Malicious user reporting method and device, and reporting information processing method and device

An information processing method and a technology of an information processing device, which are applied in the Internet field, can solve problems such as lack of timeliness, and achieve the effect of improving timeliness and ensuring accuracy

Active Publication Date: 2016-06-22
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, in order to solve the technical problem of insufficient timeliness of response to the above-mentioned user reports, a method for processing report information is specially provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious user reporting method and device, and reporting information processing method and device
  • Malicious user reporting method and device, and reporting information processing method and device
  • Malicious user reporting method and device, and reporting information processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] The software implementation of the reporting mechanism in the social network application in the traditional technology includes two parts, a client and a server. The client part can refer to figure 1 As shown, users operating on the client side of the social networking application can right-click the avatar of the sender of the harassment information, and then click Report, and a pop-up will appear as follows: figure 2 The input box shown in , prompts the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a reporting information processing method. The method comprises a step of receiving a report request and extracting the target user identifier and report type comprised in the report request, a step of searching the operation record corresponding to the target user identifier, a step of obtaining semantic analysis model corresponding to the report type, a step of judging whether the operation record is corresponding to a malicious user or not according to the semantic analysis model, and generating a corresponding penalty processing instruction if so. The invention also discloses a reporting information processing device and the corresponding malicious user reporting method and device. By using the malicious user reporting method and device, and the reporting information processing method and device, the timeliness of the response of a user report can be improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a method and device for reporting malicious users, and a method and device for processing report information. Background technique [0002] With the development of the Internet, social network applications such as instant messaging tools have been increasingly integrated into the lives of netizens. And many lawbreakers have also begun to spread pornography, advertisements, cults, and fraudulent information for personal gain through social network applications, which are called malicious users in social network applications. [0003] At present, the methods for reporting content published by malicious users in mainstream social network applications are all in an extensive manner. The process is usually that the user selects the malicious user or selects multimedia content such as text, pictures or videos posted by the malicious user, and then clicks the report button...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58
Inventor 周进郭计伟林陆一胡境彬曾岳锋
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products