Sensitive-information shielding method and service end

A sensitive information, server-side technology, applied in the network field, can solve the problems of poor shielding effect of sensitive information, dealing with encounters, and low efficiency of manual analysis.

Inactive Publication Date: 2018-03-16
SHENZHEN THUNDER NETWORK TECH
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the efficiency of manual analysis is relatively low, and there are encounters in processing, which leads to a relatively poor effect of shielding sensitive information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive-information shielding method and service end
  • Sensitive-information shielding method and service end
  • Sensitive-information shielding method and service end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0029] Please refer to figure 1 , figure 1 is a structural diagram of an embodiment of the present invention that can be applied to a network system, such as figure 1 As shown, it includes: a client 101 and a server 102, wherein the client 101 can be an application program (such as a browser) installed on a user terminal, or the client can be understood as a user terminal, such as a computer, a mobile phone, tablet and more. The client 101 can request informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a sensitive-information shielding method and a service end. The method includes: acquiring information contents, which are requested by a user end, by the server end; carrying out sensibility analysis on the information contents by the server end through a constructed sensitive-word word library; shielding the information contents by the server end if theinformation contents are level-1 sensitive-information; analyzing the information contents by the server end through an artificial system if the information contents are level-2 sensitive-information,and shielding the information contents if a result of analysis of the artificial system on the information contents is unsuccess; and responding to a request of the user end for the information contents by the server end if the information contents are not the sensitive information or the result of analysis of the artificial system on the information contents is success. An effect of sensitive-information shielding can be improved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a sensitive information shielding method and a server. Background technique [0002] Network socialization is a main application scenario for people at present, for example: posting information, commenting on information, or obtaining information shared by others, and so on. However, at present, sensitive information such as various advertisements, pornographic violence, or politically sensitive words may appear in the process of social networking on the Internet, which seriously pollutes a healthy social circle and affects user experience. However, at present, the information requested by the user (for example, the information published or obtained by the user) is mainly manually analyzed to determine whether the information requested by the user is sensitive information. If it is sensitive information, the user's request is not allowed, for example: User is not allowed to pos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/353G06F16/337G06F16/90344
Inventor 庄家栋叶丽君
Owner SHENZHEN THUNDER NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products