CN110062261B - Network video monitoring method, device, equipment and readable storage medium - Google Patents

Network video monitoring method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN110062261B
CN110062261B CN201910441428.2A CN201910441428A CN110062261B CN 110062261 B CN110062261 B CN 110062261B CN 201910441428 A CN201910441428 A CN 201910441428A CN 110062261 B CN110062261 B CN 110062261B
Authority
CN
China
Prior art keywords
video
target
network
target user
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910441428.2A
Other languages
Chinese (zh)
Other versions
CN110062261A (en
Inventor
刘新
袁飞霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201910441428.2A priority Critical patent/CN110062261B/en
Publication of CN110062261A publication Critical patent/CN110062261A/en
Application granted granted Critical
Publication of CN110062261B publication Critical patent/CN110062261B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/466Learning process for intelligent management, e.g. learning user preferences for recommending movies
    • H04N21/4668Learning process for intelligent management, e.g. learning user preferences for recommending movies for recommending content, e.g. movies

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses a network video supervision method, which comprises the following steps: the video network platform receives and analyzes a video uploading request sent by a target user; judging whether the target user is a legal registered user successfully authenticated by using the network identity card; if not, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful; if so, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule; if the matching is successful, the target video is allowed to be uploaded; and if not, forbidding uploading the target video. The method can realize video source supervision. The application also discloses a network video monitoring device, equipment and a readable storage medium, which have corresponding technical effects.

Description

Network video monitoring method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of video technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for network video monitoring.
Background
With the increasing popularity of networking, people browse more and more videos and video producers more and more everyday. However, the quality of massive videos is uneven, and especially for various large and short video network platforms, a large number of videos and users appear in order to seek benefits and attract traffic. Surveillance and auditing of videos and their users become increasingly difficult.
The current video network platform is not strict in monitoring videos uploaded by users, and users of the video network platform appear in virtual identities instead of real identities. This causes a problem of tracing the source of a defective video or an illegal video. That is, it is difficult to track the current users uploading illegal or bad videos, and the problem that the final video source is difficult is that the illegal users can take advantage of the opportunity to further generate illegal or bad videos in each large video network platform. And bad videos and illegal videos are spread on a video network platform, which causes great negative effects.
In summary, how to effectively solve the problems of video supervision and the like of a video network platform is a technical problem that needs to be solved urgently by those skilled in the art at present.
Disclosure of Invention
The application aims to provide a network video supervision method, a network video supervision device, network video supervision equipment and a readable storage medium, so that a video source in a video network platform is supervised.
In order to solve the technical problem, the application provides the following technical scheme:
a network video supervision method is applied to a video network platform and comprises the following steps:
receiving and analyzing a video uploading request sent by a target user;
judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
if not, the network identity card is used for carrying out identity authentication on the target user, and identity information is stored after the identity authentication is successful;
if so, reading the identity information, and determining whether the tag information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
if the target video is matched with the target video, allowing the target video to be uploaded; and if not, forbidding uploading the target video.
Preferably, after the target video is allowed to be uploaded and the uploading is successful, the method further comprises:
and when the target video is complained or comprises illegal contents, warning the video uploader according to the video uploader information and limiting the authority of the video uploader.
Preferably, after the identity authentication is performed on the target user by using the network identity card, and the identity information is stored after the identity authentication is successful, the method further includes:
initializing the credit score of the target user, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
Preferably, the method further comprises the following steps:
and after the credit score is smaller than a preset credit threshold value, the target video is off-shelf or propagation is limited, and the target user is prohibited from uploading the video.
Preferably, the method further comprises the following steps:
and utilizing the identity information to portray the target user, and shielding the video content which does not accord with the portrayal result from the target user.
Preferably, the method further comprises the following steps:
and pushing the video content which accords with the image result to the target user.
Preferably, pushing the video content conforming to the portrait result to the target user includes:
acquiring a video tag to be selected of a video to be selected, and determining the video to be selected with the video tag to be selected conforming to the portrait result as a pushed video;
and pushing the push video to the target user.
A network video supervision device is applied to a video platform and comprises:
the request analysis module is used for receiving and analyzing a video uploading request sent by a target user;
the user validity judging module is used for judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
the identity authentication module is used for authenticating the identity of the target user by using the network identity card if the target user is not the legal registered user and storing identity information after the identity authentication is successful;
the video verification module is used for reading the identity information if the target user is the legal registered user and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
the video uploading judgment module is used for allowing the target video to be uploaded if the label information is matched with the identity information; and if the label information is not matched with the identity information, the target video is prohibited from being uploaded.
Preferably, the method further comprises the following steps:
and the video tracing accountability module is used for warning the video uploader according to the video uploader information and limiting the authority of the video uploader when the target video is complained or comprises illegal contents after the target video is allowed to be uploaded and successfully uploaded.
Preferably, the method further comprises the following steps:
and the credit management module is used for initializing the credit score of the target user after the target user is subjected to identity authentication by using the network identity card and the identity information is stored after the identity authentication is successful, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
Preferably, the credit management module further includes:
and the user freezing module is used for putting the target video off shelf or limiting transmission and forbidding the target user to upload the video after the credit score is smaller than a preset credit threshold value.
Preferably, the method further comprises the following steps:
and the user portrait module is used for portrait-describing the target user by utilizing the identity information and shielding the video content which does not accord with the portrait-describing result from the target user.
Preferably, the user profile module further comprises:
and the recommending module is used for pushing the video content which accords with the image result to the target user.
Preferably, the recommending module is specifically configured to obtain a to-be-selected video tag of a to-be-selected video, and determine the to-be-selected video of which the to-be-selected video tag meets the portrait result as a pushed video; and pushing the push video to the target user.
A network video surveillance device, comprising:
a memory for storing a computer program;
a processor for implementing the following steps when executing the computer program:
receiving and analyzing a video uploading request sent by a target user;
judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
if not, the network identity card is used for carrying out identity authentication on the target user, and identity information is stored after the identity authentication is successful;
if so, reading the identity information, and determining whether the tag information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
if the target video is matched with the target video, allowing the target video to be uploaded; and if not, forbidding uploading the target video.
Preferably, the processor, when executing the computer program, may further implement the following steps:
and after the target video is allowed to be uploaded and successfully uploaded, when the target video is complained or includes illegal contents, the video uploader is warned according to the video uploader information and the authority of the video uploader is limited.
Preferably, the processor, when executing the computer program, may further implement the following steps:
and after the identity authentication is carried out on the target user by using the network identity card and the identity information is stored after the identity authentication is successful, initializing the credit score of the target user, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
Preferably, the processor, when executing the computer program, may further implement the following steps:
and after the credit score is smaller than a preset credit threshold value, the target video is off-shelf or propagation is limited, and the target user is prohibited from uploading the video.
Preferably, the processor, when executing the computer program, may further implement the following steps:
and utilizing the identity information to portray the target user, and shielding the video content which does not accord with the portrayal result from the target user.
Preferably, the processor, when executing the computer program, may further implement the following steps:
and pushing the video content which accords with the image result to the target user.
Preferably, the processor, when executing the computer program, may further implement the following steps:
acquiring a video tag to be selected of a video to be selected, and determining the video to be selected with the video tag to be selected conforming to the portrait result as a pushed video;
and pushing the push video to the target user.
A readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
receiving and analyzing a video uploading request sent by a target user;
judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
if not, the network identity card is used for carrying out identity authentication on the target user, and identity information is stored after the identity authentication is successful;
if so, reading the identity information, and determining whether the tag information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
if the target video is matched with the target video, allowing the target video to be uploaded; and if not, forbidding uploading the target video.
Preferably, the computer program when executed by the processor further realizes the steps of:
and after the target video is allowed to be uploaded and successfully uploaded, when the target video is complained or includes illegal contents, the video uploader is warned according to the video uploader information and the authority of the video uploader is limited.
Preferably, the computer program when executed by the processor further realizes the steps of:
and after the identity authentication is carried out on the target user by using the network identity card and the identity information is stored after the identity authentication is successful, initializing the credit score of the target user, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
Preferably, the computer program when executed by the processor further realizes the steps of:
and after the credit score is smaller than a preset credit threshold value, the target video is off-shelf or propagation is limited, and the target user is prohibited from uploading the video.
Preferably, the computer program when executed by the processor further realizes the steps of:
and utilizing the identity information to portray the target user, and shielding the video content which does not accord with the portrayal result from the target user.
Preferably, the computer program when executed by the processor further realizes the steps of:
and pushing the video content which accords with the image result to the target user.
Preferably, the computer program when executed by the processor further realizes the steps of:
acquiring a video tag to be selected of a video to be selected, and determining the video to be selected with the video tag to be selected conforming to the portrait result as a pushed video;
and pushing the push video to the target user.
By applying the method provided by the embodiment of the application, the video network platform receives and analyzes the video uploading request sent by the target user; judging whether the target user is a legal registered user successfully authenticated by using the network identity card; if not, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful; if so, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule; if the matching is successful, the target video is allowed to be uploaded; and if not, forbidding uploading the target video.
When the video network platform receives a video uploading request, whether a target user is a legal registered user successfully authenticated by using a network identity card is judged at first. The network identity card is a label of the real identity of the network user in the network, and the real person identity of the network user in the real world can be determined based on the network identity card. Namely, whether the target user is a legal registered user using network identity authentication is judged, namely whether the identity information of the target user can be traced. And if the target user is not a legal registered user, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful. If the target user is a legal user, whether the target video requested to be uploaded is matched with the identity information of the user needs to be further judged, and if the target video is matched with the identity information of the user, the target video is uploaded. Therefore, the method strictly examines the video uploading process, can realize the video source supervision, further can improve the video quality in the video network platform, and is beneficial to creating a healthy and active network video platform.
Accordingly, embodiments of the present application further provide a network video monitoring apparatus, a device and a readable storage medium corresponding to the network video monitoring method, which have the above technical effects and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating an implementation of a first network video surveillance method in an embodiment of the present application;
fig. 2 is a flowchart illustrating an implementation of a second network video surveillance method in an embodiment of the present application;
FIG. 3 is a flowchart illustrating an implementation of a third network video surveillance method in an embodiment of the present application;
FIG. 4 is a flowchart illustrating an implementation of a fourth method for monitoring network videos according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a network video surveillance apparatus in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a network video surveillance device in an embodiment of the present application;
fig. 7 is a schematic structural diagram of a network video surveillance device in an embodiment of the present application.
Detailed Description
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The first embodiment is as follows:
referring to fig. 1, fig. 1 is a flowchart illustrating a first network video surveillance method in an embodiment of the present application, where the method is applicable to a video network platform, and the method includes the following steps:
s101, receiving and analyzing a video uploading request sent by a target user.
The target user can be any user in the video network platform. The target user can send a video uploading request to the video network platform through a client of the target video network platform, such as an APP, a webpage, and a computer terminal, wherein the video uploading request may specifically include a target video requested to be uploaded and tag information corresponding to the target video. The tag information can be classified information to which the target video belongs, such as information of entertainment, laughter, surprise, thriller and the like; of course, the tag information may also be embodied as that the target video is suitable for viewing people, such as children under 6 years old, teenagers 7-17 years old, teenagers 18-40 years old, middle-aged 41-65 years old, and elderly people after 65 years old.
After receiving a video uploading request sent by a target user, the video network platform can analyze the video uploading request to obtain a target video requested to be uploaded and label information corresponding to the target video. For how to analyze the video upload request, reference may be specifically made to the analysis process of the existing video upload request, which is not described in detail herein.
S102, judging whether the target user is a legal registered user successfully authenticated by using the network identity card.
After the analysis of the video uploading request is completed, whether the target user sending the video uploading request is a legal registered user can be judged. It should be noted that, in the embodiment of the present application, a legitimate registered user refers to a user successfully authenticated by using a network identity card. That is, even if the user is registered on the video network platform, the user who does not utilize the network for negative authentication or fails in network id authentication is not a legally registered user. Since the network identity card is similar to an identity card in reality, the network identity card is an identity card used by a network user in a network. That is, the identity of the user authenticated by the network identity card is real and non-repudiatable.
Specifically, whether the target user is a legal registered user or not can be judged by determining that the identity information of the target user is stored in the identity of the video network platform as a judgment standard. That is, if identity information matched with the target user is inquired, the target user is determined to be a legal registered user; and if the identity information matched with the target user is not inquired, determining that the target user does not belong to a legal registered user currently. After determining whether the target user is a legal registered user, different operations may be performed according to different decision results. Specifically, when the determination result is no, the operation of step S103 is performed, and when the determination result is yes, the operation of step S104 is performed.
S103, identity authentication is carried out on the target user by using the network identity card, and identity information is stored after the identity authentication is successful.
When the target user is determined not to belong to the legal registered user, the target user can be guided to complete identity authentication. Specifically, a guiding instruction can be sent to a client corresponding to the target user, the client guides the user to input the network identity card on the visual interface based on the guiding instruction, and then the network identity card is sent to the video network platform. The video network platform can utilize the network identity card to authenticate the identity of the target user and store the identity information after the identity authentication is successful. The identity information may include information such as gender and age of the target user. For how to perform identity authentication on a target user based on a network identity card, specific reference may be made to the relevant definition and specific implementation of the network identity card, which is not described in detail herein.
And S104, reading the identity information, and determining whether the label information of the target video to be uploaded is matched with the identity information according to a preset matching corresponding rule.
In the embodiment of the application, the control of the video uploading quality by different users is considered to have certain limitations. In order to improve the video quality of the video network platform, a matching corresponding rule of user identity information and video label information can be preset, the age in the identity information corresponds to a suitable watching crowd of the video label information, and if the identity information is displayed to be 16 years old, the corresponding video label information is young.
Therefore, when the target user is a legal user, the identity information of the target user can be directly read, and whether the label information is matched with the information or not is determined according to the preset matching corresponding rule. If the target video is matched with the target video, the target user is indicated to have better quality control capability on the target video to be uploaded; and if not, indicating that the target user has poor quality control capability on the target video to be uploaded. At this time, different processing operations may be correspondingly performed based on the determination result. Specifically, if the determination result is matching, the operation of step S105 may be entered; if the determination result is not matched, the operation of step S106 may be entered.
And S105, allowing the target video to be uploaded.
Preferably, after the target video is successfully uploaded, in order to ensure that the source of the video network platform can be traced, the identity information of the target user can be added to the tag information of the target video as the video uploader information which is kept secret from the outside. That is, videos that are distributed on a video network platform have video uploader information that is invisible to the user. It should be noted that the external secrecy refers to that the identity information is added to the tag information as the uploader information in a privacy protection principle for the user, but is invisible to other users, and the video network platform is visible.
And S106, prohibiting uploading the target video.
When it is determined that the identity information of the target user does not match the tag information of the target video, the target user may be prohibited from uploading the target video. At this time, a prompt message that the video uploading fails or the target video cannot be uploaded can be returned to the target user.
By applying the method provided by the embodiment of the application, the video network platform receives and analyzes the video uploading request sent by the target user; judging whether the target user is a legal registered user successfully authenticated by using the network identity card; if not, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful; if so, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule; if the matching is successful, the target video is allowed to be uploaded; and if not, forbidding uploading the target video.
When the video network platform receives a video uploading request, whether a target user is a legal registered user successfully authenticated by using a network identity card is judged at first. The network identity card is a label of the real identity of the network user in the network, and the real person identity of the network user in the real world can be determined based on the network identity card. Namely, whether the target user is a legal registered user using network identity authentication is judged, namely whether the identity information of the target user can be traced. And if the target user is not a legal registered user, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful. If the target user is a legal user, whether the target video requested to be uploaded is matched with the identity information of the user needs to be further judged, and if the target video is matched with the identity information of the user, the target video is uploaded. Therefore, the method strictly examines the video uploading process, can realize the video source supervision, further can improve the video quality in the video network platform, and is beneficial to creating a healthy and active network video platform.
It should be noted that, based on the above embodiments, the embodiments of the present application also provide corresponding improvements. In the preferred/improved embodiment, the same steps as those in the above embodiment or corresponding steps may be referred to each other, and corresponding advantageous effects may also be referred to each other, which are not described in detail in the preferred/improved embodiment herein.
Example two:
referring to fig. 2, fig. 2 is a flowchart illustrating a second network video surveillance method in an embodiment of the present application, where the method is applicable to a video network platform, and the method includes the following steps:
s201, receiving and analyzing a video uploading request sent by a target user.
S202, judging whether the target user is a legal registered user successfully authenticated by using the network identity card.
After determining whether the target user is a legal registered user, different operations may be performed according to different decision results. Specifically, when the determination result is no, the operation of step S203 is performed, and when the determination result is yes, the operation of step S204 is performed.
S203, the network identity card is used for authenticating the identity of the target user, and the identity information is stored after the identity authentication is successful.
S204, reading the identity information, and determining whether the tag information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule.
Specifically, if the determination result is matching, the operation of step S205 may be entered; if the determination result is not matched, the operation of step S206 may be entered.
S205, uploading the target video is allowed, and after the target video is uploaded successfully, the identity information is added to the label information as the video uploader information which is kept secret from the outside.
And S206, prohibiting uploading the target video.
And S207, when the target video is complained or includes illegal contents, warning the video uploader according to the video uploader information and limiting the authority of the video uploader.
When the target video is complained or identified to include illegal contents, the video network platform can read the label information of the target video and obtain the video uploading person information from the label information. Based on the identity information of the target user, the video uploader can be found based on the video uploader information, that is, the target user can be found, and then the video uploader is warned and the authority of the video uploader is limited (for example, the video uploading is prohibited). The person with serious plot can further make the target user bear corresponding economic and legal responsibilities for uploading illegal videos through the video long-distance transmitter information. Therefore, the video can be traced based on the information, and illegal persons can be found. The video transmission can be effectively supervised.
Example three:
referring to fig. 3, fig. 3 is a flowchart illustrating a third network video surveillance method in an embodiment of the present application, where the method is applicable to a video network platform, and the method includes the following steps:
s301, receiving and analyzing a video uploading request sent by a target user.
S302, whether the target user is a legal registered user successfully authenticated by using the network identity card is judged.
After determining whether the target user is a legal registered user, different operations may be performed according to different decision results. Specifically, when the determination result is no, the operation of step S303 is performed, and when the determination result is yes, the operation of step S304 is performed.
S303, the network identity card is used for authenticating the identity of the target user, and the identity information is stored after the identity authentication is successful.
S304, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule.
Specifically, if the determination result is a match, the operation of step S305 may be entered; if the determination result is not matched, the operation of step S306 may be entered.
S305, allowing the target video to be uploaded, and adding the identity information into the label information as the video uploader information which is kept secret from the outside after the target video is uploaded successfully.
S306, forbidding uploading the target video.
S307, initializing the credit score of the target user, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
The credit score is evaluated for each user, and corresponding credit score evaluation rules can be established for evaluating the users. After the network identity card is used for identity authentication of a target user and identity information is stored after the identity authentication is successful, an initialized credit score can be set for the target user. The specific value of the credit score can be set based on the identity information of the user, for example, the age of the user is used as an initialization standard, the number of adult users is 80, and the number of immature users is 60; or the identity of the user is standardized to have a stable occupation of 70 and an unstable occupation of 65. Accordingly, the credit scoring rule may specifically be that when the target video uploaded by the target user is complained or the user score is lower than a preset threshold, the credit score of the target user may be decreased. For example, every complaint, a 1 point credit score is reduced; if the average value of the user scores is lower than 1 point (the user score is 10 points), the 10-point credit score is reduced.
And S308, after the credit score is smaller than the preset credit threshold value, putting the target video off shelf or limiting the transmission, and forbidding the target user to upload the video.
In the embodiment of the present application, a predetermined credit threshold may be set, for example, if the credit score is 60, which indicates that the credit is good, the credit threshold may be set to 10 or 20. When the credit score is smaller than the credit threshold value, the credit of the target user can be considered to be poor, and the target video can be directly off-shelf or the transmission of the target video can be limited in order to guarantee the video quality of the video network platform. In addition, the target user may also be prohibited from uploading other videos.
Example four:
referring to fig. 4, fig. 4 is a flowchart illustrating a fourth network video surveillance method in an embodiment of the present application, where the method is applicable to a video network platform, and the method includes the following steps:
s401, receiving and analyzing a video uploading request sent by a target user.
S402, judging whether the target user is a legal registered user successfully authenticated by using the network identity card.
After determining whether the target user is a legal registered user, different operations may be performed according to different decision results. Specifically, when the determination result is no, the operation of step S403 is performed, and when the determination result is yes, the operation of step S404 is performed.
And S403, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful.
S404, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule.
Specifically, if the determination result is matching, the operation of step S405 may be performed; if the determination result is not matched, the operation of step S406 may be entered.
And S405, allowing the target video to be uploaded.
And S406, prohibiting uploading the target video.
S407, the target user is portrayed by using the identity information, and the video content which does not accord with the portrayal result is shielded from the target user.
The user portrait is a favorite and suitable video of the target user identified based on the identity information. For example, if the identity information indicates that the target user is a male, the favorite video types of the male user, such as game videos and ball game videos, are listed as the favorite video types of the target user; if the age in the identity information indicates that the target user is a child, the cartoon video and the learning video which are suitable for the child to watch are taken as suitable videos of the target user, and the game video and the thriller video are listed as video types which are not suitable for the target user to watch. Thus, the video content which does not conform to the pictorial result can be shielded from the target user. For example, videos which are unfavorable to physical and mental health of children, such as thriller videos and dangerous videos (e.g., videos with dangerous actions), are shielded from children users.
S408, pushing the video content which accords with the portrait result to the target user.
After user portrayal is completed, the target user may be pushed related video based on the user portrayal results. For example, videos that may be of interest may be recommended to the user at a visualization interface.
Specifically, the implementation process of pushing the video content meeting the portrait result to the target user includes:
the method comprises the steps of firstly, acquiring a to-be-selected video label of a to-be-selected video, and determining the to-be-selected video of which the to-be-selected video label accords with an image result as a pushed video;
and step two, pushing the push video to a target user.
For convenience of description, the first step and the second step will be described in combination.
Firstly, obtaining a large number of video tags to be selected of videos to be selected, then comparing the video tags to be selected of each video to be selected with the portrait result, and determining the video to be selected which meets the portrait result as a push video. And then pushing the push video to a target user so as to improve the user satisfaction and improve the user experience.
Example five:
corresponding to the above method embodiments, the present application further provides a network video surveillance device applicable to a video platform, and the network video surveillance device described below and the network video surveillance method described above may be referred to in correspondence.
Referring to fig. 5, the apparatus includes the following modules:
the request analysis module 101 is used for receiving and analyzing a video uploading request sent by a target user;
the user validity judging module 102 is configured to judge whether the target user is a valid registered user successfully authenticated by using the network identity card;
the identity authentication module 103 is used for authenticating the identity of the target user by using the network identity card if the target user is not a legal registered user, and storing identity information after the identity authentication is successful;
the video verification module 104 is configured to read the identity information if the target user is a legal registered user, and determine whether the tag information of the target video to be transmitted is matched with the identity information according to a preset matching correspondence rule;
the video uploading judgment module 105 is used for allowing the target video to be uploaded if the tag information is matched with the identity information; and if the label information is not matched with the identity information, the target video is prohibited from being uploaded.
By applying the device provided by the embodiment of the application, the video network platform receives and analyzes the video uploading request sent by the target user; judging whether the target user is a legal registered user successfully authenticated by using the network identity card; if not, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful; if so, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule; if the matching is successful, the target video is allowed to be uploaded; and if not, forbidding uploading the target video.
When the video network platform receives a video uploading request, whether a target user is a legal registered user successfully authenticated by using a network identity card is judged at first. The network identity card is a label of the real identity of the network user in the network, and the real person identity of the network user in the real world can be determined based on the network identity card. Namely, whether the target user is a legal registered user using network identity authentication is judged, namely whether the identity information of the target user can be traced. And if the target user is not a legal registered user, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful. If the target user is a legal user, whether the target video requested to be uploaded is matched with the identity information of the user needs to be further judged, and if the target video is matched with the identity information of the user, the target video is uploaded. Therefore, the device strictly examines the video uploading process, can realize video source supervision, further can improve the video quality in the video network platform, and is beneficial to creating a healthy and active network video platform.
In one embodiment of the present application, the method further includes:
and the video tracing accountability module is used for warning a video uploader according to the information of the video uploader and limiting the authority of the video uploader when the target video is complained or comprises illegal contents after the target video is allowed to be uploaded and successfully uploaded.
In one embodiment of the present application, the method further includes:
and the credit management module is used for initializing the credit score of the target user after the target user is subjected to identity authentication by using the network identity card and the identity information is stored after the identity authentication is successful, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
In an embodiment of the application, the credit management module further includes:
and the user freezing module is used for putting the target video off shelf or limiting transmission and forbidding the target user to upload the video after the credit score is smaller than a preset credit threshold value.
In one embodiment of the present application, the method further includes:
and the user portrait module is used for portrait of the target user by utilizing the identity information and shielding the video content which does not accord with the portrait result from the target user.
In an embodiment of the present application, the user profile module further includes:
and the recommending module is used for pushing the video content which accords with the portrait result to the target user.
In a specific embodiment of the application, the recommendation module is specifically configured to acquire a to-be-selected video tag of a to-be-selected video, and determine the to-be-selected video of which the to-be-selected video tag meets an portrait result as a pushed video; and pushing the push video to the target user.
Example six:
corresponding to the above method embodiment, the present application embodiment further provides a network video surveillance device, and a network video surveillance device described below and a network video surveillance method described above may be referred to in correspondence.
Referring to fig. 6, the network video surveillance apparatus includes:
a memory D1 for storing computer programs;
a processor D2, configured to implement the following steps when executing the computer program:
receiving and analyzing a video uploading request sent by a target user;
judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
if not, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful;
if so, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
if the matching is successful, the target video is allowed to be uploaded; and if not, forbidding uploading the target video.
The processor D2, when executing the computer program, preferably further performs the steps of:
and after the target video is allowed to be uploaded and successfully uploaded, when the target video is complained or includes illegal contents, the video uploader is warned according to the video uploader information and the authority of the video uploader is limited.
The processor D2, when executing the computer program, preferably further performs the steps of:
after the identity authentication is carried out on the target user by using the network identity card and the identity information is stored after the identity authentication is successful, the credit score of the target user is initialized, and when the target video is complained or the user score is lower than a preset threshold value, the credit score is reduced.
The processor D2, when executing the computer program, preferably further performs the steps of:
and after the credit score is smaller than a preset credit threshold value, the target video is off-shelf or the transmission is limited, and the target user is prohibited from uploading the video.
The processor D2, when executing the computer program, preferably further performs the steps of:
and utilizing the identity information to portray the target user, and shielding the video content which does not accord with the portrayal result from the target user.
The processor D2, when executing the computer program, preferably further performs the steps of:
and pushing the video content which accords with the portrait result to the target user.
The processor D2, when executing the computer program, preferably further performs the steps of:
acquiring a video tag to be selected of a video to be selected, and determining the video to be selected with the video tag to be selected conforming to the portrait result as a pushed video;
and pushing the push video to the target user.
Specifically, referring to fig. 7, fig. 7 is a schematic diagram of a specific structure of a network video surveillance device provided in this embodiment, which may generate relatively large differences due to different configurations or performances, and may include one or more processors (CPUs) 322 (e.g., one or more processors) and a memory 332, and one or more storage media 330 (e.g., one or more mass storage devices) storing an application 342 or data 344. Memory 332 and storage media 330 may be, among other things, transient storage or persistent storage. The program stored on the storage medium 330 may include one or more modules (not shown), each of which may include a series of instructions operating on a data processing device. Still further, the central processor 322 may be configured to communicate with the storage medium 330 to execute a series of instruction operations in the storage medium 330 on the network video surveillance device 301.
The network video surveillance appliance 301 may also include one or more power supplies 326, one or more wired or wireless network interfaces 350, one or more input-output interfaces 358, and/or one or more operating systems 341. Such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The steps in the network video surveillance method described above may be implemented by the structure of a network video surveillance device.
Example seven:
corresponding to the above method embodiment, the present application further provides a readable storage medium, and a readable storage medium described below and a network video surveillance method described above may be referred to correspondingly.
A readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
receiving and analyzing a video uploading request sent by a target user;
judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
if not, performing identity authentication on the target user by using the network identity card, and storing identity information after the identity authentication is successful;
if so, reading the identity information, and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
if the matching is successful, the target video is allowed to be uploaded; and if not, forbidding uploading the target video.
Preferably, the computer program when executed by the processor further realizes the steps of:
and after the target video is allowed to be uploaded and successfully uploaded, when the target video is complained or includes illegal contents, the video uploader is warned according to the video uploader information and the authority of the video uploader is limited.
Preferably, the computer program when executed by the processor further realizes the steps of:
after the identity authentication is carried out on the target user by using the network identity card and the identity information is stored after the identity authentication is successful, the credit score of the target user is initialized, and when the target video is complained or the user score is lower than a preset threshold value, the credit score is reduced.
Preferably, the computer program when executed by the processor further realizes the steps of:
and after the credit score is smaller than a preset credit threshold value, the target video is off-shelf or the transmission is limited, and the target user is prohibited from uploading the video.
Preferably, the computer program when executed by the processor further realizes the steps of:
and utilizing the identity information to portray the target user, and shielding the video content which does not accord with the portrayal result from the target user.
Preferably, the computer program when executed by the processor further realizes the steps of:
and pushing the video content which accords with the portrait result to the target user.
Preferably, the computer program when executed by the processor further realizes the steps of:
acquiring a video tag to be selected of a video to be selected, and determining the video to be selected with the video tag to be selected conforming to the portrait result as a pushed video;
and pushing the push video to the target user.
The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various other readable storage media capable of storing program codes.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.

Claims (8)

1. A network video supervision method is applied to a video network platform and comprises the following steps:
receiving and analyzing a video uploading request sent by a target user;
judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
if not, the network identity card is used for carrying out identity authentication on the target user, and identity information is stored after the identity authentication is successful;
if so, reading the identity information, and determining whether the tag information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
if the target video is matched with the target video, allowing the target video to be uploaded; if not, forbidding uploading the target video;
utilizing the identity information to portray the target user, and shielding video contents which do not accord with the portrayal result from the target user;
and pushing the video content which accords with the image result to the target user.
2. The method for supervising network videos according to claim 1, further comprising, after allowing the target video to be uploaded and successfully uploading, the steps of:
and when the target video is complained or comprises illegal contents, warning the video uploader according to the video uploader information and limiting the authority of the video uploader.
3. The method for supervising network video according to claim 1, wherein after authenticating the target user with the network identification card and storing the identification information after the authentication is successful, the method further comprises:
initializing the credit score of the target user, and reducing the credit score when the target video is complained or the user score is lower than a preset threshold value.
4. The method for supervising network video according to claim 3, further comprising:
and after the credit score is smaller than a preset credit threshold value, the target video is off-shelf or propagation is limited, and the target user is prohibited from uploading the video.
5. The method for supervising network video according to claim 1, wherein pushing video content conforming to the pictorial result to the target user comprises:
acquiring a video tag to be selected of a video to be selected, and determining the video to be selected with the video tag to be selected conforming to the portrait result as a pushed video;
and pushing the push video to the target user.
6. A network video supervision device is applied to a video platform and comprises:
the request analysis module is used for receiving and analyzing a video uploading request sent by a target user;
the user validity judging module is used for judging whether the target user is a legal registered user successfully authenticated by using the network identity card;
the identity authentication module is used for authenticating the identity of the target user by using the network identity card if the target user is not the legal registered user and storing identity information after the identity authentication is successful;
the video verification module is used for reading the identity information if the target user is the legal registered user and determining whether the label information of the target video to be transmitted is matched with the identity information according to a preset matching corresponding rule;
the video uploading judgment module is used for allowing the target video to be uploaded if the label information is matched with the identity information; if the tag information is not matched with the identity information, the target video is prohibited from being uploaded;
the user portrait module is used for portrait-describing the target user by utilizing the identity information and shielding video contents which do not accord with portrait-describing results from the target user;
and the recommending module is used for pushing the video content which accords with the image result to the target user.
7. A network video surveillance device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the network video surveillance method according to any one of claims 1 to 5 when executing the computer program.
8. A readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when being executed by a processor, realizes the steps of the network video surveillance method according to any one of claims 1 to 5.
CN201910441428.2A 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium Active CN110062261B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910441428.2A CN110062261B (en) 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910441428.2A CN110062261B (en) 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110062261A CN110062261A (en) 2019-07-26
CN110062261B true CN110062261B (en) 2021-08-10

Family

ID=67324533

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910441428.2A Active CN110062261B (en) 2019-05-24 2019-05-24 Network video monitoring method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110062261B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572677A (en) * 2010-12-17 2012-07-11 沈阳晨讯希姆通科技有限公司 System and method for remote evidence obtaining for third generation (3G) network
CN105025094A (en) * 2015-07-09 2015-11-04 传成文化传媒(上海)有限公司 Multi-screen interaction method and system
CN105827616A (en) * 2016-04-25 2016-08-03 四川联友电讯技术有限公司 Video information secure sending and receiving method of fragment asynchronous conference

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2290901A1 (en) * 2009-08-26 2011-03-02 Gemalto SA Mobile electronic device configured to establish secure wireless communication
RU2597490C2 (en) * 2011-10-21 2016-09-10 Телефонактиеболагет Лм Эрикссон (Пабл) Methods of real time communication providing pause and resumption, and related devices

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572677A (en) * 2010-12-17 2012-07-11 沈阳晨讯希姆通科技有限公司 System and method for remote evidence obtaining for third generation (3G) network
CN105025094A (en) * 2015-07-09 2015-11-04 传成文化传媒(上海)有限公司 Multi-screen interaction method and system
CN105827616A (en) * 2016-04-25 2016-08-03 四川联友电讯技术有限公司 Video information secure sending and receiving method of fragment asynchronous conference

Also Published As

Publication number Publication date
CN110062261A (en) 2019-07-26

Similar Documents

Publication Publication Date Title
US10305889B2 (en) Identity authentication method and device and storage medium
US20120054834A1 (en) Multi-step challenge-response test
CN112765336B (en) Barrage management method and device, terminal equipment and storage medium
CN114780868B (en) Method and system for generating virtual avatar by user tag of metauniverse
CN101534195A (en) Authentication method, authentication device, and recording medium
US10855803B2 (en) Performance evaluation in a network community
CN104573479A (en) Method and device for use control on user equipment
Valluripally et al. Modeling and defense of social virtual reality attacks inducing cybersickness
CN111667275A (en) User identity identification method, device, equipment and medium thereof
Mathis et al. Virtual reality observations: Using virtual reality to augment lab-based shoulder surfing research
CN113918898A (en) Safety verification code generation method, system and medium based on track drawing interaction
CN113096055B (en) Training method and device for image generation model, electronic equipment and storage medium
CN110062261B (en) Network video monitoring method, device, equipment and readable storage medium
Ghiyamipour Secure graphical password based on cued click points using fuzzy logic
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN111672130A (en) Game player identity authentication method, authentication device and cloud game system
CN111860482A (en) Dynamic graphic code verification method and device, electronic equipment and storage medium
CN114917590B (en) Virtual reality game system
CN112561457A (en) Talent recruitment method based on face recognition, terminal server and storage medium
CN113518061B (en) Data transmission method, equipment, device, system and medium in face recognition
Wong BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces
Jin et al. Ar captcha: Recognizing robot by augmented reality
Constantinides et al. Applying Benford's Law as an Efficient and Low-cost Solution for Verifying the Authenticity of Users’ Video Streams in Learning Management Systems
CN111598230A (en) Training method and system of neural network model with anti-counterfeiting function, anti-counterfeiting verification method and electronic device
CN117150149B (en) Method and device for making friends in short distance under line, thing watch and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant