CN1855836A - Intellectual method and system for filtering and shielding harmful data in online interacting system - Google Patents
Intellectual method and system for filtering and shielding harmful data in online interacting system Download PDFInfo
- Publication number
- CN1855836A CN1855836A CNA2005100255444A CN200510025544A CN1855836A CN 1855836 A CN1855836 A CN 1855836A CN A2005100255444 A CNA2005100255444 A CN A2005100255444A CN 200510025544 A CN200510025544 A CN 200510025544A CN 1855836 A CN1855836 A CN 1855836A
- Authority
- CN
- China
- Prior art keywords
- article
- scanning
- harmful information
- shielding
- intelligent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Controls And Circuits For Display Device (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The method comprises: after user releases a message, the system starts 'intelligent article scanning system' to scan the content of the article; after scanning, if the article is classified as a 'questionable article', a 'shielding for un-related person' is started to provide a protection for the article; if the article is not classified as a 'questionable article', it will directly be displayed on the web. The 'shielding for un-related person' function can also be manually configured; the administrator can add or delete key words to ensure the hit ratio of 'intelligent article scanning system' reach a preset level; and then processing the questionable articles together.
Description
Technical field
The present invention relates to a kind ofly (for example be used for the online interaction system; Network forum (BBS system)) harmful information intelligently filters and screen method and system thereof.
Background technology
Network application the most widely at present has: BBS forum, ecommerce, E-Government etc., comprehensively popularizing of these application proposed challenge to speech safety.In this type systematic, the user can arbitraryly deliver viewpoint, the speech of oneself, according to big, the real-time characteristics of this type systematic interactivity, these speech meetings in time show on the website, if administrative staff do not handle timely to harmful speech, with causing serious reverse side the effect of publicity, make a very bad impression.
Existing systems is broadly divided into three classes:
One class is that the content that the user delivers is directly surfed the Net, and does not have any safeguard measure.Present most of BBS system, personal website, enterprise web site all are this classes.
Second class is that the content that the user delivers directly is not presented on the website, pass through the artificial judgement of keeper, thinks not comprise harmful information, just can be open on Internet, and this type systematic is the purpose that cost reaches the management harmful information to sacrifice interactivity and real-time.This method is adopted in the part business website at present.
The 3rd class is provided with the article scanning system, can scan article according to keyword, if contain keyword in the article, then will not surf the Net, and directly delete.The deadly defect of this type systematic is, after the publisher finds that article is deleted, can change repeatedly " suspicious vocabulary " in the article, to walk around the scanning of system, reaches the purpose of propagating harmful information.This method is adopted in part BBS and business website at present.
The 4th class is similar to the 3rd class, only the practice of the direct deletion of the harmful information that contains crucial wording is become keyword is replaced with other literal.Nearly all BBS product all adopts this method at present.
Summary of the invention
The present invention has broken the processing method of above-mentioned four class routines, and the harmful information intelligently filters that is used for the online interaction system and screen method and system thereof a kind of maturation, safe and reliable are provided, and by the use of this method or system, alleviates undertaking of administrative staff.
A kind of harmful information intelligently filters and screen method that is used for the online interaction system provided by the present invention, comprise the following steps: that the user delivers information after, system starts " intelligent article scanning system " immediately the content of article is carried out intelligentized scanning; Receive the information of user's submission at server after, promptly begin scanning; If quilt " intelligent article scanning system " is judged to " suspicious article ", then when showing this article, system starts " irrelevant person's shielding " automatically, and this article is protected; Otherwise, the article demonstration of directly surfing the Net; If when the keeper finds not to be contained harmful information by the article that " intelligent article scanning system " is judged to " suspicious article ", can manually use " irrelevant person's shielding " that article is handled equally; The keeper can increase or the deletion keyword according to the variation of situation, reaches the level of setting with the hit rate that guarantees " intelligent scanning system "; Simultaneously, the processing that administrative staff concentrate " suspicious article " in foreground or background management system is promptly determined not contain harmful information and is discharged article or determine that it contains harmful information and backs up and delete.
At the above-mentioned harmful information intelligently filters and the screen method that are used for the online interaction system, scanning system can also correctly be caught " dynamically " keyword through changing or pretending in the article except scanning article according to keyword.
At the above-mentioned harmful information intelligently filters and the screen method that are used for the online interaction system, " irrelevant person's shielding " mode is: have only article original author and keeper just can see the title and the content of article.
At the above-mentioned harmful information intelligently filters and the screen method that are used for the online interaction system, during administrative staff focus on " suspicious article " in foreground or background management system, suspicious article is sentenced the colour developing form at crucial wording show.
The present invention also provides a kind of harmful information intelligently filters and shielding harness that is used for the online interaction system, it is characterized in that: it comprises intelligent article scan module and the irrelevant person's shroud module that is attached thereto.
The present invention has not only improved general keyword filtration algorithm, make it to capture keyword through camouflage, and from the algorithm and off the beaten track on the shielding skill, promptly adopt " intelligent article scanning " and " irrelevant person's shielding " mode, both complement each other, form unique, complete, effective harmful information intelligently filters of a cover and shielding system, provide a cover ripe, safe and reliable solution.
Description of drawings
Fig. 1 is that the present invention is used for the harmful information intelligently filters of online interaction system and the flow chart of screen method.
Embodiment
The present invention promptly is used for the harmful information intelligently filters and the shielding harness of online interaction system, and it comprises intelligent article scan module and the irrelevant person's shroud module that is attached thereto.
As shown in Figure 1, the present invention is used for the harmful information intelligently filters and the screen method of online interaction system, and step is as follows:
After the user delivered information, system started " intelligent article scanning system " immediately the content of article is carried out intelligentized scanning.Different with other scanning system is, this scanning system can not only scan article according to keyword, and can also correctly catch " dynamically " keyword through changing or pretending in the article, and promptly in the article filtration system, added the notion of keyword association, can smash the coupling keyword;
Receive the information of user's submission at server after, promptly begin scanning, whole scanning process does not have tangible delay, and the user can not find;
If quilt " intelligent article scanning system " is judged to " suspicious article ", then when showing this article, system starts " irrelevant person's shielding " automatically, and this article is carried out special protection; Otherwise, the article demonstration of directly surfing the Net;
" irrelevant person shielding " mode characteristics are: have only article original author and keeper just can see the title and the content of article, and concerning other user, invisible without exception.The introducing of this mode has been stopped the author basically and has been found article by system automatically after shielding or the deletion, the possibility of changing article content repeatedly and delivering, and the author thinks that harmful information surfs the Net, actually this is not so;
When if the keeper finds not to be contained harmful information by the article that " intelligent article scanning system " is judged to " suspicious article ", can manually use " irrelevant person's shielding " that article is handled equally, rather than similar other system, can only delete article or revise article;
The keeper can increase or the deletion keyword according to the variation of situation, reaches than higher level with the hit rate that guarantees " intelligent scanning system ".Simultaneously, the processing that can in foreground or background management system, concentrate of administrative staff to " suspicious article ".
Above-mentioned intelligent article scan mode and irrelevant person's shielding mode are described as follows:
1. intelligent article scanning
The basis of intelligence article scanning is " keyword " storehouse.In background data base, increase this table, be used for record " keyword "." keyword " can be phrase one by one, or one can be broken phrase.
Intelligence article scanning can capture the keyword of camouflage, finishes by the coupling of the phrase smashed just.Such as " altogether-product-party ", can smash coupling between "-" previous word of representative in the phrase and back one word, for example statement:
Totally 123456 produce ABCD party
Altogether ++ ++ +++produce ++ ++ +++party
Just can be scanned the Automatic Program coupling.After having disposed this technology, the system that makes can be mingled with various letters, symbol intentionally to some bad user and walk around the seizure of common textual scan and become possibility in sensitive words, and effect is remarkable in daily use.
Receive the article of user's submission when the BBS program after, system calls intelligent article scan module automatically, and article is scanned completely, and " keyword " that pre-define in the database contrasted with article one by one, in the process of contrast, can also differentiate the keyword of camouflage.
The match is successful by intelligent article scan module in article if keyword is arranged, and then system makes marks when the article record is inserted database documentarily, be " suspicious " article with the expression article, wait administrative staff's further judgement.
2. irrelevant person's shielding mode
When article list and article demonstration, if the article that system discovery will show has the mark of " suspicious " article, then enable irrelevant person's shielding mode, this article is carried out special processing.
System is if find that the viewer is exactly the originator, and the expression originator reads, then the original text of demonstration article from cover to cover.
System is if find that viewer's authority is the keeper, then before article list, use red " * " sign, and when showing article, warn the keeper as background color with eye-catching redness, with prompting keeper this article is " suspicious " article, need be further processed.
If not above two kinds of situations, illustrate that the viewer is domestic consumer, then skip the demonstration of this article in tabulation, the user can not see that at all this article appears in the article list, do not exist as article, let alone the content of reading article.
The keeper not only can see " suspicious " article in the BBS of foreground, can also be in background management system, and the unified management that " suspicious " article is concentrated, and make judgement.In management system, system can use anti-red eye-catching mode to show automatically shadow of doubt, locatees the problematic place of article fast to help the keeper, improves the efficient of work.
In sum, the present invention proposes a cover and use the strategy of publishing an article that intelligent literal filters and the person's of haveing nothing to do shielding harness combines,, provide a cover to tackle the total solution of harmful information from being shielded to artificial shielding automatically.In addition, what the present invention was different with other system is: even be not the keeper, if find harmful information, and operation that also can have nothing to do person shielding, the dynamics of further having strengthened defending harmful information.Proposition of the present invention and enforcement have thoroughly changed and have run into the present situation that harmful information can only be deleted or revise, for the harmful information control provides new approaches and new tool.
Claims (5)
1. a harmful information intelligently filters and a screen method that is used for the online interaction system comprises the following steps:
After the user delivered information, system started " intelligent article scanning system " immediately the content of article is carried out intelligentized scanning;
Receive the information of user's submission at server after, promptly begin scanning;
If quilt " intelligent article scanning system " is judged to " suspicious article ", then when showing this article, system starts " irrelevant person's shielding " automatically, and this article is protected; Otherwise, the article demonstration of directly surfing the Net;
If when the keeper finds not to be contained harmful information by the article that " intelligent article scanning system " is judged to " suspicious article ", can manually use " irrelevant person's shielding " that article is handled equally;
The keeper can increase or the deletion keyword according to the variation of situation, reaches the level of setting with the hit rate that guarantees " intelligent scanning system ";
Simultaneously, the processing that administrative staff concentrate " suspicious article " in foreground or background management system is promptly determined not contain harmful information and is discharged article or determine that it contains harmful information and backs up and delete.
2. harmful information intelligently filters and the screen method that is used for the online interaction system according to claim 1, it is characterized in that: described scanning system can also correctly be caught " dynamically " keyword through changing or pretending in the article except scanning article according to keyword.
3. harmful information intelligently filters and the screen method that is used for the online interaction system according to claim 1 is characterized in that: described " irrelevant person's shielding " mode is: have only article original author and keeper just can see the title and the content of article.
4. harmful information intelligently filters and the screen method that is used for the online interaction system according to claim 1, it is characterized in that: during described administrative staff focus on " suspicious article " in foreground or background management system, suspicious article is sentenced the colour developing form at crucial wording show.
5. a harmful information intelligently filters and shielding harness that is used for the online interaction system is characterized in that: it comprises intelligent article scan module and the irrelevant person's shroud module that is attached thereto.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005100255444A CN1855836A (en) | 2005-04-29 | 2005-04-29 | Intellectual method and system for filtering and shielding harmful data in online interacting system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2005100255444A CN1855836A (en) | 2005-04-29 | 2005-04-29 | Intellectual method and system for filtering and shielding harmful data in online interacting system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN1855836A true CN1855836A (en) | 2006-11-01 |
Family
ID=37195700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2005100255444A Pending CN1855836A (en) | 2005-04-29 | 2005-04-29 | Intellectual method and system for filtering and shielding harmful data in online interacting system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1855836A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106547812A (en) * | 2015-09-18 | 2017-03-29 | 环球娱乐株式会社 | Business information provides system and business information providing method |
CN110134785A (en) * | 2019-04-15 | 2019-08-16 | 平安普惠企业管理有限公司 | Management method, device, storage medium and the equipment of forum's article |
-
2005
- 2005-04-29 CN CNA2005100255444A patent/CN1855836A/en active Pending
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106547812A (en) * | 2015-09-18 | 2017-03-29 | 环球娱乐株式会社 | Business information provides system and business information providing method |
CN106547812B (en) * | 2015-09-18 | 2021-01-15 | 环球娱乐株式会社 | Business information providing system and business information providing method |
CN110134785A (en) * | 2019-04-15 | 2019-08-16 | 平安普惠企业管理有限公司 | Management method, device, storage medium and the equipment of forum's article |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chandrasekharan et al. | The bag of communities: Identifying abusive behavior online with preexisting internet data | |
Gyongyi et al. | Web spam taxonomy | |
US9031919B2 (en) | Content monitoring and compliance enforcement | |
Myers | Wikimmunity: Fitting the communications decency act to Wikipedia | |
CN101609493A (en) | A kind of database SQL infusion protecting method based on self study | |
US20120266210A1 (en) | Method and apparatus for creating an information security policy based on a pre-configured template | |
CN104679825B (en) | Macroscopic abnormity of earthquake acquisition of information based on network text and screening technique | |
CN1598774A (en) | Method and system for creating and enforcing user center | |
CN1809821A (en) | Feedback loop for spam prevention | |
CN102012926A (en) | Extensible method and system for reporting negative information | |
CN1949780A (en) | Network message leaving system and leaving message filtering method | |
CA2981864A1 (en) | Suspicious message processing and incident response | |
CN1855836A (en) | Intellectual method and system for filtering and shielding harmful data in online interacting system | |
Furnell | The problem of categorising cybercrime and cybercriminals | |
Mohler | Toward a better understanding of substantial similarity in copyright infringement cases | |
Cross | The weaning of the green: Environmentalism comes of age in the 1990s | |
Coppola et al. | Civil RICO: how ambiguity allowed the racketeer influenced and corrupt organizations act to expand beyond its intended purpose | |
Panko | Designing groupware for implementation | |
Crawford | First Do Not Harm: The Problem of Spyware | |
CN1185595C (en) | Jamproof theme word extracting method | |
CN105893559A (en) | Data pushing method and device | |
RU2410748C2 (en) | Method of searching for information on internet | |
Furnell | Categorising cybercrime and cybercriminals: The problem and potential approaches | |
Collins | Saving Fair Housing on the Internet: The Case for Amending the Communications Decency Act | |
CN1735029A (en) | Registration form protection System and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |