CN106028167A - Barrage display method and device - Google Patents

Barrage display method and device Download PDF

Info

Publication number
CN106028167A
CN106028167A CN201610483119.8A CN201610483119A CN106028167A CN 106028167 A CN106028167 A CN 106028167A CN 201610483119 A CN201610483119 A CN 201610483119A CN 106028167 A CN106028167 A CN 106028167A
Authority
CN
China
Prior art keywords
barrage
shielding
user
rules
data base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610483119.8A
Other languages
Chinese (zh)
Inventor
车延通
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610483119.8A priority Critical patent/CN106028167A/en
Publication of CN106028167A publication Critical patent/CN106028167A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • H04N21/4756End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for rating content, e.g. scoring a recommended movie
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/4508Management of client data or end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

Embodiments of the present invention provide a barrage display method and device. The method includes the steps of: receiving barrage entries in real time when it is detected that a first user enables a barrage function of a current video playing application; shielding corresponding barrage entries using a pre-created shielding database of the first user, wherein the shielding database includes: a first barrage shielding rule initially set by the video playing application, and/or, a second barrage shielding rule customized by the first user for one or more times previously, and/or, a third barrage shielding rule extracted from a shielding database of a second user; and displaying barrage entries which are not shielded to the first user in the video playing application. The method and device provided by embodiments of the present invention can improve the barrage shielding efficiency, and can shield related content from the barrage source before a network war begins, thereby avoiding the occurrence of the network war, and having high timeliness.

Description

The method and apparatus that a kind of barrage represents
Technical field
The present embodiments relate to video display arts field, particularly relate to a kind of method that barrage represents with And the device that a kind of barrage represents.
Background technology
Along with the development of internet video technology, increasing video player supports barrage function. By barrage function, when user sees video on the net, it can be seen that on current video picture display its The comment that he user delivers for current video, comments it is also possible to deliver on current screen picture In opinion, and the currently displayed video pictures of comment in real time oneself delivered.
Barrage function can strengthen user and watch the interest of video and interactive, but, current bullet Often there is " drawing station ", the speech of " maliciously " in curtain disorder of internal organs mutually, thus causes network war, These " draw station ", the often discordant factor of network of " maliciously ", need to shield timely.
In the prior art, typically barrage entry is shielded by following two mode:
First kind of way is, user manually shields discordant barrage entry, but in current video Appearance may persistently produce substantial amounts of barrage entry, and this mode expends the time that user is more, and impact is used Family viewing impression.
The second way is, user reports the user issuing the barrage that is discord so that this use reported Family is issued barrage and is shielded, but by this way, lean on is the spontaneous report of user, and is reported User often just reported after network war has occurred and that, ageing slowly, shield this use the most again The barrage at family has postponed.
Summary of the invention
The embodiment of the present invention provides the method and apparatus that a kind of barrage represents, and is hit by a bullet in order to solve prior art Curtain shielding mode initiative is poor, expend time length, ageing slow problem.
The embodiment of the present invention provides a kind of method that barrage represents, including:
When the barrage function that first user opens current video play-back application being detected, real-time reception Barrage entry;
Use be pre-created described first user shielding data base shield correspondence barrage entry, wherein, Described shielding data base includes: the first barrage shielding rules that video playback application program initially sets, and/ Or, first user at the first self-defining second barrage shielding rules of one or many, and/or, use from second The 3rd barrage shielding rules extracted in the shielding data base at family;
Video playback application program represents to first user and does not has shielded barrage entry.
The embodiment of the present invention provides the device that a kind of barrage represents, including:
Barrage entry receiver module, for when detecting that first user opens current video play-back application Barrage function time, real-time reception barrage entry;
Shroud module, for using the shielding data base of the described first user being pre-created to shield correspondence Barrage entry, wherein, described shielding data base include: video playback application program initially set first Barrage shielding rules, and/or, first user at the first self-defining second barrage shielding rules of one or many, And/or, the 3rd barrage shielding rules extracted from the shielding data base of the second user;
Barrage entry represents module, does not shield for representing to first user in video playback application program The barrage entry covered.
The method and apparatus that the barrage that the embodiment of the present invention provides represents, when detecting that first user is opened During the barrage function of current video play-back application, the shielding connection of first user is used to receive Barrage entry carry out automatic shield, automaticity is high, improves the efficiency of barrage shielding, and energy Related content is just shielded from barrage source, it is to avoid sending out of network war before network war does not starts Raw, ageing height.
It addition, the shielding data base of this first user can include the first barrage shielding rules of systemic presupposition And/or all previous self-defining second barrage shielding rules of user and/or the 3rd bullet of reference from fellow users Curtain shielding rules, barrage shielding rules considers the many needs of user comprehensively, and the overall user of raising sees Seeing the Consumer's Experience of video, the shielding helping user the most intimate is discord content.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under, Accompanying drawing during face describes is some embodiments of the present invention, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of steps of the embodiment of the method one that a kind of barrage of the embodiment of the present invention represents;
Fig. 2 is the flow chart of steps of the embodiment of the method two that a kind of barrage of the embodiment of the present invention represents;
Fig. 3 is the flow chart of steps of the embodiment of the method three that a kind of barrage of the embodiment of the present invention represents;
Fig. 4 is the barrage shielding rules in the embodiment of the method three that a kind of barrage of the embodiment of the present invention represents Self-defined schematic diagram is set;
Fig. 5 is the flow chart of steps of the embodiment of the method four that a kind of barrage of the embodiment of the present invention represents;
Fig. 6 is the fellow users shielding in the embodiment of the method four that a kind of barrage of the embodiment of the present invention represents Storehouse schematic diagram;
Fig. 7 is the flow chart of steps of the embodiment of the method five that a kind of barrage of the embodiment of the present invention represents;
Fig. 8 is the structured flowchart of the device embodiment that a kind of barrage of the embodiment of the present invention represents.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention, Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of protection of the invention.
With reference to Fig. 1, it is shown that the step of the embodiment of the method one that a kind of barrage of the embodiment of the present invention represents Flow chart, specifically may include steps of:
Step 101, when the barrage function that first user opens current video play-back application being detected, Real-time reception barrage entry;
Step 102, uses the shielding data base of the described first user being pre-created to shield the barrage of correspondence Entry;
Wherein, described shielding data base includes: the first barrage screen that video playback application program initially sets Cover rule, and/or, first user at the first self-defining second barrage shielding rules of one or many, and/ Or, the 3rd barrage shielding rules extracted from the shielding data base of the second user;
Step 103, represents to user in video playback application program and does not has shielded barrage entry.
In embodiments of the present invention, when detecting that first user opens the bullet of current video play-back application During curtain function, the barrage entry using the shielding connection of first user to receive carries out automatic shield, Automaticity is high, improves the efficiency of barrage shielding, and can be from bullet before network war does not starts Curtain source just shields related content, it is to avoid the generation of network war, ageing height.
It addition, the shielding data base of this first user can include the first barrage shielding rules of systemic presupposition And/or all previous self-defining second barrage shielding rules of user and/or the 3rd bullet of reference from fellow users Curtain shielding rules, barrage shielding rules considers the many needs of user comprehensively, and the overall user of raising sees Seeing the Consumer's Experience of video, the shielding helping user the most intimate is discord content.
With reference to Fig. 2, it is shown that the step of the embodiment of the method two that a kind of barrage of the embodiment of the present invention represents Flow chart, specifically may include steps of:
Step 201, when detecting that first user opens the barrage function of current video play-back application Time, real-time reception barrage entry;
In implementing, video playback application program can include video website or video app.Should Video playback application program supports barrage function, and user can be turned on and off this video playback application journey Barrage function in sequence.
When terminal detects that user opens the barrage function in video playback application program, can be real-time Receiving barrage entry, this barrage entry can be first user (i.e. active user) and/or other users The review information that the video play this video playback application program is delivered.
Accordingly, when terminal detects that user closes the barrage function in video playback application program, The most do not receive barrage entry.
Step 202, reads the shielding data base of first user;
It is applied to the embodiment of the present invention, can be that each user creates shielding data base, these shielding data Library storage is in terminal local, for terminal real-time reception is carried out automatic shield to barrage entry.
Shielding data base can include the first barrage shielding rules and/or the second barrage shielding rules and/ Or the 3rd barrage shielding rules.Wherein, this first barrage shielding rules is that video playback application program is write from memory Recognizing the shielding rules of setting, this second barrage shielding rules is that first user the most once or is for several times made by oneself The shielding rules that justice sets;3rd barrage shielding rules is from other fellow users (the i.e. second user) Shielding data base in extract shielding rules.
Step 203, if only existing the first barrage shielding rules in shielding data base, then uses described the The barrage entry that one barrage shielding rules shielding is corresponding;
In implementing, the scene only existing the first barrage shielding rules in shielding data base can be wrapped Include: first user uses video playback application program first;Or, first user is not to use first Video playback application program, but this first user the most self-defined setting barrage shielding rules (i.e. Two barrage shielding rules do not exist), from other fellow users, do not synchronize shielding rules (i.e. the yet Three barrage shielding rules do not exist).
When shielding data base only exists the first barrage shielding rules, then this first barrage is used to shield The barrage entry received is shielded by rule, thus shielding meets the bullet of the first barrage shielding rules Curtain entry.Such as, when first user uses certain video website/video APP for the first time, if opening bullet Curtain function, then terminal uses the first barrage shielding rules to shield barrage entry automatically.
In embodiments of the present invention, the first barrage shielding rules at least may include that screening type and/ Or shielding key word.As a kind of example, this screening type can include region attack type, vulgar Speech type, map big gun type (such as, soybean curd which kind of is nice, put Herba Coriandri on earth) etc.. This shielding key word can include that the dirty word key word of application program default setting, vulgar comment are crucial Word, personal attack key word, sneering at speech key word etc., such as, this shielding key word can be " rubbish Rubbish ", " chicken with several spices " etc..
It should be noted that the first barrage shielding rules is application program barrage is shielded first Defence line, road, when user opens video playback application program, enters initially with the first barrage shielding rules The barrage shielding that row is corresponding.
Step 204, represents to user in video playback application program and does not has shielded barrage entry.
From the barrage entry received, the barrage entry of correspondence is shielded according to the first barrage shielding rules After, in video playback application program to user represent be carried out masking operation after, do not shielded Barrage entry.
In embodiments of the present invention, when detecting that first user opens current video play-back application During barrage function, no matter user's the most self-defined setting shielding rules, can automatically use video to broadcast Put the barrage entry that the first barrage shielding rules shielding of application program default setting is corresponding, improve and regard Frequently the initiative that barrage is shielded by play-back application, reduces and draws the probability that station content occurs, Improve efficiency and the promptness of barrage shielding.
With reference to Fig. 3, it is shown that the step of the embodiment of the method three that a kind of barrage of the embodiment of the present invention represents Flow chart, specifically may include steps of:
Step 301, when detecting that first user opens the barrage function of current video play-back application Time, real-time reception barrage entry;
In implementing, video playback application program can include video website or video app.Should Video playback application program supports barrage function, and user can be turned on and off this video playback application journey Barrage function in sequence.
When terminal detects that user opens the barrage function in video playback application program, can be real-time Receiving barrage entry, this barrage entry can be first user (i.e. active user) and/or other users The review information that the video play this video playback application program is delivered.
Accordingly, when terminal detects that user closes the barrage function in video playback application program, The most do not receive barrage entry.
Step 302, reads the shielding data base of first user;
It is applied to the embodiment of the present invention, can be that each user creates shielding data base, these shielding data Library storage is in terminal local, for terminal real-time reception is carried out automatic shield to barrage entry.
Shielding data base can include the first barrage shielding rules and/or the second barrage shielding rules and/ Or the 3rd barrage shielding rules.Wherein, this first barrage shielding rules is that video playback application program is write from memory Recognizing the shielding rules of setting, this second barrage shielding rules is that first user the most once or is for several times made by oneself The shielding rules that justice sets;3rd barrage shielding rules is from other fellow users (the i.e. second user) Shielding data base in extract shielding rules.
Step 303, if only existing the first barrage shielding rules and the second barrage in described shielding data base Shielding rules, then use described first barrage shielding rules and described second barrage shielding rules shielding right The barrage entry answered;
In implementing, shielding data base only exists the first barrage shielding rules and the second barrage screen The scene covering rule may include that first user once or for several times in video playback application program is made by oneself Justice sets the second barrage shielding rules, but does not synchronize shielding rules (i.e. the from other fellow users Three barrage shielding rules do not exist).
Being applied to the embodiment of the present invention, shielding data base can record that user's name is identical, ip address phase With the second barrage shielding rules of all previous setting of same user, and according to follow-up self-defined set into Row real-time update is supplemented.In one embodiment, shielding data base can set up in the following way:
1, being stored in by the first barrage shielding rules of default setting in shielding data base, user is first When using video playback application program, if opening barrage function, then use the first barrage shielding rules screen Cover the barrage entry of correspondence, occur in the barrage entry on interface for having filtered the first barrage shielding rules The corresponding barrage entry after barrage entry.
If 2 users are during this video playback, the most self-defined setting the second barrage screen Cover rule, for the ease of making a distinction with follow-up self-defined setting rule, herein by this most certainly The named second barrage shielding rules 1 of the second barrage shielding rules that definition sets, follow-up self-defining Second barrage shielding rules 1 by that analogy, is then stored in shielding data base, i.e. shields by rule name Covering the shielding rules comprised in data base is first barrage shielding rules the+the second barrage shielding rules 1, this Time, the first barrage shielding rules can be used to shield corresponding barrage bar with the second barrage shielding rules 1 Mesh, occurs in the barrage entry on interface for having filtered the first barrage shielding rules and the shielding of the second barrage Barrage entry after the barrage entry of rule 1 correspondence.
3, user or opens the broadcasting of video playback application program next time during this video playback During video, the most self-defined setting the second barrage shielding rules, named second barrage screen Cover rule 2, then the second barrage shielding rules 2 is stored in shielding data base, i.e. shields data base In the shielding rules that comprises be first barrage shielding rules the+the second barrage shielding rules 1+ the second barrage screen Cover rule 2, at this point it is possible to use first barrage shielding rules the+the second barrage shielding rules 1+ second Barrage shielding rules 2 shields the barrage entry of correspondence, occurs in the barrage entry on interface for filtering The barrage of first barrage shielding rules the+the second barrage shielding rules 1+ the second barrage shielding rules 2 correspondence Barrage entry after entry.
4, when this self-defined setting the second barrage shielding rules of user N, shielding data base wraps The shielding rules contained is first barrage shielding rules the+the second barrage shielding rules 1+ the second barrage shielding rule Then 2+ ... the+the second barrage shielding rules N, then can use first barrage shielding rules the+the second barrage Shielding rules 1+ the second barrage shielding rules 2+ ... the bullet that the+the second barrage shielding rules N shielding is corresponding Curtain entry.
When shielding data base only exists the first barrage shielding rules and the second barrage shielding rules, then Use this first barrage shielding rules and the second barrage shielding rules that the barrage entry received is carried out Shielding, thus shielding meets the first barrage shielding rules and the barrage entry of the second barrage shielding rules.
In embodiments of the present invention, the first barrage shielding rules at least may include that screening type and/ Or shielding key word.As a kind of example, the screening type of this first barrage shielding rules can include Region attack type, vulgar speech type, map big gun type (such as, soybean curd which kind of be fond of eating, arrive The end, puts Herba Coriandri) etc..The shielding key word of this first barrage shielding rules can include application program The dirty word key word of default setting, vulgar comment key word, personal attack key word, sneer at speech close Keywords etc., such as, this shielding key word can be " rubbish ", " chicken with several spices " etc..
Second barrage shielding rules at least may include that screening type and/or shielding key word.As one Planting example, the barrage shielding rules of reference Fig. 4 is self-defined to be arranged shown in schematic diagram, this second barrage screen The screening type covering rule can be the type that first user is selected from list of types, such as in Fig. 4 Class1, type 2, type 3 etc.;The shielding key word of this second barrage shielding rules can be User is the key word of self-defined input in the keyword input frame of Fig. 4.
It should be noted that the first barrage shielding rules is application program barrage is shielded first Defence line, road, when user opens video playback application program, enters initially with the first barrage shielding rules The barrage shielding that row is corresponding, then uses the second barrage shielding rules to carry out the barrage shielding of correspondence.
Step 304, represents to user in video playback application program and does not has shielded barrage entry.
According to the first barrage shielding rules and the second barrage shielding rules from the barrage entry received After the barrage entry that shielding is corresponding, in video playback application program, it is carried out shielding to what user represented After operation, the barrage entry not shielded.
In embodiments of the present invention, user can shield according to oneself demand self-defined setting the second barrage Rule, this shielding data base can record the second barrage shielding rules of all previous self-defined setting of user, And dynamically update shielding data base according to the self-defined setting that user is nearest, increase what shielding rules set Motility.
It addition, this first user shielding data base include systemic presupposition the first barrage shielding rules and Second barrage shielding rules of all previous self-defined setting of user, enriches the multiformity of shielding rules with comprehensive Property, improve efficiency and the promptness of the shielding of barrage entry, improve user and watch the Consumer's Experience of video, side The shielding helping user preferably the most intimate is discord content.
With reference to Fig. 5, it is shown that the step of the embodiment of the method four that a kind of barrage of the embodiment of the present invention represents Flow chart, specifically may include steps of:
Step 501, when detecting that first user opens the barrage function of current video play-back application Time, real-time reception barrage entry;
In implementing, video playback application program can include video website or video app.Should Video playback application program supports barrage function, and user can be turned on and off this video playback application journey Barrage function in sequence.
When terminal detects that user opens the barrage function in video playback application program, can be real-time Receiving barrage entry, this barrage entry can be first user (i.e. active user) and/or other users The review information that the video play this video playback application program is delivered.
Accordingly, when terminal detects that user closes the barrage function in video playback application program, The most do not receive barrage entry.
Step 502, reads the shielding data base of first user;
It is applied to the embodiment of the present invention, can be that each user creates shielding data base, these shielding data Library storage is in terminal local, for terminal real-time reception is carried out automatic shield to barrage entry.
Shielding data base can include the first barrage shielding rules and/or the second barrage shielding rules and/ Or the 3rd barrage shielding rules.Wherein, this first barrage shielding rules is that video playback application program is write from memory Recognizing the shielding rules of setting, this second barrage shielding rules is that first user the most once or is for several times made by oneself The shielding rules that justice sets;3rd barrage shielding rules is from other fellow users (the i.e. second user) Shielding data base in extract shielding rules.
Step 503, if only existing the first barrage shielding rules and the 3rd barrage in described shielding data base Shielding rules, then use described first barrage shielding rules and described 3rd barrage shielding rules shielding right The barrage entry answered;
In implementing, shielding data base only exists the first barrage shielding rules and the 3rd barrage screen The scene covering rule may include that first user is using during video playback application program, energy Enough shielding data bases obtaining other fellow users from server, and from the shielding of other fellow users Synchronization the 3rd barrage shielding rules in data base, but this first user the most self-defined setting barrage screen Cover rule (the i.e. second barrage shielding rules does not exists).
In one embodiment, described 3rd barrage shielding rules can obtain in the following way:
Step S1, obtains the fisrt feature information of described first user;
In implementing, the fisrt feature of this first user can be read from video playback application program Information.As a kind of example of the embodiment of the present invention, fisrt feature information can include but not limited to: the One Video type information, the first video content information, first user identity information.
First Video type information can include the type of the video that first user often watches, as animation, Variety show, film, TV play, physical culture, music, documentary film, finance and economics, science and technology, information etc..
First video content information can include the video name of the video that first user often watches, such as certain The title of portion's TV play, the title etc. of certain film.
First user identity information can include the sex of first user, age, occupation, educational background, region Etc. personal information.
Step S2, according to described fisrt feature information, determines and belongs to same class bunch with described first user One or more second users;
Being applied to the embodiment of the present invention, the shielding data base of oneself can be uploaded onto the server by user, with This shielding data base is shared with other users.Server can obtain the feature of first user and other users Information, and according to the clustering algorithm that the characteristic information employing of first user and other users is default (can be Existing all clustering algorithms) cluster, belong to same kind by first user and with first user One or more second users be gathered in same class bunch.
Server obtains one or more second user (the most similar use belonging to same class bunch with first user Family) after, the mark of these one or more second users is sent to the terminal of first user.
Step S3, obtains the second feature information of the one or more the second user;
After the terminal of first user obtains the mark of one or more second users, can be from server Ask the second feature information of these one or more second users.
As a kind of example of the embodiment of the present invention, second feature information can include but not limited to: second Video type information, the second video content information, the second subscriber identity information.
Second Video type information can include the type of the video that the second user often watches, as animation, Variety show, film, TV play, physical culture, music, documentary film, finance and economics, science and technology, information etc..
Second video content information can include the video name of the video that the second user often watches, such as certain The title of portion's TV play, the title etc. of certain film.
Second subscriber identity information can include the sex of the second user, age, occupation, educational background, region Etc. personal information.
Step S4, obtains the second of described fisrt feature information and the one or more the second user respectively The matching degree of characteristic information;
After the terminal of first user obtains the second feature information of one or more second users, Ke Yifen Do not calculate the matching degree of the fisrt feature information of first user and the second feature information of each second user.
In a kind of preferred embodiment of the embodiment of the present invention, step S4 farther includes following sub-step:
Sub-step S41, calculates the of described first Video type information and described second Video type information One matching degree;
Sub-step S42, calculates the of described first video content information and described second video content information Two matching degrees;
Sub-step S43, calculates the of described first user identity information and described second subscriber identity information Three matching degrees;
Sub-step S44, respectively by described first matching degree, described second matching degree and described 3rd Degree of joining carries out summation operation after adding corresponding default weight coefficient, obtains described fisrt feature information and the The matching degree of two characteristic informations.
In implementing, the Similarity Measure algorithms such as cosine similarity can be used to calculate the first video Type information and the first matching degree of the second Video type information, and, calculate the first video content information With the second matching degree of the second video content information, and, calculate first user identity information with institute second 3rd matching degree of subscriber identity information, subsequently, to this first matching degree, the second matching degree and the 3rd Matching degree is weighted summation operation, obtains the matching degree of fisrt feature information and second feature information.
For example, it is assumed that the fisrt feature information of first user is: male, 20 years old, university students, Pekinese, Like seeing animation, variety show, film, TV play, see sea thief king recently;Certain the second user's Second feature information is: male, 20 years old, university students, people from Chongqing, like animation, information, science and technology, Finance and economics and documentary film, seeing Conan recently.
Both the first matching degrees are 10%, i.e. animation, entertainment, film, TV play, physical culture, The 10 class entries such as music, documentary film, finance and economics, science and technology, information only mate animation one;Second coupling Degree is 0%, and the video content that i.e. both are the most watching differs;3rd matching degree is 80%, i.e. property Not, age, occupation, educational background are the most identical.
If the default weight coefficient of the first matching degree is 40%, if the default weight coefficient of the second matching degree is 50%, if the default weight coefficient of the 3rd matching degree is 10%, then the fisrt feature information of this first user With the matching degree of the second feature information of this second user it is: 10%*40%+0%*50%+80%*10%=12%.
Step S5, obtains the shielding data base of the one or more the second user respectively;
Step S6, from the shielding data base of corresponding one or more second users, extracts with described The shielding rules of the quantity that matching degree is corresponding, as the 3rd barrage shielding rules.
The terminal of first user can also obtain the screen of these one or more second users from server Cover data base, and according to the matching degree of calculated fisrt feature information Yu second feature information, from The shielding data base of the second user extracts and the mating of this fisrt feature information and second feature information Spend the shielding rules of corresponding bar number, as the 3rd barrage shielding rules.
Such as, if the second feature information of the fisrt feature information of first user and a certain second user Matching degree is 12%, then can extract the shielding rules of 12% from the shielding data base of this second user As the 3rd barrage shielding rules.
It should be noted that the terminal of first user can be random from the shielding data base of the second user Extract the shielding rules with this fisrt feature information Yu the matching degree corresponding bar number of second feature information. This matching degree can also be divided into two parts, and Part I is for the shielding data base of extraction the second user In the second user-defined shielding rules, Part II for extraction the second user shielding data base In the shielding rules that synchronizes from other fellow users.Such as, be divided into 10%+2% by 12%, then from Second user-defined shielding rules extracts the content of 10%, from the second user from other similar use The shielding rules that family synchronizes extracts the content of 2%.The mode of extraction is not limited by the embodiment of the present invention Fixed.
In actual applications, when the fellow users of first user has multiple, i.e. there is multiple second user Time, the shielding rule of Corresponding matching degree can be extracted respectively from the shielding data base of multiple second users Then, in conjunction with the shielding data base of first user, form fellow users shielding storehouse.Such as, with reference to Fig. 6 Shown fellow users shielding storehouse schematic diagram, if user A is first user, its fellow users includes using Family B, user C, user D, user E, user N, user A can be from the shielding storehouse of user B The shielding rules of extraction b% in (i.e. shielding data base), extracts c%'s from the shielding storehouse of user C Shielding rules, extracts the shielding rules of d%, from the shielding storehouse of user E from the shielding storehouse of user D The shielding rules of middle extraction e%, extracts the shielding rules of n% from the shielding storehouse of user N, in conjunction with using The shielding rules in the shielding storehouse 100% of family A, forms the fellow users shielding storehouse of user A.
In another embodiment, in order to preferably improve computational efficiency, less occupied terminal is originally Ground resource, described 3rd barrage shielding rules can also middle in the server obtain, the most described 3rd bullet Curtain shielding rules can obtain in the following way:
Step S7, the terminal of first user is by the fisrt feature information of first user and first user Shielding data base send to server;
Step S8, the terminal of first user receives the 3rd barrage shielding rules that described server returns.
Specifically, server receives fisrt feature information and the screen of first user of first user After covering data base, use, according to the characteristic information of first user and other users, the clustering algorithm preset (can be existing all clustering algorithms) clusters, and belongs to by first user and with first user It is gathered in same class bunch in same type of one or more second users.Subsequently, server calculates The matching degree of the second feature information of described fisrt feature information and the one or more the second user, Concrete calculating process is: calculate described first Video type information and described second Video type information The first matching degree;Calculate the of described first video content information and described second video content information Two matching degrees;Calculate the 3rd of described first user identity information and described second subscriber identity information Degree of joining;Respectively described first matching degree, described second matching degree and described 3rd matching degree are added Carry out summation operation after corresponding default weight coefficient, obtain described fisrt feature information and second feature The matching degree of information.Finally, server is from the shielding data base of corresponding one or more second users In, extract the shielding rules of the quantity corresponding with described matching degree, return as the 3rd barrage shielding rules Terminal back to first user.
When the shielding data base of first user only exists the first barrage shielding rules and the 3rd barrage During shielding rules, then use this first barrage shielding rules and the 3rd barrage shielding rules to receiving Barrage entry shield, thus shielding meet the first barrage shielding rules and the 3rd barrage shielding The barrage entry of rule.
In embodiments of the present invention, the first barrage shielding rules at least may include that screening type and/ Or shielding key word.As a kind of example, this screening type can include region attack type, vulgar Speech type, map big gun type (such as, soybean curd which kind of is nice, put Herba Coriandri on earth) etc.. This shielding key word can include that the dirty word key word of application program default setting, vulgar comment are crucial Word, personal attack key word, sneering at speech key word etc., such as, this shielding key word can be " rubbish Rubbish ", " chicken with several spices " etc..
3rd barrage shielding rules can also include: screening type and/or shielding key word.3rd The screening type of barrage shielding rules can be the type that the second user is selected from list of types;This is years old The shielding key word of three barrage shielding rules can be the key word of the second User Defined input.
It should be noted that the first barrage shielding rules is application program barrage is shielded first Defence line, road, when user opens video playback application program, enters initially with the first barrage shielding rules The barrage shielding that row is corresponding.
Step 504, represents to user in video playback application program and does not has shielded barrage entry.
According to the first barrage shielding rules and the 3rd barrage shielding rules from the barrage entry received After the barrage entry that middle shielding is corresponding, in video playback application program, it is carried out screen to what user represented After covering operation, the barrage entry not shielded.
In embodiments of the present invention, it is possible to sort out fellow users according to the characteristic information of user, according to First user extracts respective counts from the shielding data base of fellow users with the matching degree of fellow users 3rd barrage shielding rules of amount, enriches the multiformity of shielding rules and comprehensive, improves barrage bar The efficiency of mesh shielding and promptness, improve user and watch the Consumer's Experience of video, helps user more preferable More intimate shielding is discord content.
With reference to Fig. 7, it is shown that the step of the embodiment of the method five that a kind of barrage of the embodiment of the present invention represents Flow chart, specifically may include steps of:
Step 701, when detecting that first user opens the barrage function of current video play-back application Time, real-time reception barrage entry;
Step 702, reads the shielding data base of first user;
It is applied to the embodiment of the present invention, can be that each user creates shielding data base, these shielding data Library storage is in terminal local, for terminal real-time reception is carried out automatic shield to barrage entry.
Shielding data base can include the first barrage shielding rules and/or the second barrage shielding rules and/ Or the 3rd barrage shielding rules.Wherein, this first barrage shielding rules is that video playback application program is write from memory Recognizing the shielding rules of setting, this second barrage shielding rules is that first user the most once or is for several times made by oneself The shielding rules that justice sets;3rd barrage shielding rules is from other fellow users (the i.e. second user) Shielding data base in extract shielding rules.
, if there is the first barrage shielding rules, the second barrage screen in described shielding data base in step 703 Cover rule and the 3rd barrage shielding rules, then use described first barrage shielding rules, the second barrage screen Cover rule and the barrage entry of the 3rd barrage shielding rules shielding correspondence;
In implementing, shielding data base exists the first barrage shielding rules, the second barrage shielding The scene of rule and the 3rd barrage shielding rules may include that first user once or for several times at video is broadcast Put self-defined setting the second barrage shielding rules in application program, and from other fellow users, synchronize the Three barrage shielding rules.
When shielding data base exists the first barrage shielding rules, the second barrage shielding rules and the 3rd bullet During curtain shielding rules, then use this first barrage shielding rules, the second barrage shielding rules and the 3rd bullet The barrage entry received is shielded by curtain shielding rules, thus shielding meets the shielding of this first barrage Rule, the second barrage shielding rules and the barrage entry of the 3rd barrage shielding rules.
In embodiments of the present invention, the first barrage shielding rules at least may include that screening type and/ Or shielding key word.As a kind of example, this screening type can include region attack type, vulgar Speech type, map big gun type (such as, soybean curd which kind of is nice, put Herba Coriandri on earth) etc.. This shielding key word can include that the dirty word key word of application program default setting, vulgar comment are crucial Word, personal attack key word, sneering at speech key word etc., such as, this shielding key word can be " rubbish Rubbish ", " chicken with several spices " etc..
Second barrage shielding rules at least may include that screening type and/or shielding key word.As one Planting example, the screening type of this second barrage shielding rules can be that first user selects from list of types Fixed type;The shielding key word of this second barrage shielding rules can be the self-defined input of first user Key word.
3rd barrage shielding rules at least may include that screening type and/or shielding key word.As one Planting example, the screening type of the 3rd barrage shielding rules can be that the second user selects from list of types Fixed type;The shielding key word of the 3rd barrage shielding rules can be the second User Defined input Key word.
It should be noted that the first barrage shielding rules is application program barrage is shielded first Defence line, road, when user opens video playback application program, enters initially with the first barrage shielding rules The barrage shielding that row is corresponding.
Step 704, represents to user in video playback application program and does not has shielded barrage entry.
According to the first barrage shielding rules, the second barrage shielding rules and the 3rd barrage shielding rules from connecing After the barrage entry received shields the barrage entry of correspondence, to user in video playback application program Represent be carried out masking operation after, the barrage entry not shielded.
In embodiments of the present invention, when detecting that first user opens the bullet of current video play-back application During curtain function, use the first barrage shielding rules, the second barrage shielding rules and the 3rd barrage shielding rules The barrage entry received is carried out automatic shield, and it is many that barrage shielding rules considers user comprehensively Needing, overall raising user watches the Consumer's Experience of video, helps the shielding that user is the most intimate not Harmonious content.
It addition, the embodiment of the present invention can carry out the shielding of barrage entry automatically according to shielding rules, automatically Change degree is high, improves the efficiency of barrage shielding, and just can shield before network war does not starts Related content, it is to avoid the generation of network war, ageing height.
With reference to Fig. 8, it is shown that the structural frames of the device embodiment that a kind of barrage of the embodiment of the present invention represents Figure, wherein, can pass through hardware processor (hardware processor) and come real in the embodiment of the present invention Existing related function module, specifically can include such as lower module:
Barrage entry receiver module 801, for when detecting that first user is opened current video and play application During the barrage function of program, real-time reception barrage entry;
Shroud module 802, right for using the shielding data base of the described first user being pre-created to shield The barrage entry answered, wherein, described shielding data base includes: video playback application program initially sets First barrage shielding rules, and/or, first user is in the self-defining second barrage shielding of first one or many Rule, and/or, the 3rd barrage shielding rules extracted from the shielding data base of the second user;
Barrage entry represents module 803, does not shield for representing to user in video playback application program The barrage entry covered.
In a kind of preferred embodiment of the embodiment of the present invention, described device also includes such as lower module:
Fisrt feature data obtaining module, for obtaining the fisrt feature information of described first user;
Fellow users determines module, for according to described fisrt feature information, determines and described first user Belong to one or more second users of same class bunch;
Second feature data obtaining module, for obtaining the second feature of the one or more the second user Information;
Matching degree computing module, for obtain respectively described fisrt feature information with the one or more the The matching degree of the second feature information of two users;
Second user shields storehouse acquisition module, for obtaining the screen of the one or more the second user respectively Cover data base;
3rd barrage shielding rules abstraction module, for the shielding from corresponding one or more second users In data base, extract the shielding rules of the quantity corresponding with described matching degree, as the 3rd barrage shielding rule Then.
In a kind of preferred embodiment of the embodiment of the present invention, described fisrt feature information includes the first video Type information, the first video content information, first user identity information;Described second feature information includes Second Video type information, the second video content information, the second subscriber identity information;
Described matching degree computing module includes following submodule:
First calculating sub module, is used for calculating described first Video type information and described second video type First matching degree of information;
Second calculating sub module, is used for calculating described first video content information and described second video content Second matching degree of information;
3rd calculating sub module, is used for calculating described first user identity information and described second user identity 3rd matching degree of information;
Collect submodule, for respectively by described first matching degree, described second matching degree and described the Three matching degrees carry out summation operation after adding corresponding default weight coefficient, obtain described fisrt feature information Matching degree with second feature information.
In a kind of preferred embodiment of the embodiment of the present invention, described shroud module 802 includes following submodule Block:
Shielding data base's reading submodule, for reading the shielding data base of first user;
First shielding submodule, if only exist described first barrage shielding rule in described shielding data base Then, then the barrage entry that described first barrage shielding rules shielding is corresponding is used;
Secondary shielding submodule, if only exist described first barrage shielding rule in described shielding data base Then and the second barrage shielding rules, then described first barrage shielding rules and described second barrage shielding are used The barrage entry that rule shielding is corresponding;
3rd shielding submodule, if only exist described first barrage shielding rule in described shielding data base Then and the 3rd barrage shielding rules, then described first barrage shielding rules and described 3rd barrage shielding are used The barrage entry that rule shielding is corresponding;
4th shielding submodule, if for described shielding data base in exist described first barrage shielding rules, Second barrage shielding rules and the 3rd barrage shielding rules, then use described first barrage shielding rules, Two barrage shielding rules and the barrage entry of the 3rd barrage shielding rules shielding correspondence.
In a kind of preferred embodiment of the embodiment of the present invention, described first barrage shielding rules and/or Two barrage shielding rules and/or the 3rd barrage shielding rules at least include: screening type and/or shielding are closed Keyword.
In a kind of preferred embodiment of the embodiment of the present invention, if shielding rules is described first barrage shielding Rule, the most described screening type includes region attack type, vulgar speech type.
In a kind of preferred embodiment of the embodiment of the present invention, if shielding rules is described second barrage screen Covering rule, the most described screening type is the type that described first user is selected from list of types, described Shielding key word is the key word of User Defined input.
For the device embodiment of Fig. 8, due to itself and said method embodiment basic simlarity, so Describe is fairly simple, and relevant part sees the part of embodiment of the method and illustrates.
Mobile terminal embodiment described above is only schematically, wherein said as separating component The unit illustrated can be or may not be physically separate, and the parts shown as unit are permissible It is or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of module therein can be selected according to the actual needs to realize this reality Execute the purpose of example scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, i.e. It is appreciated that and implements.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words Dividing and can embody with the form of software product, this computer software product can be stored in computer can Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (11)

1. the method that a barrage represents, it is characterised in that including:
When the barrage function that first user opens current video play-back application being detected, real-time reception Barrage entry;
Use be pre-created described first user shielding data base shield correspondence barrage entry, wherein, Described shielding data base includes: the first barrage shielding rules that video playback application program initially sets, and/ Or, first user at the first self-defining second barrage shielding rules of one or many, and/or, use from second The 3rd barrage shielding rules extracted in the shielding data base at family;
Video playback application program represents to first user and does not has shielded barrage entry.
Method the most according to claim 1, it is characterised in that described 3rd barrage shielding rules is adopted Obtain by following manner:
Obtain the fisrt feature information of described first user;
According to described fisrt feature information, determine and belong to of same class bunch or many with described first user Individual second user;
Obtain the second feature information of the one or more the second user;
Obtain the second feature information of described fisrt feature information and the one or more the second user respectively Matching degree;
Obtain the shielding data base of the one or more the second user respectively;
From the shielding data base of corresponding one or more second users, extract corresponding with described matching degree The shielding rules of quantity, as the 3rd barrage shielding rules.
Method the most according to claim 2, it is characterised in that described fisrt feature information includes One Video type information, the first video content information, first user identity information;Described second feature is believed Breath includes the second Video type information, the second video content information, the second subscriber identity information;
The described second feature calculating described fisrt feature information and the one or more the second user respectively The step of the matching degree of information includes:
Calculate the first matching degree of described first Video type information and described second Video type information;
Calculate the second matching degree of described first video content information and described second video content information;
Calculate the 3rd matching degree of described first user identity information and described second subscriber identity information;
Respectively described first matching degree, described second matching degree and described 3rd matching degree are added correspondence Default weight coefficient after carry out summation operation, obtain described fisrt feature information and second feature information Matching degree.
Method the most according to claim 1, it is characterised in that the shielding that described employing is pre-created The step of the barrage entry that data base shields correspondence includes:
Read the shielding data base of first user;
If described shielding data base only exists described first barrage shielding rules, then use described first bullet The barrage entry that curtain shielding rules shielding is corresponding;
If described shielding data base only exists described first barrage shielding rules and the second barrage shielding rule Then, then described first barrage shielding rules and the barrage of described second barrage shielding rules shielding correspondence are used Entry;
If described shielding data base only exists described first barrage shielding rules and the 3rd barrage shielding rule Then, then described first barrage shielding rules and the barrage of described 3rd barrage shielding rules shielding correspondence are used Entry;
If described shielding data base in exist described first barrage shielding rules, the second barrage shielding rules and 3rd barrage shielding rules, then use described first barrage shielding rules, the second barrage shielding rules and The barrage entry that three barrage shielding rules shieldings are corresponding.
5. according to the method described in any one of claim 1-4, it is characterised in that described first barrage screen Cover rule and/or the second barrage shielding rules and/or the 3rd barrage shielding rules at least include: screening type and / or shielding key word.
Method the most according to claim 5, it is characterised in that if shielding rules is described second bullet Curtain shielding rules, the most described screening type is the type that described first user is selected from list of types, institute State the key word that shielding key word is User Defined input.
7. the device that a barrage represents, it is characterised in that including:
Barrage entry receiver module, for when detecting that first user opens current video play-back application Barrage function time, real-time reception barrage entry;
Shroud module, for using the shielding data base of the described first user being pre-created to shield correspondence Barrage entry, wherein, described shielding data base include: video playback application program initially set first Barrage shielding rules, and/or, first user at the first self-defining second barrage shielding rules of one or many, And/or, the 3rd barrage shielding rules extracted from the shielding data base of the second user;
Barrage entry represents module, does not shield for representing to first user in video playback application program The barrage entry covered.
Device the most according to claim 7, it is characterised in that described device also includes:
Fisrt feature data obtaining module, for obtaining the fisrt feature information of described first user;
Fellow users determines module, for according to described fisrt feature information, determines and described first user Belong to one or more second users of same class bunch;
Second feature data obtaining module, for obtaining the second feature of the one or more the second user Information;
Matching degree computing module, for obtain respectively described fisrt feature information with the one or more the The matching degree of the second feature information of two users;
Second user shields storehouse acquisition module, for obtaining the screen of the one or more the second user respectively Cover data base;
3rd barrage shielding rules abstraction module, for the shielding from corresponding one or more second users In data base, extract the shielding rules of the quantity corresponding with described matching degree, as the 3rd barrage shielding rule Then.
Device the most according to claim 7, it is characterised in that described fisrt feature information includes One Video type information, the first video content information, first user identity information;Described second feature is believed Breath includes the second Video type information, the second video content information, the second subscriber identity information;
Described matching degree computing module includes:
First calculating sub module, is used for calculating described first Video type information and described second video type First matching degree of information;
Second calculating sub module, is used for calculating described first video content information and described second video content Second matching degree of information;
3rd calculating sub module, is used for calculating described first user identity information and described second user identity 3rd matching degree of information;
Collect submodule, for respectively by described first matching degree, described second matching degree and described the Three matching degrees carry out summation operation after adding corresponding default weight coefficient, obtain described fisrt feature information Matching degree with second feature information.
Device the most according to claim 7, it is characterised in that described shroud module includes:
Shielding data base's reading submodule, for reading the shielding data base of first user;
First shielding submodule, if only exist described first barrage shielding rule in described shielding data base Then, then the barrage entry that described first barrage shielding rules shielding is corresponding is used;
Secondary shielding submodule, if only exist described first barrage shielding rule in described shielding data base Then and the second barrage shielding rules, then described first barrage shielding rules and described second barrage shielding are used The barrage entry that rule shielding is corresponding;
3rd shielding submodule, if only exist described first barrage shielding rule in described shielding data base Then and the 3rd barrage shielding rules, then described first barrage shielding rules and described 3rd barrage shielding are used The barrage entry that rule shielding is corresponding;
4th shielding submodule, if for described shielding data base in exist described first barrage shielding rules, Second barrage shielding rules and the 3rd barrage shielding rules, then use described first barrage shielding rules, Two barrage shielding rules and the barrage entry of the 3rd barrage shielding rules shielding correspondence.
11. according to the device described in any one of claim 7-10, it is characterised in that described first barrage Shielding rules and/or the second barrage shielding rules and/or the 3rd barrage shielding rules at least include: screening type And/or shielding key word.
CN201610483119.8A 2016-06-27 2016-06-27 Barrage display method and device Pending CN106028167A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610483119.8A CN106028167A (en) 2016-06-27 2016-06-27 Barrage display method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610483119.8A CN106028167A (en) 2016-06-27 2016-06-27 Barrage display method and device

Publications (1)

Publication Number Publication Date
CN106028167A true CN106028167A (en) 2016-10-12

Family

ID=57085143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610483119.8A Pending CN106028167A (en) 2016-06-27 2016-06-27 Barrage display method and device

Country Status (1)

Country Link
CN (1) CN106028167A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982377A (en) * 2017-03-29 2017-07-25 武汉斗鱼网络科技有限公司 barrage management method and device
CN107896338A (en) * 2017-12-06 2018-04-10 任明和 Video content detecting and ranking method based on user reviews
CN107920272A (en) * 2017-11-14 2018-04-17 维沃移动通信有限公司 A kind of barrage screening technique, device and mobile terminal
CN108174301A (en) * 2018-01-16 2018-06-15 深圳市瑞致达科技有限公司 Terminal device barrage control method, terminal device and readable storage medium storing program for executing
CN108259977A (en) * 2018-04-13 2018-07-06 上海哔哩哔哩科技有限公司 Internet video client barrage active shield method, system and storage medium
CN108471541A (en) * 2018-02-01 2018-08-31 北京奇艺世纪科技有限公司 A kind of method and device that video barrage is shown
CN108540864A (en) * 2018-04-13 2018-09-14 上海哔哩哔哩科技有限公司 Internet video barrage cloud screen method, system and storage medium
CN108881993A (en) * 2018-06-13 2018-11-23 优视科技有限公司 A kind of screening display methods, device and the terminal device of barrage content
CN109660869A (en) * 2017-10-10 2019-04-19 武汉斗鱼网络科技有限公司 Barrage message screening method, storage medium, equipment and the system of multiterminal cooperation
CN109819304A (en) * 2017-11-22 2019-05-28 上海全土豆文化传播有限公司 Barrage methods of exhibiting and device
CN110300334A (en) * 2018-03-22 2019-10-01 上海哔哩哔哩科技有限公司 Barrage control method for playing back, server and barrage broadcasting control system
CN114745592A (en) * 2022-04-06 2022-07-12 展讯半导体(南京)有限公司 Bullet screen message display method, system, device and medium based on face recognition

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462376A (en) * 2014-12-09 2015-03-25 北京百度网讯科技有限公司 Information providing method and device for barrage media
CN105072504A (en) * 2015-08-21 2015-11-18 广州弹幕网络科技有限公司 Bullet screen play method, device and system in cinema
CN105357586A (en) * 2015-09-28 2016-02-24 北京奇艺世纪科技有限公司 Video bullet screen filtering method and device
CN105516820A (en) * 2015-12-10 2016-04-20 腾讯科技(深圳)有限公司 Barrage interaction method and device
CN105516821A (en) * 2015-12-14 2016-04-20 广州弹幕网络科技有限公司 Method and device for screening bullet screen

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462376A (en) * 2014-12-09 2015-03-25 北京百度网讯科技有限公司 Information providing method and device for barrage media
CN105072504A (en) * 2015-08-21 2015-11-18 广州弹幕网络科技有限公司 Bullet screen play method, device and system in cinema
CN105357586A (en) * 2015-09-28 2016-02-24 北京奇艺世纪科技有限公司 Video bullet screen filtering method and device
CN105516820A (en) * 2015-12-10 2016-04-20 腾讯科技(深圳)有限公司 Barrage interaction method and device
CN105516821A (en) * 2015-12-14 2016-04-20 广州弹幕网络科技有限公司 Method and device for screening bullet screen

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106982377A (en) * 2017-03-29 2017-07-25 武汉斗鱼网络科技有限公司 barrage management method and device
WO2018176835A1 (en) * 2017-03-29 2018-10-04 武汉斗鱼网络科技有限公司 Barrage management method and apparatus, memory and server
CN109660869A (en) * 2017-10-10 2019-04-19 武汉斗鱼网络科技有限公司 Barrage message screening method, storage medium, equipment and the system of multiterminal cooperation
CN107920272B (en) * 2017-11-14 2020-03-10 维沃移动通信有限公司 Bullet screen screening method and device and mobile terminal
CN107920272A (en) * 2017-11-14 2018-04-17 维沃移动通信有限公司 A kind of barrage screening technique, device and mobile terminal
CN109819304A (en) * 2017-11-22 2019-05-28 上海全土豆文化传播有限公司 Barrage methods of exhibiting and device
CN107896338A (en) * 2017-12-06 2018-04-10 任明和 Video content detecting and ranking method based on user reviews
CN107896338B (en) * 2017-12-06 2020-11-17 重庆智韬信息技术中心 Video content detection and rating method based on user comment
CN108174301A (en) * 2018-01-16 2018-06-15 深圳市瑞致达科技有限公司 Terminal device barrage control method, terminal device and readable storage medium storing program for executing
CN108471541A (en) * 2018-02-01 2018-08-31 北京奇艺世纪科技有限公司 A kind of method and device that video barrage is shown
CN110300334B (en) * 2018-03-22 2022-04-12 上海哔哩哔哩科技有限公司 Bullet screen play control method, server and bullet screen play control system
CN110300334A (en) * 2018-03-22 2019-10-01 上海哔哩哔哩科技有限公司 Barrage control method for playing back, server and barrage broadcasting control system
CN108259977A (en) * 2018-04-13 2018-07-06 上海哔哩哔哩科技有限公司 Internet video client barrage active shield method, system and storage medium
CN108540864A (en) * 2018-04-13 2018-09-14 上海哔哩哔哩科技有限公司 Internet video barrage cloud screen method, system and storage medium
CN108881993A (en) * 2018-06-13 2018-11-23 优视科技有限公司 A kind of screening display methods, device and the terminal device of barrage content
CN114745592A (en) * 2022-04-06 2022-07-12 展讯半导体(南京)有限公司 Bullet screen message display method, system, device and medium based on face recognition

Similar Documents

Publication Publication Date Title
CN106028167A (en) Barrage display method and device
CN106331778B (en) Video recommendation method and device
US11218777B2 (en) Method, device and system for processing bullet screen
KR101816113B1 (en) Estimating and displaying social interest in time-based media
US8126763B2 (en) Automatic generation of trailers containing product placements
CN102630052B (en) Real time streaming-oriented television program recommendation system
CN103747343B (en) The method and apparatus that resource is recommended at times
CN106791966B (en) A kind of direct broadcasting room recommended method and system based on modified correlation rule
CN107980129A (en) Global commending system for overlapping media catalog
US20150256633A1 (en) Generating a Platform for Social Interaction
CN106326391A (en) Method and device for recommending multimedia resources
CN109429103B (en) Method and device for recommending information, computer readable storage medium and terminal equipment
CN106961636A (en) Commodity information recommendation method and device and electronic equipment
CN108491463A (en) Label determines method and device
CN102216945A (en) Networking with media fingerprints
CN102595206A (en) Data synchronization method and device based on sport event video
CN104883627A (en) Plot movie and television, and broadcasting device and method thereof
CN103942275A (en) Video identification method and device
CN112507163A (en) Duration prediction model training method, recommendation method, device, equipment and medium
CN106487642A (en) A kind of method and apparatus of pushed information
US11817129B2 (en) 3D media elements in 2D video
CN105869009A (en) Advertisement playing method and apparatus in video
Yang et al. Natural language processing in “bullet screen” application
CN109451334A (en) User, which draws a portrait, generates processing method, device and electronic equipment
CN106658161A (en) Set-top box information push method based on connection relation and set-top box

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161012