Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation
Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described
Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this
This all should belong in field those of ordinary skill every other embodiment obtained without making creative work
The range of specification protection.
This specification embodiment provides a kind of link recognition methods of risk and device.
A kind of risk link recognition methods that this specification embodiment provides is introduced first below.
It should be noted that the method that this specification embodiment provides is suitable for electronic equipment, in practical applications, the electricity
Sub- equipment can be server, alternatively, the electronic equipment may be that the terminals such as mobile phone, tablet computer, personal digital assistant are set
Standby, alternatively, the electronic equipment may be the computer equipments such as laptop, desktop computer, tabletop machine, this specification is implemented
Example is not construed as limiting this.
Fig. 1 is the flow chart of the risk link recognition methods of one embodiment of this specification, as shown in Figure 1, this method
It may comprise steps of: step 102, step 104 and step 106, wherein
In a step 102, obtain preset duration in Object linking number of clicks with share number.
In this specification embodiment, the number of clicks of Object linking is referred to: the accessed number of the Object linking, target
The sharing number of link refers to: the number that the Object linking is shared, wherein one be linked at by before sharing certainly will by
It clicks.
In this specification embodiment, preset duration can be 1 hour, 6 hours, 12 hours, 24 hours or 36 hours etc..
At step 104, according to the number of clicks of Object linking with share number, determine Object linking click share
Rate, wherein click the ratio of sharing number and number of clicks that sharing rate is Object linking.
In this specification embodiment, click sharing rate=link sharing number/number of clicks of link.
In step 106, whether the relationship of click sharing rate and preset threshold based on Object linking, determine Object linking
For risk link.
In view of the click sharing rate that the click sharing rate of risk link typically much higher than normally links, and risk links
Click sharing rate would generally rapidly reach a higher value (for example, in order to obtain the falseness in the page of risk link
Risk link repeatedly can be shared with multiple users, group or circle by reward, user), in view of the situation, this specification
In embodiment, a threshold value (i.e. preset threshold) can be preset, by by the click sharing rate of Object linking and default threshold
Value is compared, to identify whether Object linking is risk link.
In this specification embodiment, if the click sharing rate of Object linking is higher than preset threshold, it is determined that Object linking
For risk link;If the click sharing rate of Object linking is not higher than preset threshold, it is determined that Object linking is the link of non-risk;
Wherein, preset threshold can be 0.6,0.7 or 0.8 etc..
It, can be and pre- based on the relationship of click the sharing rate and preset threshold of Object linking in this specification embodiment
If white list, determine Object linking whether be risk link.Specifically, being preset if the click sharing rate of Object linking is higher than
Threshold value and not in default white list, it is determined that Object linking is that risk links;If the click sharing rate of Object linking is higher than
Preset threshold and in default white list, it is determined that Object linking is that non-risk links;If the click sharing rate of Object linking
Not higher than preset threshold, it is determined that Object linking is the link of non-risk;Wherein, non-risk link is linked as in white list.
In this specification embodiment, it is contemplated that businessman can plan some marketing activities to attract user under electric business scene,
Such as promote, since the consumer for participating in marketing activity is usually relatively more, correspondingly, the click for the link that marketing activity is related to
Sharing rate is also higher, in order to avoid this kind of link is misidentified as risk link, this kind of link can be put on record in advance, be deposited
Storage is into default white list, wherein is linked as non-risk link in white list.
In this specification embodiment, after determining that Object linking is risk link, risk can be updated according to Object linking
Object linking is added in risk chained library by chained library, wherein be linked as risk link in risk chained library.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast
The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link
Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute
Anticipate design trap, in view of the situation, in the embodiment, can be distinguished by the sharing clicking rate of link risk link and
Normal link, the sharing rate after being clicked due to risk link is often higher than normally linking, for risk link
Recognition accuracy is higher, and corresponding risk link can be found that before long range diffusion propagation, and timeliness is stronger.
Fig. 2 is the flow chart of the risk link recognition methods of another embodiment of this specification, and this method is applied to clothes
It is engaged in end, in this specification embodiment, the opening of all-links all passes through server-side in client, that is to say, that server-side can be with
Record via the number of clicks linked in all clients of server-side with share number, at this point, as shown in Fig. 2, this method can
The following steps are included: step 202, step 204, step 206, step 208 and step 210, wherein
In step 202, share event with link to the links and accesses event that client is carried out via server-side to remember
Record obtains sharing log and click logs.
In this specification embodiment, the opening of all-links is required via server-side in client, for example, user clicks
The link of one " Baidu " in client could access the server of " Baidu " then client needs to first pass through server-side.
In step 204, it saves and shares log and click logs.
In this specification embodiment, server-side can save the sharing day in client via the all-links of the server-side
Will and click logs.
In step 206, from the sharing log and click logs that server-side saves, Object linking in preset duration is obtained
Number of clicks with share number.
, can be according to the mark of Object linking in this specification embodiment, the sharing log and click that are saved from server-side
In log, obtain preset duration in Object linking number of clicks with share number.
In a step 208, according to the number of clicks of Object linking with share number, determine Object linking click share
Rate, wherein click the ratio of sharing number and number of clicks that sharing rate is Object linking.
In this specification embodiment, click sharing rate=link sharing number/number of clicks of link.
In step 210, whether the relationship of click sharing rate and preset threshold based on Object linking, determine Object linking
For risk link.
In view of the click sharing rate that the click sharing rate of risk link typically much higher than normally links, and risk links
Click sharing rate would generally rapidly reach a higher value (for example, in order to obtain the falseness in the page of risk link
Risk link repeatedly can be shared with multiple users, group or circle by reward, user), in view of the situation, this specification
In embodiment, a threshold value (i.e. preset threshold) can be preset, by by the click sharing rate of Object linking and default threshold
Value is compared, to identify whether Object linking is risk link.
In this specification embodiment, if the click sharing rate of Object linking is higher than preset threshold, it is determined that Object linking
For risk link;If the click sharing rate of Object linking is not higher than preset threshold, it is determined that Object linking is the link of non-risk;
Wherein, preset threshold can be 0.6,0.7 or 0.8 etc..
It, can be and pre- based on the relationship of click the sharing rate and preset threshold of Object linking in this specification embodiment
If white list, determine Object linking whether be risk link.Specifically, being preset if the click sharing rate of Object linking is higher than
Threshold value and not in default white list, it is determined that Object linking is that risk links;If the click sharing rate of Object linking is higher than
Preset threshold and in default white list, it is determined that Object linking is that non-risk links;If the click sharing rate of Object linking
Not higher than preset threshold, it is determined that Object linking is the link of non-risk;Wherein, non-risk link is linked as in white list.
In this specification embodiment, it is contemplated that businessman can plan some marketing activities to attract user under electric business scene,
Such as promote, since the consumer for participating in marketing activity is usually relatively more, correspondingly, the click for the link that marketing activity is related to
Sharing rate is also higher, in order to avoid this kind of link is misidentified as risk link, this kind of link can be put on record in advance, be deposited
Storage is into default white list, wherein is linked as non-risk link in white list.
In this specification embodiment, after determining that Object linking is risk link, risk can be updated according to Object linking
Object linking is added in risk chained library by chained library, wherein be linked as risk link in risk chained library.
In this specification embodiment, after determining that Object linking is risk link, if detected from client
It for the links and accesses request of Object linking, is then sent to client and intercepts instruction, wherein interception instruction is used to indicate client
Hold interception target link.Specifically, server-side can notify client objectives to be linked as risk link, and indicate client at this
Ground renders the indicating risk page that can not be accessed, and risk can be had by prompting user to continue access.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast
The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link
Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute
The trap for design of anticipating, in view of the situation, in the embodiment, the click logs that can locally be saved from server-side with share log
The middle number of clicks for obtaining link to be identified with share number, calculate the sharing clicking rate of the link, pass through the sharing point of link
Rate is hit to distinguish risk link and normal link, the sharing rate after being clicked due to risk link is often than normally linking
Height, thus it is higher for the recognition accuracy of risk link, and can be found that before long range diffusion propagation corresponding
Risk link, timeliness are stronger.
Fig. 3 is the flow chart of the risk link recognition methods of another embodiment of this specification, and this method is applied to clothes
It is engaged in end, in this specification embodiment, the opening of all-links is without server-side in client, at this point, as shown in figure 3, the party
Method may comprise steps of: step 302, step 304, step 306 and step 308, wherein
In step 302, receive number of clicks that multiple client is reported for Object linking with share number.
In this specification embodiment, the opening of all-links is not via server-side in client, for example, user clicks visitor
The link of one " Baidu " in the end of family, then client directly accesses the server of " Baidu ", without passing through server-side.
In this specification embodiment, client will record in the client number of clicks of all-links with share number,
And server-side is reported to by its timing or when receiving and reporting instruction.
In step 304, the number of clicks reported to client each in preset duration is counted with number is shared, and is obtained
In preset duration the number of clicks of Object linking with share number.
Within step 306, according to the number of clicks of Object linking with share number, determine Object linking click share
Rate, wherein click the ratio of sharing number and number of clicks that sharing rate is Object linking.
In this specification embodiment, click sharing rate=link sharing number/number of clicks of link.
In step 308, whether the relationship of click sharing rate and preset threshold based on Object linking, determine Object linking
For risk link.
In view of the click sharing rate that the click sharing rate of risk link typically much higher than normally links, and risk links
Click sharing rate would generally rapidly reach a higher value (for example, in order to obtain the falseness in the page of risk link
Risk link repeatedly can be shared with multiple users, group or circle by reward, user), in view of the situation, this specification is real
It applies in example, a threshold value (i.e. preset threshold) can be preset, by by the click sharing rate and preset threshold of Object linking
It is compared, to identify whether Object linking is risk link.
In this specification embodiment, if the click sharing rate of Object linking is higher than preset threshold, it is determined that Object linking
For risk link;If the click sharing rate of Object linking is not higher than preset threshold, it is determined that Object linking is the link of non-risk;
Wherein, preset threshold can be 0.6,0.7 or 0.8 etc..
It, can be and pre- based on the relationship of click the sharing rate and preset threshold of Object linking in this specification embodiment
If white list, determine Object linking whether be risk link.Specifically, being preset if the click sharing rate of Object linking is higher than
Threshold value and not in default white list, it is determined that Object linking is that risk links;If the click sharing rate of Object linking is higher than
Preset threshold and in default white list, it is determined that Object linking is that non-risk links;If the click sharing rate of Object linking
Not higher than preset threshold, it is determined that Object linking is the link of non-risk;Wherein, non-risk link is linked as in white list.
In this specification embodiment, it is contemplated that businessman can plan some marketing activities to attract user under electric business scene,
Such as promote, since the consumer for participating in marketing activity is usually relatively more, correspondingly, the click for the link that marketing activity is related to
Sharing rate is also higher, in order to avoid this kind of link is misidentified as risk link, this kind of link can be put on record in advance, be deposited
Storage is into default white list, wherein is linked as non-risk link in white list.
In this specification embodiment, after determining that Object linking is risk link, risk can be updated according to Object linking
Object linking is added in risk chained library by chained library, wherein be linked as risk link in risk chained library.
In this specification embodiment, after determining that Object linking is risk link, it can send and notify to each client
Message, to notify each client objectives to be linked as risk link, when access target links client next time, there are wind for prompt
Danger is simultaneously intercepted.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast
The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link
Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute
The trap of meaning design in the embodiment, can receive the number of clicks for the link to be identified that client reports in view of the situation
With share number, calculate the sharing clicking rate of the link, distinguished by the sharing clicking rate of link risk link and normal, chain
It connects, the sharing rate after being clicked due to risk link is often higher than normally linking, quasi- for the identification of risk link
True rate is higher, and corresponding risk link can be found that before long range diffusion propagation, and timeliness is stronger.
Fig. 4 is the structural schematic diagram of the risk link identification device of one embodiment of this specification, as shown in figure 4,
In a kind of Software Implementation, risk links identification device 400, may include: to obtain module 401,402 and of the first determining module
Second determining module 403, wherein
Obtain module 401, for obtain in preset duration the number of clicks of Object linking with share number;
First determining module 402, for according to the number of clicks of the Object linking with share number, determine the target
The click sharing rate of link, the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
Second determining module 403 is determined for the relationship of click sharing rate and preset threshold based on the Object linking
Whether the Object linking is risk link.
As seen from the above-described embodiment, in the embodiment, the psychology of production user is linked from risk and risk link can be fast
The angle that speed is propagated is analyzed, and relative to normal link (non-risk link), would generally introduce one in the page of risk link
Temptation contents (for example, false prize information) a bit, and these temptation contents are provided to Risk Chain and tap into the event of row fast propagation institute
Anticipate design trap, in view of the situation, in the embodiment, can be distinguished by the sharing clicking rate of link risk link and
Normal link, the sharing rate after being clicked due to risk link is often higher than normally linking, for risk link
Recognition accuracy is higher, and corresponding risk link can be found that before long range diffusion propagation, and timeliness is stronger.
Optionally, as one embodiment, second determining module 403 may include:
First determines submodule, if the click sharing rate for the Object linking is higher than preset threshold, it is determined that institute
Object linking is stated as risk link;
Second determines submodule, if the click sharing rate for the Object linking is not higher than preset threshold, it is determined that
The Object linking is the link of non-risk.
Optionally, as one embodiment, the risk links identification device 400, can also include:
Update module is linked as in the risk chained library for updating risk chained library according to the Object linking
Risk link.
Optionally, as one embodiment, second determining module 403 may include:
Third determines submodule, for the relationship of click sharing rate and preset threshold based on the Object linking, and
Preset white list determines whether the Object linking is risk link, is linked as non-risk link in the white list.
Optionally, as one embodiment, the risk links identification device 400, can also include:
Logging modle, the links and accesses event for carrying out to client via server-side are shared event with link and are remembered
Record obtains sharing log and click logs;
Preserving module, for saving the sharing log and click logs;
The acquisition module 401 may include:
Acquisition submodule, for obtaining in preset duration from the sharing log and click logs that the server-side saves
The number of clicks of Object linking with share number.
Optionally, as one embodiment, the risk links identification device 400, can also include:
Sending module, if for detecting that the links and accesses for the Object linking from client are requested,
It is sent to the client and intercepts instruction, the interception instruction is used to indicate client and intercepts the Object linking.
Optionally, as one embodiment, the acquisition module 401 may include:
Receiving submodule, the number of clicks reported for Object linking for receiving multiple client with share number;
Statistic submodule, the number of clicks for reporting to client each in preset duration are counted with number is shared,
Obtain in the preset duration number of clicks of Object linking with share number.
Fig. 5 is the structural schematic diagram of the electronic equipment of one embodiment of this specification, as shown in figure 5, in hardware view,
The electronic equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may include
Memory, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile deposit
Reservoir (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that it
Hardware required for his business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of convenient for indicating
Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer
Risk is formed on face links identification device.Processor executes the program that memory is stored, and is specifically used for executing following behaviour
Make:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute
State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind
Danger link.
In this specification embodiment, the psychology for linking production user from risk links the angle for capableing of fast propagation with risk
It is analyzed, relative to normal link (non-risk link), some temptation content (examples would generally be introduced in the page of risk link
Such as, false prize information), and these temptation contents are provided to Risk Chain and tap into the trap that row fast propagation deliberately designs,
In view of the situation, in the embodiment, risk link and normal link can be distinguished by the sharing clicking rate of link, due to
Risk link be clicked after sharing rate it is often higher than normally linking, therefore for risk link recognition accuracy compared with
Height, and corresponding risk link can be found that before long range diffusion propagation, timeliness is stronger.
Optionally, as one embodiment, the pass of click the sharing rate and preset threshold based on the Object linking
System determines whether the Object linking is risk link, comprising:
If the click sharing rate of the Object linking is higher than preset threshold, it is determined that the Object linking is Risk Chain
It connects;
If the click sharing rate of the Object linking is not higher than preset threshold, it is determined that the Object linking is non-risk
Link.
Optionally, it is also wrapped after the determination Object linking is the step of risk links as one embodiment
It includes:
Risk chained library is updated according to the Object linking, is linked as risk link in the risk chained library.
Optionally, as one embodiment, the pass of click the sharing rate and preset threshold based on the Object linking
System determines whether the Object linking is risk link, comprising:
Relationship and the preset white list of click sharing rate and preset threshold based on the Object linking, determine institute
State whether Object linking is risk link, is linked as non-risk link in the white list.
Optionally, as one embodiment, the number of clicks of Object linking and share secondary in the acquisition preset duration
Before several steps, further includes:
Share event with link to the links and accesses event that client is carried out via server-side to record, obtains sharing day
Will and click logs;
Save the sharing log and click logs;
In the acquisition preset duration number of clicks of Object linking with share number, comprising:
From the sharing log and click logs that the server-side saves, the click time of Object linking in preset duration is obtained
It counts and shares number.
Optionally, it is also wrapped after the determination Object linking is the step of risk links as one embodiment
It includes:
If detecting that the links and accesses for the Object linking from client are requested, sent out to the client
Interception is sent to instruct, the interception instruction is used to indicate client and intercepts the Object linking.
Optionally, as one embodiment, it is described obtain in preset duration the number of clicks of Object linking with share number,
Include:
Receive number of clicks that multiple client is reported for Object linking with share number;
The number of clicks reported to client each in preset duration is counted with number is shared, and obtains the preset duration
The number of clicks of interior Object linking with share number.
The method that risk link identification device disclosed in the above-mentioned embodiment illustrated in fig. 5 such as this specification executes can be applied to
In processor, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.?
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor or software form
Instruction is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processor, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided
Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in this specification embodiment disclosed
Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional
Processor etc..The step of method in conjunction with disclosed in this specification embodiment, can be embodied directly in hardware decoding processor execution
Complete, or in decoding processor hardware and software module combine execute completion.Software module can be located at random storage
Device, flash memory, read-only memory, this fields such as programmable read only memory or electrically erasable programmable memory, register at
In ripe storage medium.The storage medium is located at memory, and processor reads the information in memory, completes in conjunction with its hardware
The step of stating method.
The method that the electronic equipment can also carry out Fig. 1, and realize the function of risk link identification device embodiment shown in Fig. 1
Can, details are not described herein for this specification embodiment.
This specification embodiment additionally provides a kind of computer readable storage medium, the computer-readable recording medium storage
One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs
When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following
Method:
Obtain preset duration in Object linking number of clicks with share number;
According to the number of clicks of the Object linking with share number, determine the click sharing rate of the Object linking, institute
State the ratio for clicking sharing number and number of clicks that sharing rate is the Object linking;
The relationship of click sharing rate and preset threshold based on the Object linking, determines whether the Object linking is wind
Danger link.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification
Range.For all spirit in this specification within principle, any modification, equivalent replacement, improvement and so on should be included in this
Within the protection scope of specification.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.