Object Metadata
Each dedicated backend within Contextal Platform extracts metadata directly from the object data it processes. This metadata includes object- or format-specific details, providing valuable insights into the nature of the analyzed objects. Beyond the basic attributes, the metadata may also incorporate additional information derived from further data processing, such as text sentiment analysis or image content descriptions, offering a deeper understanding of the object’s context and relevance.
Backend Metadata Schemes and Version Control
Each backend utilizes its own unique metadata scheme adapted to the specific data format it handles. The only standardized entry across all backends is the _backend_version
, which is always present and indicates the version of the respective backend. This version control allows data matching and analysis to be limited to specific backend versions, which could be used to ensure compatibility with different versions of the platform.
Example Object Metadata for Graphics
"object_metadata": {
"_backend_version": "1.0.0",
"format": "png",
"height": 512,
"nsfw_predictions": {
"Drawings": 0.013125,
"Hentai": 0.000452,
"Neutral": 0.986301,
"Porn": 0.000017,
"Sexy": 0.000105
},
"nsfw_verdict": "Neutral",
"pixel_format": "RGB8",
"width": 1207
}
Example Object Metadata for a Link File
"object_metadata": {
"_backend_version": "1.0.0",
"extra_data": [],
"link_target_id_list": {
"id_list": {
"item_id_list": [
{
"RootFolderItem": {
"class_type": "0x1F",
"description": "My Computer (Computer)",
"shell_folder_id": "20d04fe0-3aea-1069-a2d8-08002b30309d",
"sort_index": 80
}
},
{
"VolumeShellItem": {
"blob": "0x2F433A5C00000000000000000000000000000000000000",
"class_type": "0x2F",
"flags": "0x0F",
"name": "C:\\"
}
},
{
"FileEntryShellItem": {
"class_type": "0x31",
"extension": [],
"file_attributes": 16,
"file_size": 0,
"flags": "0x01",
"modification_time": "(UNSET)",
"primary_name": {
"ANSI": "HelicineBotocudo"
},
"secondary_name": {
"ANSI": "R"
}
}
},
{
"FileEntryShellItem": {
"class_type": "0x32",
"extension": [],
"file_attributes": 0,
"file_size": 0,
"flags": "0x02",
"modification_time": "(UNSET)",
"primary_name": {
"ANSI": "revolutionizes.exe"
},
"secondary_name": {
"ANSI": "V"
}
}
}
]
},
"id_list_size": 281
},
"shell_link_header": {
"access_time": "Not set",
"creation_time": "Not set",
"file_attributes_flag": [],
"file_size": 0,
"header_size": 76,
"hot_key": "None",
"icon_index": 23,
"link_clsid": "00021401-0000-0000-c000-000000000046",
"link_flags": [
"HasLinkTargetIDList",
"HasName",
"HasRelativePath",
"HasArguments",
"HasIconLocation",
"IsUnicode"
],
"reserved1": 0,
"reserved2": 0,
"reserved3": 0,
"show_command": "SW_SHOWNORMAL",
"write_time": "Not set"
},
"string_data": {
"command_line_arguments": "/C \"PedalfericUnderachieving || ping semidodecagonAnthropocosmic || ruggednessIapetus\\StromateidAbelonian\\Unarbitrated.cmd unslidingCountercoup BluisnessStigmatize\"",
"icon_location": "%SystemRoot%\\System32\\shell32.dll",
"name_string": "PreconvictionCreepages chiliasmsJournalizes Massacring",
"relative_path": "..\\..\\..\\..\\..\\..\\..\\..\\HelicineBotocudo\\revolutionizes.exe"
}
}