CN105939485A - System and method for monitoring bullet screen service availability based on user bullet screen behaviors - Google Patents
System and method for monitoring bullet screen service availability based on user bullet screen behaviors Download PDFInfo
- Publication number
- CN105939485A CN105939485A CN201610482607.7A CN201610482607A CN105939485A CN 105939485 A CN105939485 A CN 105939485A CN 201610482607 A CN201610482607 A CN 201610482607A CN 105939485 A CN105939485 A CN 105939485A
- Authority
- CN
- China
- Prior art keywords
- barrage
- timestamp
- service
- information
- gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/431—Generation of visual interfaces for content selection or interaction; Content or additional data rendering
- H04N21/4312—Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations
- H04N21/4316—Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations for displaying supplemental content in a region of the screen, e.g. an advertisement in a separate window
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/24—Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
- H04N21/2407—Monitoring of transmitted content, e.g. distribution time, number of downloads
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/475—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/475—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
- H04N21/4756—End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for rating content, e.g. scoring a recommended movie
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/478—Supplemental services, e.g. displaying phone caller identification, shopping application
- H04N21/4788—Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a system and method for monitoring bullet screen service availability based on user bullet screen behaviors, and relates to the field of video live broadcast. The system comprises a client, a gateway and a server side. The server side comprises a bullet screen service entry, a bullet screen service exit and a bullet screen service monitoring unit. After the client obtains bullet screen contents input by users, the client sends bullet screen information to the gateway. When the bullet screen information arrives at the gateway, the gateway adds a time stamp of arriving at the gateway and sends the bullet screen information to the bullet screen service entry. After receiving the bullet screen information, the bullet screen service entry adds the time stamp of arriving at the bullet screen service entry and sends bullet screens satisfying checking rules to the bullet service exit. The bullet service exit adds the time stamp of arriving at the bullet service exit and broadcasts the bullet screens to all clients watching a current live broadcast video. According to the system and the method, in the process of watching the video live broadcast by the users, the time stamps of the nodes of the whole bullet screen service are recorded, and the availability of the bullet screen service can be monitored in real time.
Description
Technical field
The present invention relates to net cast field, be specifically related to a kind of based on user's barrage behavior
The system and method for monitoring barrage service availability.
Background technology
Net cast refers to utilize the Internet and stream media technology to carry out live, and video is because merging
The abundant elements such as image, word, sound, excellent both in sound and shape, excellent, it is increasingly becoming
The main flow expression way of the Internet.Live the referring to of Online Video utilizes Internet resource to enter
The live video direct broadcast service of row, synchronizes to be published on network by on-the-spot video capture, uses
Real-time field condition can be seen the same time on network in family.
User, during watching video live broadcast, can send barrage to express the feelings of oneself
Sense.Barrage service include user's barrage receive, process, push, direct broadcasting room relevant information statistics
Deng critical function.In order to ensure the experience of barrage function, need at each regional deployment service unit,
So there may be the many reasons such as client environment, network environment, internal services pressure, lead
Cause barrage service is unavailable or time delay is longer, affects Consumer's Experience, and therefore, barrage service can
Increasingly important with the monitoring in real time of property.
Summary of the invention
The invention aims to overcome the deficiency of above-mentioned background technology, it is provided that a kind of based on
The system and method for user's barrage behavior monitoring barrage service availability, watches video user
During live, record whole barrage and service the timestamp of each node, it is possible to monitor in real time
The availability of barrage service.
The present invention provides a kind of
System, this system includes that client, gateway and server end, described server end include that barrage takes
Business entrance, barrage service export and barrage service monitoring unit, described client obtains user
After the barrage content of input, the barrage sending the EIC equipment identification code containing encryption to gateway is believed
Breath;When the barrage information that client sends arrives gateway, gateway adds bullet in barrage information
Curtain information arrives the timestamp of gateway, is then sent to the barrage service entrance of server end;
After the barrage service entrance of described server end receives the barrage message that gateway transmits, at bullet
Curtain information adds barrage information and arrives the timestamp of barrage service entrance, it is judged that barrage information
Legitimacy, the barrage meeting verification rule is sent to the barrage of server end and services out
Mouthful;The barrage service export of server end is added barrage information in barrage information and is arrived barrage
The timestamp of service export, then to all client broadcast bullets watching current live
Curtain;
User watches the barrage content that live client receives oneself and sends, and client exists
Barrage information is added barrage information and arrives the timestamp of client, report server end
Barrage service monitoring unit, and show barrage content on the client;Barrage service monitoring list
The barrage information that unit receives includes device id, ID, the barrage content of user's input, visitor
Family end to gateway send the timestamp of barrage information, barrage information arrive gateway timestamp,
Barrage information arrives the timestamp of barrage service entrance, barrage information arrives barrage service export
Timestamp, barrage information arrive client timestamp;Barrage service monitoring unit is to bullet
Device id in curtain information, ID, the barrage content of user's input carry out legitimacy school
Test, then record the timestamp of each stage interpolation: client sends barrage information to gateway
Timestamp, barrage information arrive the timestamp of gateway, barrage information arrive barrage service into
The timestamp of mouth, barrage information arrive the timestamp of barrage service export, barrage information arrives
The timestamp of client, carries out time-out statistics in conjunction with overtime threshold set in advance, by time-out
Statistical result is reported to barrage service monitoring unit, and barrage service monitoring unit is to monitoring
Timeout logic alerts.
On the basis of technique scheme, the barrage information that described client sends to gateway
The timestamp of barrage information and some for identifying user's barrage is sent to gateway including client
The mark of behavior, mark includes: direct broadcasting room address, the barrage content of user's input, user
Uniqueness ID and the EIC equipment identification code of encryption that generates according to ad hoc rule.
On the basis of technique scheme, the create-rule of described EIC equipment identification code is: visitor
Family end sends the timestamp of barrage information+equipment application programming interface API to gateway and obtains only
One device id+random number, the EIC equipment identification code of generation is regular length, then to this equipment
Identification code is encrypted.
On the basis of technique scheme, the process of the legitimacy of described judgement barrage information
As follows: the EIC equipment identification code of encryption in barrage information to be decrypted process, then takes out it
In client send the timestamp of barrage information and Unique Device ID to gateway, verify client
Hold at zone of reasonableness, Unique Device ID whether whether gateway send the timestamp of barrage information
Compliant;If by checking, then judging whether the barrage content that user inputs meets school
Testing rule, if not meeting verification rule, then processing according to illegal barrage;If symbol
Close verification rule, then the barrage meeting verification rule is sent to the barrage service of server end
Outlet.
On the basis of technique scheme, the time-out of described barrage service monitoring unit monitors
Logic includes: time-consuming from gateway to service entrance, service logic processes time-consuming, return barrage
Content network is time-consuming, whole process is time-consuming, and computing formula is as follows:
From gateway to service entrance time-consuming=barrage information arrive the timestamp of barrage service entrance-
Barrage information arrives the timestamp of gateway;
Service logic processes time-consuming=barrage information and arrives the timestamp-barrage of barrage service export
Information arrives the timestamp of barrage service entrance;
Return barrage content network time-consuming=barrage information arrives timestamp-barrage letter of client
Breath arrives the timestamp of barrage service export;
Whole process is time-consuming=and barrage information arrives the timestamp-client of client and sends to gateway
The timestamp of barrage information.
The present invention also provide for a kind of be applicable to said system based on user's barrage behavior monitoring bullet
The method of curtain service availability, comprises the following steps:
After S1, client obtain the barrage content of user's input, send containing encryption to gateway
The barrage information of EIC equipment identification code;When the barrage information that client sends arrives gateway, net
Close the timestamp adding barrage information arrival gateway in barrage information, be then sent to service
The barrage service entrance of device end;
After S2, the barrage service entrance of server end receive the barrage message that gateway transmits,
In barrage information, add barrage information arrive the timestamp of barrage service entrance, it is judged that barrage
The legitimacy of information, is sent to the barrage service of server end by the barrage meeting verification rule
Outlet;The barrage service export of server end is added barrage information in barrage information and is arrived bullet
The timestamp of curtain service export, then to all client broadcast watching current live
Barrage;
S3, user watch the barrage content that live client receives oneself and sends, client
End adds barrage information in barrage information and arrives the timestamp of client, reports server
The barrage service monitoring unit of end, and show barrage content on the client;Barrage service is supervised
In the barrage information that control unit receives includes the barrage of device id, ID, user's input
Hold, client to gateway send the timestamp of barrage information, barrage information arrive gateway time
Between stab, barrage information arrive the timestamp of barrage service entrance, barrage information arrive barrage clothes
The timestamp of business outlet, barrage information arrive the timestamp of client;
S4, barrage service monitoring unit are to the device id in barrage information, ID, user
The barrage content of input carries out legitimacy verification, then records the time of each stage interpolation
Stamp: client to gateway send the timestamp of barrage information, barrage information arrive gateway time
Between stab, barrage information arrive the timestamp of barrage service entrance, barrage information arrive barrage clothes
The timestamp of business outlet, barrage information arrive the timestamp of client, in conjunction with set in advance
Overtime threshold carries out time-out statistics, and time-out statistical result is reported to barrage service monitoring list
Unit, the timeout logic monitored is alerted by barrage service monitoring unit.
On the basis of technique scheme, in step S1, the bullet that client sends to gateway
Curtain information includes that client sends the timestamp of barrage information and some for identifying use to gateway
The mark of family barrage behavior, mark includes: in the barrage that direct broadcasting room address, user input
Appearance, uniqueness ID of user and the EIC equipment identification code of the encryption according to ad hoc rule generation.
On the basis of technique scheme, the create-rule of described EIC equipment identification code is: visitor
Family end sends the timestamp of barrage information+equipment application programming interface API to gateway and obtains only
One device id+random number, the EIC equipment identification code of generation is regular length, then to this equipment
Identification code is encrypted.
On the basis of technique scheme, in step S2, the conjunction of described judgement barrage information
The process of method is as follows: the EIC equipment identification code of encryption in barrage information is decrypted process,
Then take out client therein and send timestamp and the Unique Device of barrage information to gateway
ID, checking client sends the timestamp of barrage information whether at zone of reasonableness, only to gateway
One device id whether compliant;If by checking, then in judging the barrage that user inputs
Holding and whether meet verification rule, if not meeting verification rule, then carrying out according to illegal barrage
Process;If meeting verification rule, then the barrage meeting verification rule is sent to server
The barrage service export of end.
On the basis of technique scheme, in step S4, barrage service monitoring unit monitors
Timeout logic include: time-consuming from gateway to service entrance, service logic process time-consuming, return
Resilience curtain content network is time-consuming, whole process time-consuming, and computing formula is as follows:
From gateway to service entrance time-consuming=barrage information arrive the timestamp of barrage service entrance-
Barrage information arrives the timestamp of gateway;
Service logic processes time-consuming=barrage information and arrives the timestamp-barrage of barrage service export
Information arrives the timestamp of barrage service entrance;
Return barrage content network time-consuming=barrage information arrives timestamp-barrage letter of client
Breath arrives the timestamp of barrage service export;
Whole process is time-consuming=and barrage information arrives the timestamp-client of client and sends to gateway
The timestamp of barrage information.
Compared with prior art, advantages of the present invention is as follows:
The present invention, during user's watching video live broadcast, records whole barrage and services each joint
The timestamp of point, submits to barrage content, client to send barrage information, server end from user
The barrage sent arrives separately at gateway, arrives service entrance, arrival service export, arrival visitor
Family end, until client display barrage content, monitors the availability of barrage service in real time.
Accompanying drawing explanation
Fig. 1 is based on user's barrage behavior monitoring barrage service availability in the embodiment of the present invention
The flow chart of method.
Detailed description of the invention
Below in conjunction with the accompanying drawings and specific embodiment the present invention is described in further detail.
The embodiment of the present invention provides a kind of based on user's barrage behavior monitoring barrage service availability
System, this system includes client, gateway and server end, and server end includes that barrage takes
Business entrance, barrage service export and barrage service monitoring unit.
Shown in Figure 1, the embodiment of the present invention provide a kind of be applicable to said system based on
The method of family barrage behavior monitoring barrage service availability, comprises the following steps:
S1, user, during watching video live broadcast, can send barrage to express oneself
Emotion, client obtain user input barrage content after, to gateway send containing encryption
The barrage information of EIC equipment identification code.
To the barrage information that gateway sends, client includes that client sends barrage information to gateway
Timestamp and some marks for identifying user's barrage behavior, mark includes: direct broadcasting room
Address, user input barrage content, uniqueness ID of user and according to ad hoc rule generate
The EIC equipment identification code of encryption.
The create-rule of EIC equipment identification code is: client sends the time of barrage information to gateway
Stamp+device A PI (Application Programming Interface, application programming interface) obtains
The Unique Device ID+ random number taken, the EIC equipment identification code of generation is regular length, the most right
This EIC equipment identification code is encrypted.
The data form of the barrage information that client sends is as follows:
When the barrage information that client sends arrives gateway, gateway adds bullet in barrage information
Curtain information arrives the timestamp of gateway, is then sent to the barrage service entrance of server end;
After S2, the barrage service entrance of server end receive the barrage message that gateway transmits,
In barrage information, add barrage information arrive the timestamp of barrage service entrance, it is judged that barrage
The legitimacy of information: the EIC equipment identification code of encryption in barrage information is decrypted process, so
Rear taking-up client therein sends timestamp and the Unique Device ID of barrage information to gateway,
Whether checking client sends the timestamp of barrage information at zone of reasonableness, Wei Yishe to gateway
Standby ID whether compliant;If by checking, then judging that the barrage content that user inputs is
No meet verification rule, if do not meet verification rule, then according to illegal barrage at
Reason;If meeting verification rule, then the barrage meeting verification rule is sent to server end
Barrage service export, barrage is added in the barrage service export of server end in barrage information
Information arrives the timestamp of barrage service export, then watches all of current live to
Client broadcast barrage.
S3, under normal circumstances, user watches the bullet that live client receives oneself and sends
Curtain content, client adds in barrage information barrage information arrival client timestamp,
Report the barrage service monitoring unit of server end immediately, and show barrage on the client
Content.
The barrage information that barrage service monitoring unit receives includes device id, ID, user
The barrage content of input, client send the timestamp of barrage information, barrage information to gateway
Arrive the timestamp of gateway, barrage information arrives the timestamp of barrage service entrance, barrage letter
Breath arrives the timestamp of barrage service export, the timestamp of barrage information arrival client.
The concrete field format of barrage information is as follows:
S4, barrage service monitoring unit are to the device id in barrage information, ID, user
The barrage content etc. of input carries out legitimacy verification, then records the time of each stage interpolation
Stamp: client to gateway send the timestamp of barrage information, barrage information arrive gateway time
Between stab, barrage information arrive the timestamp of barrage service entrance, barrage information arrive barrage clothes
The timestamp of business outlet, barrage information arrive the timestamp of client, in conjunction with set in advance
Overtime threshold carries out time-out statistics, and time-out statistical result is reported to barrage service monitoring list
Unit.
The timeout logic of barrage service monitoring unit monitors includes: consume from gateway to service entrance
Time, service logic process time-consuming, return that barrage content network is time-consuming, whole process time-consuming, calculate
Formula is as follows:
Stage_1_interval=service_entr_time-gateway_time//from gateway to
Service entrance is time-consuming
That is: from gateway to service entrance, time-consuming=barrage information arrives the time of barrage service entrance
Stamp-barrage information arrives the timestamp of gateway;
Stage_2_interval=service_ext_time-service_entr_time//service logic
Process time-consuming
That is: service logic process time-consuming=barrage information arrive the timestamp of barrage service export-
Barrage information arrives the timestamp of barrage service entrance;
In stage_3_interval=arrv_time-service_ext_time//return barrage
Content network is time-consuming
That is: return barrage content network time-consuming=barrage information arrives the timestamp-barrage of client
Information arrives the timestamp of barrage service export;
Stage_4_interval=arrv_time-time//whole process is time-consuming
That is: whole process time-consuming=barrage information arrives the timestamp-client of client and sends out to gateway
Send the timestamp of barrage information.
The timeout logic monitored is alerted by barrage service monitoring unit, and alarm mode can
Think: highlight in instrumental panel, or notified by alarm channel under specified requirements
Function director.
Those skilled in the art can carry out various modifications and variations to the embodiment of the present invention, if
If these amendment and modification within the scope of the claims in the present invention and equivalent technologies thereof, then this
A little amendments and modification are also within protection scope of the present invention.
The prior art that the content not described in detail in description is known to the skilled person.
Claims (10)
1. a system based on user's barrage behavior monitoring barrage service availability, this system
Including client, gateway and server end, it is characterised in that: described server end includes barrage
Service entrance, barrage service export and barrage service monitoring unit, described client obtains to be used
After the barrage content of family input, the barrage sending the EIC equipment identification code containing encryption to gateway is believed
Breath;When the barrage information that client sends arrives gateway, gateway adds bullet in barrage information
Curtain information arrives the timestamp of gateway, is then sent to the barrage service entrance of server end;
After the barrage service entrance of described server end receives the barrage message that gateway transmits, at bullet
Curtain information adds barrage information and arrives the timestamp of barrage service entrance, it is judged that barrage information
Legitimacy, the barrage meeting verification rule is sent to the barrage of server end and services out
Mouthful;The barrage service export of server end is added barrage information in barrage information and is arrived barrage
The timestamp of service export, then to all client broadcast bullets watching current live
Curtain;
User watches the barrage content that live client receives oneself and sends, and client exists
Barrage information is added barrage information and arrives the timestamp of client, report server end
Barrage service monitoring unit, and show barrage content on the client;Barrage service monitoring list
The barrage information that unit receives includes device id, ID, the barrage content of user's input, visitor
Family end to gateway send the timestamp of barrage information, barrage information arrive gateway timestamp,
Barrage information arrives the timestamp of barrage service entrance, barrage information arrives barrage service export
Timestamp, barrage information arrive client timestamp;Barrage service monitoring unit is to bullet
Device id in curtain information, ID, the barrage content of user's input carry out legitimacy school
Test, then record the timestamp of each stage interpolation: client sends barrage information to gateway
Timestamp, barrage information arrive the timestamp of gateway, barrage information arrive barrage service into
The timestamp of mouth, barrage information arrive the timestamp of barrage service export, barrage information arrives
The timestamp of client, carries out time-out statistics in conjunction with overtime threshold set in advance, by time-out
Statistical result is reported to barrage service monitoring unit, and barrage service monitoring unit is to monitoring
Timeout logic alerts.
2. as claimed in claim 1 based on user's barrage behavior monitoring barrage service availability
System, it is characterised in that: the barrage information that described client sends to gateway includes client
Hold and send the timestamp of barrage information and some marks for identifying user's barrage behavior to gateway
Knowing, mark includes: direct broadcasting room address, the barrage content of user's input, the uniqueness of user
ID and the EIC equipment identification code of the encryption according to ad hoc rule generation.
3. as claimed in claim 2 based on user's barrage behavior monitoring barrage service availability
System, it is characterised in that: the create-rule of described EIC equipment identification code is: client is to net
Close and send the Unique Device that timestamp+equipment application programming interface API of barrage information obtains
ID+ random number, the EIC equipment identification code of generation is regular length, then enters this EIC equipment identification code
Row encryption.
4. as claimed in claim 3 based on user's barrage behavior monitoring barrage service availability
System, it is characterised in that: the process of the legitimacy of described judgement barrage information is as follows: right
In barrage information, the EIC equipment identification code of encryption is decrypted process, then takes out client therein
Holding timestamp and the Unique Device ID sending barrage information to gateway, checking client is to gateway
Whether whether the timestamp sending barrage information meet rule at zone of reasonableness, Unique Device ID
Model;If by checking, then judge whether the barrage content that user inputs meets verification rule
Then, if not meeting verification rule, then process according to illegal barrage;If meeting school
Test rule, then the barrage that the barrage meeting verification rule is sent to server end services out
Mouthful.
5. as claimed in claim 4 based on user's barrage behavior monitoring barrage service availability
System, it is characterised in that: the timeout logic bag of described barrage service monitoring unit monitors
Include: time-consuming from gateway to service entrance, service logic processes time-consuming, return barrage content net
Network is time-consuming, whole process is time-consuming, and computing formula is as follows:
From gateway to service entrance time-consuming=barrage information arrive the timestamp of barrage service entrance-
Barrage information arrives the timestamp of gateway;
Service logic processes time-consuming=barrage information and arrives the timestamp-barrage of barrage service export
Information arrives the timestamp of barrage service entrance;
Return barrage content network time-consuming=barrage information arrives timestamp-barrage letter of client
Breath arrives the timestamp of barrage service export;
Whole process is time-consuming=and barrage information arrives the timestamp-client of client and sends to gateway
The timestamp of barrage information.
6. one kind be applicable to system according to any one of claim 1 to 5 based on user's bullet
The method of curtain behavior monitoring barrage service availability, it is characterised in that comprise the following steps:
After S1, client obtain the barrage content of user's input, send containing encryption to gateway
The barrage information of EIC equipment identification code;When the barrage information that client sends arrives gateway, net
Close the timestamp adding barrage information arrival gateway in barrage information, be then sent to service
The barrage service entrance of device end;
After S2, the barrage service entrance of server end receive the barrage message that gateway transmits,
In barrage information, add barrage information arrive the timestamp of barrage service entrance, it is judged that barrage
The legitimacy of information, is sent to the barrage service of server end by the barrage meeting verification rule
Outlet;The barrage service export of server end is added barrage information in barrage information and is arrived bullet
The timestamp of curtain service export, then to all client broadcast watching current live
Barrage;
S3, user watch the barrage content that live client receives oneself and sends, client
End adds barrage information in barrage information and arrives the timestamp of client, reports server
The barrage service monitoring unit of end, and show barrage content on the client;Barrage service is supervised
In the barrage information that control unit receives includes the barrage of device id, ID, user's input
Hold, client to gateway send the timestamp of barrage information, barrage information arrive gateway time
Between stab, barrage information arrive the timestamp of barrage service entrance, barrage information arrive barrage clothes
The timestamp of business outlet, barrage information arrive the timestamp of client;
S4, barrage service monitoring unit are to the device id in barrage information, ID, user
The barrage content of input carries out legitimacy verification, then records the time of each stage interpolation
Stamp: client to gateway send the timestamp of barrage information, barrage information arrive gateway time
Between stab, barrage information arrive the timestamp of barrage service entrance, barrage information arrive barrage clothes
The timestamp of business outlet, barrage information arrive the timestamp of client, in conjunction with set in advance
Overtime threshold carries out time-out statistics, and time-out statistical result is reported to barrage service monitoring list
Unit, the timeout logic monitored is alerted by barrage service monitoring unit.
7. as claimed in claim 6 based on user's barrage behavior monitoring barrage service availability
Method, it is characterised in that: in step S1, the barrage information bag that client sends to gateway
Include client and send the timestamp of barrage information and some for identifying user's barrage row to gateway
For mark, mark includes: direct broadcasting room address, the barrage content of user's input, user
Uniqueness ID and the EIC equipment identification code of the encryption according to ad hoc rule generation.
8. as claimed in claim 7 based on user's barrage behavior monitoring barrage service availability
Method, it is characterised in that: the create-rule of described EIC equipment identification code is: client is to net
Close and send the Unique Device that timestamp+equipment application programming interface API of barrage information obtains
ID+ random number, the EIC equipment identification code of generation is regular length, then enters this EIC equipment identification code
Row encryption.
9. as claimed in claim 8 based on user's barrage behavior monitoring barrage service availability
Method, it is characterised in that: in step S2, the mistake of the legitimacy of described judgement barrage information
Journey is as follows: the EIC equipment identification code of encryption in barrage information is decrypted process, then takes out
Client therein sends timestamp and the Unique Device ID of barrage information, checking visitor to gateway
Whether the timestamp that family end sends barrage information to gateway at zone of reasonableness, Unique Device ID is
No compliant;If by checking, then judging whether the barrage content that user inputs meets
Verification rule, if not meeting verification rule, then processes according to illegal barrage;If
Meet verification rule, then the barrage meeting verification rule is sent to the barrage clothes of server end
Business outlet.
10. can use based on user's barrage behavior monitoring barrage service as claimed in claim 9
The method of property, it is characterised in that: in step S4, the time-out of barrage service monitoring unit monitors
Logic includes: time-consuming from gateway to service entrance, service logic processes time-consuming, return barrage
Content network is time-consuming, whole process is time-consuming, and computing formula is as follows:
From gateway to service entrance time-consuming=barrage information arrive the timestamp of barrage service entrance-
Barrage information arrives the timestamp of gateway;
Service logic processes time-consuming=barrage information and arrives the timestamp-barrage of barrage service export
Information arrives the timestamp of barrage service entrance;
Return barrage content network time-consuming=barrage information arrives timestamp-barrage letter of client
Breath arrives the timestamp of barrage service export;
Whole process is time-consuming=and barrage information arrives the timestamp-client of client and sends to gateway
The timestamp of barrage information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482607.7A CN105939485B (en) | 2016-06-27 | 2016-06-27 | System and method based on user's barrage behavior monitoring barrage service availability |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610482607.7A CN105939485B (en) | 2016-06-27 | 2016-06-27 | System and method based on user's barrage behavior monitoring barrage service availability |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105939485A true CN105939485A (en) | 2016-09-14 |
CN105939485B CN105939485B (en) | 2018-11-06 |
Family
ID=56872782
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610482607.7A Active CN105939485B (en) | 2016-06-27 | 2016-06-27 | System and method based on user's barrage behavior monitoring barrage service availability |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105939485B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549856A (en) * | 2016-11-24 | 2017-03-29 | 广州华多网络科技有限公司 | A kind of method and apparatus for sending feedback data |
CN108307244A (en) * | 2018-01-09 | 2018-07-20 | 武汉斗鱼网络科技有限公司 | Barrage time limit of speech control method, storage medium, electronic equipment and system |
CN108650526A (en) * | 2018-05-18 | 2018-10-12 | 武汉斗鱼网络科技有限公司 | A kind of recognition methods, computer equipment and storage medium |
CN108712657A (en) * | 2018-04-10 | 2018-10-26 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108769719A (en) * | 2018-04-10 | 2018-11-06 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108769720A (en) * | 2018-04-10 | 2018-11-06 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108769718A (en) * | 2018-04-10 | 2018-11-06 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108965492A (en) * | 2018-06-28 | 2018-12-07 | 武汉斗鱼网络科技有限公司 | Method, storage medium, electronic equipment and the system of barrage link quality statistics |
CN109379640A (en) * | 2018-09-30 | 2019-02-22 | 武汉斗鱼网络科技有限公司 | Barrage method of calibration, device, terminal and storage medium based on chained list mode |
CN109413505A (en) * | 2018-09-30 | 2019-03-01 | 武汉斗鱼网络科技有限公司 | A kind of method of calibration, device, terminal and the storage medium of barrage data |
CN110022285A (en) * | 2018-01-08 | 2019-07-16 | 武汉斗鱼网络科技有限公司 | It is a kind of for detecting the method, apparatus and computer equipment of user information |
CN110324229A (en) * | 2018-03-30 | 2019-10-11 | 武汉斗鱼网络科技有限公司 | A kind of barrage server connection method, client and readable storage medium storing program for executing |
CN113115059A (en) * | 2021-03-29 | 2021-07-13 | 武汉斗鱼鱼乐网络科技有限公司 | Bullet screen connection monitoring method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101383941A (en) * | 2008-10-24 | 2009-03-11 | 四川长虹电器股份有限公司 | Interactive television program system and interactive television implementing method |
CN102595215A (en) * | 2012-03-12 | 2012-07-18 | 华为终端有限公司 | Method, device and communication system for program information communication |
CN105100926A (en) * | 2015-07-06 | 2015-11-25 | 深圳市美贝壳科技有限公司 | Real-time comment method and system for user interaction television or television program |
CN105119884A (en) * | 2015-07-10 | 2015-12-02 | 深圳市美贝壳科技有限公司 | Method for verifying authority of network communication user |
CN105430161A (en) * | 2015-10-29 | 2016-03-23 | 小米科技有限责任公司 | Message processing method and device |
-
2016
- 2016-06-27 CN CN201610482607.7A patent/CN105939485B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101383941A (en) * | 2008-10-24 | 2009-03-11 | 四川长虹电器股份有限公司 | Interactive television program system and interactive television implementing method |
CN102595215A (en) * | 2012-03-12 | 2012-07-18 | 华为终端有限公司 | Method, device and communication system for program information communication |
CN105100926A (en) * | 2015-07-06 | 2015-11-25 | 深圳市美贝壳科技有限公司 | Real-time comment method and system for user interaction television or television program |
CN105119884A (en) * | 2015-07-10 | 2015-12-02 | 深圳市美贝壳科技有限公司 | Method for verifying authority of network communication user |
CN105430161A (en) * | 2015-10-29 | 2016-03-23 | 小米科技有限责任公司 | Message processing method and device |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106549856B (en) * | 2016-11-24 | 2019-08-20 | 广州华多网络科技有限公司 | A kind of method and apparatus sending feedback data |
CN106549856A (en) * | 2016-11-24 | 2017-03-29 | 广州华多网络科技有限公司 | A kind of method and apparatus for sending feedback data |
CN110022285A (en) * | 2018-01-08 | 2019-07-16 | 武汉斗鱼网络科技有限公司 | It is a kind of for detecting the method, apparatus and computer equipment of user information |
CN110022285B (en) * | 2018-01-08 | 2021-09-07 | 武汉斗鱼网络科技有限公司 | Method and device for detecting user information and computer equipment |
CN108307244A (en) * | 2018-01-09 | 2018-07-20 | 武汉斗鱼网络科技有限公司 | Barrage time limit of speech control method, storage medium, electronic equipment and system |
CN110324229A (en) * | 2018-03-30 | 2019-10-11 | 武汉斗鱼网络科技有限公司 | A kind of barrage server connection method, client and readable storage medium storing program for executing |
CN108769720A (en) * | 2018-04-10 | 2018-11-06 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108712657B (en) * | 2018-04-10 | 2020-09-04 | 武汉斗鱼网络科技有限公司 | Barrage verification method, computer equipment and storage medium |
CN108769719B (en) * | 2018-04-10 | 2020-12-15 | 武汉斗鱼网络科技有限公司 | Barrage verification method, computer equipment and storage medium |
CN108769720B (en) * | 2018-04-10 | 2020-10-16 | 武汉斗鱼网络科技有限公司 | Barrage verification method, computer equipment and storage medium |
CN108769718A (en) * | 2018-04-10 | 2018-11-06 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108769719A (en) * | 2018-04-10 | 2018-11-06 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108712657A (en) * | 2018-04-10 | 2018-10-26 | 武汉斗鱼网络科技有限公司 | A kind of barrage verification method, computer equipment and storage medium |
CN108650526B (en) * | 2018-05-18 | 2020-10-16 | 武汉斗鱼网络科技有限公司 | Identification method, computer equipment and storage medium |
CN108650526A (en) * | 2018-05-18 | 2018-10-12 | 武汉斗鱼网络科技有限公司 | A kind of recognition methods, computer equipment and storage medium |
CN108965492A (en) * | 2018-06-28 | 2018-12-07 | 武汉斗鱼网络科技有限公司 | Method, storage medium, electronic equipment and the system of barrage link quality statistics |
CN108965492B (en) * | 2018-06-28 | 2021-11-26 | 武汉斗鱼网络科技有限公司 | Bullet screen link quality statistical method, storage medium, electronic equipment and system |
CN109413505A (en) * | 2018-09-30 | 2019-03-01 | 武汉斗鱼网络科技有限公司 | A kind of method of calibration, device, terminal and the storage medium of barrage data |
CN109379640A (en) * | 2018-09-30 | 2019-02-22 | 武汉斗鱼网络科技有限公司 | Barrage method of calibration, device, terminal and storage medium based on chained list mode |
CN109379640B (en) * | 2018-09-30 | 2021-04-27 | 武汉斗鱼网络科技有限公司 | Bullet screen checking method and device based on linked list mode, terminal and storage medium |
CN109413505B (en) * | 2018-09-30 | 2021-04-27 | 武汉斗鱼网络科技有限公司 | Bullet screen data verification method and device, terminal and storage medium |
CN113115059A (en) * | 2021-03-29 | 2021-07-13 | 武汉斗鱼鱼乐网络科技有限公司 | Bullet screen connection monitoring method, device, equipment and storage medium |
CN113115059B (en) * | 2021-03-29 | 2022-07-05 | 武汉斗鱼鱼乐网络科技有限公司 | Bullet screen connection monitoring method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105939485B (en) | 2018-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105939485A (en) | System and method for monitoring bullet screen service availability based on user bullet screen behaviors | |
KR100856027B1 (en) | System for providing copyright-verified video data and method thereof | |
CN101536014B (en) | Embedded appliance for multimedia capture | |
CN108174305B (en) | The message treatment method and device of chatroom is broadcast live | |
US10762582B2 (en) | System and method of sharing content consumption information | |
CN110519177A (en) | A kind of network flow identification method and relevant device | |
CN104901863B (en) | Send the method, apparatus and system of instantly prompting message | |
US20130132170A1 (en) | System and method for generating proof of play logs in a digital signage environment | |
CN103327378B (en) | Data output method, data output routine and terminal device | |
BRPI0615423A2 (en) | methods, systems and computer program products for monitoring and analyzing signaling messages associated with the delivery of streaming media content to subscribers via a broadcast and multicast service (bcmcs) | |
CN105827480A (en) | Method, device and system for monitoring advertisement display | |
CN103905240B (en) | The active warning processing method and system of Network failure | |
CN104412605B (en) | Sending device, information processing method, program, reception device and application link system | |
CN109672582A (en) | Complete trails monitoring method, equipment, storage medium and device | |
CN106060663A (en) | Method and system for monitoring video smoothness in live video streaming process | |
CN102708170A (en) | Method and device for extracting and releasing online film and television information | |
CN103955846B (en) | The control method and device of multiple terminal intelligent feedbacks are controlled in information processing system | |
CN109495378A (en) | Detect method, apparatus, server and the storage medium of abnormal account number | |
JP6158435B2 (en) | Associating social messages with related multimedia flows | |
CN104537796B (en) | A kind of warning information processing system and processing method | |
Park et al. | IoT smart bell notification system: Design and implementation | |
CN108476337A (en) | The method and apparatus for identifying peripheral equipment from digital content | |
CN102714652A (en) | Supervision of a communication session comprising several flows over a data network | |
CN207625717U (en) | IPTV supervisory systems | |
CN111405230A (en) | Conference information processing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190117 Address after: 430000 East Lake New Technology Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4-1 Phase B4 Building 7 Floor 01 Room Patentee after: Wuhan Ouyue Netvision Co., Ltd. Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY CO., LTD. |