CN110062261A - A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing - Google Patents

A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing Download PDF

Info

Publication number
CN110062261A
CN110062261A CN201910441428.2A CN201910441428A CN110062261A CN 110062261 A CN110062261 A CN 110062261A CN 201910441428 A CN201910441428 A CN 201910441428A CN 110062261 A CN110062261 A CN 110062261A
Authority
CN
China
Prior art keywords
video
target
user
target user
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910441428.2A
Other languages
Chinese (zh)
Other versions
CN110062261B (en
Inventor
刘新
袁飞霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910441428.2A priority Critical patent/CN110062261B/en
Publication of CN110062261A publication Critical patent/CN110062261A/en
Application granted granted Critical
Publication of CN110062261B publication Critical patent/CN110062261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/466Learning process for intelligent management, e.g. learning user preferences for recommending movies
    • H04N21/4668Learning process for intelligent management, e.g. learning user preferences for recommending movies for recommending content, e.g. movies

Abstract

This application discloses a kind of network video monitoring and managing methods, this method comprises: video network platform receives and parses through the video upload request of target user's transmission;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then carrying out authentication to target user using network identification card, and identity information is stored after authentication success;If it is, reading identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence;If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.This method can realize that source video sequence is supervised.Disclosed herein as well is a kind of network video maintenance device, equipment and readable storage medium storing program for executing, have corresponding technical effect.

Description

A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing
Technical field
This application involves video technique field, more particularly to a kind of network video monitoring and managing method, device, equipment and readable Storage medium.
Background technique
As the popularity of networking is higher and higher, the amount of video that people browse daily is more and more, video production person Also more and more.But the video quality of magnanimity is irregular, especially major short-sighted frequency network platform, in order to pursue interests, inhales There is a large amount of video and user in drainage flow.Supervision, audit for video and its user just become more and more difficult.
The current video network platform is not tight for the supervision of user's uploaded videos, and because the user of video network platform is with void Quasi- identity occurs, rather than true identity.In this way, just leading to the source tracking of bad video, illegal video becomes problem.Also It is to say, currently the user for uploading illegal video or bad video is difficult to track, is exactly difficult to this problem of final video source Undesirable has been given with opportunity and then has occurred illegal video, bad video in major video network platform.And it is bad Video and illegal video are propagated in video network platform, will cause biggish negative effect.
In conclusion the problems such as how efficiently solving the video supervision of video network platform, is current art technology Personnel's technical problem urgently to be solved.
Summary of the invention
The purpose of the application is to provide a kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing, to realize Source video sequence in video network platform is supervised.
In order to solve the above technical problems, the application provides the following technical solutions:
A kind of network video monitoring and managing method is applied to video network platform, comprising:
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then using the network identification card to the target user carry out authentication, and authentication at Identity information is stored after function;
If it is, reading the identity information, and the mark of target video to be passed is determined according to the preset matching rule of correspondence Whether label information matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
Preferably, after allowing to upload the target video and uploading successfully, further includes:
It is complained or when including illegal contents in the target video, according on the video uploader information warning video Biography person simultaneously limits its permission.
Preferably, using the network identification card to the target user carry out authentication, and authentication at After function after storage identity information, further includes:
Initialize the credit score of the target user, and complained in the target video or user's scoring is lower than default threshold When value, the credit score is reduced.
Preferably, further includes:
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbids Target user's uploaded videos.
Preferably, further includes:
It is drawn a portrait using the identity information to the target user, and does not meet portrait to target user shielding As a result video content.
Preferably, further includes:
Meet the video content of the portrait result to target user push.
Preferably, Xiang Suoshu target user push meets the video content of the portrait result, comprising:
The video tab to be selected is met the view to be selected of the portrait result by the video tab to be selected for obtaining video to be selected Frequency is determined as pushing video;
The pushing video is pushed to the target user.
A kind of network video maintenance device is applied to video platform, comprising:
Request analysis module, for receiving and parsing through the video upload request of target user's transmission;
User validation judgment module, for judging whether the target user is to utilize network identification card success identity Lawful registration user;
Authentication module utilizes the network body if being used for the non-lawful registration user of the target user Part card carries out authentication to the target user, and stores identity information after authentication success;
Video verification module reads the identity letter if being the lawful registration user for the target user Breath, and determine whether the label information of target video to be passed matches with the identity information according to the preset matching rule of correspondence;
Video uploads judging module, if matching for the label information with the identity information, allows described in upload Target video;The label information and the identity information mismatch, then forbid uploading the target video.
Preferably, further includes:
Video traces accountability module, for being regarded after allowing to upload the target video and uploading successfully in the target Frequency is complained or when including illegal contents, according to the video uploader information warning video uploader and limits its permission.
Preferably, further includes:
Credit management module, for using the network identification card to the target user progress authentication, and After storing identity information after authentication success, the credit score of the target user is initialized, and in the target video quilt It complains or user scores when being lower than preset threshold, reduce the credit score.
Preferably, the credit management module is corresponded to, further includes:
User freezes module, is used for after the credit score is less than default credit threshold, by the target video undercarriage Or limitation is propagated, and forbids target user's uploaded videos.
Preferably, further includes:
User draws a portrait module, for being drawn a portrait using the identity information to the target user, and to the target User's shielding does not meet the video content of portrait result.
Preferably, corresponding to above-mentioned user portrait module, further includes:
Recommending module, for meeting the video content of the portrait result to target user push.
Preferably, the recommending module, specifically for obtaining the video tab to be selected of video to be selected, by the video to be selected The video to be selected that label meets the portrait result is determined as pushing video;The pushing video is pushed to the target to use Family.
A kind of network video monitoring equipment, comprising:
Memory, for storing computer program;
Processor performs the steps of when for executing computer program
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then using the network identification card to the target user carry out authentication, and authentication at Identity information is stored after function;
If it is, reading the identity information, and the mark of target video to be passed is determined according to the preset matching rule of correspondence Whether label information matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
Preferably, the processor can also perform the steps of when for executing computer program
After allowing to upload the target video and uploading successfully, it is complained in the target video or including illegal contents When, the video uploader is warned according to video uploader information and limits its permission.
Preferably, the processor can also perform the steps of when for executing computer program
Authentication is being carried out to the target user using the network identification card, and is being stored after authentication success After identity information, the credit score of the target user is initialized, and complained in the target video or user's scoring is lower than When preset threshold, the credit score is reduced.
Preferably, the processor can also perform the steps of when for executing computer program
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbids Target user's uploaded videos.
Preferably, the processor can also perform the steps of when for executing computer program
It is drawn a portrait using the identity information to the target user, and does not meet portrait to target user shielding As a result video content.
Preferably, the processor can also perform the steps of when for executing computer program
Meet the video content of the portrait result to target user push.
Preferably, the processor can also perform the steps of when for executing computer program
The video tab to be selected is met the view to be selected of the portrait result by the video tab to be selected for obtaining video to be selected Frequency is determined as pushing video;
The pushing video is pushed to the target user.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing Processor performs the steps of when executing
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then using the network identification card to the target user carry out authentication, and authentication at Identity information is stored after function;
If it is, reading the identity information, and the mark of target video to be passed is determined according to the preset matching rule of correspondence Whether label information matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
Preferably, it can also be performed the steps of when the computer program is executed by processor
After allowing to upload the target video and uploading successfully, it is complained in the target video or including illegal contents When, the video uploader is warned according to video uploader information and limits its permission.
Preferably, it can also be performed the steps of when the computer program is executed by processor
Authentication is being carried out to the target user using the network identification card, and is being stored after authentication success After identity information, the credit score of the target user is initialized, and complained in the target video or user's scoring is lower than When preset threshold, the credit score is reduced.
Preferably, it can also be performed the steps of when the computer program is executed by processor
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbids Target user's uploaded videos.
Preferably, it can also be performed the steps of when the computer program is executed by processor
It is drawn a portrait using the identity information to the target user, and does not meet portrait to target user shielding As a result video content.
Preferably, it can also be performed the steps of when the computer program is executed by processor
Meet the video content of the portrait result to target user push.
Preferably, it can also be performed the steps of when the computer program is executed by processor
The video tab to be selected is met the view to be selected of the portrait result by the video tab to be selected for obtaining video to be selected Frequency is determined as pushing video;
The pushing video is pushed to the target user.
Using method provided by the embodiment of the present application, video network platform receives and parses through the video of target user's transmission Upload request;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then utilizing Network identification card carries out authentication to target user, and stores identity information after authentication success;If it is, reading Identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence; If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
When video network platform receives video upload request, first determine whether target user is to utilize network identity Demonstrate,prove the lawful registration user of success identity.Wherein, network identification card is the label of the true identity of the network user in a network, The network user can be determined in the true personnel identity of real world based on network identification card.Judge whether target user is benefit With the lawful registration user of network ID authentication, that is, determine whether the identity information of target user can be traced.If target user is non- Lawful registration user then carries out authentication to target user using network identification card, and stores body after authentication success Part information.If target user is legitimate user, the identity of the target video and the user that further judge that request uploads is needed at this time Whether information matches, it is run if matching and uploads target video.As it can be seen that this method strictly examines video upload procedure It looks into, it can be achieved that source video sequence is supervised, the video quality in video network platform further can be improved, be conducive to make health, product Extremely upward network video platform.
Correspondingly, the embodiment of the present application also provides network video corresponding with above-mentioned network video monitoring and managing method supervision Device, equipment and readable storage medium storing program for executing, have above-mentioned technique effect, and details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is the implementation flow chart of the first network video monitoring and managing method in the embodiment of the present application;
Fig. 2 is the implementation flow chart of second of network video monitoring and managing method in the embodiment of the present application;
Fig. 3 is the implementation flow chart of the third network video monitoring and managing method in the embodiment of the present application;
Fig. 4 is the implementation flow chart of the 4th kind of network video monitoring and managing method in the embodiment of the present application;
Fig. 5 is a kind of structural schematic diagram of network video maintenance device in the embodiment of the present application;
Fig. 6 is a kind of structural schematic diagram of network video monitoring equipment in the embodiment of the present application;
Fig. 7 is a kind of concrete structure schematic diagram of network video monitoring equipment in the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, with reference to the accompanying drawings and detailed description The application is described in further detail.Obviously, described embodiments are only a part of embodiments of the present application, rather than Whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall in the protection scope of this application.
Embodiment one:
Referring to FIG. 1, Fig. 1 is the flow chart of the first network video monitoring and managing method in the embodiment of the present application, this method can Applied to video network platform, method includes the following steps:
S101, the video upload request for receiving and parsing through target user's transmission.
Wherein, target user can be any one user in video network platform.Target user can pass through target The client of video network platform such as APP, webpage, computer terminal send video upload request to video network platform, wherein regarding Frequency upload request can specifically include the target video and the corresponding label information of target video that request uploads.Wherein, label Information can be specially classification information belonging to the target video, such as entertain, make laughs, is surprised, terrible information;Certain label information It can also be specially the target video be suitable for watching crowd, such as 6 years old or less children, 7-17 years old teenager, 18-40 years old youth, 41- 65 years old middle ages, the old age after 65 years old.
Video network platform receive target user send video upload request after, can to the video upload request into Row parsing obtains target video and the corresponding label information of the target video that request uploads.For how to be uploaded to video Request is parsed, then can be referring in particular to the resolving with existing video upload request, and this is no longer going to repeat them.
S102, judge whether target user is lawful registration user using network identification card success identity.
After completing the parsing of video upload request, it can determine whether to send whether the target user of video upload request is legal Register user.It should be noted that in the embodiment of the present application, lawful registration user, which refers to, utilizes network identification card success identity User.Even if that is, video network platform carried out registration but not using network whether identification card or network identity Demonstrate,prove the use illegal registration user per family of authentification failure.Due to the similar identity card with reality of network identification card, the network body Part card is " identity card " that the network user uses in a network.That is, the user of authentication ids is carried out using network identification card, Its identity has true and non repudiation.
Specifically, judging whether target user is that lawful registration user can be by determining identity storage in video network platform The identity information of target user is judgement standard.That is, if inquiring and the matched identity information of target user, it is determined that target User is lawful registration user;If not inquiring and the matched identity information of target user, it is determined that target user does not belong to currently In lawful registration user.After determining whether target user is lawful registration user, it can be executed according to different court verdicts Different operations.Specifically, when the judgment result is no, thening follow the steps the operation of S103, when the judgment result is yes, then hold The operation of row step S104.
S103, authentication is carried out to target user using network identification card, and stores identity after authentication success Information.
When determining that target user is currently also not belonging to lawful registration user, bootable target user's completion identity is recognized at this time Card.Specifically, key instruction can be sent to the corresponding client of target user, client is based on the key instruction on visualization circle Face guides user to input network identification card, and network identification card is then sent to video network platform.Video network platform Authentication is carried out to target user using network identification card, and stores identity information after authentication success.Wherein, identity Information may include the information such as the gender of target user, age.Identity is carried out to target user for how to be based on network identification card Certification can related definition referring in particular to network identification card and specific implementation, this is no longer going to repeat them.
S104, identity information is read, and determines the label information of target video to be uploaded according to the preset matching rule of correspondence Whether matched with identity information.
In the embodiment of the present application, it is contemplated that different users, which uploads quality control to video, has certain limitation.For The video quality of video network platform is got a promotion, can be preset the label information of subscriber identity information and video The rule of correspondence is matched, the age in identity information is corresponding with the suitable viewing crowd of video tab information, and e.g., identity information is shown It is 16 years old, then corresponding video tab information is youth.
In this way, can then directly read the identity information of target user, and according to pre- when target user is legitimate user If matching the rule of correspondence determine label information with whether information matches.If it does, then showing target user to be uploaded Target video quality control ability it is preferable;If it does not match, showing target user to the matter of target video to be uploaded It is poor to measure control ability.At this point, it can be based on judging result, it is corresponding to execute different processing operations.Specifically, if it is judged that For matching, then the operation of S105 can be entered step;If it is judged that can then enter step the operation of S106 to mismatch.
S105, allow to upload target video.
Preferably, after successfully uploading target video, to ensure the video of video network platform, sources can be traced back, can It is added to the identity information of target user as the video uploader information externally to maintain secrecy in the label information of target video.? That is video network platform propagate video have video uploader information, and the information be for a user can not See information.It should be noted that wherein externally secrecy refers in the secret protection principle to user, using identity information as upper Biography person's information is added in label information, but invisible for other users, and video network platform is visible.
S106, forbid uploading target video.
When the label information for the identity information and target video for determining target user mismatches, target can be forbidden to use at this time Family uploads the target video.At this point, the prompt letter that video uploads failure or target video can not upload can be returned to target user Breath.
Using method provided by the embodiment of the present application, video network platform receives and parses through the video of target user's transmission Upload request;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then utilizing Network identification card carries out authentication to target user, and stores identity information after authentication success;If it is, reading Identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence; If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
When video network platform receives video upload request, first determine whether target user is to utilize network identity Demonstrate,prove the lawful registration user of success identity.Wherein, network identification card is the label of the true identity of the network user in a network, The network user can be determined in the true personnel identity of real world based on network identification card.Judge whether target user is benefit With the lawful registration user of network ID authentication, that is, determine whether the identity information of target user can be traced.If target user is non- Lawful registration user then carries out authentication to target user using network identification card, and stores body after authentication success Part information.If target user is legitimate user, the identity of the target video and the user that further judge that request uploads is needed at this time Whether information matches, it is run if matching and uploads target video.As it can be seen that this method strictly examines video upload procedure It looks into, it can be achieved that source video sequence is supervised, the video quality in video network platform further can be improved, be conducive to make health, product Extremely upward network video platform.
It should be noted that based on the above embodiment, the embodiment of the present application also provides be correspondingly improved scheme.Excellent It can mutually be referred between step or corresponding steps same with the above-mentioned embodiment involved in choosing/improvement embodiment, it is corresponding beneficial Effect can also be cross-referenced, no longer repeats one by one in preferred/improvement embodiment of this paper.
Embodiment two:
Referring to FIG. 2, Fig. 2 is the flow chart of second of network video monitoring and managing method in the embodiment of the present application, this method can Applied to video network platform, method includes the following steps:
S201, the video upload request for receiving and parsing through target user's transmission.
S202, judge whether target user is lawful registration user using network identification card success identity.
After determining whether target user is lawful registration user, different behaviour can be executed according to different court verdicts Make.Specifically, when the judgment result is no, thening follow the steps the operation of S203, when the judgment result is yes, then follow the steps The operation of S204.
S203, authentication is carried out to target user using network identification card, and stores identity after authentication success Information.
S204, read identity information, and according to the preset matching rule of correspondence determine the label information of target video to be passed with Whether identity information matches.
Specifically, if it is judged that can then enter step the operation of S205 for matching;If it is judged that for not Match, then can enter step the operation of S206.
S205, allow to upload target video, and uploaded after uploading successfully using identity information as the video externally to maintain secrecy Person's information is added in label information.
S206, forbid uploading target video.
It is S207, complained or when including illegal contents in target video, video upload is warned according to video uploader information Person simultaneously limits its permission.
Wherein, when target video is complained or identifies that it includes illegal contents, video network platform can pass through reading The label information of the target video, and video uploader information is obtained from the label information.Based on the video uploader information For the identity information of target user, thus video uploader can be found based on the video uploader information, that is, find target Then user warns video uploader and limits its permission (such as forbidding its uploaded videos).Person of a serious nature, can also be further By video long pass person's information, target user is enabled to undertake correspondingly financial responsibility and legal liabilities to upload illegal video.As it can be seen that Based on that can trace to video on this at this information, unauthorized person is found.Video transmission can effectively be supervised.
Embodiment three:
Referring to FIG. 3, Fig. 3 is the flow chart of the third network video monitoring and managing method in the embodiment of the present application, this method can Applied to video network platform, method includes the following steps:
S301, the video upload request for receiving and parsing through target user's transmission.
S302, judge whether target user is lawful registration user using network identification card success identity.
After determining whether target user is lawful registration user, different behaviour can be executed according to different court verdicts Make.Specifically, when the judgment result is no, thening follow the steps the operation of S303, when the judgment result is yes, then follow the steps The operation of S304.
S303, authentication is carried out to target user using network identification card, and stores identity after authentication success Information.
S304, read identity information, and according to the preset matching rule of correspondence determine the label information of target video to be passed with Whether identity information matches.
Specifically, if it is judged that can then enter step the operation of S305 for matching;If it is judged that for not Match, then can enter step the operation of S306.
S305, allow to upload target video, and uploaded after uploading successfully using identity information as the video externally to maintain secrecy Person's information is added in label information.
S306, forbid uploading target video.
S307, the credit score of initialized target user, and it is complained in target video or user's scoring is lower than preset threshold When, reduce credit score.
Wherein, credit is divided into the credit evaluation to each user, can establish corresponding credit score assessment rule to user It is assessed.Authentication, and the storage identity letter after authentication success are being carried out to target user using network identification card After breath, the credit score of an initialization can be set for the target user.The specific value of the credit score can be based on user's Identity information is set, such as using the age of user as initialization standard, adult human user 80, underage users 60;Or Have with the identity of user and stablize occupation as standard, be 70 with occupation is stablized, no stablize professional is 65.Correspondingly, credit is commented Divider can then drop specifically, when the target video that target user is uploaded is complained or user's scoring is lower than preset threshold The credit score of low target user.For example, being often complained once, 1 point of credit score is reduced;Lower than 1 point, (user comments user's scoring mean value Dividing score value is ten point system), then reduce by 10 points of credit scores.
S308, after credit score is less than default credit threshold, target video undercarriage or limitation are propagated, and forbid target User's uploaded videos.
A settable default credit threshold in the embodiment of the present application, for example, if credit indicates that credit is good when being divided into 60 It is good, then it can set credit threshold to 10 points or 20 points.When credit score is less than credit threshold, at this time it is believed that target user Credit is poor, can be directly by the biography of target video undercarriage or limited target video for the video quality for ensureing video network platform It broadcasts.In addition, also target user can be forbidden to upload other videos.
Example IV:
Referring to FIG. 4, Fig. 4 is the flow chart of the 4th kind of network video monitoring and managing method in the embodiment of the present application, this method can Applied to video network platform, method includes the following steps:
S401, the video upload request for receiving and parsing through target user's transmission.
S402, judge whether target user is lawful registration user using network identification card success identity.
After determining whether target user is lawful registration user, different behaviour can be executed according to different court verdicts Make.Specifically, when the judgment result is no, thening follow the steps the operation of S403, when the judgment result is yes, then follow the steps The operation of S404.
S403, authentication is carried out to target user using network identification card, and stores identity after authentication success Information.
S404, read identity information, and according to the preset matching rule of correspondence determine the label information of target video to be passed with Whether identity information matches.
Specifically, if it is judged that can then enter step the operation of S405 for matching;If it is judged that for not Match, then can enter step the operation of S406.
S405, allow to upload target video.
S406, forbid uploading target video.
S407, it is drawn a portrait using identity information to target user, and does not meet portrait result to target user's shielding Video content.
Wherein, user draws a portrait, i.e., identity-based information identifies the hobby of target user, is suitable for video.For example, if identity The bright target user of information table is male, then the favorite such as game video of male user, ball match video is classified as target user's happiness The video type of love;If the bright target user of chronological table in identity information is children, it is suitable for the caricature video of children's viewing, learns Suitable video of the video as target user is practised, and game video and terrible video are classified as the view that target user is not suitable for viewing Frequency type.In this way, the video content for not meeting portrait result can be shielded to target user.For example, being shielded to child user all Such as terrible video, dangerous video (video of such as dangerous movement) this video for being unfavorable for children's physical and mental health.
S408, the video content for meeting portrait result to target user's push.
After completing user's portrait, the result that can be drawn a portrait based on user thinks that target user pushes associated video.For example, can be Visualization interface is recommended to user may interested video.
Specifically, meeting the realization process of the video content of portrait result to target user's push, comprising:
Step 1: obtaining the video tab to be selected of video to be selected, video tab to be selected is met to the view to be selected of portrait result Frequency is determined as pushing video;
Step 2: pushing video is pushed to target user.
Above-mentioned steps one and step 2 are combined below for ease of description and are illustrated.
Obtain the video tab to be selected of a large amount of videos to be selected first, then by the video tab to be selected of each video to be selected with Portrait result is compared, and determines the video to be selected for meeting the portrait result as pushing video.Then pushing video is pushed away Target user is given, to improve user satisfaction, promotes user experience.
Embodiment five:
Corresponding to above method embodiment, the embodiment of the present application also provides a kind of networks that can be applied to video platform Video maintenance device, network video maintenance device described below can be corresponded to each other with network described above video monitoring and managing method Reference.
Shown in Figure 5, which comprises the following modules:
Request analysis module 101, for receiving and parsing through the video upload request of target user's transmission;
User validation judgment module 102, for judging whether target user is to utilize network identification card success identity Lawful registration user;
Authentication module 103, if being used for the illegal registration user of target user, using network identification card to target User carries out authentication, and stores identity information after authentication success;
Video verification module 104 reads identity information if being lawful registration user for target user, and according to The preset matching rule of correspondence determines whether the label information of target video to be passed matches with identity information;
Video uploads judging module 105, if matching for label information with identity information, allows to upload target video; Label information and identity information mismatch, then forbid uploading target video.
Using device provided by the embodiment of the present application, video network platform receives and parses through the video of target user's transmission Upload request;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then utilizing Network identification card carries out authentication to target user, and stores identity information after authentication success;If it is, reading Identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence; If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
When video network platform receives video upload request, first determine whether target user is to utilize network identity Demonstrate,prove the lawful registration user of success identity.Wherein, network identification card is the label of the true identity of the network user in a network, The network user can be determined in the true personnel identity of real world based on network identification card.Judge whether target user is benefit With the lawful registration user of network ID authentication, that is, determine whether the identity information of target user can be traced.If target user is non- Lawful registration user then carries out authentication to target user using network identification card, and stores body after authentication success Part information.If target user is legitimate user, the identity of the target video and the user that further judge that request uploads is needed at this time Whether information matches, it is run if matching and uploads target video.As it can be seen that the device strictly examines video upload procedure It looks into, it can be achieved that source video sequence is supervised, the video quality in video network platform further can be improved, be conducive to make health, product Extremely upward network video platform.
In a kind of specific embodiment of the application, further includes:
Video traces accountability module, for being complained after allowing to upload target video and uploading successfully in target video Or when including illegal contents, video uploader is warned according to video uploader information and limits its permission.
In a kind of specific embodiment of the application, further includes:
Credit management module, for carrying out authentication to target user using network identification card, and in authentication After storing identity information after success, the credit score of initialized target user, and it is complained in target video or user's scoring is low When preset threshold, credit score is reduced.
In a kind of specific embodiment of the application, above-mentioned credit management module is corresponded to, further includes:
User freezes module, for after credit score is less than default credit threshold, target video undercarriage or limitation to be passed It broadcasts, and forbids target user's uploaded videos.
In a kind of specific embodiment of the application, further includes:
User's portrait module is not inconsistent for being drawn a portrait using identity information to target user, and to target user's shielding Close the video content of portrait result.
In a kind of specific embodiment of the application, corresponding to above-mentioned user portrait module, further includes:
Recommending module, for meeting the video content of portrait result to target user's push.
In a kind of specific embodiment of the application, recommending module, specifically for obtaining the video to be selected of video to be selected The video to be selected that video tab to be selected meets portrait result is determined as pushing video by label;Pushing video is pushed to target User.
Embodiment six:
Corresponding to above method embodiment, the embodiment of the present application also provides a kind of network video monitoring equipments, hereafter A kind of network video monitoring equipment of description can correspond to each other reference with a kind of above-described network video monitoring and managing method.
Shown in Figure 6, which includes:
Memory D1, for storing computer program;
Processor D2, performs the steps of when for executing computer program
Receive and parse through the video upload request of target user's transmission;
Judge whether target user is lawful registration user using network identification card success identity;
If it is not, then carrying out authentication to target user using network identification card, and stored after authentication success Identity information;
If it is, reading identity information, and determine that the label of target video to be passed is believed according to the preset matching rule of correspondence Whether breath matches with identity information;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
Preferably, processor D2 can also be performed the steps of when for executing computer program
Allowing to upload target video and after uploading successfully, is being complained in target video or when including illegal contents, according to Video uploader information warning video uploader simultaneously limits its permission.
Preferably, processor D2 can also be performed the steps of when for executing computer program
Authentication is being carried out to target user using network identification card, and is storing identity information after authentication success Later, the credit score of initialized target user, and when target video is complained or user's scoring is lower than preset threshold, reduce letter With point.
Preferably, processor D2 can also be performed the steps of when for executing computer program
After credit score is less than default credit threshold, target video undercarriage or limitation are propagated, and forbid target user Uploaded videos.
Preferably, processor D2 can also be performed the steps of when for executing computer program
In the video drawn a portrait using identity information to target user, and do not meet portrait result to target user's shielding Hold.
Preferably, processor D2 can also be performed the steps of when for executing computer program
Meet the video content of portrait result to target user's push.
Preferably, processor D2 can also be performed the steps of when for executing computer program
The video to be selected that video tab to be selected meets portrait result is determined as by the video tab to be selected for obtaining video to be selected Pushing video;
Pushing video is pushed to target user.
Specifically, referring to FIG. 7, Fig. 7 is that a kind of specific structure of network video monitoring equipment provided in this embodiment shows It is intended to, it may include one or one which, which can generate bigger difference because configuration or performance are different, It a above processor (central processing units, CPU) 322 (for example, one or more processors) and deposits Reservoir 332, one or more storage application programs 342 or data 344 storage medium 330 (such as one or one with Upper mass memory unit).Wherein, memory 332 and storage medium 330 can be of short duration storage or persistent storage.It is stored in The program of storage media 330 may include one or more modules (diagram does not mark), and each module may include to data Series of instructions operation in processing equipment.Further, central processing unit 322 can be set to logical with storage medium 330 Letter executes the series of instructions operation in storage medium 330 on network video monitoring equipment 301.
Network video monitoring equipment 301 can also include one or more power supplys 326, one or more are wired Or radio network interface 350, one or more input/output interfaces 358, and/or, one or more operating systems 341.For example, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in network video monitoring and managing method as described above can be realized by the structure of network video monitoring equipment.
Embodiment seven:
Corresponding to above method embodiment, the embodiment of the present application also provides a kind of readable storage medium storing program for executing, are described below A kind of readable storage medium storing program for executing can correspond to each other reference with a kind of above-described network video monitoring and managing method.
A kind of readable storage medium storing program for executing is stored with computer program on readable storage medium storing program for executing, and computer program is held by processor It is performed the steps of when row
Receive and parse through the video upload request of target user's transmission;
Judge whether target user is lawful registration user using network identification card success identity;
If it is not, then carrying out authentication to target user using network identification card, and stored after authentication success Identity information;
If it is, reading identity information, and determine that the label of target video to be passed is believed according to the preset matching rule of correspondence Whether breath matches with identity information;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
Preferably, it can also be performed the steps of when computer program is executed by processor
Allowing to upload target video and after uploading successfully, is being complained in target video or when including illegal contents, according to Video uploader information warning video uploader simultaneously limits its permission.
Preferably, it can also be performed the steps of when computer program is executed by processor
Authentication is being carried out to target user using network identification card, and is storing identity information after authentication success Later, the credit score of initialized target user, and when target video is complained or user's scoring is lower than preset threshold, reduce letter With point.
Preferably, it can also be performed the steps of when computer program is executed by processor
After credit score is less than default credit threshold, target video undercarriage or limitation are propagated, and forbid target user Uploaded videos.
Preferably, it can also be performed the steps of when computer program is executed by processor
In the video drawn a portrait using identity information to target user, and do not meet portrait result to target user's shielding Hold.
Preferably, it can also be performed the steps of when computer program is executed by processor
Meet the video content of portrait result to target user's push.
Preferably, it can also be performed the steps of when computer program is executed by processor
The video to be selected that video tab to be selected meets portrait result is determined as by the video tab to be selected for obtaining video to be selected Pushing video;
Pushing video is pushed to target user.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk The readable storage medium storing program for executing of code.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.

Claims (10)

1. a kind of network video monitoring and managing method, which is characterized in that be applied to video network platform, comprising:
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then carrying out authentication to the target user using the network identification card, and after authentication success Store identity information;
If it is, reading the identity information, and determine that the label of target video to be passed is believed according to the preset matching rule of correspondence Whether breath matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
2. network video monitoring and managing method according to claim 1, which is characterized in that allowing to upload the target video simultaneously After uploading successfully, further includes:
It is complained or when including illegal contents in the target video, according to the video uploader information warning video uploader And limit its permission.
3. network video monitoring and managing method according to claim 1, which is characterized in that in the utilization network identification card to institute It states target user and carries out authentication, and after authentication success after storage identity information, further includes:
Initialize the credit score of the target user, and complained in the target video or user's scoring is lower than preset threshold When, reduce the credit score.
4. network video monitoring and managing method according to claim 3, which is characterized in that further include:
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbidden described Target user's uploaded videos.
5. network video monitoring and managing method according to claim 1, which is characterized in that further include:
It is drawn a portrait using the identity information to the target user, and does not meet portrait result to target user shielding Video content.
6. network video monitoring and managing method according to claim 5, which is characterized in that further include:
Meet the video content of the portrait result to target user push.
7. network video monitoring and managing method according to claim 6, which is characterized in that Xiang Suoshu target user push meets institute State the video content of portrait result, comprising:
The video tab to be selected for obtaining video to be selected, the video to be selected that the video tab to be selected is met the portrait result are true It is set to pushing video;
The pushing video is pushed to the target user.
8. a kind of network video maintenance device, which is characterized in that be applied to video platform, comprising:
Request analysis module, for receiving and parsing through the video upload request of target user's transmission;
User validation judgment module, for judging whether the target user is to utilize the legal of network identification card success identity Register user;
Authentication module utilizes the network identification card if being used for the non-lawful registration user of the target user Authentication is carried out to the target user, and stores identity information after authentication success;
Video verification module reads the identity information if being the lawful registration user for the target user, and Determine whether the label information of target video to be passed matches with the identity information according to the preset matching rule of correspondence;
Video uploads judging module, if matching for the label information with the identity information, allows to upload the target Video;The label information and the identity information mismatch, then forbid uploading the target video.
9. a kind of network video monitoring equipment characterized by comprising
Memory, for storing computer program;
Processor realizes the network video monitoring party as described in any one of claim 1 to 7 when for executing the computer program The step of method.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of network video monitoring and managing method.
CN201910441428.2A 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium Active CN110062261B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910441428.2A CN110062261B (en) 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910441428.2A CN110062261B (en) 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110062261A true CN110062261A (en) 2019-07-26
CN110062261B CN110062261B (en) 2021-08-10

Family

ID=67324533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910441428.2A Active CN110062261B (en) 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110062261B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120151519A1 (en) * 2009-08-26 2012-06-14 Gemalto Sa Mobile electronic device configured to establish secure wireless communication
CN102572677A (en) * 2010-12-17 2012-07-11 沈阳晨讯希姆通科技有限公司 System and method for remote evidence obtaining for third generation (3G) network
CN105025094A (en) * 2015-07-09 2015-11-04 传成文化传媒(上海)有限公司 Multi-screen interaction method and system
US20160088029A1 (en) * 2011-10-21 2016-03-24 Telefonaktiebolaget L M Ericsson (Publ) Real-time communications methods providing pause and resume and related devices
CN105827616A (en) * 2016-04-25 2016-08-03 四川联友电讯技术有限公司 Video information secure sending and receiving method of fragment asynchronous conference

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120151519A1 (en) * 2009-08-26 2012-06-14 Gemalto Sa Mobile electronic device configured to establish secure wireless communication
CN102572677A (en) * 2010-12-17 2012-07-11 沈阳晨讯希姆通科技有限公司 System and method for remote evidence obtaining for third generation (3G) network
US20160088029A1 (en) * 2011-10-21 2016-03-24 Telefonaktiebolaget L M Ericsson (Publ) Real-time communications methods providing pause and resume and related devices
CN105025094A (en) * 2015-07-09 2015-11-04 传成文化传媒(上海)有限公司 Multi-screen interaction method and system
CN105827616A (en) * 2016-04-25 2016-08-03 四川联友电讯技术有限公司 Video information secure sending and receiving method of fragment asynchronous conference

Also Published As

Publication number Publication date
CN110062261B (en) 2021-08-10

Similar Documents

Publication Publication Date Title
Fraga-Lamas et al. Fake news, disinformation, and deepfakes: Leveraging distributed ledger technologies and blockchain to combat digital deception and counterfeit reality
Cotter Playing the visibility game: How digital influencers and algorithms negotiate influence on Instagram
US10437965B2 (en) Detection of unauthorized content in live multiuser composite streams
US8821271B2 (en) Techniques for providing narrative content for competitive gaming events
US20170250796A1 (en) Trans Vernam Cryptography: Round One
Purba et al. Classification of instagram fake users using supervised machine learning algorithms
CN106575327A (en) Analyzing facial recognition data and social network data for user authentication
Bancroft The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy
US9542458B2 (en) Systems and methods for processing and displaying user-generated content
US10855803B2 (en) Performance evaluation in a network community
WO2023283545A1 (en) Systems and method for providing security against deception and abuse in distributed and tokenized environments
CN110602184B (en) Method and device for monitoring and processing cheating behaviors in website
CN108667828A (en) A kind of risk control method, device and storage medium
CN110474944A (en) Processing method, device and the storage medium of the network information
CN113628049B (en) Conflict arbitration method of blockchain intelligent contracts based on group intelligence
US8352401B2 (en) Incorporating representational authenticity into virtual world interactions
Dutta et al. Blackmarket-driven collusion on online media: a survey
CN113890739A (en) Cross-block-chain authentication method and device, electronic equipment and medium
CN108491734A (en) A kind of computer software on-line debugging method
CN110062261A (en) A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing
CN110858211B (en) Data storage method, device and system and storage medium
Wierzbicki et al. Studying web content credibility by social simulation
CN109413459B (en) User recommendation method and related equipment in live broadcast platform
Wright The use and acceptance of the Internet of Things (IoT) by American consumers
CN116707835B (en) Method and system for realizing patient information interaction based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant