All-round Detection of Game Content Security Threats
Abusive Content Detection
  • Keyword Blocking
  • Intelligent Syntax Analysis
  • Hierarchical Handling of Abusive Content
  • Rapidly Extensible Algorithms
Illicit Content Detection
  • Classified Illicit Content Detection
  • Sensitive Spot Detection
  • Blur Detection
  • Anti-interference Model
Advertisement Detection
  • Classified Advertisement Recognition
  • Variation Filtering
  • Game-featured Advertisement Recognition
Typical Use Cases

Game Content Security Solution Covering Multiple Models in All Scenarios

  • Chat
    Chat
  • Personal info
    Personal info
  • Chat room
    Chat room

Detection features:

Texts
+
Images

Example:

Player nickname + player profile photo | Player nickname + player message content | Player personal signature + player message…

Description:

This player is suspected of sending advertisements. Although neither the profile photo nor the image violates rules, the profile photo may lead other players to add contact information in the player's messages.

Detection features:

Texts
+
Images

Example:

Player nickname + player profile photo | Player personal signature + player album | Player nickname +player album

Description:

This player is suspected of sending pornographic advertisements and spreading pornography by inducing other players through private chats to view the album and add contact information in the album.

Detection features:

Texts
+
Texts

Example:

Room name + room owner signature | Room name + room owner nickname | Message content in a room +player nickname

Description:

This player is suspected of sending pornographic advertisements and spreading pornography by using the room name to induce other players to view the nickname and add contact information.

Industry-leading Game Content Security Operation System
Content Moderation Service
Data management system
Collects whole-process statistics regarding detection, moderation, defense, and feedback, forming a systematic data management system.
Operation feedback system
Supports custom policy systems and provides a feedback entry for false negatives and false positives, thereby establishing a closed-loop process for problem handling.
Policy management system
With ACE's powerful content library, allows vendors to customize defense policies such as allowing and blocking certain content.
Content detection system
Comprehensively and accurately detects illicit content to minimize the cost of manual moderation.
Manual moderation system
Quickly performs multiple moderations of game content and reconfirms the detection results to improve moderation accuracy.
Strengths
ace Professional security team
Provides support by ACE security experts with close to 20 years of experience.
ace Full-stack solution
Provides a one-stop solution from content detection and manual moderation to policy and data management.
ace Industry-leading technology
Delivers high detection accuracy and minimizes manual moderation costs with a detection solution featuring massive sample libraries and in-depth image recognition models.
ace Massive sample library
Builds a massive sample library with numerous security authentication cases from popular games.
ace Applicable to various scenarios
Detects concealed violations in multiple models of all scenarios through real-world experience of hundreds of games.
ace Dedicated game solution
Provides a game-tailored solution that detects risks of multiple violations in texts and images, including illicit content, advertisements, and malicious refunds.
Cooperation Case