CN110234038B - User management method based on distributed storage - Google Patents

User management method based on distributed storage Download PDF

Info

Publication number
CN110234038B
CN110234038B CN201910400275.7A CN201910400275A CN110234038B CN 110234038 B CN110234038 B CN 110234038B CN 201910400275 A CN201910400275 A CN 201910400275A CN 110234038 B CN110234038 B CN 110234038B
Authority
CN
China
Prior art keywords
video
time
data
user
distributed storage
Prior art date
Application number
CN201910400275.7A
Other languages
Chinese (zh)
Other versions
CN110234038A (en
Inventor
寇京珅
Original Assignee
特斯联(北京)科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 特斯联(北京)科技有限公司 filed Critical 特斯联(北京)科技有限公司
Priority to CN201910400275.7A priority Critical patent/CN110234038B/en
Publication of CN110234038A publication Critical patent/CN110234038A/en
Application granted granted Critical
Publication of CN110234038B publication Critical patent/CN110234038B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/1097Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for distributed storage of data in a network, e.g. network file system [NFS], transport mechanisms for storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network, synchronizing decoder's clock; Client middleware
    • H04N21/433Content storage operation, e.g. storage operation in response to a pause request, caching operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/84Generation or processing of descriptive data, e.g. content descriptors
    • H04N21/8405Generation or processing of descriptive data, e.g. content descriptors represented by keywords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments

Abstract

The application discloses a user management method based on distributed storage, and belongs to the technical field of data processing. The method comprises the following steps: the application node records a video, extracts key information of the video and broadcasts the key information; the method comprises the steps that an authentication node acquires broadcast key information, marks a label corresponding to a video, determines a master database timestamp, and writes the master database timestamp, the key information and the label into a distributed storage database master database as authentication data; the evaluation node acquires a timestamp in the last storage packet of the branch database of the distributed storage database at intervals of a preset time interval as an initial time and acquires the current time as a cut-off time; searching authentication data in a corresponding time period in a distributed storage database main library according to the starting time and the ending time to be used as data to be evaluated; and evaluating the user level of the corresponding user according to the data to be evaluated, and storing the user level to a branch library of the distributed storage database. In the application, the safety and stability of each data are guaranteed, the operation process is open and transparent, fairness is avoided, users can be effectively managed, and the users are stimulated.

Description

User management method based on distributed storage

Technical Field

The application relates to the technical field of data processing, in particular to a user management method based on distributed storage.

Background

The decision of the State Council on accelerating the breeding and developing strategic emerging industries lists seven national strategic emerging industry systems, including the "information technology industry of the new generation". The new-generation information technology is one of seven strategic emerging industries determined by state hospitals, and is divided into six aspects, namely a next-generation communication network, an internet of things, three-network integration, novel flat panel display, a high-performance integrated circuit and high-end software represented by cloud computing. The main content of developing the new generation information technology industry is to accelerate the construction of broadband, ubiquitous, integrated and safe information network infrastructure and promote the research and development and industrialization of the new generation mobile communication, the next generation internet core equipment and the intelligent terminal.

Today, the rapid development of internet technology is accompanied by various applications. Currently, live broadcast applications with video recording functions such as jittering and fast video are popular, and characters in shape and color record various videos through the live broadcast applications and distribute the videos to a network. However, some users can propagate unhealthy and negative ideas through the system, which can adversely affect the audience. Thus, it is necessary to mobilize users to distribute healthy video and manage live users without reducing the usage of live applications.

In the existing live broadcast user management method, user data is generally collected through a server, and corresponding users are rewarded or punished by analyzing the collected data; however, in the method, a large amount of data is stored in the server, and once the server fails, all earlier works return to zero; and the process of analyzing the data is not transparent, and users who are not rewarded are likely to generate a rough mind, thereby reducing the use interest of the application and further reducing the click rate of the application.

Disclosure of Invention

In order to overcome the defects in the prior art, the application provides a user management method, device and system based on distributed storage.

In a first aspect, the present application provides a user management method for an application node, including:

recording a video and extracting key information of the video;

broadcasting the key information in a distributed storage database network so that each authentication node can calibrate the label for the video.

Optionally, the extracting key information of the video includes:

intercepting a partial video segment of the video;

and the video clip corresponds to the video attribute information to be used as the key information of the video.

In a second aspect, the present application provides a user management method for an authentication node, including:

acquiring key information in a distributed storage database network;

calibrating a label of a corresponding video according to the key information;

and verifying the tag, determining a master library time stamp by a preset authentication node when the tag passes the verification, and writing the master library time stamp, the key information and the tag into a distributed storage database master library as authentication data.

