CN109241302B - Online course comment authorization method and device and terminal equipment - Google Patents

Online course comment authorization method and device and terminal equipment Download PDF

Info

Publication number
CN109241302B
CN109241302B CN201811022069.9A CN201811022069A CN109241302B CN 109241302 B CN109241302 B CN 109241302B CN 201811022069 A CN201811022069 A CN 201811022069A CN 109241302 B CN109241302 B CN 109241302B
Authority
CN
China
Prior art keywords
comment
user
preset
time
time stamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811022069.9A
Other languages
Chinese (zh)
Other versions
CN109241302A (en
Inventor
刘均
刘新
兰飞
陈宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN GOLO CHELIAN DATA TECHNOLOGY Co.,Ltd.
Original Assignee
Golo Iov Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Golo Iov Data Technology Co ltd filed Critical Golo Iov Data Technology Co ltd
Priority to CN201811022069.9A priority Critical patent/CN109241302B/en
Publication of CN109241302A publication Critical patent/CN109241302A/en
Application granted granted Critical
Publication of CN109241302B publication Critical patent/CN109241302B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education
    • G06Q50/205Education administration or guidance

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Educational Administration (AREA)
  • Educational Technology (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application is applicable to the technical field of software application, and provides a comment authorization method and device for an online course and terminal equipment, wherein the method comprises the following steps: receiving a comment request of a user, acquiring the number of courses completed by the user and the learning time of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to a preset number of courses and the learning time is greater than a first preset time; and opening the comment permission of the user when the number of the completed courses is greater than or equal to the preset course number and the learning duration is greater than the first preset duration. The method and the device can solve the problems that an existing comment anti-brushing mechanism is difficult to limit a water army to brush comments and influences the use experience of users who normally comment.

Description

Online course comment authorization method and device and terminal equipment
Technical Field
The application belongs to the technical field of software application, and particularly relates to a comment authorization method and device for an online course and terminal equipment.
Background
With the development of science and technology, people can watch videos, audios and documents in various online learning websites or software through the internet to perform remote learning.
Currently, most of online learning websites or software have the function of user comment, a user can record own learning experience in a comment column of a course or evaluate the course, and a user who newly enters the course can judge whether the course is suitable for learning by himself or herself through the description of the comment column.
However, some users are willing to hire the water army to comment on the courses released by the users themselves or comment on the courses released by the competitors badly in order to make the comment content in the course comment column seriously inconsistent with the actual situation of the course, and mislead the users who newly enter the course.
At present, the phenomenon of comment brushing is avoided mainly by limiting the comment frequency of a user, but the method cannot solve the problem fundamentally, and also has certain influence on the user who normally comments, so that the use experience of the user is influenced.
In summary, the current comment anti-brushing mechanism is difficult to limit the water force to brush comments and influences the use experience of users who normally comment.
Disclosure of Invention
In view of this, the embodiment of the application provides a comment authorization method and device for an online course and a terminal device, so as to solve the problems that the existing comment anti-refresh mechanism is difficult to limit the water army to refresh comments and affects the use experience of users who normally comment.
A first aspect of an embodiment of the present application provides a method for authorizing comments of an online course, including:
receiving a comment request of a user, acquiring the number of courses completed by the user and the learning time of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to a preset number of courses and the learning time is greater than a first preset time;
and opening the comment permission of the user when the number of the completed courses is greater than or equal to the preset course number and the learning duration is greater than the first preset duration.
A second aspect of an embodiment of the present application provides an apparatus for authorizing review of an online course, including:
the qualification evaluation module is used for receiving a comment request of a user, acquiring the number of courses completed by the user and the learning time of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to the preset number of courses and the learning time is greater than a first preset time;
and the permission opening module is used for opening the comment permission of the user when the number of courses completed is greater than or equal to the preset number of courses and the learning duration is greater than the first preset duration.
A third aspect of the embodiments of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor implements the steps of the method when executing the computer program.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium, in which a computer program is stored, which, when executed by a processor, implements the steps of the method as described above.
Compared with the prior art, the embodiment of the application has the advantages that:
according to the method for authorizing the comments of the online course, when a user wants to comment, the number of courses completed by the user and the learning duration of the user in the current course can be obtained, only when the number of courses completed by the user is larger than or equal to the preset number of courses and the learning duration of the user is larger than the first preset duration, the comment permission of the user is opened, for the user who normally comments, the requirement can be met after the user learns for a period of time, the influence on the comment is small, for the water army who swipes the comment, the time cost for swiping the comment is greatly increased, large-scale comment swiping is difficult, the phenomenon of swiping the comment is fundamentally reduced, and the problems that the existing comment anti-swiping mechanism is difficult to limit the water army to swipe the comment and the use experience of the user who normally comments is influenced are solved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic flow chart illustrating an implementation of a review authorization method for an online course according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a review authorization apparatus for an online course according to an embodiment of the present application;
fig. 3 is a schematic diagram of a terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the mobile terminals described in embodiments of the present application include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the devices described above are not portable communication devices, but rather are desktop computers having touch-sensitive surfaces (e.g., touch screen displays and/or touch pads).
In the discussion that follows, a mobile terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the mobile terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The mobile terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the mobile terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
In addition, in the description of the present application, the terms "first," "second," "third," and the like are used solely to distinguish one from another and are not to be construed as indicating or implying relative importance.
The first embodiment is as follows:
referring to fig. 1, a method for authorizing review of an online course according to an embodiment of the present application is described below, where the method for authorizing review of an online course according to the embodiment of the present application includes:
step S101, receiving a comment request of a user, obtaining the number of courses completed by the user and the learning duration of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to a preset number of courses and the learning duration is greater than a first preset duration.
And when a comment request of a user is received, acquiring the number of completed courses of the user and the learning duration of the current course of the user from background data.
When the course data is video, the learning duration is the video browsing duration, when the course data is audio, the learning duration is the audio playing duration, and when the course data is document, the learning duration is the page staying duration.
And comparing the number of courses completed by the user with the preset number of courses, comparing the learning time of the current course of the user with the first preset time, and judging whether the comment authority of the user is opened or not according to the comparison result.
The preset lesson number and the first preset time can be determined according to actual conditions, for example, the preset lesson number can be set to 2 sections, and the first preset time can be set to 1 hour.
And step S102, opening the comment authority of the user when the number of the completed courses is greater than or equal to the preset number of courses and the learning duration is greater than the first preset duration.
And opening the comment permission for the user when the number of the finished courses of the user is greater than or equal to the preset number of courses and the learning duration of the user is greater than the first preset duration.
Because most normal users can meet the requirement that the number of finished courses is greater than or equal to the preset number of courses, and the normal users generally watch the course video or listen to the course audio before commenting, the requirement that the current learning time length is greater than the first preset time length cannot influence the normal users.
Meanwhile, users with opened comment authorities are subjected to course learning in certain quantity and have certain knowledge storage, so that the quality of comment contents is high, and the referability of comments in the comment plate is improved.
For a water army brushing comments, a general method is that a whole team controls hundreds of thousands of account numbers to issue a large number of comments in a very short time, after the completion course number and the learning duration of a user are limited by the method, if the water army brushes comments through a large number of account numbers, the completion course number of each account number is required to be larger than or equal to a preset course number, and the learning duration of each account number in a current course is required to be larger than a first preset duration, so that the time cost for brushing comments by the water army is greatly improved.
Further, after the opening of the comment permission of the user, the method further includes:
a1, receiving the comment sent by the user, acquiring a first time stamp of the current comment of the user and a second time stamp of the last comment of the user, and judging whether the time interval between the first time stamp and the second time stamp is greater than or equal to a second preset time length.
The time stamp of the comment sent by the user can be stored through a browser cookie or a redis caching technology, when the comment sent by the user is received, the first time stamp of the comment of the user and the second time stamp of the previous comment of the user are obtained, the time interval between the first time stamp and the second time stamp is calculated, and the time interval is compared with the second preset time length to judge whether the comment of the user is allowed to be published or not.
The second preset time duration may be determined according to actual conditions, for example, if the time duration for a normal user to edit a comment is greater than 10s, the second preset time duration may be set to 10 s.
A2, when the time interval between the first time stamp and the second time stamp is larger than or equal to the second preset time length, allowing the user to post the comment.
And A3, prohibiting the publication of the comment of the user when the time interval between the first time stamp and the second time stamp is less than the second preset time.
The phenomenon of brushing comments can be further avoided due to the limitation of the comment frequency, the second preset duration is reasonably set, the influence on normal users cannot be caused, and for the water army, even if a part of the water army hangs up a small number of account numbers for a certain time and opens the comment permission, a large number of comments can not be brushed for a short time.
Meanwhile, after the comment permission of the user is opened, the method may further include:
b1, receiving the comment sent by the user, and judging whether the content of the comment contains forbidden words.
After receiving the comments sent by the user, the method can detect the contents of the comments of the user besides judging whether the frequency of the comments of the user is too high.
Summarizing a large number of forbidden words, constructing a forbidden word bank, matching the contents of the user comments with the forbidden words in the forbidden word bank, and judging whether the contents of the user comments contain the forbidden words.
And B2, when the content of the comment contains the forbidden word, prohibiting the user from publishing the comment and sending a prompt to the user.
And when the content of the comment contains the forbidden words, forbidding the user to publish the comment, and simultaneously sending a prompt that the comment content contains the forbidden words to the user to remind the user of paying attention to the word specification, so that the quality of the comment content is improved, and the user experience of browsing the comment plate by each user is improved.
Further, after the prohibiting the user comment and sending a prompt to the user, the method further comprises:
and B3, recording the prompting times.
After sending the prompt to the user, the number of prompts is recorded.
And B4, when the number of times of the prompt in the third preset duration reaches the preset prompt number of times, closing the comment authority of the user in a preset time period.
After the prompt is recorded, whether the number of times of prompting in the third preset time duration reaches the preset prompting number is judged, if yes, the comment permission of the user is closed in a preset time period, for example, after the prompt is recorded, the comment permission of the user is closed for 30 minutes after the prompt is recorded and the number of times of prompting in 1 minute reaches 5 times.
In addition, for the users who are used for forbidden words, specified data can be pushed to the users, and the comment authority can be opened again after the users complete specified operation. For example, after a preset time period, if a user sends a comment request, the user is educated in a mode of pushing appointed videos, audios or characters, and when the fact that the learning duration of the user on appointed data is longer than the preset learning duration is judged, comment permission is opened again. Therefore, when a user sends a comment request, a video party needing to watch a piece of civilization expression can comment.
Further, the method further comprises:
and detecting the IP when the user registers, and when the registration times of the same IP reach the preset registration times, closing the registration entrance of the IP and closing the comment authority of each user registered through the IP.
In order to avoid the water force from maliciously registering a large number of account numbers for swiping comments through some automatic registration software, the IP used for registering each user can be detected, when the registration times of the same IP are detected to reach the preset registration number, the registration entrance of the IP is closed, all the user account numbers registered through the IP are limited in authority, the comment authority is closed, and the phenomenon of swiping comments is avoided.
The preset registration times can be selected according to actual conditions, for example, data statistics shows that one IP address cannot exceed the use of 10 different normal users, the preset registration times can be set to 10 times, when the same IP is registered for ten times, the malicious registration behavior is judged, the registration entrance of the IP is closed, and the comment permission of each related user is limited.
In the first embodiment of the application, after a comment request of a user is received, the number of courses completed and the learning duration of the user are limited, comments of normal users cannot be affected, the time cost for the water army to brush the comments is greatly improved, the comments are difficult to brush on a large scale, the phenomenon of brushing the comments is fundamentally reduced, and the problems that an existing comment brushing-preventing mechanism is difficult to limit the water army to brush the comments and the use experience of the user who normally comments is affected are solved.
Because the users who comment have finished the study of a certain number of courses, the content quality of the comment is higher, and the referability of the comment in the comment block is improved.
In addition, the comment brushing phenomenon can be further limited by limiting the comment frequency, the comment content is detected, forbidden words are prevented from appearing, the quality of the comment is improved, and each user can have good user experience when browsing the comment plate.
Meanwhile, a mechanism for preventing malicious registration can be set, so that the condition that a large number of accounts are registered by the same IP is avoided, the comment permission of the user who is maliciously registered is closed, and the phenomenon of comment brushing is avoided.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.
Example two:
the second embodiment of the present application provides a review authorization apparatus for an online lesson, which, for convenience of description, only shows a part related to the present application, and as shown in fig. 2, the review authorization apparatus for an online lesson includes,
the qualification evaluation module 201 is configured to receive a comment request of a user, obtain the number of courses completed by the user and the learning duration of a current course according to the comment request, and determine whether the number of courses completed is greater than or equal to a preset number of courses and the learning duration is greater than a first preset duration;
and the permission opening module 202 is configured to open the comment permission of the user when the number of completed courses is greater than or equal to the preset number of courses and the learning duration is greater than the first preset duration.
Further, the apparatus further comprises:
the time stamp module is used for receiving the comment sent by the user, acquiring a first time stamp of the current comment of the user and a second time stamp of the last comment of the user, and judging whether the time interval between the first time stamp and the second time stamp is greater than or equal to a second preset time length;
the comment allowing module is used for allowing the user to make a comment when the time interval between the first time stamp and the second time stamp is greater than or equal to the second preset time length;
and the comment forbidding module is used for forbidding the user to issue the comment when the time interval between the first time stamp and the second time stamp is less than the second preset time length.
Further, the apparatus further comprises:
the forbidden word module is used for receiving the comments sent by the users and judging whether the contents of the comments contain forbidden words or not;
and the prohibition prompting module is used for prohibiting the user from publishing the comment and sending a prompt to the user when the content of the comment contains the forbidden word.
Further, the apparatus further comprises:
the prompt recording module is used for recording the prompt times;
and the prompt closing module is used for closing the comment permission of the user in a preset time period when the prompt times in the third preset time period reach the preset prompt times.
Further, the apparatus further comprises:
and the IP detection module is used for detecting the IP when the user registers, and closing the registration entrance of the IP and closing the comment authority of each user registered through the IP when the registration times of the same IP reach the preset registration times.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
Example three:
fig. 3 is a schematic diagram of a terminal device provided in the third embodiment of the present application. As shown in fig. 3, the terminal device 3 of this embodiment includes: a processor 30, a memory 31 and a computer program 32 stored in said memory 31 and executable on said processor 30. The processor 30, when executing the computer program 32, implements the steps in the above-described method embodiment of authorization for review of online lessons, such as the steps S101-S102 shown in fig. 1. Alternatively, the processor 30, when executing the computer program 32, implements the functions of each module/unit in the above-mentioned device embodiments, for example, the functions of the modules 201 to 202 shown in fig. 2.
Illustratively, the computer program 32 may be partitioned into one or more modules/units that are stored in the memory 31 and executed by the processor 30 to accomplish the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 32 in the terminal device 3. For example, the computer program 32 may be divided into a qualification evaluation module and a permission activation module, and the specific functions of each module are as follows:
receiving a comment request of a user, acquiring the number of courses completed by the user and the learning time of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to a preset number of courses and the learning time is greater than a first preset time;
and opening the comment permission of the user when the number of the completed courses is greater than or equal to the preset course number and the learning duration is greater than the first preset duration.
The terminal device 3 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 30, a memory 31. It will be understood by those skilled in the art that fig. 3 is only an example of the terminal device 3, and does not constitute a limitation to the terminal device 3, and may include more or less components than those shown, or combine some components, or different components, for example, the terminal device may also include an input-output device, a network access device, a bus, etc.
The Processor 30 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 31 may be an internal storage unit of the terminal device 3, such as a hard disk or a memory of the terminal device 3. The memory 31 may also be an external storage device of the terminal device 3, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 3. Further, the memory 31 may also include both an internal storage unit and an external storage device of the terminal device 3. The memory 31 is used for storing the computer program and other programs and data required by the terminal device. The memory 31 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow in the method of the embodiments described above can be realized by a computer program, which can be stored in a computer-readable storage medium and can realize the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (7)

1. A review authorization method for an online course, comprising:
receiving a comment request of a user, acquiring the number of courses completed by the user and the learning time of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to a preset number of courses and the learning time is greater than a first preset time;
opening the comment permission of the user when the number of the completed courses is greater than or equal to the preset course number and the learning duration is greater than the first preset duration;
after the comment permission of the user is opened, the method further comprises the following steps:
receiving a comment sent by a user, and judging whether the content of the comment contains forbidden words or not;
when the content of the comment contains the forbidden word, prohibiting the user from publishing the comment and sending a prompt to the user;
recording the number of times of prompting;
when the prompting times in the third preset duration reach preset prompting times, closing the comment permission of the user in a preset time period;
and pushing specified data to the user, and opening the comment permission again after the user finishes specified operation.
2. The method for authorizing review of online lessons as recited in claim 1, further comprising, after said opening the review permission of the user:
receiving a comment sent by a user, acquiring a first time stamp of the comment of the user and a second time stamp of the previous comment of the user, and judging whether the time interval between the first time stamp and the second time stamp is greater than or equal to a second preset time length;
when the time interval between the first time stamp and the second time stamp is greater than or equal to the second preset time length, allowing the user to issue the comment;
and when the time interval between the first time stamp and the second time stamp is smaller than the second preset time length, forbidding the user to issue the comment.
3. A review authorization method for an online course according to any one of claims 1 to 2, characterized in that the method further comprises:
and detecting the IP when the user registers, and when the registration times of the same IP reach the preset registration times, closing the registration entrance of the IP and closing the comment authority of each user registered through the IP.
4. An apparatus for authorizing review of an online course, comprising:
the qualification evaluation module is used for receiving a comment request of a user, acquiring the number of courses completed by the user and the learning time of the current course according to the comment request, and judging whether the number of courses completed is greater than or equal to the preset number of courses and the learning time is greater than a first preset time;
the permission opening module is used for opening the comment permission of the user when the number of courses completed is greater than or equal to the preset number of courses and the learning duration is greater than the first preset duration;
the forbidden word module is used for receiving comments sent by users and judging whether the contents of the comments contain forbidden words or not;
and the prohibition prompting module is used for prohibiting the user from publishing the comment and sending a prompt to the user when the content of the comment contains the forbidden word.
5. An apparatus for authorizing review of an online lesson as recited in claim 4, wherein said apparatus further comprises:
the time stamp module is used for receiving the comment sent by the user, acquiring a first time stamp of the current comment of the user and a second time stamp of the last comment of the user, and judging whether the time interval between the first time stamp and the second time stamp is greater than or equal to a second preset time length;
the comment allowing module is used for allowing the user to make a comment when the time interval between the first time stamp and the second time stamp is greater than or equal to the second preset time length;
the comment forbidding module is used for forbidding the user to issue the comment when the time interval between the first time stamp and the second time stamp is less than the second preset time length;
recording the number of times of prompting;
when the prompting times in the third preset duration reach preset prompting times, closing the comment permission of the user in a preset time period;
and pushing specified data to the user, and opening the comment permission again after the user finishes specified operation.
6. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 3 when executing the computer program.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3.
CN201811022069.9A 2018-08-31 2018-08-31 Online course comment authorization method and device and terminal equipment Active CN109241302B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811022069.9A CN109241302B (en) 2018-08-31 2018-08-31 Online course comment authorization method and device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811022069.9A CN109241302B (en) 2018-08-31 2018-08-31 Online course comment authorization method and device and terminal equipment

Publications (2)

Publication Number Publication Date
CN109241302A CN109241302A (en) 2019-01-18
CN109241302B true CN109241302B (en) 2020-08-14

Family

ID=65060603

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811022069.9A Active CN109241302B (en) 2018-08-31 2018-08-31 Online course comment authorization method and device and terminal equipment

Country Status (1)

Country Link
CN (1) CN109241302B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111291972A (en) * 2020-01-17 2020-06-16 深圳大圆影业有限公司 Big data-based movie evaluation method and system for whole industrial chain
CN111652476A (en) * 2020-05-14 2020-09-11 上海卓越睿新数码科技有限公司 Technology for detecting cheating during course brushing on online learning platform
CN113570946B (en) * 2021-07-21 2022-06-28 北京思想天下教育科技有限公司 Online training education informatization teaching method and system based on big data cloud platform
CN114401144A (en) * 2022-01-19 2022-04-26 福建中科多特健康科技有限公司 Method for preventing message malicious attack and storage device
CN115168677B (en) * 2022-06-09 2023-03-28 天翼爱音乐文化科技有限公司 Comment classification method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183455A (en) * 2007-12-26 2008-05-21 腾讯科技(深圳)有限公司 Method and system for exchange feedback in electronic commerce transaction system
US9118661B1 (en) * 2012-02-24 2015-08-25 Emc Corporation Methods and apparatus for authenticating a user using multi-server one-time passcode verification
CN105824805A (en) * 2016-05-09 2016-08-03 腾讯科技(深圳)有限公司 Identification method and device
CN106296500A (en) * 2015-05-21 2017-01-04 中兴通讯股份有限公司 A kind of long-distance educational system and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101183455A (en) * 2007-12-26 2008-05-21 腾讯科技(深圳)有限公司 Method and system for exchange feedback in electronic commerce transaction system
US9118661B1 (en) * 2012-02-24 2015-08-25 Emc Corporation Methods and apparatus for authenticating a user using multi-server one-time passcode verification
CN106296500A (en) * 2015-05-21 2017-01-04 中兴通讯股份有限公司 A kind of long-distance educational system and method thereof
CN105824805A (en) * 2016-05-09 2016-08-03 腾讯科技(深圳)有限公司 Identification method and device

Also Published As

Publication number Publication date
CN109241302A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
CN109241302B (en) Online course comment authorization method and device and terminal equipment
RU2670030C2 (en) Methods and systems for determining non-standard user activity
US10552644B2 (en) Method and apparatus for displaying information content
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
Celebic et al. Basic concepts of information and communication technology
CN109376078B (en) Mobile application testing method, terminal equipment and medium
CN106446670B (en) A kind of application management method, device and electronic equipment
CN108400868B (en) Seed key storage method and device and mobile terminal
CN112334899A (en) Techniques for generating analytics based on interactions over a digital channel
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN106131604A (en) The transmission method of a kind of multimedia messages and device
CN108009444A (en) Authority control method, device and the computer-readable recording medium of full-text search
CN111597009B (en) Application program display method and device and terminal equipment
CN109995751A (en) Equipment for surfing the net labeling method, device and storage medium, computer equipment
Wyatt et al. Public libraries in a digital culture
JP7223857B2 (en) Document marking method and apparatus
US9430625B1 (en) Method and system for voice match based data access authorization
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
US20200380484A1 (en) Crowdfunding credit card payments
CN110677242B (en) Key processing method, key processing device and terminal equipment
WO2021173581A1 (en) Automated actions in a security platform
CN109947309B (en) Application control method and device, terminal and readable storage medium
CN113377931A (en) Language model collaborative learning method, system and terminal of interactive robot
WO2019095449A1 (en) Method and apparatus for preventing personal information leakage
CN107743129A (en) Method, terminal and the computer-readable recording medium of dynamically distributes Cookie expired times

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: Bantian street, Longgang District of Shenzhen City, Guangdong province 518000 yuan and five Avenue sign technology plant No. 1 building 4 floor

Patentee after: SHENZHEN GOLO CHELIAN DATA TECHNOLOGY Co.,Ltd.

Address before: Bantian street, Longgang District of Shenzhen City, Guangdong province 518000 yuan and five Avenue sign technology plant No. 1 building 4 floor

Patentee before: GOLO IOV DATA TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder