Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for identifying spam

A junk information and identification method technology, applied in the information field, can solve the problems of limited filtering ability, low accuracy, and widening the recognition range, so as to ensure the accuracy and intelligence, avoid the problem of misidentification, and expand the recognition range.

Active Publication Date: 2020-07-21
北京时间有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the process of implementing the present invention, the inventor found that there are at least the following problems in the prior art: the existing keyword matching technology only filters spam information by directly including specific keywords, while Chinese is extensive and profound, and the same word It may express completely opposite meanings under different semantics. Therefore, this method is likely to cause non-spam information containing keywords to be misidentified, hindering the dissemination of normal information; moreover, the identification and filtering effects of keyword matching technology are affected. The limit on the number of preset keywords makes it impossible to learn independently and expand the scope of recognition
It can be seen that the existing keyword matching technology has the problems of low accuracy and limited filtering ability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying spam
  • Method and device for identifying spam
  • Method and device for identifying spam

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 A flow chart of a method for identifying spam provided by Embodiment 1 of the present invention is shown, and the method includes:

[0027] Step S110: Input the object to be identified into a preset information classifier for initial identification.

[0028] Wherein, the information classifier is set according to known junk information, and the information classifier is used to identify whether the object to be identified contains the above-mentioned junk information according to the known junk information, and if the object to be identified contains known junk information, it will The junk information is marked as the first junk information, so as to obtain the initial recognition result including the first junk information.

[0029] In practical applications, the object to be identified may be news information, comment information, email, text message or program.

[0030] Step S120: Obtain the first junk information included in the initial recognition resul...

Embodiment 2

[0040] figure 2 A flow chart of a method for identifying spam provided by Embodiment 2 of the present invention is shown, and the method includes:

[0041] Step S210: Perform feature extraction on the acquired known spam information, and set an information classifier according to the feature extraction result.

[0042] Specifically, the laws and characteristics of known spam information are summarized and extracted, and information classifiers are set correspondingly according to the extracted laws and characteristics.

[0043] In one implementation, the information classifier may be a keyword filter. At this time, determine the keywords contained in the known spam according to the feature extraction results, and then set a keyword filter according to the keywords to identify and filter the keywords contained in the object to be identified. Specifically, the keyword filter can be set according to the pre-collected negative vocabulary.

[0044] In another implementation man...

Embodiment 3

[0072] image 3 A schematic structural diagram of an apparatus for identifying spam provided by Embodiment 3 of the present invention is shown, and the apparatus includes: an initial identification module 310 , a secondary identification module 320 and a correction module 330 .

[0073] The initial identification module 310 is configured to input the object to be identified into a preset information classifier for initial identification; and obtain the first garbage information included in the initial identification result.

[0074] Wherein, the information classifier is set according to known junk information, and the information classifier is used to identify whether the object to be identified contains the above-mentioned junk information according to the known junk information, and if the object to be identified contains known junk information, it will The junk information is marked as the first junk information, so as to obtain the initial recognition result including the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identification method and device for junk information, and relates to the technical field of information. The method comprises the following steps that: inputting an object to be identified into an information classifier to carry out primary identification; obtaining first junk information contained in a primary identification result; inputting contents except the first junk information in the object to be identified into a preset neural network model to be subjected to secondary identification; obtaining second junk information contained in a second identification result; and according to the first junk information and / or the second junk information, correcting the preset neural network model. Therefore, through at least two times of screening and the neural network model, the junk information in the object to be identified is identified, identification accuracy and intelligence can be greatly improved, and the junk information can be prevented from hurting users as much as possible.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a garbage information identification method and device. Background technique [0002] With the continuous development of the Internet, self-media and social media products are developing rapidly, the amount of information on the Internet is increasing day by day, and the openness of the Internet also leads to the existence of a lot of bad information on the Internet. In order to provide users with a better network environment, and to prevent users from being harmed or lost by bad information, monitoring and filtering information has become a common demand. [0003] Application of content filtering technology can realize the filtering of bad information on the Internet, so as to ensure the security of the network environment. There are many forms of information on the Internet, among which text form is the most common one. Text filtering refers to the process of fin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/35G06F16/335G06F16/9535G06N3/08
CPCG06F16/335G06F16/35G06F16/9535G06N3/084
Inventor 张德斌
Owner 北京时间有限公司