Optionally, the calibrating the label of the corresponding video according to the key information includes: and calling a preset analysis model to analyze the video content of the video clip in the key information, and calibrating the label.

Optionally, the tag is verified using a practical byzantine fault tolerance mechanism.

Optionally, the key information includes video attribute information, and the video attribute information includes video recording time;

the determining a master library timestamp comprises: and acquiring current time, judging whether the current time and the video recording time meet preset conditions, if so, taking the current time as a master library timestamp, and otherwise, taking the video recording time as the master library timestamp.

Optionally, the key information includes video clips and video attribute information;

the writing the key information and the tag into a distributed storage database master library comprises:

compressing and coding the video clips to obtain coded video data;

generating a summary of the encoded video data;

and writing the abstract, the label, the master library timestamp and the video attribute information into a master library of a distributed storage database.

In a third aspect, the present application provides a user management method for evaluating a node, including:

acquiring a timestamp in the last storage packet of the branch database of the distributed storage database at preset time intervals, and taking the timestamp as the starting time;

acquiring current time as cut-off time, and searching authentication data in a corresponding time period in a distributed storage database master library according to the starting time and the cut-off time to be used as data to be evaluated;

evaluating the user level of the corresponding user according to the data to be evaluated;

and verifying the user level, and when the user level passes the verification, correspondingly storing the deadline time serving as a current branch database timestamp and the user level to the branch database of the distributed storage database by a preset evaluation node.

Optionally, the searching for the authentication data in the corresponding time period in the distributed storage database master library according to the starting time and the ending time as the data to be evaluated includes:

reading the time stamps of the main libraries in each storage packet from the last storage packet of the main library of the distributed storage database in sequence;

judging whether the read master library timestamp is in a time period corresponding to the starting time and the ending time;

when the judgment result is yes, reading the authentication data in the corresponding storage packet and taking the authentication data as the data to be evaluated;

and when the judgment result is negative, judging that the searching is finished.

Optionally, the data to be evaluated includes: the label, the video identifier and the user identifier have corresponding relation;

the evaluating the user level of the corresponding user according to the data to be evaluated comprises the following steps:

classifying the data to be evaluated to obtain all labels and video identifications corresponding to the user identifications;

counting the number of video identifications corresponding to each user identification to obtain the video recording times of each user;

and evaluating the corresponding user level of each user according to all the labels corresponding to each user identification, the video recording times of each user and a preset evaluation standard.

Optionally, the user level is verified using a practical byzantine fault tolerance mechanism.

In a fourth aspect, the present application provides a user management apparatus, including:

the recording module is used for recording videos;

the extraction module is used for extracting key information of the video;

and the broadcasting module is used for broadcasting the key information extracted by the extraction module in a distributed storage database network so that each authentication node can calibrate the label for the video.

Optionally, the extracting module is specifically configured to intercept a part of a video clip of the video, and use the video clip and the video attribute information as key information of the video.

In a fifth aspect, the present application provides a user management apparatus, including:

the first acquisition module is used for acquiring key information in the distributed storage database network;

the calibration module is used for calibrating the label of the corresponding video according to the key information acquired by the first acquisition module;

the first verification module is used for verifying the label calibrated by the calibration module;

a determining module for determining a master library timestamp when the first verification module verifies;

and the first writing module is used for writing the master library time stamp, the key information and the tag into a master library of a distributed storage database as authentication data.

Optionally, the calibration module is specifically configured to invoke a preset analysis model to analyze video content of the video clip in the key information, and calibrate the tag.

Optionally, the first verification module is specifically configured to verify the tag by using a practical byzantine fault-tolerant mechanism.

Optionally, the determining module is specifically configured to obtain a current time, determine whether the current time and the video recording time in the key information meet a preset condition, if so, use the current time as a master library timestamp, and otherwise, use the video recording time as a master library timestamp.

Optionally, the key information includes video clips and video attribute information; the first write module includes: the encoding submodule, the generating submodule and the writing submodule;

the coding submodule is used for compressing and coding the video clip to obtain coded video data;

the generation submodule is used for generating the abstract of the coded video data;

and the writing sub-module is used for writing the abstract, the tag, the main library timestamp and the video attribute information into the main library of the distributed storage database.

