CN108563553A - Recessive communications and liaison tool automatic mining method and apparatus - Google Patents

Recessive communications and liaison tool automatic mining method and apparatus Download PDF

Info

Publication number
CN108563553A
CN108563553A CN201810357338.0A CN201810357338A CN108563553A CN 108563553 A CN108563553 A CN 108563553A CN 201810357338 A CN201810357338 A CN 201810357338A CN 108563553 A CN108563553 A CN 108563553A
Authority
CN
China
Prior art keywords
application program
application
liaison
communications
installation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810357338.0A
Other languages
Chinese (zh)
Other versions
CN108563553B (en
Inventor
林文楷
刘智洋
江汉祥
蔡淋强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201810357338.0A priority Critical patent/CN108563553B/en
Publication of CN108563553A publication Critical patent/CN108563553A/en
Application granted granted Critical
Publication of CN108563553B publication Critical patent/CN108563553B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a kind of recessive communications and liaison tool automatic mining methods comprising:Obtain the installation record and operation trace of one or more application programs of mobile communications device;The installation is recorded based on application features rule base and the operation trace is standardized;And installation record and the operation trace are analyzed, to find out recessive communications and liaison tool from this of the mobile communications device one or more application programs.The invention also discloses a kind of recessive communications and liaison tool automatic mining device, it can be achieved that recessiveness communications and liaison tool automatic mining method above-mentioned.

Description

Recessive communications and liaison tool automatic mining method and apparatus
Technical field
The present invention relates to information technology fields, and more particularly to a kind of recessive communications and liaison tool automatic mining method and are System.
Background technology
With the arrival in mobile interchange epoch, the mobile communications devices such as smart mobile phone, tablet computer it is multi-functional, intelligent Trend be more and more obvious.Everyone mobile phone stores the contents such as a large amount of log, Email, instant messaging content Type data, what is covered is the information of the every aspects such as people's food, clothing, housing and transportation, thus as important in crime case investigation Electronic evidence.Therefore, the evidence value for the electronic information that mobile phone communications and liaison tool is preserved is very high, to solve a case play it is critical Effect.
In various novel network crime activities, suspect generally has higher professional knowledge, can expertly transport With various advanced technological means., in order to escape the supervision strike of law enforcement agency, more and more criminals, which abandon, to rise for they The popular communications and liaison tools such as QQ, wechat are interrogated, then select the communications and liaison tool using customized development or minority's communications and liaison work of foreign countries Have as the communications and liaison tool for implementing criminal activity.
However, in current Mobile Phone Forensics product, the popular communications and liaison tool that law enforcement agency has grasped can only be shown Corresponding electronic evidence can not find the recessive communications and liaison tool that do not grasped by law enforcement agency with early warning and corresponding electricity in time Sub- evidence causes such case often to face clue and finds that the predicament that people is difficult, investigation and evidence collection is difficult, strike processing is difficult is looked into difficult, landing.
In addition, with the continuous release of various communications and liaison tool layers, goes to find by manual type and identify in criminal activity Used recessiveness communications and liaison tool, not only time-consuming and laborious but also easy omission key evidence information, it is difficult to meet investigation actual combat It needs.
Invention content
The present invention proposes a kind of recessive communications and liaison tool automatic mining method and apparatus, passes through the dependency number to Mobile Phone Forensics It according to progress automatic mining (searching) and studies and judges, to find recessive communications and liaison tool, to carry out timely early warning, to help investigation Personnel quickly position the communications and liaison tool being accused of, find crime clue.
In one aspect, it is proposed that a kind of recessiveness communications and liaison tool automatic mining method comprising:Obtain mobile communications device One or more application programs installation record and operation trace;The installation is recorded and is somebody's turn to do based on application features rule base Operation trace is standardized;And installation record and the operation trace are analyzed, with being somebody's turn to do from the mobile communications device Recessive communications and liaison tool is found out in one or more application programs.
In certain embodiments, the information for being used in conjunction with application program of specific type case is obtained;It is specific to this The information for being used in conjunction with application program of type case carries out Analysis on confidence, with obtain the specific type case this is common Use the confidence level of application program;By the specific type case this be used in conjunction with it is with a high credibility with other classes in application program The installation record of type case is compared, and calculates this and is used in conjunction with use ratio of the application program in the other types case Example;According to the use ratio judge this be used in conjunction with application program the other types case popularity;And if this is general And degree is no more than pre-set threshold value, judges that this is used in conjunction with application program as the recessiveness communications and liaison tool.
In certain embodiments, periodically application issued information is obtained from application program download platform;It is answered from this With program release news it is middle obtain one or more signature of the installation kit of release application program and packet titles, and according to extractable Application Type list to this one or more release application program adds the label that could extract;And by this one or more The application features rule base is added in the signature of release application program, the packet title and the label.
In certain embodiments, installation record includes title, version, the packet name of one or more application programs Claim, set-up time and last run time at least one, the operation trace include one or more application programs title, Last access time, last run time, obtain time and number of run at least one.
On the other hand, it is proposed that a kind of recessiveness communications and liaison tool automatic mining device comprising processor and memory, Recessive communications and liaison tool automatic mining unit is stored in the memory.The recessiveness communications and liaison tool automatic mining unit is used for:It obtains The installation of one or more application programs of mobile communications device records and operation trace;Based on application features rule base to this Installation record and the operation trace are standardized;And installation record and the operation trace are analyzed, with from the movement Recessive communications and liaison tool is found out in one or more application programs of communication device.
The present invention goes out used in suspect recessive communications and liaison tool by analyzing program automatic mining, can will be different The software installation and operation mark information of suspect effectively handle and analyze, and is used to which intelligent decision goes out suspect Recessive communications and liaison tool.
Description of the drawings
Including attached drawing to provide a further understanding of embodiments and attached drawing is incorporated into this specification and is constituted this Part of specification.Attached drawing illustrates embodiment and together with the description principle for explaining the present invention.It will readily recognize that To many expected advantages of other embodiment and embodiment, because described in detail below by quoting, they become by preferably Understand.The element of attached drawing is not necessarily mutually proportionally.Same reference numeral refers to corresponding like.
Fig. 1 is the flow chart of recessive communications and liaison tool automatic mining method according to an embodiment of the invention;
Fig. 2 is the flow chart of one embodiment of the step S30 of recessive communications and liaison tool automatic mining method shown in FIG. 1; And
Fig. 3 is the schematic diagram of recessive communications and liaison tool automatic mining device according to an embodiment of the invention.
Specific implementation mode
In the following detailed description, refer to the attached drawing, the attached drawing form a part for detailed description, and by wherein can be real The illustrative specific embodiment of the present invention is trampled to show.It is patrolled it should be understood that other embodiment can be utilized or can be made It collects and changes, without departing from the scope of the present invention.Therefore described in detail below to be used in limiting sense, and this The range of invention is defined by the following claims.
Fig. 1 shows the flow chart of recessive communications and liaison tool automatic mining method according to an embodiment of the invention. In one embodiment, the recessive communications and liaison tool automatic mining device of the recessiveness communications and liaison tool automatic mining method as shown in Figure 2 is realized. As shown in Figure 1, the recessiveness communications and liaison tool automatic mining method includes the following steps:
S10:The installation for obtaining the application program A (not shown) of mobile communications device 200 (see Fig. 2) records R (not shown) With operation trace T (not shown).
Application program A is mounted in the application program (APP, or " application software ") in mobile communications device 200, can be with There are one or more.Installation record R be the application software installed in mobile communications device 200 record (such as installation software row Table), operation trace T is the operation trace of application software all in mobile communications device 200.
In one embodiment, installation record R includes the title of application program A, version, packet title, set-up time and last One or more in run time, operation trace T includes the titles of one or more application programs, last access time, last Run time obtains one or more in time and number of run.In other embodiments, installation record R, which may also include, has unloaded The record of the software of load.
S20:Place is standardized to installation record R and operation trace T based on application features rule base L (not shown) Reason.
In one embodiment, the mode of standardization is to analyze installation record and/or the operation trace and be organized into Specific (regulation) format.
Since the publication of each application program is required for the audit of mainstream download platform, there is stronger regularity, The essential informations such as the packet title of the application program of different editions, application name are all identical, distinguishing only versions Number mark.Therefore, in one embodiment, this method includes before step S20:
Periodically application issued information is obtained from application program download platform (such as the title of application program, type, to retouch State, developer, renewal time, version, installation kit);
One or more signature of the installation kit of release application program and packet names are obtained from the application issued information Claim, and according to extractable Application Type list (such as the Application Type that the Mobile Phone Forensics of law enforcement agency can extract List) to this one or more release application program adds the label that could extract;And
By this one or more the signature of release application program, the packet title and the label be added the application program spy Levy rule base.
In one embodiment, installation records R and runs the mode of trace T standardizations for example:It sets title to Elkitab.apk, it sets version to V3.1.01101, set packet title to com.tawhid.kitab, by the set-up time It is set as 2015-08-23 22:32:03, last run time is set to 2016-01-05 18:31:03.
In addition, in one embodiment, (existing if the installation record R of application program A is new application program installation record There are no the installation of the application program with application program A same types records in application features rule base L), then it will apply Relevant information (such as the title of program A:Elkitab.apk, last access time:2015-08-23 22:32:03, it finally transports The row time:2016-01-05 18:31:03, the time is obtained:2016-01-05 18:31:03) synchronous (supplement) arrives application program In the L of characterization rules library.
S30:Analysis installation record R and operation trace T, to find out recessiveness from the application program A of mobile communications device 200 Communications and liaison tool H (not shown).
Recessive communications and liaison tool H refers to the popular communications and liaison tool (such as Tencent QQ, wechat) that (law enforcement agency) has grasped Except communications and liaison tool (such as the communications and liaison tool of customized development or foreign countries minority's communications and liaison tool).
Fig. 2 is the flow chart of one embodiment of the step S30 of recessive communications and liaison tool automatic mining method shown in FIG. 1. As shown in Fig. 2, the step S30 of the Mobile Phone Forensics method includes the following steps:
S31:Obtain the information for being used in conjunction with application program of specific type case.
S32:Analysis on confidence is carried out to the information for being used in conjunction with application program of the specific type case, is somebody's turn to do with obtaining This of specific type case is used in conjunction with the confidence level of application program.
For suspect in order to escape the supervision strike of law enforcement agency, used communications and liaison tool is often limited to specific model Enclose or the suspect of similar case between use, so the suspect between same case or same class case is used in conjunction with (example Such as common, often installation) have if the application program crossed it is higher study and judge value, therefore can be used similar focusing (step S31 with S32 it) is analyzed.Such as (from database) obtains the application program that the suspect of each type of case is used in conjunction with Information, and utilize the original library of information formation communications and liaison tool;Then according to the type of application program (such as Application Type Be high for social, type of play confidence level, type is that other confidence levels are low), description (passes through and analyzes each application program The included keyword of description obtains the confidence level of the application program, such as includes chat, call, video, file transmission, trip The confidence level of the application of the keywords such as play, mobile payment is high) and the set-up time (made by the suspect of comparison similar case The set-up time of application program is distributed and issuing time, and the credible of each application program is obtained in conjunction with the weight of different proportion Degree) etc. characteristics, obtain the confidence level that such case corresponds to communications and liaison tool using different analysis methods.
S33:By the specific type case this be used in conjunction with it is with a high credibility with other types case in application program Installation record is compared, and use ratio of the application program in the other types case is used in conjunction with to calculate this.
S34:According to the use ratio judge this be used in conjunction with application program the other types case popularity.
S35:If the popularity is no more than pre-set threshold value, judge that this is used in conjunction with application program as the recessiveness communications and liaison work Tool.
Since most of popular communications and liaison tool such as Tencent QQ, wechat is all among the grasp list of law enforcement agency, institute With suspect in order to escape the strike of law enforcement agency, often select the communications and liaison tool compared with minority as business communications and liaison tool, and It concentrates in the suspect group of specific type case using, therefore foreign peoples's exclusive method (step S33, S34 and S35) can be used It is analyzed.Such as by the installation of the application program of the high confidence level of specific type case and the application program of other types case Record is compared, and calculates use ratio of each application program in other types case;And according to the use ratio Show that analyzed application program in the popularity of the suspect group of other types case, is carried out reversed by pre-set threshold value Analysis show that application program used in the suspect of specific type case (communications and liaison tool) (such as relates to the suspect of probably case and makes Use Talkbox, WhatApps etc. as main communications and liaison tool, and the type application program relate to it is yellow, relate to and the other types case such as rob Substantially no one's use in the suspect of part).
Fig. 2 shows the schematic diagrames of recessive communications and liaison tool automatic mining device according to an embodiment of the invention.Such as Shown in Fig. 2, recessive communications and liaison tool automatic mining device 100 includes recessive communications and liaison tool automatic mining unit 110 and communication unit 120.Between recessive communications and liaison tool automatic mining device and mobile communications device 200 (such as mobile phone, tablet computer) by network, The data transmission mediums such as data transmission interface (such as universal serial bus) are communicated.
Recessive communications and liaison tool automatic mining device 100 is that (such as server, computer and intelligent movable are whole for a kind of computing device End), including processor and memory.The processor is a kind of IC chip, such as microprocessor (central Processing unit, CPU), digital signal processor (digital signal processor, DSP), special integrated electricity Road (application specific integrated circuit, ASIC), ready-made programmable gate array (field- Programmable gate array, FPGA) or other programmable logic device, it is stored in the memory for executing Computer program.Recessive communications and liaison tool automatic mining unit 110 and communication unit 120 are stored in the memory, wherein recessive Communications and liaison tool automatic mining unit 110 includes the calculating for realizing the recessiveness communications and liaison tool automatic mining method shown in FIG. 1 Machine program, communication unit 120 include be used for realizing recessive communications and liaison tool automatic mining device 100 and mobile communications device 200 it Between communication computer program.
In one embodiment, recessive communications and liaison tool automatic mining unit 110 further includes the method for realizing following steps Computer program:Periodically application issued information is obtained from application program download platform;From the application issued information It is middle to obtain one or more signature of the installation kit of release application program and packet titles, and arranged according to extractable Application Type Table to this one or more release application program adds the label that could extract;And one or more release application programs by this The signature, the packet title and the label application features rule base is added.
In one embodiment, recessive communications and liaison tool automatic mining unit 110 includes being used for realizing that the mobile phone shown in Fig. 2 takes The computer program of the embodiment of card method.
In one embodiment, installation record R includes the title of application program A, version, packet title, set-up time and last One or more in run time, operation trace T includes the titles of one or more application programs, last access time, last Run time obtains one or more in time and number of run.In other embodiments, installation record R, which may also include, has unloaded The record of the software of load.
The present invention goes out used in suspect recessive communications and liaison tool by analyzing program automatic mining, can will be different The software installation and operation mark information of suspect effectively handle and analyze, and is used to which intelligent decision goes out suspect Recessive communications and liaison tool.The present invention can be effectively reduced the burden for studying and judging work of investigation personnel, and then assist to closing The further analysis of key clue and evidence.
Obviously, those skilled in the art can make to the present invention without departing from the spirit and scope of the present invention Embodiment various modifications and change.In this manner, if these modifications and changes be in the present invention claim and its In the range of equivalent form, then the present invention, which also aims to, covers these modifications and changes.Word " comprising " is not excluded for not wanting in right The presence of the other elements or step listed in asking.The simple thing that certain measures are recorded in mutually different dependent claims Do not indicate that the combination of these measures is consequently not used for making a profit in fact.Any reference numeral in claim should not be regarded as limited to Range.

Claims (9)

1. a kind of recessiveness communications and liaison tool automatic mining method, which is characterized in that including:
Obtain the installation record and operation trace of one or more application programs of mobile communications device;
The installation is recorded based on application features rule base and the operation trace is standardized;And
Installation record and the operation trace are analyzed, it is hidden to be found out from this of the mobile communications device one or more application programs Property communications and liaison tool.
2. according to the method described in claim 1, it is characterized in that, installation record and the operation trace are analyzed, with from the shifting Moving the step of finding out recessive communications and liaison tool in one or more application programs of communication device includes:
Obtain the information for being used in conjunction with application program of specific type case;
Analysis on confidence is carried out to the information for being used in conjunction with application program of the specific type case, to obtain the specific type This of case is used in conjunction with the confidence level of application program;
This by the specific type case is used in conjunction with the installation note with a high credibility with other types case in application program Record is compared, and use ratio of the application program in the other types case is used in conjunction with to calculate this;
According to the use ratio judge this be used in conjunction with application program the other types case popularity;And
If the popularity is no more than pre-set threshold value, judge that this is used in conjunction with application program as the recessiveness communications and liaison tool.
3. according to the method described in claim 1, it is characterized in that, based on application features rule base to the installation record and Further include before the step of operation trace is standardized:
Periodically application issued information is obtained from application program download platform;
One or more signature of the installation kit of release application program and packet titles are obtained from the application issued information, and According to extractable Application Type list to this one or more release application program has added the label that could extract;And
By this one or more the signature of release application program, the packet title and the label be added the application features rule Then library.
4. according to the method described in claim 1, it is characterized in that, wherein installation record includes one or more application programs Title, version, packet title, set-up time and last run time at least one, which includes that this is one or more The title of a application program, last access time, last run time, obtain time and number of run at least one.
5. a kind of recessiveness communications and liaison tool automatic mining device, including processor and memory, it is stored in the memory recessive logical Connection tool automatic mining unit, which is characterized in that the recessiveness communications and liaison tool automatic mining unit is used for:
Obtain the installation record and operation trace of one or more application programs of mobile communications device;
The installation is recorded based on application features rule base and the operation trace is standardized;And
Installation record and the operation trace are analyzed, it is hidden to be found out from this of the mobile communications device one or more application programs Property communications and liaison tool.
6. device according to claim 5, which is characterized in that installation record and the operation trace are analyzed, with from the shifting Finding out recessive communications and liaison tool in one or more application programs of dynamic communication device includes:
Obtain the information for being used in conjunction with application program of specific type case;
Analysis on confidence is carried out to the information for being used in conjunction with application program of the specific type case, to obtain the specific type This of case is used in conjunction with the confidence level of application program;
This by the specific type case is used in conjunction with the installation note with a high credibility with other types case in application program Record is compared, and use ratio of the application program in the other types case is used in conjunction with to calculate this;
According to the use ratio judge this be used in conjunction with application program the other types case popularity;And
If the popularity is no more than pre-set threshold value, judge that this is used in conjunction with application program as the recessiveness communications and liaison tool.
7. device according to claim 5, which is characterized in that based on application features rule base to the installation record and The operation trace, which is standardized, further includes before:
Periodically application issued information is obtained from application program download platform;
One or more signature of the installation kit of release application program and packet titles are obtained from the application issued information, and According to extractable Application Type list to this one or more release application program has added the label that could extract;And
By this one or more the signature of release application program, the packet title and the label be added the application features rule Then library.
8. device according to claim 5, which is characterized in that wherein installation record includes one or more application programs Title, version, packet title, set-up time and last run time at least one, which includes that this is one or more The title of a application program, last access time, last run time, obtain time and number of run at least one.
9. a kind of computer readable storage medium is stored thereon with one or more computer programs, which is characterized in that this is one or more A computer program is subsequently can by computer when device executes and realizes following steps:
Obtain the installation record and operation trace of one or more application programs of mobile communications device;
The installation is recorded based on application features rule base and the operation trace is standardized;And
Installation record and the operation trace are analyzed, it is hidden to be found out from this of the mobile communications device one or more application programs Property communications and liaison tool.
CN201810357338.0A 2018-04-20 2018-04-20 Automatic excavation method and device for hidden communication tool Active CN108563553B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810357338.0A CN108563553B (en) 2018-04-20 2018-04-20 Automatic excavation method and device for hidden communication tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810357338.0A CN108563553B (en) 2018-04-20 2018-04-20 Automatic excavation method and device for hidden communication tool

Publications (2)

Publication Number Publication Date
CN108563553A true CN108563553A (en) 2018-09-21
CN108563553B CN108563553B (en) 2021-02-26

Family

ID=63535805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810357338.0A Active CN108563553B (en) 2018-04-20 2018-04-20 Automatic excavation method and device for hidden communication tool

Country Status (1)

Country Link
CN (1) CN108563553B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070118607A1 (en) * 2005-11-22 2007-05-24 Niko Nelissen Method and System for forensic investigation of internet resources
US20100005073A1 (en) * 2005-10-19 2010-01-07 Advanced Digital Forensic Solutions, Inc. Methods for Searching Forensic Data
CN103268239A (en) * 2013-05-15 2013-08-28 百度在线网络技术(北京)有限公司 Application program management method and device of mobile terminal and mobile terminal
CN104580240A (en) * 2015-01-22 2015-04-29 杭州安存网络科技有限公司 Chat evidence fixing method and device
CN204444634U (en) * 2015-03-19 2015-07-08 昆明信诺莱伯科技有限公司 A kind of portable detecting site reconnoitres mobile laboratory
CN106407780A (en) * 2016-09-08 2017-02-15 北京小米移动软件有限公司 Application running method and apparatus
CN106933991A (en) * 2017-02-24 2017-07-07 陈晶 A kind of depth analysis towards intelligent terminal and user's portrait system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100005073A1 (en) * 2005-10-19 2010-01-07 Advanced Digital Forensic Solutions, Inc. Methods for Searching Forensic Data
US20070118607A1 (en) * 2005-11-22 2007-05-24 Niko Nelissen Method and System for forensic investigation of internet resources
CN103268239A (en) * 2013-05-15 2013-08-28 百度在线网络技术(北京)有限公司 Application program management method and device of mobile terminal and mobile terminal
CN104580240A (en) * 2015-01-22 2015-04-29 杭州安存网络科技有限公司 Chat evidence fixing method and device
CN204444634U (en) * 2015-03-19 2015-07-08 昆明信诺莱伯科技有限公司 A kind of portable detecting site reconnoitres mobile laboratory
CN106407780A (en) * 2016-09-08 2017-02-15 北京小米移动软件有限公司 Application running method and apparatus
CN106933991A (en) * 2017-02-24 2017-07-07 陈晶 A kind of depth analysis towards intelligent terminal and user's portrait system and method

Also Published As

Publication number Publication date
CN108563553B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
CN107515915A (en) User based on user behavior data identifies correlating method
CN108304452B (en) Article processing method and device and storage medium
CN106326242A (en) Application pushing method and apparatus
CN103765421A (en) Content control method, content control apparatus, and program
CN106126592B (en) Processing method and device for search data
CN106998336B (en) Method and device for detecting user in channel
CN113076416A (en) Information heat evaluation method and device and electronic equipment
CN109525647A (en) Message pushes badge value control method, electronic device and storage medium
CN103064858B (en) Method and apparatus for objectionable image detection in social networking websites
CN111126928A (en) Method and device for auditing release content
CN113609409B (en) Method and system for recommending browsing information, electronic equipment and storage medium
CN115344776A (en) Social platform user violation wind control method and device and terminal equipment
CN103593355A (en) User original content recommending method and device
CN110972086A (en) Short message processing method and device, electronic equipment and computer readable storage medium
CN117421214A (en) Batch counting method, device, electronic equipment and computer readable storage medium
CN112115280A (en) Full-media influence propagation analysis method and device
CN111177078A (en) Log processing method and device and electronic equipment
US7693907B1 (en) Selection for a mobile device using weighted virtual titles
CN111339438A (en) Friend relation data processing method, server, terminal device and storage medium
CN108563553A (en) Recessive communications and liaison tool automatic mining method and apparatus
Gundelach et al. Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites
CN110110067A (en) A kind of database annotation method, apparatus and terminal device
CN109784047B (en) Program detection method based on multiple features
CN111625721A (en) Content recommendation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant