Content risk control method and device
A risk control and risk technology, applied in the security field, can solve the problems of low efficiency, single content detection method, easy to be missed detection within the risk, etc., to achieve the effect of improving the accuracy and recall rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] In this embodiment, real-time control is performed on content risks.
[0050] see figure 1 , figure 1 It is a schematic diagram of the content risk control process in Embodiment 1 of this application. The specific steps are:
[0051] Step 101, monitor messages between devices.
[0052] The monitoring of messages between devices here will monitor all messages, but due to the timeliness of processing, all messages cannot be processed in real time, and only the messages that can be processed in real time can be processed here.
[0053] Messages between devices, including messages between client and client, messages between client and server, messages between server and server, such as instant messaging messages between buyers and sellers in e-commerce .
[0054] Step 102, based on a preset recognition model and a preset sample library, perform content recognition on the monitored messages respectively.
[0055] For a message, content recognition is performed based on...
Embodiment 2
[0068] In the embodiment of the present application, quasi-real-time processing is performed on the pictures sent by users with risky behaviors analyzed in the first embodiment.
[0069] see figure 2 , figure 2 It is a schematic diagram of the content risk control process in Embodiment 2 of this application. The specific steps are:
[0070] Step 201, periodically acquire pictures in messages with risky content and pictures sent by users with risky behaviors.
[0071] In the first embodiment, the identified messages with risky content and users with risky behaviors are marked.
[0072] In this embodiment, identification processing is performed on pictures in messages marked as having risky content and pictures sent by users with risky behaviors.
[0073] Here, the period may be N hours, etc., and there is no limitation on this, and the length of the period interval is determined according to the needs of actual scenarios.
[0074] Step 202, perform optical character dete...
Embodiment 3
[0083] In this embodiment, messages between devices are periodically acquired, and parallel quasi-real-time policy processing is performed.
[0084] see image 3 , image 3 It is a schematic diagram of the content risk control process in Embodiment 3 of this application. The specific steps are:
[0085] Step 301, periodically obtain messages between devices that are determined to be other than risk messages, and determine risk messages in the messages based on a preset classification model.
[0086] Wherein, the risk message includes a message determining that there is a risky content, and a message sent by a user with a risky behavior.
[0087] The cycle in this embodiment can be the same as or different from the cycle in embodiment two. The time length corresponding to the cycle in embodiment two and embodiment three can be greater than the time length of the preset time in embodiment one. Limit.
[0088] Step 302: Analyze the behavior characteristics of the messages se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


