Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Sensitive word recognition method and device and electronic device

A recognition method and sensitive word technology, applied in the computer field, can solve problems such as high cost, slow response speed, and complicated implementation process, and achieve the effect of improving speed, fast response speed, and simplifying the operation process

Pending Publication Date: 2020-05-12
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiments of this specification provide a sensitive word recognition method, device, and electronic equipment to solve the complex implementation process and high cost of relying on training models to identify sensitive words in the prior art, and the model needs continuous training, maintenance, and response slow speed problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sensitive word recognition method and device and electronic device
  • Sensitive word recognition method and device and electronic device
  • Sensitive word recognition method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] figure 2 A schematic flowchart of a method for identifying sensitive words provided in Embodiment 1 of this specification, the method may specifically include the following steps:

[0035] In step S210, one or more texts to be detected generated in a predetermined application platform are acquired.

[0036] In one or more embodiments of this specification, since the scene of sensitive word recognition includes sensitive word recognition on the text content published in the application platform, it is necessary to extract the text to be detected from the application platform before formal detection; , when the user (here refers to the user who publishes information on the application platform) edits the text content, he can first upload the text content to the server of the application platform, and the application server publishes the text content to the interface of the application platform for display , after the platform perceives the text generated by the user (su...

Embodiment 2

[0064] image 3 A schematic flowchart of a method for identifying sensitive words provided in Embodiment 2 of this specification, the method may specifically include the following steps:

[0065] Step S310, acquiring one or more texts to be detected generated in a predetermined application platform.

[0066] Step S320, constructing a query data structure according to the text to be detected.

[0067] Step S330, obtain the second sensitive word data or incremental data loaded by the system database, and update the first sensitive word data according to the second sensitive word data or incremental data, and obtain the updated first sensitive word data data;

[0068] Step S340, using the query data structure to match the updated first sensitive word data, so as to identify the sensitive words included in the text to be detected generated in the application platform.

[0069] Compared with Embodiment 1, Embodiment 2 adds an operation of updating the first sensitive word data b...

Embodiment 3

[0084] Figure 4 A schematic flowchart of a method for identifying sensitive words provided in Embodiment 3 of this specification, the method may specifically include the following steps:

[0085] Step S410, acquiring one or more texts to be detected generated in a predetermined application platform.

[0086] Step S420, constructing a query data structure according to the text to be detected.

[0087] Step S430, write the second sensitive word data or incremental data into the distributed cache through the system database, so that the distributed cache can update the sensitive word data stored by itself according to the second sensitive word data or incremental data The obtained fourth sensitive word data.

[0088] Step S440, obtain the fourth sensitive word data or incremental data loaded by the distributed cache, and update the first sensitive word data according to the fourth sensitive word data or incremental data, and obtain the updated first sensitive word data A sens...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a sensitive word recognition method and device and an electronic device. The method comprises the steps of obtaining one or more to-be-detected texts generatedin a predetermined application platform; constructing a query data structure according to the to-be-detected text; and matching the query data structure with the preset first sensitive word data so as to identify the sensitive words contained in a to-be-detected text generated in the application platform, thereby realizing the identification of the sensitive words.

Description

technical field [0001] This description relates to the field of computer technology, in particular to a sensitive word recognition method, device and electronic equipment. Background technique [0002] With the development of Internet technology, various Internet platforms or Internet products have sprung up, such as various social platforms, shopping websites, live broadcast platforms, etc. Since most of these Internet platforms are mainly based on text content, and the text content is often generated by users, such as articles uploaded by users, comment information published, instant messaging messages sent, and barrage information; For platforms that generate data content, the content generated by users on the platform must meet the regulatory requirements of the law. In order to identify illegal content such as politics, pornography, gambling, drugs, abusive, prohibited, spam, etc. involved in the platform, it is one of the common implementation methods to detect sensit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/33G06F16/31
CPCG06F16/3344G06F16/322
Inventor 刘洋
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products