CN109803152B - Violation auditing method and device, electronic equipment and storage medium - Google Patents

Violation auditing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109803152B
CN109803152B CN201811628698.6A CN201811628698A CN109803152B CN 109803152 B CN109803152 B CN 109803152B CN 201811628698 A CN201811628698 A CN 201811628698A CN 109803152 B CN109803152 B CN 109803152B
Authority
CN
China
Prior art keywords
screenshot
anchor
sequence
latest
audited
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811628698.6A
Other languages
Chinese (zh)
Other versions
CN109803152A (en
Inventor
李锦春
林协
邱泽潮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huaduo Network Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN201811628698.6A priority Critical patent/CN109803152B/en
Publication of CN109803152A publication Critical patent/CN109803152A/en
Application granted granted Critical
Publication of CN109803152B publication Critical patent/CN109803152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application discloses a violation auditing method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents; extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited; and acquiring at least one latest screenshot of the video of at least one live broadcast room according to at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one. According to the violation auditing method and device, the electronic equipment and the storage medium, the anchor identification is placed in the sequence to be audited, the anchor identification in the sequence to be audited is extracted during auditing, the latest screenshot corresponding to the anchor identification is displayed on the auditing interface for auditing, and the timeliness and accuracy of auditing are guaranteed.

Description

Violation auditing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of live webcasting technologies, and in particular, to a method and an apparatus for auditing violation, an electronic device, and a storage medium.
Background
With the rapid development of the network live broadcast industry, live broadcast audiences are also expanding continuously. With the expanding live broadcast industry, various anchor broadcasters are added in a spread manner, and the direct competition between the anchor broadcasters and the anchor broadcasters is intensified. The anchor can generate various types of violation phenomena when considering how to attract users and how to enrich the content of the anchor. Currently, live video supervision is to perform screenshot recognition on a live video stream, and when illegal contents are recognized, the screenshot is sent to an auditor as an illegal evidence for further auditing.
Disclosure of Invention
In view of the above problems, the present application provides a violation auditing method, apparatus, electronic device and storage medium to solve the above problems.
In a first aspect, an embodiment of the present application provides a violation auditing method, where the method includes: acquiring a sequence to be audited, wherein the sequence to be audited is composed of a plurality of anchor identifiers of live broadcast rooms with suspected illegal contents in an ordering mode; extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited; and acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
In a second aspect, an embodiment of the present application provides a violation auditing apparatus, where the apparatus includes: the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring a sequence to be verified, and the sequence to be verified consists of a plurality of anchor identifiers of live broadcast rooms with suspected illegal contents in a sequencing mode; the extracting module is used for extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited; and the display module is used for acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
In a third aspect, an embodiment of the present application provides an electronic device, including: a screen; a memory; one or more processors coupled with the memory; one or more programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the above-described methods.
In a fourth aspect, the present application provides a computer-readable storage medium, in which a program code is stored, and the program code can be called by a processor to execute the above method.
The application discloses a violation auditing method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents; extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited; and acquiring at least one latest screenshot of the video of at least one live broadcast room according to at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one. Therefore, by putting the anchor identification into the sequence to be audited, the anchor identification in the sequence to be audited is extracted during auditing, and the latest screenshot corresponding to the anchor identification is displayed on an auditing interface for auditing, so that the timeliness and accuracy of auditing are ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is an application scene diagram illustrating a violation auditing method and apparatus provided in the embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a violation auditing method according to an embodiment of the present application;
fig. 3 is a schematic view of an audit sequence of an illegal audit method according to an embodiment of the present application;
fig. 4 is a schematic diagram illustrating a video stream screenshot of an infraction review method provided in an embodiment of the present application;
FIG. 5 is a schematic view illustrating a display interface of a violation review method according to an embodiment of the present application;
fig. 6 is a schematic flowchart illustrating a further violation review method provided in an embodiment of the present application;
FIG. 7 is a diagram illustrating an audit sequence of yet another violation audit method provided by an embodiment of the present application;
FIG. 8 is a schematic diagram illustrating a display of another violation review method provided by an embodiment of the present application;
fig. 9 is a schematic flowchart illustrating a further violation review method provided in an embodiment of the present application;
FIG. 10 is a schematic diagram of a display interface of step S350 of another violation review method provided in the embodiments of the present application;
fig. 11 is a flowchart illustrating a step S350 of the violation review method provided by the embodiment illustrated in fig. 9 of the present application;
FIG. 12 is a schematic diagram of a display interface of step S352 of the violation review method provided by the embodiment of the application shown in FIG. 11;
FIG. 13 is a schematic illustration of a highlighted interface of step S353 of the violation review method provided by the embodiment of the application shown in FIG. 11;
FIG. 14 is a schematic view of another highlighted interface of step S353 of the violation review method provided by the embodiment of the application shown in FIG. 11;
FIG. 15 is a schematic diagram illustrating a further highlighted interface of step S353 of the violation review method provided by the embodiment of the application shown in FIG. 11;
fig. 16 is a schematic flowchart illustrating yet another violation review method provided in an embodiment of the present application;
FIG. 17 is a schematic interface diagram illustrating yet another violation review method provided by an embodiment of the present application;
fig. 18 is a block diagram illustrating a module of a violation auditing device according to an embodiment of the present disclosure;
FIG. 19 is a block diagram of an electronic device configured to perform a violation review method according to an embodiment of the present application;
fig. 20 illustrates a storage unit according to an embodiment of the present application, configured to store or carry program code for implementing a violation auditing method according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Referring to fig. 1, fig. 1 is a diagram illustrating an application scenario of a violation auditing method and apparatus according to an embodiment of the present application. As shown in fig. 1, the client is installed in an electronic device a, an electronic device B, and an electronic device C, the electronic device a, the electronic device B, the electronic device C, and the server 100 are located in a wireless network or a wired network, and the electronic device a, the electronic device B, the electronic device C, and the server 100 perform data interaction.
Among them, the electronic devices a, B, and C may be mobile phones or smart phones (e.g., iPhone-based phones, Android-based phones), Portable game devices (e.g., Nintendo DS, PlayStation Portable, game Advance, iPhone), laptop computers, PDAs, Portable internet devices, music players, and data storage devices.
In some embodiments, the client is installed in the electronic device a, the electronic device B, and the electronic device C, and may be, for example, an application installed in the electronic device a, the electronic device B, and the electronic device C. If the user logs in through the account at the client, all information corresponding to the account can be stored in the storage space of the server 100. The server 100 may be an individual server, or a server cluster, or a local server, or a cloud server.
As an implementation manner, the electronic device a and the electronic device B may be user terminals, and the electronic device C may be an auditing terminal, and when it is detected that the electronic device a and the electronic device B have illegal contents, the electronic device a and the electronic device B may be placed in a sequence to be audited, and when the electronic device C is auditing, a video stream screenshot corresponding to the electronic device a and a video stream screenshot corresponding to the electronic device B may be obtained for auditing. At present, when an auditor audits a video stream screenshot, a certain time is needed for entering an audit interface, and the screenshot possibly audited is a previous screenshot, so that the problem that the auditor audits the previous screenshot corresponding to the live video all the time and cannot master the latest live video stream screenshot condition of the live video exists.
In order to solve the above problems, the inventor finds, through long-term research, that the violation auditing method, device, electronic device and storage medium provided in the embodiments of the present application are provided, and by placing the anchor identifier in the to-be-audited sequence, extracting the anchor identifier in the to-be-audited sequence during auditing, and displaying the latest screenshot corresponding to the anchor identifier on an auditing interface for auditing, the timeliness and accuracy of auditing are ensured.
Examples
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a violation auditing method according to an embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 2, the violation auditing method may specifically include the following steps:
step S110: and acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents.
In this embodiment, during the live broadcast, the anchor may make some illegal actions to attract the viewers, so that the illegal contents may appear in the live broadcast room, which may cause adverse effects. The live broadcasting room may include a room in which a main broadcast performs live broadcasting, a room in which a small video is played, a room in which a picture is played, and the like, and as a manner, the live broadcasting content of the main broadcast may include games, music, outdoor content, and the like, which is not limited herein.
In the process of live broadcasting by a main broadcast, a monitoring system captures a live video, identifies whether the captured video contains suspected illegal contents or not by an image identification technology, and puts a main broadcast identifier corresponding to a captured video into a sequence to be audited when a certain captured video is identified to contain the suspected illegal contents, wherein the main broadcast identifier can be information which can uniquely identify the identity of the main broadcast, such as a UID (user identifier), a nickname, an account number, an ID (identity card) account number and the like of the main broadcast, and is not particularly limited.
In this embodiment, when it is detected that the screenshot of the video of the live broadcast room contains a behavior suspected of violation, it may be determined that the content suspected of violation exists in the live broadcast room, for example, when it is detected that the screenshot of the video of the live broadcast room contains vulgar 35881, or when it is detected that the screenshot of the video of the live broadcast room contains a human figure that is naked, it may also be determined that the content suspected of violation exists in the live broadcast room. As a mode, when the live broadcast room has no suspected violation, it may be detected whether the basic information of the live broadcast room is changed, so as to detect whether the live broadcast room has suspected violation content, for example, it is detected whether the basic information such as live broadcast time and live broadcast location is consistent with the common information of the anchor, for example, the anchor a is always live broadcast in beijing, and when it is detected that the anchor a is live broadcast in cantonese, it may be determined that the anchor a has suspected violation content, and the anchor identifier of the anchor a may be placed in the sequence to be audited. As another mode, when it is detected that a certain anchor room frequently has a violation, it may also be considered that the live room has suspected violation content, so that the anchor identifier corresponding to the live room is placed in the sequence to be checked, for example, when it is detected that anchor B triggers five violations within a week, the anchor identifier of anchor B is placed in the sequence to be checked.
When the anchor identifier enters the sequence to be audited, the time for entering the sequence can be saved, and for the timeliness of auditing, the anchor identifier can be sequenced according to the time for the anchor identifier to enter the sequence. For example, the anchor identifier which enters the to-be-audited sequence first is placed at the head of the to-be-audited sequence.
Step S120: and extracting at least one anchor mark from the sequence to be audited according to the sequence of the anchor marks from front to back in the sequence to be audited.
In this embodiment, when the sequence to be audited is obtained, at least one anchor identifier may be extracted from the sequence to be audited according to a sequence from front to back of the plurality of anchor identifiers in the sequence to be audited. For example, as shown in a schematic diagram of a sequence to be audited in fig. 3, the sequence to be audited is arranged according to the sequence of anchor 1, anchor 2, anchor 3, anchor 4, and anchor 5, and when an audit terminal extracts an anchor identifier from the sequence to be audited, the anchor identifier may be extracted according to the sequence of anchor 1, anchor 2, anchor 3, anchor 4, and anchor 5.
Step S130: and acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
In this embodiment, in the auditing process, the anchor is continuously in the live broadcasting process, and the monitoring system can also continuously perform screenshot recognition on the video in the live broadcasting room, so that for auditing timeliness, after at least one anchor identifier to be audited is extracted from the sequence to be audited, the auditing terminal can obtain at least one latest screenshot corresponding to the at least one anchor identifier in the monitoring system, and can display the at least one latest screenshot on the auditing page for auditing by the auditor. As shown in the video stream screenshot diagram shown in fig. 4, the monitoring system may perform continuous time screenshot on the video of the live room corresponding to the anchor, or may also cut a screenshot at intervals, and store the screenshot in the monitoring system, for example, screenshot on the video of the anchor room of the anchor 1 to obtain screenshot 1, screenshot 2, screenshot 3, screenshot 4, and the latest screenshot, where the screenshot 1, the screenshot 2, the screenshot 3, the screenshot 4, and the latest screenshot may be five screenshots in continuous time, or five screenshots obtained by cutting a screenshot at intervals of 10 seconds. As shown in the schematic display interface diagram shown in fig. 5, when the auditing terminal extracts the anchor identifier of the anchor 1, the latest screenshot corresponding to the anchor 1 is displayed on the auditing interface.
As a mode, in the auditing process, an auditor can immediately acquire the following content after auditing a picture on one screen, and when the auditor acquires a picture on the next screen, the auditor can extract the anchor identifier from the sequence to be audited, and then convert the anchor identifier into the latest screenshot to be displayed on the auditing interface. Therefore, in order to relieve the pressure of the auditing terminal, when an auditor audits the current latest screenshot, the auditing terminal can take the anchor identifier of the next screen from the sequence to be audited by default, convert the anchor identifier into a picture to wait for the auditor to audit, and after the latest screenshot displayed in the current auditing page is processed, the preloaded latest screenshot is displayed on the current auditing page, so that after the auditor audits the loaded data to be audited displayed on the current auditing page, the rest of the un-displayed preloaded data to be audited can be obtained, and new data to be audited can be continuously loaded. Therefore, the problem of delay of switching the current audit page by the auditor can be effectively solved, the waiting time is reduced, and the audit experience and the audit efficiency are improved.
According to the violation auditing method provided by one embodiment of the application, a sequence to be audited is obtained, and the sequence to be audited is composed of a plurality of anchor identifications of live broadcast rooms with suspected violation contents in a sequencing mode; extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited; and acquiring at least one latest screenshot of the video of at least one live broadcast room according to at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one. Therefore, by putting the anchor identification into the sequence to be audited, the anchor identification in the sequence to be audited is extracted during auditing, and the latest screenshot corresponding to the anchor identification is displayed on an auditing interface for auditing, so that the timeliness and accuracy of auditing are ensured.
Referring to fig. 6, fig. 6 is a schematic flowchart illustrating a violation review method according to another embodiment of the present application. As will be explained in detail with respect to the flow shown in fig. 6, the method may specifically include the following steps:
step S210: and acquiring a plurality of latest screenshots of videos of a plurality of live broadcast rooms corresponding to the plurality of anchor identifiers in real time.
In this embodiment, in order to ensure the timeliness of the auditing and monitor the live broadcast condition of the anchor in real time, after the anchor identifier enters the sequence to be audited, the auditing system can continue to capture the screenshot at the back end, so that the auditing terminal can obtain a plurality of latest screenshots of videos of a plurality of live broadcast rooms corresponding to a plurality of anchor identifiers in real time.
Step S220: and respectively obtaining the risk degrees of the plurality of latest screenshots.
In this embodiment, the auditing system may set different risk levels according to different violation levels, perform screenshot recognition on the video of the anchor live broadcast room, match the content of the latest screenshot with the violation content, and obtain the violation level corresponding to the latest screenshot, thereby obtaining the risk level of the latest screenshot. For example, a table of correspondence between violation level and risk as shown in table 1. When the latest screenshot of the anchor A contains a vocabulary entry of 'hanging all big hospitals in Beijing instead of' and keywords 'hanging instead of' and 'hospitals' in the vocabulary entry are extracted to be matched with violation contents, the latest screenshot of the anchor A can be determined to correspond to the violation level of slight violation, and therefore the risk degree of the latest screenshot of the anchor A is 1.
TABLE 1
Figure GDA0002023127330000071
Step S230: and respectively judging whether the risk degrees of the plurality of latest screenshots reach a risk degree threshold value.
In this embodiment, when the screenshot is checked, a risk threshold is preset as a criterion for determining whether the screenshot is a high-risk picture, and after the risk of the latest screenshot is obtained, the risk of one of the latest screenshots may be compared with the preset risk threshold one by one, so as to determine whether the risk of the latest screenshot reaches the risk threshold.
Step S240: and when the risk degree of a first screenshot in the plurality of latest screenshots reaches the risk degree threshold value, moving the ordering of the anchor identification corresponding to the first screenshot to the head in the sequence to be audited.
In this embodiment, the risk degrees in the multiple latest screenshots are compared with the risk degree threshold one by one, so as to avoid continuous propagation of high-risk content, when the risk degree of a first screenshot in the multiple latest screenshots reaches the risk degree threshold, the sequence of the anchor identifier corresponding to the first screenshot may be moved forward in the to-be-audited sequence, where the first screenshot may be any screenshot in the multiple latest screenshots.
As a mode, in order to check timeliness and process violation content as soon as possible, when the risk of the first screenshot reaches a risk threshold, the order of the anchor identifier corresponding to the first screenshot may be moved forward to the first place in the to-be-checked sequence. For example, as shown in the schematic diagram of the sequence to be audited in fig. 7, the risk threshold is 4, and when it is recognized that the risk of the latest screenshot of the anchor 4 is 4, and the risk reaches the risk threshold, the position of the anchor 4 is moved forward to the first position of the sequence to be audited.
Step S250: and acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents.
Step S260: and extracting at least one anchor mark from the sequence to be audited according to the sequence of the anchor marks from front to back in the sequence to be audited.
For the detailed description of steps S260 to S270, refer to steps S120 to S130, which are not described herein again.
Step S270: and acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
In this embodiment, when the risk of the first screenshot reaches the risk threshold, the anchor identifier corresponding to the first screenshot may be moved forward in the sequence to be audited, so that an auditor may first obtain the anchor identifier corresponding to the first screenshot when obtaining the anchor identifier, and thus, a latest screenshot of the anchor identifier corresponding to the first screenshot may be displayed on an audit page. For example, as shown in the display interface schematic diagram shown in fig. 8, when it is recognized that the risk of the screenshot of the anchor 4 reaches the risk threshold, an auditor first obtains the anchor 4, and simultaneously displays the latest screenshot corresponding to the anchor 4 on an audit page.
In another exemplary embodiment of the violation review method provided in this application, a plurality of latest screenshots of videos of a plurality of live broadcast rooms corresponding to a plurality of anchor marks are obtained in real time, a risk of the latest screenshots is obtained, and whether the risk of the latest screenshots reaches a risk threshold is judged, when the risk of a first screenshot in the latest screenshots reaches the risk threshold, a sequence to be reviewed is obtained by moving the ranking of the anchor marks corresponding to the first screenshot to the top in a sequence to be reviewed, the sequence to be reviewed is composed of a plurality of anchor marks of live broadcast rooms with suspected violation content, at least one anchor mark is extracted from the sequence to be reviewed according to the sequence from the front to the back of the anchor marks in the sequence to be reviewed, and at least one latest screenshot of videos of at least one live broadcast room is obtained according to the at least one anchor mark, and displaying at least one latest screenshot on the auditing interface, wherein at least one anchor mark corresponds to at least one latest screenshot one by one. Compared with the violation auditing method shown in fig. 2, in the embodiment, screenshot recognition is continuously performed on live broadcasts corresponding to anchor identifiers in an auditing sequence, and when the risk degree of a latest screenshot is recognized to reach a risk degree threshold, the anchor identifiers corresponding to the latest screenshot are sorted in the auditing sequence and moved to the head, so that an auditor can firstly obtain the screenshot which is recognized as high risk, and long-time propagation of bad information is avoided.
Referring to fig. 9, fig. 9 is a schematic flowchart illustrating a violation auditing method according to yet another embodiment of the present application. As will be explained in detail with respect to the flow shown in fig. 9, the method may specifically include the following steps:
step S310: and acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents.
Step S320: and extracting at least one anchor mark from the sequence to be audited according to the sequence of the anchor marks from front to back in the sequence to be audited.
Step S330: and acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
For the detailed description of steps S310 to S330, refer to steps S110 to S130, which are not described herein again.
Step S340: detecting an operation acting on the at least one latest screenshot.
In this embodiment, when the audit interface obtains and displays the latest screenshot corresponding to the anchor identifier, because the audit interface may include a plurality of latest screenshots corresponding to a plurality of anchor identifiers, it may be determined whether an auditor is auditing the latest screenshot by detecting whether there is an operation acting on the latest screenshot.
Step S350: and when a selection operation acting on a second screenshot in the at least one latest screenshot is detected, the second screenshot is displayed in an enlarged mode on the audit interface.
In this embodiment, when the audit interface displays at least one latest screenshot, an auditor can audit the second screenshot by performing a selection operation on a second screenshot in the at least one latest screenshot, where the second screenshot refers to any one of the at least one latest screenshot in the audit page. The auditor can select any one of the at least one latest screenshot in the audit page by clicking, sliding and other actions on the audit page through electronic equipment such as a mouse, a touch pen and the like or fingers. For example, the auditor may select the second screenshot to be audited by touching the second screenshot on the audit page with a stylus.
When the auditing terminal detects that a press and click operation is performed on one latest screenshot on the auditing page, namely the auditing staff selects one screenshot from at least one latest screenshot, namely selects a second screenshot, the second screenshot can be displayed on the auditing page in an amplifying way. For example, when the audit terminal detects that the screenshot a has a clicked operation, the screenshot a is displayed in an enlarged manner on the audit page.
As a mode, the auditing terminal may also detect whether there is a cursor hovering over the latest screenshot on the auditing page, and when detecting that the cursor hovers over the second screenshot, enlarge and display the second screenshot on the auditing page. For example, as shown in the display interface diagram shown in fig. 10, an auditor hovers a cursor over the latest screenshot of the anchor 1, and when the audit terminal detects that the cursor hovers over the latest screenshot of the anchor 1, the latest screenshot of the anchor 1 may be displayed in an enlarged manner beside the latest screenshot of the anchor 1 on the audit page.
Referring to fig. 11, fig. 11 is a flowchart illustrating an embodiment of step S350 of the violation auditing method according to the embodiment shown in fig. 9 of the present application. As will be described in detail with respect to the flow shown in fig. 11, the method may specifically include the following steps:
step S351: and when a selection operation acting on the second screenshot is detected, acquiring a third screenshot, wherein the third screenshot comprises the first N frames of screenshots of the second screenshot of the video of the live broadcast room, and N is a positive integer.
In this embodiment, in the process of auditing, it may be displayed that the latest screenshot on the auditing page does not contain content suspected of violation, and for the accuracy of auditing, after the auditing terminal detects the selection operation acting on the second screenshot, a third screenshot may also be obtained. The third screenshot is a screenshot of a video of the live broadcast room corresponding to the second screenshot, and the third screenshot may include at least one screenshot. The third screenshot may include one screenshot, i.e. the third screenshot may be a screenshot preceding the second screenshot, e.g. the third screenshot may be a screenshot 10 seconds before the screenshot time of the second screenshot. The screenshot may also be a screenshot triggering an audit. The third screenshot may also include multiple screenshots, that is, the third screenshot may be the first screenshots of the second screenshot, where the multiple screenshots may also include screenshots that trigger the audit, for example, the third screenshot includes three screenshots, screenshot 1, screenshot 2, and screenshot 3, screenshot 1 may be a screenshot 10 seconds before the screenshot time of the second screenshot, screenshot 2 may be a screenshot 20 seconds before the screenshot time of the second screenshot, and screenshot 3 may be a screenshot containing the suspected violation content.
Step S352: and amplifying and displaying the second screenshot on the audit interface, and displaying the third screenshot.
In this embodiment, when a selection operation acting on the second screenshot is detected, the second screenshot can be displayed in an enlarged manner on an audit page, and meanwhile, the audit terminal also obtains a third screenshot. For example, as shown in the display interface diagram shown in fig. 12, when it is detected that a cursor hovers over the latest screenshot of anchor 1, the latest screenshot of anchor 1 is displayed in an enlarged manner on an audit page, and the first few frames of the latest screenshot of anchor 1, such as anchor 1 screenshot 1, anchor 1 screenshot 2, and anchor 1 screenshot 3, may also be displayed.
Step S353: and when the second screenshot and the third screenshot comprise target screenshots with the risk degree reaching the risk degree threshold value, highlighting the target screenshots.
In this embodiment, when the second screenshot is subjected to image recognition, a risk degree is obtained through an image recognition result, and the risk degree of the second screenshot reaches a preset risk degree, and the second screenshot is displayed on an audit page, the second screenshot may be highlighted by marking a keyword, marking different colors, and the like, for example, as shown in fig. 13, when the risk degree of the latest screenshot of the anchor 4 reaches the preset risk degree, the latest screenshot of the anchor 4 may be highlighted by marking "high risk" on the latest screenshot. Similarly, the second screenshot can be highlighted by marking keywords, marking different colors and the like on the enlarged second screenshot. For example, as shown in fig. 14, the latest screenshot of anchor 4 may be highlighted by marking a "high risk" on the enlarged display of the latest screenshot.
Further, when the third screenshot is subjected to image recognition, a risk degree is obtained through an image recognition result, and the risk degree of the third screenshot reaches a preset risk degree, and the third screenshot is displayed on an audit page, the third screenshot can be highlighted by marking keywords, marking different colors and the like, for example, as shown in fig. 15, when the third screenshot of the anchor 4 includes a screenshot in which the risk degree reaches the preset risk degree, a "high risk" is marked on the screenshot to highlight a screenshot in which the risk degree reaches the preset risk degree included in the third screenshot of the anchor 4.
In another exemplary embodiment of the present application, a violation review method includes obtaining a to-be-reviewed sequence, where the to-be-reviewed sequence is composed of a plurality of anchor identifiers of live broadcast rooms with suspected violation content, extracting at least one anchor identifier from the to-be-reviewed sequence according to a front-to-back sequence of the plurality of anchor identifiers in the to-be-reviewed sequence, obtaining at least one latest screenshot of a video of the at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on a review interface, where the at least one anchor identifier corresponds to the at least one latest screenshot one by one, detecting an operation acting on the at least one latest screenshot, and when a selection operation acting on a second screenshot in the at least one latest screenshot is detected, displaying the second screenshot in the review interface in an enlarged manner. Compared with the violation auditing method shown in fig. 2, the embodiment can perform selection operation on the latest screenshot to be audited in the auditing interface so as to enlarge and display the latest screenshot, so that the auditor can see the latest screenshot more clearly for auditing.
Referring to fig. 16, fig. 16 is a schematic flow chart illustrating a violation review method according to yet another embodiment of the present application. As will be described in detail with respect to the flow shown in fig. 16, the method may specifically include the following steps:
step S410: and acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents.
For detailed description of step S410, please refer to step S110, which is not described herein again.
Step S420: and acquiring the first size of the audit interface and the second size of a picture displayed on the audit interface.
In this embodiment, different auditors have different auditing habits, and the number of pictures that can be displayed on the auditing interface in the auditing process can be set through the habits of the auditors. Since the size of the audit interface of the same audit terminal is generally fixed, the first size of the audit interface may be obtained by obtaining the device data of the audit terminal, for example, the first size of the audit interface may be 1024 × 768. The second size of one picture displayed on the audit interface may be set by an auditor according to an audit habit of the auditor, or multiple picture size relationships may be set by the audit terminal, and the second size of one picture displayed on the audit interface that is set by the auditor is obtained according to a selection operation of the auditor on the multiple picture size relationships, for example, as shown in fig. 17, multiple picture size relationships may be displayed on the audit interface, and the second size of one picture displayed on the audit interface is determined by receiving the selection operation of the auditor on the size relationships, so that the second size of one picture displayed on the audit interface may be 100%.
Step S430: determining the number of pictures that can be displayed by the audit interface based on the first size and the second size.
In this embodiment, the number of the pictures that can be displayed on the audit interface is determined according to the obtained multiple relationship between the first size of the audit interface and the second size of one picture displayed on the audit page. For example, the first size of the review interface may be 1024 x 768, the second size of one of the pictures displayed by the review page may be 120 x 120, and the number of pictures that may be displayed by the review page may be 54.
Further, the audit terminal may be provided with a relation table of a plurality of picture size relations and picture numbers as shown in table 2, and determine the number of pictures that can be displayed on the audit interface according to the selection operation of the audit staff on the plurality of picture size relations and the relation table of the picture size relations and the picture numbers, for example, when the second size selected by the audit staff is 100%, the number of pictures that can be displayed on the audit interface is 60.
TABLE 2
Second size Number of pictures
100% 60
120% 50
150% 40
Step S440: determining the number of the anchor marks extracted from the sequence to be audited based on the number of the displayable pictures.
In this embodiment, when the anchor identifier is extracted from the sequence to be audited, a latest screenshot corresponding to the anchor identifier may be displayed on the audit page, so that the number of the latest screenshots displayed on the audit page corresponds to the number of the extracted anchor identifiers, and the number of the anchor identifiers extracted from the sequence to be audited may be determined by the number of the displayable pictures on the audit page. For example, see table 3, where table 3 shows an example table of the correspondence between the number of displayable pictures and the number of anchor marks.
TABLE 3
Second size Number of pictures Number of anchor identities
100% 60 60
120% 50 50
150% 40 40
When the size of one picture on the review page is determined, that is, the second size is 100%, it may be determined that the number of displayable pictures on the review page is 60, so that 60 anchor marks can be extracted from the sequence to be reviewed.
Further, in order to improve the auditing experience of the auditor, after the auditor selects the second size of a picture displayed on the auditing page, the auditing system can memorize the second size selected by the auditor, before the auditor does not close the browser or quit the auditing system, the number system of each page can form memory, and the next screen or the lower screen is used for obtaining the picture according to the second size in the auditing sequence for auditing.
Step S450: and extracting at least one anchor mark from the sequence to be audited according to the sequence of the anchor marks from front to back in the sequence to be audited.
Step S460: and acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
For the detailed description of steps S450 to S460, refer to steps S120 to S130, which are not described herein again.
In another exemplary embodiment of the violation review method, a to-be-reviewed sequence is obtained, where the to-be-reviewed sequence is composed of a plurality of anchor identifiers of live broadcast rooms with suspected violation content, a first size of a review interface and a second size of a picture displayed on the review interface are obtained, the number of pictures displayable on the review interface is determined based on the first size and the second size, the number of anchor identifiers extracted from the to-be-reviewed sequence is determined based on the number of displayable pictures, at least one anchor identifier is extracted from the to-be-reviewed sequence in a front-to-back sequence of the anchor identifiers in the to-be-reviewed sequence, obtaining at least one latest screenshot of a video of at least one live room according to at least one anchor identification, and displaying at least one latest screenshot on the auditing interface, wherein at least one anchor mark corresponds to at least one latest screenshot one by one. Compared with the violation auditing method shown in fig. 2, the number of anchor identifiers extracted from the sequence to be audited can be determined according to the size of the auditing interface and the size of a picture displayed on the auditing interface, so that the number of the latest screenshots displayed on the auditing page can be determined according to the habits of auditors, and the auditing experience can be improved.
Referring to fig. 18, fig. 18 is a block diagram illustrating a module of a violation auditing apparatus 200 according to an embodiment of the present application. As will be explained below with respect to the block diagram of fig. 18, the violation auditing device 200 includes: an obtaining module 210, an extracting module 220, and a displaying module 230, wherein:
the obtaining module 210 is configured to obtain a sequence to be checked, where the sequence to be checked is composed of a plurality of anchor identifiers of live broadcast rooms with suspected illegal content.
An extracting module 220, configured to extract at least one anchor identifier from the sequence to be audited according to a sequence from front to back of the plurality of anchor identifiers in the sequence to be audited.
And a display module 230, configured to obtain at least one latest screenshot of a video of at least one live broadcast room according to the at least one anchor identifier, and display the at least one latest screenshot on an audit interface, where the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
Further, the violation auditing device 200 further includes: real-time acquisition module, danger degree acquisition module, judgment module and sequencing module, wherein:
and the real-time acquisition module is used for acquiring a plurality of latest screenshots of videos of a plurality of live broadcast rooms corresponding to the plurality of anchor identifiers in real time.
And the risk degree acquisition module is used for respectively acquiring the risk degrees of the plurality of latest screenshots.
And the judging module is used for respectively judging whether the risk degrees of the plurality of latest screenshots reach a risk degree threshold value.
And the sorting module is used for moving the sorting of the anchor identifier corresponding to the first screenshot to the head in the sequence to be audited when the risk of the first screenshot in the plurality of latest screenshots reaches the risk threshold.
Further, the violation auditing device 200 further includes: detection module and amplification module, wherein:
a detection module to detect an operation acting on the at least one latest screenshot.
And the amplification module is used for amplifying and displaying a second screenshot in the at least one latest screenshot in the audit interface when a selection operation acting on the second screenshot is detected. Further, the amplifying module further comprises: the device comprises an acquisition submodule, a display submodule, a highlight display submodule and an amplification display submodule, wherein:
an obtaining submodule, configured to obtain a third screenshot when a selection operation acting on the second screenshot is detected, where the third screenshot includes N previous frame screenshots of the second screenshot of the video of the live broadcast room, where N is a positive integer.
And the display sub-module is used for displaying the second screenshot in an enlarged manner on the audit interface and displaying the third screenshot.
And the highlight display sub-module is used for highlighting the target screenshot when the second screenshot and the third screenshot comprise target screenshots with the risk degree reaching the risk degree threshold.
And the amplification display sub-module is used for amplifying and displaying a second screenshot in the at least one latest screenshot on the audit interface when the cursor is detected to be hovered over the second screenshot.
Further, the violation auditing device 200 further includes: size acquisition module, picture quantity determine module and extraction quantity determine module, wherein:
and the size acquisition module is used for acquiring the first size of the audit interface and the second size of a picture displayed on the audit interface.
And the picture quantity determining module is used for determining the quantity of pictures which can be displayed by the audit interface based on the first size and the second size.
And the extraction quantity determining module is used for determining the quantity of the anchor marks extracted from the sequence to be audited based on the quantity of the displayable pictures.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 19, a block diagram of an electronic device 300 according to an embodiment of the present disclosure is shown. The electronic device 300 in the present application may include one or more of the following components: a processor 310, a memory 320, a screen 330, and one or more applications, wherein the one or more applications may be stored in the memory 320 and configured to be executed by the one or more processors 310, the one or more programs configured to perform the methods as described in the foregoing method embodiments.
Processor 310 may include one or more processing cores, among other things. The processor 310 connects various parts throughout the electronic device 300 using various interfaces and lines, and performs various functions of the electronic device 300 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 320 and calling data stored in the memory 320. Alternatively, the processor 310 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 310 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 310, but may be implemented by a communication chip.
The Memory 320 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 320 may be used to store instructions, programs, code sets, or instruction sets. The memory 320 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as an image recognition function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by electronic device 300 during use (e.g., video screenshot data, audio-visual data), and the like.
The screen 330 may be configured to display the latest screenshot corresponding to the anchor identifier entering the review interface, and may display the first few frames of the latest screenshot corresponding to the anchor identifier.
Referring to fig. 20, a block diagram of a computer-readable storage medium according to an embodiment of the present disclosure is shown. The computer-readable storage medium 400 has stored therein program code that can be invoked by a processor to perform the methods described in the above-described method embodiments.
The computer-readable storage medium 400 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable and programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 400 includes a non-volatile computer-readable storage medium. The computer readable storage medium 400 has storage space for program code 410 for performing any of the method steps described above. The program code can be read from or written to one or more computer program products. Program code 410 may be compressed, for example, in a suitable form.
In summary, the application discloses a violation auditing method, a violation auditing device, an electronic device and a storage medium. The method comprises the following steps: acquiring a sequence to be audited, wherein the sequence to be audited is formed by sequencing anchor identifiers of a plurality of live broadcast rooms with suspected illegal contents; extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited; and acquiring at least one latest screenshot of the video of at least one live broadcast room according to at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one. Therefore, by putting the anchor identification into the sequence to be audited, the anchor identification in the sequence to be audited is extracted during auditing, and the latest screenshot corresponding to the anchor identification is displayed on an auditing interface for auditing, so that the timeliness and accuracy of auditing are ensured.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (9)

1. A violation auditing method, the method comprising:
the method comprises the steps of obtaining a plurality of latest screenshots of videos of a plurality of live broadcast rooms corresponding to a plurality of anchor identifications in a sequence to be audited in real time, wherein the sequence to be audited is formed by sequencing the anchor identifications of the live broadcast rooms with suspected illegal contents;
respectively acquiring the risk degrees of the plurality of latest screenshots;
respectively judging whether the risk degrees of the plurality of latest screenshots reach a risk degree threshold value;
when the risk degree of a first screenshot in the latest screenshots reaches the risk degree threshold value, moving the ordering of the anchor identification corresponding to the first screenshot to the head in the sequence to be audited;
acquiring the sequence to be audited;
extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited;
and acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
2. The method of claim 1, wherein obtaining at least one latest screenshot of a video of at least one live room corresponding to the at least one anchor identifier further comprises, after displaying the at least one latest screenshot on an audit interface:
detecting an operation acting on the at least one latest screenshot;
and when a selection operation acting on a second screenshot in the at least one latest screenshot is detected, the second screenshot is displayed in an enlarged mode on the audit interface.
3. The method of claim 2, wherein the step of displaying a second screenshot in the review interface in an enlarged manner when a selection operation on the second screenshot of the at least one latest screenshot is detected comprises:
when a selection operation acting on the second screenshot is detected, a third screenshot is obtained, wherein the third screenshot comprises the first N frames of screenshots of the second screenshot of the video of the live broadcast room, and N is a positive integer;
and amplifying and displaying the second screenshot on the audit interface, and displaying the third screenshot.
4. The method of claim 3, further comprising:
and when the second screenshot and the third screenshot comprise target screenshots with the risk degree reaching a risk degree threshold value, highlighting the target screenshots.
5. The method of any of claims 2-4, wherein the when a selection operation is detected that acts on a second screenshot of the at least one most recent screenshot, zooming in on the second screenshot in the review interface, comprises:
and when the cursor is detected to hover over a second screenshot in the at least one latest screenshot, the second screenshot is displayed in an enlarged mode on the audit interface.
6. The method according to claim 1, wherein before extracting at least one anchor identifier from the sequence to be audited in a front-to-back order of the anchor identifiers in the sequence to be audited, the method further comprises:
acquiring a first size of the checking interface and a second size of a picture displayed on the checking interface;
determining the number of pictures that can be displayed by the audit interface based on the first size and the second size;
determining the number of the anchor marks extracted from the sequence to be audited based on the number of the displayable pictures.
7. An infraction auditing apparatus, the apparatus comprising:
the system comprises a real-time acquisition module, a verification processing module and a verification processing module, wherein the real-time acquisition module is used for acquiring a plurality of latest screenshots of videos of a plurality of live broadcast rooms corresponding to a plurality of anchor identifiers in a sequence to be verified in real time, and the sequence to be verified is formed by sequencing the anchor identifiers of the live broadcast rooms with suspected illegal contents;
a risk degree obtaining module, configured to obtain risk degrees of the plurality of latest screenshots respectively;
the judging module is used for respectively judging whether the risk degrees of the plurality of latest screenshots reach a risk degree threshold value;
the sorting module is used for moving the sorting of the anchor identifier corresponding to the first screenshot to the head in the to-be-audited sequence when the risk of the first screenshot in the plurality of latest screenshots reaches the risk threshold;
the acquisition module is used for acquiring the sequence to be audited;
the extracting module is used for extracting at least one anchor identifier from the sequence to be audited according to the sequence of the anchor identifiers from front to back in the sequence to be audited;
and the display module is used for acquiring at least one latest screenshot of the video of at least one live broadcast room according to the at least one anchor identifier, and displaying the at least one latest screenshot on an audit interface, wherein the at least one anchor identifier corresponds to the at least one latest screenshot one by one.
8. An electronic device, comprising:
a screen;
a memory;
one or more processors coupled with the memory;
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-6.
9. A computer-readable storage medium, having stored thereon program code that can be invoked by a processor to perform the method according to any one of claims 1 to 6.
CN201811628698.6A 2018-12-28 2018-12-28 Violation auditing method and device, electronic equipment and storage medium Active CN109803152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811628698.6A CN109803152B (en) 2018-12-28 2018-12-28 Violation auditing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811628698.6A CN109803152B (en) 2018-12-28 2018-12-28 Violation auditing method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109803152A CN109803152A (en) 2019-05-24
CN109803152B true CN109803152B (en) 2021-05-21

Family

ID=66558083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811628698.6A Active CN109803152B (en) 2018-12-28 2018-12-28 Violation auditing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109803152B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191356A (en) * 2019-06-06 2019-08-30 北京字节跳动网络技术有限公司 Video reviewing method, device and electronic equipment
CN110944217A (en) * 2019-12-12 2020-03-31 北京达佳互联信息技术有限公司 Live broadcast information processing method and device, server and storage medium
CN111464819B (en) * 2020-03-30 2022-07-15 腾讯音乐娱乐科技(深圳)有限公司 Live image detection method, device, equipment and storage medium
CN111770352B (en) * 2020-06-24 2021-12-07 北京字节跳动网络技术有限公司 Security detection method and device, electronic equipment and storage medium
CN111797752A (en) * 2020-06-29 2020-10-20 广州市百果园信息技术有限公司 Illegal video detection method, device, equipment and storage medium
CN113938692B (en) * 2020-07-13 2024-02-09 广州壹点通网络科技有限公司 Video live broadcast risk control method and device
CN112464036B (en) * 2020-11-24 2023-06-16 行吟信息科技(武汉)有限公司 Method and device for auditing violation data
CN113221845A (en) * 2021-06-07 2021-08-06 北京猎豹移动科技有限公司 Advertisement auditing method, device, equipment and storage medium
CN113422975A (en) * 2021-06-17 2021-09-21 武汉氪细胞网络技术有限公司 Background live video auditing method
CN114040253A (en) * 2021-11-04 2022-02-11 广州博冠信息科技有限公司 Live broadcast display method and device, storage medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458286A (en) * 2013-08-30 2013-12-18 小米科技有限责任公司 Television channel switching method and device
CN106604133A (en) * 2016-12-20 2017-04-26 天脉聚源(北京)教育科技有限公司 Live streaming monitoring method and device
CN106791517A (en) * 2016-11-21 2017-05-31 广州爱九游信息技术有限公司 Live video detection method, device and service end
CN106961611A (en) * 2016-01-12 2017-07-18 中兴通讯股份有限公司 A kind of method for realizing multichannel preview, server and terminal
CN107682719A (en) * 2017-09-05 2018-02-09 广州数沃信息科技有限公司 A kind of monitoring and assessing method and device of live content health degree
CN107959863A (en) * 2016-10-14 2018-04-24 北京酷我科技有限公司 A kind of video reviewing method and system
CN108377417A (en) * 2018-01-17 2018-08-07 百度在线网络技术(北京)有限公司 Video reviewing method, device, computer equipment and storage medium
CN108769823A (en) * 2018-05-28 2018-11-06 广州虎牙信息科技有限公司 Direct broadcasting room display methods, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140073289A (en) * 2012-12-06 2014-06-16 삼성전자주식회사 Display apparatus and information providing method using display apparatus
US20140181869A1 (en) * 2012-12-21 2014-06-26 Kabushiki Kaisha Toshiba Electronic device and method of controlling electronic device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458286A (en) * 2013-08-30 2013-12-18 小米科技有限责任公司 Television channel switching method and device
CN106961611A (en) * 2016-01-12 2017-07-18 中兴通讯股份有限公司 A kind of method for realizing multichannel preview, server and terminal
CN107959863A (en) * 2016-10-14 2018-04-24 北京酷我科技有限公司 A kind of video reviewing method and system
CN106791517A (en) * 2016-11-21 2017-05-31 广州爱九游信息技术有限公司 Live video detection method, device and service end
CN106604133A (en) * 2016-12-20 2017-04-26 天脉聚源(北京)教育科技有限公司 Live streaming monitoring method and device
CN107682719A (en) * 2017-09-05 2018-02-09 广州数沃信息科技有限公司 A kind of monitoring and assessing method and device of live content health degree
CN108377417A (en) * 2018-01-17 2018-08-07 百度在线网络技术(北京)有限公司 Video reviewing method, device, computer equipment and storage medium
CN108769823A (en) * 2018-05-28 2018-11-06 广州虎牙信息科技有限公司 Direct broadcasting room display methods, device, equipment and storage medium

Also Published As

Publication number Publication date
CN109803152A (en) 2019-05-24

Similar Documents

Publication Publication Date Title
CN109803152B (en) Violation auditing method and device, electronic equipment and storage medium
US11481428B2 (en) Bullet screen content processing method, application server, and user terminal
CN109756746B (en) Video auditing method, device, server and storage medium
CN106326391B (en) Multimedia resource recommendation method and device
CN110784759B (en) Bullet screen information processing method and device, electronic equipment and storage medium
CN108495185B (en) Video title generation method and device
CN109669795B (en) Crash information processing method and device
CN108777806B (en) User identity recognition method, device and storage medium
CN109829379B (en) Information processing method, information processing apparatus, server, and storage medium
JP7231638B2 (en) Image-based information acquisition method and apparatus
CN114095749B (en) Recommendation and live interface display method, computer storage medium and program product
WO2017107831A1 (en) Application based broadcasting method, device and electronic device
US20170169062A1 (en) Method and electronic device for recommending video
CN110674345A (en) Video searching method and device and server
CN109766508B (en) Information auditing method and device and electronic equipment
JP7105309B2 (en) Video preprocessing method, device and computer program
CN111629247A (en) Information display method and device and electronic equipment
CN106095816B (en) Information delivery method and device
CN107454454A (en) Method for information display and device
CN112818224A (en) Information recommendation method and device, electronic equipment and readable storage medium
CN113573090A (en) Content display method, device and system in game live broadcast and storage medium
CN104581224B (en) Switch the method, apparatus and terminal of broadcasting content
CN107688587B (en) Media information display method and device
CN112667081A (en) Bullet screen display method and device, storage medium and terminal
CN111586329A (en) Information display method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190524

Assignee: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000030

Denomination of invention: Illegal audit method, device, electronic device and storage medium

License type: Common License

Record date: 20210125

EE01 Entry into force of recordation of patent licensing contract
GR01 Patent grant
GR01 Patent grant