In a sixth aspect, the present application provides a user management apparatus, including:

the second acquisition module is used for acquiring a timestamp in the last storage packet of the branch database of the distributed storage database at preset time intervals and taking the timestamp as the starting time;

the third acquisition module is used for acquiring the current time as the deadline;

the searching module is used for searching authentication data in a corresponding time period in a distributed storage database main library according to the starting time and the ending time to be used as data to be evaluated;

the evaluation module is used for evaluating the user level of the corresponding user according to the data to be evaluated;

the second verification module is used for verifying the user level evaluated by the evaluation module;

and the second writing module is used for correspondingly storing the deadline time as the current branch database timestamp and the user level to the branch database of the distributed storage database when the second verification module passes the verification.

Optionally, the searching module includes: the device comprises a first reading submodule, a judgment submodule and a second reading submodule;

the first reading submodule is used for sequentially reading the time stamps of the main libraries in each storage packet from the last storage packet of the distributed storage database main library;

the judgment submodule is used for judging whether the time stamp of the main library read by the first reading submodule is in a time period corresponding to the starting time and the ending time, and judging that the searching is finished when the judgment result is negative;

and the second reading submodule is used for reading the authentication data in the corresponding storage packet and taking the authentication data as the data to be evaluated when the judgment result of the judgment submodule is yes.

Optionally, the data to be evaluated includes: the label, the video identifier and the user identifier have corresponding relation; the evaluation module comprises: the system comprises a classification submodule, a statistics submodule and an evaluation submodule;

the classification submodule is used for classifying the data to be evaluated to obtain all labels and video identifications corresponding to the user identifications;

the counting submodule is used for counting the number of the video identifications corresponding to each user identification to obtain the video recording times of each user;

and the evaluation submodule is used for evaluating the corresponding user level of each user according to all the labels corresponding to each user identification, the video recording times of each user and a preset evaluation standard.

Optionally, the second verification module is specifically configured to verify the user level evaluated by the evaluation module by using a practical byzantine fault-tolerant mechanism.

In a seventh aspect, the present application provides a user management system, including: the apparatus of any one of the fourth to sixth aspects of the present application.

In an eighth aspect, the present application provides a user management device, including:

one or more processors, storage devices to store one or more programs;

the one or more programs, when executed by the one or more processors, implement the method as in any of the first to third aspects of the present application.

In a ninth aspect, the present application proposes a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method according to any of the first to third aspects of the present application.

The application has the advantages that: the distributed storage technology is adopted to process and store all data, so that on one hand, the safety and stability of the stored data are guaranteed; on the other hand, the whole process of marking the label and evaluating the user is public and transparent, so that the uneven psychology of the user who is not rewarded is effectively avoided; on the other hand, different data are clearly stored, so that the searching is convenient; therefore, effective management of data and users is realized.

Drawings

Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:

fig. 1 is a flowchart of a user management method for an application node according to an embodiment of the present application;

FIG. 2 is a flow chart of a user management method for an authentication node according to an embodiment of the present application;

FIG. 3 is a flowchart of a user management method for evaluating nodes according to an embodiment of the present application;

FIG. 4 is a flow chart of a user management method according to an embodiment of the present application;

fig. 5 is a block diagram of a first user management apparatus according to an embodiment of the present application;

fig. 6 is a block diagram of a second user management apparatus according to an embodiment of the present application;

fig. 7 is a block diagram of a third user management apparatus according to an embodiment of the present application.

Detailed Description

Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

In the application, the video recorded by each live user is analyzed by using a distributed storage technology, and then the live users are managed. Specifically, each live broadcast application (such as pepper, quick application and the like) is used as an application node, and a video clip recorded by a user is intercepted and broadcasted to a distributed storage database network; the distributed storage database network comprises a plurality of authentication nodes and a plurality of evaluation nodes, labels are marked on the video clips broadcast by the application nodes through the authentication nodes, users are graded through the evaluation nodes based on the labels, and therefore management measures such as corresponding rewards and punishments are carried out on the users according to evaluation results. The method of the present application is described in further detail below.

Example one

According to an embodiment of the present application, a user management method for an application node is provided, as shown in fig. 1, including:

step 101: recording a video and extracting key information of the video;

specifically, when shooting trigger information from a user is received, a video is recorded; and intercepting part of video clips of the recorded video, and taking the intercepted video clips and the video attribute information as key information of the video correspondingly.

Wherein, before intercepting part of the video clip of the recorded video, the method further comprises: judging whether the size of the recorded video does not exceed the preset size, if so, correspondingly taking the recorded video and the video attribute information as key information of the video; otherwise, the operation of intercepting part of the video clip of the recorded video is executed.

Because the video data recorded by the user is usually large, the problems of data transmission efficiency and occupied storage space are considered, only part of video clips are intercepted and broadcasted to a distributed storage database (a main database and a branch database) for each node to analyze; the size of the video clip can be set according to the requirement.

Further, the video attribute information includes: video recording time, video identification, user identification and the like; the preset size can be set according to the requirement.

Step 102: and broadcasting the extracted key information in the distributed storage database network so as to provide the video calibration label corresponding to each authentication node.

Example two

According to an embodiment of the present application, there is also provided a user management method for an authentication node, as shown in fig. 2, including:

step 201: acquiring key information in a distributed storage database network;

the key information comprises video clips and video attribute information, and the video attribute information comprises video recording time, video identification, user identification and the like.

Step 202: calibrating a label corresponding to the video according to the acquired key information;

specifically, a preset analysis model is called to analyze the video content of the video clip in the acquired key information, and a label is calibrated;

the analysis model is obtained by acquiring a large number of video samples in advance and training, and a specific model training process is not described in detail herein.

In the application, the label is a condensed description of the video, including but not limited to a description of video content and a description of conveying spirit; for example, a certain user records a video of an emoticon that is lovely by a child, and marks the video as emoticon and loveliness; and if a certain user records a section of video which attacks a certain group by using the non-civilized language, the label of the video is calibrated to the non-civilized language, and the like.

Step 203: and verifying the calibrated tag, determining a master library time stamp by a preset authentication node when the calibrated tag passes the verification, and writing the master library time stamp, the key information and the tag into a master library of the distributed storage database as authentication data.

The label for verifying calibration is preferably a label for verifying calibration by using a practical Byzantine Fault tolerant mechanism (PBFT).

Specifically, when a certain authentication node obtains a tag, the tag is sent to other authentication nodes, the other authentication nodes verify whether the received tag is reasonable, and send a verification result to a preset authentication node, and when the preset authentication node receives a preset number of verification results, whether the tag is reasonable is determined according to the received verification result.

The preset number can be set according to the requirement; judging whether the label is reasonable according to the received verification result, specifically judging whether the label is reasonable according to a few principle of obeying majority;

for example, if the preset number is 70% of the total number of authentication nodes, and there are 10 authentication nodes currently, then when 7 verification results are received, the number of verification passing results is counted, and when the number of verification passing results is at least 4, it is determined that the label is reasonable.

Further, in step 203, determining a master library timestamp includes:

and acquiring the current time, judging whether the current time and the video recording time in the key information meet preset conditions, if so, taking the current time as a master library timestamp, and otherwise, taking the video recording time as the master library timestamp.

Wherein, judge whether the video recording time in current time and the key information satisfies the preset condition, specifically do: judging whether the time interval between the current time and the video recording time in the key information does not exceed a preset time length, if so, judging that the preset condition is met, otherwise, judging that the preset condition is not met; the preset time period is, for example, 60 seconds.

Further, in step 203, writing the master library timestamp, the key information, and the tag as authentication data into the distributed storage database master library, including: compressing and coding the video clips in the key information to obtain coded video data; and generating an abstract of the coded video data, and writing the abstract, the tag, the master library timestamp and the video attribute information into a master library of the distributed storage database.

Therefore, the labels and related data of the videos are stored in the distributed storage database main base, the data are public and transparent and cannot be falsified, and a stable and effective data basis is provided for the follow-up evaluation of the level of each user.

EXAMPLE III

According to an embodiment of the present application, a user management method for evaluating a node is further provided, as shown in fig. 3, including:

step 301: acquiring a timestamp in the last storage packet of the branch database of the distributed storage database at preset time intervals, and taking the timestamp as the starting time;

the time stamp in the last storage packet of the branch database of the distributed storage database is the time point of the last evaluation, the evaluation takes the time point as the starting time, and corresponding authentication data is searched in the main database of the distributed storage database;

further, the preset time interval can be set according to the requirement, for example, 24 hours.

Step 302: acquiring current time as cut-off time, and searching authentication data in a corresponding time period in a distributed storage database master library according to the starting time and the cut-off time to be used as data to be evaluated;

the method for searching the authentication data in the corresponding time period in the distributed storage database master library according to the starting time and the ending time as the data to be evaluated comprises the following steps: reading the master database time stamps in the storage packets from the last storage packet of the distributed storage database master database in sequence, and judging whether the read master database time stamps are in a time period corresponding to the starting time and the ending time; when the judgment result is yes, reading the authentication data in the corresponding storage packet and taking the authentication data as the data to be evaluated; and when the judgment result is negative, judging that the searching is finished.

More specifically, the step of searching authentication data in a corresponding time period in a distributed storage database master library according to the starting time and the ending time as data to be evaluated includes:

step A1: taking the last storage packet of the distributed storage database master library as a current storage packet;

step A2: reading a master library time stamp in the current storage packet as a current master library time stamp;

step A3: judging whether the current master library timestamp is in a time period corresponding to the starting time and the ending time, if so, executing the step A4, otherwise, ending;

step A4: and B, reading the authentication data in the current storage packet as the data to be evaluated, taking the previous storage packet of the current storage packet as the current storage packet, and returning to the step A2.

Step 303: evaluating the user level of the corresponding user according to the data to be evaluated;

the data to be evaluated comprises a label with a corresponding relation, a video identifier and a user identifier;

correspondingly, step 303 includes:

classifying the data to be evaluated to obtain all labels and video identifications corresponding to the user identifications;

counting the number of video identifications corresponding to each user identification to obtain the video recording times of each user;

and evaluating the corresponding user level of each user according to all the obtained labels corresponding to each user identifier, the video recording times of each user and a preset evaluation standard.

The process of presetting evaluation standards and evaluating the user level of each corresponding user can be set according to requirements;

for example, each label and the weight corresponding to different video recording times are preset in the evaluation standard, evaluating the user level of each corresponding user includes calculating the sum of the weights corresponding to each user identifier, and determining the user level of the corresponding user according to the corresponding relationship between the sum of the weights and the user level.

Step 304: verifying the user level of the evaluation, and when the user level passes the verification, correspondingly storing the cutoff time serving as the current branch database timestamp and the user level to the branch database of the distributed storage database by the preset evaluation node.

Specifically, the preset evaluation node stores the current branch database timestamp, the user identifier and the corresponding user level to the branch database of the distributed storage database.

Verifying the user level to be evaluated, specifically verifying the user level to be evaluated by adopting a practical Byzantine fault-tolerant mechanism; the specific implementation process of the method can be seen in the process of verifying the label by using the practical byzantine fault tolerance mechanism in step 203 in the second embodiment, and details thereof are not described herein.

Further, the method further comprises: and reading user level data in the corresponding storage packet according to the branch database timestamp of each storage packet in the distributed storage database branch database every other preset time period, and comprehensively evaluating the user level of each user in the preset time period. Wherein the preset time period is, for example, one month, one quarter, etc.; therefore, the long-term use state of each user is known, and a more effective management strategy is made.

Still further, the method further comprises: rewarding and punishing the corresponding user according to the evaluated user level; therefore, the user enthusiasm is mobilized, and the user is encouraged to release high-quality videos.

For example, the user level and the user identifier are correspondingly sent to the application node, and the application node displays the video sequence of the user corresponding to the user identifier with the high user level in front in all video display interfaces; if the user with high user level can use some facial expression packages, beautify the video interface, use props and the like; as another example, the use of applications is prohibited for users with extremely low levels, poor behavior, etc.

Therefore, the level of each user is evaluated by combining each authentication data stored in the distributed storage database master library, so that not only is a stable data base provided, but also the evaluation process is public and transparent, and the unsmooth psychology of the user who is not rewarded is effectively avoided; and moreover, the label data and the evaluation data are clearly stored, so that the data are convenient to search and manage.

Example four

According to an embodiment of the present application, there is also provided a user management method, as shown in fig. 4, including:

step 401: the application node records a video, takes key information of the video and broadcasts the key information in a distributed storage database network;

step 402: the method comprises the steps that an authentication node acquires key information in a distributed storage database network, marks a label of a corresponding video according to the key information, verifies the label, determines a master database timestamp by a preset authentication node when the verification is passed, and writes the master database timestamp, the key information and the label into a distributed storage database master database as authentication data;

step 403: the evaluation node acquires a timestamp in the last storage packet of the branch database of the distributed storage database at intervals of a preset time interval as an initial time and acquires the current time as a cut-off time;

step 404: the evaluation node searches authentication data in a corresponding time period in a distributed storage database main library as data to be evaluated according to the obtained starting time and the ending time;

step 405: and the evaluation node evaluates the user level of the corresponding user according to the acquired data to be evaluated, verifies the user level, and when the verification is passed, the preset evaluation node takes the cut-off time as the current branch database time stamp and correspondingly stores the current branch database time stamp and the user level to the branch database of the distributed storage database.

The implementation method of each step in this embodiment can be referred to in the description of the first to third embodiments, and is not described in detail here.

EXAMPLE five

According to an embodiment of the present application, there is also provided a user management apparatus, as shown in fig. 5, including:

a recording module 501, configured to record a video;

an extracting module 502, configured to extract key information of the video recorded by the recording module 501;

the broadcasting module 503 is configured to broadcast the key information extracted by the extracting module 502 in the distributed storage database network, so that each authentication node calibrates a label to a video.

According to an embodiment of the present application, the extracting module 502 is specifically configured to intercept a part of a video clip of a video recorded by the recording module 501, and use the video clip and the video attribute information as key information of the video.

EXAMPLE six

According to an embodiment of the present application, there is also provided a user management apparatus, as shown in fig. 6, including:

a first obtaining module 601, configured to obtain key information in a distributed storage database network;

a calibration module 602, configured to calibrate a tag of a corresponding video according to the key information acquired by the first acquisition module 601;

a first verifying module 603, configured to verify the label calibrated by the calibrating module 602;

a determining module 604 for determining a master library timestamp when the first verifying module 603 verifies;

a first write module 605 for writing the master library timestamp, the key information, and the tag as authentication data to the distributed storage database master library.

According to an embodiment of the present application, the calibration module 602 is specifically configured to invoke a preset analysis model to analyze video content of a video clip in the key information, and calibrate a tag.

According to an embodiment of the application, the first authentication module 603 is specifically configured to authenticate the tag using a practical byzantine fault tolerance mechanism.

According to an embodiment of the present application, the determining module 604 is specifically configured to obtain current time, determine whether the current time and video recording time in the key information meet a preset condition, if so, use the current time as a master library timestamp, and otherwise, use the video recording time as the master library timestamp.

According to an embodiment of the present application, the key information includes video clips and video attribute information;

correspondingly, the first write module 605 includes: the encoding submodule, the generating submodule and the writing submodule are provided, wherein:

the coding submodule is used for compressing and coding the video clip to obtain coded video data;

a generation submodule for generating a summary of the encoded video data;

and the writing submodule is used for writing the abstract, the label, the main library timestamp and the video attribute information into the main library of the distributed storage database.

EXAMPLE seven

According to an embodiment of the present application, there is also provided a user management apparatus, as shown in fig. 7, including:

a second obtaining module 701, configured to obtain, at preset time intervals, a timestamp in a last storage packet of a branch database of the distributed storage database, where the timestamp is used as an initial time;

a third obtaining module 702, configured to obtain a current time as a deadline;

the searching module 703 is configured to search, in the distributed storage database master library, authentication data in a corresponding time period as data to be evaluated according to the start time and the end time;

the evaluating module 704 is used for evaluating the user level of the corresponding user according to the data to be evaluated;

a second verification module 705, configured to verify the user level evaluated by the evaluation module 704;

and a second writing module 706, configured to, when the second verification module 705 passes the verification, save the expiration time as a current branch base timestamp to the distributed storage database branch base in correspondence with the user level.

According to an embodiment of the present application, the lookup module 703 includes: the device comprises a first reading submodule, a judgment submodule and a second reading submodule, wherein:

the first reading submodule is used for sequentially reading the time stamps of the main libraries in each storage packet from the last storage packet of the distributed storage database main library;

the judgment sub-module is used for judging whether the time stamp of the main library read by the first reading sub-module is in a time period corresponding to the starting time and the ending time, and judging that the searching is finished when the judgment result is negative;

and the second reading submodule is used for reading the authentication data in the corresponding storage packet and taking the authentication data as the data to be evaluated when the judgment result of the judgment submodule is yes.

According to the embodiment of the application, the data to be evaluated comprises: the label, the video identifier and the user identifier have corresponding relation;

correspondingly, the evaluating module 704 includes: the device comprises a classification submodule, a statistics submodule and an evaluation submodule, wherein:

the classification submodule is used for classifying the data to be evaluated to obtain all labels and video identifications corresponding to the user identifications;

the counting submodule is used for counting the number of the video identifications corresponding to each user identification to obtain the video recording times of each user;

and the evaluation submodule is used for evaluating the corresponding user level of each user according to all the labels corresponding to each user identification, the video recording times of each user and a preset evaluation standard.

According to an embodiment of the present application, the second verification module 705 is specifically configured to verify the user level evaluated by the evaluation module 704 by using a practical byzantine fault tolerance mechanism.

In this application, a user management system is further provided, including: the apparatus of any one of embodiments five through seven.

In this application, a user management device is further provided, including: one or more processors, storage devices to store one or more programs; the one or more programs, when executed by the one or more processors, implement the method of any of embodiments one through three.

The present application further proposes a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the method according to any one of the first to third embodiments.

All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. Especially for the device embodiment, since it is basically similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.

In the method, a node in a distributed storage database network is used for marking a label on a video recorded by a user, storing related information such as the label in the distributed storage database, and grading the user based on the information such as the label in the distributed storage database, so that operations such as rewarding and punishing are performed; in the process, based on the characteristics of non-falsification, openness and transparency and the like of the database, the safety and stability of the stored data are guaranteed, the calibration and evaluation process is also made to be open and transparent, and the unsmooth psychology of the user who is not rewarded is effectively avoided; moreover, the main library and the branch libraries are combined, so that the storage space is effectively expanded, the data storage is clear, and the searching is convenient; and the effective management of data and live broadcast users is realized.

The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (6)

1. A management method for an authentication node, comprising:
acquiring key information in a distributed storage database network; the key information comprises video clips and video attribute information, and the video attribute information comprises video recording time; the distributed storage database network comprises a plurality of authentication nodes, and the authentication nodes are used for calibrating labels of video clips broadcasted by application nodes;
calibrating a label of a corresponding video according to the key information;
verifying the tag, determining a master library timestamp by a preset authentication node when the tag passes the verification, and writing the master library timestamp, the key information and the tag into a distributed storage database master library as authentication data;
the determining a master library timestamp comprises: acquiring current time, judging whether the current time and the video recording time meet preset conditions, if so, taking the current time as a master library timestamp, otherwise, taking the video recording time as the master library timestamp;
the method comprises the following steps of judging whether the current time and the video recording time meet preset conditions, specifically: and judging whether the time interval between the current time and the video recording time does not exceed a preset time length, if so, judging that the preset condition is met, and otherwise, judging that the preset condition is not met.
2. The method according to claim 1, wherein said labeling the corresponding video according to the key information comprises: and calling a preset analysis model to analyze the video content of the video clip in the key information, and calibrating the label.
3. The method of claim 1, wherein the tag is verified using a practical byzantine fault tolerance mechanism.
4. The method of claim 1, wherein writing the key information and the tag to a distributed storage database master comprises:
compressing and coding the video clips to obtain coded video data;
generating a summary of the encoded video data;
and writing the abstract, the label, the master library timestamp and the video attribute information into a master library of a distributed storage database.
5. A management method for evaluating a node, comprising:
acquiring a timestamp in the last storage packet of the branch database of the distributed storage database at preset time intervals, and taking the timestamp as the starting time;
acquiring current time as cut-off time, and searching authentication data in a corresponding time period in a distributed storage database master library according to the starting time and the cut-off time to be used as data to be evaluated; the authentication data is a master database timestamp, key information and a tag;
evaluating the user level of the corresponding user according to the data to be evaluated; the data to be evaluated comprises a label with a corresponding relation, a video identifier and a user identifier; the evaluating the user level of the corresponding user according to the data to be evaluated comprises the following steps: classifying the data to be evaluated to obtain all labels and video identifications corresponding to the user identifications; counting the number of video identifications corresponding to each user identification to obtain the video recording times of each user; evaluating the user level of each corresponding user according to all the obtained labels corresponding to each user identifier, the video recording times of each user and a preset evaluation standard;
and verifying the user level, and when the user level passes the verification, correspondingly storing the deadline time serving as a current branch database timestamp and the user level to the branch database of the distributed storage database by a preset evaluation node.
6. The method according to claim 5, wherein the searching authentication data in corresponding time periods in a distributed storage database master library according to the starting time and the deadline as data to be evaluated comprises:
reading the time stamps of the main libraries in each storage packet from the last storage packet of the main library of the distributed storage database in sequence;
judging whether the read master library timestamp is in a time period corresponding to the starting time and the ending time;
when the judgment result is yes, reading the authentication data in the corresponding storage packet and taking the authentication data as the data to be evaluated;
and when the judgment result is negative, judging that the searching is finished.
CN201910400275.7A 2019-05-13 2019-05-13 User management method based on distributed storage CN110234038B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910400275.7A CN110234038B (en) 2019-05-13 2019-05-13 User management method based on distributed storage

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910400275.7A CN110234038B (en) 2019-05-13 2019-05-13 User management method based on distributed storage

Publications (2)

Publication Number Publication Date
CN110234038A CN110234038A (en) 2019-09-13
CN110234038B true CN110234038B (en) 2020-02-14

Family

ID=67861296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910400275.7A CN110234038B (en) 2019-05-13 2019-05-13 User management method based on distributed storage

Country Status (1)

Country Link
CN (1) CN110234038B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103052952A (en) * 2010-08-08 2013-04-17 高通股份有限公司 Apparatus and methods for managing content
CN103412859A (en) * 2012-10-11 2013-11-27 华迪计算机集团有限公司 Method and device for rapidly searching for enormous videos based on media asset management system
CN108307229A (en) * 2018-02-02 2018-07-20 新华智云科技有限公司 A kind of processing method and equipment of video-audio data
CN108471522A (en) * 2018-04-18 2018-08-31 成都零光量子科技有限公司 A kind of video frequency monitoring method that can not be distorted and system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9832519B2 (en) * 2012-04-18 2017-11-28 Scorpcast, Llc Interactive video distribution system and video player utilizing a client server architecture
JP2014010465A (en) * 2012-06-27 2014-01-20 International Business Maschines Corporation Method for selecting storage cloud for storing entity file from two or more storage cloud and computer and computer program
US9602795B1 (en) * 2016-02-22 2017-03-21 Gopro, Inc. System and method for presenting and viewing a spherical video segment
CN105681717B (en) * 2016-03-04 2019-09-17 广州星唯信息科技有限公司 The distributed storage method and system of public transport vehicle-mounted monitoring video
US20170339229A1 (en) * 2016-05-20 2017-11-23 Sinclair Broadcast Group, Inc. Content atomization
CN105828052A (en) * 2016-06-02 2016-08-03 中国联合网络通信集团有限公司 Video monitoring method and monitoring system based on Storm technology
CN109690607A (en) * 2016-10-25 2019-04-26 猫头鹰照相机股份有限公司 Data collection, image capture and analysis configuration based on video
CN106919652B (en) * 2017-01-20 2018-04-06 东北石油大学 Short-sighted frequency automatic marking method and system based on multi-source various visual angles transductive learning
CN109583230A (en) * 2018-10-31 2019-04-05 阿里巴巴集团控股有限公司 Data based on block chain deposit card method and device, electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103052952A (en) * 2010-08-08 2013-04-17 高通股份有限公司 Apparatus and methods for managing content
CN103412859A (en) * 2012-10-11 2013-11-27 华迪计算机集团有限公司 Method and device for rapidly searching for enormous videos based on media asset management system
CN108307229A (en) * 2018-02-02 2018-07-20 新华智云科技有限公司 A kind of processing method and equipment of video-audio data
CN108471522A (en) * 2018-04-18 2018-08-31 成都零光量子科技有限公司 A kind of video frequency monitoring method that can not be distorted and system

Also Published As

Publication number Publication date
CN110234038A (en) 2019-09-13

Similar Documents

Publication Publication Date Title
CN106796625B (en) Use the multifarious watermark detection of prediction pattern
TWI619029B (en) Method,system and computer readable non-transitory storage medium for continuous content identification of broadcast content
CN104487963B (en) Methods and apparatus to collect distributed user information for media impressions and search terms
CN103797483B (en) Methods and systems for identifying content in data stream
CN104463643B (en) A kind of method presenting user comment in advertisement
JP2015043223A (en) Data collection and targeted advertising systems and methods
US9160640B1 (en) Collecting client-side performance metrics and latencies
CN105389722B (en) Malicious order identification method and device
US20160239501A1 (en) Information search method, device, server and storage medium
KR101944469B1 (en) Estimating and displaying social interest in time-based media
CN105872837B (en) User's recommended method and device
TWI409691B (en) Comment filters for real-time multimedia broadcast sessions
CN105814901B (en) The method and apparatus for measuring and monitoring the exposure of Streaming Media
CA2769946C (en) A method and system for efficient and exhaustive url categorization
CN104602131A (en) Barrage processing method and system
CN103327045B (en) User recommendation method and system in social network
CN104469508A (en) Method, server and system for performing video positioning based on bullet screen information content
Smura et al. A framework for analysing the usage of mobile services
CN103390258B (en) Updating and inquiring method and management system of laboratory object information and based on information code
US8503991B2 (en) Methods and apparatus to monitor mobile devices
US20040049681A1 (en) Time stamping and time stamp validity verification system, method and device in a digital broadcasting environment
AU2013204865A1 (en) Methods and apparatus to share online media impressions data
KR20180031024A (en) Future audience prediction of video segments to optimize system resource utilization
WO2013068429A1 (en) Image annotation method and system
CN103686237B (en) Recommend the method and system of video resource

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant