Disclosure of Invention
The purpose of the present disclosure is to solve at least one of the above technical drawbacks, and in particular to a banning user who can bang other users at will.
In a first aspect, a method for word suppression is provided, the method including:
receiving a preset request aiming at a forbidden user, wherein the preset request is triggered by the forbidden user;
determining whether the talk-inhibiting user has talk-inhibiting operation authority for the talk-inhibiting user;
and if the fact that the language-forbidden user has the language-forbidden operation authority aiming at the language-forbidden user is determined, executing the language-forbidden operation corresponding to the preset request.
In one possible implementation manner, determining whether the talk-inhibiting user has the talk-inhibiting operation authority for the talk-inhibiting user includes:
determining identity information of a no-introduction user and identity information of a no-introduction user, and determining whether a no-introduction control relationship exists between the identity information of the no-introduction user and the identity information of the no-introduction user;
if the fact that the identity information of the talk-inhibiting user and the identity information of the talk-inhibiting user have the talk-inhibiting control relationship is determined, determining that the talk-inhibiting user has the talk-inhibiting operation authority aiming at the talk-inhibiting user;
and if the fact that the identity information of the talk-inhibiting user does not have the talk-inhibiting control relation with the identity information of the talk-inhibiting user is determined, determining that the talk-inhibiting user does not have the talk-inhibiting operation authority for the talk-inhibiting user.
In one possible implementation manner, if the preset request is a first language-forbidden operation request for the language-forbidden user triggered by the language-forbidden user through the first language-forbidden entrance control, executing a language-forbidden operation corresponding to the preset request, including:
and generating a language-forbidden instruction for the language-forbidden user, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In one possible implementation manner, after determining whether the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user, the method further includes:
and if the fact that the language-forbidden user does not have the language-forbidden operation permission for the language-forbidden user is determined, generating first prompt information and sending the first prompt information to a client of the language-forbidden user, wherein the first prompt information is used for prompting that the language-forbidden user does not have the language-forbidden permission for the language-forbidden user.
In one possible implementation manner, if the preset request is a business card information viewing request, the executing of the language forbidden operation corresponding to the preset request includes:
generating first business card information containing a second language forbidden entrance control and sending the first business card information to a client of a language forbidden user;
receiving a second language forbidden operation request aiming at the language forbidden user, which is triggered by the language forbidden user through a second language forbidden entrance control;
and generating a language-forbidden instruction aiming at the language-forbidden user according to the second language-forbidden operation request, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In one possible implementation manner, after determining whether the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user, the method further includes:
and if the fact that the language-forbidden user does not have the language-forbidden operation authority for the language-forbidden user is determined, generating second business card information which does not contain a second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user.
In one possible implementation manner, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction includes:
and generating a language-forbidden control instruction for the language-forbidden user, and sending the language-forbidden control instruction to the client of the language-forbidden user so that the client of the language-forbidden user performs a language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction.
In one possible implementation manner, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction, further includes:
and generating second prompt information aiming at the forbidden user, and sending the second prompt information to the client of the forbidden user, wherein the second prompt information is used for prompting that the forbidden user is in a forbidden state.
In one possible implementation manner, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction, further includes:
determining whether the language-forbidden user has the hidden permission of language forbidden based on the identity information of the language-forbidden user;
if the language-forbidden user does not have the language-forbidden hiding right, generating third prompt information and sending the third prompt information to the client of the first user, wherein the third prompt information is used for prompting that the language-forbidden user is in a language-forbidden state;
and if the forbidden user has the forbidden speech hiding permission, generating fourth prompt information and sending the fourth prompt information to the client of the second user, wherein the fourth prompt information is used for prompting that the forbidden user is in a forbidden speech state, and the number of the second users is smaller than that of the first users.
In one possible implementation, the method further includes:
receiving an operation request for setting the language-forbidden intensity, triggered by a third user through a language-forbidden intensity setting page displayed in a client, wherein the third user is a user with a language-forbidden intensity setting authority;
and determining a plurality of first forbidden vocabulary words and corresponding forbidden vocabulary word strengths according to the operation request for setting the forbidden vocabulary words, wherein the forbidden vocabulary word strengths of any first forbidden vocabulary words comprise user identity levels with the permission of sending any first forbidden vocabulary words.
In one possible implementation, the method further includes:
receiving a barrage sending request containing a second language forbidden vocabulary sent by a client of a fourth user, and determining the user identity level of the fourth user;
determining whether the fourth user has the authority to send the second language forbidden vocabulary based on the user identity level of the fourth user;
and if the fourth user does not have the authority of sending the second forbidden words, generating fourth prompt information aiming at the fourth user and sending the fourth prompt information to the client of the fourth user, wherein the fourth prompt information is used for prompting that the fourth user cannot send the bullet screen containing the second forbidden words.
In a second aspect, there is provided a word-banning device, comprising:
the receiving module is used for receiving a preset request aiming at the forbidden user, which is triggered by the forbidden user;
the determining module is used for determining whether the language-forbidden user has the language-forbidden operation authority for the language-forbidden user;
and the execution module is used for executing the language-forbidden operation corresponding to the preset request if the language-forbidden user is determined to have the language-forbidden operation authority aiming at the language-forbidden user.
In a third aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the word-forbidding method described above is performed.
For example, a third aspect of the present disclosure provides a computing device comprising: the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the language forbidden method as shown in the first aspect of the disclosure.
In a fourth aspect, a computer readable storage medium is provided, which when executed by a processor implements the method of claim inhibition described above.
For example, in a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the method for word inhibition shown in the first aspect of the present disclosure.
The technical scheme provided by the embodiment of the disclosure has the following beneficial effects:
by determining whether the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user, the talk-inhibiting user can be talk-inhibited when the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
Example one
An embodiment of the present disclosure provides a word-banning method, as shown in fig. 1, the method includes:
s101, receiving a preset request aiming at a forbidden user triggered by the forbidden user;
the language forbidden user and the language forbidden user are both users in a preset website. The users in the preset website may include users who successfully log in through the client and users who enter the preset website through the client but do not log in.
The client refers to a program corresponding to the server and providing local service for the client, and needs to be operated in cooperation with the server, specifically, the client includes application programs such as a browser and video software. When the client refers to a browser, the browser can be used for opening a preset website so as to enter the preset website; when the client refers to video software and the like, the client can enter a preset website by opening the video software. The users in the preset website comprise users entering the preset website by using a browser and users entering the preset website through video software.
S102, determining whether the language forbidden user has the language forbidden operation authority for the language forbidden user;
and S103, if the fact that the language-forbidden user has the language-forbidden operation authority aiming at the language-forbidden user is determined, executing the language-forbidden operation corresponding to the preset request.
When a preset request for the forbidden user triggered by the forbidden user is received, determining whether the forbidden user has the forbidden operation authority for the forbidden user. The talk banning user and the talk banned user may be users without privilege attributes, such as ordinary users, or users with privilege attributes, such as background operators, anchor users, and users with titles in anchor rooms. The users with titles include, but are not limited to VIP 1-12 and the like, gold members, silver members and the like, knight, emperor and the like.
And when determining that the language-forbidden user has the language-forbidden operation right for the language-forbidden user, executing the language-forbidden operation corresponding to the preset request. Generally speaking, taking the live broadcast industry as an example, the rule for forbidding the operation authority is: background operators have the speaker and user forbidden permission; the anchor has the talk-inhibition authority of any user in the live broadcast room; in the same live broadcast room, the high-level users have the language forbidden permission of the low-level users. Under special conditions, the rule of forbidding the operation authority can be changed according to actual needs.
In this embodiment, by determining whether the talk-bar user has the talk-bar operation right for the talk-bar user, the talk-bar user can be talk-bar only when the talk-bar user has the talk-bar operation right for the talk-bar user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
In one embodiment, S102 includes: s1021 (not shown), S1022 (not shown), and S1023 (not shown).
S1021, determining identity information of the forbidden user and identity information of the forbidden user, and determining whether a forbidden control relationship exists between the identity information of the forbidden user and the identity information of the forbidden user;
s1022, if the fact that the identity information of the language forbidden user and the identity information of the language forbidden user have the language forbidden control relationship is determined, the language forbidden user is determined to have the language forbidden operation authority for the language forbidden user;
and S1023, if the fact that no language forbidden control relation exists between the identity information of the language forbidden user and the identity information of the language forbidden user is determined, the language forbidden user is determined not to have the language forbidden operation authority for the language forbidden user.
Specifically, if it is determined that the talk inhibiting control relationship exists between the identity information of the talk inhibiting user and the identity information of the talk inhibited user, it is determined that the talk inhibiting user has the talk inhibiting operation authority for the talk inhibited user. If the anchor has the talk-inhibiting operation authority aiming at any user in the live broadcast room, when the identity of the talk-inhibiting user is live broadcast and the talk-inhibiting user is a high-level user with privilege attribute level in the anchor live broadcast room, the talk-inhibiting user has the talk-inhibiting operation authority aiming at the talk-inhibiting user; if the VIP 1-12 are divided into three levels, namely a first level VIP 9-12, a second level VIP 6-8 and a third level VIP 1-5, the levels cannot be mutually forbidden, the VIP 9-12 has forbidden operation permission for the VIP 1-8, the VIP 6-8 has forbidden operation permission for the VIP 1-5, and when the forbidden user is the VIP7 and the forbidden user is the VIP1, the forbidden user has forbidden operation permission for the forbidden user.
And if the fact that the identity information of the talk-inhibiting user does not have the talk-inhibiting control relation with the identity information of the talk-inhibiting user is determined, determining that the talk-inhibiting user does not have the talk-inhibiting operation authority for the talk-inhibiting user. If the anchor has the language-forbidden operation authority aiming at any user in the live broadcast room, when the identity of the language-forbidden user is a high-level user with a privilege attribute level in the anchor live broadcast room, and the language-forbidden user is the anchor, the language-forbidden user does not have the language-forbidden operation authority aiming at the language-forbidden user; if the VIP 1-12 are divided into three levels, namely a first level VIP 9-12, a second level VIP 6-8 and a third level VIP 1-5, the levels cannot be mutually forbidden, the VIP 9-12 has forbidden operation permission for the VIP 1-8, the VIP 6-8 has forbidden operation permission for the VIP 1-5, when the forbidden user is the VIP12 and the forbidden user is the VIP9, the forbidden user does not have forbidden operation permission for the forbidden user, or when the forbidden user is the VIP6 and the forbidden user is the VIP11, the forbidden user does not have forbidden operation permission for the forbidden user.
In another embodiment, if the preset request is a first language-prohibiting operation request for the language-prohibited user triggered by the language-prohibited user through the first language-prohibiting entry control, a language-prohibiting operation corresponding to the preset request is executed (S103), which includes S1031 (not shown in the figure):
and S1031, generating a language-forbidden instruction for the language-forbidden user, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
When a first language-forbidden operation request, triggered by a language-forbidden user through a first language-forbidden entrance control of a client, for a language-forbidden user is received, whether the language-forbidden user has a language-forbidden operation authority for the language-forbidden user is determined, if the language-forbidden user is determined to have the language-forbidden operation authority for the language-forbidden user, a language-forbidden instruction for the language-forbidden user is generated, and corresponding language-forbidden operation is executed according to the language-forbidden instruction.
In another embodiment, S1041 (not shown) is further included after S102:
and S1041, if it is determined that the language-forbidden user does not have the language-forbidden operation permission for the language-forbidden user, generating first prompt information and sending the first prompt information to the client of the language-forbidden user, where the first prompt information is used for prompting that the language-forbidden user does not have the language-forbidden permission for the language-forbidden user.
If the preset request is a first language-inhibition operation request for the language-inhibited user, which is triggered by the language-inhibition user through the first language-inhibition entrance control of the client, S101, S102 (including S1021, S1022, and S1023) and S103 (including S1031) are a specific implementation scheme, or S101, S102 (including S1021, S1022, and S1023) and S1041 are another specific implementation scheme.
In another embodiment, if the preset request is a business card information viewing request, a language-forbidden operation corresponding to the preset request is executed (S103), which includes S10321 (not shown), S10322 (not shown), and S10323 (not shown):
s10321, generating first business card information containing a second language forbidden entrance control and sending the first business card information to a client of the language forbidden user;
s10322, receiving a second language forbidden operation request for the language forbidden user triggered by the language forbidden user through the second language forbidden entrance control;
s10323, generate a language-forbidden instruction for the language-forbidden user according to the second language-forbidden operation request, and execute a corresponding language-forbidden operation according to the language-forbidden instruction.
Receiving a business card information viewing request, triggered by a forbidden user through a client, for the forbidden user, determining whether the forbidden user has a forbidden operation authority for the forbidden user, if the forbidden user is determined to have the forbidden operation authority for the forbidden user, generating first business card information containing a second forbidden entrance control and sending the first business card information to the client of the forbidden user, receiving a second forbidden operation request, triggered by the forbidden user through the second forbidden entrance control, for the forbidden user according to the second forbidden operation request, and executing corresponding forbidden operation according to the forbidden operation instruction.
And the first language forbidden entrance control and the second language forbidden entrance control can both enter the corresponding language forbidden operation interface. If yes, a first language-forbidden entrance control exists at a preset position of a display page of a home management client side after a home management of a main broadcast successfully logs in a live broadcast room of the main broadcast, the home management can serve as a language-forbidden user to trigger the first language-forbidden entrance control, so that a first language-forbidden operation request for any user in the live broadcast room is triggered, whether the home management has a language-forbidden operation right for the any user is determined, and when the home management is determined to have the language-forbidden operation right for the any user, the home management can execute the language-forbidden operation on the any user; when a business card information viewing request of a user who successfully logs in a live broadcast room of the anchor and is triggered by a client and aims at another user who successfully logs in the live broadcast room of the anchor exists, whether the user has the language forbidden operation authority aiming at the other user is determined, when the user is determined to have the language forbidden operation authority aiming at the other user, first business card information containing a second language forbidden entrance control is generated and sent to the client of the user, and the user can execute the language forbidden operation on the other user by triggering the second language forbidden entrance control.
In another embodiment, S1042 (not shown) is further included after S102:
and S1042, if the fact that the language-forbidden user does not have the language-forbidden operation authority for the language-forbidden user is determined, generating second business card information which does not contain a second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user.
If the preset request is a business card information viewing request, when the language-forbidden user does not have the language-forbidden operation right for the language-forbidden user, second business card information for the language-forbidden user is generated and sent to the client of the language-forbidden user, and when the language-forbidden user receives the second business card information, the language-forbidden operation cannot be executed for the language-forbidden user. Further, the banning user and the banned user may be any one or a combination of two of the following: background operators, anchor, users at each privilege level, and ordinary users.
If the preset request is a business card information viewing request, S101, S102 (including S1021, S1022, and S1023), S1031, S1032, and S1033 are a specific implementation, and S101, S102 (including S1021, S1022, and S1023), and S1042 are another specific implementation.
In another specific embodiment, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction includes S1033 (not shown in the figure):
s1033, generating a talk inhibiting control instruction for the talk inhibiting user, and sending the talk inhibiting control instruction to the client of the talk inhibiting user, so that the client of the talk inhibiting user performs talk inhibiting control operation on the talk inhibiting user according to the talk inhibiting control instruction.
In another specific embodiment, a language-forbidden instruction for the language-forbidden user is generated, and a corresponding language-forbidden operation is performed according to the language-forbidden instruction (S1031 or S10323), which further includes S1034 (not shown in the figure):
and S1034, generating second prompting information aiming at the forbidden user, and sending the second prompting information to the client of the forbidden user, wherein the second prompting information is used for prompting that the forbidden user is in a forbidden state.
In another specific embodiment, a language-prohibiting instruction for the language-prohibited user is generated, and a corresponding language-prohibiting operation is performed according to the language-prohibiting instruction (S1031 or S10323), which further includes S1035 (not shown), S1036 (not shown), and S1037 (not shown):
s1035, determining whether the language-forbidden user has the hidden permission of language forbidden based on the identity information of the language-forbidden user;
s1036, if the forbidden user does not have the forbidden hiding right, generating third prompt information and sending the third prompt information to the client of the first user, wherein the third prompt information is used for prompting that the forbidden user is in a forbidden state;
and when the language-forbidden user does not have the language-forbidden hiding right, the server generates third prompt information and sends the third prompt information to the client of the first user. The first user is a user capable of receiving the third prompt message and enters the preset website through the client. The first user can be all user individuals who log in successfully, including but not limited to background operators, anchor broadcasters, house management, VIP users, ordinary users and the like; the first user can also be a common user who logs in successfully. For example, the common user can receive the third prompt message, and the individual user sets itself as a special user who does not receive the system message, and the special users cannot receive the third prompt message, at this time, the first user is the common user who receives the third prompt message.
And 1037, if the language-forbidden user has the language-forbidden hiding right, generating fourth prompt information and sending the fourth prompt information to the client of the second user, wherein the fourth prompt information is used for prompting that the language-forbidden user is in the language-forbidden state, and the number of the second users is smaller than that of the first users.
The second user is one or more users entering the preset website through the client. And when the language-forbidden user has the language-forbidden hiding right, the server generates fourth prompt information and sends the fourth prompt information to the client of the second user. For example, after being forbidden, the forbidden user with the forbidden hiding right is only sent to the anchor, the background manager and the forbidden user. The second user includes, but is not limited to, a background operator, a main cast, and the like.
Specifically, a language-forbidden control instruction for the language-forbidden user is generated according to the first language-forbidden operation request or the second language-forbidden operation request, and the language-forbidden control instruction is sent to the client of the language-forbidden user. And the client of the language-forbidden user receives the language-forbidden control instruction and executes the language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction. Further, second prompt information for the forbidden user is generated and sent to the client of the forbidden user, and the second prompt information includes information that you are currently in the forbidden state and cannot send a barrage or a message, and the like, and is used for prompting the forbidden user that the forbidden user is in the forbidden state. Further, whether the language-forbidden user has the language-forbidden hiding right is determined based on the identity information of the language-forbidden user, if the language-forbidden user does not have the language-forbidden hiding right, third prompt information is generated and sent to the client of the first user, when the first user sends the third prompt information, the user in a preset website where the language-forbidden user and the language-forbidden user are located is the first user, for example, the user may be all users in a live broadcast room, including a background operator, a live broadcast, a plurality of VIP users with privilege attributes in the live broadcast room, a plurality of common users without privilege attributes in the live broadcast room, and a visitor user who does not log in, and the first user may be a user who can successfully log in the live broadcast room and receive the third prompt information. The third prompt information includes information that the user 1 has been forbidden by the administrator, and is used for prompting that the forbidden user is in a forbidden state, that is, all people in the live broadcast room are notified in a bullet screen or message leaving manner, and the forbidden user is in a forbidden state; if the language-forbidden user has the hidden permission of being forbidden, when the language-forbidden user is in the language-forbidden state, only sending the second user in the live broadcast room that the language-forbidden user is in the language-forbidden state, wherein the second user includes but is not limited to any one or a combination of a plurality of persons as follows: background operators, live broadcast, multiple house pipes, and the like.
In yet another embodiment, the method further comprises S104 (not shown) and S105 (not shown):
s104, receiving an operation request for setting the language forbidden intensity triggered by a third user through the language forbidden intensity setting page, wherein the third user is a user with the language forbidden intensity setting authority;
the third user is a user with the language forbidden intensity setting authority in a preset website, and the third user includes but is not limited to background operators, a main broadcaster and the like.
And S105, determining a plurality of first language forbidden vocabularies and corresponding language forbidden vocabulary forbidden intensities according to the operation request for setting the language forbidden intensities, wherein the language forbidden vocabulary forbidden intensity of any first language forbidden vocabulary comprises a user identity level with the authority of sending any first language forbidden vocabulary.
In yet another embodiment, the method further comprises S106 (not shown), S107 (not shown), and S108 (not shown):
s106, receiving a barrage sending request containing a second language forbidden vocabulary sent by a fourth user, and determining the user identity level of the fourth user;
the fourth user is a user in a preset website, including but not limited to a background operator, a main broadcaster, a house manager, a VIP user, a common user, and the like.
S107, determining whether the fourth user has the authority of sending the second language forbidden vocabulary or not based on the user identity level of the fourth user;
and S108, if the fourth user does not have the authority of sending the second forbidden vocabulary, generating fourth prompt information aiming at the fourth user and sending the fourth prompt information to the client of the fourth user, wherein the fourth prompt information is used for prompting that the fourth user cannot send a bullet screen containing the second forbidden vocabulary.
And a third user with the language-forbidden intensity setting authority can trigger the operation request for setting the language-forbidden intensity through the language-forbidden intensity setting page displayed by the client. For example, the host sets the forbidden words and the corresponding strengths through the forbidden strength setting page displayed by the client, such as that the forbidden word 1 is ranked above VIP4, the forbidden word 2 is ranked above VIP9, and so on. On this basis, when the fourth user is VIP7, the fourth user has the right to send the forbidden vocabulary 1, and the fourth user does not have the right to send the forbidden vocabulary 2.
In the embodiment, by limiting the language-forbidden operation right of the language-forbidden user, the language-forbidden user can be forbidden only when the language-forbidden user has the language-forbidden operation right for the language-forbidden user, so that the language-forbidden user is effectively prevented from forbidding any user, and the experience of part of users is improved.
Fig. 2 is a schematic structural diagram of a word-prohibiting device according to an embodiment of the present disclosure, and as shown in fig. 2, the device according to this embodiment may include:
a receiving module 201, configured to receive a preset request for a forbidden user, where the preset request is triggered by the forbidden user;
a determining module 202, configured to determine whether the language-forbidden user has a language-forbidden operation right for the language-forbidden user;
the executing module 203 is configured to execute the language-forbidden operation corresponding to the preset request if it is determined that the language-forbidden user has the language-forbidden operation authority for the language-forbidden user.
The language-forbidden device of this embodiment can execute the language-forbidden method provided by this disclosure, and its implementation principles are similar, and are not described herein again.
In this embodiment, by determining whether the talk-bar user has the talk-bar operation right for the talk-bar user, the talk-bar user can be talk-bar only when the talk-bar user has the talk-bar operation right for the talk-bar user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
In yet another embodiment, the determining module 202 includes a first determining module (not shown), a second determining module (not shown), and a third determining module (not shown):
the first determining module is used for determining identity information of a forbidden user and determining whether a forbidden control relationship exists between the identity information of the forbidden user and the identity information of the forbidden user;
the second determining module is used for determining that the language-forbidden user has the language-forbidden operation authority for the language-forbidden user if the language-forbidden control relation exists between the identity information of the language-forbidden user and the identity information of the language-forbidden user;
and the third determining module is used for determining that the talk-inhibiting user does not have the talk-inhibiting operation authority for the talk-inhibiting user if the fact that the talk-inhibiting control relationship does not exist between the identity information of the talk-inhibiting user and the identity information of the talk-inhibiting user is determined.
In another embodiment, if the preset request is a first disable operation request for the disabled user triggered by the disable user through the first disable entry control, the executing module 203 includes a first executing module (not shown in the figure):
the first execution module is used for generating a language-forbidden instruction aiming at the language-forbidden user and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In another embodiment, the determining module 202 further comprises a first generating module (not shown):
the first generation module is used for generating first prompt information and sending the first prompt information to a client of the language-forbidden user if the language-forbidden user is determined not to have the language-forbidden operation permission for the language-forbidden user, wherein the first prompt information is used for prompting the language-forbidden user not to have the language-forbidden permission for the language-forbidden user.
In another embodiment, if the preset request is a business card information viewing request, the executing module 203 includes a second executing module (not shown), a third executing module (not shown), and a fourth executing module (not shown):
the second execution module is used for generating first business card information containing a second language forbidden entrance control and sending the first business card information to the client of the language forbidden user;
a third execution module, configured to receive a second language-forbidding operation request for the language-forbidding user, where the second language-forbidding operation request is triggered by the language-forbidding user through the second language-forbidding entrance control;
and the fourth execution module is used for generating a language-forbidden instruction aiming at the language-forbidden user according to the second language-forbidden operation request and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In another embodiment, the determining module 202 further includes a second generating module (not shown):
and the second generation module is used for generating second business card information which does not contain the second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user if the language-forbidden user is determined not to have the language-forbidden operation authority aiming at the language-forbidden user.
In another embodiment, the first execution module or the fourth execution module includes a first processing module (not shown):
the first processing module is used for generating a language-forbidden control instruction for the language-forbidden user and sending the language-forbidden control instruction to the client of the language-forbidden user so that the client of the language-forbidden user performs a language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction.
In another embodiment, the first execution module or the fourth execution module further includes a second processing module (not shown in the figure):
and the second processing module is used for generating second prompt information aiming at the forbidden user and sending the second prompt information to the client of the forbidden user, wherein the second prompt information is used for prompting that the forbidden user is in a forbidden state.
In another embodiment, the first execution module or the fourth execution module further includes a third processing module (not shown), a fourth processing module (not shown), and a fifth processing module (not shown):
the third processing module is used for determining whether the language-forbidden user has the hidden permission of language forbidden based on the identity information of the language-forbidden user;
the fourth processing module is used for generating third prompt information and sending the third prompt information to the client of the first user if the language-forbidden user does not have the language-forbidden hiding permission, wherein the third prompt information is used for prompting that the language-forbidden user is in the language-forbidden state;
and the fifth processing module is used for generating fourth prompt information and sending the fourth prompt information to the client of the second user if the language-forbidden user has the language-forbidden hiding permission, wherein the fourth prompt information is used for prompting that the language-forbidden user is in the language-forbidden state, and the number of the second users is smaller than that of the first users.
In yet another embodiment, the system further comprises a first receiving module (not shown) and a fourth determining module (not shown):
the first receiving module is used for receiving an operation request for setting the language forbidden intensity, triggered by a third user through a language forbidden intensity setting page, wherein the third user is a user with the authority for setting the language forbidden intensity;
and the fourth determining module is used for determining a plurality of first language forbidden vocabularies and corresponding language forbidden vocabulary intensities according to the operation request for setting the language forbidden intensities, wherein the language forbidden vocabulary intensities of any first language forbidden vocabulary comprise the user identity level with the authority of sending any first language forbidden vocabulary.
In yet another embodiment, the system further comprises a sixth processing module (not shown), a seventh processing module (not shown), and an eighth processing module (not shown):
the sixth processing module is used for receiving a barrage sending request containing a second language forbidden vocabulary sent by a fourth user and determining the user identity level of the fourth user;
the seventh processing module is used for determining whether the fourth user has the authority of sending the second language forbidden vocabulary based on the user identity level of the fourth user;
and the eighth processing module is configured to generate fourth prompt information for the fourth user and send the fourth prompt information to the client of the fourth user if the fourth user does not have the authority to send the second language-forbidden vocabulary, where the fourth prompt information is used to prompt the fourth user that the bullet screen containing the second language-forbidden vocabulary cannot be sent.
The language-forbidden device of this embodiment can execute the language-forbidden method shown in the embodiments of this disclosure, and its implementation principles are similar, and are not described herein again.
In this embodiment, by determining whether the talk-bar user has the talk-bar operation right for the talk-bar user, the talk-bar user can be talk-bar only when the talk-bar user has the talk-bar operation right for the talk-bar user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
An embodiment of the present disclosure further provides an electronic device, which includes:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the method for forbidding words provided by the above embodiment is performed.
The disclosed embodiments also provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the language-prohibiting method provided by the above-described embodiments.
Referring now to fig. 3, a schematic diagram of an electronic device 300 suitable for implementing an embodiment of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage means 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for the operation of the electronic apparatus 300 are also stored. The processing device 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
In general, input devices 306 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc., output devices 307 including, for example, a liquid crystal display (L CD), speaker, vibrator, etc., storage devices 308 including, for example, magnetic tape, hard disk, etc., and communication devices 309, communication devices 309 may allow electronic apparatus 300 to communicate wirelessly or wiredly with other devices to exchange data.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication means 309, or installed from the storage means 308, or installed from the ROM 302. The computer program, when executed by the processing device 301, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including AN object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.