CN110139152B - Word-forbidden method and device, electronic equipment and computer-readable storage medium - Google Patents

Word-forbidden method and device, electronic equipment and computer-readable storage medium Download PDF

Info

Publication number
CN110139152B
CN110139152B CN201910420287.6A CN201910420287A CN110139152B CN 110139152 B CN110139152 B CN 110139152B CN 201910420287 A CN201910420287 A CN 201910420287A CN 110139152 B CN110139152 B CN 110139152B
Authority
CN
China
Prior art keywords
forbidden
language
user
prompt information
talk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910420287.6A
Other languages
Chinese (zh)
Other versions
CN110139152A (en
Inventor
贾世豪
张伟
郭正尧
张奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Douyin Vision Co Ltd
Douyin Vision Beijing Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN201910420287.6A priority Critical patent/CN110139152B/en
Publication of CN110139152A publication Critical patent/CN110139152A/en
Application granted granted Critical
Publication of CN110139152B publication Critical patent/CN110139152B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/488Data services, e.g. news ticker
    • H04N21/4884Data services, e.g. news ticker for displaying subtitles

Abstract

The embodiment of the disclosure provides a method and a device for banning words, electronic equipment and a computer-readable storage medium. The method comprises the following steps: receiving a preset request aiming at the forbidden user triggered by the forbidden user, determining whether the forbidden user has the forbidden operation authority aiming at the forbidden user, and executing the forbidden operation corresponding to the preset request if the forbidden user is determined to have the forbidden operation authority aiming at the forbidden user. The method and the device for prohibiting the language from being forbidden only can be used for prohibiting the language forbidden user when the language forbidden user has the language forbidden operation right aiming at the language forbidden user by determining whether the language forbidden user has the language forbidden operation right aiming at the language forbidden user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.

Description

Word-forbidden method and device, electronic equipment and computer-readable storage medium
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to a method and an apparatus for word inhibition, an electronic device, and a computer-readable storage medium.
Background
With the development of science and technology, the live broadcast mode of the popup screen type is widely popularized, a user can speak in a live broadcast room at any time, and through the speaking mode, the user can be effectively communicated with the user and the anchor, so that the participation degree of the user is greatly increased.
To prevent malicious speech of individual users, there are different levels of administrators, such as common administrators, super administrators, and anchor, in the live room. Normally, an administrator in the live broadcast room has the right to forbid words, and the users who have forbidden words cannot send barrages or leave messages in the live broadcast room. In the existing live broadcast room, a user with a speech forbidding authority can freely drive the speech forbidding right, which easily causes the phenomenon of speech forbidding at will.
Disclosure of Invention
The purpose of the present disclosure is to solve at least one of the above technical drawbacks, and in particular to a banning user who can bang other users at will.
In a first aspect, a method for word suppression is provided, the method including:
receiving a preset request aiming at a forbidden user, wherein the preset request is triggered by the forbidden user;
determining whether the talk-inhibiting user has talk-inhibiting operation authority for the talk-inhibiting user;
and if the fact that the language-forbidden user has the language-forbidden operation authority aiming at the language-forbidden user is determined, executing the language-forbidden operation corresponding to the preset request.
In one possible implementation manner, determining whether the talk-inhibiting user has the talk-inhibiting operation authority for the talk-inhibiting user includes:
determining identity information of a no-introduction user and identity information of a no-introduction user, and determining whether a no-introduction control relationship exists between the identity information of the no-introduction user and the identity information of the no-introduction user;
if the fact that the identity information of the talk-inhibiting user and the identity information of the talk-inhibiting user have the talk-inhibiting control relationship is determined, determining that the talk-inhibiting user has the talk-inhibiting operation authority aiming at the talk-inhibiting user;
and if the fact that the identity information of the talk-inhibiting user does not have the talk-inhibiting control relation with the identity information of the talk-inhibiting user is determined, determining that the talk-inhibiting user does not have the talk-inhibiting operation authority for the talk-inhibiting user.
In one possible implementation manner, if the preset request is a first language-forbidden operation request for the language-forbidden user triggered by the language-forbidden user through the first language-forbidden entrance control, executing a language-forbidden operation corresponding to the preset request, including:
and generating a language-forbidden instruction for the language-forbidden user, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In one possible implementation manner, after determining whether the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user, the method further includes:
and if the fact that the language-forbidden user does not have the language-forbidden operation permission for the language-forbidden user is determined, generating first prompt information and sending the first prompt information to a client of the language-forbidden user, wherein the first prompt information is used for prompting that the language-forbidden user does not have the language-forbidden permission for the language-forbidden user.
In one possible implementation manner, if the preset request is a business card information viewing request, the executing of the language forbidden operation corresponding to the preset request includes:
generating first business card information containing a second language forbidden entrance control and sending the first business card information to a client of a language forbidden user;
receiving a second language forbidden operation request aiming at the language forbidden user, which is triggered by the language forbidden user through a second language forbidden entrance control;
and generating a language-forbidden instruction aiming at the language-forbidden user according to the second language-forbidden operation request, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In one possible implementation manner, after determining whether the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user, the method further includes:
and if the fact that the language-forbidden user does not have the language-forbidden operation authority for the language-forbidden user is determined, generating second business card information which does not contain a second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user.
In one possible implementation manner, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction includes:
and generating a language-forbidden control instruction for the language-forbidden user, and sending the language-forbidden control instruction to the client of the language-forbidden user so that the client of the language-forbidden user performs a language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction.
In one possible implementation manner, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction, further includes:
and generating second prompt information aiming at the forbidden user, and sending the second prompt information to the client of the forbidden user, wherein the second prompt information is used for prompting that the forbidden user is in a forbidden state.
In one possible implementation manner, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction, further includes:
determining whether the language-forbidden user has the hidden permission of language forbidden based on the identity information of the language-forbidden user;
if the language-forbidden user does not have the language-forbidden hiding right, generating third prompt information and sending the third prompt information to the client of the first user, wherein the third prompt information is used for prompting that the language-forbidden user is in a language-forbidden state;
and if the forbidden user has the forbidden speech hiding permission, generating fourth prompt information and sending the fourth prompt information to the client of the second user, wherein the fourth prompt information is used for prompting that the forbidden user is in a forbidden speech state, and the number of the second users is smaller than that of the first users.
In one possible implementation, the method further includes:
receiving an operation request for setting the language-forbidden intensity, triggered by a third user through a language-forbidden intensity setting page displayed in a client, wherein the third user is a user with a language-forbidden intensity setting authority;
and determining a plurality of first forbidden vocabulary words and corresponding forbidden vocabulary word strengths according to the operation request for setting the forbidden vocabulary words, wherein the forbidden vocabulary word strengths of any first forbidden vocabulary words comprise user identity levels with the permission of sending any first forbidden vocabulary words.
In one possible implementation, the method further includes:
receiving a barrage sending request containing a second language forbidden vocabulary sent by a client of a fourth user, and determining the user identity level of the fourth user;
determining whether the fourth user has the authority to send the second language forbidden vocabulary based on the user identity level of the fourth user;
and if the fourth user does not have the authority of sending the second forbidden words, generating fourth prompt information aiming at the fourth user and sending the fourth prompt information to the client of the fourth user, wherein the fourth prompt information is used for prompting that the fourth user cannot send the bullet screen containing the second forbidden words.
In a second aspect, there is provided a word-banning device, comprising:
the receiving module is used for receiving a preset request aiming at the forbidden user, which is triggered by the forbidden user;
the determining module is used for determining whether the language-forbidden user has the language-forbidden operation authority for the language-forbidden user;
and the execution module is used for executing the language-forbidden operation corresponding to the preset request if the language-forbidden user is determined to have the language-forbidden operation authority aiming at the language-forbidden user.
In a third aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the word-forbidding method described above is performed.
For example, a third aspect of the present disclosure provides a computing device comprising: the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the language forbidden method as shown in the first aspect of the disclosure.
In a fourth aspect, a computer readable storage medium is provided, which when executed by a processor implements the method of claim inhibition described above.
For example, in a fourth aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the method for word inhibition shown in the first aspect of the present disclosure.
The technical scheme provided by the embodiment of the disclosure has the following beneficial effects:
by determining whether the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user, the talk-inhibiting user can be talk-inhibited when the talk-inhibiting user has the talk-inhibiting operation right for the talk-inhibiting user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present disclosure, the drawings used in the description of the embodiments of the present disclosure will be briefly described below.
Fig. 1 is a schematic flow chart of a method for word suppression according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a word-disable device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device of a language forbidden method according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of illustrating the present disclosure and should not be construed as limiting the same.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
The disclosure will be described and explained with reference to several terms: the language-forbidden user in the disclosure is a user who has the authority of language-forbidden operation in the preset website, and can perform the language-forbidden operation on all users or part of users in the preset website. For example, the talk-banning users include background operators, anchor broadcasters, house pipes, and the like. The talk-inhibition user is a user in a preset website and can be used for carrying out talk-inhibition operation on other talk-inhibition users with talk-inhibition operation authority. For example, the forbidden users include a host, a house manager, a Visitors (VIP) user with privileged attributes, and a general user, and the VIP users include, but are not limited to, VIP users of various levels, and the like. The method comprises the steps that a talk inhibiting user can only execute talk inhibiting operation on the talk inhibiting user when the talk inhibiting user has talk inhibiting operation authority on the talk inhibiting user, namely, the talk inhibiting operation authority of the talk inhibiting user is opposite, and the identity of the talk inhibiting user is opposite to that of the talk inhibiting user. For example, a user a, a user B, and a user C, where the user a has a talk inhibiting operation right for the user B and the user C, and the user B only has a talk inhibiting operation right for the user C, when the user a wants to perform a talk inhibiting operation for the user B, the user a is a talk inhibiting user, and the user B is a talk inhibited user; when the user B wants to perform the talk inhibiting operation for the user C, the user B is the talk inhibiting user, and the user C is the talk inhibited user.
Due to the rapid development of the live broadcast industry, in order to prevent malicious speech of individual users, administrators of different levels exist in the live broadcast room. Normally, an administrator in the live broadcast room has the right to forbid words, and the users who have forbidden words cannot send barrages or leave messages in the live broadcast room. In the existing live broadcast room, a user with a speech forbidding authority can freely drive the speech forbidding right, which easily causes the phenomenon of speech forbidding at will. For example, an administrator at any level in the live broadcast room can disable high-level users in the live broadcast room at will, so that the high-level users are disabled at will, the enthusiasm of the high-level users for speaking on the network is affected, and the establishment of a good network environment is not facilitated.
The present disclosure provides a method, an apparatus, an electronic device and a computer-readable storage medium for word inhibition, which aim to solve the above technical problems of the prior art.
The following describes the technical solutions of the present disclosure and how to solve the above technical problems in specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
Example one
An embodiment of the present disclosure provides a word-banning method, as shown in fig. 1, the method includes:
s101, receiving a preset request aiming at a forbidden user triggered by the forbidden user;
the language forbidden user and the language forbidden user are both users in a preset website. The users in the preset website may include users who successfully log in through the client and users who enter the preset website through the client but do not log in.
The client refers to a program corresponding to the server and providing local service for the client, and needs to be operated in cooperation with the server, specifically, the client includes application programs such as a browser and video software. When the client refers to a browser, the browser can be used for opening a preset website so as to enter the preset website; when the client refers to video software and the like, the client can enter a preset website by opening the video software. The users in the preset website comprise users entering the preset website by using a browser and users entering the preset website through video software.
S102, determining whether the language forbidden user has the language forbidden operation authority for the language forbidden user;
and S103, if the fact that the language-forbidden user has the language-forbidden operation authority aiming at the language-forbidden user is determined, executing the language-forbidden operation corresponding to the preset request.
When a preset request for the forbidden user triggered by the forbidden user is received, determining whether the forbidden user has the forbidden operation authority for the forbidden user. The talk banning user and the talk banned user may be users without privilege attributes, such as ordinary users, or users with privilege attributes, such as background operators, anchor users, and users with titles in anchor rooms. The users with titles include, but are not limited to VIP 1-12 and the like, gold members, silver members and the like, knight, emperor and the like.
And when determining that the language-forbidden user has the language-forbidden operation right for the language-forbidden user, executing the language-forbidden operation corresponding to the preset request. Generally speaking, taking the live broadcast industry as an example, the rule for forbidding the operation authority is: background operators have the speaker and user forbidden permission; the anchor has the talk-inhibition authority of any user in the live broadcast room; in the same live broadcast room, the high-level users have the language forbidden permission of the low-level users. Under special conditions, the rule of forbidding the operation authority can be changed according to actual needs.
In this embodiment, by determining whether the talk-bar user has the talk-bar operation right for the talk-bar user, the talk-bar user can be talk-bar only when the talk-bar user has the talk-bar operation right for the talk-bar user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
In one embodiment, S102 includes: s1021 (not shown), S1022 (not shown), and S1023 (not shown).
S1021, determining identity information of the forbidden user and identity information of the forbidden user, and determining whether a forbidden control relationship exists between the identity information of the forbidden user and the identity information of the forbidden user;
s1022, if the fact that the identity information of the language forbidden user and the identity information of the language forbidden user have the language forbidden control relationship is determined, the language forbidden user is determined to have the language forbidden operation authority for the language forbidden user;
and S1023, if the fact that no language forbidden control relation exists between the identity information of the language forbidden user and the identity information of the language forbidden user is determined, the language forbidden user is determined not to have the language forbidden operation authority for the language forbidden user.
Specifically, if it is determined that the talk inhibiting control relationship exists between the identity information of the talk inhibiting user and the identity information of the talk inhibited user, it is determined that the talk inhibiting user has the talk inhibiting operation authority for the talk inhibited user. If the anchor has the talk-inhibiting operation authority aiming at any user in the live broadcast room, when the identity of the talk-inhibiting user is live broadcast and the talk-inhibiting user is a high-level user with privilege attribute level in the anchor live broadcast room, the talk-inhibiting user has the talk-inhibiting operation authority aiming at the talk-inhibiting user; if the VIP 1-12 are divided into three levels, namely a first level VIP 9-12, a second level VIP 6-8 and a third level VIP 1-5, the levels cannot be mutually forbidden, the VIP 9-12 has forbidden operation permission for the VIP 1-8, the VIP 6-8 has forbidden operation permission for the VIP 1-5, and when the forbidden user is the VIP7 and the forbidden user is the VIP1, the forbidden user has forbidden operation permission for the forbidden user.
And if the fact that the identity information of the talk-inhibiting user does not have the talk-inhibiting control relation with the identity information of the talk-inhibiting user is determined, determining that the talk-inhibiting user does not have the talk-inhibiting operation authority for the talk-inhibiting user. If the anchor has the language-forbidden operation authority aiming at any user in the live broadcast room, when the identity of the language-forbidden user is a high-level user with a privilege attribute level in the anchor live broadcast room, and the language-forbidden user is the anchor, the language-forbidden user does not have the language-forbidden operation authority aiming at the language-forbidden user; if the VIP 1-12 are divided into three levels, namely a first level VIP 9-12, a second level VIP 6-8 and a third level VIP 1-5, the levels cannot be mutually forbidden, the VIP 9-12 has forbidden operation permission for the VIP 1-8, the VIP 6-8 has forbidden operation permission for the VIP 1-5, when the forbidden user is the VIP12 and the forbidden user is the VIP9, the forbidden user does not have forbidden operation permission for the forbidden user, or when the forbidden user is the VIP6 and the forbidden user is the VIP11, the forbidden user does not have forbidden operation permission for the forbidden user.
In another embodiment, if the preset request is a first language-prohibiting operation request for the language-prohibited user triggered by the language-prohibited user through the first language-prohibiting entry control, a language-prohibiting operation corresponding to the preset request is executed (S103), which includes S1031 (not shown in the figure):
and S1031, generating a language-forbidden instruction for the language-forbidden user, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
When a first language-forbidden operation request, triggered by a language-forbidden user through a first language-forbidden entrance control of a client, for a language-forbidden user is received, whether the language-forbidden user has a language-forbidden operation authority for the language-forbidden user is determined, if the language-forbidden user is determined to have the language-forbidden operation authority for the language-forbidden user, a language-forbidden instruction for the language-forbidden user is generated, and corresponding language-forbidden operation is executed according to the language-forbidden instruction.
In another embodiment, S1041 (not shown) is further included after S102:
and S1041, if it is determined that the language-forbidden user does not have the language-forbidden operation permission for the language-forbidden user, generating first prompt information and sending the first prompt information to the client of the language-forbidden user, where the first prompt information is used for prompting that the language-forbidden user does not have the language-forbidden permission for the language-forbidden user.
If the preset request is a first language-inhibition operation request for the language-inhibited user, which is triggered by the language-inhibition user through the first language-inhibition entrance control of the client, S101, S102 (including S1021, S1022, and S1023) and S103 (including S1031) are a specific implementation scheme, or S101, S102 (including S1021, S1022, and S1023) and S1041 are another specific implementation scheme.
In another embodiment, if the preset request is a business card information viewing request, a language-forbidden operation corresponding to the preset request is executed (S103), which includes S10321 (not shown), S10322 (not shown), and S10323 (not shown):
s10321, generating first business card information containing a second language forbidden entrance control and sending the first business card information to a client of the language forbidden user;
s10322, receiving a second language forbidden operation request for the language forbidden user triggered by the language forbidden user through the second language forbidden entrance control;
s10323, generate a language-forbidden instruction for the language-forbidden user according to the second language-forbidden operation request, and execute a corresponding language-forbidden operation according to the language-forbidden instruction.
Receiving a business card information viewing request, triggered by a forbidden user through a client, for the forbidden user, determining whether the forbidden user has a forbidden operation authority for the forbidden user, if the forbidden user is determined to have the forbidden operation authority for the forbidden user, generating first business card information containing a second forbidden entrance control and sending the first business card information to the client of the forbidden user, receiving a second forbidden operation request, triggered by the forbidden user through the second forbidden entrance control, for the forbidden user according to the second forbidden operation request, and executing corresponding forbidden operation according to the forbidden operation instruction.
And the first language forbidden entrance control and the second language forbidden entrance control can both enter the corresponding language forbidden operation interface. If yes, a first language-forbidden entrance control exists at a preset position of a display page of a home management client side after a home management of a main broadcast successfully logs in a live broadcast room of the main broadcast, the home management can serve as a language-forbidden user to trigger the first language-forbidden entrance control, so that a first language-forbidden operation request for any user in the live broadcast room is triggered, whether the home management has a language-forbidden operation right for the any user is determined, and when the home management is determined to have the language-forbidden operation right for the any user, the home management can execute the language-forbidden operation on the any user; when a business card information viewing request of a user who successfully logs in a live broadcast room of the anchor and is triggered by a client and aims at another user who successfully logs in the live broadcast room of the anchor exists, whether the user has the language forbidden operation authority aiming at the other user is determined, when the user is determined to have the language forbidden operation authority aiming at the other user, first business card information containing a second language forbidden entrance control is generated and sent to the client of the user, and the user can execute the language forbidden operation on the other user by triggering the second language forbidden entrance control.
In another embodiment, S1042 (not shown) is further included after S102:
and S1042, if the fact that the language-forbidden user does not have the language-forbidden operation authority for the language-forbidden user is determined, generating second business card information which does not contain a second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user.
If the preset request is a business card information viewing request, when the language-forbidden user does not have the language-forbidden operation right for the language-forbidden user, second business card information for the language-forbidden user is generated and sent to the client of the language-forbidden user, and when the language-forbidden user receives the second business card information, the language-forbidden operation cannot be executed for the language-forbidden user. Further, the banning user and the banned user may be any one or a combination of two of the following: background operators, anchor, users at each privilege level, and ordinary users.
If the preset request is a business card information viewing request, S101, S102 (including S1021, S1022, and S1023), S1031, S1032, and S1033 are a specific implementation, and S101, S102 (including S1021, S1022, and S1023), and S1042 are another specific implementation.
In another specific embodiment, generating a language-forbidden instruction for the language-forbidden user, and performing a corresponding language-forbidden operation according to the language-forbidden instruction includes S1033 (not shown in the figure):
s1033, generating a talk inhibiting control instruction for the talk inhibiting user, and sending the talk inhibiting control instruction to the client of the talk inhibiting user, so that the client of the talk inhibiting user performs talk inhibiting control operation on the talk inhibiting user according to the talk inhibiting control instruction.
In another specific embodiment, a language-forbidden instruction for the language-forbidden user is generated, and a corresponding language-forbidden operation is performed according to the language-forbidden instruction (S1031 or S10323), which further includes S1034 (not shown in the figure):
and S1034, generating second prompting information aiming at the forbidden user, and sending the second prompting information to the client of the forbidden user, wherein the second prompting information is used for prompting that the forbidden user is in a forbidden state.
In another specific embodiment, a language-prohibiting instruction for the language-prohibited user is generated, and a corresponding language-prohibiting operation is performed according to the language-prohibiting instruction (S1031 or S10323), which further includes S1035 (not shown), S1036 (not shown), and S1037 (not shown):
s1035, determining whether the language-forbidden user has the hidden permission of language forbidden based on the identity information of the language-forbidden user;
s1036, if the forbidden user does not have the forbidden hiding right, generating third prompt information and sending the third prompt information to the client of the first user, wherein the third prompt information is used for prompting that the forbidden user is in a forbidden state;
and when the language-forbidden user does not have the language-forbidden hiding right, the server generates third prompt information and sends the third prompt information to the client of the first user. The first user is a user capable of receiving the third prompt message and enters the preset website through the client. The first user can be all user individuals who log in successfully, including but not limited to background operators, anchor broadcasters, house management, VIP users, ordinary users and the like; the first user can also be a common user who logs in successfully. For example, the common user can receive the third prompt message, and the individual user sets itself as a special user who does not receive the system message, and the special users cannot receive the third prompt message, at this time, the first user is the common user who receives the third prompt message.
And 1037, if the language-forbidden user has the language-forbidden hiding right, generating fourth prompt information and sending the fourth prompt information to the client of the second user, wherein the fourth prompt information is used for prompting that the language-forbidden user is in the language-forbidden state, and the number of the second users is smaller than that of the first users.
The second user is one or more users entering the preset website through the client. And when the language-forbidden user has the language-forbidden hiding right, the server generates fourth prompt information and sends the fourth prompt information to the client of the second user. For example, after being forbidden, the forbidden user with the forbidden hiding right is only sent to the anchor, the background manager and the forbidden user. The second user includes, but is not limited to, a background operator, a main cast, and the like.
Specifically, a language-forbidden control instruction for the language-forbidden user is generated according to the first language-forbidden operation request or the second language-forbidden operation request, and the language-forbidden control instruction is sent to the client of the language-forbidden user. And the client of the language-forbidden user receives the language-forbidden control instruction and executes the language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction. Further, second prompt information for the forbidden user is generated and sent to the client of the forbidden user, and the second prompt information includes information that you are currently in the forbidden state and cannot send a barrage or a message, and the like, and is used for prompting the forbidden user that the forbidden user is in the forbidden state. Further, whether the language-forbidden user has the language-forbidden hiding right is determined based on the identity information of the language-forbidden user, if the language-forbidden user does not have the language-forbidden hiding right, third prompt information is generated and sent to the client of the first user, when the first user sends the third prompt information, the user in a preset website where the language-forbidden user and the language-forbidden user are located is the first user, for example, the user may be all users in a live broadcast room, including a background operator, a live broadcast, a plurality of VIP users with privilege attributes in the live broadcast room, a plurality of common users without privilege attributes in the live broadcast room, and a visitor user who does not log in, and the first user may be a user who can successfully log in the live broadcast room and receive the third prompt information. The third prompt information includes information that the user 1 has been forbidden by the administrator, and is used for prompting that the forbidden user is in a forbidden state, that is, all people in the live broadcast room are notified in a bullet screen or message leaving manner, and the forbidden user is in a forbidden state; if the language-forbidden user has the hidden permission of being forbidden, when the language-forbidden user is in the language-forbidden state, only sending the second user in the live broadcast room that the language-forbidden user is in the language-forbidden state, wherein the second user includes but is not limited to any one or a combination of a plurality of persons as follows: background operators, live broadcast, multiple house pipes, and the like.
In yet another embodiment, the method further comprises S104 (not shown) and S105 (not shown):
s104, receiving an operation request for setting the language forbidden intensity triggered by a third user through the language forbidden intensity setting page, wherein the third user is a user with the language forbidden intensity setting authority;
the third user is a user with the language forbidden intensity setting authority in a preset website, and the third user includes but is not limited to background operators, a main broadcaster and the like.
And S105, determining a plurality of first language forbidden vocabularies and corresponding language forbidden vocabulary forbidden intensities according to the operation request for setting the language forbidden intensities, wherein the language forbidden vocabulary forbidden intensity of any first language forbidden vocabulary comprises a user identity level with the authority of sending any first language forbidden vocabulary.
In yet another embodiment, the method further comprises S106 (not shown), S107 (not shown), and S108 (not shown):
s106, receiving a barrage sending request containing a second language forbidden vocabulary sent by a fourth user, and determining the user identity level of the fourth user;
the fourth user is a user in a preset website, including but not limited to a background operator, a main broadcaster, a house manager, a VIP user, a common user, and the like.
S107, determining whether the fourth user has the authority of sending the second language forbidden vocabulary or not based on the user identity level of the fourth user;
and S108, if the fourth user does not have the authority of sending the second forbidden vocabulary, generating fourth prompt information aiming at the fourth user and sending the fourth prompt information to the client of the fourth user, wherein the fourth prompt information is used for prompting that the fourth user cannot send a bullet screen containing the second forbidden vocabulary.
And a third user with the language-forbidden intensity setting authority can trigger the operation request for setting the language-forbidden intensity through the language-forbidden intensity setting page displayed by the client. For example, the host sets the forbidden words and the corresponding strengths through the forbidden strength setting page displayed by the client, such as that the forbidden word 1 is ranked above VIP4, the forbidden word 2 is ranked above VIP9, and so on. On this basis, when the fourth user is VIP7, the fourth user has the right to send the forbidden vocabulary 1, and the fourth user does not have the right to send the forbidden vocabulary 2.
In the embodiment, by limiting the language-forbidden operation right of the language-forbidden user, the language-forbidden user can be forbidden only when the language-forbidden user has the language-forbidden operation right for the language-forbidden user, so that the language-forbidden user is effectively prevented from forbidding any user, and the experience of part of users is improved.
Fig. 2 is a schematic structural diagram of a word-prohibiting device according to an embodiment of the present disclosure, and as shown in fig. 2, the device according to this embodiment may include:
a receiving module 201, configured to receive a preset request for a forbidden user, where the preset request is triggered by the forbidden user;
a determining module 202, configured to determine whether the language-forbidden user has a language-forbidden operation right for the language-forbidden user;
the executing module 203 is configured to execute the language-forbidden operation corresponding to the preset request if it is determined that the language-forbidden user has the language-forbidden operation authority for the language-forbidden user.
The language-forbidden device of this embodiment can execute the language-forbidden method provided by this disclosure, and its implementation principles are similar, and are not described herein again.
In this embodiment, by determining whether the talk-bar user has the talk-bar operation right for the talk-bar user, the talk-bar user can be talk-bar only when the talk-bar user has the talk-bar operation right for the talk-bar user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
In yet another embodiment, the determining module 202 includes a first determining module (not shown), a second determining module (not shown), and a third determining module (not shown):
the first determining module is used for determining identity information of a forbidden user and determining whether a forbidden control relationship exists between the identity information of the forbidden user and the identity information of the forbidden user;
the second determining module is used for determining that the language-forbidden user has the language-forbidden operation authority for the language-forbidden user if the language-forbidden control relation exists between the identity information of the language-forbidden user and the identity information of the language-forbidden user;
and the third determining module is used for determining that the talk-inhibiting user does not have the talk-inhibiting operation authority for the talk-inhibiting user if the fact that the talk-inhibiting control relationship does not exist between the identity information of the talk-inhibiting user and the identity information of the talk-inhibiting user is determined.
In another embodiment, if the preset request is a first disable operation request for the disabled user triggered by the disable user through the first disable entry control, the executing module 203 includes a first executing module (not shown in the figure):
the first execution module is used for generating a language-forbidden instruction aiming at the language-forbidden user and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In another embodiment, the determining module 202 further comprises a first generating module (not shown):
the first generation module is used for generating first prompt information and sending the first prompt information to a client of the language-forbidden user if the language-forbidden user is determined not to have the language-forbidden operation permission for the language-forbidden user, wherein the first prompt information is used for prompting the language-forbidden user not to have the language-forbidden permission for the language-forbidden user.
In another embodiment, if the preset request is a business card information viewing request, the executing module 203 includes a second executing module (not shown), a third executing module (not shown), and a fourth executing module (not shown):
the second execution module is used for generating first business card information containing a second language forbidden entrance control and sending the first business card information to the client of the language forbidden user;
a third execution module, configured to receive a second language-forbidding operation request for the language-forbidding user, where the second language-forbidding operation request is triggered by the language-forbidding user through the second language-forbidding entrance control;
and the fourth execution module is used for generating a language-forbidden instruction aiming at the language-forbidden user according to the second language-forbidden operation request and executing corresponding language-forbidden operation according to the language-forbidden instruction.
In another embodiment, the determining module 202 further includes a second generating module (not shown):
and the second generation module is used for generating second business card information which does not contain the second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user if the language-forbidden user is determined not to have the language-forbidden operation authority aiming at the language-forbidden user.
In another embodiment, the first execution module or the fourth execution module includes a first processing module (not shown):
the first processing module is used for generating a language-forbidden control instruction for the language-forbidden user and sending the language-forbidden control instruction to the client of the language-forbidden user so that the client of the language-forbidden user performs a language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction.
In another embodiment, the first execution module or the fourth execution module further includes a second processing module (not shown in the figure):
and the second processing module is used for generating second prompt information aiming at the forbidden user and sending the second prompt information to the client of the forbidden user, wherein the second prompt information is used for prompting that the forbidden user is in a forbidden state.
In another embodiment, the first execution module or the fourth execution module further includes a third processing module (not shown), a fourth processing module (not shown), and a fifth processing module (not shown):
the third processing module is used for determining whether the language-forbidden user has the hidden permission of language forbidden based on the identity information of the language-forbidden user;
the fourth processing module is used for generating third prompt information and sending the third prompt information to the client of the first user if the language-forbidden user does not have the language-forbidden hiding permission, wherein the third prompt information is used for prompting that the language-forbidden user is in the language-forbidden state;
and the fifth processing module is used for generating fourth prompt information and sending the fourth prompt information to the client of the second user if the language-forbidden user has the language-forbidden hiding permission, wherein the fourth prompt information is used for prompting that the language-forbidden user is in the language-forbidden state, and the number of the second users is smaller than that of the first users.
In yet another embodiment, the system further comprises a first receiving module (not shown) and a fourth determining module (not shown):
the first receiving module is used for receiving an operation request for setting the language forbidden intensity, triggered by a third user through a language forbidden intensity setting page, wherein the third user is a user with the authority for setting the language forbidden intensity;
and the fourth determining module is used for determining a plurality of first language forbidden vocabularies and corresponding language forbidden vocabulary intensities according to the operation request for setting the language forbidden intensities, wherein the language forbidden vocabulary intensities of any first language forbidden vocabulary comprise the user identity level with the authority of sending any first language forbidden vocabulary.
In yet another embodiment, the system further comprises a sixth processing module (not shown), a seventh processing module (not shown), and an eighth processing module (not shown):
the sixth processing module is used for receiving a barrage sending request containing a second language forbidden vocabulary sent by a fourth user and determining the user identity level of the fourth user;
the seventh processing module is used for determining whether the fourth user has the authority of sending the second language forbidden vocabulary based on the user identity level of the fourth user;
and the eighth processing module is configured to generate fourth prompt information for the fourth user and send the fourth prompt information to the client of the fourth user if the fourth user does not have the authority to send the second language-forbidden vocabulary, where the fourth prompt information is used to prompt the fourth user that the bullet screen containing the second language-forbidden vocabulary cannot be sent.
The language-forbidden device of this embodiment can execute the language-forbidden method shown in the embodiments of this disclosure, and its implementation principles are similar, and are not described herein again.
In this embodiment, by determining whether the talk-bar user has the talk-bar operation right for the talk-bar user, the talk-bar user can be talk-bar only when the talk-bar user has the talk-bar operation right for the talk-bar user. Therefore, the language forbidden right of the language forbidden user is limited, the phenomenon that the language forbidden user carries out language forbidden operation at will is avoided, good network atmosphere is favorably established, and user experience is improved.
An embodiment of the present disclosure further provides an electronic device, which includes:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the method for forbidding words provided by the above embodiment is performed.
The disclosed embodiments also provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor implements the language-prohibiting method provided by the above-described embodiments.
Referring now to fig. 3, a schematic diagram of an electronic device 300 suitable for implementing an embodiment of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage means 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for the operation of the electronic apparatus 300 are also stored. The processing device 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
In general, input devices 306 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc., output devices 307 including, for example, a liquid crystal display (L CD), speaker, vibrator, etc., storage devices 308 including, for example, magnetic tape, hard disk, etc., and communication devices 309, communication devices 309 may allow electronic apparatus 300 to communicate wirelessly or wiredly with other devices to exchange data.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication means 309, or installed from the storage means 308, or installed from the ROM 302. The computer program, when executed by the processing device 301, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including AN object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.

Claims (16)

1. A method of word suppression, comprising:
receiving a preset request aiming at a forbidden user, wherein the preset request is triggered by the forbidden user;
determining whether the language-forbidden user has a language-forbidden operation right for the language-forbidden user;
if the fact that the language-forbidden user has the language-forbidden operation authority aiming at the language-forbidden user is determined, executing the language-forbidden operation corresponding to the preset request;
wherein the executing the language-forbidden operation corresponding to the preset request comprises:
generating a language forbidden instruction aiming at the language forbidden user based on the preset request, and executing corresponding language forbidden operation according to the language forbidden instruction;
wherein the generating a language-forbidden instruction for the language-forbidden user, and executing a corresponding language-forbidden operation according to the language-forbidden instruction further includes:
determining whether the language-forbidden user has hidden forbidden authority based on the identity information of the language-forbidden user;
if the language-forbidden user does not have the language-forbidden hiding permission, generating third prompt information and sending the third prompt information to the client of the first user, wherein the third prompt information is used for prompting that the language-forbidden user is in a language-forbidden state;
and if the forbidden language user has the forbidden language hiding permission, generating fourth prompt information and sending the fourth prompt information to a client of a second user, wherein the fourth prompt information is used for prompting that the forbidden language user is in a forbidden language state, and the number of the second users is smaller than that of the first users.
2. The method of claim 1, wherein determining whether the talk-inhibiting user has talk-inhibiting operation rights for the talk-inhibited user comprises:
determining identity information of the language-forbidden user and identity information of the language-forbidden user, and determining whether a language-forbidden control relationship exists between the identity information of the language-forbidden user and the identity information of the language-forbidden user;
if the fact that the dialect forbidding user identity information and the dialect forbidding user identity information have the dialect forbidding control relationship is determined, determining that the dialect forbidding user has the dialect forbidding operation authority aiming at the dialect forbidding user;
and if the fact that the identity information of the language-forbidden user does not have the language-forbidden control relation with the identity information of the language-forbidden user is determined, determining that the language-forbidden user does not have the language-forbidden operation authority for the language-forbidden user.
3. The method according to claim 1, wherein if the preset request is a first language-prohibiting operation request for a language-prohibited user triggered by a language-prohibited user through a first language-prohibiting entry control, executing a language-prohibited operation corresponding to the preset request, including:
and generating a language-forbidden instruction for the language-forbidden user, and executing corresponding language-forbidden operation according to the language-forbidden instruction.
4. The method of claim 3, wherein after determining whether the talk-inhibiting user has talk-inhibiting operation rights for the talk-inhibited user, the method further comprises:
if the fact that the language-forbidden user does not have the language-forbidden operation permission for the language-forbidden user is determined, first prompt information is generated and sent to a client of the language-forbidden user, and the first prompt information is used for prompting that the language-forbidden user does not have the language-forbidden permission for the language-forbidden user.
5. The method of claim 1, wherein if the preset request is a business card information viewing request, performing a language-forbidden operation corresponding to the preset request, including:
generating first business card information containing a second language forbidden entrance control and sending the first business card information to the client of the language forbidden user;
receiving a second language forbidden operation request for the language forbidden user, which is triggered by the language forbidden user through the second language forbidden entrance control;
and generating a language forbidden instruction aiming at the language forbidden user according to the second language forbidden operation request, and executing corresponding language forbidden operation according to the language forbidden instruction.
6. The method of claim 5, wherein after determining whether the talk-inhibiting user has talk-inhibiting operation rights for the talk-inhibited user, the method further comprises:
and if the fact that the language-forbidden user does not have the language-forbidden operation authority for the language-forbidden user is determined, generating second business card information which does not contain the second language-forbidden entrance control and sending the second business card information to the client of the language-forbidden user.
7. The method of claim 3 or 5, wherein generating a language-prohibiting instruction for the language-prohibited user, and performing a corresponding language-prohibiting operation according to the language-prohibiting instruction comprises:
generating a language-forbidden control instruction for the language-forbidden user, and sending the language-forbidden control instruction to the client of the language-forbidden user, so that the client of the language-forbidden user performs a language-forbidden control operation on the language-forbidden user according to the language-forbidden control instruction.
8. The method of claim 7, wherein generating a language-forbidden instruction for the language-forbidden user and performing a corresponding language-forbidden operation according to the language-forbidden instruction further comprises:
and generating second prompt information aiming at the forbidden user, and sending the second prompt information to the client of the forbidden user, wherein the second prompt information is used for prompting that the forbidden user is in a forbidden state.
9. The method of any one of claims 1 to 6, further comprising:
receiving an operation request for setting the language forbidden intensity triggered by a third user through a language forbidden intensity setting page, wherein the third user is a user with the language forbidden intensity setting authority;
and determining a plurality of first forbidden vocabulary words and corresponding forbidden vocabulary word strengths according to the operation request for setting the forbidden language strengths, wherein the forbidden vocabulary word strengths of any first forbidden vocabulary words comprise user identity levels with the permission of sending any first forbidden vocabulary words.
10. The method of claim 9, further comprising:
receiving a barrage sending request containing a second language forbidden vocabulary sent by a fourth user, and determining the user identity level of the fourth user;
determining whether the fourth user has the authority to send the second language forbidden vocabulary based on the user identity level of the fourth user;
and if the fourth user does not have the permission to send the second forbidden words, generating fourth prompt information aiming at the fourth user and sending the fourth prompt information to the client of the fourth user, wherein the fourth prompt information is used for prompting that the fourth user cannot send a bullet screen containing the second forbidden words.
11. A method of word suppression, comprising:
receiving a preset request aiming at a forbidden user, wherein the preset request is triggered by the forbidden user;
determining whether the language-forbidden user has a language-forbidden operation right for the language-forbidden user;
if the fact that the language-forbidden user has the language-forbidden operation authority aiming at the language-forbidden user is determined, executing the language-forbidden operation corresponding to the preset request;
receiving an operation request for setting the language forbidden intensity triggered by a third user through a language forbidden intensity setting page, wherein the third user is a user with the language forbidden intensity setting authority;
and determining a first forbidden vocabulary and corresponding forbidden vocabulary intensity according to the operation request for setting the forbidden vocabulary intensity, wherein the forbidden vocabulary intensity of the first forbidden vocabulary comprises the user identity level with the permission of sending the first forbidden vocabulary.
12. The method of claim 11, further comprising:
receiving a barrage sending request containing a second language forbidden vocabulary sent by a fourth user, and determining the user identity level of the fourth user;
determining whether the fourth user has the authority to send the second language forbidden vocabulary based on the user identity level of the fourth user;
and if the fourth user does not have the permission to send the second forbidden words, generating fourth prompt information aiming at the fourth user and sending the fourth prompt information to the client of the fourth user, wherein the fourth prompt information is used for prompting that the fourth user cannot send a bullet screen containing the second forbidden words.
13. A method of word suppression, comprising:
receiving a talk-inhibition request for a talk-inhibited user, which is triggered by the talk-inhibition user;
generating a language-forbidden instruction aiming at the language-forbidden user based on the language-forbidden request, and executing corresponding language-forbidden operation according to the language-forbidden instruction;
wherein, the executing the corresponding language-forbidden operation according to the language-forbidden instruction comprises:
determining whether the language-forbidden user has hidden forbidden authority based on the identity information of the language-forbidden user;
if the language-forbidden user does not have the language-forbidden hiding permission, generating third prompt information and sending the third prompt information to the client of the first user, wherein the third prompt information is used for prompting that the language-forbidden user is in a language-forbidden state;
and if the forbidden language user has the forbidden language hiding permission, generating fourth prompt information and sending the fourth prompt information to a client of a second user, wherein the fourth prompt information is used for prompting that the forbidden language user is in a forbidden language state, and the number of the second users is smaller than that of the first users.
14. An apparatus for word inhibition, comprising:
the receiving module is used for receiving a preset request aiming at the forbidden user, which is triggered by the forbidden user;
a determining module, configured to determine whether the language-forbidden user has a language-forbidden operation right for the language-forbidden user;
the execution module is used for executing the language-forbidden operation corresponding to the preset request if the language-forbidden user is determined to have the language-forbidden operation authority aiming at the language-forbidden user;
the execution module is specifically configured to generate a language-forbidden instruction for the language-forbidden user based on the preset request, and execute a corresponding language-forbidden operation according to the language-forbidden instruction;
wherein the execution module comprises a third processing module, a fourth processing module and a fifth processing module, wherein,
the third processing module is configured to determine whether the language-forbidden user has hidden permission to be forbidden based on the identity information of the language-forbidden user;
the fourth processing module is configured to generate third prompt information and send the third prompt information to the client of the first user if the language-forbidden user does not have the language-forbidden hiding permission, where the third prompt information is used to prompt that the language-forbidden user is in a language-forbidden state;
the fifth processing module is configured to generate fourth prompt information and send the fourth prompt information to a client of a second user if the language-forbidden user has the language-forbidden hiding right, where the fourth prompt information is used to prompt that the language-forbidden user is in a language-forbidden state, and the number of the second users is smaller than the number of the first users.
15. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: performing the method of any one of claims 1 to 13.
16. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of claim 1 to 13.
CN201910420287.6A 2019-05-20 2019-05-20 Word-forbidden method and device, electronic equipment and computer-readable storage medium Active CN110139152B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910420287.6A CN110139152B (en) 2019-05-20 2019-05-20 Word-forbidden method and device, electronic equipment and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910420287.6A CN110139152B (en) 2019-05-20 2019-05-20 Word-forbidden method and device, electronic equipment and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN110139152A CN110139152A (en) 2019-08-16
CN110139152B true CN110139152B (en) 2020-07-24

Family

ID=67571563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910420287.6A Active CN110139152B (en) 2019-05-20 2019-05-20 Word-forbidden method and device, electronic equipment and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN110139152B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650196B (en) * 2019-09-25 2022-05-24 北京达佳互联信息技术有限公司 Business processing system, method, electronic device and storage medium
CN111951118A (en) * 2020-07-24 2020-11-17 上海连尚网络科技有限公司 User social function adjusting method, device and computer readable medium
CN112885350A (en) * 2021-02-25 2021-06-01 北京百度网讯科技有限公司 Control method and device of network conference, electronic equipment and storage medium
CN113518262A (en) * 2021-07-09 2021-10-19 珠海云迈网络科技有限公司 Advertisement bullet screen publisher identification method and device, computer equipment and storage medium thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503155A (en) * 2016-10-21 2017-03-15 武汉斗鱼网络科技有限公司 User's variable body control method and system
CN106954083A (en) * 2017-02-16 2017-07-14 武汉斗鱼网络科技有限公司 Approaches to IM and device
CN108540864A (en) * 2018-04-13 2018-09-14 上海哔哩哔哩科技有限公司 Internet video barrage cloud screen method, system and storage medium
CN109635526A (en) * 2018-12-19 2019-04-16 北京字节跳动网络技术有限公司 Information displaying method, device and electronic equipment

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9876798B1 (en) * 2014-03-31 2018-01-23 Google Llc Replacing unauthorized media items with authorized media items across platforms
CN105959715A (en) * 2016-04-28 2016-09-21 武汉斗鱼网络科技有限公司 Violation handling method and device of live broadcasting website
CN106028151A (en) * 2016-05-25 2016-10-12 武汉斗鱼网络科技有限公司 Live broadcast website user authority control method and device
CN108023805B (en) * 2016-10-31 2020-12-29 阿里巴巴集团控股有限公司 Configuration method and device of interaction permission
CN106454539A (en) * 2016-11-29 2017-02-22 武汉斗鱼网络科技有限公司 Bullet screen forbidding system and bullet screen forbidding method for live video websites
CN109660869A (en) * 2017-10-10 2019-04-19 武汉斗鱼网络科技有限公司 Barrage message screening method, storage medium, equipment and the system of multiterminal cooperation
CN108449647A (en) * 2018-02-12 2018-08-24 广州虎牙信息科技有限公司 A kind of barrage processing method, device and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503155A (en) * 2016-10-21 2017-03-15 武汉斗鱼网络科技有限公司 User's variable body control method and system
CN106954083A (en) * 2017-02-16 2017-07-14 武汉斗鱼网络科技有限公司 Approaches to IM and device
CN108540864A (en) * 2018-04-13 2018-09-14 上海哔哩哔哩科技有限公司 Internet video barrage cloud screen method, system and storage medium
CN109635526A (en) * 2018-12-19 2019-04-16 北京字节跳动网络技术有限公司 Information displaying method, device and electronic equipment

Also Published As

Publication number Publication date
CN110139152A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN110139152B (en) Word-forbidden method and device, electronic equipment and computer-readable storage medium
US10855676B2 (en) Audio verification
JP7351907B2 (en) Online document sharing methods, devices, electronic devices and storage media
US20210256431A1 (en) Methods for unlocking shared bikes
CN111339557A (en) Online document display method, device, equipment and medium
US11114104B2 (en) Preventing adversarial audio attacks on digital assistants
US20200259770A1 (en) Extensible chat rooms in a hosted chat environment
WO2021190557A1 (en) Interaction method and apparatus, and electronic device
US20210112027A1 (en) Method and a device for processing information
US20180081514A1 (en) Attention based alert notification
CN110007936B (en) Data processing method and device
CN112311841A (en) Information pushing method and device, electronic equipment and computer readable medium
CN112487451B (en) Display method and device and electronic equipment
WO2021068764A1 (en) Information processing method and device
AU2017265064A1 (en) Access to data on a remote device
CN108337535B (en) Client video forwarding method, device, equipment and storage medium
US20120297399A1 (en) Automatically updating the display state of the user interface of a client device in a publish/subscribe system
CN110134480B (en) User trigger operation processing method and device, electronic equipment and storage medium
US9760414B2 (en) Preserving event data for lazily-loaded macro components in a publish/subscribe system
CN113241070B (en) Hotword recall and update method and device, storage medium and hotword system
US20230385080A1 (en) Method and apparatus for presenting information on lock screen interface, terminal, and storage medium
US10341129B2 (en) Method and system to provide the trending news stories to the plurality of groups based on the plurality of group members existing conversations
US11848762B2 (en) Live broadcast stream pushing method and apparatus, and electronic device
CN111581664A (en) Information protection method and device
CN110708238A (en) Method and apparatus for processing information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: Tiktok vision (Beijing) Co.,Ltd.

CP01 Change in the name or title of a patent holder