CN110062261A - A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing - Google Patents
A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN110062261A CN110062261A CN201910441428.2A CN201910441428A CN110062261A CN 110062261 A CN110062261 A CN 110062261A CN 201910441428 A CN201910441428 A CN 201910441428A CN 110062261 A CN110062261 A CN 110062261A
- Authority
- CN
- China
- Prior art keywords
- video
- target
- user
- target user
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/239—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
- H04N21/2393—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25875—Management of end-user data involving end-user authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/454—Content or additional data filtering, e.g. blocking advertisements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/466—Learning process for intelligent management, e.g. learning user preferences for recommending movies
- H04N21/4668—Learning process for intelligent management, e.g. learning user preferences for recommending movies for recommending content, e.g. movies
Abstract
This application discloses a kind of network video monitoring and managing methods, this method comprises: video network platform receives and parses through the video upload request of target user's transmission;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then carrying out authentication to target user using network identification card, and identity information is stored after authentication success;If it is, reading identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence;If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.This method can realize that source video sequence is supervised.Disclosed herein as well is a kind of network video maintenance device, equipment and readable storage medium storing program for executing, have corresponding technical effect.
Description
Technical field
This application involves video technique field, more particularly to a kind of network video monitoring and managing method, device, equipment and readable
Storage medium.
Background technique
As the popularity of networking is higher and higher, the amount of video that people browse daily is more and more, video production person
Also more and more.But the video quality of magnanimity is irregular, especially major short-sighted frequency network platform, in order to pursue interests, inhales
There is a large amount of video and user in drainage flow.Supervision, audit for video and its user just become more and more difficult.
The current video network platform is not tight for the supervision of user's uploaded videos, and because the user of video network platform is with void
Quasi- identity occurs, rather than true identity.In this way, just leading to the source tracking of bad video, illegal video becomes problem.Also
It is to say, currently the user for uploading illegal video or bad video is difficult to track, is exactly difficult to this problem of final video source
Undesirable has been given with opportunity and then has occurred illegal video, bad video in major video network platform.And it is bad
Video and illegal video are propagated in video network platform, will cause biggish negative effect.
In conclusion the problems such as how efficiently solving the video supervision of video network platform, is current art technology
Personnel's technical problem urgently to be solved.
Summary of the invention
The purpose of the application is to provide a kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing, to realize
Source video sequence in video network platform is supervised.
In order to solve the above technical problems, the application provides the following technical solutions:
A kind of network video monitoring and managing method is applied to video network platform, comprising:
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then using the network identification card to the target user carry out authentication, and authentication at
Identity information is stored after function;
If it is, reading the identity information, and the mark of target video to be passed is determined according to the preset matching rule of correspondence
Whether label information matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
Preferably, after allowing to upload the target video and uploading successfully, further includes:
It is complained or when including illegal contents in the target video, according on the video uploader information warning video
Biography person simultaneously limits its permission.
Preferably, using the network identification card to the target user carry out authentication, and authentication at
After function after storage identity information, further includes:
Initialize the credit score of the target user, and complained in the target video or user's scoring is lower than default threshold
When value, the credit score is reduced.
Preferably, further includes:
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbids
Target user's uploaded videos.
Preferably, further includes:
It is drawn a portrait using the identity information to the target user, and does not meet portrait to target user shielding
As a result video content.
Preferably, further includes:
Meet the video content of the portrait result to target user push.
Preferably, Xiang Suoshu target user push meets the video content of the portrait result, comprising:
The video tab to be selected is met the view to be selected of the portrait result by the video tab to be selected for obtaining video to be selected
Frequency is determined as pushing video;
The pushing video is pushed to the target user.
A kind of network video maintenance device is applied to video platform, comprising:
Request analysis module, for receiving and parsing through the video upload request of target user's transmission;
User validation judgment module, for judging whether the target user is to utilize network identification card success identity
Lawful registration user;
Authentication module utilizes the network body if being used for the non-lawful registration user of the target user
Part card carries out authentication to the target user, and stores identity information after authentication success;
Video verification module reads the identity letter if being the lawful registration user for the target user
Breath, and determine whether the label information of target video to be passed matches with the identity information according to the preset matching rule of correspondence;
Video uploads judging module, if matching for the label information with the identity information, allows described in upload
Target video;The label information and the identity information mismatch, then forbid uploading the target video.
Preferably, further includes:
Video traces accountability module, for being regarded after allowing to upload the target video and uploading successfully in the target
Frequency is complained or when including illegal contents, according to the video uploader information warning video uploader and limits its permission.
Preferably, further includes:
Credit management module, for using the network identification card to the target user progress authentication, and
After storing identity information after authentication success, the credit score of the target user is initialized, and in the target video quilt
It complains or user scores when being lower than preset threshold, reduce the credit score.
