CN105704005A - Malicious user reporting method and device, and reporting information processing method and device - Google Patents

Malicious user reporting method and device, and reporting information processing method and device Download PDF

Info

Publication number
CN105704005A
CN105704005A CN201410711805.7A CN201410711805A CN105704005A CN 105704005 A CN105704005 A CN 105704005A CN 201410711805 A CN201410711805 A CN 201410711805A CN 105704005 A CN105704005 A CN 105704005A
Authority
CN
China
Prior art keywords
report
class
targeted customer
user
swindle
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410711805.7A
Other languages
Chinese (zh)
Other versions
CN105704005B (en
Inventor
周进
郭计伟
林陆
林陆一
胡境彬
曾岳锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201410711805.7A priority Critical patent/CN105704005B/en
Publication of CN105704005A publication Critical patent/CN105704005A/en
Application granted granted Critical
Publication of CN105704005B publication Critical patent/CN105704005B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the invention discloses a reporting information processing method. The method comprises a step of receiving a report request and extracting the target user identifier and report type comprised in the report request, a step of searching the operation record corresponding to the target user identifier, a step of obtaining semantic analysis model corresponding to the report type, a step of judging whether the operation record is corresponding to a malicious user or not according to the semantic analysis model, and generating a corresponding penalty processing instruction if so. The invention also discloses a reporting information processing device and the corresponding malicious user reporting method and device. By using the malicious user reporting method and device, and the reporting information processing method and device, the timeliness of the response of a user report can be improved.

Description

Malicious user report method and device, report information processing method and device
Technical field
The present invention relates to Internet technical field, particularly relate to a kind of malicious user report method and device, report information processing method and device。
Background technology
Along with the development of the Internet, the social networks application such as JICQ has increasingly incorporated the life of netizen。And much undesirable also begins to be played one's own game by social networks application propagation pornographic, advertisement, heresy, swindle information, it is called the malicious user in social networks application。
The method that the content in the social networks application of current main flow, malicious user issued is reported is all extensive mode。Its process is generally, user chooses malicious user or selects the content of multimedia such as the text of malicious user issue, picture or video, the report button then clicked in social networks application sends user's report command, then in the input frame ejected, input the incidental information (optional step) of report, incidental information includes the type etc. of reason, evidence or malicious act, for instance: user can input the incidental information of " xx have sent the publicity pictures of XXX heresy to me " so that reason and the malicious act of its report to be described。
But, inventor is it have been investigated that at least there is problems in that in conventional art the process of the report information of malicious user in conventional art, the report content that user chooses combines, firstly the need of the report information analytical tool on backstage, the incidental information filled in and sorts out, need to travel through different types of semantic analysis model, report content is identified by the semantic analysis model finding out coupling, thus judging whether report information meets punishment condition。Accordingly, it would be desirable to the longer time could return feedback information (report content is eligible, punishes, does not meet, and prompting report application is not passed through) so that the promptness that user's report meets with a response is not enough。
Summary of the invention
Based on this, in order to solve the technical problem of the promptness deficiency that above-mentioned user report meets with a response, spy provides a kind of report information processing method。
A kind of report information processing method, including:
Receive report request, extract the targeted customer's mark and report type that wherein comprise;
Search described targeted customer and identify the operation note of correspondence;
Obtain the semantic analysis model corresponding with described report type;
Judge the whether corresponding malicious user of described operation note according to described semantic analysis model, if so, then generate and punish processing instruction accordingly。
Additionally, for the technical problem solving the promptness deficiency that above-mentioned user report meets with a response, additionally provide a kind of report information and process device。
A kind of report information processes device, including:
Report request receiver module, is used for receiving report request, extracts the targeted customer's mark and report type that wherein comprise;
Module is searched in operation note, identifies the operation note of correspondence for searching described targeted customer;
Analytical model acquisition module, for obtaining the semantic analysis model corresponding with described report type;
Malicious user determination module, for judging the whether corresponding malicious user of described operation note according to described semantic analysis model, if so, then generates and punishes processing instruction accordingly。
Additionally, for the technical problem solving the promptness deficiency that above-mentioned user report meets with a response, additionally provide a kind of malicious user report method。
A kind of malicious user report method, including:
Receive report command, obtain targeted customer's mark that described report command is corresponding;
Obtain the report type preset and show;
Obtain the report type chosen generate report request and report to server;
Receive the punishment processing instruction of server return and perform。
Additionally, for the technical problem solving the promptness deficiency that above-mentioned user report meets with a response, additionally provide a kind of malicious user report device。
A kind of malicious user report device, including:
Report command receiver module, is used for receiving report command, obtains targeted customer's mark that described report command is corresponding;
Report type display module, for obtaining default report type and showing;
Report request reporting module, generates report request for obtaining the report type chosen and reports to server;
Terminal penalty processing module, for receiving the punishment processing instruction of server return and performing。
Implement the embodiment of the present invention, will have the advantages that
User is after using the terminal reporting method based on above-mentioned malicious user to initiate report request to the server based on above-mentioned report information processing method, owing to having attached clear and definite report type in report request, server can be rapidly selected, according to the report type that user selects, the operation note that targeted customer identifies by corresponding semantic analysis model and identify rapidly。Compare with conventional art, owing to the semantic analysis model that operation note is identified selected is perfectly correlated with the report type of selection, therefore only can be judged accurately by single semantic analysis model。Therefore on the basis of conventional art, not only ensure that the accuracy that report information processes, also improve and return the corresponding promptness punishing processing instruction。
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, the accompanying drawing used required in embodiment or description of the prior art will be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings。
Wherein:
Fig. 1 selects user's head portrait to carry out the surface chart reported in one application scenarios;
Fig. 2 is the surface chart that in conventional art, user fills in report content;
Fig. 3 is the flow chart of a kind of malicious user report method in an embodiment;
Fig. 4 is the flow chart of a kind of report information processing method in an embodiment;
Fig. 5 is the interface schematic diagram selecting report type in an application scenarios;
Fig. 6 is the interface schematic diagram selecting report type in an application scenarios;
Fig. 7 is the interface schematic diagram selecting report type in an application scenarios;
Fig. 8 is the interface schematic diagram selecting report type in an application scenarios;
Fig. 9 is the interface schematic diagram filling in report additional content in an application scenarios;
Figure 10 is the structure chart of a kind of malicious user report device in an embodiment;
Figure 11 is the structure chart that in an embodiment, a kind of report information processes device。
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments。Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention。
The software of the report mechanism in social networks application in conventional art realizes including client and server two parts。Client part is referred to shown in Fig. 1, user in the operation of social networks applications client can click the head portrait of harassing and wrecking information transmitter by right key, then clicks on report, then can eject input frame as shown in Figure 2, prompting user inputs report content, and then this report content is reported to server by client。Be can be seen that by Fig. 1 and Fig. 2, in report mechanism in conventional art, report content is manually entered in client by the user carrying out reporting, therefore the reason of its input or evidence have bigger randomness, make in this mechanism, server needs to first pass through semantic analysis, and the molestation of this harassing and wrecking information transmitter is sorted out, and then judges whether it meets punishment condition again。And the method sorted out also usually travels through multiple semantic analysis model, find out the report type that the semantic analysis model mated most is corresponding。
Such as, server can create multiple semantic analysis models such as advertising message analytical model, pornography analytical model and reaction information analytical model in advance, the report content filled in for user then can use above-mentioned advertising message analytical model, pornography analytical model and reaction information analytical model to be analyzed successively, if the matching degree that advertising message analytical model obtains after being analyzed is the highest, then judge that the report content that this user fills in is harassed as waste advertisements, then can judge whether this harassing and wrecking information transmitter meets punishment condition further。
Be can be seen that from above, in traditional social networks application report mechanism, user is indefinite by the report content of client upload, and server needs cost more time for report content classification is analyzed, and therefore result in the response problem not in time carrying out measure of punishing。
For solving above-mentioned server response problem not in time, in one embodiment, spy proposes the report mechanism of a kind of new social networks application, this report mechanism is made up of two-part method step, reports method (terminal part) including the malicious user running on social networks applications client and runs on the report information processing method (server section) of social networks application server accordingly。The execution of the malicious user report method run in terminal and the report information processing method run on the server all can be dependent on computer program, can run on the computer system of von Neumann system。This terminal can be the terminal unit that smart mobile phone, panel computer, notebook computer or desktop computer etc. are provided with intelligent operating system or desktop operating system;This server can be then the computer equipment of the server program running social networks application or be exploited separately for the computer equipment performing to carry out report information process in social networks application。
Concrete, in the present embodiment, malicious user report method is as it is shown on figure 3, include:
Step S102: receive report command, obtains targeted customer's mark that report command is corresponding。
Step S104: obtain the report type preset and show。
Step S106: obtain the report type chosen and generate report request and report to server。
Step S108: receive the punishment processing instruction of server return and perform。
Accordingly, in the present embodiment, report information processing method then as shown in Figure 4, including:
Step S202: receive report request, obtains targeted customer's mark that report request is corresponding。
Step S204: search targeted customer and identify the operation note of correspondence。
Step S206: obtain the report type that report request is corresponding, obtains the semantic analysis model corresponding with report type。
Step S208: judge the whether corresponding malicious user of operation note according to semantic analysis model, if so, then perform step S210: generate and punish processing instruction accordingly。
In the present embodiment, user applies the head portrait click right selecting to send the user of harassing and wrecking information in the chat window of (one that instant messaging application falls within social networks application) at social networks, after selecting report, terminal then have input report command, according to the click behavior of user, terminal can determine that targeted customer's mark corresponding to this report command is targeted customer's mark (i.e. step S102) that the head portrait of user sending harassing and wrecking information clicked by right key is corresponding。Targeted customer identifies the identification informations such as the targeted customer that can be reported account in social networks is applied, mailbox。
As it is shown in figure 5, terminal can eject report type selecting window after receiving report command, show that the report type preset selects for the user of operation in terminal thereon。In the present embodiment, report type can include harassing and wrecking class (i.e. " junk information harassing and wrecking " option in Fig. 5), flame class (i.e. " propagating the flames such as pornographic/violence/reaction " option in Fig. 5) and swindle class (i.e. " this account number is swindling money " option in Fig. 5)。
Preferably, report type may also include multiple level。As shown in Figure 6, user then shows the subtype under the report type of harassing and wrecking class after choosing " junk information harassing and wrecking " option, can at least include waste advertisements class (as shown in Figure 6 " waste advertisements " option) and abuse class (" humiliating abuse " as shown in Figure 6 option)。
As shown in Figure 7, user then shows the subtype under the report type of flame class after choosing " propagating the flames such as pornographic/violence/reaction " option, can at least include pornographic class (as shown in Figure 7 " pornographic obscene " option), reaction politics class (as shown in Figure 7 " reaction politics " option) and violence terror class (as shown in Figure 7 " violence is feared cruelly " option)。
As shown in Figure 8, user then shows the subtype under the report type of swindle class after choosing " this account number is swindling money " option, can at least include strange swindle class (as shown in Figure 8 " being; the number of cheat oneself " option) and camouflage swindle class (as shown in Figure 8 " no, good friend's account is just stolen " option)。
User can be chosen by the corresponding option of click and report type accordingly, and then according to the targeted customer that user chooses, terminal identifies and report that type generates report request and reports to server。
Preferably, terminal, before showing report type, can be downloaded report type by server。Such as, server can use xml or config document definition report type and hierarchical structure thereof, and after user clicks " report ", terminal is downloaded this xml or config file by server, then reports type according to this xml or config document presentation。Adopting this kind of mode can ensure version updating on server, when adding or delete report type, terminal can complete the adaptation with server without edition upgrading。
After server receives report request, the report type (step S202) that targeted customer identifies and informer chooses comprised in report request can be extracted。Server can be searched targeted customer in the historical data of social networks application according to this targeted customer mark and identify the operation note (i.e. step S204) of correspondence。The operation note found can be post record, microblogging record, chat record etc., the record of the content of namely user's input。
Preferably, the operation note at the front N bar receiving the report moment of this targeted customer mark can be extracted。In the present embodiment, N value is 10。Such as, if certain user continues propagation waste advertisements of posting, when it is when being reported for 10, then only inquire about 10 models sent report 10 these users from back to front of front time of moment and be analyzed as operation note。
Step S206: obtain the semantic analysis model corresponding with report type。
Semantic analysis model is the function model for the text comprised in the content of user's inputs such as record of posting, microblogging record, chat record, image, audio or video content are analyzed。Such as, for content of text, by keyword match and word dependency, content of text can be carried out semantic analysis;For picture material, then by combining image searching algorithm or skin color detection algorithm, picture material can be detected (being mainly used in judging whether image or video content relate to Pornograph)。
In the present embodiment, the semantic analysis model preset is corresponding with report type。Such as, the report type of " waste advertisements class " i.e. correspondence is specifically designed to the semantic analysis model carrying out waste advertisements identification, and whether it can comprise advertisement keywords by analysis user in being posted identifies that whether targeted customer identifies the operation note of correspondence for have input waste advertisements;The report type i.e. correspondence of " pornographic obscene " class is specifically designed to the semantic analysis model carrying out yellow image identification。
Step S208: judge the whether corresponding malicious user of operation note according to semantic analysis model, if so, then generate and punish processing instruction accordingly。
As previously mentioned, semantic analysis model is and the function model for different types of information content is processed created, can pass through to call the interface function of function model of the semantic analysis model corresponding with reporting type, and operation note can be obtained function model as parameter transmission return result accordingly。This return result can be produced by the input behavior of malicious user by decision record, namely judges that targeted customer identifies whether the ID as malicious user。
What punishment processing instruction was that server generates identifies, for the targeted customer being judged as malicious user, the instruction carrying out punishment process in terminal or server。Preferably, also include after server generates the corresponding step punishing processing instruction: server also removable targeted customer identifies corresponding session and/or refusal targeted customer identifies login。
Such as, if user A have sent the link of picture or the video comprising Pornograph in instant communications applications to good friend user B, user A has been reported by good friend user B by selecting user A head portrait in chat window, and have selected report type for pornographic obscene, then server is after the report request that the terminal receiving user B place is initiated, call and be specifically designed to the content that in the semantic analysis model (namely image or video are undertaken by image procossing the function model of Pornograph identification) that pornographic obscene content is analyzed the identify chat record to user A and user B, user A inputs and carry out semantic analysis。
This semantic analysis model returns after confirming the message that the content of user A input includes Pornograph, namely can determine that user A is malicious user。User A session on instant communication server can be removed, that is, force to roll off the production line (in instant communications applications by user A, session is generally preservation user after user logs in and logs in the object of state, session is deleted, then mean that the login state of user is canceled, it is necessary to user logs in again)。After forcing to roll off the production line by user, also the IP address of user A can be added the blacklist logged in, stop user A to log in a period of time。
Preferably, after judging that user A (i.e. targeted customer's mark) is as malicious user, also targeted customer can be identified in addition report record。When generating punishment processing instruction, then can select to punish rank accordingly according to report record。As above, in example, if user A exists more record in report record, then it is longer that the time span that organizing user A logs in then can be arranged;If user A exists less record in report record, then it is shorter that the time span that organizing user A logs in then can be arranged。
In other embodiments, it is possible to generate punishment instruction according to the relevant user data that the social networks at user A place is applied。Such as, if social networks application comprises electronic commerce affair, then can according to user data such as the credit ratings of the result selection reduction user A judging malicious user。In including the social networks application of user service data of the accumulative accumulation of the needs such as empirical value, evaluation of estimate (such as online game etc.), it is possible to select the numerical value reducing user service data to punish。
Server also will can punish that processing instruction is handed down to terminal accordingly。Terminal then performs to punish processing instruction (i.e. step S108) accordingly after receiving punishment processing instruction。As above, in example, the punishment processing instruction that server returns may also comprise the part warning the user A information that please don't send Pornograph and stops the user A part logged in terminal。The terminal at user A place is after receiving the punishment processing instruction that server returns, then can pop-up dialogue box, show the information of " Pornograph please don't be sent; forced to roll off the production line ", and after user A inputs its account (i.e. targeted customer's mark), eject the information of " account is locked ", stop it to log in。
It is to say, targeted customer identifies after being judged as corresponding malicious user, then both on the server it can be punished, by the punishment processing instruction generated, its storage user data on the server be modified;Also by server, punishment processing instruction can be issued to terminal, terminal call the function accordingly with penalty mechanism and stop user A to proceed part input operation (such as, pop-up dialogue box, or part button is graying etc.)。And the punishment treatment mechanism of server and terminal both can carry out parallel, it is possible to only perform in certain one end。
In one embodiment, judge that the step of the whether corresponding malicious user of operation note also includes according to semantic analysis model:
Report additional content is extracted according to report request;The whether corresponding malicious user of operation note is judged according to semantic analysis model in conjunction with report additional content。
With reference to Fig. 6 to shown in 8, user, after selecting report type, also can fill in additional information as report additional content in the choice box ejected。After report additional content is sent to server by report request by terminal, server when the operation note of user is carried out semantics recognition, is then identified in combinations with report additional content。
Such as, informant can fill in the range parameter of concrete time parameter, contextual information or operation note that harassing and wrecking information occurs in report additional content (in instant communications applications, namely can be defined as sending the bar number of message, such as first 10, first 100, the same day etc.)。When operation note is carried out semantics recognition by server, then can search operation note to be identified accordingly more exactly according to this report additional content so that the result of determination of malicious user is more accurate。
In another embodiment, in terminal, the user of operation also can directly select Message Record as reporting that additional content is reported。If as it is shown in figure 9, in instant communications applications, user A have sent porny to user B, then user B can click directly on porny and select report in the menu ejected, and then selects to report type accordingly。Terminal then can find the ID of the user A of correspondence according to the picture selected, and then as report additional content, the link of this picture or its correspondence or its identification number stored on the server is sent to server。This picture when processing this report request, then only can be carried out semantic analysis by server, it is possible to searches the context corresponding with this picture in chat record and carries out semantic analysis as auxiliary judgment。
In the present embodiment, also include after receiving the step of report request: extract third party's identity according to report request;Obtain the historical record corresponding with third party's identity, judge the whether corresponding malicious user of third party's identity according to historical record, if so, then call third party's identity report interface and report third party's identity。
Such as, as shown in Figure 8, user is when selecting the report type of swindle class, it is also possible to input bank card number, cell-phone number or identification card number report server as additional third party's identity by report request。Such as, in the swindle class note typically received or message, owing to swindler needs cheated person to be transferred accounts to by the amount of money specific account No., therefore, the harassing and wrecking information of swindle class generally comprises bank's card number of swindler, cell-phone number or identification card number。
Server is after receiving the third party's identity reported, and what renewable backstage stored reports record (such as, often receive identical third party's identity and report, add up and report number of times)。If what this third party's identity detected reports number of times more than threshold value, then can determine that this third party's identity is likely the identity of swindler。
The report interface that third party's identity report interface and third party identity manager provide。Such as, for identity card, the report interface that can call Public Security Organs provides is reported;For bank card, then the report interface that can call banking system provides is reported;To phone number, then the report interface that can call common carrier provides is reported。
In other embodiments, judge that the process of third party's identity whether corresponding malicious user also can be not limited only to report number of times in aforesaid historical record, also can record in historical record by reference informations such as the geographical position at informant place, IP address, time of origins, then according to whether above-mentioned reference information comprehensive descision third party's identity is malicious user。
Such as, if report request contains phone number, this phone number was reported repeatedly in historical record, but it is not the common address existed in historical record and common IP (address at the terminal place namely reported during major part report generation and IP) that the targeted customer wherein extracted identifies the geographical position at the terminal place of correspondence, then can be judged to non-malicious user (being likely cell-phone number to change hands)。Third party's identity is judged by the historical record in conjunction with above-mentioned reference information, it is possible to make the penalty mechanism that report processes more accurate。
Preferably, generate the corresponding step punishing processing instruction also to include:
Judge that targeted customer identifies whether corresponding good friend user, the terminal that if so, then lock onto target ID is corresponding, and be sent to the punishment processing instruction of Modify password。
The terminal that lock onto target ID is corresponding, is the request of other Business Processing to its initiation and does not deal with, it is possible to be redirected to the interface of Modify password。Terminal after receiving the punishment processing instruction of Modify password, then can be forced to show the interface of Modify password, point out user's Modify password。
And judge that targeted customer identifies whether that namely the step of corresponding good friend user comprises the steps that and judges whether report type is camouflage swindle class, if then judging that targeted customer identifies corresponding good friend user。
As shown in Figure 8, if informant have selected " no, good friend's account is just stolen ", then can determine that targeted customer is designated the good friend of informant。In other embodiments, it is possible to judge that targeted customer identifies whether corresponding good friend user by inquiry targeted customer mark in the user relationship data storehouse applied at social networks with the corresponding relation of the ID of informant。
In one embodiment, as shown in Figure 10, a kind of malicious user report device is also proposed accordingly, including report command receiver module 102, report type display module 104, report request reporting module 106 and terminal penalty processing module 108, wherein:
Report command receiver module 102, is used for receiving report command, obtains targeted customer's mark that described report command is corresponding。
Report type display module 104, for obtaining default report type and showing。
Report request reporting module 106, generates report request for obtaining the report type chosen and reports to server。
Terminal penalty processing module 108, for receiving the punishment processing instruction of server return and performing。
In the present embodiment, report type display module 104 is additionally operable to be downloaded, by server, the report type preset。
In the present embodiment, report type includes at least harassing class, flame class and swindle class;
Described harassing and wrecking class at least includes waste advertisements class and abuses class;
Described flame class at least includes pornographic class, reaction politics class and violence terror class;
Described swindle class includes strange swindle class and camouflage swindle class。
In one embodiment, as shown in figure 11, also propose a kind of report information accordingly and process device, search module 204, analytical model acquisition module 206 and malicious user determination module 208 including report request receiver module 202, operation note, wherein:
Report request receiver module 202, is used for receiving report request, extracts the targeted customer's mark and report type that wherein comprise。
Module 204 is searched in operation note, identifies the operation note of correspondence for searching described targeted customer。
Analytical model acquisition module 206, for obtaining the semantic analysis model corresponding with described report type。
Malicious user determination module 208, for judging the whether corresponding malicious user of described operation note according to described semantic analysis model, if so, then generates and punishes processing instruction accordingly。
In the present embodiment, malicious user determination module 208 is additionally operable to extract report additional content according to described report request;The whether corresponding malicious user of described operation note is judged according to described semantic analysis model in conjunction with described report additional content。
In the present embodiment, as shown in figure 11, report information processes device and also includes the first punishment processing module 210, identifies the session of correspondence for removing described targeted customer and/or refuses described targeted customer and identify login。
In the present embodiment, as shown in figure 11, report information process device also includes third party and reports module, for extracting third party's identity according to described report request;Obtain the historical record corresponding with described third party's identity, judge the whether corresponding malicious user of described third party's identity according to described historical record, if so, then call third party's identity report interface and report described third party's identity。
In the present embodiment, as shown in figure 11, report information process device also includes the second punishment processing module 212, for judging that described targeted customer identifies whether corresponding good friend user, if so, then lock described targeted customer and identify the terminal of correspondence, and be sent to the punishment processing instruction of Modify password。
In the present embodiment, report type includes at least harassing class, flame class and swindle class。
Harassing and wrecking class at least includes waste advertisements class and abuses class。
Flame class at least includes pornographic class, reaction politics class and violence terror class。
Swindle class includes strange swindle class and camouflage swindle class。
Second punishment processing module 212 is additionally operable to judge whether report type is camouflage swindle class, if then judging that described targeted customer identifies corresponding good friend user。
In sum, implement the embodiment of the present invention, will have the advantages that
User is after using the terminal reporting method based on above-mentioned malicious user to initiate report request to the server based on above-mentioned report information processing method, owing to having attached clear and definite report type in report request, server can be rapidly selected, according to the report type that user selects, the operation note that targeted customer identifies by corresponding semantic analysis model and identify rapidly。Compare with conventional art, owing to the semantic analysis model that operation note is identified selected is perfectly correlated with the report type of selection, therefore only can be judged accurately by single semantic analysis model。Therefore on the basis of conventional art, not only ensure that the accuracy that report information processes, also improve and return the corresponding promptness punishing processing instruction。
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, can be by the hardware that computer program carrys out instruction relevant to complete, described program can be stored in a computer read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each side method。Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc.。
Above disclosed it is only present pre-ferred embodiments, certainly can not limit the interest field of the present invention, the equivalent variations therefore made according to the claims in the present invention with this, still belong to the scope that the present invention contains。

Claims (18)

1. a report information processing method, including:
Receive report request, extract the targeted customer's mark and report type that wherein comprise;
Search described targeted customer and identify the operation note of correspondence;
Obtain the semantic analysis model corresponding with described report type;
Judge the whether corresponding malicious user of described operation note according to described semantic analysis model, if so, then generate and punish processing instruction accordingly。
2. report information processing method according to claim 1, it is characterised in that described judge that the step of described operation note whether corresponding malicious user also includes according to described semantic analysis model:
Report additional content is extracted according to described report request;
The whether corresponding malicious user of described operation note is judged according to described semantic analysis model in conjunction with described report additional content。
3. report information processing method according to claim 1, it is characterised in that also include after the step that processing instruction is punished in described generation accordingly:
Remove described targeted customer identify the session of correspondence and/or refuse described targeted customer and identify login。
4. report information processing method according to claim 1, it is characterised in that also include after the step of described reception report request:
Third party's identity is extracted according to described report request;
Obtain the historical record corresponding with described third party's identity, judge the whether corresponding malicious user of described third party's identity according to described historical record, if so, then call third party's identity report interface and report described third party's identity。
5. report information processing method according to claim 1, it is characterised in that described generation punishes that the step of processing instruction also includes accordingly:
Judge that described targeted customer identifies whether corresponding good friend user, if so, then lock described targeted customer and identify the terminal of correspondence, and be sent to the punishment processing instruction of Modify password。
6. report information processing method according to claim 5, it is characterised in that described report type includes at least harassing class, flame class and swindle class;
Described harassing and wrecking class at least includes waste advertisements class and abuses class;
Described flame class at least includes pornographic class, reaction politics class and violence terror class;
Described swindle class includes strange swindle class and camouflage swindle class;
The described targeted customer of described judgement identifies whether that the step of corresponding good friend user includes:
Judge whether described report type is camouflage swindle class, if then judging that described targeted customer identifies corresponding good friend user。
7. a report information processes device, it is characterised in that including:
Report request receiver module, is used for receiving report request, extracts the targeted customer's mark and report type that wherein comprise;
Module is searched in operation note, identifies the operation note of correspondence for searching described targeted customer;
Analytical model acquisition module, for obtaining the semantic analysis model corresponding with described report type;
Malicious user determination module, for judging the whether corresponding malicious user of described operation note according to described semantic analysis model, if so, then generates and punishes processing instruction accordingly。
8. report information according to claim 7 processes device, it is characterised in that described malicious user determination module is additionally operable to extract report additional content according to described report request;The whether corresponding malicious user of described operation note is judged according to described semantic analysis model in conjunction with described report additional content。
9. report information according to claim 7 processes device, it is characterised in that described device also includes the first punishment processing module, identifies the session of correspondence for removing described targeted customer and/or refuses described targeted customer and identify login。
10. report information according to claim 7 processes device, it is characterised in that described device also includes third party and reports module, for extracting third party's identity according to described report request;Obtain the historical record corresponding with described third party's identity, judge the whether corresponding malicious user of described third party's identity according to described historical record, if so, then call third party's identity report interface and report described third party's identity。
11. report information according to claim 7 processes device, it is characterized in that, described device also includes the second punishment processing module, for judging that described targeted customer identifies whether corresponding good friend user, if, then lock described targeted customer and identify the terminal of correspondence, and be sent to the punishment processing instruction of Modify password。
12. report information according to claim 11 processes device, it is characterised in that described report type includes at least harassing class, flame class and swindle class;
Described harassing and wrecking class at least includes waste advertisements class and abuses class;
Described flame class at least includes pornographic class, reaction politics class and violence terror class;
Described swindle class includes strange swindle class and camouflage swindle class;
Described second punishment processing module, is additionally operable to judge whether described report type is camouflage swindle class, if then judging that described targeted customer identifies corresponding good friend user。
13. a malicious user report method, including:
Receive report command, obtain targeted customer's mark that described report command is corresponding;
Obtain the report type preset and show;
Obtain the report type chosen generate report request and report to server;
Receive the punishment processing instruction of server return and perform。
14. report information according to claim 13 processes device, it is characterised in that the step of the report type that described acquisition is preset also includes:
The report type preset is downloaded by server。
15. report information according to claim 13 processes device, it is characterised in that described report type includes at least harassing class, flame class and swindle class;
Described harassing and wrecking class at least includes waste advertisements class and abuses class;
Described flame class at least includes pornographic class, reaction politics class and violence terror class;
Described swindle class includes strange swindle class and camouflage swindle class。
16. a malicious user report device, it is characterised in that including:
Report command receiver module, is used for receiving report command, obtains targeted customer's mark that described report command is corresponding;
Report type display module, for obtaining default report type and showing;
Report request reporting module, generates report request for obtaining the report type chosen and reports to server;
Terminal penalty processing module, for receiving the punishment processing instruction of server return and performing。
17. report information according to claim 16 processes device, it is characterised in that described report type display module is additionally operable to be downloaded, by server, the report type preset。
18. report information according to claim 16 processes device, it is characterised in that described report type includes at least harassing class, flame class and swindle class;
Described harassing and wrecking class at least includes waste advertisements class and abuses class;
Described flame class at least includes pornographic class, reaction politics class and violence terror class;
Described swindle class includes strange swindle class and camouflage swindle class。
CN201410711805.7A 2014-11-28 2014-11-28 Malicious user reporting method and device, and reported information processing method and device Active CN105704005B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410711805.7A CN105704005B (en) 2014-11-28 2014-11-28 Malicious user reporting method and device, and reported information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410711805.7A CN105704005B (en) 2014-11-28 2014-11-28 Malicious user reporting method and device, and reported information processing method and device

Publications (2)

Publication Number Publication Date
CN105704005A true CN105704005A (en) 2016-06-22
CN105704005B CN105704005B (en) 2020-07-24

Family

ID=56230589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410711805.7A Active CN105704005B (en) 2014-11-28 2014-11-28 Malicious user reporting method and device, and reported information processing method and device

Country Status (1)

Country Link
CN (1) CN105704005B (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106971346A (en) * 2017-03-14 2017-07-21 李百锁 A kind of safe social software system and its implementation
CN107659842A (en) * 2017-08-21 2018-02-02 武汉斗鱼网络科技有限公司 A kind of video is made friends reporting method and the system of passing the imperial examinations at the provincial level
CN107666394A (en) * 2016-07-27 2018-02-06 百度在线网络技术(北京)有限公司 A kind of method and apparatus for deleting group member
WO2018023537A1 (en) * 2016-08-04 2018-02-08 黄新勇 Method and system for acquiring director's name during television broadcast
CN108574623A (en) * 2017-03-10 2018-09-25 中移(杭州)信息技术有限公司 A kind of malicious user is determining and prevents the method and device of junk information
CN109011582A (en) * 2018-07-24 2018-12-18 合肥爱玩动漫有限公司 One kind closing down method for game role complaint in scene of game
CN109621427A (en) * 2018-11-07 2019-04-16 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of malicious user
CN109714605A (en) * 2018-12-28 2019-05-03 广州华多网络科技有限公司 Report data processing method, device, terminal device and server
CN110009370A (en) * 2018-12-27 2019-07-12 阿里巴巴集团控股有限公司 Information processing method, device, electronic equipment and readable storage medium storing program for executing
CN110378712A (en) * 2019-07-26 2019-10-25 上海秒针网络科技有限公司 A kind of complaint handling method and device
CN110401548A (en) * 2019-07-17 2019-11-01 中广热点云科技有限公司 A kind of user in Chatroom removes processing method and processing device
CN110674269A (en) * 2019-08-23 2020-01-10 广东昭阳信息技术有限公司 Cable information management and control method and system
CN110975295A (en) * 2019-12-23 2020-04-10 上海米哈游天命科技有限公司 Malicious player determination method, device, equipment and storage medium
CN112083853A (en) * 2020-09-02 2020-12-15 北京字节跳动网络技术有限公司 Account reporting method, account checking device, electronic equipment and storage medium
CN115037988A (en) * 2021-03-05 2022-09-09 北京字节跳动网络技术有限公司 Page display method, device and equipment
CN116662769A (en) * 2023-08-02 2023-08-29 北京数字悦动科技有限公司 User behavior analysis system and method based on deep learning model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929897A (en) * 2011-08-12 2013-02-13 北京千橡网景科技发展有限公司 Method and equipment for detecting bad information from text
CN102938785A (en) * 2012-11-09 2013-02-20 李辉 Malicious information reporting and treating method for search engine
CN103886016A (en) * 2014-02-20 2014-06-25 百度在线网络技术(北京)有限公司 Equipment and method for determining junk text messages in page
US8862670B1 (en) * 2006-01-26 2014-10-14 Stratify, Inc. Systems and methods for interactively analyzing communication chains based on messages

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8862670B1 (en) * 2006-01-26 2014-10-14 Stratify, Inc. Systems and methods for interactively analyzing communication chains based on messages
CN102929897A (en) * 2011-08-12 2013-02-13 北京千橡网景科技发展有限公司 Method and equipment for detecting bad information from text
CN102938785A (en) * 2012-11-09 2013-02-20 李辉 Malicious information reporting and treating method for search engine
CN103886016A (en) * 2014-02-20 2014-06-25 百度在线网络技术(北京)有限公司 Equipment and method for determining junk text messages in page

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
还好是这样子: "微信骚扰怎么举报", 《HTTPS://JINGYAN.BAIDU.COM/ARTICLE/C45AD29CDCD84F051653E255.HTML》 *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107666394A (en) * 2016-07-27 2018-02-06 百度在线网络技术(北京)有限公司 A kind of method and apparatus for deleting group member
CN107666394B (en) * 2016-07-27 2020-12-15 百度在线网络技术(北京)有限公司 Method and device for deleting group members
WO2018023537A1 (en) * 2016-08-04 2018-02-08 黄新勇 Method and system for acquiring director's name during television broadcast
CN108574623A (en) * 2017-03-10 2018-09-25 中移(杭州)信息技术有限公司 A kind of malicious user is determining and prevents the method and device of junk information
CN106971346A (en) * 2017-03-14 2017-07-21 李百锁 A kind of safe social software system and its implementation
CN107659842B (en) * 2017-08-21 2020-02-07 武汉斗鱼网络科技有限公司 Method and system for reporting in video friend making
CN107659842A (en) * 2017-08-21 2018-02-02 武汉斗鱼网络科技有限公司 A kind of video is made friends reporting method and the system of passing the imperial examinations at the provincial level
CN109011582A (en) * 2018-07-24 2018-12-18 合肥爱玩动漫有限公司 One kind closing down method for game role complaint in scene of game
CN109621427A (en) * 2018-11-07 2019-04-16 北京达佳互联信息技术有限公司 Processing method, device, server and the storage medium of malicious user
CN110009370A (en) * 2018-12-27 2019-07-12 阿里巴巴集团控股有限公司 Information processing method, device, electronic equipment and readable storage medium storing program for executing
CN109714605A (en) * 2018-12-28 2019-05-03 广州华多网络科技有限公司 Report data processing method, device, terminal device and server
CN110401548A (en) * 2019-07-17 2019-11-01 中广热点云科技有限公司 A kind of user in Chatroom removes processing method and processing device
CN110378712A (en) * 2019-07-26 2019-10-25 上海秒针网络科技有限公司 A kind of complaint handling method and device
CN110674269A (en) * 2019-08-23 2020-01-10 广东昭阳信息技术有限公司 Cable information management and control method and system
CN110975295A (en) * 2019-12-23 2020-04-10 上海米哈游天命科技有限公司 Malicious player determination method, device, equipment and storage medium
CN110975295B (en) * 2019-12-23 2023-06-02 上海米哈游天命科技有限公司 Method, device, equipment and storage medium for determining abnormal player
CN112083853A (en) * 2020-09-02 2020-12-15 北京字节跳动网络技术有限公司 Account reporting method, account checking device, electronic equipment and storage medium
CN115037988A (en) * 2021-03-05 2022-09-09 北京字节跳动网络技术有限公司 Page display method, device and equipment
CN116662769A (en) * 2023-08-02 2023-08-29 北京数字悦动科技有限公司 User behavior analysis system and method based on deep learning model
CN116662769B (en) * 2023-08-02 2023-10-13 北京数字悦动科技有限公司 User behavior analysis system and method based on deep learning model

Also Published As

Publication number Publication date
CN105704005B (en) 2020-07-24

Similar Documents

Publication Publication Date Title
CN105704005A (en) Malicious user reporting method and device, and reporting information processing method and device
US9906554B2 (en) Suspicious message processing and incident response
CN105530175B (en) Message processing method, device and system
US8826155B2 (en) System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface
CN1703868B (en) Method and apparatus for authenticating electronic mail
Ramanathan et al. Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation
US8417649B2 (en) Providing a seamless conversation service between interacting environments
US9270622B2 (en) Systems and methods for conveying information to an instant messaging client
EP3485450B1 (en) Network based advertisement data traffic latency reduction
US11710195B2 (en) Detection and prevention of fraudulent activity on social media accounts
TW201812689A (en) System, method, and device for identifying malicious address/malicious purchase order
CN111277637B (en) Method, device, terminal and storage medium for merging session groups
WO2017084290A1 (en) Public account two-dimensional code generation method and server, and public account following method, server and terminal
CN101458690A (en) Advertisement publishing method and advertisement server
CN106559387A (en) A kind of auth method and device
WO2011139687A1 (en) Systems and methods for automatically detecting deception in human communications expressed in digital form
US9697535B2 (en) System and method in a virtual universe for identifying spam avatars based upon avatar multimedia characteristics
CN102638448A (en) Method for judging phishing websites based on non-content analysis
CN102257466A (en) Image-based human interactive proofs
CN105681257B (en) Information reporting method, device, equipment and system based on instant messaging interaction platform and computer storage medium
CN110362665B (en) Question-answering system and method based on semantic similarity
CN111177499A (en) Label adding method and device and computer readable storage medium
US20080155031A1 (en) Systems and methods for conveying information to an instant messaging client
CN105469266B (en) Information processing method and device
CN113506137A (en) E-mail marketing analysis method, system and equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant