CN113704638A - Method and equipment for identifying presentation information in social group chat - Google Patents

Method and equipment for identifying presentation information in social group chat Download PDF

Info

Publication number
CN113704638A
CN113704638A CN202111014018.3A CN202111014018A CN113704638A CN 113704638 A CN113704638 A CN 113704638A CN 202111014018 A CN202111014018 A CN 202111014018A CN 113704638 A CN113704638 A CN 113704638A
Authority
CN
China
Prior art keywords
information
communication information
social
user
group chat
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111014018.3A
Other languages
Chinese (zh)
Inventor
陆寅辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lianshang Beijing Network Technology Co ltd
Original Assignee
Lianshang Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lianshang Beijing Network Technology Co ltd filed Critical Lianshang Beijing Network Technology Co ltd
Priority to CN202111014018.3A priority Critical patent/CN113704638A/en
Publication of CN113704638A publication Critical patent/CN113704638A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9538Presentation of query results
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application aims to provide a method and equipment for identifying presence information in social group chat, and the method and equipment specifically comprise the following steps: receiving communication information uploaded by user equipment of a social user in social group chat; performing target presentation information detection on the communication information, and judging whether the communication information contains target presentation information; and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state. The method and the device can realize temporary interception of the presentation information, purify the chat environment of social group chat, and meanwhile have a certain warning effect on the social users who issue the communication information, thereby improving the chat experience of other social users in the social group chat.

Description

Method and equipment for identifying presentation information in social group chat
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for identifying presence information in social group chat.
Background
With the popularization and promotion of smart phones, people increasingly rely on online social group chat to communicate. The social group chat provides a platform for multi-user chat and communication, and each user can quickly communicate in the group chat through a network, such as sending voice, video, pictures, characters or links. Social group chat compares with traditional many people offline communication, and is more convenient, has promoted the interactive frequency between the user, is favorable to the diffusion and the popularization of information etc. simultaneously. Many merchants maintain communication with customers by creating their social group chats, but some people may publish presence information, such as advertisement information, which is irrelevant to the group, in the social group chats, which destroys the chat environment of the social group chats and is not beneficial to the friendly and harmonious long-term development of the social group chats.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for identifying presence information in social group chat.
According to an aspect of the present application, there is provided a method of identifying presence information in a social group chat, the method comprising:
receiving communication information uploaded by user equipment of a social user in social group chat;
performing target presentation information detection on the communication information, and judging whether the communication information contains target presentation information;
and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
According to an aspect of the present application, there is provided a method for identifying presence information in social group chat, applied to a first user equipment, wherein the method comprises:
the method comprises the steps of obtaining communication information to be published, input by a social user in social group chat;
and uploading the communication information to corresponding network equipment to perform target presentation information detection on the communication information and judge whether the communication information contains target presentation information.
According to another aspect of the present application, there is provided a method for identifying presence information in social group chat, applied to a second user equipment, wherein the method includes:
the method comprises the steps of obtaining communication information to be published, input by a social user in social group chat;
and sending the communication information to detection equipment in the social group chat through corresponding network equipment, executing target presentation information detection on the communication information through the detection equipment, and judging whether the communication information contains target presentation information.
According to an aspect of the present application, there is provided a method of identifying presence information in a social group chat, the method comprising:
the method comprises the steps that first user equipment obtains communication information to be published, input by a social user in social group chat;
uploading the communication information to corresponding network equipment;
the network equipment receives the communication information, performs target presentation information detection on the communication information and judges whether the communication information contains target presentation information; and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
According to another aspect of the present application, there is provided a method of identifying presence information in a social group chat, the method comprising:
the method comprises the steps of obtaining communication information to be published, input by a social user in social group chat;
sending the communication information to a detection device in the social group chat via a corresponding network device;
the detection equipment receives the communication information sent by user equipment of a social user in social group chat via the network equipment, performs target presentation information detection on the communication information, and judges whether the communication information contains target presentation information; and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
According to an aspect of the present application, there is provided an apparatus for identifying presence information in a social group chat, the apparatus comprising:
the one-to-one module is used for receiving communication information uploaded by user equipment of a social user in social group chat;
the first module and the second module are used for executing target presentation information detection on the communication information and judging whether the communication information contains target presentation information or not;
and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
According to an aspect of the present application, there is provided a first user device for identifying presence information in a social group chat, the device comprising:
the social group chat system comprises a first module and a second module, wherein the first module is used for acquiring communication information to be published input by a social user in a social group chat;
and the second module is used for uploading the communication information to corresponding network equipment so as to execute target presentation information detection on the communication information and judge whether the communication information contains target presentation information.
According to another aspect of the present application, there is provided a second user device for identifying presence information in a social group chat, the device including:
the third module is used for acquiring communication information to be published, which is input by the social user in the social group chat;
a third and a second modules, configured to send the communication information to a detection device in the social group chat via a corresponding network device, perform target presence information detection on the communication information through the detection device, and determine whether the communication information includes target presence information,
according to an aspect of the present application, there is provided a computer apparatus, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods described above.
Compared with the prior art, the target presentation information detection is carried out on the communication information uploaded by the social users in the social group chat, and the communication information containing the target presentation information is identified and determined as illegal communication information, so that the temporary interception of the target presentation information is realized, the chat environment of the social group chat is purified, meanwhile, a certain warning effect is provided for the social users who issue the communication information, and the chat experience of other social users in the social group chat is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method of identifying presence information in a social group chat in accordance with one embodiment of the present application;
FIG. 2 is a flow diagram illustrating a method of identifying presence information in a social group chat in accordance with another embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method of identifying presence information in a social group chat in accordance with yet another embodiment of the present application;
FIG. 4 illustrates functional modules of a presence information identification device according to one embodiment of the present application;
FIG. 5 illustrates functional modules of a first user device according to another embodiment of the present application;
fig. 6 shows a functional block of a second user equipment according to yet another embodiment of the present application;
FIG. 7 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
The application provides a method for identifying presence information in social group chat, which is mainly applied to computer equipment, wherein the computer equipment comprises a corresponding communication device, a communication device and a display device, wherein the corresponding communication device is used for establishing communication connection with other equipment and receiving or sending communication data, for example, receiving communication information sent by other equipment, and the communication information is uploaded by user equipment of a social user; the communication information may be sent to the computer device directly by the social user, and may also be forwarded to the computer device by a server corresponding to the social application, in other words, the computer device includes but is not limited to a user device, a network device, and the like. The computer device further comprises data processing means for data storing, processing, etc. the communication information to identify the communication information comprising the target presence information. The computer device includes but is not limited to a user device, a network device, a combination of the two, and the like; the user equipment includes, but is not limited to, any mobile electronic product capable of human-computer interaction with a user (e.g., human-computer interaction through a touch panel); the network device includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud of multiple servers. The computer device referred to in the present application may be a network device corresponding to the social application, and may also be a third-party device in communication connection with the network device of the social application, such as a third-party network device.
Fig. 1 illustrates a method for identifying presence information in social group chat, applied to a computer device, according to an aspect of the present application, including step S101, step S102, and step S103. In step S101, receiving communication information uploaded by a user device of a social user in a social group chat; in step S102, performing target presence information detection on the communication information, and determining whether the communication information includes target presence information; in step S103, if yes, the communication information is determined as the illegal communication information, where the illegal communication information is in a release pending state.
Specifically, in step S101, communication information uploaded by a user device of a social user in a social group chat is received. For example, a plurality of social users establish a corresponding social group chat based on a group establishment application of one of the social users, and other social users may send a group adding application to a management user of the social group chat (such as the group establishment user or other social users who manage the group chat) to join the social group chat. The user equipment can generate corresponding communication information to be published based on input operation of the social user on a page corresponding to the social group chat. The user equipment uploads the communication information to the computer equipment, such as directly uploading to a social application server, or forwarding to a third-party server or other detection equipment through the social application server. In some cases, the communication information may be communication information already posted in the group chat, information to be posted uploaded to the server that is not posted to the social group chat temporarily, and the like.
In step S102, target presence information detection is performed on the communication information, and whether the communication information includes target presence information is determined. For example, the target presence information generally refers to the relevant information that a user can obtain a target product or a corresponding link by reading the presence information. To a large extent, the presence information in the social group chat may interfere with communication between users in the social group chat, and further cause the users to conflict with the group chat environment, thereby causing the possibility of people loss in the social group chat. In some embodiments, the target presentation information typically includes identification information, contact information, etc. of third party products or links, such as names of advertising information, phone numbers, web page links, etc. The target presentation information includes, but is not limited to, one or more combinations in the form of text, voice, video, or access links. The computer equipment can perform character recognition, voice recognition, picture feature recognition and the like on the communication information to acquire character or picture features of the communication information, judge whether the key characters or the picture features are similar to the key characters or the picture features of the target presentation information or not based on the key characters or the picture features of the corresponding characters, and determine that the communication information comprises the target presentation information if the key characters or the picture features are similar to the key characters or the picture features of the target presentation information. Keywords of the target presentation information include, but are not limited to, identification information, contact information, and the like of the target presentation information; the corresponding picture feature information includes, but is not limited to, related feature information of the product in the target presentation information, and the like.
In step S103, if yes, the communication information is determined as the illegal communication information, where the illegal communication information is in a release pending state. For example, if the communication information is detected to be determined as the illegal communication information, the illegal communication information is determined as the release pending state. If the communication information is added with the corresponding violation identification or stored in the specific storage space, the communication information is determined to be the violation communication information, if the communication information is in the undistributed state, the communication information is intercepted and the violation communication information is kept in the release pending state, or if the communication information is in the released state, the communication information is withdrawn and the state of the communication information is adjusted from the release pending state to the release pending state.
In some embodiments, the illegal communication information is stored in a corresponding social group chat buffer, which is accessible to a management user of the social group chat. For example, if it is detected that the communication information includes presence information, the communication information is stored in a social group chat buffer. Here, each social group chat is provided with a social group chat buffer, and the social group chat buffer is used for storing illegal communication information including advertisement information, and a manager corresponding to the social group chat can access the social group chat buffer. In some cases, the manager of the social group chat may perform a relevant auditing operation on the communication information in the buffer of the social group chat, such as disabling or deleting the communication information, or determining that the communication information is not violated, posting the communication information to the social group chat, and the like.
In some embodiments, the method further comprises a step S104 (not shown), in which step S104, an access request of the management device of the manager with respect to the social group chat buffer is received; sending the violation communication information to the management device in response to the access request; receiving review confirmation information which is returned by the management equipment and is related to the illegal communication information, wherein the review confirmation information comprises illegal confirmation information which is related to that the illegal communication information contains presentation information; removing the illegal communication information based on the review confirmation information. For example, the management device of the administrator includes a user device of the administrator, and the administrator can manage, through a social application installed on the management device, related social users, communication information, and the like of the social group chat, such as performing an audit of adding a group to the social users, banning the social users or removing the group chat from the social users, and the like, and also such as withdrawing, deleting or removing the communication information or reviewing illegal communication information. The management personnel can click to access the social group chat buffer area on a page related to the social application, so that an access request about the social group chat buffer area is sent to the computer equipment through the management equipment; the computer device returns the violation communication information temporarily stored in the social group chat buffer to the management device in response to the access request. The method comprises the steps that the management equipment receives and presents illegal communication information identified by the computer equipment, and based on the re-examination operation of a manager on the illegal communication information, re-examination related information about the illegal communication information is generated, wherein the re-examination related information comprises re-examination confirmation information and re-examination denial information; if the management equipment receives violation confirmation operation of the administrator on the violation communication information, generating corresponding review confirmation information based on the violation confirmation operation; correspondingly, if the management device receives the violation approval of the administrator on the violation communication information, the corresponding review denial information is generated based on the violation denial operation. The management device sends the corresponding review confirmation information to the computer device, and the computer device performs further operation on the communication information, such as removing the corresponding illegal communication information, wherein the removing the communication information comprises removing the illegal communication information from the social group chat buffer and not distributing the illegal communication information. Or the management device sends the corresponding review denial information to the computer device, so that the computer device can further operate the illegal communication information, for example, the illegal communication information is changed into non-illegal communication information and is published to the social group chat.
In some embodiments, the removing the violation communication information based on the review confirmation information further comprises: and performing violation punishment on the social user based on the review confirmation information. For example, a social user has a certain relevance to communication information posted by the social user, so as to play a certain warning role for the social user who posts the presence information, for example, if the communication information is disabled, the computer device simultaneously performs corresponding violation penalties for the social user who posts the communication information, such as forbidding, marking, adding a blacklist or removing a group chat.
In some embodiments, the violation penalties include, but are not limited to, a combination of one or more of the following: forbidding speaking for a preset time; reducing user scoring information for the social user; marking the number of violations of the social user; adding the social user to a blacklist of the social group chat; removing the social user from the social group chat; adding the social user to a group chat blacklist of a social application. For example, based on a default setting of the social application or a setting of a manager of the social group chat, if some communication information is disabled, the social user corresponding to the communication information is disabled in the social group chat at the same time, for example, a predetermined duration is disabled, and the predetermined duration may be an average value obtained through statistics of big data or a duration input by the manager of the social group chat.
For another example, each social user is provided with user rating information bound to the social user, where the user rating information is used to represent the reasonable degree of communication information posted by the user, and if the frequency of posting communication information including presence information in a plurality of social group chats by the social user is higher, the degree of interference of the social user to the chat environment of other social users is higher, the posting rationality of the corresponding communication information is worse, and the user rating information of the social user is lower accordingly. If the computer equipment determines that the communication information published by the social contact user contains the presentation information through the review confirmation information of the manager, the computer equipment reduces the user rating information of the social contact user, and is used for reminding other social contact users in communication with the social contact user to carefully communicate with the social contact user and the like.
For another example, the computer device may directly add the social user to a group chat blacklist of the social application, and when the social user applies for group adding in the social application, the group adding application of the social user may be directly rejected, so as to prevent the social user from publishing target presentation information in more group chats to cause adverse effects and the like.
For another example, each social user marks the number of times of corresponding publishing of the illegal communication information or the number of times of publishing of the illegal communication information within a predetermined certain time (for example, a last month) to determine the corresponding number of times of violation, so that when the social user joins in social group chat or communicates with other social users, the number of times of violation of the social user is presented to remind the other social users communicating with the social user to communicate with the social user cautiously, and the like.
For example, the computer device may directly add or remove the social user who posts the illegal communication information to a blacklist of the social group chat according to the review confirmation information, for example, the social user no longer receives the group adding application of the social user after the social group chat is removed, or directly rejects the group adding application of the social user.
In some embodiments, the violation penalty comprises reducing user scoring information of the social user; the method further includes step S105 (not shown), in step S105, if a group adding application of a new social user about the social group chat is received, where the group adding application includes user rating information of the new social user; and if the user scoring information is smaller than or equal to a user scoring threshold value, rejecting the group adding application of the new social user. For example, each social user is provided with user rating information bound with the social user, and the higher the user rating information is, the lower the frequency of the corresponding social user publishing the illegal communication information is. If the computer device receives a group adding application for newly applying for adding to the social group chat, it may be determined whether to allow the newly applying social user to add to the social group chat according to the user rating information, for example, if the user rating information of the newly applying social user is less than or equal to a user rating threshold, the group adding application of the new social user is directly rejected, where the user rating threshold may be a numerical value set by default by the computer device, or may also be minimum rating information of an entering group of the social group chat set by an administrator of the social group chat through an operation input by the management device. In some cases, if the user score information is greater than the user score threshold, the new application social user may be directly allowed to directly join the social group chat, or the group adding application may be forwarded to a management device of a manager, so that the manager may check whether the new social user's group adding application is approved or not, and the like.
In some implementations, the violation penalty includes adding the social user to a blacklist of the social group chat or adding the social user to a group chat blacklist of a social application; the method further includes step S106 (not shown), and in step S106, if a group adding application of the social user about the social group chat is received, corresponding group adding rejection information is returned to the social user. For example, after a certain social user posts illegal communication information containing target presentation information, the social user is added to a group chat blacklist of a social application or a blacklist of the social group chat by a social server. When the computer device receives a group adding application for newly applying to add to the social group chat, the computer device may directly reject the group adding application of the new social user and return group adding rejection information to the social user, for example, if the user is added to the social group chat blacklist or the social group chat blacklist, and the like.
In some embodiments, the communication information comprises published communication information; in step S103, the communication information is withdrawn, the communication information is determined as the illegal communication information, and the illegal communication information is changed from the published state to the publication pending state. For example, the communication information when the computer device detects presence information includes communication information published in the social group chat, and if the communication information is detected to contain presence information, the communication information is withdrawn and stored in a buffer of the social group chat, and the communication information is changed from a published state to a published pending state for a manager to perform further manual review operation on the communication information.
In some embodiments, the method further includes step S107 (not shown), in step S107, receiving review denial information about the communication information, which is sent by the management device of the management user, wherein the review denial information includes violation denial information that the violation communication information includes target presentation information; and changing the illegal communication information into confirmation communication information and re-issuing the illegal communication information to the social group chat. For example, if the administrator confirms that the communication information is recognized as a faulty operation after manual review, in other words, the communication information does not include the target presentation information, the management apparatus transmits review denial information regarding the communication information to the computer apparatus based on the review denial operation of the administrator. The computer device re-publishes the communication information to the social group chat based on the review denial information, such as re-publishing the communication information to the social group chat in a form of a latest message or recovering the communication information at an original publishing time point or publishing position of the communication information.
In some embodiments, the communication information includes communication information to be issued, wherein in step S103, the communication information is intercepted, the communication information is determined to be illegal communication information, and the illegal communication information is maintained in an issuance pending state. For example, the communication information detected by the computer device when the presence information is detected includes communication information to be published which is not published to the social group chat. The process of issuing the communication information to the social group chat is essentially a process of forwarding the communication information to other user devices of other social users through the social application server, and the process of detecting the presence information of the scheme occurs before forwarding the communication information to other social users. If the communication information contains the presentation information, the communication information is temporarily intercepted and stored in a social group chat buffer area, the illegal communication information is maintained in a publishing pending state, the communication information is prevented from being published to a chat environment where social group chat is interfered, and the chat experience of other social users is reduced.
In some embodiments, the method further includes step S108 (not shown), in step S108, if the communication information does not include target presence information, or review denial information about the communication information sent by the management device of the administrator is received, where the review denial information includes violation denial information that the communication information includes target presence information; and publishing the communication information to social group chat. For example, if the computer device detects presence information of communication information to be posted and confirms that the communication information does not include target presence information, the computer device posts the communication information to the social group chat. Or after the computer device detects the presence information of the communication information to be issued by the computer device, the computer device determines that the communication information contains the target presence information, and then the computer device temporarily intercepts and stores the communication information into a social group chat buffer area; and if the manager manually reviews the communication information in the social group chat buffer area and confirms that the communication information does not contain the target presentation information, uploading corresponding violation denial information to the computer equipment, and after receiving the corresponding violation denial information, the computer equipment issues the communication information to the social group chat.
In some embodiments, the method further comprises step S109 (not shown), in step S109, obtaining a plurality of sample presentation information and a corresponding plurality of sample features; determining a corresponding target presentation information identification model according to the plurality of sample presentation information and the plurality of sample characteristic input identification models; in step S102, the communication information is input into the target presence information recognition model, and whether the communication information includes target presence information is determined. For example, the computer device establishes a corresponding target presentation information identification model according to big data artificial intelligence, for example, the computer device calls another server or obtains a plurality of sample presentation information (such as advertisement samples) from a network by using a crawler, obtains keywords or key picture features of the advertisement samples, establishes a corresponding key feature set, and then inputs the advertisement samples, the key feature set and the like into a corresponding pre-trained model, thereby obtaining a corresponding target presentation information identification model. In some cases, the target presentation information identification model can further expand the corresponding advertisement sample and the key feature set according to the presentation information of which the matched similarity meets a certain threshold in the subsequent matching process, so that the accuracy and precision of the target presentation information identification model are improved. According to the scheme, the computer equipment can input the communication information into the target presentation information identification model so as to determine the matching degree of the communication information and the target presentation information, and if the matching degree is greater than or equal to the threshold value of the matching degree, the communication information is confirmed to contain the target presentation information.
In some embodiments, the tags of the social group chat include corresponding franchise tags; wherein the determining the communication information as the illegal communication information comprises: detecting whether the presentation characteristics corresponding to the communication information are matched with the authorization label; if not, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state. For example, a privilege tag is set in the social group chat, and the privilege tag is the same as or similar to a part of sample characteristics in the target presence information identification model, for example, the privilege tag is used for representing a privilege publishing authority of part of the presence information in the social group chat, which contains the characteristics corresponding to the privilege tag. After the computer device detects the presence information of the communication information, if the communication information is detected to contain the presence information, whether the presence information is the presence information containing the authorization tag needs to be further excluded; the computer equipment matches the key features of the presentation information with the authorization tags of the social group chat, confirms the similarity degree of the key features and the authorization tags, if the corresponding similarity degree is larger than or equal to a similarity degree threshold value, determines that the presentation information contained in the communication information is advertisement information and the like corresponding to the authorization tags, and publishes the communication information to the social group chat; and if the corresponding similarity is smaller than the similarity threshold, determining that the presentation information contained in the communication information does not contain the authorized tag, determining the presentation information as illegal communication information, intercepting or withdrawing the illegal communication information, and the like. In some embodiments, the administrative user of the social group chat includes a merchant user, and the authorization tag includes a business tag corresponding to the merchant user. For example, the corresponding social group chat includes a social group chat established or managed by a merchant user, in other words, the managing user of the social group chat is a merchant user who can post a merchant product or a store-related advertisement in the social group chat to provide a better consumption experience for the social user in the social group chat. For example, the merchant user may set a plurality of authorization tags, or after the computer device identifies the manager of the social group chat as the merchant user, determine a commercial identifier (e.g., a product name, a contact address, etc.) of the merchant user as the authorization tag of the merchant user. After the computer device detects the presence information of the communication information, if the communication information is detected to contain the presence information, whether the presence information is advertisement information issued by a merchant or not needs to be further excluded; the computer equipment matches the key features of the presentation information with the authorization tags of the merchants, confirms the similarity degree of the key features and the authorization tags, and if the corresponding similarity degree is larger than or equal to a similarity degree threshold value, determines that the presentation information contained in the communication information is advertisement information issued by the merchants, and issues the advertisement information to the social group chat, so that the consumption experience of the merchants related to the social users in the social group chat is guaranteed.
Fig. 2 illustrates a method for identifying presence information in social group chat, applied to a first user equipment, according to another aspect of the present application, the method including steps S201 and S202. In step S201, a first user device obtains communication information to be published, which is input by a social user in a social group chat; in step S202, the first user equipment uploads the communication information to a corresponding network device, so as to perform target presence information detection on the communication information, and determine whether the communication information includes target presence information. For example, a plurality of social users establish a corresponding social group chat based on a group establishment application of one of the social users, and other social users may send a group adding application to a management user of the social group chat (such as the group establishment user or other social users who manage the group chat) to join the social group chat. The social user holds corresponding first user equipment, the first user equipment is provided with a social application corresponding to the social group chat, and the user equipment can generate corresponding communication information to be published based on input operation of the social user on a page corresponding to the social group chat. The user device uploads the communication information to the computer device, such as directly to a social application server. In some cases, the communication information may be communication information already posted in the group chat, information to be posted uploaded to the server that is not posted to the social group chat temporarily, and the like. The target presentation information generally means that a user can obtain related information of a target product or a corresponding link by reading the presentation information. To a large extent, the presence information in the social group chat may interfere with communication between users in the social group chat, and further cause the users to conflict with the group chat environment, thereby causing the possibility of people loss in the social group chat. In some embodiments, the target presentation information typically includes identification information, contact information, etc. of third party products or links, such as names of advertising information, phone numbers, web page links, etc. The target presentation information includes, but is not limited to, one or more combinations in the form of text, voice, video, or access links. The computer equipment can perform character recognition, voice recognition, picture feature recognition and the like on the communication information to acquire character or picture features of the communication information, judge whether the key characters or the picture features are similar to the key characters or the picture features of the target presentation information or not based on the key characters or the picture features of the corresponding characters, and determine that the communication information comprises the target presentation information if the key characters or the picture features are similar to the key characters or the picture features of the target presentation information. Keywords of the target presentation information include, but are not limited to, identification information, contact information, and the like of the target presentation information; the corresponding picture feature information includes, but is not limited to, related feature information of the product in the target presentation information, and the like. And if the communication information is detected to be the illegal communication information, determining the illegal communication information as the release pending state. If the communication information is added with the corresponding violation identification or stored in the specific storage space, the communication information is determined to be the violation communication information, if the communication information is in the undistributed state, the communication information is intercepted and the violation communication information is kept in the release pending state, or if the communication information is in the released state, the communication information is withdrawn and the state of the communication information is adjusted from the release pending state to the release pending state.
Fig. 3 shows a method for identifying presence information in social group chat, applied to a second user equipment, according to yet another aspect of the present application, the method including steps S301 and S302. In step S301, communication information to be posted, which is input by a social user in a social group chat, is acquired; in step S302, the communication information is sent to a detection device in the social group chat via a corresponding network device, and target presence information detection is performed on the communication information by the detection device, so as to determine whether the communication information includes target presence information. For example, a plurality of social users establish a corresponding social group chat based on a group establishment application of one of the social users, and other social users may send a group adding application to a management user of the social group chat (such as the group establishment user or other social users who manage the group chat) to join the social group chat. The user equipment can generate corresponding communication information to be published based on input operation of the social user on a page corresponding to the social group chat. The user equipment uploads the communication information to the computer equipment, such as to be forwarded to a third-party detection server or other detection equipment through the social application server. In some cases, the communication information may be communication information already posted in the group chat, information to be posted uploaded to the server that is not posted to the social group chat temporarily, and the like. The target presentation information generally means that a user can obtain related information of a target product or a corresponding link by reading the presentation information. To a large extent, the presence information in the social group chat may interfere with communication between users in the social group chat, and further cause the users to conflict with the group chat environment, thereby causing the possibility of people loss in the social group chat. In some embodiments, the target presentation information typically includes identification information, contact information, etc. of third party products or links, such as names of advertising information, phone numbers, web page links, etc. The target presentation information includes, but is not limited to, one or more combinations in the form of text, voice, video, or access links. The detection device can perform character recognition, voice recognition, picture feature recognition and the like on the communication information to acquire character or picture features of the communication information, judge whether the character or picture features are similar to the character or picture features of the target presentation information or not based on the keyword or picture features of the corresponding characters, and determine that the communication information comprises the target presentation information if the character or picture features are similar to the character or picture features of the target presentation information. Keywords of the target presentation information include, but are not limited to, identification information, contact information, and the like of the target presentation information; the corresponding picture feature information includes, but is not limited to, related feature information of the product in the target presentation information, and the like. And if the communication information is detected to be the illegal communication information, determining the illegal communication information as the release pending state. If the communication information is added with the corresponding violation identification or stored in the specific storage space, the communication information is determined to be the violation communication information, if the communication information is in the undistributed state, the communication information is intercepted and the violation communication information is kept in the release pending state, or if the communication information is in the released state, the communication information is withdrawn and the state of the communication information is adjusted from the release pending state to the release pending state.
According to an aspect of the present application, there is provided a method of identifying presence information in a social group chat, the method comprising:
the method comprises the steps that first user equipment obtains communication information to be published, input by a social user in social group chat;
uploading the communication information to corresponding network equipment;
the network equipment receives the communication information, performs target presentation information detection on the communication information and judges whether the communication information contains target presentation information; and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
According to another aspect of the present application, there is provided a method of identifying presence information in a social group chat, the method comprising:
the method comprises the steps of obtaining communication information to be published, input by a social user in social group chat;
sending the communication information to a detection device in the social group chat via a corresponding network device;
the detection equipment receives the communication information sent by user equipment of a social user in social group chat via the network equipment, performs target presentation information detection on the communication information, and judges whether the communication information contains target presentation information; and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
Embodiments of a method for identifying presence information in social group chat according to the present application are mainly described above, and further, specific devices capable of implementing the embodiments are provided, and the following description is provided with reference to fig. 4 to 6.
Fig. 4 shows a device for identifying presence information in social group chat, also referred to as presence information identification device 100, according to an aspect of the present application, comprising a one-module 101, a two-module 102, and a three-module 103. A one-to-one module 101, configured to receive communication information uploaded by user equipment of a social user in social group chat; a second module 102, configured to perform target presence information detection on the communication information, and determine whether the communication information includes target presence information; and a third module 103, if yes, determining the communication information as the illegal communication information, wherein the illegal communication information is in a release pending state. In some embodiments, the illegal communication information is stored in a corresponding social group chat buffer, the social group chat buffer being accessible to an administrative user of the social group chat,
here, the specific implementation of the one-to-one module 101, the two-to-two module 102, and the one-to-three module 103 shown in fig. 4 is the same as or similar to the embodiment of the step S101, the step S102, and the step S103 shown in fig. 1, and therefore, the detailed description is omitted, and the detailed implementation is included herein by reference.
In some embodiments, the device further comprises a fourth module (not shown) for receiving an access request of the management device of the manager with respect to the social group chat buffer; sending the violation communication information to the management device in response to the access request; receiving review confirmation information which is returned by the management equipment and is related to the communication information, wherein the review confirmation information comprises violation confirmation information which is related to that the violation communication information contains presentation information; removing the illegal communication information based on the review confirmation information. In some embodiments, the removing the violation communication information based on the review confirmation information further comprises: and performing violation punishment on the social user based on the review confirmation information. In some embodiments, the violation penalties include, but are not limited to, a combination of one or more of the following: forbidding speaking for a preset time; reducing user scoring information for the social user; marking the number of violations of the social user; adding the social user to a blacklist of the social group chat; removing the social user from the social group chat; adding the social user to a group chat blacklist of a social application.
In some embodiments, the violation penalty comprises reducing user scoring information of the social user; the device further comprises a fifth module (not shown), and if a group adding application of a new social user about the social group chat is received, the group adding application comprises user scoring information of the new social user; and if the user scoring information is less than or equal to a user scoring threshold value, rejecting the group adding application of the new social user. In some implementations, the violation penalty includes adding the social user to a blacklist of the social group chat or adding the social user to a group chat blacklist of a social application; the device further includes a sixth module (not shown) configured to, if a group adding request of the social user about the social group chat is received, return corresponding group adding rejection information to the social user.
In some embodiments, the communication information comprises published communication information; and the third module 103 is used for withdrawing the communication information, determining the communication information as the illegal communication information, and changing the illegal communication information from the published state to the published pending state. In some embodiments, the apparatus further includes a seventh module (not shown) configured to receive review denial information regarding the communication information sent by the management apparatus of the management user, wherein the review denial information includes violation denial information regarding that the violation communication information includes target presence information; and changing the illegal communication information into confirmation communication information and re-issuing the illegal communication information to the social group chat.
In some embodiments, the communication information includes communication information to be published, where a third module 103 is configured to intercept the communication information, determine the communication information as illegal communication information, and maintain the illegal communication information in a state pending for publication. In some embodiments, the apparatus further includes an eight module (not shown), if the communication information does not include target presence information, or receives review denial information about the communication information sent by the management apparatus of the administrator, where the review denial information includes violation denial information that the communication information includes target presence information; the communication information is published to social group chat.
In some embodiments, the apparatus further comprises a nine module (not shown) for obtaining a plurality of sample presentation information and a corresponding plurality of sample features; determining a corresponding presentation information identification model according to the plurality of sample presentation information and the plurality of sample characteristic input identification models; the second module 102 is configured to input the communication information into the target presentation information identification model, and determine whether the communication information includes target presentation information. In some embodiments, the tags of the social group chat include corresponding franchise tags; wherein the determining the communication information as the illegal communication information comprises: detecting whether the presentation characteristics corresponding to the communication information are matched with the authorization label; if not, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state. In some embodiments, the administrative user of the social group chat includes a merchant user, and the authorization tag includes a business tag corresponding to the merchant user.
Here, the specific implementation of the four-module to the nine-module is the same as or similar to the embodiment of steps S104 to S109 shown in fig. 1, and thus is not repeated here, and is included herein by way of reference.
Fig. 5 illustrates a first user device for identifying presence information in a social group chat according to another aspect of the present application, the device comprising a first module 201 and a second module 202. A second module 201, configured to obtain communication information to be published, input by a social user in a social group chat; a second module 202, configured to upload the communication information to a corresponding network device, so as to perform target presence information detection on the communication information, and determine whether the communication information includes target presence information.
Here, the specific implementation of the first-module-two 201 and the second-module-two 202 shown in fig. 5 is the same as or similar to the embodiment of the step S201 and the step S202 shown in fig. 2, and thus is not repeated herein and is included herein by reference.
Fig. 6 illustrates a second user device for identifying presence information in social group chat according to another aspect of the present application, the device comprising a three-in-one module 301 and a three-in-two module 302. A third module 301, configured to obtain communication information to be published, input by a social user in a social group chat; a third-second module 302, configured to send the communication information to a detection device in the social group chat via a corresponding network device, and perform target presence information detection on the communication information through the detection device, to determine whether the communication information includes target presence information.
Here, the specific implementation of the first three module 301 and the second three module 302 shown in fig. 6 is the same as or similar to the embodiment of the step S301 and the step S302 shown in fig. 3, and thus is not repeated here and is included herein by way of reference.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 7 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 7, the system 300 can be implemented as any of the above-described devices in the various embodiments. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (18)

1. A method of identifying presence information in a social group chat, wherein the method comprises:
receiving communication information uploaded by user equipment of a social user in social group chat;
performing target presentation information detection on the communication information, and judging whether the communication information contains target presentation information;
and if so, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
2. The method of claim 1, wherein the illegal communication information is stored in a corresponding social group chat buffer for access by an administrative user of the social group chat.
3. The method of claim 1, wherein the method further comprises:
receiving an access request of a management device of the management user about the social group chat buffer;
sending the violation communication information to the management device in response to the access request;
receiving review confirmation information which is returned by the management equipment and is related to the communication information, wherein the review confirmation information comprises violation confirmation information which is related to that the violation communication information contains presentation information;
removing the illegal communication information based on the review confirmation information.
4. The method of claim 3, wherein the removing the violation communication information based on the review validation information further comprises:
and performing violation punishment on the social user based on the review confirmation information.
5. The method of claim 4, wherein the violation penalty comprises at least any one of:
forbidding speaking for a preset time;
reducing user scoring information for the social user;
marking the number of violations of the social user;
adding the social user to a blacklist of the social group chat;
removing the social user from the social group chat;
adding the social user to a group chat blacklist of a social application.
6. The method of claim 5, wherein the violation penalty comprises reducing user scoring information for the social user; wherein the method further comprises:
if a group adding application of a new social user about the social group chat is received, wherein the group adding application comprises user scoring information of the new social user;
and if the user scoring information is smaller than or equal to a user scoring threshold value, rejecting the group adding application of the new social user.
7. The method of claim 6, wherein the violation penalty comprises adding the social user to a blacklist of the social group chat or adding the social user to a blacklist of a social application; wherein the method further comprises:
and if a group adding application of the social user about the social group chat is received, returning corresponding group adding rejection information to the social user.
8. The method of claim 1, wherein the communication information comprises published communication information; wherein the determining the communication information as the illegal communication information comprises:
and withdrawing the communication information, determining the communication information as illegal communication information, and changing the illegal communication information from a published state to a published pending state.
9. The method of claim 8, wherein the method further comprises:
receiving review denial information which is sent by management equipment of the management user and is related to the communication information, wherein the review denial information comprises violation denial information which is related to that the violation communication information contains target presentation information;
and changing the illegal communication information into confirmation communication information and re-issuing the illegal communication information to the social group chat.
10. The method of claim 1, wherein the communication information comprises communication information to be published, wherein the determining the communication information as the offending communication information comprises:
intercepting the communication information, determining the communication information as illegal communication information, and maintaining the illegal communication information in a release pending state.
11. The method of claim 10, wherein the method further comprises:
if the communication information does not contain target presentation information, or review denial information about the communication information sent by the management equipment of the management user is received, wherein the review denial information comprises violation denial information about the communication information containing the target presentation information;
and publishing the communication information to social group chat.
12. The method of claim 1, wherein the method comprises:
obtaining a plurality of sample presentation information and a plurality of corresponding sample characteristics;
determining a corresponding target presentation information identification model according to the plurality of sample presentation information and the plurality of sample characteristic input identification models;
wherein the performing target presence information detection on the communication information and determining whether the communication information contains target presence information includes:
and inputting the communication information into the target presentation information identification model, and judging whether the communication information contains target presentation information.
13. The method of claim 12, wherein the tags of the social group chat include corresponding franchise tags; wherein the determining the communication information as the illegal communication information comprises:
detecting whether the presentation characteristics corresponding to the communication information are matched with the authorization label;
if not, determining the communication information as illegal communication information, wherein the illegal communication information is in a release pending state.
14. The method of claim 13, wherein the administrative user of the social group chat includes a merchant user, and the authorization tag includes a business tag corresponding to the merchant user.
15. A method for identifying presence information in social group chat is applied to a first user device, wherein the method comprises the following steps:
the method comprises the steps of obtaining communication information to be published, input by a social user in social group chat;
and uploading the communication information to corresponding network equipment to perform target presentation information detection on the communication information and judge whether the communication information contains target presentation information.
16. A method for identifying presence information in social group chat is applied to a second user device, wherein the method comprises the following steps:
the method comprises the steps of obtaining communication information to be published, input by a social user in social group chat;
and sending the communication information to detection equipment in the social group chat through corresponding network equipment, executing target presentation information detection on the communication information through the detection equipment, and judging whether the communication information contains target presentation information.
17. A computer device, wherein the device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 16.
18. A computer-readable medium storing instructions that, when executed, cause a system to perform operations to perform a method as recited in any of claims 1-16.
CN202111014018.3A 2021-08-31 2021-08-31 Method and equipment for identifying presentation information in social group chat Pending CN113704638A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111014018.3A CN113704638A (en) 2021-08-31 2021-08-31 Method and equipment for identifying presentation information in social group chat

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111014018.3A CN113704638A (en) 2021-08-31 2021-08-31 Method and equipment for identifying presentation information in social group chat

Publications (1)

Publication Number Publication Date
CN113704638A true CN113704638A (en) 2021-11-26

Family

ID=78658134

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111014018.3A Pending CN113704638A (en) 2021-08-31 2021-08-31 Method and equipment for identifying presentation information in social group chat

Country Status (1)

Country Link
CN (1) CN113704638A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114245160A (en) * 2021-12-07 2022-03-25 北京达佳互联信息技术有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system
CN115665080A (en) * 2022-10-27 2023-01-31 北京字跳网络技术有限公司 Information processing method, information processing apparatus, electronic device, storage medium, and program product

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208992A (en) * 2010-06-13 2011-10-05 天津海量信息技术有限公司 Internet-facing filtration system of unhealthy information and method thereof
CN103634308A (en) * 2013-11-19 2014-03-12 北京奇虎科技有限公司 Safety detection method and device for instant messaging tool
CN103701693A (en) * 2013-12-31 2014-04-02 广州华多网络科技有限公司 Message handling method and system in communication process
CN104184653A (en) * 2014-07-28 2014-12-03 小米科技有限责任公司 Message filtering method and device
CN104426685A (en) * 2013-08-21 2015-03-18 深圳市腾讯计算机系统有限公司 Information management method and apparatus
CN104539514A (en) * 2014-12-17 2015-04-22 广州酷狗计算机科技有限公司 Information filtering method and device
CN105262672A (en) * 2015-08-31 2016-01-20 小米科技有限责任公司 Intra-group anti-harassment method and device
CN105553831A (en) * 2015-12-23 2016-05-04 腾讯科技(深圳)有限公司 Message delivery method and system
CN106982147A (en) * 2016-01-15 2017-07-25 阿里巴巴集团控股有限公司 The communication monitoring method and device of a kind of Web communication applications
CN108650104A (en) * 2018-04-18 2018-10-12 绥化学院 The treating method and apparatus of one population message
CN108846295A (en) * 2018-07-11 2018-11-20 北京达佳互联信息技术有限公司 Sensitive information filter method, device, computer equipment and storage medium
CN109559246A (en) * 2018-10-31 2019-04-02 北京春雨天下软件有限公司 Enter group checking method, audit server, client and enters group auditing system
CN109831417A (en) * 2018-12-28 2019-05-31 广州华多网络科技有限公司 Method, apparatus, server and the storage medium of anti-harassment processing account number
CN110837615A (en) * 2019-11-05 2020-02-25 福建省趋普物联科技有限公司 Artificial intelligent checking system for advertisement content information filtering
CN111258470A (en) * 2020-01-09 2020-06-09 上海连尚网络科技有限公司 Method and equipment for presenting social messages

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102208992A (en) * 2010-06-13 2011-10-05 天津海量信息技术有限公司 Internet-facing filtration system of unhealthy information and method thereof
CN104426685A (en) * 2013-08-21 2015-03-18 深圳市腾讯计算机系统有限公司 Information management method and apparatus
CN103634308A (en) * 2013-11-19 2014-03-12 北京奇虎科技有限公司 Safety detection method and device for instant messaging tool
CN103701693A (en) * 2013-12-31 2014-04-02 广州华多网络科技有限公司 Message handling method and system in communication process
CN104184653A (en) * 2014-07-28 2014-12-03 小米科技有限责任公司 Message filtering method and device
CN104539514A (en) * 2014-12-17 2015-04-22 广州酷狗计算机科技有限公司 Information filtering method and device
CN105262672A (en) * 2015-08-31 2016-01-20 小米科技有限责任公司 Intra-group anti-harassment method and device
CN105553831A (en) * 2015-12-23 2016-05-04 腾讯科技(深圳)有限公司 Message delivery method and system
CN106982147A (en) * 2016-01-15 2017-07-25 阿里巴巴集团控股有限公司 The communication monitoring method and device of a kind of Web communication applications
CN108650104A (en) * 2018-04-18 2018-10-12 绥化学院 The treating method and apparatus of one population message
CN108846295A (en) * 2018-07-11 2018-11-20 北京达佳互联信息技术有限公司 Sensitive information filter method, device, computer equipment and storage medium
CN109559246A (en) * 2018-10-31 2019-04-02 北京春雨天下软件有限公司 Enter group checking method, audit server, client and enters group auditing system
CN109831417A (en) * 2018-12-28 2019-05-31 广州华多网络科技有限公司 Method, apparatus, server and the storage medium of anti-harassment processing account number
CN110837615A (en) * 2019-11-05 2020-02-25 福建省趋普物联科技有限公司 Artificial intelligent checking system for advertisement content information filtering
CN111258470A (en) * 2020-01-09 2020-06-09 上海连尚网络科技有限公司 Method and equipment for presenting social messages

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114245160A (en) * 2021-12-07 2022-03-25 北京达佳互联信息技术有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN114793172A (en) * 2022-04-15 2022-07-26 广东迅数智联科技有限公司 Private letter processing method and system
CN115665080A (en) * 2022-10-27 2023-01-31 北京字跳网络技术有限公司 Information processing method, information processing apparatus, electronic device, storage medium, and program product

Similar Documents

Publication Publication Date Title
CN113704638A (en) Method and equipment for identifying presentation information in social group chat
CN110266505B (en) Method and equipment for managing session group
WO2020063846A1 (en) Method and device for presenting update information of guest program
CN111159536B (en) Method and device for pushing presentation information in reading application
CN108055646B (en) Method and equipment for recommending user
CN111651684A (en) Method and equipment for recommending social users
CN110336733B (en) Method and equipment for presenting emoticon
CN111488995A (en) Method and apparatus for evaluating a joint training model
CN111523039B (en) Method and device for processing book promotion request in reading application
US20230281695A1 (en) Determining and presenting information related to a semantic context of electronic message text or voice data
CN112686678A (en) Method, device, equipment and storage medium for determining false order
CN110535755B (en) Method and equipment for deleting session message
CN111817945A (en) Method and equipment for replying communication information in instant communication application
CN110768894A (en) Method and equipment for deleting session message
CN109890024B (en) Method and equipment for determining rescue group information
CN114710342B (en) Community management method, equipment, medium and program product
CN111666195A (en) Method and apparatus for providing video information or image information
CN112787831B (en) Method and device for splitting conference group
CN111666250B (en) Method and device for processing book promotion request information in reading application
CN115118694A (en) Method and equipment for releasing birthday blessing message
CN112948142A (en) Method, apparatus, medium, and program product for determining target feedback information
CN114500448A (en) Method, device and computer readable medium for selecting target user
CN112968876A (en) Content sharing method and device, electronic equipment and storage medium
CN110784392A (en) Method and equipment for acquiring reading reminding information
CN110958315A (en) Method and equipment for presenting message notification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination