Method and apparatus of short uniform resource locator lookup and feedback

ABSTRACT

A method of short uniform resource locator (URL) lookup and feedback of various examples may include: receiving a request related with a short URL associated with a target URL; identifying resource information of the short URL which is descriptive of credibility of network resources pointed to by the target URL; and making the resource information provided to a user. Another method of short URL lookup and feedback of various examples may include: receiving a request related with a long URL; identifying an identity of a website providing network resources pointed to by the long URL, the identity is a character string or a logo; generating a short URL which includes the identity; and making the short URL provided to the user.

RELATED DOCUMENTS

The present disclosure is a national phase application ofPCT/CN2015/072981 which claims priority of Chinese patent applicationNo. 201310689025.2 titled “method, apparatus, server and system of shortuniform resource locator presentation and feedback” and filed on Dec.16, 2013 with the Patent Office of the People's Republic of China, thedisclosure of which is incorporated by reference in its entirety.

TECHNICAL FIELD

The present disclosure relates to computer and Internet data processingtechniques, and particularly, to a method and an apparatus of shortuniform resource locator (URL) lookup and feedback.

BACKGROUND

At present, with development of Internet technology, the Internet hasbecome an important source of information for people. Webpage contentsare generally propagated among users in the form of URLs. A URL is astandard address of resources on the Internet, and is a conciserepresentation of the location and access method of resources accessiblefrom the Internet. Each file on the Internet has a respective uniqueURL. Information in the URL specifies the location of the file and how abrowser should handle the file. Generally, a regular URL is in a formatof scheme://host:port/path.

A regular URL, however, may be very long, and short URLs are thusproposed. A short URL refers to a short link mapped from a long URL, andis generally in a format of http://shortdomain/urlid. The shortdomain isthe domain name of the short URL, and the urlid is the identifier of theshort URL.

SUMMARY

Embodiments of the present disclosure provide a method, an apparatus anda storage medium of short URL lookup and feedback, to provide users withcredibility information of network resources pointed to by a target URLof a short URL.

A method of short URL lookup and feedback may include:

receiving a request related to a short URL which is associated with atarget URL;

identifying resource information of the short URL which is descriptiveof credibility of network resources pointed to by the target URL; and

making the resource information provided to a user.

A method of short URL lookup and feedback may include:

receiving a request related with a long URL;

identifying an identity of a website which provides network resourcespointed to by the long URL, the identity is a character string or alogo;

generating a short URL which includes the identity; and

making the short URL provided to a user.

An apparatus of short URL lookup and feedback may include:

a storage module, for storing resource information corresponding toshort URLs;

a lookup module, for receiving a request related with a short URL whichis associated with a target URL; identifying resource information of theshort URL in the storage module, the resource information is descriptiveof credibility of network resources pointed to by the target URL; makingthe resource information provided to a user.

An apparatus of short URL lookup and feedback may include:

a storage module, for storing an identity of a website which is acharacter string or a logo; and

a lookup module, for receiving a request related with a long URL;identifying an identity of a website providing network resources pointedto by the long URL in the storage module; generating a short URL whichincludes the identity; and making the short URL provided to a user.

A non-transitory storage medium stores computer-readable instructionscapable of causing a computer to perform the following actions:

receiving a request related to a short URL which is associated with atarget URL;

identifying resource information of the short URL which is descriptiveof credibility of network resources pointed to by the target URL; and

making the resource information provided to a user.

A non-transitory storage medium stores computer-readable instructionscapable of causing a computer to perform the following actions:

receiving a request related with a long URL;

identifying an identity of a website providing network resources pointedto by the long URL, the identity is a character string or a logo;

generating a short URL which includes the identity; and

making the short URL provided to a user.

Various embodiments of the present disclosure add an identity of awebsite which provides a target webpage into a short URL when generatingthe short URL and provide the short URL to a user to enable the user todirectly know the credibility of the target webpage pointed to by theshort URL. The user may click on the short URL to visit the webpage onlywhen displayed is webpage authentication information familiar to theuser. Various embodiments of the present disclosure also provide lookupof short URL, and provide resource information which is descriptive ofcredibility of a target URL to a user. Thus, the user may know thecredibility of the target webpage from the resource information of thetarget webpage.

BRIEF DESCRIPTION OF THE DRAWINGS

Features of the present disclosure are illustrated by way of example andnot limited in the following figures, in which like numerals indicatelike elements, in which:

FIG. 1 is a schematic diagram illustrating a system of short URL lookupand feedback;

FIG. 2 is a flowchart illustrating a method of short URL lookup andfeedback;

FIG. 3 is a flowchart illustrating a method of short URL lookup andfeedback;

FIG. 4 is a flowchart illustrating a method of presenting a short URL inaccordance with an example of the present disclosure;

FIG. 5 is a schematic diagram illustrating a user interface presenting ashort URL in accordance with an example of the present disclosure;

FIG. 6 is a schematic diagram illustrating a user interface presenting ashort URL in accordance with an example of the present disclosure;

FIG. 7 is a schematic diagram illustrating a user interface presentingintroduction information of a target webpage after detecting a firstcommand in accordance with an example of the present disclosure;

FIG. 8 is a flowchart illustrating a method of presenting a short URLand a corresponding method of responding in accordance with an exampleof the present disclosure; and

FIG. 9 is a schematic diagram illustrating a system of short URLpresentation and feedback in accordance with an example of the presentdisclosure.

DETAILED DESCRIPTIONS

For simplicity and illustrative purposes, the present disclosure isdescribed by referring mainly to an example thereof. But not allexamples are shown. Indeed, the technical mechanism may be embodied inmany different forms and should not be construed as limited to theexamples set forth herein. Rather, these examples are provided so thatthis disclosure will satisfy applicable legal requirements. In thefollowing description, numerous specific details are set forth in orderto provide a thorough understanding of the present disclosure. It willbe readily apparent however, that the present disclosure may bepracticed without limitation to these specific details. In otherinstances, some methods and structures have not been described in detailso as not to unnecessarily obscure the present disclosure. As usedherein, the term “includes” means includes but not limited to, the term“including” means including but not limited to. The term “based on”means based at least in part on. Quantities of an element, unlessspecifically mentioned, may be one or a plurality of, or at least one.

FIG. 1 is a schematic diagram illustrating a system of short URL lookupand feedback. FIG. 1 is merely an example of the present disclosure, andother examples may be implemented in different system structures.

The “resource information” as used herein refers to informationdescriptive of credibility of network resources pointed to by a targetURL corresponding to a short URL, based on which a user may decidewhether to access the network resources. For example, “resourceinformation” may be descriptive information of a website which providesthe network resources pointed to by the target URL, or introductioninformation of network resources pointed to by the target URL, or socialnetworking traffic information generated by other people visiting thenetwork resources or the website, comments of another web serviceprovider about the network resources or the website, or the like. Thesocial networking traffic information may include, within a socialnetworking platform, the amount of visits to the target URL, the amountof clicks on the target URL, the amount of forwarding of the target URL,the amount of likes of the target URL, the amount of adding the targetURL to favorites, the amount of complaints against the target URL, orthe like. In an example, the resource information may be digitallystored as a data object in a fixed format which can be delivered betweenplural network devices (e.g., via a certain message) or stored in astorage device of a network device.

As shown in FIG. 1, the system may include an apparatus 102 of short URLlookup and feedback, a third party website 104 and a client device 106,which are capable of communicating with each other through a network108. The apparatus 102 may be any computing device or plural computingdevices capable of providing short URL lookup and feedback services to auser of a remote device (e.g., the client device 106) via the network108. In an example, the apparatus 102 may be implemented by one orplural servers, e.g., a server cluster or a blade server array.Likewise, the third party website 104 may also be any computing deviceor plural computing devices, and may be implemented by one or pluralservers. The third party website 104 may provide any type of networkresources (e.g., webpages, resource downloading, e-commerce, onlinegame, or the like) to users of a remote device (e.g., client device 106)via the network 108. The third party website 104 may be configured toprovide the apparatus 102 with credibility information of the thirdparty website 104, e.g., name, domain name, type, website logo, textintroduction, traffic statistics, user statistics, qualificationcertificate, or the like, of the website. The client device 106 may beany computing device capable of communicating with the apparatus 102 viathe network 108 to obtain a short URL lookup response. The short URLlookup response may include resource information of a short URLspecified in a lookup request sent by the client device 106, or a shortURL generated by the apparatus 102 for a long URL in a lookup requestsent by the client device 106, or the like.

FIG. 2 is a schematic diagram illustrating a system of short URL lookupand feedback in accordance with an example of the present disclosure. Asshown in FIG. 2, the method may include the following procedures.

In procedure S21, an apparatus 102 of short URL lookup and feedback mayreceive a request related with a short URL which is associated with atarget URL.

In procedure S22, the apparatus 102 may identify resource information ofthe short URL which is descriptive of credibility of network resourcespointed to by the target URL.

In procedure S23, the apparatus 102 may make the resource informationprovided to a user.

In an example, the apparatus 102 may receive a request sent by a remotedevice (e.g., the client device 106) through the network 108, and therequest may include a short URL. In an example, the request may alsospecify the request is for resource information of the short URL in anexplicit or inexplicit manner. For example, the request may include amark indicating resource information lookup, or a type field in therequest may be set to be a pre-determined value which indicates resourceinformation lookup. For example, when detecting a pre-determinedoperation performed by a user on the short URL, e.g., a mouse-overevent, or the like, the client device 106 may send a request to theapparatus 102 to lookup resource information of the short URL.

In an example, the apparatus 102 may receive website descriptiveinformation provided by the third party website 104 through the network108. The website descriptive information is descriptive of credibilityof a website, e.g., name, domain name, website logo, type, textintroduction, traffic statistics, user statistics, or the like, of thewebsite. Generally, a vicious website will not proactively provide suchwebsite descriptive information. In an example, the third party website104 may generate website descriptive information in a pre-determinedformat according to pre-determined configuration information, andprovide the website descriptive information to the apparatus 102 via amessage. The apparatus 102 may check validity of the website descriptiveinformation by providing the website descriptive information to anadministrator or processing the website descriptive information using apre-determined rule (e.g., a pre-determined white list or black list ofwebsites), and store website descriptive information whose validity hasbeen testified so as to provide the website descriptive information to auser in the future. In another example, the apparatus 102 may obtaindescriptive information of a website from configuration informationpre-determined by an administrator. For example, the administrator mayset up a white list of websites, and provide the apparatus 102 withdescriptive information of credible websites as a configuration file.

In an example, the apparatus 102 may obtain statistics data which isgenerated by another web service provider according to traffic to thenetwork resources or to the website, e.g., the amount of visits to theshort URL, the amount of clicks on the short URL, the amount offorwarding of the short URL, the amount of likes of the short URL, theamount of adding the short URL into favorites, the amount of complaintsagainst the short URL, or the like, or traffic to the website whichprovides the network resources, the amount of clicks on the website, theamount of complaints against the website, or the like. In an example,the apparatus 102 may receive website descriptive information providedby the third party website 104 through the network 108. In an example,when the apparatus 102 is applied to a web service platform, theapparatus 102 may access a database of the web service platformaccording to configurations to obtain the statistics data. For example,when the apparatus 102 is applied in a social networking platform, theapparatus 102 may access user traffic statistics data of the socialnetworking platform (also referred to as social networking trafficdata). In an example, the apparatus 102 may receive comments informationabout the network resources or the website from another web serviceprovider through the network 108. The comments information may includeinformation representing credible, incredible, risky, or the like. In anexample, the comments information may be an authentication result of theshort URL obtained by a web service provider. The authentication resultmay indicate a review result of credibility of the short URL obtained bythe web service provider. For example, when the apparatus 102 is appliedto the social networking platform, the apparatus 102 may accessauthentication information of the website or of the network resourcesobtained by an operator of the social networking platform according toconfigurations, or receive the authentication information from thesocial networking platform.

In an example, the apparatus 102 may also obtain introductioninformation of the network resources via the network 108 as the resourceinformation. The introduction information of the network resources mayinclude a title, a summary, a publication data, information source, orthe like. In an example, the apparatus 102 may also obtain abstractinformation of the network resources from the network 108 using awebcrawler software as the resource information.

The above are merely a few examples of methods of obtaining resourceinformation for facilitating understanding. Other examples may usedifferent methods to obtain different forms of resource information.

In an example, the apparatus 102 may identify statistics data or commentinformation of the short URL obtained by a service provider fromresource information obtained according to the above methods based onthe short URL specified in a received request; and/or identify thewebsite providing the network resources according to the target URLcorresponding to the short URL, and identify description information ofthe website, statistics data or comment information obtained by aservice provider regarding the website, and/or identify introductioninformation of the network resources according to the target URL, or thelike.

In an example, the apparatus 102 may provide the resource informationcorresponding to the short URL to a remote device, e.g., client device106, via the network 108. In an example, the apparatus 102 may providethe remote device with all of resource information corresponding to theshort URL. In other examples, the apparatus 102 may provide the remotedevice with a selected portion of the resource information according topre-determined configuration information or according to a request fromthe remote device. For example, after determining the website is in apre-determined list of famous websites, the apparatus 102 may onlyprovide the website name, website logo, introduction information of thenetwork resources, or the like. If it is determined the website is notin the list of famous websites, the apparatus 102 may provide moredetailed resource information, e.g., website name, website domain name,website logo, website type, text introduction, traffic statistics data,user statistics data, statistics data or comment information or networkresources introduction information obtained by another web serviceprovider regarding the website or of the network resources, or the like.The above are merely examples, and other examples may select or definethe type and amount of resource information to be provided based ondifferent situations.

In an example, the apparatus 102 may have the resource informationpresented to a user, e.g., making a viewing module in a display devicepresent the resource information. The display device may be the remotedevice (e.g., the client device 106), or may be any device withdisplaying capabilities and capabilities of communicating with theremote device. In an example, the viewing module may be a web browsercapable of sending or receiving data with the apparatus 102 via thenetwork 108. The data sent or received may include, for example, alookup request for a short URL, a webpage, resource information, or thelike. In another example, the viewing module may be a special-purposeapplication (e.g., a standalone application, a programmed script, or thelike) which runs in the client device 106 and provides a user interfacedisplaying the short URL and related resource information. The viewingmodule may be implemented in any manner, e.g., hardware, software,firmware, or any combination thereof. In another example, the viewingmodule may be a web application accessible by the client device 106. Theweb application may be embodied as a series of instructions which arestored in a storage device and executable by a processor. In an example,the viewing module may be implemented by the apparatus 102. The viewingmodule may display the resource information in various forms in adisplay device, e.g., in a floating window, in a popup window, or in abubble window, or the like.

In an example, the apparatus 102 may receive a second request which isrelated with a long URL. The second request is for a short URLcorresponding to the long URL. The apparatus 102 may determine anidentity of a website providing network resources pointed to by the longURL, which may be a character string or a logo; generate a short URLwhich includes the identity; and make the short URL provided to a user.In an example, the apparatus 102 may take the character string as one ofthe following: a prefix of the domain name of the short URL, a subdomain name or a directory name of the short URL.

FIG. 3 is a schematic diagram illustrating a system of short URL lookupand feedback in accordance with an example of the present disclosure. Asshown in FIG. 3, the method may include the following procedures.

In procedure S31, the apparatus 102 may receive a request related with along URL.

In procedure S32, the apparatus 102 may identify an identity of awebsite which provides network resources pointed to by the long URL, andthe identity may be a character string or a logo.

In procedure S33, the apparatus 102 may generate a short URL whichincludes the identity.

In procedure S34, the apparatus 102 may make the resource informationprovided to a user.

In an example, the apparatus 102 may receive a request sent by a remotedevice (e.g., a client device 106) through the network 108, and therequest may include a long URL, i.e., a regular URL. In an example, therequest may also specify the request is for acquiring the short URLcorresponding to the long URL in an explicit or inexplicit manner. Forexample, the request may include a mark indicating acquiring short URL,or a type field in the request may be set to be a pre-determined valuewhich indicates acquiring short URL. For example, when detecting apre-determined operation performed by a user on the long URL, e.g., theuser inputs the long URL into a text input box, or the like, the clientdevice 106 may send a request to the apparatus 102 to lookup the shortURL corresponding to the long URL.

In an example, the apparatus 102 may obtain the identity of the websitefrom a pre-defined configuration file. In an example, the apparatus 102may receive the identity of the website provided by a third partywebsite 104 through the network 108. The third party website 104 maydetermine the length of a character string or the size of a logo of theidentity of the website according to pre-determined configurationinformation. Since the logo is used in a short URL, it may bepre-defined that the length of the character string is between 1 to 5.The types of characters allowed to be included in the character stringmay be configured, e.g., symbols, capital letters, small letters,digits, or the like.

In an example, the apparatus 102 may take the character string as one ofthe following: a prefix of the domain name of the short URL, a subdomain name or a directory name of the short URL. For example, when thewebsite identity is “qq”, the short URL generated by the apparatus 102may be http://qq.url.cn/MnQ6, or http://url.cn/qq/MnQ6, orhttp://url.cn/MnQ6/qq, or the like. When the website identity is a logo,the apparatus 102 may generate a short URL using any method, and sendingthe logo as part of the short URL to the remote device together with theshort URL. The apparatus 102 may make the logo displayed by the side ofthe short URL via a viewing module of a display device, e.g., on theleft side of the short URL, or on the right side of the short URL, orthe like.

As shown in FIG. 1, the apparatus 102 may include various implementationmanners, e.g., a processor 110, a storage device 112, a communicationinterface 114, a user interface 116 and a short URL lookup and feedbackmodule 118, to fulfill various functions described herein. The variousimplementation manners may include, for example, hardware modules (e.g.,programmable processor, logic circuits, or the like),computer-executable codes (e.g., software or firmware) in acomputer-readable storage medium (e.g., storage device 112), or thecombination thereof. The computer-executable codes may be executed by aproperly programmed processing device (e.g., processor 110). Theprocessor 110 may be implemented in various forms, e.g., microprocessor,co-processor, controller, or other processing devices includingintegrated circuit, e.g., ASIC or FPGA. In an example, the processor 110may be configured to execute instructions in storage device 112 oraccessible in other manners. Although FIG. 1 shows one processor, theprocessor 110 may include plural processors operating in parallel, e.g.,a multi-computer system. The processors may be deployed in a singlecomputing device, or distributed in plural computing devices, e.g., in aserver cluster.

The storage device 112 may include, for example, transitory storagedevice and/or non-transitory storage device. The storage device 112 maybe configured to store information, data, applications, instructions, orthe like, and capable of causing the apparatus 102 to implementfunctions of various examples. For example, the storage device 112 maycache input data to be processed by the processor 110. For example, thestorage device 112 may store instructions to be executed by theprocessor 110. The storage device 112 may include one or pluraldatabases for storing static and/or dynamic data. Therefore, the storagedevice 112 may store, e.g., descriptive information of a website,statistics data and/or comment information obtained by another webservice provider regarding the website or the short URL, introductioninformation of network resources, mapping relations between the shortURL and the long URL, or the like. The stored data may be stored and/orused by the short URL lookup and feedback module 118 when implementingthe functions of various examples.

The communication interface 114 may be implemented by various devices orvarious measures, e.g., hardware, software, firmware, or any combinationthereof. The communication interface 114 may send/receive data to/fromthe network (e.g., the network 108) or another device (e.g., the thirdparty website 104 and/or client device 106), to implement communicationfunctions of the apparatus 102. In an example, the communicationinterface 114 may be partly or fully controlled by the controller 110.The communication interface 114 may include, for example, an antenna, atransceiver, an Ethernet interface, or other hardware or softwarecapable of communicating with another device in the system (e.g., thethird party website 104 and/or client device 106). The communicationinterface 114 may be configured to enable the apparatus 102 to receiveand/or send data from/to other computing devices (e.g., the third partywebsite 104 and/or the client device 106) via any protocol through thenetwork 108. The communication interface 114 may also communicate withthe storage device 112, the user interface 116 and/or the short URLlookup and feedback module 118 via a device such as a bus, or the like.

The user interface 116 may communicate with the processor 110 to receiveuser input and provide output information to the user. The userinterface may include, for example, keyboard, mouse, display, touchscreen, speaker, microphone, and/or other input/output mechanisms. In anexample, when the apparatus 102 is implemented by a server, the userinterface may be simplified or omitted. The user interface 116 may alsocommunicate with the storage device 112, the communication interface 114and/or the short URL lookup and feedback module 118 via a device such asa bus, or the like.

The short URL lookup and feedback module 116 (simply referred to aslookup module) may be implemented by various mechanisms, e.g., hardware,software, firmware, or any combination thereof. In an example, thelookup module 118 may be implemented or controlled by the processor 110.In an example, the lookup module 118 may be a standalone module capableof communicating with the processor 110. The lookup module 118 may beconfigured to receive, process and send data and information relatedwith the above short URL lookup and feedback service. The lookup module118 may manage and store (e.g., in the storage device 112) a long URLcorresponding to a short URL, resource information of network resources.Correspondingly, the lookup module 118 may implement functions of theabove apparatus 102, to enable a user to create a short URLcorresponding to a long URL or to obtain resource information of a shortURL.

The technical mechanism is applicable to any web information serviceprocessing system, e.g., a social networking platform such as amicroblog system, or a processing system providing other web informationservices such as a website system, an Internet instant messaging system,an email system, or the like. The following examples may take amicroblog system as an example in illustration.

FIG. 4 is a schematic diagram illustrating a system of short URL lookupand feedback in accordance with an example of the present disclosure. Asshown in FIG. 4, the method may include the following procedures.

In procedure S41, authentication information of a website (i.e.,descriptive information of the website) may be stored, and socialnetworking traffic data of the target webpage may be stored.

The authentication information of the website may be inputted by adevice of each website via a specified input interface (e.g., a webpagefor submitting authentication information). The authenticationinformation may include, such as, website domain name, website logo,website identifier, website qualification certificate. The owner of thewebsite may use information familiar to users as the authenticationinformation of the website. After receiving the authenticationinformation, the system of various examples may temporarily store theauthentication information for examination by an administrator, andstore the authentication information permanently after theauthentication information passed the examination and became effective.As such, the technical mechanism can avoid intentional fraud by theowner of the website, and ensure reliability of target webpages. Theauthentication information of websites is generally stored in anauthentication database, and the social networking traffic data isstored in a social networking traffic database. The databases may beimplemented by, for example, the storage device 112. When the apparatus102 of short URL lookup and feedback is implemented by a server of a webservice platform (e.g., a social networking platform), theauthentication information may include comment information, e.g., acertification mark, provided by the provider of the short URL (i.e., theweb service platform). The certification mark may be an image, a logo,or the like. For example, if a certification mark of the system is addedafter authentication information provided by a device of the websitepassed examination by the administrator of the system, the certificationmark represents the website has passed authentication of the system andis highly safe.

In an example, besides manual authentication by an administrator, theauthentication information of the website may pass through automaticauthentication. The automatic authentication may include the followingprocedures A to C.

In procedure A, traffic data to the website and complaint data againstthe website may first be obtained. The traffic data and complaint datamay be directly obtained from related systems. For example, aconventional microblog platform may provide a statistics server forcounting the number of visits from users and keeping a journal ofcomplaints generated when the web address is propagated in the microblogplatform, and the traffic data and complaint data of the website may bedirectly obtained from the statistics server.

In procedure B, for each website whose authentication information isinputted via the input interface, a complaint ratio of the websitewithin a latest time period, e.g., the passed month, the passed week, orthe like, may be calculated. The complaint ratio may be calculatedaccording to: calculating the proportion of the number of complaintsfrom users after duplicate removal to the number of visits from usersafter duplicate removal. The higher the complaint ratio of a website is,the lower the reliability of the website is.

In procedure C, it may be judged whether the complaint ratio of eachwebsite whose authentication information was submitted exceeds athreshold, and authentication information of the website may be deletedor suspended if the complaint ratio of the website exceeds thethreshold, or the authentication information of the website becomeseffective and is permanently stored if the complaint ratio of thewebsite does not exceed the threshold. The suspension of authenticationinformation refers to the authentication information is in a state ofbeing invalid, i.e., the short URL generated in subsequent procedurescorresponding to a long URL of the website does not include theauthentication information of the website.

The automatic authentication process including the procedures A to C maybe executed at intervals to timely identify websites with abnormalcomplaint ratios and delete and ban the authentication information ofsuch websites to reduce the risks of users.

The social networking traffic data of the target webpage may includesocial networking traffic data generated in a social networkingplatform, e.g., in a microblog platform regarding the target webpage.The social networking traffic data may include data on traffic, clicks,forwarding, complaints, or the like, of the target webpage. For a newvisitor of the UGC system, the social networking traffic data mayreflect how the target webpage is perceived by other users or friends ina user generated content (UGC) system. The user can thus make a judgmentas to whether to continue visiting the target webpage. As such, thereliability of the website can be further testified, and the brandeffect of the website can be enhanced.

The social networking traffic information of the target webpage may beobtained from a conventional system. For example, a conventionalmicroblog platform may provide a statistics server which calculates dataon traffic, clicks, forwarding, complaints, or the like, of the targetwebpage, and the social networking traffic information of the targetwebpage may be directly obtained from the statistics server and thenstored for use in subsequent procedures.

In procedure S42, a long URL may be received.

For example, when a user sends a microblog, the user may input a regularURL of a target webpage, i.e., the long URL, if the user wants to putout the URL of the target webpage. For example, the user may paste acopied long URL into the page for submitting contents. After clicking ona button for submitting contents, contents of the microblog sent by theuser may be submitted to the microblog system, and the system mayreceive the contents of the microblog which includes the long URL.

In procedure S43, authentication information of the website providingthe target webpage corresponding to the long URL is looked up.

The authentication information may also be referred to as a websiteidentity, and may be a character string. A long URL is generallycomposed of: a mode (or protocol), a domain name (or server name or IPaddress), a path and a file name, e.g., “protocol://domain name/path”.The domain name or server name or IP address specifies the websiteproviding the target webpage. Various examples may identify the websiteproviding the target webpage corresponding to the long URL using thedomain name or server name or IP address or other equivalent identity,and search the authentication information stored in procedure 201 forthe authentication information of the website. For example, supposingthe authentication information of website A is a website identifier aaa,if the target webpage corresponding to the long URL inputted by the userbelongs to website A, the authentication information found out in thisprocedure may be aaa. The authentication information may also be thewebsite logo, website domain name, or the like.

In procedure S44, a short URL corresponding to the long URL may begenerated, the short URL may include the authentication information ofthe website which provides the target webpage corresponding to the longURL.

In this procedure, the long URL may first be converted into a short URLaccording to a conventional method, then the authentication informationfound in procedure 203 may be added into the short URL so that the shortURL includes the authentication information of the website providing thetarget webpage corresponding to the long URL.

For example, a long URL“http://www.mogujie.com/book/clothing/9538?from=hpc_2&fId=1hs88p0,1hw0g5o,1hwurzg”may be converted into a short URL http://url.cn/MiTbRj according to aconventional method. Supposing the authentication information found inprocedure S43 is aaa, the short URL generated may be:http://url.cn/aaa/MiTbRj, see the short URL 501 as shown in FIG. 5. Theposition of the authentication information aaa in the short URL is notlimited herein, e.g., the short URL may be http://aaa.url.cn//MiTbRj, oraaa. http://url.cn/aaa/MiTbRj. Recommendation information may be addedin addition to the authentication information, e.g.,http://url.cn//MiTbRj (aaa recommended) where the “aaa recommended” isthe recommendation information. The authentication information may alsobe the website logo, and the website logo may be added ahead of theshort URL http://url.cn//MiTbRj to form the short URL of variousexamples of the present disclosure, see the short URL formed by the logo601 and http://url.cn//MiTbRj as shown in FIG. 6.

After being generated, the short URL may replace the long URL in thecontents submitted by the user so as to make the contents meet the wordcount requirements of the microblog system. The mapping relation betweenthe long URL and the short URL may be stored, e.g., in a web addressdatabase.

In procedure S45, the short URL may be presented.

This procedure may be triggered where only the short URL is presentedwhen a user browses a webpage including a URL. For example, when a useris browsing a microblog including a URL in a microblog system, only ashort URL may be presented due to the system has a word countrequirement. As such, a short URL with authentication information ispresented to the user, and the user can directly know that the targetwebpage corresponding to the short URL is an authenticated website, thuscan make a decision on whether to click on it based on the information,and the chance of clicking on a short URL pointing to a vicious websitecan be reduced.

In procedure S46, after detecting a first command triggered through theshort URL, social networking traffic information of the target webpagecorresponding to the short URL may be found out and presented. Thetarget webpage corresponding to the short URL refers to the targetwebpage pointed to by the long URL corresponding to the short URL, i.e.,the short URL is mapped to the same target webpage with the long URL.

If the terminal used by the user is a computer with a mouse, the firstcommand may be a mouseover event triggered by moving the mouse over theshort URL. If the terminal used by the user is a portable terminal witha touch screen, the first command may generally be a touch eventtriggered by a first touch on the short URL by the user. In otherexamples, the first command may also be other specified operationcommands.

The procedure of searching for the social networking traffic informationof the target webpage corresponding to the short URL may include:searching the social networking traffic information of the targetwebpage stored in procedure S41 for the social networking trafficinformation of the target webpage, e.g., data on traffic, clicks,forwarding, complaints, or the like, of the target webpage.

As shown in FIG. 5, when it is detected that the mouse is moved over theshort URL, the lookup procedure may be triggered to obtain the socialnetworking traffic information of the target webpage, and a display box502 may be popped up by the side of the short URL. The display box 502may present the social networking traffic information of the targetwebpage, e.g., data on traffic, clicks, forwarding, complaints, or thelike, of the target webpage. In the example of FIG. 5, displayedincludes the total visits 521 and visits 522 from friends in themicroblog system.

In the example of FIG. 6, when it is detected the mouse is moved overthe short URL, the lookup procedure may be triggered to identify socialnetworking traffic information of the target webpage, and a display box602 may be popped up by the side of the short URL. The display box 602may present the social networking traffic information of the targetwebpage. In the example of FIG. 6, displayed includes the number offorwarding 621 of the target webpage in recent days and the number ofcomplaints 622.

The social networking traffic information may include information aboutthe target webpage being visited in the social network, which canfurther testify the reliability of the authentication informationassociated with the target webpage. Therefore, the user may make furtherjudgment based on the social networking traffic information. If thesocial networking traffic information confirms that the target webpagehas low reliability, the user may choose not to click on the short URL.As such, the chance of short URLs pointing to vicious websites beingclicked on can be reduced, safety of users browsing short URLs can beincreased, and risks of virus infection or user privacy leakage or thelike can be reduced.

In an example, in procedure S41, brand information of the website,introduction information of the target webpage, or the like may also besubmitted and stored. The information may be submitted by a device ofthe website. Various examples may store the inputted introductioninformation, such as website brand information, target webpageintroduction, or the like. The website brand information may include: awebsite logo, a website brief introduction, or the like. The targetwebpage introduction may include: a title, a summary of the text of thewebpage, or the like. In procedure S46, after detecting the firstcommand triggered through the short URL, introduction information of thetarget webpage corresponding to the short URL may be found out andpresented. FIG. 7 is a schematic diagram illustrating a user interfacepresenting introduction information of a target webpage after detectinga first command in accordance with an example of the present disclosure.As shown in FIG. 7, the authentication information “qq” 701 of thewebsite providing the target webpage may be added into the short URL.When it is detected the mouse is moved over the short URL, the lookupprocedure may be triggered to identify the social networking trafficinformation and introduction information of the target webpage. Then adisplay box 702 may be popped up by the side of the short URL to displaythe social networking traffic information and the introductioninformation of the target webpage. As shown in FIG. 7, displayedincludes the title 721 of the target webpage, a summary 722 of the text,the long URL 723, the total visits in recent days 724, and the totalvisits from friends 725. The website logo 726 may also be displayed.

In addition, if introduction information of the target webpage is notsubmitted by the website nor stored, the introduction information of thetarget webpage corresponding to the short URL may be not found. In thiscase, various examples may use a webcrawler to visit the target webpagecorresponding to the short URL and extract abstract information from thetarget webpage (e.g., webpage title, summary of text of the targetwebpage) as the introduction information of the target webpage. Then theextracted introduction information of the target webpage correspondingto the short URL may be displayed in the display box 702.

In an example, the social networking information of the target webpagemay also include data on traffic, clicks, forwarding, complaints, or thelike of the website providing the target webpage within the socialnetworking platform besides the data on traffic, clicks, forwarding,complaints, or the like of the target webpage within the socialnetworking platform. That is, in the example, the social networkingtraffic information may be gathered according to the two dimensions ofthe website and the webpage. Information about the website may enablevisitors to know the influence of the website providing the targetwebpage in the social networking platform and increase the capabilitiesof visitors identifying safety levels of short URLs while informationabout the webpage may enable visitors to know the attention gained bythe target webpage in the social networking platform. The socialnetworking traffic information of the website providing the targetwebpage may be obtained from a conventional system. For example, aconventional microblog platform may provide a statistics server whichcalculates data on traffic, clicks, forwarding, complaints, or the like,of the website, and the social networking traffic information of thewebsite may be directly obtained from the statistics server and thenstored for use in subsequent procedures.

In the above procedures, after generating the short URL corresponding tothe long URL, the mapping relation between the long URL and the shortURL may be stored. After procedure S46, the process may also include:after detecting a second command triggered through the short URL, thelong URL corresponding to the short URL may be obtained, and the targetwebpage corresponding to the long URL may be jumped to. Generally, ifthe terminal used by the user is a computer with a mouse, the secondcommand may be a click event of a click on the short URL using themouse. If the terminal used by the user is a portable terminal with atouch screen, the second command may be a touch event of a click or adouble-click on the short URL by the user. In other examples, the secondcommand may also be other specified operation commands.

In addition, after the second command triggered through the short URL isdetected, if the website providing the target webpage corresponding tothe short URL fails to pass the authentication, the complaint ratio ofthe website domain name may be checked. If the complaint ratio of thewebsite domain name exceeds a specified threshold, prompt informationmay be presented to inform the user of the safety risks. Such safetyalert may not be presented for a domain name that have passed real nameauthentication.

In an example, since the mapping relation between the long URL and theshort URL may be stored in the above procedures, after receiving thelong URL in procedure S42, it may first be checked whether the short URLcorresponding to the long URL has been stored. If the short URL has beenstored, the short URL may be directly obtained and the procedures S43and S44 may be skipped. If the short URL is not stored, the proceduresS43 and S44 may be performed.

In addition, since not all websites may submit and have respectiveauthentication information stored, there may be situations in procedureS43 where authentication information of a website providing the targetwebpage corresponding to the long URL cannot be found. Thus, accordingto an example, if the authentication information is not found inprocedure S43, the long URL may be converted into a short URL accordingto a conventional scheme and the procedure S44 may be skipped.

According to various examples, a short URL is generated to includeauthentication information, thereby a user can judge whether the websiteto be visited is reliable based on the short URL. When detailedinformation of a short URL is acquired, information associated with thewebsite pointed to by the short URL, such as website brand, websiteintroduction, social networking traffic to the website, or the like, isprovided to the user so that the user can decide whether to visit thewebsite. In addition, by exposing the website logo and websiteidentifier, the target website can spread its brand information in thesocial networking platform, increase exposure of contents of thewebsite. As such, various examples can bring more traffic to websitesproviding high-quality contents.

In a network system including foreground and background, the proceduresof the above methods may include procedures that may be performed at theforeground and procedures that may be performed at the background.Various examples provide a method of presenting short URL performed atthe foreground and a method of short URL feedback performed at thebackground.

FIG. 8 is a flowchart illustrating a method of presenting short URL anda corresponding method of short URL feedback in accordance with anexample of the present disclosure. As shown in FIG. 8, at the foregroundof a system, the method of presenting short URL may include thefollowing procedures.

In procedure S811, a long URL may be submitted. For example, when a usersends a microblog, the user may input a regular URL of a target webpage,i.e., the long URL, if the user wants to put out the URL of the targetwebpage. For example, the user may generally paste a long URL into thepage for submitting contents. After clicking on a button for submittingcontents, contents of the microblog sent by the user may be submitted tothe microblog system, and the system may receive the contents of themicroblog which includes the long URL at the background.

In procedure S812, a short URL including authentication information ofthe website providing the target webpage corresponding to the long URLmay be received.

This procedure may be triggered where only the short URL may bepresented when a user browses a webpage including a URL. For example,when a user is browsing a microblog including a URL in a microblogsystem, only a short URL is presented due to the system has a word countrequirement.

In procedure S813, the short URL may be presented. An example is asshown in FIGS. 5, 6 and 7.

In procedure S814, after detecting a first command triggered through theshort URL, a lookup request including the short URL may be submitted.

In procedure S815, a lookup response including social networking trafficinformation of the target webpage corresponding to the short URL may bereceived.

In procedure S816, the social networking traffic information of thetarget webpage corresponding to the short URL in the lookup response maybe presented. An example is as shown in FIGS. 5, 6 and 7.

At the background of the system, the method of short URL feedback mayinclude the following procedures.

In procedure S821, authentication information of a website may bestored, and social networking traffic information of a target webpagemay be stored.

In procedure S822, a long URL may be received. For example, a user maysubmit content of a microblog which includes a long URL to thebackground of the system through the foreground of the system, thebackground of the system may receive the long URL.

In procedure S823, authentication information of the website providingthe target webpage corresponding to the long URL may be looked up.

In procedure S824, a short URL corresponding to the long URL may begenerated, the short URL may include the authentication information ofthe website providing the target webpage corresponding to the long URL.After this procedure, the background of the system may store themicroblog which includes the short URL, and feed back the microblogwhich includes the short URL in subsequent procedure S825 after theforeground of the system sends a browse request. The background may alsostore a mapping relation between the long URL and the short URL forsubsequent lookup procedure for the long URL corresponding to the shortURL in response to a second command triggered through the short URL sentby a user. After the lookup procedure, the background may make thewebpage being browsed by the user jump to the target webpagecorresponding to the long URL.

In procedure S825, the short URL may be fed back.

In procedure S826, a lookup request including a short URL may bereceived, and social networking traffic information of the targetwebpage corresponding to the short URL may be identified.

In procedure S827, a lookup response including the social networkingtraffic information of the target webpage corresponding to the short URLmay be received.

The authentication information of a website may include at least one ofthe following: a website domain name, a website logo, a websiteidentifier, a qualification certificate of the website, or the like.

The social networking traffic information of the target webpage mayinclude at least one of: the number of visits to the target webpage froma social networking platform, the number of clicks, the number offorwarding, the number of complaints or the like of the target webpagewithin the social networking platform, the number of visits to thewebsite providing the target webpage from a social networking platform,the number of clicks, the number of forwarding, the number of complaintsor the like of the website within the social networking platform, or thelike.

The presenting method performed at the foreground may also include:obtaining the long URL corresponding to the short URL after detecting asecond command triggered through the short URL, and making the webpagejump to the target webpage corresponding to the long URL. The long URLmay be fed back to the foreground together with the short URL inprocedure S825. After detecting the second command triggered through theshort URL, the foreground may lookup the background in real time. Thebackground may identify the long URL corresponding to the short URLaccording to the mapping relation between the long URL and the shortURL, and feed back the long URL to the foreground.

In an example, the feedback method performed at the background may alsoinclude: storing introduction information of the target webpage;identifying the introduction information of the target webpagecorresponding to the short URL after receiving a lookup requestincluding the short URL, and feeding back a lookup response whichincludes social networking traffic information and introductioninformation of the target webpage corresponding to the short URL.

In an example, the feedback method may include: visiting the targetwebpage corresponding to the short URL using a webcrawler if theintroduction information of the target webpage cannot be found,extracting abstract information from the target webpage as theintroduction information of the target webpage, and feeding back alookup response including the social networking traffic information andthe introduction information of the target webpage corresponding to theshort URL.

Accordingly, in the presenting method performed at the foreground, thelookup response may also include the introduction information of thetarget webpage corresponding to the short URL. The presenting method mayalso have the introduction information of the target webpage in thelookup response presented, as shown in FIG. 7.

In various examples, the foreground of the system generally refers to aterminal capable of interacting with a user. The foreground may beimplemented by a specially designed client, e.g., in a client/server(C/S) mode, or by a web browser capable of accessing a server, e.g., ina browser/server (B/S) mode. In view of the rapid development of theInternet technology, the architecture of the system may keep evolving.The basic mechanism and the functions of the present disclosure remainsthe same irregardless of the system architecture, and the differences ofvariations of the mechanism may lie in the position of the modulesfulfilling the functions.

Corresponding to the above methods, various examples also provide anapparatus of presenting short URL which may be configured at theforeground of the system and a server of short URL feedback which may beconfigured at the background of the system. The apparatus of presentingshort URL and the apparatus of short URL feedback may compose the systemof short URL presentation and feedback. FIG. 9 is a schematic diagramillustrating a system of short URL presentation and feedback inaccordance with an example of the present disclosure. As shown in FIG.9, the apparatus of presenting short URL may include the followingmodules.

A submitting module 911 may submit a long URL.

A first receiving module 912 may receive a short URL includingauthentication information of a website providing a target webpagecorresponding to the long URL.

A first presenting module 913 may present the short URL.

A first monitoring module 914 may monitor a first command triggeredthrough the short URL, and submit a lookup request including the shortURL after detecting the first command.

A second receiving module 915 may receive a lookup response includingsocial networking traffic information of the target webpagecorresponding to the short URL.

A second presenting module 916 may present the social networking trafficinformation of the target webpage corresponding to the short URL in thelookup response.

In an example, the presenting apparatus 910 may also include a secondmonitoring module.

The second monitoring module may monitor a second command triggeredthrough the short URL, obtain a long URL corresponding to the short URLafter detecting the second command, and jump to a target webpagecorresponding to the long URL.

In an example, the lookup response may also include introductioninformation of the target webpage corresponding to the short URL. Thesecond presenting module 916 may also present the introductioninformation in the lookup response.

The server of short URL feedback may include the following modules.

A storage module 921 may store authentication information of a websiteand social networking traffic information of a target webpage.

A submission receiving module 922 may receive the long URL.

A first lookup module 923 may look up authentication information of awebsite providing a target webpage corresponding to the long URL.

A short URL generating module 924 may generate a short URL correspondingto the long URL, the short URL may include the authenticationinformation of the website providing the target webpage corresponding tothe long URL.

A short URL feedback module 925 may feed back the short URL.

A second lookup module 926 may receive a lookup request including ashort URL, and look up social networking traffic information of thetarget webpage corresponding to the short URL.

A lookup responding module 927 may feedback a lookup response includingthe social networking traffic information of the target webpagecorresponding to the short URL.

In an example, the storage module 921 may store introduction informationof the target webpage. The second lookup module 926 may look up theintroduction information of the target webpage corresponding to theshort URL after receiving the lookup request including the short URL.The lookup responding module 927 may feed back the lookup response whichincludes the social networking traffic information and the introductioninformation of the target webpage corresponding to the short URL.

In an example, the second lookup module 926 may obtain the introductioninformation of the target webpage by using a webcrawler to visit thetarget webpage corresponding to the short URL and extract abstractinformation from the target webpage as the introduction information whenthe introduction information of the target webpage is not found.

The method and system of various examples may be embedded into a thirdparty website to enable the third party website to provide the functionsof short URL presentation and feedback. The presented short URL includesan authentication mark representing the webpage has passedauthentication of an authenticator. As such, the credibility of thethird party website can be increased.

The modules of various examples may be integrated into one processingmodule, or may be standalone physical units. In other examples, two ormultiple of the above modules may be integrated into one module. Theintegrated module may be implemented by hardware or software modules.The modules of various examples may be implemented in one terminal ornetwork device, or may be implemented by plural terminals or networkdevices.

Various examples may be implemented by program codes executable by adata processing device, e.g., a computer. The program codes also formpart of the present disclosure. Program codes stored in a storage mediummay be executed by being read from the storage medium or being installedor copied into a storage device (e.g., a hard drive and/or memory) in adata process device. Thus, the storage medium is also part of thetechnical scheme. The storage medium may include paper storage medium(e.g., paper-tap and etc.), magnetic storage medium (e.g., floppy disk,hard drive, Flash card and etc.), optical storage medium (e.g., CD-ROM,and the like), magneto-optical storage medium (e.g., MO and the like)and so on.

A machine-readable storage medium is also provided, which is to storeinstructions to cause a machine to execute any of the embodiments asdisclosed herein.

The foregoing are only preferred examples of the present disclosure andare not for use in limiting the protection scope thereof. Allmodifications, equivalent replacements or improvements in accordancewith the spirit and principles of the present disclosure shall beincluded in the protection scope of the present disclosure.

The invention claimed is:
 1. A method of short uniform resource locator(URL) lookup and feedback, comprising: receiving a request related to ashort URL which is associated with a target URL; identifying resourceinformation of the short URL which is descriptive of credibility ofnetwork resources pointed to by the target URL; and making the resourceinformation provided to a user; wherein the resource informationcomprises: social networking traffic information including statisticsobtained by a social networking platform based on traffic generated byusers within the social networking platform to the network resources orto a website providing the network resources or based on feedbackinformation related with the network resources or the website made byusers of the social networking platform.
 2. The method of claim 1,wherein the resource information further comprises: descriptiveinformation of a website providing the network resources.
 3. The methodof claim 2, wherein the descriptive information of the website comprisesat least one of: a name, a domain name, a type, a logo, textintroduction, traffic statistics data, user statistics data.
 4. Themethod of claim 1, wherein the social networking traffic informationcomprises at least one of: within a social networking platform, theamount of visits to the short URL, the amount of clicks on the shortURL, the amount of forwarding of the short URL, the amount of likes ofthe short URL, the amount of the short URL being added to favorites, theamount of complaints regarding the short URL, the amount of visits tothe website providing the network resources, the amount of clicks on thewebsite, the amount of complaints regarding the website.
 5. The methodof claim 1, wherein the social networking traffic information comprisesat least one of: among contacts of a user related with the requestwithin a social networking platform, the amount of visits to the shortURL, the amount of clicks on the short URL, the amount of forwarding ofthe short URL, the amount of likes of the short URL, the amount of theshort URL being added to favorites, the amount of complaints regardingthe short URL, the amount of visits to the website providing the networkresources, the amount of clicks on the website, the amount of complaintsregarding the website; wherein the request comprises an identity of theuser in the social networking platform.
 6. The method of claim 1,wherein the resource information further comprises: an authenticationresult of authenticating the short URL performed by a web serviceprovider, the authentication result indicates a result of reviewingcredibility of the short URL by the web service provider.
 7. The methodof claim 1, wherein the resource information further comprises:introduction information of the network resources, the introductioninformation comprises at least one of: a title, an abstract of content,a publication date, and information source.
 8. The method of claim 7,further comprising: visiting the webpage pointed to by the target URLusing a webcrawler, and extracting abstract information from the webpageas the introduction information of the network resources.
 9. The methodof claim 1, further comprising: receiving a second request related witha long URL; identifying an identity of a website providing networkresources pointed to by the long URL, the identity is a character stringor a logo; generating a second short URL which includes the identity;and making the second short URL provided to a second user.
 10. Themethod of claim 9, wherein generating the second short URL comprises:using the character string as one of: a prefix of a domain name of thesecond short URL, a sub domain name of the second short URL, a directoryname of the second short URL.
 11. An apparatus of short uniform resourcelocator (URL) lookup and feedback, comprising: a storage module, forstoring resource information corresponding to short URLs; a lookupmodule, for receiving a request related with a short URL which isassociated with a target URL; identifying resource information of theshort URL in the storage module, the resource information is descriptiveof credibility of network resources pointed to by the target URL; andmaking the resource information provided to a user; wherein the resourceinformation comprises social networking traffic information includingstatistics obtained by a social networking platform based on trafficgenerated by users within the social networking platform to the networkresources or to a website providing the network resources or based onfeedback information related with the network resources or the websitemade by users of the social networking platform.
 12. The apparatus ofclaim 11, wherein the resource information further comprises at leastone of: descriptive information of a website providing the networkresources, or an authentication result of authenticating the short URLperformed by a social networking platform, the authentication resultindicates a result of reviewing credibility of the short URL by thesocial networking platform, or introduction information of the networkresources, the introduction information comprises at least one of: atitle, an abstract of content, a publication date, and informationsource.
 13. The apparatus of claim 12, wherein the descriptiveinformation of the website comprises at least one of: a name, a domainname, a type, a logo, text introduction, traffic statistics data, userstatistics data.
 14. The apparatus of claim 11, wherein the socialnetworking traffic information comprises at least one of: within asocial networking platform, the amount of visits to the short URL, theamount of clicks on the short URL, the amount of forwarding of the shortURL, the amount of likes of the short URL, the amount of the short URLbeing added to favorites, the amount of complaints regarding the shortURL, the amount of visits to the website providing the networkresources, the amount of clicks on the website, or the amount ofcomplaints regarding the website, or among contacts of a user relatedwith the request within a social networking platform, the amount ofvisits to the short URL, the amount of clicks on the short URL, theamount of forwarding of the short URL, the amount of likes of the shortURL, the amount of the short URL being added to favorites, the amount ofcomplaints regarding the short URL, the amount of visits to a websiteproviding the network resources, the amount of clicks on the website, orthe amount of complaints regarding the website; wherein the requestcomprises an identity of the user in the social networking platform. 15.The apparatus of claim 12, wherein the lookup module is for visiting thewebpage pointed to by the target URL using a webcrawler, and extractingabstract information from the webpage as the introduction information ofthe network resources.
 16. A non-transitory storage medium, storingcomputer-readable instructions capable of causing a computer to performactions of: receiving a request related to a short URL which isassociated with a target URL; identifying resource information of theshort URL which is descriptive of credibility of network resourcespointed to by the target URL; and making the resource informationprovided to a user; wherein the resource information comprises socialnetworking traffic information including statistics obtained by a socialnetworking platform based on traffic generated by users within thesocial networking platform to the network resources or to a websiteproviding the network resources or based on feedback information relatedwith the network resources or the website made by users of the socialnetworking platform.
 17. The non-transitory storage medium of claim 16,wherein the resource information further comprises at least one of:descriptive information of a website providing the network resources, oran authentication result of the short URL obtained by a socialnetworking platform, the authentication result indicates a result ofreviewing credibility of the short URL by the social networkingplatform, or introduction information of the network resources, theintroduction information comprises at least one of: a title, an abstractof content, a publication date, and information source.
 18. Thenon-transitory storage medium of claim 17, wherein the descriptiveinformation of the website comprises at least one of: a name, a domainname, a type, a logo, text introduction, traffic statistics data, userstatistics data.
 19. The non-transitory storage medium of claim 16,wherein the social networking traffic information comprises at least oneof: within a social networking platform, the amount of visits to theshort URL, the amount of clicks on the short URL, the amount offorwarding of the short URL, the amount of likes of the short URL, theamount of the short URL being added to favorites, the amount ofcomplaints regarding the short URL, the amount of visits to the websiteproviding the network resources, the amount of clicks on the website, orthe amount of complaints regarding the website, or among contacts of auser related with the request within a social networking platform, theamount of visits to the short URL, the amount of clicks on the shortURL, the amount of forwarding of the short URL, the amount of likes ofthe short URL, the amount of the short URL being added to favorites, theamount of complaints regarding the short URL, the amount of visits to awebsite providing the network resources, the amount of clicks on thewebsite, or the amount of complaints regarding the website; wherein therequest comprises an identity of the user in the social networkingplatform.