CN108494796A - Method for managing black list, device, equipment and storage medium - Google Patents

Method for managing black list, device, equipment and storage medium Download PDF

Info

Publication number
CN108494796A
CN108494796A CN201810322067.5A CN201810322067A CN108494796A CN 108494796 A CN108494796 A CN 108494796A CN 201810322067 A CN201810322067 A CN 201810322067A CN 108494796 A CN108494796 A CN 108494796A
Authority
CN
China
Prior art keywords
user
black list
account
blacklist
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810322067.5A
Other languages
Chinese (zh)
Inventor
姚礼华
张二虎
黄洁斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huya Information Technology Co Ltd
Original Assignee
Guangzhou Huya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huya Information Technology Co Ltd filed Critical Guangzhou Huya Information Technology Co Ltd
Priority to CN201810322067.5A priority Critical patent/CN108494796A/en
Publication of CN108494796A publication Critical patent/CN108494796A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The embodiment of the invention discloses a kind of method for managing black list, device, equipment and storage mediums.The method includes:It obtains management user and selects at least one black list user closed in black list database;According to sensitive identity information corresponding with the black list user is stored in the black list database, whole user accounts of the black list user in target platform are obtained;Strategy is closed according to setting, whole user accounts corresponding to the black list user carry out closing processing.Technical solution through the embodiment of the present invention, the multiple accounts that can be used black list user are effectively managed, and the efficiency of management is improved.

Description

Method for managing black list, device, equipment and storage medium
Technical field
The present embodiments relate to the information processing technology more particularly to a kind of method for managing black list, device, equipment and deposit Storage media.
Background technology
With the stable development of live streaming industry, main broadcaster's number is increasing, and main broadcaster individual's quality is very different, because This, needs each live streaming platform to be managed violation main broadcaster, harmful content is avoided to be propagated on the net.
Each live streaming platform mainly uses manpower means to carry out title interception, but basic only single account to violation main broadcaster at present It closes, that is, once investigating and prosecuting the account to violation, with regard to being closed immediately to the account, do not abided by although having intercepted major part in this way The user for keeping national relevant law and platform live streaming specification becomes main broadcaster, but can have a small number of some peoples and pass through other Account or the new account separately built utilize live streaming means to propagate illegal content again.Therefore, single account is sealed in the prior art The mode of taboo can not effectively manage same violation main broadcaster using the phenomenon that different accounts, reduce the efficiency of management.
Invention content
A kind of method for managing black list of offer of the embodiment of the present invention, device, equipment and storage medium, to realize to blacklist Multiple accounts that user uses effectively are managed, and the efficiency of management is improved.
In a first aspect, an embodiment of the present invention provides a kind of method for managing black list, including:
It obtains management user and selects at least one black list user closed in black list database;
According to sensitive identity information corresponding with the black list user is stored in the black list database, institute is obtained State whole user accounts of the black list user in target platform;
Strategy is closed according to setting, whole user accounts corresponding to the black list user carry out closing place Reason.
Second aspect, the embodiment of the present invention additionally provide a kind of blacklist managing device, which includes:
Selecting module is closed, at least one blacklist closed is selected in black list database for obtaining management user User;
Account acquisition module, for corresponding with the black list user quick according to being stored in the black list database Feel identity information, obtains whole user accounts of the black list user in target platform;
Account closes module, for closing strategy according to setting, all use corresponding to the black list user Family account carries out closing processing.
The third aspect, the embodiment of the present invention additionally provide a kind of computer equipment, which includes:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes the method for managing black list as described in any in the embodiment of the present invention.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer readable storage medium, are stored thereon with computer Program realizes the method for managing black list as described in any in the embodiment of the present invention when program is executed by processor.
The embodiment of the present invention manages user by acquisition and selects at least one blacklist closed in black list database User, and according to sensitive identity information corresponding with the black list user is stored in black list database, obtain the blacklist Whole user accounts of the user in target platform, then close strategy according to setting, corresponding to the black list user complete Portion's user account carries out closing processing, is utilized and searches and close association according to the corresponding sensitive identity information of black list user Whole user accounts the advantages of, same user can not be used by solving single account leading factor because of use in the prior art The phenomenon that different accounts, is effectively managed, caused by the efficiency of management low problem, realize and black list user used Multiple accounts are effectively managed, and the effect of the efficiency of management is improved.
Description of the drawings
Fig. 1 a are a kind of flow diagrams for method for managing black list that the embodiment of the present invention one provides;
Fig. 1 b are a kind of interface schematic diagrams for blacklist list that the embodiment of the present invention one provides;
Fig. 1 c are the schematic diagrames that a kind of blacklist that the embodiment of the present invention one provides submits interface;
Fig. 2 a are a kind of flow diagrams of method for managing black list provided by Embodiment 2 of the present invention;
Fig. 2 b are the interface schematic diagrams that a kind of blacklist provided by Embodiment 2 of the present invention submits log list;
Fig. 2 c are a kind of interface schematic diagrams for closing operation log list provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of structural schematic diagram for blacklist managing device that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural schematic diagram for computer equipment that the embodiment of the present invention four provides.
Specific implementation mode
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limitation of the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 a are a kind of flow diagram for method for managing black list that the embodiment of the present invention one provides.The present embodiment can fit The case where for being managed to black list user, wherein blacklist refers to the list for recording offending user.This method can To be executed by blacklist managing device, which can be made of hardware and/or software, and can generally be integrated in computer equipment In.Specifically include following operation:
S110, acquisition management user select at least one black list user closed in black list database.
In the present embodiment, black list database is used to store the relevant information of black list user, and optionally, blacklist is used The relevant information at family includes but not limited to sensitive identity information, address name, gender, (User Identification are used UID Family proof of identification) etc..Wherein, sensitive identity information is cross-platform general user's unique identification information;UID is in target platform Obtained identification information after user's registration, the identification information can uniquely represent the user identity on target platform.Specifically, Platform refers to the operating environment of computer hardware or software;Target platform includes but not limited to that platform, network game platform is broadcast live Deng;It is cross-platform it is general refer to except target platform can be in addition to use, other platforms could be used that.Optionally, sensitive identity information Including:Identification card number and/or cell-phone number.
Specifically, a user corresponds only to a sensitive identification information, but multiple UID are can correspond to, and one UID corresponds to a user account.Optionally, the mode that user obtains user account includes but not limited to by target platform Applying obtaining after upper registration, user can log in the user account of oneself on target platform, to obtain corresponding access right, Such as target platform is live streaming platform, main broadcaster can be broadcast live by main broadcaster's account that registration obtains.
Specifically, management user is the user with black list user's administration authority, wherein administration authority includes but unlimited In close permission and deblocking permission.Illustratively, it is selected in the black list user that management user can store in black list database At least one black list user for needing to be closed is selected, such as in the blacklist list (referring to Fig. 1 b) of display black list user Multiple black list users are chosen in selection one simultaneously, the black list user that system is selected according to management user, from blacklist Inquired in database and obtain sensitive identity information corresponding with the black list user, wherein blacklist list for all or Part shows the black list user stored in black list database.Optionally, blacklist list is to platform management permission User is it is seen, for example, management user.
The advantageous effect for obtaining at least one black list user that selection is closed is, more to be closed simultaneously in subsequent step The corresponding whole user accounts of a black list user provide possibility, closing management speed are accelerated, to improve pipe Manage efficiency.
Optionally, black list database is also stored with and the matched violation reference information of sensitive identity information.
Wherein, violation reference information can be used for providing the reference frame for closing black list user for management user, optionally, Violation reference information includes but not limited to violation reason description information, one or more violation picture, one or more regards in violation of rules and regulations Frequency etc..
Optionally, obtain management user selected in black list database at least one black list user closed it Before, further include:By the corresponding sensitive identity information of all black list users in black list database and its matched violation reference Information is supplied to management user, so that management user closes at least one black list user according to the selection of violation reference information.
Illustratively, by by all black list users in black list database, or according to managing item input by user The black list user that part filters out is shown in blacklist list, when management user checks blacklist list, in the blacklist The corresponding sensitive identity information (such as identity card and/or cell-phone number) of each black list user is shown in list, meanwhile, manage user Can also blacklist submit log list in check with the matched violation reference information of the sensitivity identity information, for management user The black list user for selecting to close according to the violation reference information of offer.Optionally, by checking that violation reference information, management are used Family can decide whether to close the black list user, to which selection needs the black list user closed to seal in blacklist list Prohibit operation.
S120, according to sensitive identity information corresponding with black list user is stored in black list database, obtain black name Whole user accounts of the single user in target platform.
Optionally, a user establishes one or more user accounts on target platform, when the user is listed in black name When single user, whole accounts that black list user foundation is inquired and obtained in target platform are needed, specifically, according to selection The sensitive identity information of the black list user closed, such as the identity according to the black list user stored in black list database Card number and/or cell-phone number, obtain whole user accounts of the black list user in target platform, the black name are closed to reach The effect of single user all user accounts under one's name.
Since sensitive identity information has user's unique mark, thus by the sensitive identity information of black list user, The associated all user accounts of the black list user can be found, to realize that No.1 violation, the more numbers modes closed provide May, it avoids black list user in the case where a user account is closed, the other users that do not closed can also be used Account.
S130, strategy is closed according to setting, whole user account corresponding to black list user carries out closing processing.
Optionally, it includes but not limited to the Provisioning Policy for closing the period to close strategy, and it includes closing out to close the period Begin the time and to close the end time.Illustratively, close strategy can be set as it is fixed close the period, for example, executing After closing processing, in following 24 hours since the current time of system, whole accounts of the black list user will be in envelope Taboo state;Closing strategy can also be set as different according to the history number that black list user is closed and close the period, example Such as, if without record is closed before black list user, the period of closing closed for the first time is set as, from the current time of system Start, if black list user had the record once closed, to be closed again in state is closed in 24 hours following Period of closing be set as, since the current time of system in following 48 hours in closing state, and so on, no It repeats again;Closing strategy can also in real time set according to the practical violation situation of different black list users, for example, the black name Single user is the critical violation user that national monitoring department is announced, then can be straight by the corresponding whole user accounts of the black list user It connects and is set as permanently closing.Optionally, it includes but not limited to forbid account login, withdraw account access right etc. to close processing.
Illustratively, for platform is broadcast live, the main broadcaster to pipe off is managed.In main broadcaster as shown in Figure 1 b In blacklist list, it is black whether system manager can specify main broadcaster to be put by conditional searches such as identification card number or cell-phone numbers List, if so, showing the identification card number of the main broadcaster in the blacklist list, cell-phone number, closing state, close the time started With close the information such as end time.If system manager has chosen wherein main broadcaster's information, and clicks behind main broadcaster's information It is quick close button, or chosen wherein a plurality of main broadcaster's information, and click batch and close button, then system can obtain this automatically The corresponding main broadcaster's identification card number of main broadcaster's information and cell-phone number, and the main broadcaster is inquired by identification card number and cell-phone number and is put down in this live streaming All main broadcaster's accounts on platform uniformly close these accounts by UID, to forbid violation main broadcaster to log in and use this A little accounts.
The technical solution of the present embodiment selects to close in black list database at least one by acquisition management user Black list user, and according to sensitive identity information corresponding with the black list user is stored in black list database, obtaining should Whole user accounts of the black list user in target platform, then close strategy, to the black list user couple according to setting The whole user accounts answered carry out closing processing, are utilized and search and seal according to the corresponding sensitive identity information of black list user The advantages of prohibiting associated whole user accounts, the single account leading factor solved in the prior art because of use can not be to same use Family is effectively managed using the phenomenon that different accounts, caused by the low problem of the efficiency of management, realize to black list user The multiple accounts used are effectively managed, and the effect of the efficiency of management is improved.
On the basis of the above embodiments, optionally, further include:Blacklist number is periodically downloaded from external blacklist interface According to, and in black list database include download blacklist data in sensitive identity information when, according to the black name of download Sensitive identity information construction black list user in forms data is stored in black list database;And/or according on monitoring user The user account of report identifies, and is obtained in system database and identifies matched user's registration information with user account, is noted in user Extraction sensitive identity information corresponding with user account mark in volume information, and do not include the quick of extraction in black list database When feeling identity information, black list user is constructed according to the sensitive identity information of extraction and is stored in black list database.
Optionally, the source of black list user includes external download and/or internal typing in black list database.It is exemplary , black list database can be updated according to the default update cycle.
Specifically, outside in portion's downloading mode, can periodically be pulled in external blacklist interface according to the default update cycle Blacklist data, wherein blacklist data include but not limited to user sensitive identity information and other relevant informations (such as Name, gender, violation reason etc.).Optionally, if the sensitive identity information that blacklist data includes is present in blacklist number According to library, then typing black list database again after being identified to the sensitive identity information, so that administrator distinguishes blacklist The source of user.For example, the source of display black list user can be distinguished in main broadcaster's blacklist list as shown in Figure 1 b, if Outside is downloaded, then whether is showing "Yes" in one column of third party's blacklist, and whether this platform submit a column in show "No".
It, can be from since user needs to fill in user's registration information in registration specifically, in internal typing mode In the user's registration information stored in the system database of target platform, obtain the user's for needing to be logged black list database Relevant information.It, can be by user's account when monitoring user has found that violation operation occurs in target user's account for platform is broadcast live Number corresponding user account mark (such as UID) is input to main broadcaster's blacklist as illustrated in figure 1 c and submits corresponding input in interface In frame, and the UID is supplied to system by clicking corresponding main broadcaster's acquisition of information button, so that system is from system database It obtains the user account and identifies corresponding all information, wherein the information of acquisition including but not limited to sensitivity identity information (such as Identification card number, cell-phone number etc.) and other relevant informations (such as name, gender, violation reason etc.).
Optionally, black list user is constructed according to sensitive identity information to be stored in black list database, including:To sensitivity Identity information is encrypted according to predetermined encryption algorithm, generates black list user;Black list user is stored in blacklist In database.
Illustratively, when determine in black list database there is no with outside download and/or internal typing by way of When the information that the sensitive identity information of acquisition is consistent, sensitive identity information is encrypted according to predetermined encryption algorithm, it will Sensitive identity information is saved into black list database with encrypted test mode, to reduce user data disclosure risk.Wherein, it presets and adds Close algorithm includes but not limited to AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm.Optionally, Further include that other relevant informations are (such as name, gender, former in violation of rules and regulations other than sensitive identity information, in the black list user of generation Because etc.), it is stored in black list database together with encrypted sensitive identity information.It should be noted that working as to management When user shows sensitive identity information, aes algorithm can be reused, encrypted sensitive identity information is decrypted, such as When showing the identification card number and cell-phone number of each blacklist main broadcaster in main broadcaster's blacklist list as shown in Figure 1 b, calculated using AES Method is decrypted, and shows the identification card number and cell-phone number after decryption.
By taking a specific example as an example, the mode that subordinate carries other than being broadcast live in platform submits the flow packet of main broadcaster's blacklist It includes:Timed task is set;When reaching trigger time, external blacklist interface is called to download blacklist data, and according to black The storage format in list data library re-assemblies blacklist data;The body of main broadcaster is obtained and encrypted from blacklist data Part card number and cell-phone number, and generate main broadcaster's information, wherein main broadcaster's information include but not limited to identification card number, cell-phone number, the pet name, Name, gender, registion time, registration ip, violation reason etc.;It will be in main broadcaster's information storage to black list database.It is fixed from outside When download blacklist data advantageous effect be, can cross-platform acquisition blacklist, to realize on a platform in violation of rules and regulations, The effect that account is closed is carried out on multiple platforms, improves the management intensity to the main broadcaster to pipe off in live streaming industry.
By taking another specific example as an example, the flow packet for submitting main broadcaster's blacklist in platform in a manner of internal typing is broadcast live It includes:Fill in main broadcaster UID;Judged to whether there is matched main broadcaster's information in system database according to main broadcaster UID, if so, returning Main broadcaster's information if it is not, then returning to prompt message, and receives main broadcaster's information of input;It is not present in judging black list database When main broadcaster's information, identification card number and cell-phone number are obtained from main broadcaster's information, and be encrypted;By main broadcaster's information preservation to black List data library.Wherein, main broadcaster's information include but not limited to identification card number, cell-phone number, the pet name, name, gender, registion time, Register ip, violation reason etc..Optionally, as illustrated in figure 1 c, main broadcaster's information of return can be filled in corresponding text box, and Receive the violation picture and/or violation video that system manager uploads.Wherein, prompt message is used for prompt system administrator, is There is no the relevant information of the main broadcaster in system database, so that system manager fills in correlation manually in interface as illustrated in figure 1 c Information, such as the pet name, name, gender, identification card number, cell-phone number, registion time, registration ip, violation reason etc..In such as Fig. 1 c Shown in blacklist submit interface in, optionally, the information having to fill out is marked out with symbol " * ", do not mark be selection fill out The information write.The advantageous effect that main broadcaster's information is obtained by UID is, the correlation of the main broadcaster can be preserved in system database When log-on message, quick obtaining to main broadcaster's information improves the efficiency of management to the main broadcaster in piping off in live streaming industry.
Embodiment two
Fig. 2 a are a kind of flow diagram of method for managing black list provided by Embodiment 2 of the present invention.It is more than the present embodiment It states and optimizes based on embodiment, preferred method for managing black list is provided, specifically, to closing plan according to setting Slightly, whole user accounts corresponding to black list user, which carry out closing processing, is advanced optimized.It specifically includes as follows:
S210, acquisition management user select at least one black list user closed in black list database.
S220, according to sensitive identity information corresponding with black list user is stored in black list database, obtain black name Whole user accounts of the single user in target platform.
S230, obtain management it is input by user with black list user is matched closes the period.
Wherein, it includes closing the time started and to close the end time to close the period, and optionally, closing the time started can write from memory Recognize and be set as present system time, namely since when processing operation is closed in execution, until closing the end time, keeps user Account closes state.Illustratively, for management user after account button is closed in click, system automatic spring includes to close the time The window of section input frame, management user can be according to violation reference information, and compares setting strategy input and close the period accordingly, System obtains after this closes the period, closes the period according to this and is closed to whole user accounts.
S240, the period will be closed and whole user account is provided to account and closes interface.
In the present embodiment, account closes interface can be closed module offer by the account being arranged in target platform, for sealing Prohibit in the period and closes whole user accounts on target platform.
Whole user accounts corresponding with black list user of period and acquisition will be closed, is provided to the account and closes The purpose of interface is, closes and keep closing state in the period whole user accounts of black list user at this.
S250, prompt message is closed to the corresponding account of black list user's transmission.
Optionally, it includes but not limited to be used to blacklist to send account to close the mode of prompt message to black list user The cell-phone number of family binding sends short message, and/or the third-party application PUSH message bound to black list user is (such as to binding WeChat ID PUSH message), and/or by personal letter in target platform dispatching station to black list user.Wherein, prompt message packet is closed Include but be not limited to close account, the pet name, close the period, close reason etc..It is sent to black list user and closes prompt message Advantageous effect is, can notify that black list user's account is closed in time, to reach the warning user and urge the use Closing the effect rectified and improved in time in the period in family.
The technical solution of the present embodiment, at least one black list user closed by obtaining selection, and according to the black name The corresponding sensitive identity information of single user, obtains whole user accounts of the black list user in target platform, defeated getting After what is entered closes the period, this is closed into the period and whole user accounts are provided to account and close interface, while sending account Prompt message number is closed to corresponding black list user, the single account leading factor solved in the prior art because of use can not be right Same user is effectively managed using the phenomenon that different accounts, caused by the low problem of the efficiency of management, realize to black name Multiple accounts that single user uses effectively are managed, and the efficiency of management is improved, and are led in time when user account is closed Know, the user experience is improved.
On the basis of the above embodiments, optionally, strategy is being closed according to setting, it is corresponding to black list user complete Portion's user account carries out after closing processing, further includes:The sensitive identity information of black list user is provided to certification authority Blacklist adds interface, and blacklist addition interface is used to be forbidden to use the newly-built account of sensitive identity information in target platform Carry out real-name authentication.
Wherein, certification authority for example can be the third-party institution for carrying out account real-name authentication, such as UDB uniformly recognizes Platform is demonstrate,proved, UDB is positioned as the service management class platform of China Telecom's business network domains, can realize that the user of application layer uniformly recognizes Demonstrate,prove function.The advantageous effect that the sensitive identity information of black list user is provided to certification authority is, can make to avoid user Real-name authentication is carried out to newly-built account with the sensitivity identity information, for example, on live streaming platform, once by the identification card number of main broadcaster Or cell-phone number is provided to the blacklist addition interface of UDB, you can forbids the main broadcaster using the identification card number or cell-phone number to newly-built Account carry out main broadcaster's real-name authentication, to forbidding black list user's Misuse to create account from source.
In a specific example, for platform is broadcast live, the process flow of closing to black list user includes:System pipes Reason person, which chooses, to be needed the main broadcaster closed and fills in close the period;The main broadcaster is obtained by the identification card number and cell-phone number of main broadcaster All UID;It calls UDB blacklists to add interface, is forbidden to use the identification card number and cell-phone number and real name is carried out to newly-built account Certification;Interface, which is closed, by UID calling closes all accounts;Personal letter notifies main broadcaster with SMS in dispatching station.
Optionally, strategy is being closed according to setting, whole user account corresponding to black list user carries out closing place After reason, further include:If it is determined that more than closing the period, or detect the unsealing operation for black list user, then to black name The corresponding whole user accounts of single user carry out deblocking processing;Corresponding account, which is sent, to black list user unseals prompt message.
Illustratively, include to the trigger condition of lifting a ban for closing account:The period is closed more than corresponding, for example, closing Period be today zero to next day zero, it is when system time is more than next day zero, then automatically corresponding to black list user complete Portion's user account carries out deblocking processing;Or detect unsealing operation for black list user, for example, management user is in blacklist The black list user for being in the state of closing is chosen in list, and triggers unsealing operation button, then to the black list user couple The whole user accounts answered carry out deblocking processing.Specifically, deblocking processing includes the sensitive body according to the black list user of acquisition Part information obtains whole user accounts corresponding with the sensitivity identity information, and account is supplied to unseal interface, with to the black name The corresponding whole user accounts of single user carry out deblocking processing.By being solved to the corresponding whole user accounts of black list user Envelope processing, realizes uniformly closing and unsealing for account, improves the efficiency of management.
Optionally, after to black list user, corresponding whole user account carries out deblocking processing, further include:By black name The blacklist that the sensitive identity information of single user is provided to certification authority removes interface, and blacklist removes interface to be allowed for restoring The account created using sensitive identity information carries out real-name authentication in target platform.
Illustratively, when black list user is released from and closes, optionally, it is also necessary to restore black list user use pair The sensitive identity information answered carries out the permission of real-name authentication to creating account in target platform, for example, on live streaming platform, one The identification card number of main broadcaster or cell-phone number are provided to UDB blacklists and remove interface by denier, you can recovery allows the main broadcaster to use the body Part card number or cell-phone number carry out main broadcaster's real-name authentication to newly-built account, to thoroughly unseal permission of the main broadcaster using account.
In a specific example, for platform is broadcast live, system manager unseals black list user manually Process flow includes:System manager chooses the main broadcaster for needing to unseal from the main broadcaster closed;Pass through the identification card number of main broadcaster All UID of the main broadcaster are obtained with cell-phone number;UDB blacklists are called to remove interface, recovery allows to use the identification card number and hand Machine number carries out real-name authentication to newly-built account;Deblocking interface is called to unseal all accounts by UID.
On the basis of the various embodiments described above, optionally, further include:When detecting at least one of following operations, in day Corresponding operation log is recorded in will list;The operation includes:Strategy is closed according to setting, it is corresponding to black list user Whole user accounts carry out closing processing;Black list user is constructed according to sensitive identity information to be stored in black list database; And deblocking processing is carried out to the corresponding whole user accounts of black list user;If detecting the export behaviour for log list Make, then log list is exported as to the document of object format.
Wherein, object format includes but not limited to Excel document.Illustratively, in each key operation node, can distinguish Corresponding operation log is recorded in corresponding log list, in order to consult afterwards.For example, for platform is broadcast live, recording After blacklist is submitted and deletes daily record, system manager can view in blacklist as shown in Figure 2 b submits log list All blacklists are submitted or delete daily record, also can carry out Log Filter by conditions such as identity card, cell-phone number, submission times, If system manager, which clicks, checks violation picture, system can tile violation picture displaying in the form of playing frame, if system pipes Reason person click check violation video, then system will play frame play violation video, if system manager click export button, can will Blacklist submits flowing water daily record data to export as Excel document and be stored under specified path.For another example, it closes having recorded main broadcaster After deblocking daily record, system manager can it is as shown in Figure 2 c close to view in operation log list all closing or solving Daily record is sealed, also Log Filter can be carried out by conditions such as identification card number, cell-phone number, operating times, be led if system manager clicks Go out button, then can will close deblocking daily record data and export as Excel document and be stored under specified path.
On the basis of the various embodiments described above, optionally, query interface can be also externally provided, the blacklist in other platforms Management system can inquire whether the user is black name by the sensitive identity information of user in this platform black list database Single user.Wherein, query interface for example can be REST (Representational State Transfer, declarative state Transfer) style interface.
Embodiment three
Fig. 3 is a kind of structural schematic diagram for blacklist managing device that the embodiment of the present invention three provides.The present embodiment provides Blacklist managing device be used to execute any method for managing black list in the various embodiments described above, which can be by hardware And/or software composition, and can generally be integrated in computer equipment.With reference to figure 3, blacklist managing device includes:Close selection Module 310, account acquisition module 320 and account close module 330, and each module is specifically described below.
Close selecting module 310, for obtain management user select to close in black list database it is at least one black Name single user.
Account acquisition module 320, for according to storing sensitive body corresponding with black list user in black list database Part information obtains whole user accounts of the black list user in target platform.
Account closes module 330, for closing strategy according to setting, whole user account corresponding to black list user It carries out closing processing.
Blacklist managing device provided in this embodiment manages user by acquisition and selects to close in black list database At least one black list user, and according to storing sensitive identity letter corresponding with the black list user in black list database Breath, obtains whole user accounts of the black list user in target platform, then closes strategy according to setting, to the black name The corresponding whole user accounts of single user carry out closing processing, be utilized according to the corresponding sensitivity identity information of black list user come The advantages of searching and closing associated whole user accounts, the single account leading factor solved in the prior art because of use can not Same user is effectively managed using the phenomenon that different accounts, caused by the low problem of the efficiency of management, realize to black Multiple accounts that name single user uses effectively are managed, and the effect of the efficiency of management is improved.
Optionally, sensitive identity information may include:Identification card number and/or cell-phone number.
Optionally, account closes module 330, specifically can be used for:It obtains and manages input by user and black list user That matches closes the period;The period will be closed and whole user accounts are provided to account and close interface, account closes interface use In whole user accounts are closed in the period on target platform closing;It closes and carries to the corresponding account of black list user's transmission Show information.
Optionally, which can also include:Certification disabled module, for closing strategy according to setting, to black name The corresponding whole user accounts of single user carry out after closing processing, and the sensitive identity information of black list user is provided to certification The blacklist of mechanism adds interface, and blacklist adds interface, for being forbidden to use the newly-built account of sensitive identity information in target Real-name authentication is carried out in platform.
Optionally, which can also include:Account unseals module, for closing strategy according to setting, to black name The corresponding whole user accounts of single user close after processing, however, it is determined that more than closing the period, or detect for black The unsealing operation of name single user, then whole user account corresponding to black list user carry out deblocking processing;To black list user Send corresponding account deblocking prompt message.
Optionally, can also include:Certification recovery module, for the corresponding whole user accounts of black list user into After row deblocking processing, the blacklist that the sensitive identity information of black list user is provided to certification authority removes interface, black name It is single to remove interface, allow to carry out real-name authentication in target platform using the newly-built account of sensitive identity information for restoring.
Optionally, black list database is also stored with and the matched violation reference information of sensitive identity information.
Optionally, which can also include:Information providing module, for obtaining management user in black list database Before the middle at least one black list user for selecting to close, by the corresponding sensitive body of all black list users in black list database Part information and its matched violation reference information are supplied to management user, so that management user selects to seal according to violation reference information Prohibit at least one black list user.
Optionally, which can also include:External download module and/or data obtaining module.
Wherein, external download module, for periodically downloading blacklist data from external blacklist interface, and in blacklist When not including the sensitive identity information in the blacklist data downloaded in database, according to the sensitivity in the blacklist data of download Identity information construction black list user is stored in black list database.
Data obtaining module, for according to monitoring reporting of user user account identify, in system database obtain with User account identifies matched user's registration information, and sensitive body corresponding with user account mark is extracted in user's registration information Part information, and when not including the sensitive identity information of extraction in black list database, according to the sensitive identity information structure of extraction Black list user is made to be stored in black list database.
Optionally, external download module and/or data obtaining module specifically can be used for:To sensitive identity information according to Predetermined encryption algorithm is encrypted, and generates black list user;Black list user is stored in black list database.
Optionally, which can also include:Logger module and daily record export module.
Wherein, logger module, for when detecting at least one of following operations, recording and corresponding in log list Operation log.
The operation includes:Strategy is closed according to setting, whole user account corresponding to black list user seals Taboo processing;Black list user is constructed according to sensitive identity information to be stored in black list database;And to black list user couple The whole user accounts answered carry out deblocking processing.
If log list is exported as mesh by daily record export module for detecting the export operation for log list The document of style formula.
The said goods can perform the method that any embodiment of the present invention is provided, and have the corresponding function module of execution method And advantageous effect.
Example IV
Fig. 4 is a kind of structural schematic diagram for computer equipment that the embodiment of the present invention four provides, as shown in figure 4, this implementation A kind of computer equipment that example provides, including:Processor 41 and memory 42.Processor in the computer equipment can be one A or multiple, in Fig. 4 by taking a processor 41 as an example, processor 41 and memory 42 in the computer equipment can pass through Bus or other modes connect, in Fig. 4 for being connected by bus.
The blacklist managing device of above-described embodiment offer is provided in the processor 41 of the present embodiment Computer equipment. In addition, the memory 42 in the computer equipment is used as a kind of computer readable storage medium, can be used for storing one or more Program, described program can be software program, computer executable program and module, such as blacklist pipe in the embodiment of the present invention Corresponding program instruction/the module of reason method (for example, the module in attached blacklist managing device shown in Fig. 3, including:Close choosing It selects module 310, account acquisition module 320 and account and closes module 330).Processor 41 is stored in memory 42 by operation In software program, instruction and module realize above-mentioned side to execute various function application and the data processing of equipment Method for managing black list in method embodiment.
Memory 42 may include storing program area and storage data field, wherein storing program area can storage program area, extremely Application program needed for a few function;Storage data field can be stored uses created data etc. according to equipment.In addition, depositing Reservoir 42 may include high-speed random access memory, can also include nonvolatile memory, and a for example, at least disk is deposited Memory device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 42 can further comprise The memory remotely located relative to processor 41, these remote memories can pass through network connection to equipment.Above-mentioned network Example include but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Also, when one or more included program of above computer equipment is by one or more of processors 41 When execution, program proceeds as follows:
It obtains management user and selects at least one black list user closed in black list database;According to blacklist number According to sensitive identity information corresponding with black list user is stored in library, whole use of the black list user in target platform are obtained Family account;Strategy is closed according to setting, whole user account corresponding to black list user carries out closing processing.
Embodiment five
The embodiment of the present invention five additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should The method for managing black list provided such as the embodiment of the present invention one, this method packet are provided when program is executed by blacklist managing device It includes:It obtains management user and selects at least one black list user closed in black list database;According to black list database The sensitive identity information corresponding with black list user of middle storage, obtains whole user accounts of the black list user in target platform Number;Strategy is closed according to setting, whole user account corresponding to black list user carries out closing processing.
Certainly, a kind of computer readable storage medium that the embodiment of the present invention is provided, the computer program stored thereon It is performed and is not limited to realize method operation as described above, can also realize the blacklist that any embodiment of the present invention is provided Relevant operation in management method.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but the former is more in many cases Good embodiment.Based on this understanding, technical scheme of the present invention substantially in other words contributes to the prior art Part can be expressed in the form of software products, which can be stored in computer readable storage medium In, such as the floppy disk of computer, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are with so that a computer is set Standby (can be personal computer, server or the network equipment etc.) executes the method described in each embodiment of the present invention.
It is worth noting that, in the embodiment of above-mentioned blacklist managing device, included each unit and module are It is divided according to function logic, but is not limited to above-mentioned division, as long as corresponding function can be realized;Separately Outside, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to restrict the invention.
Note that above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The present invention is not limited to specific embodiments described here, can carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out to the present invention by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also May include other more equivalent embodiments, and the scope of the present invention is determined by scope of the appended claims.

Claims (13)

1. a kind of method for managing black list, which is characterized in that including:
It obtains management user and selects at least one black list user closed in black list database;
According to sensitive identity information corresponding with the black list user is stored in the black list database, obtain described black Whole user accounts of the name single user in target platform;
Strategy is closed according to setting, whole user accounts corresponding to the black list user carry out closing processing.
2. according to the method described in claim 1, it is characterized in that, the sensitivity identity information includes:Identification card number, and/or Cell-phone number.
3. according to the method described in claim 1, it is characterized in that, described close strategy according to setting, to the blacklist The corresponding whole user accounts of user carry out closing processing, including:
Obtain the management it is input by user with the black list user is matched closes the period;
The period is closed by described and whole user account is provided to account and closes interface, and the account closes interface use In closing whole user accounts on the target platform in described close in the period;
Corresponding account, which is sent, to the black list user closes prompt message.
4. according to the method described in claim 3, it is characterized in that, closing strategy according to setting, the blacklist is used The corresponding whole user accounts in family carry out after closing processing, further include:
The blacklist that the sensitive identity information of the black list user is provided to certification authority is added into interface, the black name Single addition interface carries out real name for being forbidden to use the newly-built account of the sensitive identity information in the target platform and recognizes Card.
5. according to the method described in claim 4, it is characterized in that, closing strategy according to setting, the blacklist is used The corresponding whole user accounts in family carry out after closing processing, further include:
If it is determined that being closed the period more than described, or detect the unsealing operation for the black list user, then to described black The corresponding whole user accounts of name single user carry out deblocking processing;
Corresponding account, which is sent, to the black list user unseals prompt message.
6. according to the method described in claim 5, it is characterized in that, to the corresponding whole users of the black list user After account carries out deblocking processing, further include:
The blacklist that the sensitive identity information of the black list user is provided to certification authority is removed into interface, the black name It is single to remove interface, allow to carry out real name in the target platform using the newly-built account of the sensitive identity information for restoring Certification.
7. according to the method described in claim 1, it is characterized in that, the black list database is also stored with and the sensitive body The violation reference information of part information matches;
Before obtaining management user and selecting at least one black list user closed in black list database, further include:
By the corresponding sensitive identity information of all black list users in the black list database and its matched violation with reference to letter Breath is supplied to the management user, so that the management user closes at least one black name according to violation reference information selection Single user.
8. according to the method described in claim 1, it is characterized in that, further including:
Blacklist data is periodically downloaded from external blacklist interface, and does not include the institute downloaded in the black list database When stating the sensitive identity information in blacklist data, according to the sensitive identity information structure in the blacklist data of download Black list user is made to be stored in the black list database;And/or
According to the user account mark of monitoring reporting of user, obtained in system database matched with user account mark User's registration information extracts sensitive identity information corresponding with user account mark in the user's registration information, and When not including the sensitive identity information extracted in the black list database, according to the sensitive identity information of extraction Construction black list user is stored in the black list database.
9. according to the method described in claim 8, it is characterized in that, described use according to the sensitive identity information construction blacklist Family is stored in the black list database, including:
The sensitive identity information is encrypted according to predetermined encryption algorithm, generates black list user;
The black list user is stored in the black list database.
10. according to any methods of claim 1-8, which is characterized in that further include:
When detecting at least one of following operations, corresponding operation log is recorded in log list;
The operation includes:Close strategy according to setting, whole user accounts corresponding to the black list user into Row closes processing;It is stored in the black list database according to the sensitive identity information construction black list user;And it is right The corresponding whole user accounts of the black list user carry out deblocking processing;
If detecting the export operation for the log list, the log list is exported as to the document of object format.
11. a kind of blacklist managing device, which is characterized in that including:
Selecting module is closed, selects at least one blacklist closed to use in black list database for obtaining management user Family;
Account acquisition module, for according to storing sensitive body corresponding with the black list user in the black list database Part information, obtains whole user accounts of the black list user in target platform;
Account closes module, for closing strategy according to setting, whole user's accounts corresponding to the black list user It number carries out closing processing.
12. a kind of computer equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now method for managing black list as described in any in claim 1-10.
13. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The method for managing black list as described in any in claim 1-10 is realized when execution.
CN201810322067.5A 2018-04-11 2018-04-11 Method for managing black list, device, equipment and storage medium Pending CN108494796A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810322067.5A CN108494796A (en) 2018-04-11 2018-04-11 Method for managing black list, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810322067.5A CN108494796A (en) 2018-04-11 2018-04-11 Method for managing black list, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108494796A true CN108494796A (en) 2018-09-04

Family

ID=63315480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810322067.5A Pending CN108494796A (en) 2018-04-11 2018-04-11 Method for managing black list, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108494796A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109918552A (en) * 2019-01-23 2019-06-21 平安科技(深圳)有限公司 Malice group tells tendency personal identification method, server and computer readable storage medium
CN110287390A (en) * 2019-06-25 2019-09-27 苏州梦嘉信息技术有限公司 Wechat public's account management system and method
CN110557363A (en) * 2019-06-03 2019-12-10 北京城市网邻信息技术有限公司 identity verification method, device and storage medium
CN110784471A (en) * 2019-10-30 2020-02-11 深圳前海环融联易信息科技服务有限公司 Blacklist collection management method and device, computer equipment and storage medium
CN111107057A (en) * 2019-11-28 2020-05-05 泰康保险集团股份有限公司 Abnormal user account detection method, device, equipment and storage medium
CN111245770A (en) * 2018-11-28 2020-06-05 北京默契破冰科技有限公司 Method, apparatus and computer storage medium for user account management
CN111787348A (en) * 2020-07-28 2020-10-16 中国联合网络通信集团有限公司 Video pushing method based on live broadcast, application function entity and terminal equipment
CN111984993A (en) * 2020-08-06 2020-11-24 武汉华中时讯科技有限责任公司 Method for associating roles with non-private information streams in account
CN112016078A (en) * 2020-08-26 2020-12-01 广州市百果园信息技术有限公司 Method, device, server and storage medium for detecting forbidding of login equipment
CN112651681A (en) * 2019-10-12 2021-04-13 沈思远 Method and system for realizing management and screening of takeout orders by users based on computer equipment
CN112699332A (en) * 2020-12-31 2021-04-23 五八有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN113159911A (en) * 2021-02-25 2021-07-23 华夏方圆信用评估有限公司 Intelligent bidding main body performance monitoring and system based on big data platform
CN113965772A (en) * 2021-10-29 2022-01-21 北京百度网讯科技有限公司 Live video processing method and device, electronic equipment and storage medium
CN114553522A (en) * 2022-02-21 2022-05-27 中国建设银行股份有限公司 Self-response disposal method for security product and related equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906066A (en) * 2012-12-27 2014-07-02 腾讯科技(北京)有限公司 Disturbance shielding method and apparatus for user generation content referring
CN105323277A (en) * 2014-07-09 2016-02-10 腾讯科技(深圳)有限公司 Application account management method, device and system
CN105491458A (en) * 2015-11-27 2016-04-13 武汉斗鱼网络科技有限公司 Optimization method for speaking time of barrage in live website
CN105515830A (en) * 2015-11-26 2016-04-20 广州酷狗计算机科技有限公司 User management method and device
CN107147621A (en) * 2017-04-20 2017-09-08 微医集团(浙江)有限公司 The implementation method of internet medical treatment ox risk control
CN107465693A (en) * 2017-09-18 2017-12-12 北京小度信息科技有限公司 Request message treating method and apparatus
CN107517394A (en) * 2017-09-01 2017-12-26 北京小米移动软件有限公司 Identify the method, apparatus and computer-readable recording medium of disabled user
CN107798541A (en) * 2016-08-31 2018-03-13 苏宁云商集团股份有限公司 A kind of monitoring method and system being used in line service

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103906066A (en) * 2012-12-27 2014-07-02 腾讯科技(北京)有限公司 Disturbance shielding method and apparatus for user generation content referring
CN105323277A (en) * 2014-07-09 2016-02-10 腾讯科技(深圳)有限公司 Application account management method, device and system
CN105515830A (en) * 2015-11-26 2016-04-20 广州酷狗计算机科技有限公司 User management method and device
CN105491458A (en) * 2015-11-27 2016-04-13 武汉斗鱼网络科技有限公司 Optimization method for speaking time of barrage in live website
CN107798541A (en) * 2016-08-31 2018-03-13 苏宁云商集团股份有限公司 A kind of monitoring method and system being used in line service
CN107147621A (en) * 2017-04-20 2017-09-08 微医集团(浙江)有限公司 The implementation method of internet medical treatment ox risk control
CN107517394A (en) * 2017-09-01 2017-12-26 北京小米移动软件有限公司 Identify the method, apparatus and computer-readable recording medium of disabled user
CN107465693A (en) * 2017-09-18 2017-12-12 北京小度信息科技有限公司 Request message treating method and apparatus

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111245770B (en) * 2018-11-28 2023-03-24 北京默契破冰科技有限公司 Method, apparatus and computer storage medium for user account management
CN111245770A (en) * 2018-11-28 2020-06-05 北京默契破冰科技有限公司 Method, apparatus and computer storage medium for user account management
CN109918552A (en) * 2019-01-23 2019-06-21 平安科技(深圳)有限公司 Malice group tells tendency personal identification method, server and computer readable storage medium
CN109918552B (en) * 2019-01-23 2024-03-12 平安科技(深圳)有限公司 Method for identifying aversion group complaint trend personnel, server and computer readable storage medium
CN110557363A (en) * 2019-06-03 2019-12-10 北京城市网邻信息技术有限公司 identity verification method, device and storage medium
CN110287390A (en) * 2019-06-25 2019-09-27 苏州梦嘉信息技术有限公司 Wechat public's account management system and method
CN112651681A (en) * 2019-10-12 2021-04-13 沈思远 Method and system for realizing management and screening of takeout orders by users based on computer equipment
CN110784471A (en) * 2019-10-30 2020-02-11 深圳前海环融联易信息科技服务有限公司 Blacklist collection management method and device, computer equipment and storage medium
CN111107057A (en) * 2019-11-28 2020-05-05 泰康保险集团股份有限公司 Abnormal user account detection method, device, equipment and storage medium
CN111787348A (en) * 2020-07-28 2020-10-16 中国联合网络通信集团有限公司 Video pushing method based on live broadcast, application function entity and terminal equipment
CN111984993A (en) * 2020-08-06 2020-11-24 武汉华中时讯科技有限责任公司 Method for associating roles with non-private information streams in account
CN111984993B (en) * 2020-08-06 2024-02-13 武汉华中时讯科技有限责任公司 Method for associating roles under account with non-private information flow
CN112016078A (en) * 2020-08-26 2020-12-01 广州市百果园信息技术有限公司 Method, device, server and storage medium for detecting forbidding of login equipment
WO2022042194A1 (en) * 2020-08-26 2022-03-03 百果园技术(新加坡)有限公司 Block detection method and apparatus for login device, server, and storage medium
CN112699332A (en) * 2020-12-31 2021-04-23 五八有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN113159911A (en) * 2021-02-25 2021-07-23 华夏方圆信用评估有限公司 Intelligent bidding main body performance monitoring and system based on big data platform
CN113965772A (en) * 2021-10-29 2022-01-21 北京百度网讯科技有限公司 Live video processing method and device, electronic equipment and storage medium
CN114553522A (en) * 2022-02-21 2022-05-27 中国建设银行股份有限公司 Self-response disposal method for security product and related equipment

Similar Documents

Publication Publication Date Title
CN108494796A (en) Method for managing black list, device, equipment and storage medium
US11095669B2 (en) Forensic analysis of computing activity
US9563749B2 (en) Comparing applications and assessing differences
CN113037777B (en) Honeypot bait distribution method and device, storage medium and electronic equipment
US10868821B2 (en) Electronic mail security using a heartbeat
KR101558715B1 (en) System and Method for Server-Coupled Malware Prevention
US10972483B2 (en) Electronic mail security using root cause analysis
US9225618B2 (en) Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees
CN110073353A (en) Operating system and method based on container
CN109937564B (en) Method and apparatus for detecting fraudulent account usage in a distributed computing system
CN108616490A (en) A kind of method for network access control, apparatus and system
Van Der Sype et al. On lawful disclosure of personal user data: What should app developers do?
CN107766728A (en) Mobile application security managing device, method and mobile operation safety protection system
CN109446259B (en) Data processing method and device, processor and storage medium
CN107528865A (en) The method for down loading and system of file
CN114556340A (en) Device for preventing and blocking distribution of harmful content
CN104239798B (en) Mobile terminal, server end in mobile office system and its virus method and system
CN111835788B (en) Information data distribution method and device
Farooqi et al. Canarytrap: Detecting data misuse by third-party apps on online social networks
WO2019122832A1 (en) Electronic mail security using a user-based inquiry
CN114826790B (en) Block chain monitoring method, device, equipment and storage medium
Kim et al. I’ve Got Your Number: Harvesting users’ personal data via contacts sync for the KakaoTalk messenger
Peras et al. Influence of GDPR on social networks used by omnichannel contact center
Khattak Characterization of Internet censorship from multiple perspectives
US10097571B2 (en) Tracking cloud workloads to isolate security breach exposure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180904