Reducing Photo-Tagging Spam
First Claim
1. A method comprising, by one or more computing systems:
- receiving a plurality of requests to tag a plurality of respective users in an image;
processing the plurality of requests to determine a relationship between two or more of the requests;
determining a probability that the two or more requests are illegitimate tags based on the determined relationship;
comparing the determined probability to a predetermined threshold to determine that the determined probability is greater than the predetermined threshold; and
applying one or more distribution policies to the two or more requests based on the determined probability being greater than the predetermined threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
A photo spam detector detects illegitimate non-natively captured images through extracting image features and feeding the extracted features into a probabilistic model. The probabilistic model categorizes the photo as legitimate or illegitimate. Requests to tag one or more users in a photo are analyzed by a tag analyzer that assesses relationships between the tag requests themselves, social relationships between the tagged users, and the presence or absence of faces within the regions specified by the tag requests. Based on the classification of images or tags as illegitimate, a social networking system applies one or more social media distribution policies to the image or tags to suppress or prohibit distribution.
-
Citations
20 Claims
-
1. A method comprising, by one or more computing systems:
-
receiving a plurality of requests to tag a plurality of respective users in an image; processing the plurality of requests to determine a relationship between two or more of the requests; determining a probability that the two or more requests are illegitimate tags based on the determined relationship; comparing the determined probability to a predetermined threshold to determine that the determined probability is greater than the predetermined threshold; and applying one or more distribution policies to the two or more requests based on the determined probability being greater than the predetermined threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
one or more processors; and a memory coupled to the processors comprising instructions executable by the processors, the processors being operable when executing the instructions to; receive a plurality of requests to tag a plurality of respective users in an image; process the plurality of requests to determine a relationship between two or more of the requests; determine a probability that the two or more requests are illegitimate tags based on the determined relationship; compare the determined probability to a predetermined threshold to determine that the determined probability is greater than the predetermined threshold; and apply one or more distribution policies to the two or more requests based on the determined probability being greater than the predetermined threshold. - View Dependent Claims (14, 15, 16)
-
-
17. One or more computer-readable non-transitory storage media embodying software that is operable when executed by a computing device to:
-
receive a plurality of requests to tag a plurality of respective users in an image; process the plurality of requests to determine a relationship between two or more of the requests; determine a probability that the two or more requests are illegitimate tags based on the determined relationship; compare the determined probability to a predetermined threshold to determine that the determined probability is greater than the predetermined threshold; and apply one or more distribution policies to the two or more requests based on the determined probability being greater than the predetermined threshold. - View Dependent Claims (18, 19, 20)
-
Specification