Categorizing social network objects based on user affiliations
First Claim
1. A computer implemented method comprising:
- storing a plurality of events and user interactions performed by users of a social networking system with the plurality of events;
associating a set of events of the plurality of events with a category;
selecting a set of users associated with the set of events, comprising, for each event from the set of events;
identifying users performing user interactions with the event,for each identified user, determining a measure of user interactions of the user with the event, wherein the measure of user interactions of the user with the event is based on a frequency of interaction of the user with the event, andincluding the user in the set of users, responsive to the measure of user interactions of the user with the event exceeding a threshold;
selecting a set of candidate events associated with the set of users, based on user interactions of users from the set of users with the candidate events, wherein each candidate event associated with a selected user is selected responsive to interactions of the selected user with the candidate event exceeding a second threshold;
determining whether each candidate event is associated with the category based on keyword occurrences in content associated with each candidate event; and
providing information describing a particular event to a user for performing an action, the information provided based on the category.
1 Assignment
0 Petitions
Accused Products
Abstract
Groups of users of a social networking system are categorized based on their association with a type of malicious activity. A set of predetermined malicious groups is identified. Users associated with the malicious groups are selected based on their level of interactions with the malicious groups. Other groups associated with the selected users are identified as being potentially malicious groups. The potentially malicious groups are further analyzed based on occurrences of keywords associated with the type of malicious activity and manual verification by experts. The potentially malicious groups are either classified as being malicious or non-malicious or assigned a score based on their likelihood of being associated with the type of malicious activity. The methods and system disclosed can be used for categorizing other types of social network objects based on their association with a type of malicious activity, for example, users, events, and content.
-
Citations
20 Claims
-
1. A computer implemented method comprising:
-
storing a plurality of events and user interactions performed by users of a social networking system with the plurality of events; associating a set of events of the plurality of events with a category; selecting a set of users associated with the set of events, comprising, for each event from the set of events; identifying users performing user interactions with the event, for each identified user, determining a measure of user interactions of the user with the event, wherein the measure of user interactions of the user with the event is based on a frequency of interaction of the user with the event, and including the user in the set of users, responsive to the measure of user interactions of the user with the event exceeding a threshold; selecting a set of candidate events associated with the set of users, based on user interactions of users from the set of users with the candidate events, wherein each candidate event associated with a selected user is selected responsive to interactions of the selected user with the candidate event exceeding a second threshold; determining whether each candidate event is associated with the category based on keyword occurrences in content associated with each candidate event; and providing information describing a particular event to a user for performing an action, the information provided based on the category. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product comprising a non-transitory computer-readable storage medium storing computer-executable code comprising instructions for:
-
storing a plurality of events and user interactions performed by users of a social networking system with the plurality of events; associating a set of events of the plurality of events with a category; selecting a set of users associated with the set of events, comprising, for each event from the set of events; identifying users performing user interactions with the event, for each identified user, determining a measure of user interactions of the user with the event, wherein the measure of user interactions of the user with the event is based on a frequency of interaction of the user with the event, and including the user in the set of users, responsive to the measure of user interactions of the user with the event exceeding a threshold; selecting a set of candidate events associated with the set of users, based on user interactions of users from the set of users with the candidate events determining whether each candidate event is associated with the category based on keyword occurrences in content associated with each candidate event; and providing information describing a particular event to a user for performing an action, the information provided based on the category. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer system comprising:
-
a computer processor; a non-transitory computer readable storage medium, storing instructions program product comprising a non-transitory computer-readable storage medium storing instructions for; storing a plurality of events and user interactions performed by users of a social networking system with the plurality of events; associating a set of events of the plurality of events with a category; selecting a set of users associated with the set of events, comprising, for each event from the set of events; identifying users performing user interactions with the event, for each identified user, determining a measure of user interactions of the user with the event, wherein the measure of user interactions of the user with the event is based on a frequency of interaction of the user with the event, and including the user in the set of users, responsive to the measure of user interactions of the user with the event exceeding a threshold; selecting a set of candidate events associated with the set of users, based on user interactions of users from the set of users with the candidate events determining whether each candidate event is associated with the category based on keyword occurrences in content associated with each candidate event; and providing information describing a particular event to a user for performing an action, the information provided based on the category. - View Dependent Claims (17, 18, 19, 20)
-
Specification