target sharing contents shielded.
Source user determination module 640, for the propagation chain according to target sharing contents described at least one, analyzes and obtains propagating source user; Described propagation chain when to be described target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process.
Shroud module 660, for shielding described propagating source user to the propagation of other target sharing contents.
In sum, the sharing contents screening arrangement that the present embodiment provides, by the propagation chain of multiple target sharing contents shielded, analyze the propagating source user being produced or spread target sharing contents, follow-up other target sharing contents shared of propagating source user is shielded; Solving prior art can only at target sharing contents by the certain number of times of propagation or after the time, the problem that could shield this target sharing contents; Reach the target sharing contents that propagating source user is shared, just can shield before sharing, avoid target sharing contents in relation chain, carry out the effect propagated as far as possible.
Please refer to Fig. 7, it illustrates the block diagram of the sharing contents screening arrangement that one embodiment of the invention provides.This sharing contents screening arrangement can by software, hardware or both combinations realize becoming in the server of communication platform all or part of, this device comprises:
Content obtaining module 620, for obtaining at least one the target sharing contents shielded.
Source user determination module 640, for the propagation chain according to target sharing contents described at least one, analyzes and obtains propagating source user; Described propagation chain when to be described target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process.
Shroud module 660, for shielding described propagating source user to the propagation of other target sharing contents.
Alternatively, described source user determination module 640, comprising:
Propagation chain acquiring unit 642, for obtaining the propagation chain of each described target sharing contents, obtains at least one propagation chain.
Number of times statistic unit 644, for adding up the occurrence number of each user in described propagation chain.
First determining unit 646, is defined as described propagating source user for the user described occurrence number being exceeded first threshold; Or described occurrence number sequence is defined as described propagating source user the user of front n position, and n is positive integer.
Alternatively, described source user determination module 640, comprising:
Propagation chain acquiring unit 642, for obtaining the propagation chain of each described target sharing contents, obtains at least one propagation chain.
Number of times statistic unit 644, for adding up the occurrence number of each user in described propagation chain.
Influence power statistic unit 645, for adding up the propagation effect power of each user.
Exponent calculation unit 647, for according to described occurrence number and described propagation effect power, calculates the hazard index that each user shares described target sharing contents.
Second determining unit 649, is defined as described propagating source user for the user described hazard index being exceeded Second Threshold.
Alternatively, described exponent calculation unit 647, for adding up the propagation effect power of each user according to the attribute information of each user, described attribute information comprises: at least one information in user gradation, user type, good friend's quantity and concern number.
Alternatively, described shroud module 660, comprising:
Request reception unit 662, for receive described propagating source user send share request, described in share request carry the sharing contents needing to be shared.
Whether content detection unit 664, belong to described target sharing contents for detecting described sharing contents.
Content screen unit 666, if be that described sharing contents belongs to described target sharing contents for the testing result of described content detection unit, then shields described sharing contents.
Alternatively, described shroud module 660, also comprises:
Allow to share unit 663, if be that described sharing contents does not belong to described target sharing contents for the testing result of described content detection unit 666, then allow sharing of described sharing contents.
Number of times computing unit 665, shares number of times for what record described sharing contents.
Whether threshold detection unit 667, reach the 3rd threshold value for sharing number of times described in detecting.
Detecting unit 669 again, if for the testing result of described threshold detection unit 667 for sharing number of times more than the 3rd threshold value, then again perform the step whether described sharing contents of described detection belongs to described target sharing contents.
The sharing contents screening arrangement that the present embodiment provides, also by the occurrence number of each user of statistics on the propagation chain of target sharing contents, analysis obtains propagating source user, namely the original user of propagating source user can be found out, the user that diffusion target sharing contents is more serious can be found out again, the shielding of target sharing contents can be carried out on each more crucial node of propagation chain, reach with less manpower or computational resource, realize shield effectiveness as well as possible.
The sharing contents screening arrangement that the present embodiment provides, also by analyzing propagating source user in conjunction with occurrence number and propagation effect power, can analyze propagating source user more accurately.No matter be original user, or the user that diffusion target sharing contents is more serious, can under the amplification of respective weights, rapid serviced device identified, thus improves the accuracy of follow-up shielding process.
The sharing contents screening arrangement that the present embodiment provides, by changing detection method or using learning-oriented preset algorithm to come again to check, make target sharing contents on a large scale before propagating, through twice testing process, reduce the diffusion possibility of target sharing contents.And in prior art, owing to being judge for every bar sharing contents, if carry out twice testing process, a large amount of computational resources can be consumed.In the sharing contents that the present embodiment is only shared propagating source user, the sharing contents that there is suspicion carries out twice testing process, under the prerequisite using less computational resource, realizes the shielding of target sharing contents more accurately.
It should be noted that: the sharing contents screening arrangement that above-described embodiment provides is when shielding target sharing contents, only be illustrated with the division of above-mentioned each functional module, in practical application, can distribute as required and by above-mentioned functions and be completed by different functional modules, internal structure by equipment is divided into different functional modules, to complete all or part of function described above.In addition, the sharing contents screening arrangement that above-described embodiment provides and sharing contents screen method embodiment belong to same design, and its specific implementation process refers to embodiment of the method, repeats no more here.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
One of ordinary skill in the art will appreciate that all or part of step realizing above-described embodiment can have been come by hardware, the hardware that also can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium mentioned can be read-only memory, disk or CD etc.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (12)

1. a sharing contents screen method, is characterized in that, described method comprises:
Obtain at least one the target sharing contents shielded, described target sharing contents is the sharing contents forbidding propagation in social class application according to shielding rules;
According to the propagation chain of target sharing contents described at least one, analyze and obtain propagating source user; Described propagation chain when to be described target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process;
Shield described propagating source user to the propagation of other target sharing contents.
2. method according to claim 1, is characterized in that, according to the propagation chain of target sharing contents described at least one, analyzes and obtains propagating source user, comprising:
Obtain the propagation chain of each described target sharing contents, obtain at least one propagation chain;
Add up the occurrence number of each user in described propagation chain;
The user described occurrence number being exceeded first threshold is defined as described propagating source user; Or described occurrence number sequence is defined as described propagating source user the user of front n position, and n is positive integer.
3. method according to claim 1, is characterized in that, according to the propagation chain of target sharing contents described at least one, analyzes and obtains propagating source user, comprising:
Obtain the propagation chain of each described target sharing contents, obtain at least one propagation chain;
Add up the occurrence number of each user in described propagation chain;
Add up the propagation effect power of each user;
According to described occurrence number and described propagation effect power, calculate the hazard index that each user shares described target sharing contents;
The user described hazard index being exceeded Second Threshold is defined as described propagating source user.
4. method according to claim 3, is characterized in that, adds up the propagation effect power of each user, comprising:
Add up the propagation effect power of each user according to the attribute information of each user, described attribute information comprises: at least one information in user gradation, user type, good friend's quantity and concern number.
5., according to the arbitrary described method of Claims 1-4, it is characterized in that, shield described propagating source user to the propagation of other target sharing contents, comprising:
Receive described propagating source user send share request, described in share request carry the sharing contents needing to be shared;
Detect described sharing contents and whether belong to described target sharing contents;
If described sharing contents belongs to described target sharing contents, then shield described sharing contents.
6. method according to claim 5, is characterized in that, detects after whether described sharing contents belong to described target sharing contents, also comprises:
If described sharing contents does not belong to described target sharing contents, then allow sharing of described sharing contents;
That records described sharing contents shares number of times;
Share number of times described in detection and whether reach the 3rd threshold value;
If described in share number of times more than the 3rd threshold value, then again perform the step whether described sharing contents of described detection belongs to described target sharing contents.
7. a sharing contents screening arrangement, is characterized in that, described device comprises:
Content obtaining module, for obtaining at least one the target sharing contents shielded;
Source user determination module, for the propagation chain according to target sharing contents described at least one, analyzes and obtains propagating source user; Described propagation chain when to be described target sharing contents propagate based on relation chain in social class application user's chain of being formed of each user of process;
Shroud module, for shielding described propagating source user to the propagation of other target sharing contents.
8. device according to claim 7, is characterized in that, described source user determination module, comprising:
Propagation chain acquiring unit, for obtaining the propagation chain of each described target sharing contents, obtains at least one propagation chain;
Number of times statistic unit, for adding up the occurrence number of each user in described propagation chain;
First determining unit, is defined as described propagating source user for the user described occurrence number being exceeded first threshold; Or described occurrence number sequence is defined as described propagating source user the user of front n position, and n is positive integer.
9. device according to claim 7, is characterized in that, described source user determination module, comprising:
Propagation chain acquiring unit, for obtaining the propagation chain of each described target sharing contents, obtains at least one propagation chain;
Number of times statistic unit, for adding up the occurrence number of each user in described propagation chain;
Influence power statistic unit, for adding up the propagation effect power of each user;
Exponent calculation unit, for according to described occurrence number and described propagation effect power, calculates the hazard index that each user shares described target sharing contents;
Second determining unit, is defined as described propagating source user for the user described hazard index being exceeded Second Threshold.
10. device according to claim 9, it is characterized in that, described exponent calculation unit, for adding up the propagation effect power of each user according to the attribute information of each user, described attribute information comprises: at least one information in user gradation, user type, good friend's quantity and concern number.
11. according to the arbitrary described device of claim 7 to 10, and it is characterized in that, described shroud module, comprising:
Request reception unit, for receive described propagating source user send share request, described in share request carry the sharing contents needing to be shared;
Whether content detection unit, belong to described target sharing contents for detecting described sharing contents;
Content screen unit, if be that described sharing contents belongs to described target sharing contents for the testing result of described content detection unit, then shields described sharing contents.
12. devices according to claim 11, is characterized in that, described shroud module, also comprises:
Allow to share unit, if be that described sharing contents does not belong to described target sharing contents for the testing result of described content detection unit, then allow sharing of described sharing contents;
Number of times computing unit, shares number of times for what record described sharing contents;
Whether threshold detection unit, reach the 3rd threshold value for sharing number of times described in detecting;
Detecting unit again, if for the testing result of described threshold detection unit for sharing number of times more than the 3rd threshold value, then again perform the step whether described sharing contents of described detection belongs to described target sharing contents.
CN201510184660.4A 2015-04-17 2015-04-17 Sharing contents screen method and device Active CN104954360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510184660.4A CN104954360B (en) 2015-04-17 2015-04-17 Sharing contents screen method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510184660.4A CN104954360B (en) 2015-04-17 2015-04-17 Sharing contents screen method and device

Publications (2)

Publication Number Publication Date
CN104954360A true CN104954360A (en) 2015-09-30
CN104954360B CN104954360B (en) 2018-09-04

Family

ID=54168714

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510184660.4A Active CN104954360B (en) 2015-04-17 2015-04-17 Sharing contents screen method and device

Country Status (1)

Country Link
CN (1) CN104954360B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681563A (en) * 2016-01-26 2016-06-15 深圳市美贝壳科技有限公司 Picture sharing permission implementation method for smart hardware equipment
CN106127535A (en) * 2016-08-24 2016-11-16 四川众缆科技有限公司 Advertisement push system based on mobile terminal and method
CN106682008A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Friend circle information classification method and device
CN106921565A (en) * 2017-03-30 2017-07-04 北京奇艺世纪科技有限公司 A kind of method and device of junk information identification
CN107818514A (en) * 2016-09-12 2018-03-20 腾讯科技(深圳)有限公司 A kind of method, apparatus and terminal that control online social network information to propagate
CN108900408A (en) * 2018-05-24 2018-11-27 四川斐讯信息技术有限公司 The method and system of friend information in a kind of shielding social platform
CN111447137A (en) * 2020-02-29 2020-07-24 中国平安人寿保险股份有限公司 Browsing condition data analysis method and device, server and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273673A1 (en) * 2004-05-19 2005-12-08 Paul Gassoway Systems and methods for minimizing security logs
CN102262681A (en) * 2011-08-19 2011-11-30 南京大学 Method for identifying key blog sets in blog information spreading
CN103136255A (en) * 2011-11-30 2013-06-05 腾讯科技(深圳)有限公司 Method and device for information management
CN103906066A (en) * 2012-12-27 2014-07-02 腾讯科技(北京)有限公司 Disturbance shielding method and apparatus for user generation content referring
CN103927398A (en) * 2014-05-07 2014-07-16 中国人民解放军信息工程大学 Microblog hype group discovering method based on maximum frequent item set mining
CN104182457A (en) * 2014-07-14 2014-12-03 上海交通大学 Poisson-process-model-based method for predicting event popularity in social network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050273673A1 (en) * 2004-05-19 2005-12-08 Paul Gassoway Systems and methods for minimizing security logs
CN102262681A (en) * 2011-08-19 2011-11-30 南京大学 Method for identifying key blog sets in blog information spreading
CN103136255A (en) * 2011-11-30 2013-06-05 腾讯科技(深圳)有限公司 Method and device for information management
CN103906066A (en) * 2012-12-27 2014-07-02 腾讯科技(北京)有限公司 Disturbance shielding method and apparatus for user generation content referring
CN103927398A (en) * 2014-05-07 2014-07-16 中国人民解放军信息工程大学 Microblog hype group discovering method based on maximum frequent item set mining
CN104182457A (en) * 2014-07-14 2014-12-03 上海交通大学 Poisson-process-model-based method for predicting event popularity in social network

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682008A (en) * 2015-11-06 2017-05-17 北京奇虎科技有限公司 Friend circle information classification method and device
CN105681563A (en) * 2016-01-26 2016-06-15 深圳市美贝壳科技有限公司 Picture sharing permission implementation method for smart hardware equipment
CN105681563B (en) * 2016-01-26 2019-04-09 深圳市美贝壳科技有限公司 The implementation method of intelligent hardware devices picture sharing permission
CN106127535A (en) * 2016-08-24 2016-11-16 四川众缆科技有限公司 Advertisement push system based on mobile terminal and method
CN107818514A (en) * 2016-09-12 2018-03-20 腾讯科技(深圳)有限公司 A kind of method, apparatus and terminal that control online social network information to propagate
CN107818514B (en) * 2016-09-12 2022-01-14 腾讯科技(深圳)有限公司 Method, device and terminal for controlling information propagation of online social network
CN106921565A (en) * 2017-03-30 2017-07-04 北京奇艺世纪科技有限公司 A kind of method and device of junk information identification
CN106921565B (en) * 2017-03-30 2019-12-13 北京奇艺世纪科技有限公司 Junk information identification method and device
CN108900408A (en) * 2018-05-24 2018-11-27 四川斐讯信息技术有限公司 The method and system of friend information in a kind of shielding social platform
CN111447137A (en) * 2020-02-29 2020-07-24 中国平安人寿保险股份有限公司 Browsing condition data analysis method and device, server and storage medium

Also Published As

Publication number Publication date
CN104954360B (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN104954360B (en) Sharing contents screen method and device
CN103150374B (en) Method and system for identifying abnormal microblog users
US9262537B2 (en) Systems and methods for dynamically determining influencers in a social data network using weighted analysis
US9258314B1 (en) Detection of anomalous instances through dynamic feature selection analysis
US20160119365A1 (en) System and method for a cyber intelligence hub
US11722503B2 (en) Responsive privacy-preserving system for detecting email threats
US9146943B1 (en) Determining user content classifications within an online community
TW201737072A (en) Application program project evaluation method and system
US20130204658A1 (en) System and method for improving effectiveness of internet marketing
US11062350B2 (en) Method, apparatus, and device for monitoring promotion status data, and non-volatile computer storage medium
US10560338B2 (en) Event-based data path detection
Rüdiger et al. Predicting the SARS-CoV-2 effective reproduction number using bulk contact data from mobile phones
CN110020025B (en) Data processing method and device
CN107809363B (en) Network information propagation control method and device
US9762655B2 (en) Directing communications to nodes of a social network using an elastic map
CN103888919A (en) Short message monitoring method and device thereof
US20180322125A1 (en) Itemset determining method and apparatus, processing device, and storage medium
Phetsouvanh et al. Analysis of multi‐input multi‐output transactions in the Bitcoin network
Bhattacharya et al. RT@ News: an analysis of news agency ego networks in a microblogging environment
US10439919B2 (en) Real time event monitoring and analysis system
Li et al. Privacy measurement method using a graph structure on online social networks
KR101568800B1 (en) Real-time issue search word sorting method and system
US20150371162A1 (en) System and method for identifying enterprise risks emanating from social networks
CN105183867A (en) Data processing method and device
Smailovic et al. Mining Social Networks for Calculation of SmartSocial Influence.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant