Check patentability & draft patents in minutes with Patsnap Eureka AI!

Malicious picture interception method, device and equipment and storage medium

A technology of malicious pictures and pictures, applied in the field of information security, can solve the problems of limited interception of malicious pictures and inability to carry out accurate and effective interception, and achieve the effect of reducing audit costs, quickly judging and intercepting, and ensuring accuracy

Pending Publication Date: 2020-07-24
TENCENT MUSIC ENTERTAINMENT TECH SHENZHEN CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the Internet industry, malicious pictures released by malicious accounts are frequently changing. In the process of realizing the present invention, the inventor found that the relevant technology uses a single fingerprint extraction algorithm to intercept malicious pictures very limitedly, and can only intercept pictures with the same or partial content. There are a small number of different pictures in the content, and when the malicious picture changes, it cannot be accurately and effectively intercepted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious picture interception method, device and equipment and storage medium
  • Malicious picture interception method, device and equipment and storage medium
  • Malicious picture interception method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.

[0034] figure 1 This is a schematic diagram of the system structure of an exemplary embodiment of the present application. see figure 1 , the system is a data transmission network, and the data transmission network includes a server cluster 10, and the server cluster 10 includes one or more interception servers.

[0035] The system also includes a terminal 20, and the terminal 20 is installed with applications such as Weibo, WeChat, Weiyun, etc. that can send pictures (post Weibo, Moments, chat, etc.), store pictures in the cloud, or use pictures as avatars.

[0036] When the terminal 20 performs actions such as sending a picture, storing a picture in the cloud, or using a picture as an avatar, the interception server 10 will obtain the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious picture interception method and device, equipment and a storage medium, and belongs to the technical field of information safety. The method comprises the steps ofextracting an image fingerprint of a to-be-audited picture; if the similarity between the low-dimensional image fingerprint of the to-be-audited picture and the low-dimensional image fingerprint of the picture in the malicious picture library and the similarity between the high-dimensional image fingerprint of the to-be-audited picture and the high-dimensional image fingerprint of the picture in the malicious picture library meet a first condition, intercepting the to-be-audited picture; if at least one of the similarity between the low-dimensional image fingerprint of the to-be-audited picture and the low-dimensional image fingerprint of the picture in the malicious picture library and the similarity between the high-dimensional image fingerprint of the to-be-audited picture and the high-dimensional image fingerprint of the picture in the malicious picture library meets a second condition, performing character recognition on the to-be-audited picture; and when it is identified that the matching degree of the text in the to-be-audited picture and the text in the malicious text content library is higher than a threshold value, intercepting the to-be-audited picture.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to a malicious image interception method, device, device and storage medium. Background technique [0002] In the information age, the transmission and release of information does not require strict supervision. For example, malicious pictures with malicious text are usually used to spread pornography, gambling, and marketing information. In order to avoid the spread of these pictures, it is necessary to review the pictures that users want to publish before publishing. [0003] In the Internet industry, malicious pictures published by malicious accounts are subject to frequent changes. In the process of implementing the present invention, the inventor found that the relevant technology adopts a single fingerprint extraction algorithm to intercept malicious pictures very limited, and can only intercept pictures with identical or partial content. There are...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/535G06F16/583G06K9/62
CPCG06F16/535G06F16/583G06F16/5846G06F18/2135G06F18/2414G06F18/22
Inventor 葛霖李浚时
Owner TENCENT MUSIC ENTERTAINMENT TECH SHENZHEN CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More