CN113360566A - Information content monitoring method and system - Google Patents
Information content monitoring method and system Download PDFInfo
- Publication number
- CN113360566A CN113360566A CN202110901823.1A CN202110901823A CN113360566A CN 113360566 A CN113360566 A CN 113360566A CN 202110901823 A CN202110901823 A CN 202110901823A CN 113360566 A CN113360566 A CN 113360566A
- Authority
- CN
- China
- Prior art keywords
- data
- risk
- database
- content
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/26—Visual data mining; Browsing structured data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/23—Updating
- G06F16/2365—Ensuring data consistency and integrity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method and a system for monitoring information content, which comprises the following steps: acquiring monitoring service configuration information set by a user; analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, and distributing the acquisition task to a corresponding crawler cluster to acquire data of target network data to obtain a corresponding data set; classifying and checking the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into a corresponding risk database according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database; sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result, and synchronizing the data to the risk fingerprint database; carrying out visual display on the updated information in the risk database; the auditing efficiency is improved while the auditing amount of the network violation information is reduced.
Description
Technical Field
The invention relates to the technical field of network information security, in particular to an information content monitoring method and system.
Background
At present, various automatic analysis aiming at various harmful and popular program contents is generally implemented by adopting the following technical measures:
and maintaining a keyword library, namely maintaining a huge keyword library, and detecting the keyword library when the text contains 1:1 keywords in the keyword library.
And directly filtering and intercepting the information aiming at the relevant information embedded in the platform.
Manual detection: the detection report is generated by manually processing the job personnel such as the recruitment content auditor and performing data statistics by manpower with a large amount of time.
Supervision "black list": the supervision system mostly adopts a 'blacklist' mode, and finishes identification by comparing suspected illegal audiovisual content with key frames in a database by establishing a 'harmful program content database'.
However, with the richness of information sources and the convenience of digital technology in the new media era, the contents of various shapes and colors are generated in the internet at all times, and due to the fact that the analysis means is single and the intelligent content auditing technical means are lacked, the problems that the workload of manual auditing is large, the efficiency is low, the discovery and disposal of serious illegal contents are not timely and the like are caused. Therefore, a scheme is needed to improve the network violation content auditing efficiency and reduce the workload of auditors.
Disclosure of Invention
The invention aims to provide an information content monitoring method and an information content monitoring system, which are used for realizing the technical effects of improving the network illegal content auditing efficiency and reducing the workload of an auditor.
In a first aspect, the present invention provides an information content monitoring method, including:
s1, acquiring monitoring service configuration information set by a user;
s2, analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, distributing the acquisition task to a corresponding crawler cluster to acquire data of target network data, and obtaining a corresponding data set;
s3, classifying and auditing the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into a corresponding risk database according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database;
s4, sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result, and synchronizing the data to the risk fingerprint database;
and S5, visually displaying the updated information in the risk database.
Further, the method further comprises:
acquiring specified content uploaded by a user, performing classification checking according to the specified content, and analyzing whether illegal content exists in the specified content;
and if the specified content has the illegal content, storing the illegal content into a corresponding risk fingerprint database, cleaning the data and generating a corresponding audit report.
Further, the specified content at least comprises one of specified intranet data, specified internet content, specified government network data and local data uploaded through the FTP.
Further, the method further comprises: s6, acquiring a data examination request of a user; and S7, displaying the data in the risk database through a data list according to the data examination request.
Further, the method further comprises: s8, acquiring an operation instruction of a user on the data list and processing the data in the data list according to the operation instruction; the operation instructions include at least a screening operation, an export operation, and a sharing operation.
Further, the S3 includes: s31, dividing data in the data set into text data, video data and image data; s32, analyzing whether the text data, the video data and the image data are matched with information in a corresponding risk fingerprint database; and S33, if the text data, the video data and the image data are matched with the information in the corresponding risk fingerprint database, storing the text data, the video data and the image data in the risk fingerprint database, and synchronizing the data in the risk fingerprint database.
Further, the method further comprises: and S34, if the text data, the video data and the image data are not matched with the information in the corresponding risk fingerprint database, analyzing whether illegal contents exist in various types of data or not through a corresponding AI identification model, storing various types of data into the corresponding risk database according to the illegal contents, and synchronizing the data into the risk fingerprint database.
In a second aspect, the present invention further provides an information content monitoring system, including:
the service configuration module is used for acquiring monitoring service configuration information set by a user;
the information acquisition module is used for analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, distributing the acquisition task to a corresponding crawler cluster to acquire data of the target network data and obtain a corresponding data set;
the auditing module is used for performing classified auditing on the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into corresponding risk databases according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database;
the updating module is used for sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result and synchronizing the data to the risk fingerprint database;
and the display module is used for visually displaying the updated information in the risk database.
Further, the system further comprises: the designated content analysis module is used for acquiring designated content uploaded by a user, performing classification checking according to the designated content and analyzing whether illegal content exists in the designated content; and if the specified content has the illegal content, storing the illegal content into a corresponding risk fingerprint database, cleaning the data and generating a corresponding audit report.
The beneficial effects that the invention can realize are as follows: the information content monitoring method and the information content monitoring system provided by the invention have the advantages that the auditing workload of the network violation information is reduced and the auditing efficiency is improved on the basis of accurately indexing and detecting the text contents such as pornography, vulgar, irrigation, commercial advertisements, sensitive character personality and the like and accurately identifying the image contents such as pornography, vulgar, sensitive human face, bloody fishy violence, gun violence, marking flags and the like.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic general flow chart of an information content monitoring method according to an embodiment of the present invention;
fig. 2 is a schematic view of an information collection process according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a classification auditing flow according to an embodiment of the present invention;
fig. 4 is a schematic diagram illustrating a fingerprint database configuration process according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a keyword library configuration flow provided in an embodiment of the present invention;
FIG. 6 is a schematic diagram of a data review process according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a manual review process according to an embodiment of the present invention;
fig. 8 is a schematic view illustrating a review process of specified content according to an embodiment of the present invention;
fig. 9 is a schematic view of a topology structure of an information content monitoring system according to an embodiment of the present invention.
Icon: 10-an information content monitoring system; 100-a service configuration module; 200-an information acquisition module; 300-an audit module; 400-an update module; 500-a display module; 600-specify content analysis module.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
Referring to fig. 1, fig. 2 and fig. 3, fig. 1 is a schematic general flow chart of an information content monitoring method according to an embodiment of the present invention; fig. 2 is a schematic view of an information collection process according to an embodiment of the present invention; fig. 3 is a schematic diagram of a classification auditing process according to an embodiment of the present invention.
In an implementation manner, an embodiment of the present invention provides an information content monitoring method, which is described in detail below.
S1, acquiring monitoring service configuration information set by a user.
As shown in fig. 2, in an embodiment, a user logs in a configured online system, and configures basic service data related to a monitoring service, such as a website, an APP, a microblog, a wechat public number, a special task, and the like, using a monitoring service configuration function in a service configuration module. Wherein, the special task can be used for public opinion monitoring or regional monitoring. The system can acquire the monitoring service configuration information set by the user by acquiring the basic service data.
And S2, analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, distributing the acquisition task to a corresponding crawler cluster to acquire data of the target network data, and acquiring a corresponding data set.
In one embodiment, after the basic service data is configured, the system analyzes the monitoring service configuration information to obtain a corresponding collection task, and then distributes the collection task to a corresponding crawler cluster to collect data of the target network data to obtain a corresponding data set.
S3, classifying and auditing the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into a corresponding risk database according to the violation risks; the risk database includes a risk bank, a risk-free bank and a suspected risk bank.
In one embodiment, after the system acquires the data set, a classification audit can be performed on the data set. Illustratively, S3 may be performed as follows: s31, dividing data in the data set into text data, video data and image data; s32, analyzing whether the text data, the video data and the image data are matched with information in a corresponding risk fingerprint database; s33, if the text data, the video data and the image data are matched with the information in the corresponding risk fingerprint database, storing the text data, the video data and the image data in the risk database, and synchronizing the data in the risk fingerprint database; and S34, if the text data, the video data and the image data are not matched with the information in the corresponding risk fingerprint database, analyzing whether illegal contents exist in various data or not through a corresponding AI identification model, storing various data into the corresponding risk database according to the illegal contents, and synchronizing the data into the risk fingerprint database.
Specifically, as shown in FIG. 3, the data in the data set may be divided into text, video, images, and the like. When classification checking is carried out, various data can be matched with the corresponding risk fingerprint database, and whether the data characteristics of the various data are matched with the risk fingerprint database or not is analyzed (namely whether the acquired image is matched with the image risk fingerprint database or not, whether the acquired text is matched with the text risk fingerprint database or not and whether the acquired video is matched with the video risk fingerprint database or not are analyzed); if the fingerprint database is matched with the risk fingerprint database, the data is stored in the risk database, and meanwhile, the risk data is synchronized to the fingerprint database. If the risk fingerprint database is not matched with the risk fingerprint database, whether the data in the obtained text violate rules or not is analyzed through an AI text recognition model; analyzing whether the obtained image has violation or not through an AI image recognition model; and after the video data is subjected to frame extraction processing, whether the obtained video has violation or not is analyzed through an AI image recognition model. If the violation exists, storing the corresponding data into a risk library; if no violation exists, storing the corresponding data into a risk-free library; and if the rule is suspected to be illegal, storing the corresponding data into a suspected risk library.
Referring to fig. 4, fig. 4 is a schematic view illustrating a fingerprint database configuration process according to an embodiment of the present invention.
As shown in fig. 4, in an embodiment, after the user logs in the set online system, the fingerprint library configuration function in the service configuration module may also be used to configure an image risk fingerprint library, a video risk fingerprint library, and the like. Specifically, the image risk fingerprint library and the video risk fingerprint library respectively comprise a political sensitive fingerprint library, a sensitive figure fingerprint library, a copyright fingerprint library and a user-defined fingerprint library; the user-defined fingerprint database is used for storing user-defined data supplemented by users. A political sensitive fingerprint library, a sensitive figure fingerprint library and a copyright fingerprint library are implanted into a fingerprint library commonly used in the industry at present.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating a keyword library configuration flow according to an embodiment of the present invention.
As shown in fig. 5, in an embodiment, after the user logs in the online system, the keyword library of the AI text recognition model may be configured by using a keyword library configuration function in the service configuration module. Illustratively, the constructed keyword libraries include politically sensitive word libraries, pornographic word libraries, riot word libraries, gambling word libraries, copyright word libraries, custom keyword libraries, and the like. The user-defined keyword library is used for defining keywords to be detected according to actual requirements.
Referring to fig. 6, fig. 6 is a schematic view of a data review process according to an embodiment of the present invention.
As shown in fig. 6, the method further includes: s6, acquiring a data examination request of a user; and S7, displaying the data in the risk database through a data list according to the data examination request.
Further, the system may also perform the steps of: s8, acquiring an operation instruction of a user on the data list and processing data in the data list according to the operation instruction; the operation instructions include at least a screening operation, an export operation, and a sharing operation. In this way, the customer can be facilitated to view the corresponding violation information condition.
And S4, sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result, and synchronizing the data to the risk fingerprint database.
Referring to fig. 7, fig. 7 is a schematic view of a manual review process according to an embodiment of the present invention.
As shown in fig. 7, in an embodiment, after the automatic classification and review, the data may be sent to a manual review system, and then the review is performed manually, and each risk database is updated according to the review result, and the data is synchronized to the risk fingerprint database, so that the risk fingerprint database may be gradually expanded, and the accuracy of identification is improved. In the manual review process, besides the data in the suspected library and the data in the risk library are required to be read for review, the data in the risk-free library can be selectively read for review.
And S5, visually displaying the updated information in the risk database.
In one embodiment, after the information in each risk database is updated, the information can be visually displayed through a display screen, so that a customer can more visually check violation conditions. When the display is performed, the display can be visualized in the form of a drawing, a table, or the like.
Referring to fig. 8, fig. 8 is a schematic view illustrating a review process of specified content according to an embodiment of the present invention.
As shown in fig. 8, in one embodiment, the method further comprises: acquiring specified content uploaded by a user, performing classification checking according to the specified content, and analyzing whether illegal content exists in the specified content; and if the specified content has illegal content, storing the illegal content into each fingerprint database, and generating a corresponding audit report after cleaning the data. The designated content at least comprises one of designated intranet data, designated internet content, designated government network data and local data uploaded through the FTP. Through the mode, the auditing convenience and the auditing efficiency are improved.
Referring to fig. 9, fig. 9 is a schematic view of a topology structure of an information content monitoring system according to an embodiment of the present invention.
In an implementation manner, an embodiment of the present invention further provides an information content monitoring system 10, including:
a service configuration module 100, configured to obtain monitoring service configuration information set by a user;
the information acquisition module 200 is configured to analyze the monitoring service configuration information to obtain a corresponding acquisition task, allocate the acquisition task to a corresponding crawler cluster to perform data acquisition on target network data, and obtain a corresponding data set;
the auditing module 300 is used for performing classified auditing on the data sets through the risk fingerprint database, analyzing violation risks of various data in the data sets, and storing various data into corresponding risk databases according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database;
the updating module 400 is used for sending the data in the suspected risk database to the manual review system for review, updating the risk database according to the review result, and synchronizing the data to the risk fingerprint database;
and a display module 500, configured to visually display the updated information in the risk database.
In addition, the system further comprises a designated content analysis module 600, configured to obtain designated content uploaded by the user, perform classification review according to the designated content, and analyze whether illegal content exists in the designated content; and if the specified content has the illegal content, storing the illegal content into a corresponding risk fingerprint database, cleaning the data and generating a corresponding audit report.
Through the provided system, the user can monitor the violation information according to the method, and the monitoring efficiency is improved.
In summary, the embodiment of the present invention provides a method and a system for monitoring information content, including s1, acquiring monitoring service configuration information set by a user; s2, analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, distributing the acquisition task to a corresponding crawler cluster to acquire data of target network data, and obtaining a corresponding data set; s3, classifying and auditing the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into a corresponding risk database according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database; s4, sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result, and synchronizing the data to the risk fingerprint database; s5, visually displaying the updated information in the risk database; the auditing workload of the network violation information is reduced, and the auditing efficiency is improved.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (9)
1. An information content monitoring method, comprising:
s1, acquiring monitoring service configuration information set by a user;
s2, analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, distributing the acquisition task to a corresponding crawler cluster to acquire data of target network data, and obtaining a corresponding data set;
s3, classifying and auditing the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into a corresponding risk database according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database;
s4, sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result, and synchronizing the data to the risk fingerprint database;
and S5, visually displaying the updated information in the risk database.
2. The method of claim 1, further comprising:
acquiring specified content uploaded by a user, performing classification checking according to the specified content, and analyzing whether illegal content exists in the specified content;
and if the specified content has the illegal content, storing the illegal content into a corresponding risk fingerprint database, cleaning the data and generating a corresponding audit report.
3. The method of claim 2, wherein the specified content comprises at least one of specified intranet data, specified internet content, specified government network data, and local data uploaded via FTP.
4. The method of claim 1, further comprising:
s6, acquiring a data examination request of a user;
and S7, displaying the data in the risk database through a data list according to the data examination request.
5. The method of claim 4, further comprising:
s8, acquiring an operation instruction of a user on the data list and processing the data in the data list according to the operation instruction; the operation instructions include at least a screening operation, an export operation, and a sharing operation.
6. The method according to claim 1, wherein the S3 includes:
s31, dividing data in the data set into text data, video data and image data;
s32, analyzing whether the text data, the video data and the image data are matched with information in a corresponding risk fingerprint database;
and S33, if the text data, the video data and the image data are matched with the information in the corresponding risk fingerprint database, storing the text data, the video data and the image data in the risk fingerprint database, and synchronizing the data in the risk fingerprint database.
7. The method of claim 6, further comprising:
and S34, if the text data, the video data and the image data are not matched with the information in the corresponding risk fingerprint database, analyzing whether illegal contents exist in various types of data or not through a corresponding AI identification model, storing various types of data into the corresponding risk database according to the illegal contents, and synchronizing the data into the risk fingerprint database.
8. An information content monitoring system, comprising:
the service configuration module is used for acquiring monitoring service configuration information set by a user;
the information acquisition module is used for analyzing according to the monitoring service configuration information to obtain a corresponding acquisition task, distributing the acquisition task to a corresponding crawler cluster to acquire data of the target network data and obtain a corresponding data set;
the auditing module is used for performing classified auditing on the data set through a risk fingerprint database, analyzing violation risks of various types of data in the data set, and storing various types of data into corresponding risk databases according to the violation risks; the risk database comprises a risk database, a risk-free database and a suspected risk database;
the updating module is used for sending the data in the suspected risk database to a manual review system for review, updating the risk database according to a review result and synchronizing the data to the risk fingerprint database;
and the display module is used for visually displaying the updated information in the risk database.
9. The system of claim 8, further comprising: the designated content analysis module is used for acquiring designated content uploaded by a user, performing classification checking according to the designated content and analyzing whether illegal content exists in the designated content; and if the specified content has the illegal content, storing the illegal content into a corresponding risk fingerprint database, cleaning the data and generating a corresponding audit report.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110901823.1A CN113360566A (en) | 2021-08-06 | 2021-08-06 | Information content monitoring method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110901823.1A CN113360566A (en) | 2021-08-06 | 2021-08-06 | Information content monitoring method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113360566A true CN113360566A (en) | 2021-09-07 |
Family
ID=77540554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110901823.1A Pending CN113360566A (en) | 2021-08-06 | 2021-08-06 | Information content monitoring method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113360566A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113779250A (en) * | 2021-09-08 | 2021-12-10 | 上海松欣智能科技有限公司 | Standardized text data processing system |
CN114077714A (en) * | 2022-01-07 | 2022-02-22 | 湖南湘生网络信息有限公司 | Universal content auditing and configuring method and system |
CN115907837A (en) * | 2023-02-24 | 2023-04-04 | 山东财经大学 | Futures data analysis and risk prediction method and system based on machine learning |
CN116911924A (en) * | 2023-09-12 | 2023-10-20 | 南京闲侠信息科技有限公司 | Intelligent advertisement data comparison method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105022835A (en) * | 2015-08-14 | 2015-11-04 | 武汉大学 | Public safety recognition method and system for crowd sensing big data |
CN106372057A (en) * | 2016-08-25 | 2017-02-01 | 乐视控股(北京)有限公司 | Content auditing method and apparatus |
CN107612893A (en) * | 2017-09-01 | 2018-01-19 | 北京百悟科技有限公司 | The auditing system and method and structure short message examination & verification model method of short message |
CN108228072A (en) * | 2018-01-03 | 2018-06-29 | 妫汭智能科技(上海)有限公司 | Quantum Teleportation cloud intelligent interaction show window stream matchmaker manages system and method |
CN110837615A (en) * | 2019-11-05 | 2020-02-25 | 福建省趋普物联科技有限公司 | Artificial intelligent checking system for advertisement content information filtering |
CN112836160A (en) * | 2021-01-29 | 2021-05-25 | 世纪龙信息网络有限责任公司 | Content auditing method, device and equipment |
-
2021
- 2021-08-06 CN CN202110901823.1A patent/CN113360566A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105022835A (en) * | 2015-08-14 | 2015-11-04 | 武汉大学 | Public safety recognition method and system for crowd sensing big data |
CN106372057A (en) * | 2016-08-25 | 2017-02-01 | 乐视控股(北京)有限公司 | Content auditing method and apparatus |
CN107612893A (en) * | 2017-09-01 | 2018-01-19 | 北京百悟科技有限公司 | The auditing system and method and structure short message examination & verification model method of short message |
CN108228072A (en) * | 2018-01-03 | 2018-06-29 | 妫汭智能科技(上海)有限公司 | Quantum Teleportation cloud intelligent interaction show window stream matchmaker manages system and method |
CN110837615A (en) * | 2019-11-05 | 2020-02-25 | 福建省趋普物联科技有限公司 | Artificial intelligent checking system for advertisement content information filtering |
CN112836160A (en) * | 2021-01-29 | 2021-05-25 | 世纪龙信息网络有限责任公司 | Content auditing method, device and equipment |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113779250A (en) * | 2021-09-08 | 2021-12-10 | 上海松欣智能科技有限公司 | Standardized text data processing system |
CN114077714A (en) * | 2022-01-07 | 2022-02-22 | 湖南湘生网络信息有限公司 | Universal content auditing and configuring method and system |
CN115907837A (en) * | 2023-02-24 | 2023-04-04 | 山东财经大学 | Futures data analysis and risk prediction method and system based on machine learning |
CN116911924A (en) * | 2023-09-12 | 2023-10-20 | 南京闲侠信息科技有限公司 | Intelligent advertisement data comparison method and system |
CN116911924B (en) * | 2023-09-12 | 2023-11-21 | 南京闲侠信息科技有限公司 | Intelligent advertisement data comparison method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113360566A (en) | Information content monitoring method and system | |
CN107566376B (en) | Threat information generation method, device and system | |
CN101751535B (en) | Data loss protection through application data access classification | |
CN111832017A (en) | Cloud-oriented database security situation sensing system | |
US20060074621A1 (en) | Apparatus and method for prioritized grouping of data representing events | |
CN112491779B (en) | Abnormal behavior detection method and device and electronic equipment | |
CN107733902A (en) | A kind of monitoring method and device of target data diffusion process | |
CN109492604A (en) | Faceform's characteristic statistics analysis system | |
CN112445870B (en) | Knowledge graph string parallel case analysis method based on mobile phone evidence obtaining electronic data | |
CN109558792A (en) | Method and system for detecting Internet logo content based on samples and features | |
KR102124935B1 (en) | Disaster Monitoring System, Method Using Crowd Sourcing, and Computer Program therefor | |
CN108270637B (en) | Website quality multi-layer drilling system and method | |
CN111274218A (en) | Multi-source log data processing method for power information system | |
CN114692593A (en) | Network information safety monitoring and early warning method | |
KR102365429B1 (en) | Online mobile survey platform using artificial intelligence to identify unfaithful respondents | |
CN111858924A (en) | System with network public opinion monitoring and analyzing functions | |
CN113971207A (en) | Document association method and device, electronic equipment and storage medium | |
CN110225009A (en) | It is a kind of that user's detection method is acted on behalf of based on communication behavior portrait | |
CN110163013A (en) | A kind of method and apparatus detecting sensitive information | |
CN113015171A (en) | System with network public opinion monitoring and analyzing functions | |
Memon et al. | Harvesting covert networks: a case study of the iMiner database | |
CN112822210A (en) | Vulnerability management system based on network assets | |
WO2017179778A1 (en) | Search method and apparatus using big data | |
Hubmann-Haidvogel et al. | Visualizing contextual and dynamic features of micropost streams | |
CN111782908A (en) | WEB violation operation behavior detection method based on data mining cluster analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210907 |
|
RJ01 | Rejection of invention patent application after publication |