Method and device for processing junk user

A user and garbage technology, applied in the field of social applications, can solve the problems of inability to effectively shield abnormal information, low practicability, dependence, etc., and achieve the effect of identification and shielding, high practicability, and increased threshold

Inactive Publication Date: 2014-09-10
XIAOMI INC
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, the method of shielding users who send the above-mentioned abnormal information is limited to the reporting of abnormal information by the majority of users. Although this shielding method can shield spam messages to a certain extent, it depends on Due to the user's reporting behavior, spam users cannot be actively identified and blocked, so abnormal information cannot be effectively blocked, and the practicability is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing junk user
  • Method and device for processing junk user
  • Method and device for processing junk user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0102] figure 1 is a flow chart of a method for dealing with spam users according to an exemplary embodiment, such as figure 1 As shown, a method for dealing with spam users is used in the terminal, including the following steps:

[0103] Step S11, acquiring the user's profile data, the profile data includes at least one item of the user's personal information, historical audit records, and hi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and device for processing a junk user. The method for processing the junk user comprises the steps that the archive data of the user are acquired, and the archive data comprise at least one of the personal information, historical approved memo and historical behavior information of the user; whether the user is an unauthentic user or not is analyzed according to the archive data; when the user is the unauthentic user, the behavior of the user is limited. According to the technical scheme, the reliability of the user is analyzed according to the archive data of the user, and therefore the behavior of the user is limited according to the reliability of the user, the threshold for the unauthentic user using a social application is increased, the harassment of the unauthentic user to a normal user is reduced, and the social application can actively recognize and shield the unauthentic user. Therefore, advertisements, political communication and other illegal information are filtered out more effectively, and high practicality is achieved.

Description

technical field [0001] The present disclosure relates to the field of social application, and in particular to a method and device for dealing with garbage users. Background technique [0002] In social applications such as social platforms and emails that are used for communication between users, many advertisements, prohibited information, or information automatically sent by simulated terminals are usually received. If it causes interference to the normal communication of users, it is necessary to shield the users who send such information. [0003] In related technologies, the method of shielding users who send the above-mentioned abnormal information is limited to the reporting of abnormal information by users. Although this shielding method can shield spam messages to a certain extent, it depends on Due to the user's reporting behavior, spam users cannot be actively identified and blocked, so abnormal information cannot be effectively blocked, and the practicability i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F21/316G06F16/90335
Inventor 韩博颖陈冬梁翁海斌
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products