Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification method and device

An identification method and technology to be identified, applied in the field of information identification, can solve problems such as time-consuming

Pending Publication Date: 2016-08-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, usually judging whether a comment is invalid requires a lot of judgment logic to ensure a certain accuracy of strike, which means that it takes a long time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method and device
  • Identification method and device
  • Identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] An embodiment of the present invention provides an identification method, which is applied to the server side, such as figure 2 Said, said method comprises:

[0103] Step 201. Determine user comment information that meets preset conditions to be identified.

[0104] Here, the user comment information mainly refers to comment information written by users on online platforms such as online education platforms, online business platforms, and online game platforms.

[0105] Wherein, the user comment information meeting the preset condition refers to suspicious user comment information; the preset condition means that the category of the user comment information cannot be clearly identified. The server needs to further judge the user comment information meeting the preset condition, so as to determine whether the user comment information meeting the preset condition is valid comment information or invalid comment information.

[0106] Wherein, the invalid comment informat...

Embodiment 2

[0194] Based on the technical solution described in Embodiment 1, a schematic workflow diagram of a recognition system is given, as shown in Figure 6 As shown, the identification system mainly includes: a series monitoring system, a bypass monitoring system, a suspicious comment distribution system, a confidence evaluation system, and a scoring system;

[0195]Wherein, the serial monitoring system is responsible for frequency control, account information detection, and content detection.

[0196] The series monitoring system includes: a frequency control module, an account information detection module, and a content detection module; specifically,

[0197] The frequency control module is responsible for reading the frequency configuration information of the series monitoring system. For example, the frequency configuration information is that a user account is allowed to comment 2 times within 1 minute, and the frequency of user comments is controlled according to the IP addr...

Embodiment 3

[0213] Figure 7 A schematic diagram showing a hardware entity of parties identifying suspicious comments, Figure 7 It includes: servers 1-4, terminal devices 1-N, and terminal devices 1-N exchange information with servers through wired or wireless networks. Terminal devices include mobile phones, desktops, PCs, and all-in-one machines. Wherein, the online platform application is installed in the terminal device, adopting the embodiment of the present invention, based on Figure 7 In the system shown, the server 1 receives a large number of user comments, performs first-level processing on the massive user comments, and then sends the remaining user comments to the server 2 after the first-level detection processing, and the server 2 performs After the first-level detection process, the remaining user comments are subjected to a second-level detection process, and the remaining user comments after the second-level detection process are sent to the server 3, and the server 3 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an identification method which comprises the following steps: confirming user comment information which is to be identified and meets preset conditions; distributing the user comment information which is to be identified and meets the preset condition to a first-class user terminal according to a preset strategy; acquiring feedback information returned by the first-class user terminal; and confirming the category of the user comment information which is to be identified and meets the preset condition on the basis of the feedback information and a confidence coefficient parameter of the first class of users sending the feedback information, wherein the confidence coefficient parameter is used for indicating the confidence level of the user comment information from the first class of users. Meanwhile, the embodiment of the invention further provides an identification device.

Description

technical field [0001] The invention relates to information identification technology, in particular to an identification method and device. Background technique [0002] With the increasing popularity of the Internet, more and more users choose to learn and communicate through online education platforms. At present, as the number of courses provided by online education platforms and the number of users of learning forums continue to increase, the comments generated by users on online education platforms have also exploded. Due to the relatively large influence of online education platforms, many invalid comments have appeared. These invalid comments include comments related to pornography, political sensitivity, advertisements, etc., which have brought a bad influence on the online education platform. [0003] Moreover, the comment characteristics of invalid comments are increasingly rich and varied, figure 1 A screenshot showing a mixture of valid and invalid comments, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/27G06F17/30
CPCG06F16/9535G06F40/279
Inventor 黄当武衡阵
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products