Preferably, the credit management module is corresponded to, further includes:
User freezes module, is used for after the credit score is less than default credit threshold, by the target video undercarriage
Or limitation is propagated, and forbids target user's uploaded videos.
Preferably, further includes:
User draws a portrait module, for being drawn a portrait using the identity information to the target user, and to the target
User's shielding does not meet the video content of portrait result.
Preferably, corresponding to above-mentioned user portrait module, further includes:
Recommending module, for meeting the video content of the portrait result to target user push.
Preferably, the recommending module, specifically for obtaining the video tab to be selected of video to be selected, by the video to be selected
The video to be selected that label meets the portrait result is determined as pushing video;The pushing video is pushed to the target to use
Family.
A kind of network video monitoring equipment, comprising:
Memory, for storing computer program;
Processor performs the steps of when for executing computer program
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then using the network identification card to the target user carry out authentication, and authentication at
Identity information is stored after function;
If it is, reading the identity information, and the mark of target video to be passed is determined according to the preset matching rule of correspondence
Whether label information matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
Preferably, the processor can also perform the steps of when for executing computer program
After allowing to upload the target video and uploading successfully, it is complained in the target video or including illegal contents
When, the video uploader is warned according to video uploader information and limits its permission.
Preferably, the processor can also perform the steps of when for executing computer program
Authentication is being carried out to the target user using the network identification card, and is being stored after authentication success
After identity information, the credit score of the target user is initialized, and complained in the target video or user's scoring is lower than
When preset threshold, the credit score is reduced.
Preferably, the processor can also perform the steps of when for executing computer program
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbids
Target user's uploaded videos.
Preferably, the processor can also perform the steps of when for executing computer program
It is drawn a portrait using the identity information to the target user, and does not meet portrait to target user shielding
As a result video content.
Preferably, the processor can also perform the steps of when for executing computer program
Meet the video content of the portrait result to target user push.
Preferably, the processor can also perform the steps of when for executing computer program
The video tab to be selected is met the view to be selected of the portrait result by the video tab to be selected for obtaining video to be selected
Frequency is determined as pushing video;
The pushing video is pushed to the target user.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing
Processor performs the steps of when executing
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then using the network identification card to the target user carry out authentication, and authentication at
Identity information is stored after function;
If it is, reading the identity information, and the mark of target video to be passed is determined according to the preset matching rule of correspondence
Whether label information matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
Preferably, it can also be performed the steps of when the computer program is executed by processor
After allowing to upload the target video and uploading successfully, it is complained in the target video or including illegal contents
When, the video uploader is warned according to video uploader information and limits its permission.
Preferably, it can also be performed the steps of when the computer program is executed by processor
Authentication is being carried out to the target user using the network identification card, and is being stored after authentication success
After identity information, the credit score of the target user is initialized, and complained in the target video or user's scoring is lower than
When preset threshold, the credit score is reduced.
Preferably, it can also be performed the steps of when the computer program is executed by processor
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbids
Target user's uploaded videos.
Preferably, it can also be performed the steps of when the computer program is executed by processor
It is drawn a portrait using the identity information to the target user, and does not meet portrait to target user shielding
As a result video content.
Preferably, it can also be performed the steps of when the computer program is executed by processor
Meet the video content of the portrait result to target user push.
Preferably, it can also be performed the steps of when the computer program is executed by processor
The video tab to be selected is met the view to be selected of the portrait result by the video tab to be selected for obtaining video to be selected
Frequency is determined as pushing video;
The pushing video is pushed to the target user.
Using method provided by the embodiment of the present application, video network platform receives and parses through the video of target user's transmission
Upload request;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then utilizing
Network identification card carries out authentication to target user, and stores identity information after authentication success;If it is, reading
Identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
When video network platform receives video upload request, first determine whether target user is to utilize network identity
Demonstrate,prove the lawful registration user of success identity.Wherein, network identification card is the label of the true identity of the network user in a network,
The network user can be determined in the true personnel identity of real world based on network identification card.Judge whether target user is benefit
With the lawful registration user of network ID authentication, that is, determine whether the identity information of target user can be traced.If target user is non-
Lawful registration user then carries out authentication to target user using network identification card, and stores body after authentication success
Part information.If target user is legitimate user, the identity of the target video and the user that further judge that request uploads is needed at this time
Whether information matches, it is run if matching and uploads target video.As it can be seen that this method strictly examines video upload procedure
It looks into, it can be achieved that source video sequence is supervised, the video quality in video network platform further can be improved, be conducive to make health, product
Extremely upward network video platform.
Correspondingly, the embodiment of the present application also provides network video corresponding with above-mentioned network video monitoring and managing method supervision
Device, equipment and readable storage medium storing program for executing, have above-mentioned technique effect, and details are not described herein.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the implementation flow chart of the first network video monitoring and managing method in the embodiment of the present application;
Fig. 2 is the implementation flow chart of second of network video monitoring and managing method in the embodiment of the present application;
Fig. 3 is the implementation flow chart of the third network video monitoring and managing method in the embodiment of the present application;
Fig. 4 is the implementation flow chart of the 4th kind of network video monitoring and managing method in the embodiment of the present application;
Fig. 5 is a kind of structural schematic diagram of network video maintenance device in the embodiment of the present application;
Fig. 6 is a kind of structural schematic diagram of network video monitoring equipment in the embodiment of the present application;
Fig. 7 is a kind of concrete structure schematic diagram of network video monitoring equipment in the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, with reference to the accompanying drawings and detailed description
The application is described in further detail.Obviously, described embodiments are only a part of embodiments of the present application, rather than
Whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall in the protection scope of this application.
Embodiment one:
Referring to FIG. 1, Fig. 1 is the flow chart of the first network video monitoring and managing method in the embodiment of the present application, this method can
Applied to video network platform, method includes the following steps:
S101, the video upload request for receiving and parsing through target user's transmission.
Wherein, target user can be any one user in video network platform.Target user can pass through target
The client of video network platform such as APP, webpage, computer terminal send video upload request to video network platform, wherein regarding
Frequency upload request can specifically include the target video and the corresponding label information of target video that request uploads.Wherein, label
Information can be specially classification information belonging to the target video, such as entertain, make laughs, is surprised, terrible information;Certain label information
It can also be specially the target video be suitable for watching crowd, such as 6 years old or less children, 7-17 years old teenager, 18-40 years old youth, 41-
65 years old middle ages, the old age after 65 years old.
Video network platform receive target user send video upload request after, can to the video upload request into
Row parsing obtains target video and the corresponding label information of the target video that request uploads.For how to be uploaded to video
Request is parsed, then can be referring in particular to the resolving with existing video upload request, and this is no longer going to repeat them.
S102, judge whether target user is lawful registration user using network identification card success identity.
After completing the parsing of video upload request, it can determine whether to send whether the target user of video upload request is legal
Register user.It should be noted that in the embodiment of the present application, lawful registration user, which refers to, utilizes network identification card success identity
User.Even if that is, video network platform carried out registration but not using network whether identification card or network identity
Demonstrate,prove the use illegal registration user per family of authentification failure.Due to the similar identity card with reality of network identification card, the network body
Part card is " identity card " that the network user uses in a network.That is, the user of authentication ids is carried out using network identification card,
Its identity has true and non repudiation.
Specifically, judging whether target user is that lawful registration user can be by determining identity storage in video network platform
The identity information of target user is judgement standard.That is, if inquiring and the matched identity information of target user, it is determined that target
User is lawful registration user;If not inquiring and the matched identity information of target user, it is determined that target user does not belong to currently
In lawful registration user.After determining whether target user is lawful registration user, it can be executed according to different court verdicts
Different operations.Specifically, when the judgment result is no, thening follow the steps the operation of S103, when the judgment result is yes, then hold
The operation of row step S104.
S103, authentication is carried out to target user using network identification card, and stores identity after authentication success
Information.
When determining that target user is currently also not belonging to lawful registration user, bootable target user's completion identity is recognized at this time
Card.Specifically, key instruction can be sent to the corresponding client of target user, client is based on the key instruction on visualization circle
Face guides user to input network identification card, and network identification card is then sent to video network platform.Video network platform
Authentication is carried out to target user using network identification card, and stores identity information after authentication success.Wherein, identity
Information may include the information such as the gender of target user, age.Identity is carried out to target user for how to be based on network identification card
Certification can related definition referring in particular to network identification card and specific implementation, this is no longer going to repeat them.
S104, identity information is read, and determines the label information of target video to be uploaded according to the preset matching rule of correspondence
Whether matched with identity information.
In the embodiment of the present application, it is contemplated that different users, which uploads quality control to video, has certain limitation.For
The video quality of video network platform is got a promotion, can be preset the label information of subscriber identity information and video
The rule of correspondence is matched, the age in identity information is corresponding with the suitable viewing crowd of video tab information, and e.g., identity information is shown
It is 16 years old, then corresponding video tab information is youth.
In this way, can then directly read the identity information of target user, and according to pre- when target user is legitimate user
If matching the rule of correspondence determine label information with whether information matches.If it does, then showing target user to be uploaded
Target video quality control ability it is preferable;If it does not match, showing target user to the matter of target video to be uploaded
It is poor to measure control ability.At this point, it can be based on judging result, it is corresponding to execute different processing operations.Specifically, if it is judged that
For matching, then the operation of S105 can be entered step;If it is judged that can then enter step the operation of S106 to mismatch.
S105, allow to upload target video.
Preferably, after successfully uploading target video, to ensure the video of video network platform, sources can be traced back, can
It is added to the identity information of target user as the video uploader information externally to maintain secrecy in the label information of target video.?
That is video network platform propagate video have video uploader information, and the information be for a user can not
See information.It should be noted that wherein externally secrecy refers in the secret protection principle to user, using identity information as upper
Biography person's information is added in label information, but invisible for other users, and video network platform is visible.
S106, forbid uploading target video.
When the label information for the identity information and target video for determining target user mismatches, target can be forbidden to use at this time
Family uploads the target video.At this point, the prompt letter that video uploads failure or target video can not upload can be returned to target user
Breath.
Using method provided by the embodiment of the present application, video network platform receives and parses through the video of target user's transmission
Upload request;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then utilizing
Network identification card carries out authentication to target user, and stores identity information after authentication success;If it is, reading
Identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
When video network platform receives video upload request, first determine whether target user is to utilize network identity
Demonstrate,prove the lawful registration user of success identity.Wherein, network identification card is the label of the true identity of the network user in a network,
The network user can be determined in the true personnel identity of real world based on network identification card.Judge whether target user is benefit
With the lawful registration user of network ID authentication, that is, determine whether the identity information of target user can be traced.If target user is non-
Lawful registration user then carries out authentication to target user using network identification card, and stores body after authentication success
Part information.If target user is legitimate user, the identity of the target video and the user that further judge that request uploads is needed at this time
Whether information matches, it is run if matching and uploads target video.As it can be seen that this method strictly examines video upload procedure
It looks into, it can be achieved that source video sequence is supervised, the video quality in video network platform further can be improved, be conducive to make health, product
Extremely upward network video platform.
It should be noted that based on the above embodiment, the embodiment of the present application also provides be correspondingly improved scheme.Excellent
It can mutually be referred between step or corresponding steps same with the above-mentioned embodiment involved in choosing/improvement embodiment, it is corresponding beneficial
Effect can also be cross-referenced, no longer repeats one by one in preferred/improvement embodiment of this paper.
Embodiment two:
Referring to FIG. 2, Fig. 2 is the flow chart of second of network video monitoring and managing method in the embodiment of the present application, this method can
Applied to video network platform, method includes the following steps:
S201, the video upload request for receiving and parsing through target user's transmission.
S202, judge whether target user is lawful registration user using network identification card success identity.
After determining whether target user is lawful registration user, different behaviour can be executed according to different court verdicts
Make.Specifically, when the judgment result is no, thening follow the steps the operation of S203, when the judgment result is yes, then follow the steps
The operation of S204.
S203, authentication is carried out to target user using network identification card, and stores identity after authentication success
Information.
S204, read identity information, and according to the preset matching rule of correspondence determine the label information of target video to be passed with
Whether identity information matches.
Specifically, if it is judged that can then enter step the operation of S205 for matching;If it is judged that for not
Match, then can enter step the operation of S206.
S205, allow to upload target video, and uploaded after uploading successfully using identity information as the video externally to maintain secrecy
Person's information is added in label information.
S206, forbid uploading target video.
It is S207, complained or when including illegal contents in target video, video upload is warned according to video uploader information
Person simultaneously limits its permission.
Wherein, when target video is complained or identifies that it includes illegal contents, video network platform can pass through reading
The label information of the target video, and video uploader information is obtained from the label information.Based on the video uploader information
For the identity information of target user, thus video uploader can be found based on the video uploader information, that is, find target
Then user warns video uploader and limits its permission (such as forbidding its uploaded videos).Person of a serious nature, can also be further
By video long pass person's information, target user is enabled to undertake correspondingly financial responsibility and legal liabilities to upload illegal video.As it can be seen that
Based on that can trace to video on this at this information, unauthorized person is found.Video transmission can effectively be supervised.
Embodiment three:
Referring to FIG. 3, Fig. 3 is the flow chart of the third network video monitoring and managing method in the embodiment of the present application, this method can
Applied to video network platform, method includes the following steps:
S301, the video upload request for receiving and parsing through target user's transmission.
S302, judge whether target user is lawful registration user using network identification card success identity.
After determining whether target user is lawful registration user, different behaviour can be executed according to different court verdicts
Make.Specifically, when the judgment result is no, thening follow the steps the operation of S303, when the judgment result is yes, then follow the steps
The operation of S304.
S303, authentication is carried out to target user using network identification card, and stores identity after authentication success
Information.
S304, read identity information, and according to the preset matching rule of correspondence determine the label information of target video to be passed with
Whether identity information matches.
Specifically, if it is judged that can then enter step the operation of S305 for matching;If it is judged that for not
Match, then can enter step the operation of S306.
S305, allow to upload target video, and uploaded after uploading successfully using identity information as the video externally to maintain secrecy
Person's information is added in label information.
S306, forbid uploading target video.
S307, the credit score of initialized target user, and it is complained in target video or user's scoring is lower than preset threshold
When, reduce credit score.
Wherein, credit is divided into the credit evaluation to each user, can establish corresponding credit score assessment rule to user
It is assessed.Authentication, and the storage identity letter after authentication success are being carried out to target user using network identification card
After breath, the credit score of an initialization can be set for the target user.The specific value of the credit score can be based on user's
Identity information is set, such as using the age of user as initialization standard, adult human user 80, underage users 60;Or
Have with the identity of user and stablize occupation as standard, be 70 with occupation is stablized, no stablize professional is 65.Correspondingly, credit is commented
Divider can then drop specifically, when the target video that target user is uploaded is complained or user's scoring is lower than preset threshold
The credit score of low target user.For example, being often complained once, 1 point of credit score is reduced;Lower than 1 point, (user comments user's scoring mean value
Dividing score value is ten point system), then reduce by 10 points of credit scores.
S308, after credit score is less than default credit threshold, target video undercarriage or limitation are propagated, and forbid target
User's uploaded videos.
A settable default credit threshold in the embodiment of the present application, for example, if credit indicates that credit is good when being divided into 60
It is good, then it can set credit threshold to 10 points or 20 points.When credit score is less than credit threshold, at this time it is believed that target user
Credit is poor, can be directly by the biography of target video undercarriage or limited target video for the video quality for ensureing video network platform
It broadcasts.In addition, also target user can be forbidden to upload other videos.
Example IV:
Referring to FIG. 4, Fig. 4 is the flow chart of the 4th kind of network video monitoring and managing method in the embodiment of the present application, this method can
Applied to video network platform, method includes the following steps:
S401, the video upload request for receiving and parsing through target user's transmission.
S402, judge whether target user is lawful registration user using network identification card success identity.
After determining whether target user is lawful registration user, different behaviour can be executed according to different court verdicts
Make.Specifically, when the judgment result is no, thening follow the steps the operation of S403, when the judgment result is yes, then follow the steps
The operation of S404.
S403, authentication is carried out to target user using network identification card, and stores identity after authentication success
Information.
S404, read identity information, and according to the preset matching rule of correspondence determine the label information of target video to be passed with
Whether identity information matches.
Specifically, if it is judged that can then enter step the operation of S405 for matching;If it is judged that for not
Match, then can enter step the operation of S406.
S405, allow to upload target video.
S406, forbid uploading target video.
S407, it is drawn a portrait using identity information to target user, and does not meet portrait result to target user's shielding
Video content.
Wherein, user draws a portrait, i.e., identity-based information identifies the hobby of target user, is suitable for video.For example, if identity
The bright target user of information table is male, then the favorite such as game video of male user, ball match video is classified as target user's happiness
The video type of love;If the bright target user of chronological table in identity information is children, it is suitable for the caricature video of children's viewing, learns
Suitable video of the video as target user is practised, and game video and terrible video are classified as the view that target user is not suitable for viewing
Frequency type.In this way, the video content for not meeting portrait result can be shielded to target user.For example, being shielded to child user all
Such as terrible video, dangerous video (video of such as dangerous movement) this video for being unfavorable for children's physical and mental health.
S408, the video content for meeting portrait result to target user's push.
After completing user's portrait, the result that can be drawn a portrait based on user thinks that target user pushes associated video.For example, can be
Visualization interface is recommended to user may interested video.
Specifically, meeting the realization process of the video content of portrait result to target user's push, comprising:
Step 1: obtaining the video tab to be selected of video to be selected, video tab to be selected is met to the view to be selected of portrait result
Frequency is determined as pushing video;
Step 2: pushing video is pushed to target user.
Above-mentioned steps one and step 2 are combined below for ease of description and are illustrated.
Obtain the video tab to be selected of a large amount of videos to be selected first, then by the video tab to be selected of each video to be selected with
Portrait result is compared, and determines the video to be selected for meeting the portrait result as pushing video.Then pushing video is pushed away
Target user is given, to improve user satisfaction, promotes user experience.
Embodiment five:
Corresponding to above method embodiment, the embodiment of the present application also provides a kind of networks that can be applied to video platform
Video maintenance device, network video maintenance device described below can be corresponded to each other with network described above video monitoring and managing method
Reference.
Shown in Figure 5, which comprises the following modules:
Request analysis module 101, for receiving and parsing through the video upload request of target user's transmission;
User validation judgment module 102, for judging whether target user is to utilize network identification card success identity
Lawful registration user;
Authentication module 103, if being used for the illegal registration user of target user, using network identification card to target
User carries out authentication, and stores identity information after authentication success;
Video verification module 104 reads identity information if being lawful registration user for target user, and according to
The preset matching rule of correspondence determines whether the label information of target video to be passed matches with identity information;
Video uploads judging module 105, if matching for label information with identity information, allows to upload target video;
Label information and identity information mismatch, then forbid uploading target video.
Using device provided by the embodiment of the present application, video network platform receives and parses through the video of target user's transmission
Upload request;Judge whether target user is lawful registration user using network identification card success identity;If it is not, then utilizing
Network identification card carries out authentication to target user, and stores identity information after authentication success;If it is, reading
Identity information, and determine whether the label information of target video to be passed matches with identity information according to the preset matching rule of correspondence;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
When video network platform receives video upload request, first determine whether target user is to utilize network identity
Demonstrate,prove the lawful registration user of success identity.Wherein, network identification card is the label of the true identity of the network user in a network,
The network user can be determined in the true personnel identity of real world based on network identification card.Judge whether target user is benefit
With the lawful registration user of network ID authentication, that is, determine whether the identity information of target user can be traced.If target user is non-
Lawful registration user then carries out authentication to target user using network identification card, and stores body after authentication success
Part information.If target user is legitimate user, the identity of the target video and the user that further judge that request uploads is needed at this time
Whether information matches, it is run if matching and uploads target video.As it can be seen that the device strictly examines video upload procedure
It looks into, it can be achieved that source video sequence is supervised, the video quality in video network platform further can be improved, be conducive to make health, product
Extremely upward network video platform.
In a kind of specific embodiment of the application, further includes:
Video traces accountability module, for being complained after allowing to upload target video and uploading successfully in target video
Or when including illegal contents, video uploader is warned according to video uploader information and limits its permission.
In a kind of specific embodiment of the application, further includes:
Credit management module, for carrying out authentication to target user using network identification card, and in authentication
After storing identity information after success, the credit score of initialized target user, and it is complained in target video or user's scoring is low
When preset threshold, credit score is reduced.
In a kind of specific embodiment of the application, above-mentioned credit management module is corresponded to, further includes:
User freezes module, for after credit score is less than default credit threshold, target video undercarriage or limitation to be passed
It broadcasts, and forbids target user's uploaded videos.
In a kind of specific embodiment of the application, further includes:
User's portrait module is not inconsistent for being drawn a portrait using identity information to target user, and to target user's shielding
Close the video content of portrait result.
In a kind of specific embodiment of the application, corresponding to above-mentioned user portrait module, further includes:
Recommending module, for meeting the video content of portrait result to target user's push.
In a kind of specific embodiment of the application, recommending module, specifically for obtaining the video to be selected of video to be selected
The video to be selected that video tab to be selected meets portrait result is determined as pushing video by label;Pushing video is pushed to target
User.
Embodiment six:
Corresponding to above method embodiment, the embodiment of the present application also provides a kind of network video monitoring equipments, hereafter
A kind of network video monitoring equipment of description can correspond to each other reference with a kind of above-described network video monitoring and managing method.
Shown in Figure 6, which includes:
Memory D1, for storing computer program;
Processor D2, performs the steps of when for executing computer program
Receive and parse through the video upload request of target user's transmission;
Judge whether target user is lawful registration user using network identification card success identity;
If it is not, then carrying out authentication to target user using network identification card, and stored after authentication success
Identity information;
If it is, reading identity information, and determine that the label of target video to be passed is believed according to the preset matching rule of correspondence
Whether breath matches with identity information;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
Preferably, processor D2 can also be performed the steps of when for executing computer program
Allowing to upload target video and after uploading successfully, is being complained in target video or when including illegal contents, according to
Video uploader information warning video uploader simultaneously limits its permission.
Preferably, processor D2 can also be performed the steps of when for executing computer program
Authentication is being carried out to target user using network identification card, and is storing identity information after authentication success
Later, the credit score of initialized target user, and when target video is complained or user's scoring is lower than preset threshold, reduce letter
With point.
Preferably, processor D2 can also be performed the steps of when for executing computer program
After credit score is less than default credit threshold, target video undercarriage or limitation are propagated, and forbid target user
Uploaded videos.
Preferably, processor D2 can also be performed the steps of when for executing computer program
In the video drawn a portrait using identity information to target user, and do not meet portrait result to target user's shielding
Hold.
Preferably, processor D2 can also be performed the steps of when for executing computer program
Meet the video content of portrait result to target user's push.
Preferably, processor D2 can also be performed the steps of when for executing computer program
The video to be selected that video tab to be selected meets portrait result is determined as by the video tab to be selected for obtaining video to be selected
Pushing video;
Pushing video is pushed to target user.
Specifically, referring to FIG. 7, Fig. 7 is that a kind of specific structure of network video monitoring equipment provided in this embodiment shows
It is intended to, it may include one or one which, which can generate bigger difference because configuration or performance are different,
It a above processor (central processing units, CPU) 322 (for example, one or more processors) and deposits
Reservoir 332, one or more storage application programs 342 or data 344 storage medium 330 (such as one or one with
Upper mass memory unit).Wherein, memory 332 and storage medium 330 can be of short duration storage or persistent storage.It is stored in
The program of storage media 330 may include one or more modules (diagram does not mark), and each module may include to data
Series of instructions operation in processing equipment.Further, central processing unit 322 can be set to logical with storage medium 330
Letter executes the series of instructions operation in storage medium 330 on network video monitoring equipment 301.
Network video monitoring equipment 301 can also include one or more power supplys 326, one or more are wired
Or radio network interface 350, one or more input/output interfaces 358, and/or, one or more operating systems
341.For example, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in network video monitoring and managing method as described above can be realized by the structure of network video monitoring equipment.
Embodiment seven:
Corresponding to above method embodiment, the embodiment of the present application also provides a kind of readable storage medium storing program for executing, are described below
A kind of readable storage medium storing program for executing can correspond to each other reference with a kind of above-described network video monitoring and managing method.
A kind of readable storage medium storing program for executing is stored with computer program on readable storage medium storing program for executing, and computer program is held by processor
It is performed the steps of when row
Receive and parse through the video upload request of target user's transmission;
Judge whether target user is lawful registration user using network identification card success identity;
If it is not, then carrying out authentication to target user using network identification card, and stored after authentication success
Identity information;
If it is, reading identity information, and determine that the label of target video to be passed is believed according to the preset matching rule of correspondence
Whether breath matches with identity information;
If it does, then allowing to upload target video;If it does not match, forbidding uploading target video.
Preferably, it can also be performed the steps of when computer program is executed by processor
Allowing to upload target video and after uploading successfully, is being complained in target video or when including illegal contents, according to
Video uploader information warning video uploader simultaneously limits its permission.
Preferably, it can also be performed the steps of when computer program is executed by processor
Authentication is being carried out to target user using network identification card, and is storing identity information after authentication success
Later, the credit score of initialized target user, and when target video is complained or user's scoring is lower than preset threshold, reduce letter
With point.
Preferably, it can also be performed the steps of when computer program is executed by processor
After credit score is less than default credit threshold, target video undercarriage or limitation are propagated, and forbid target user
Uploaded videos.
Preferably, it can also be performed the steps of when computer program is executed by processor
In the video drawn a portrait using identity information to target user, and do not meet portrait result to target user's shielding
Hold.
Preferably, it can also be performed the steps of when computer program is executed by processor
Meet the video content of portrait result to target user's push.
Preferably, it can also be performed the steps of when computer program is executed by processor
The video to be selected that video tab to be selected meets portrait result is determined as by the video tab to be selected for obtaining video to be selected
Pushing video;
Pushing video is pushed to target user.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory,
ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk
The readable storage medium storing program for executing of code.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond scope of the present application.
Claims (10)
1. a kind of network video monitoring and managing method, which is characterized in that be applied to video network platform, comprising:
Receive and parse through the video upload request of target user's transmission;
Judge whether the target user is lawful registration user using network identification card success identity;
If it is not, then carrying out authentication to the target user using the network identification card, and after authentication success
Store identity information;
If it is, reading the identity information, and determine that the label of target video to be passed is believed according to the preset matching rule of correspondence
Whether breath matches with the identity information;
If it does, then allowing to upload the target video;If it does not match, forbidding uploading the target video.
2. network video monitoring and managing method according to claim 1, which is characterized in that allowing to upload the target video simultaneously
After uploading successfully, further includes:
It is complained or when including illegal contents in the target video, according to the video uploader information warning video uploader
And limit its permission.
3. network video monitoring and managing method according to claim 1, which is characterized in that in the utilization network identification card to institute
It states target user and carries out authentication, and after authentication success after storage identity information, further includes:
Initialize the credit score of the target user, and complained in the target video or user's scoring is lower than preset threshold
When, reduce the credit score.
4. network video monitoring and managing method according to claim 3, which is characterized in that further include:
After the credit score is less than default credit threshold, the target video undercarriage or limitation are propagated, and forbidden described
Target user's uploaded videos.
5. network video monitoring and managing method according to claim 1, which is characterized in that further include:
It is drawn a portrait using the identity information to the target user, and does not meet portrait result to target user shielding
Video content.
6. network video monitoring and managing method according to claim 5, which is characterized in that further include:
Meet the video content of the portrait result to target user push.
7. network video monitoring and managing method according to claim 6, which is characterized in that Xiang Suoshu target user push meets institute
State the video content of portrait result, comprising:
The video tab to be selected for obtaining video to be selected, the video to be selected that the video tab to be selected is met the portrait result are true
It is set to pushing video;
The pushing video is pushed to the target user.
8. a kind of network video maintenance device, which is characterized in that be applied to video platform, comprising:
Request analysis module, for receiving and parsing through the video upload request of target user's transmission;
User validation judgment module, for judging whether the target user is to utilize the legal of network identification card success identity
Register user;
Authentication module utilizes the network identification card if being used for the non-lawful registration user of the target user
Authentication is carried out to the target user, and stores identity information after authentication success;
Video verification module reads the identity information if being the lawful registration user for the target user, and
Determine whether the label information of target video to be passed matches with the identity information according to the preset matching rule of correspondence;
Video uploads judging module, if matching for the label information with the identity information, allows to upload the target
Video;The label information and the identity information mismatch, then forbid uploading the target video.
9. a kind of network video monitoring equipment characterized by comprising
Memory, for storing computer program;
Processor realizes the network video monitoring party as described in any one of claim 1 to 7 when for executing the computer program
The step of method.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing
It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of network video monitoring and managing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910441428.2A CN110062261B (en) | 2019-05-24 | 2019-05-24 | Network video monitoring method, device, equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910441428.2A CN110062261B (en) | 2019-05-24 | 2019-05-24 | Network video monitoring method, device, equipment and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110062261A true CN110062261A (en) | 2019-07-26 |
CN110062261B CN110062261B (en) | 2021-08-10 |
Family
ID=67324533
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910441428.2A Active CN110062261B (en) | 2019-05-24 | 2019-05-24 | Network video monitoring method, device, equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110062261B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120151519A1 (en) * | 2009-08-26 | 2012-06-14 | Gemalto Sa | Mobile electronic device configured to establish secure wireless communication |
CN102572677A (en) * | 2010-12-17 | 2012-07-11 | 沈阳晨讯希姆通科技有限公司 | System and method for remote evidence obtaining for third generation (3G) network |
CN105025094A (en) * | 2015-07-09 | 2015-11-04 | 传成文化传媒(上海)有限公司 | Multi-screen interaction method and system |
US20160088029A1 (en) * | 2011-10-21 | 2016-03-24 | Telefonaktiebolaget L M Ericsson (Publ) | Real-time communications methods providing pause and resume and related devices |
CN105827616A (en) * | 2016-04-25 | 2016-08-03 | 四川联友电讯技术有限公司 | Video information secure sending and receiving method of fragment asynchronous conference |
-
2019
- 2019-05-24 CN CN201910441428.2A patent/CN110062261B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120151519A1 (en) * | 2009-08-26 | 2012-06-14 | Gemalto Sa | Mobile electronic device configured to establish secure wireless communication |
CN102572677A (en) * | 2010-12-17 | 2012-07-11 | 沈阳晨讯希姆通科技有限公司 | System and method for remote evidence obtaining for third generation (3G) network |
US20160088029A1 (en) * | 2011-10-21 | 2016-03-24 | Telefonaktiebolaget L M Ericsson (Publ) | Real-time communications methods providing pause and resume and related devices |
CN105025094A (en) * | 2015-07-09 | 2015-11-04 | 传成文化传媒(上海)有限公司 | Multi-screen interaction method and system |
CN105827616A (en) * | 2016-04-25 | 2016-08-03 | 四川联友电讯技术有限公司 | Video information secure sending and receiving method of fragment asynchronous conference |
Also Published As
Publication number | Publication date |
---|---|
CN110062261B (en) | 2021-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fraga-Lamas et al. | Fake news, disinformation, and deepfakes: Leveraging distributed ledger technologies and blockchain to combat digital deception and counterfeit reality | |
Cotter | Playing the visibility game: How digital influencers and algorithms negotiate influence on Instagram | |
US10437965B2 (en) | Detection of unauthorized content in live multiuser composite streams | |
US8821271B2 (en) | Techniques for providing narrative content for competitive gaming events | |
US20170250796A1 (en) | Trans Vernam Cryptography: Round One | |
Purba et al. | Classification of instagram fake users using supervised machine learning algorithms | |
CN106575327A (en) | Analyzing facial recognition data and social network data for user authentication | |
Bancroft | The darknet and smarter crime: methods for investigating criminal entrepreneurs and the illicit drug economy | |
US9542458B2 (en) | Systems and methods for processing and displaying user-generated content | |
US10855803B2 (en) | Performance evaluation in a network community | |
WO2023283545A1 (en) | Systems and method for providing security against deception and abuse in distributed and tokenized environments | |
CN110602184B (en) | Method and device for monitoring and processing cheating behaviors in website | |
CN108667828A (en) | A kind of risk control method, device and storage medium | |
CN110474944A (en) | Processing method, device and the storage medium of the network information | |
CN113628049B (en) | Conflict arbitration method of blockchain intelligent contracts based on group intelligence | |
US8352401B2 (en) | Incorporating representational authenticity into virtual world interactions | |
Dutta et al. | Blackmarket-driven collusion on online media: a survey | |
CN113890739A (en) | Cross-block-chain authentication method and device, electronic equipment and medium | |
CN108491734A (en) | A kind of computer software on-line debugging method | |
CN110062261A (en) | A kind of network video monitoring and managing method, device, equipment and readable storage medium storing program for executing | |
CN110858211B (en) | Data storage method, device and system and storage medium | |
Wierzbicki et al. | Studying web content credibility by social simulation | |
CN109413459B (en) | User recommendation method and related equipment in live broadcast platform | |
Wright | The use and acceptance of the Internet of Things (IoT) by American consumers | |
CN116707835B (en) | Method and system for realizing patient information interaction based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |