CN108563553A - Recessive communications and liaison tool automatic mining method and apparatus - Google Patents
Recessive communications and liaison tool automatic mining method and apparatus Download PDFInfo
- Publication number
- CN108563553A CN108563553A CN201810357338.0A CN201810357338A CN108563553A CN 108563553 A CN108563553 A CN 108563553A CN 201810357338 A CN201810357338 A CN 201810357338A CN 108563553 A CN108563553 A CN 108563553A
- Authority
- CN
- China
- Prior art keywords
- application program
- application
- liaison
- communications
- installation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
Abstract
The invention discloses a kind of recessive communications and liaison tool automatic mining methods comprising:Obtain the installation record and operation trace of one or more application programs of mobile communications device;The installation is recorded based on application features rule base and the operation trace is standardized;And installation record and the operation trace are analyzed, to find out recessive communications and liaison tool from this of the mobile communications device one or more application programs.The invention also discloses a kind of recessive communications and liaison tool automatic mining device, it can be achieved that recessiveness communications and liaison tool automatic mining method above-mentioned.
Description
Technical field
The present invention relates to information technology fields, and more particularly to a kind of recessive communications and liaison tool automatic mining method and are
System.
Background technology
With the arrival in mobile interchange epoch, the mobile communications devices such as smart mobile phone, tablet computer it is multi-functional, intelligent
Trend be more and more obvious.Everyone mobile phone stores the contents such as a large amount of log, Email, instant messaging content
Type data, what is covered is the information of the every aspects such as people's food, clothing, housing and transportation, thus as important in crime case investigation
Electronic evidence.Therefore, the evidence value for the electronic information that mobile phone communications and liaison tool is preserved is very high, to solve a case play it is critical
Effect.
In various novel network crime activities, suspect generally has higher professional knowledge, can expertly transport
With various advanced technological means., in order to escape the supervision strike of law enforcement agency, more and more criminals, which abandon, to rise for they
The popular communications and liaison tools such as QQ, wechat are interrogated, then select the communications and liaison tool using customized development or minority's communications and liaison work of foreign countries
Have as the communications and liaison tool for implementing criminal activity.
However, in current Mobile Phone Forensics product, the popular communications and liaison tool that law enforcement agency has grasped can only be shown
Corresponding electronic evidence can not find the recessive communications and liaison tool that do not grasped by law enforcement agency with early warning and corresponding electricity in time
Sub- evidence causes such case often to face clue and finds that the predicament that people is difficult, investigation and evidence collection is difficult, strike processing is difficult is looked into difficult, landing.
In addition, with the continuous release of various communications and liaison tool layers, goes to find by manual type and identify in criminal activity
Used recessiveness communications and liaison tool, not only time-consuming and laborious but also easy omission key evidence information, it is difficult to meet investigation actual combat
It needs.
Invention content
The present invention proposes a kind of recessive communications and liaison tool automatic mining method and apparatus, passes through the dependency number to Mobile Phone Forensics
It according to progress automatic mining (searching) and studies and judges, to find recessive communications and liaison tool, to carry out timely early warning, to help investigation
Personnel quickly position the communications and liaison tool being accused of, find crime clue.
In one aspect, it is proposed that a kind of recessiveness communications and liaison tool automatic mining method comprising:Obtain mobile communications device
One or more application programs installation record and operation trace;The installation is recorded and is somebody's turn to do based on application features rule base
Operation trace is standardized;And installation record and the operation trace are analyzed, with being somebody's turn to do from the mobile communications device
Recessive communications and liaison tool is found out in one or more application programs.
In certain embodiments, the information for being used in conjunction with application program of specific type case is obtained;It is specific to this
The information for being used in conjunction with application program of type case carries out Analysis on confidence, with obtain the specific type case this is common
Use the confidence level of application program;By the specific type case this be used in conjunction with it is with a high credibility with other classes in application program
The installation record of type case is compared, and calculates this and is used in conjunction with use ratio of the application program in the other types case
Example;According to the use ratio judge this be used in conjunction with application program the other types case popularity;And if this is general
And degree is no more than pre-set threshold value, judges that this is used in conjunction with application program as the recessiveness communications and liaison tool.
In certain embodiments, periodically application issued information is obtained from application program download platform;It is answered from this
With program release news it is middle obtain one or more signature of the installation kit of release application program and packet titles, and according to extractable
Application Type list to this one or more release application program adds the label that could extract;And by this one or more
The application features rule base is added in the signature of release application program, the packet title and the label.
In certain embodiments, installation record includes title, version, the packet name of one or more application programs
Claim, set-up time and last run time at least one, the operation trace include one or more application programs title,
Last access time, last run time, obtain time and number of run at least one.
On the other hand, it is proposed that a kind of recessiveness communications and liaison tool automatic mining device comprising processor and memory,
Recessive communications and liaison tool automatic mining unit is stored in the memory.The recessiveness communications and liaison tool automatic mining unit is used for:It obtains
The installation of one or more application programs of mobile communications device records and operation trace;Based on application features rule base to this
Installation record and the operation trace are standardized;And installation record and the operation trace are analyzed, with from the movement
Recessive communications and liaison tool is found out in one or more application programs of communication device.
The present invention goes out used in suspect recessive communications and liaison tool by analyzing program automatic mining, can will be different
The software installation and operation mark information of suspect effectively handle and analyze, and is used to which intelligent decision goes out suspect
Recessive communications and liaison tool.
Description of the drawings
Including attached drawing to provide a further understanding of embodiments and attached drawing is incorporated into this specification and is constituted this
Part of specification.Attached drawing illustrates embodiment and together with the description principle for explaining the present invention.It will readily recognize that
To many expected advantages of other embodiment and embodiment, because described in detail below by quoting, they become by preferably
Understand.The element of attached drawing is not necessarily mutually proportionally.Same reference numeral refers to corresponding like.
Fig. 1 is the flow chart of recessive communications and liaison tool automatic mining method according to an embodiment of the invention;
Fig. 2 is the flow chart of one embodiment of the step S30 of recessive communications and liaison tool automatic mining method shown in FIG. 1;
And
Fig. 3 is the schematic diagram of recessive communications and liaison tool automatic mining device according to an embodiment of the invention.
Specific implementation mode
In the following detailed description, refer to the attached drawing, the attached drawing form a part for detailed description, and by wherein can be real
The illustrative specific embodiment of the present invention is trampled to show.It is patrolled it should be understood that other embodiment can be utilized or can be made
It collects and changes, without departing from the scope of the present invention.Therefore described in detail below to be used in limiting sense, and this
The range of invention is defined by the following claims.
Fig. 1 shows the flow chart of recessive communications and liaison tool automatic mining method according to an embodiment of the invention.
In one embodiment, the recessive communications and liaison tool automatic mining device of the recessiveness communications and liaison tool automatic mining method as shown in Figure 2 is realized.
As shown in Figure 1, the recessiveness communications and liaison tool automatic mining method includes the following steps:
S10:The installation for obtaining the application program A (not shown) of mobile communications device 200 (see Fig. 2) records R (not shown)
With operation trace T (not shown).
Application program A is mounted in the application program (APP, or " application software ") in mobile communications device 200, can be with
There are one or more.Installation record R be the application software installed in mobile communications device 200 record (such as installation software row
Table), operation trace T is the operation trace of application software all in mobile communications device 200.
In one embodiment, installation record R includes the title of application program A, version, packet title, set-up time and last
One or more in run time, operation trace T includes the titles of one or more application programs, last access time, last
Run time obtains one or more in time and number of run.In other embodiments, installation record R, which may also include, has unloaded
The record of the software of load.
S20:Place is standardized to installation record R and operation trace T based on application features rule base L (not shown)
Reason.
In one embodiment, the mode of standardization is to analyze installation record and/or the operation trace and be organized into
Specific (regulation) format.
Since the publication of each application program is required for the audit of mainstream download platform, there is stronger regularity,
The essential informations such as the packet title of the application program of different editions, application name are all identical, distinguishing only versions
Number mark.Therefore, in one embodiment, this method includes before step S20:
Periodically application issued information is obtained from application program download platform (such as the title of application program, type, to retouch
State, developer, renewal time, version, installation kit);
One or more signature of the installation kit of release application program and packet names are obtained from the application issued information
Claim, and according to extractable Application Type list (such as the Application Type that the Mobile Phone Forensics of law enforcement agency can extract
List) to this one or more release application program adds the label that could extract;And
By this one or more the signature of release application program, the packet title and the label be added the application program spy
Levy rule base.
In one embodiment, installation records R and runs the mode of trace T standardizations for example:It sets title to
Elkitab.apk, it sets version to V3.1.01101, set packet title to com.tawhid.kitab, by the set-up time
It is set as 2015-08-23 22:32:03, last run time is set to 2016-01-05 18:31:03.
In addition, in one embodiment, (existing if the installation record R of application program A is new application program installation record
There are no the installation of the application program with application program A same types records in application features rule base L), then it will apply
Relevant information (such as the title of program A:Elkitab.apk, last access time:2015-08-23 22:32:03, it finally transports
The row time:2016-01-05 18:31:03, the time is obtained:2016-01-05 18:31:03) synchronous (supplement) arrives application program
In the L of characterization rules library.
S30:Analysis installation record R and operation trace T, to find out recessiveness from the application program A of mobile communications device 200
Communications and liaison tool H (not shown).
Recessive communications and liaison tool H refers to the popular communications and liaison tool (such as Tencent QQ, wechat) that (law enforcement agency) has grasped
Except communications and liaison tool (such as the communications and liaison tool of customized development or foreign countries minority's communications and liaison tool).
Fig. 2 is the flow chart of one embodiment of the step S30 of recessive communications and liaison tool automatic mining method shown in FIG. 1.
As shown in Fig. 2, the step S30 of the Mobile Phone Forensics method includes the following steps:
S31:Obtain the information for being used in conjunction with application program of specific type case.
S32:Analysis on confidence is carried out to the information for being used in conjunction with application program of the specific type case, is somebody's turn to do with obtaining
This of specific type case is used in conjunction with the confidence level of application program.
For suspect in order to escape the supervision strike of law enforcement agency, used communications and liaison tool is often limited to specific model
Enclose or the suspect of similar case between use, so the suspect between same case or same class case is used in conjunction with (example
Such as common, often installation) have if the application program crossed it is higher study and judge value, therefore can be used similar focusing (step S31 with
S32 it) is analyzed.Such as (from database) obtains the application program that the suspect of each type of case is used in conjunction with
Information, and utilize the original library of information formation communications and liaison tool;Then according to the type of application program (such as Application Type
Be high for social, type of play confidence level, type is that other confidence levels are low), description (passes through and analyzes each application program
The included keyword of description obtains the confidence level of the application program, such as includes chat, call, video, file transmission, trip
The confidence level of the application of the keywords such as play, mobile payment is high) and the set-up time (made by the suspect of comparison similar case
The set-up time of application program is distributed and issuing time, and the credible of each application program is obtained in conjunction with the weight of different proportion
Degree) etc. characteristics, obtain the confidence level that such case corresponds to communications and liaison tool using different analysis methods.
S33:By the specific type case this be used in conjunction with it is with a high credibility with other types case in application program
Installation record is compared, and use ratio of the application program in the other types case is used in conjunction with to calculate this.
S34:According to the use ratio judge this be used in conjunction with application program the other types case popularity.
S35:If the popularity is no more than pre-set threshold value, judge that this is used in conjunction with application program as the recessiveness communications and liaison work
Tool.
Since most of popular communications and liaison tool such as Tencent QQ, wechat is all among the grasp list of law enforcement agency, institute
With suspect in order to escape the strike of law enforcement agency, often select the communications and liaison tool compared with minority as business communications and liaison tool, and
It concentrates in the suspect group of specific type case using, therefore foreign peoples's exclusive method (step S33, S34 and S35) can be used
It is analyzed.Such as by the installation of the application program of the high confidence level of specific type case and the application program of other types case
Record is compared, and calculates use ratio of each application program in other types case;And according to the use ratio
Show that analyzed application program in the popularity of the suspect group of other types case, is carried out reversed by pre-set threshold value
Analysis show that application program used in the suspect of specific type case (communications and liaison tool) (such as relates to the suspect of probably case and makes
Use Talkbox, WhatApps etc. as main communications and liaison tool, and the type application program relate to it is yellow, relate to and the other types case such as rob
Substantially no one's use in the suspect of part).
Fig. 2 shows the schematic diagrames of recessive communications and liaison tool automatic mining device according to an embodiment of the invention.Such as
Shown in Fig. 2, recessive communications and liaison tool automatic mining device 100 includes recessive communications and liaison tool automatic mining unit 110 and communication unit
120.Between recessive communications and liaison tool automatic mining device and mobile communications device 200 (such as mobile phone, tablet computer) by network,
The data transmission mediums such as data transmission interface (such as universal serial bus) are communicated.
Recessive communications and liaison tool automatic mining device 100 is that (such as server, computer and intelligent movable are whole for a kind of computing device
End), including processor and memory.The processor is a kind of IC chip, such as microprocessor (central
Processing unit, CPU), digital signal processor (digital signal processor, DSP), special integrated electricity
Road (application specific integrated circuit, ASIC), ready-made programmable gate array (field-
Programmable gate array, FPGA) or other programmable logic device, it is stored in the memory for executing
Computer program.Recessive communications and liaison tool automatic mining unit 110 and communication unit 120 are stored in the memory, wherein recessive
Communications and liaison tool automatic mining unit 110 includes the calculating for realizing the recessiveness communications and liaison tool automatic mining method shown in FIG. 1
Machine program, communication unit 120 include be used for realizing recessive communications and liaison tool automatic mining device 100 and mobile communications device 200 it
Between communication computer program.
In one embodiment, recessive communications and liaison tool automatic mining unit 110 further includes the method for realizing following steps
Computer program:Periodically application issued information is obtained from application program download platform;From the application issued information
It is middle to obtain one or more signature of the installation kit of release application program and packet titles, and arranged according to extractable Application Type
Table to this one or more release application program adds the label that could extract;And one or more release application programs by this
The signature, the packet title and the label application features rule base is added.
In one embodiment, recessive communications and liaison tool automatic mining unit 110 includes being used for realizing that the mobile phone shown in Fig. 2 takes
The computer program of the embodiment of card method.
In one embodiment, installation record R includes the title of application program A, version, packet title, set-up time and last
One or more in run time, operation trace T includes the titles of one or more application programs, last access time, last
Run time obtains one or more in time and number of run.In other embodiments, installation record R, which may also include, has unloaded
The record of the software of load.
The present invention goes out used in suspect recessive communications and liaison tool by analyzing program automatic mining, can will be different
The software installation and operation mark information of suspect effectively handle and analyze, and is used to which intelligent decision goes out suspect
Recessive communications and liaison tool.The present invention can be effectively reduced the burden for studying and judging work of investigation personnel, and then assist to closing
The further analysis of key clue and evidence.
Obviously, those skilled in the art can make to the present invention without departing from the spirit and scope of the present invention
Embodiment various modifications and change.In this manner, if these modifications and changes be in the present invention claim and its
In the range of equivalent form, then the present invention, which also aims to, covers these modifications and changes.Word " comprising " is not excluded for not wanting in right
The presence of the other elements or step listed in asking.The simple thing that certain measures are recorded in mutually different dependent claims
Do not indicate that the combination of these measures is consequently not used for making a profit in fact.Any reference numeral in claim should not be regarded as limited to
Range.
Claims (9)
1. a kind of recessiveness communications and liaison tool automatic mining method, which is characterized in that including:
Obtain the installation record and operation trace of one or more application programs of mobile communications device;
The installation is recorded based on application features rule base and the operation trace is standardized;And
Installation record and the operation trace are analyzed, it is hidden to be found out from this of the mobile communications device one or more application programs
Property communications and liaison tool.
2. according to the method described in claim 1, it is characterized in that, installation record and the operation trace are analyzed, with from the shifting
Moving the step of finding out recessive communications and liaison tool in one or more application programs of communication device includes:
Obtain the information for being used in conjunction with application program of specific type case;
Analysis on confidence is carried out to the information for being used in conjunction with application program of the specific type case, to obtain the specific type
This of case is used in conjunction with the confidence level of application program;
This by the specific type case is used in conjunction with the installation note with a high credibility with other types case in application program
Record is compared, and use ratio of the application program in the other types case is used in conjunction with to calculate this;
According to the use ratio judge this be used in conjunction with application program the other types case popularity;And
If the popularity is no more than pre-set threshold value, judge that this is used in conjunction with application program as the recessiveness communications and liaison tool.
3. according to the method described in claim 1, it is characterized in that, based on application features rule base to the installation record and
Further include before the step of operation trace is standardized:
Periodically application issued information is obtained from application program download platform;
One or more signature of the installation kit of release application program and packet titles are obtained from the application issued information, and
According to extractable Application Type list to this one or more release application program has added the label that could extract;And
By this one or more the signature of release application program, the packet title and the label be added the application features rule
Then library.
4. according to the method described in claim 1, it is characterized in that, wherein installation record includes one or more application programs
Title, version, packet title, set-up time and last run time at least one, which includes that this is one or more
The title of a application program, last access time, last run time, obtain time and number of run at least one.
5. a kind of recessiveness communications and liaison tool automatic mining device, including processor and memory, it is stored in the memory recessive logical
Connection tool automatic mining unit, which is characterized in that the recessiveness communications and liaison tool automatic mining unit is used for:
Obtain the installation record and operation trace of one or more application programs of mobile communications device;
The installation is recorded based on application features rule base and the operation trace is standardized;And
Installation record and the operation trace are analyzed, it is hidden to be found out from this of the mobile communications device one or more application programs
Property communications and liaison tool.
6. device according to claim 5, which is characterized in that installation record and the operation trace are analyzed, with from the shifting
Finding out recessive communications and liaison tool in one or more application programs of dynamic communication device includes:
Obtain the information for being used in conjunction with application program of specific type case;
Analysis on confidence is carried out to the information for being used in conjunction with application program of the specific type case, to obtain the specific type
This of case is used in conjunction with the confidence level of application program;
This by the specific type case is used in conjunction with the installation note with a high credibility with other types case in application program
Record is compared, and use ratio of the application program in the other types case is used in conjunction with to calculate this;
According to the use ratio judge this be used in conjunction with application program the other types case popularity;And
If the popularity is no more than pre-set threshold value, judge that this is used in conjunction with application program as the recessiveness communications and liaison tool.
7. device according to claim 5, which is characterized in that based on application features rule base to the installation record and
The operation trace, which is standardized, further includes before:
Periodically application issued information is obtained from application program download platform;
One or more signature of the installation kit of release application program and packet titles are obtained from the application issued information, and
According to extractable Application Type list to this one or more release application program has added the label that could extract;And
By this one or more the signature of release application program, the packet title and the label be added the application features rule
Then library.
8. device according to claim 5, which is characterized in that wherein installation record includes one or more application programs
Title, version, packet title, set-up time and last run time at least one, which includes that this is one or more
The title of a application program, last access time, last run time, obtain time and number of run at least one.
9. a kind of computer readable storage medium is stored thereon with one or more computer programs, which is characterized in that this is one or more
A computer program is subsequently can by computer when device executes and realizes following steps:
Obtain the installation record and operation trace of one or more application programs of mobile communications device;
The installation is recorded based on application features rule base and the operation trace is standardized;And
Installation record and the operation trace are analyzed, it is hidden to be found out from this of the mobile communications device one or more application programs
Property communications and liaison tool.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810357338.0A CN108563553B (en) | 2018-04-20 | 2018-04-20 | Automatic excavation method and device for hidden communication tool |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810357338.0A CN108563553B (en) | 2018-04-20 | 2018-04-20 | Automatic excavation method and device for hidden communication tool |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108563553A true CN108563553A (en) | 2018-09-21 |
CN108563553B CN108563553B (en) | 2021-02-26 |
Family
ID=63535805
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810357338.0A Active CN108563553B (en) | 2018-04-20 | 2018-04-20 | Automatic excavation method and device for hidden communication tool |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108563553B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070118607A1 (en) * | 2005-11-22 | 2007-05-24 | Niko Nelissen | Method and System for forensic investigation of internet resources |
US20100005073A1 (en) * | 2005-10-19 | 2010-01-07 | Advanced Digital Forensic Solutions, Inc. | Methods for Searching Forensic Data |
CN103268239A (en) * | 2013-05-15 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | Application program management method and device of mobile terminal and mobile terminal |
CN104580240A (en) * | 2015-01-22 | 2015-04-29 | 杭州安存网络科技有限公司 | Chat evidence fixing method and device |
CN204444634U (en) * | 2015-03-19 | 2015-07-08 | 昆明信诺莱伯科技有限公司 | A kind of portable detecting site reconnoitres mobile laboratory |
CN106407780A (en) * | 2016-09-08 | 2017-02-15 | 北京小米移动软件有限公司 | Application running method and apparatus |
CN106933991A (en) * | 2017-02-24 | 2017-07-07 | 陈晶 | A kind of depth analysis towards intelligent terminal and user's portrait system and method |
-
2018
- 2018-04-20 CN CN201810357338.0A patent/CN108563553B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100005073A1 (en) * | 2005-10-19 | 2010-01-07 | Advanced Digital Forensic Solutions, Inc. | Methods for Searching Forensic Data |
US20070118607A1 (en) * | 2005-11-22 | 2007-05-24 | Niko Nelissen | Method and System for forensic investigation of internet resources |
CN103268239A (en) * | 2013-05-15 | 2013-08-28 | 百度在线网络技术(北京)有限公司 | Application program management method and device of mobile terminal and mobile terminal |
CN104580240A (en) * | 2015-01-22 | 2015-04-29 | 杭州安存网络科技有限公司 | Chat evidence fixing method and device |
CN204444634U (en) * | 2015-03-19 | 2015-07-08 | 昆明信诺莱伯科技有限公司 | A kind of portable detecting site reconnoitres mobile laboratory |
CN106407780A (en) * | 2016-09-08 | 2017-02-15 | 北京小米移动软件有限公司 | Application running method and apparatus |
CN106933991A (en) * | 2017-02-24 | 2017-07-07 | 陈晶 | A kind of depth analysis towards intelligent terminal and user's portrait system and method |
Also Published As
Publication number | Publication date |
---|---|
CN108563553B (en) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110442712B (en) | Risk determination method, risk determination device, server and text examination system | |
CN107515915A (en) | User based on user behavior data identifies correlating method | |
CN108304452B (en) | Article processing method and device and storage medium | |
CN106326242A (en) | Application pushing method and apparatus | |
CN103765421A (en) | Content control method, content control apparatus, and program | |
CN106126592B (en) | Processing method and device for search data | |
CN106998336B (en) | Method and device for detecting user in channel | |
CN113076416A (en) | Information heat evaluation method and device and electronic equipment | |
CN109525647A (en) | Message pushes badge value control method, electronic device and storage medium | |
CN103064858B (en) | Method and apparatus for objectionable image detection in social networking websites | |
CN111126928A (en) | Method and device for auditing release content | |
CN113609409B (en) | Method and system for recommending browsing information, electronic equipment and storage medium | |
CN115344776A (en) | Social platform user violation wind control method and device and terminal equipment | |
CN103593355A (en) | User original content recommending method and device | |
CN110972086A (en) | Short message processing method and device, electronic equipment and computer readable storage medium | |
CN117421214A (en) | Batch counting method, device, electronic equipment and computer readable storage medium | |
CN112115280A (en) | Full-media influence propagation analysis method and device | |
CN111177078A (en) | Log processing method and device and electronic equipment | |
US7693907B1 (en) | Selection for a mobile device using weighted virtual titles | |
CN111339438A (en) | Friend relation data processing method, server, terminal device and storage medium | |
CN108563553A (en) | Recessive communications and liaison tool automatic mining method and apparatus | |
Gundelach et al. | Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on Websites | |
CN110110067A (en) | A kind of database annotation method, apparatus and terminal device | |
CN109784047B (en) | Program detection method based on multiple features | |
CN111625721A (en) | Content recommendation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |