CN116405629A - Video content display method, device, electronic equipment and storage medium - Google Patents

Video content display method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116405629A
CN116405629A CN202111619546.1A CN202111619546A CN116405629A CN 116405629 A CN116405629 A CN 116405629A CN 202111619546 A CN202111619546 A CN 202111619546A CN 116405629 A CN116405629 A CN 116405629A
Authority
CN
China
Prior art keywords
user
identity
video content
video
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111619546.1A
Other languages
Chinese (zh)
Inventor
朱红军
官丹
赵志东
梅君君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202111619546.1A priority Critical patent/CN116405629A/en
Priority to PCT/CN2022/137028 priority patent/WO2023124840A1/en
Publication of CN116405629A publication Critical patent/CN116405629A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • H04N21/4415Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card using biometric characteristics of the user, e.g. by voice recognition or fingerprint scanning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/454Content or additional data filtering, e.g. blocking advertisements
    • H04N21/4542Blocking scenes or portions of the received content, e.g. censoring scenes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/475End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data
    • H04N21/4756End-user interface for inputting end-user data, e.g. personal identification number [PIN], preference data for rating content, e.g. scoring a recommended movie

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application relates to the technical field of communication and discloses a video content display method, a device, electronic equipment and a storage medium, wherein the method comprises the following steps: receiving a video content acquisition request of a user, and acquiring the identity of the user; acquiring a target judging rule corresponding to the identity of the user according to the identity of the user and a preset corresponding relation between the user identity and the judging rule; detecting illegal contents of video contents requested by a user according to target research rules, shielding the illegal contents of the video contents according to detection results, and displaying the video contents subjected to illegal content shielding to the user. By identifying the identity of the user and adopting the research rule corresponding to the identity of the user to detect and shield the illegal content of the video content, the health of the video content displayed to the user is ensured as much as possible, and the influence and even the damage of the illegal content in the video content to the body and mind of the user are avoided.

Description

Video content display method, device, electronic equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of communication, in particular to a video content display method, a device, electronic equipment and a storage medium.
Background
The data transmission rate is greatly improved in the 5G era, the data transmission delay is further reduced, and communication interaction of various different devices can be flexibly supported. For example, in addition to cell phones and tablet computers, 5G networks may also support access to wearable devices. The 5G network will improve the end-to-end experience and performance, and the requirements of people on audio and video communication are higher, on one hand, because the access terminals are wider and wider, including mobile phones, flat panel, televisions, wearable devices, etc., and even the Reality enhancing devices (Augmented Reality, AR), the virtual Reality devices (Augmented Reality, VR) and the Mixed Reality devices (MR) are gradually accessed in; on the other hand, because the application scene of the video conference is also wider and wider, the added members are gradually expanded from a single crowd to the crowd of all ages. The video conference application scenario is not just a multiparty video conference, but also includes: video content sharing scenes of multiparty participation such as a video live conference, a remote education interaction video conference, a remote medical interaction video conference and an XR video conference.
In the existing video conference application system, the current video content is shared for the user accessed through the terminal equipment directly after the terminal is accessed. When a user accessed by using the terminal equipment is a child, a teenager, an old person or the like, after the user is added into an application scene of the video conference, the user can be influenced by unhealthy contents in the application scene of the video conference, and even the user can be seriously injured.
Disclosure of Invention
The main purpose of the embodiments of the present application is to provide a video content display method, apparatus, electronic device, and storage medium, which aim to prevent users from being injured due to unhealthy video content received in a video conference scene by detecting and shielding illegal content of the video content.
In order to achieve the above object, an embodiment of the present application provides a video content display method, including: receiving a video content acquisition request of a user, and acquiring the identity of the user; acquiring a target judging rule corresponding to the identity of the user according to the identity of the user and a preset corresponding relation between the user identity and the judging rule; and detecting illegal contents of the video contents requested by the user according to the target research rule, shielding the illegal contents of the video contents according to the detection result, and displaying the video contents subjected to the illegal contents shielding to the user.
To achieve the above object, an embodiment of the present application further provides a video content display apparatus, including: the receiving module is used for receiving a video content acquisition request of a user and acquiring the identity of the user; the acquisition module is used for acquiring a target judging rule corresponding to the identity of the user according to the identity of the user and the preset corresponding relation between the user identity and the judging rule; and the processing module is used for detecting the illegal content of the video content requested by the user according to the target research rule, shielding the illegal content of the video content according to the detection result, and displaying the video content subjected to the illegal content shielding to the user.
To achieve the above object, an embodiment of the present application further provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the video content presentation method as described above.
To achieve the above object, the embodiments of the present application further provide a computer-readable storage medium storing a computer program that, when executed by a processor, implements the video content presentation method as described above.
According to the video content display method, when the video conference application system receives the video content acquisition request of the user, the identity of the user requesting to acquire the video content is identified, and the identity of the user is acquired. And then acquiring a target judging rule corresponding to the acquired identity of the user, detecting and shielding illegal contents of the video contents according to the target judging rule, and displaying the video contents subjected to illegal content shielding to the user. When a video content acquisition request of a user is received, the identity of the user is identified, and proper research and judgment rules are selected according to the identity of the user to carry out violation detection and treatment on the video content requested by the user, so that the video content in a video conference scene is subjected to intelligent research, judgment and health treatment before being displayed, the video content watched by the user is ensured to be positive upwards as much as possible, the influence and even damage of unhealthy content in the video content to the mind and the body of the user are avoided, and the physical and psychological health and the user experience of the user are protected.
Drawings
One or more embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings.
FIG. 1 is a flow chart of a video content presentation method in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a videoconferencing system in an embodiment of the present application;
fig. 3 is a flowchart of a non-5G terminal accessing video conference scenario in an embodiment of the present application;
fig. 4 is a flowchart of a 5G terminal accessing a video conference scenario in an embodiment of the present application;
FIG. 5 is a flow chart of a method of offending content detection processing in an embodiment of the present application;
fig. 6 is a schematic structural view of a video content display apparatus according to another embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device in another embodiment of the present application.
Detailed Description
As known from the background art, in the video content display method in the current video conference scene, after the user accesses through the terminal device, the video content is directly displayed for the user, and unhealthy video content may cause adverse physical and psychological effects on teenagers, children, elderly people and other groups, so how to avoid the influence or even damage of the video content in the video conference scene on the physical and psychological effects and growth of the vulnerable group is an urgent technical problem.
In order to solve the above problems, an embodiment of the present application provides a video content display method, including: receiving a video content acquisition request of a user, and acquiring the identity of the user; acquiring a target judging rule corresponding to the identity of the user according to the identity of the user and a preset corresponding relation between the user identity and the judging rule; detecting illegal contents of video contents requested by a user according to target research rules, shielding the illegal contents of the video contents according to detection results, and displaying the video contents subjected to illegal content shielding to the user.
According to the video content display method, when the video conference application system receives the video content acquisition request of the user, the identity of the user requesting to acquire the video content is identified, and the identity of the user is acquired. And then acquiring a target judging rule corresponding to the acquired identity of the user, detecting and shielding illegal contents of the video contents according to the target judging rule, and displaying the video contents subjected to illegal content shielding to the user. When a video content acquisition request of a user is received, the identity of the user is identified, and proper research and judgment rules are selected according to the identity of the user to carry out violation detection and treatment on the video content requested by the user, so that the video content in a video conference scene is subjected to intelligent research, judgment and health treatment before being displayed, the video content watched by the user is ensured to be positive upwards as much as possible, the influence and even damage of unhealthy content in the video content to the mind and the body of the user are avoided, and the physical and psychological health and the user experience of the user are protected.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, as will be appreciated by those of ordinary skill in the art, in the various embodiments of the present application, numerous technical details have been set forth in order to provide a better understanding of the present application. However, the technical solutions claimed in the present application can be implemented without these technical details and with various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not be construed as limiting the specific implementation of the present application, and the embodiments may be mutually combined and referred to without contradiction.
Implementation details of the video content display method described in the present application will be specifically described below in connection with specific embodiments, and the following description is provided only for convenience of understanding, and is not necessary to implement the present embodiment.
In a first aspect of the present embodiment, referring to fig. 1, a specific flow of the video content display method may be referred to in fig. 1, in some embodiments, the video content display method is applied to a terminal deployed in a video conference system, where the terminal may be any electronic device having communication and processing functions, such as a mobile phone, a computer, a server, etc., and the embodiment is illustrated by using an application in the server, where the video content display method at least includes but is not limited to the following steps:
step 101, receiving a video content acquisition request of a user, and acquiring the identity of the user.
Specifically, after receiving a request of accessing a current video conference scene from a user and obtaining a request of video content, the server prompts the user to input authentication information, and identifies the identity of the user according to the authentication information input by the user. Wherein the identity of the user may include: age and gender, etc.
In one example, before acquiring the identity of the user, the server further includes: acquiring the terminal type of a user; acquiring a target identification method according to the type of the terminal; acquiring the identity of the user, including: and acquiring the identity of the user according to the target identification method. In particular, a schematic structural diagram of a videoconference system may refer to fig. 2, including access terminals and servers used by users, and the servers may be composed of a plurality of different sub-servers, such as a videoconference server and rule server deployed in a core network center cloud, a terminal identification server deployed in an edge cloud, and a research server. After the access terminal used by the user is started, a starting message is sent to a terminal identification server, the terminal identification server is started, and then when the access terminal initiates a video content acquisition request to the video conference server, the terminal identification server identifies the terminal type of the access terminal used by the user and acquires the terminal type of the user terminal. After determining the terminal type of the user terminal, the terminal identification server requests a corresponding target identification method from the rule server according to the terminal type, sends an identity identification instruction to the user according to the target identification method fed back by the rule server, and then identifies the user identity according to the identity verification information input by the user. The corresponding user identification method is selected according to the terminal type of the user, so that the accuracy of identification is ensured, and meanwhile, the compatible terminal type of the video content display method is improved.
Further, the server obtains a target identification method according to the terminal type, including: in the case that the terminal type is a non-5G terminal, acquiring the identity of the user according to the target recognition method includes one or any combination of the following: identifying the identity of the user according to the login information of the user, identifying the identity of the user according to the voice of the user, and identifying the identity of the user according to the video image of the user; under the condition that the terminal type is a 5G terminal, acquiring the identity of the user according to the target identification method comprises the following steps: the identity of the user is identified based on the fingerprint information of the user and/or the identity of the user is identified based on the iris information of the user. Specifically, after the server obtains the terminal type of the user, the terminal identification server obtains a corresponding target identification method according to the terminal type of the user, and obtains the identity of the user according to the target identification method. The terminal identification server may include a plurality of components, for example, a terminal type identification control component, an audio identification component, a video identification component, and the like. When a user identity is acquired according to a corresponding target identification method acquired by the terminal type of the user, the terminal identification server requests an audio identification algorithm, a video identification algorithm or a configuration information identification algorithm from the rule server under the condition that the terminal type of the user is a non-5G terminal. And identifying the identity of the user according to the identification algorithm contained in the response returned by the received rule server, login information when the user logs in, a real-time audio signal or video signal which is required to be input by the user, and determining the attribution group of the user. Under the condition that the terminal type of the user is a 5G terminal, the terminal identification server requests a fingerprint identification algorithm or an iris identification algorithm from the rule server, and identifies the identity of the user according to the user fingerprint information or iris information acquired in real time according to the identification algorithm contained in the response returned by the received rule server. According to the terminal type of the user terminal, different identification methods are adopted to identify the user identity, so that on one hand, the existing terminal can be used as an access terminal, the investment of operators and consumers is protected, on the other hand, the type of the accessible terminal can be expanded, and the application universality of the video content display method is guaranteed.
It should be noted that, in the case that the terminal type of the user is a 5G terminal, the identity of the user is mainly identified through a biometric feature, which may be an iris, a fingerprint, or other biometric information capable of identifying the identity of the user, and the embodiment does not limit the biometric information specifically adopted.
It should be noted that, the non-5G terminal may include a traditional terminal and an intelligent terminal, where the traditional terminal mainly refers to a hard terminal device that is connected to a video conference scene, belongs to a special video conference device, is used more by users in industries such as a government enterprise, and is still continuously used as a special asset of the video conference; the intelligent terminal mainly refers to equipment such as an intelligent television, an intelligent box and an intelligent mobile phone, and can independently install intelligent application to be used as a video conference client to access a video conference application scene. Whereas 5G terminals mainly refer to high-end smart watches, AR, VR, MR devices, etc. This is for ease of understanding and distinction only and is not limiting of the networks that the terminal can employ. In addition, when the user identity is identified, the user identity can be identified by only one algorithm, or the user identity can be identified by combining a plurality of algorithms, and the embodiment is not limited to the method.
A flow chart of a non-5G terminal accessing a video conference scenario may refer to fig. 3, including at least but not limited to the following steps:
step 301, after the non-5G terminal is started, a start message is sent to the terminal identification server, and the terminal identification server is started.
Step 302, the terminal identification server determines a target identification method, acquires a corresponding identification rule and issues an identification instruction.
Specifically, the terminal identification server requests the rule server for identifying the rule, and synchronizes the corresponding configuration information identification rule, audio identification rule and video identification rule in the rule server into the cache according to the response of the rule server, wherein the audio identification module and the video identification module can use the latest rule for terminal user identification. And selecting a target recognition method for recognizing the identity of the user corresponding to the accessed non-5G terminal, and issuing a recognition instruction to the access terminal according to the selected recognition method.
And 303, uploading user identity information by the non-5G terminal according to the identification instruction.
Specifically, the non-5G terminal determines whether to directly identify through configuration information or identify the user's home group corresponding to the access terminal through real-time audio identification or real-time video identification according to the received identification instruction, prompts the user to input identity information, and uploads the user identity information to the terminal identification server. The community of users includes children, teenagers, elderly people, etc., and further can be classified into boys, girls, teenagers (men), teenagers (women), elderly people (men), elderly people (women), etc.
And step 304, the terminal identification server identifies the user identity according to the received user identity information and completes the access of the non-5G terminal.
Specifically, the terminal identification server includes a plurality of modules, such as an identification control module, an audio identification module, a video identification module, and the like, if the user identity is identified according to the login information when the user logs in, the non-5G terminal directly sends the login information of the user to the terminal identification server, the terminal identification server identifies the user identity according to the login information and the acquired configuration identification rule, and sends the identification result to the video conference server, and the video conference server stores the identification result in the terminal information on the server for subsequent video content identification.
If the identity of the user is identified according to the voice of the user, the non-5G terminal sends an identification request message to an identification control module of the terminal identification server, and the request message carries terminal audio channel information. The recognition control module establishes an audio recognition channel on the audio recognition module. And then the non-5G terminal sends the received user identification audio to an audio identification module through a designated audio identification channel, the audio identification module carries out audio identification through an NLP intelligent learning voiceprint technology, and the identification result is sent to an identification control module. And then the identification control module sends the identification result to the non-5G terminal and the video conference server, and the video conference server stores the identification result into terminal information on the server for subsequent video content identification.
If the user identity is identified through the user video image, the non-5G terminal sends a video identification request message to an identification control module of the terminal identification server, and the request message carries terminal video channel information. The identification control module establishes a video identification channel on the video identification module. And then the non-5G terminal sends the received user identification video to the video identification module through a designated video identification channel, the video identification module carries out video identification on the video according to video identification rules, and the identification result is sent to the identification control module. The terminal identification server sends the identification result to the non-5G terminal and the video conference server, and the video conference server stores the identification result into terminal information on the server for subsequent video content identification.
It should be noted that, when user identification is performed according to user login information, identification is performed mainly according to user identity information such as ID or identification card number input during user login; when user identification is carried out according to user voice, voiceprint features of the user are mainly collected, the voiceprint features are mainly determined by tone, and gender and age of the user can be distinguished through the voiceprint features; when the user identity is identified according to the user video image, the face can be directly identified, the age and the sex of the user can be identified by extracting the face feature code, and the identity of the user can be directly searched in the registration information base through the face image. The present embodiment does not limit the specific identification information and identification manner employed.
A flowchart of a 5G terminal accessing a video conference scenario may refer to fig. 4, including at least, but not limited to, the following steps:
and step 401,5G, after the terminal is started, sending a starting message to the terminal identification server, and starting the terminal identification server.
Step 402, the terminal identification server determines a target identification method, acquires a corresponding identification rule, and issues an identification instruction.
Specifically, the terminal identification server includes a plurality of modules, such as an identification control module, a biometric identification module, and the like, and requests an identification rule from the rule server, synchronizes the corresponding biometric identification rule and algorithm in the rule server into a cache according to the response of the rule server, and then invokes the biometric identification module to perform terminal user identification using the latest biometric identification rule. The biometric characteristic recognition rule can be iris characteristic recognition rule and normalization algorithm, fingerprint characteristic recognition rule and normalization algorithm or other biometric characteristic recognition rule and normalization algorithm.
Step 403,5G, the terminal uploads the user identity information according to the identification instruction.
Specifically, the 5G terminal determines whether the user's home group is identified through fingerprint or iris according to the received identification instruction, prompts the user to input corresponding biological characteristic information, and uploads the user identity information to the terminal identification server.
Step 404, the terminal identification server identifies the user identity according to the received user identity information, and completes the access of the 5G terminal.
Specifically, after the 5G terminal judges that the community of the user is determined through the biological recognition, a biological recognition request message is sent to a recognition control module of the terminal recognition server, and the request message carries terminal biological feature recognition channel information. The identification control module establishes a biometric identification channel on the biometric identification module. And then the 5G terminal sends the received user biological characteristic information to a biological characteristic recognition module in the terminal recognition server through a biological characteristic recognition transmission channel, and the biological characteristic recognition module processes and regularly extracts the biological characteristic code from the initial biological characteristic information through a biological characteristic recognition rule and algorithm. And then the biological characteristic code is used as a unique identification code to an application server, and the application server uses the characteristic code to search and confirm the identity of the user. And then the terminal identification server sends the identification result to the application server, the 5G terminal and the video conference server. The application server and the video conference server store the identification result in the terminal information on the server for subsequent video content identification.
It should be noted that, when the application server performs the search according to the feature code, if it is detected that the user has completed the biometric identification and the date of generation of the previous identification result meets the identification requirement, the previous biometric identification result is directly taken and used as the current identification result, so as to complete the biometric identification of the current time. If the fact that the user does not complete the biological recognition or does not match the recognition result meeting the requirements is detected, the biological feature recognition module sends biological feature recognition data to the third-party identity authentication server to conduct brand-new identity authentication. And the third party identity authentication server returns the authentication result and the personal information to the terminal identification server.
Step 102, obtaining a target judging rule corresponding to the identity of the user according to the identity of the user and the preset corresponding relation between the user identity and the judging rule.
Specifically, after the identity of the user is identified, the server firstly judges whether the video content sent to the user needs to be detected and processed according to the identity of the user, and under the condition that the video content needs to be detected and processed, the server acquires a target judging rule corresponding to the identity of the user according to a preset corresponding relation between the pre-stored user identity and the judging rule.
In one example, the server-determined target-grinding rule includes: audio and video or multidimensional grinding rules. By detecting the illegal contents in audio, video or multiple dimensions, the detection accuracy is ensured, the detection timeliness is ensured as much as possible, and the excessive delay caused by the healthful processing of the video contents is avoided.
And 103, detecting illegal contents of the video contents requested by the user according to the target research rule, shielding the illegal contents of the video contents according to the detection result, and displaying the video contents subjected to the illegal contents shielding to the user.
Specifically, after determining the target judging rule, the server detects illegal contents of the video contents requested by the user according to the target judging rule, determines whether the video contents requested by the user have contents which do not meet the target judging rule, shields the illegal contents of the video contents which do not meet the target judging rule according to the detection result, and then displays the video contents after shielding the illegal contents to the user. By healthfully processing the video content according to the target research rule, the influence and even damage of unhealthy illegal contents on the body and mind of the user are avoided, and the user experience is improved.
In one example, the server performs offence content detection on the video content according to target judgment rules, including one or any combination of the following: and detecting sensitive words of the video content, detecting illegal actions of the video content, and detecting illegal pictures of the video content. By detecting sensitive words, illegal actions and illegal pictures possibly existing in the video content according to the target research rule, illegal content is accurately identified, and the accuracy of healthful processing is ensured.
Further, the server performs illegal content shielding on the video content according to the detection result, wherein the illegal content shielding comprises one or any combination of the following steps: silencing, deleting or replacing sensitive words, coding, deleting or replacing illegal actions, and coding, deleting or replacing illegal pictures. The illegal contents are effectively processed by shielding, deleting or replacing the illegal contents and the like.
The flow of offending content detection and processing may refer to fig. 5, including at least but not limited to the following steps:
step 501, after the user terminal is accessed, starting a research server, and synchronizing the target research rule into the research server.
Specifically, after the user terminal is successfully accessed, the video conference server instructs the research and judgment server to start, then the research and judgment server initiates a research and judgment rule request to the rule server, and according to the response of the rule server, the target audio research and judgment rule, the target video rule or the target multidimensional research and judgment rule in the rule server are synchronized into the cache. The audio and video judging modules will judge the video content requested by the user using the latest rules.
Step 502 creates an audio video media communication port for detection and processing of video content offending content.
Specifically, the research server comprises a research control module, a video research module and an audio research module, and when the violation detection and the processing are carried out on the video content, the research server sends the audio and video media first communication ports distributed by the audio research module and the video research module to the user terminal after completing the resource distribution of the audio research module and the video research module. The user terminal carries the audio frequency research judgment module of the research judgment server and the audio and video frequency media communication port information distributed by the video frequency research judgment module, and initiates a joining request to the video conference server. After the negotiation is completed, the video conference server returns the information of the second communication port of the audio and video media distributed by the video conference server to the user terminal. The access terminal sends an audio and video research and judgment request message to a research and judgment control module of the research and judgment server, wherein the request message carries terminal audio and video channel information and audio and video media second communication port information of the server side returned by the video conference server, so that the research and judgment server can conveniently establish the audio and video media communication flow of the whole flow.
In step 503, the research server obtains the video content through the audio and video media communication port, and performs illegal content detection and processing on the video content.
Specifically, the audio studying and judging server establishes an audio studying and judging channel on the audio studying and judging module, receives the audio media data sent by the access terminal through the designated audio studying and judging channel, and the audio studying and judging module carries out audio studying and judging (for example, sensitive word detection) through NLP intelligent learning and voiceprint technology and processes the audio media according to the detection result. The audio media processing may be recording, alerting, disabling transmission, etc. The research and judgment server establishes a video research and judgment channel on the video research and judgment module. The method comprises the steps of receiving video media data sent by an access terminal through a designated video research and judgment channel, wherein a video research and judgment module carries out video research and judgment on video media according to video research and judgment rules, mainly detects illegal pictures and illegal actions in the video, and processes the video media according to detection results. Video media processing may be occlusion, deletion, replacement, etc.
That is, the research server establishes an audio communication channel with the video conference server according to the audio communication port information returned by the video conference server. On one hand, the audio media processed by the audio studying and judging rule is sent to a video conference server through an audio communication channel established by the server, and the video conference server carries out the next processing; on the other hand, audio frequency media descending from the video conference server are subjected to audio frequency research and judgment through NLP intelligent learning voice print technology according to audio frequency research and judgment rules, and the judged descending audio frequency media are sent to the access terminal for display. And the research and judgment server establishes a video communication channel with the video conference server according to the video communication port information returned by the video conference server. On one hand, the multidimensional video media processed by the multidimensional video research rule is sent to a video conference server through a video communication channel established by the server, and the video conference server carries out the next processing; on the other hand, video conference server downstream video media, according to the multidimensional video research rule, video research and judge video media, mainly video research and judge video in the picture and action in the video, and send downstream multidimensional video media after research and judge to the access terminal for display.
It should be noted that the video media may be two-dimensional video media or multi-dimensional video media, where multi-dimensional video mainly refers to 3D video media and video media transmitted at more latitudes. The normal video media are 2-dimensional video media, and multi-dimensional research and judgment are mainly carried out by adopting joint detection, multi-dimensional identification and multi-dimensional reconstruction technology aiming at multi-dimensional video.
In another example, after presenting the offending content masked video content to the user, the server further includes: periodically acquiring the identity of a user, and determining a target judging rule according to the currently acquired identity of the user; and under the condition that the target judging rule is changed, detecting illegal contents of the video contents according to the changed target judging rule. After the video content is displayed to the user, the server periodically re-identifies the identity of the user according to the preset interval duration, re-determines the target research rule according to the currently acquired identity of the user, and then carries out consistency detection on the target research rule determined according to the currently acquired identity of the user and the target research rule acquired before. And under the condition that the target judging rule is detected to be inconsistent, the target judging rule redetermined according to the currently acquired identity of the user is used as the judging rule used in the video content violation detection process, and the video content which is subsequently displayed to the user is subjected to violation content detection according to the changed target judging rule. Through periodically carrying out user identity verification and updating target research and judgment rules, the problem that video content processing or missing processing occurs after a user is replaced in the terminal use process is avoided, and the effectiveness and the practicability of the video content display method are further improved.
In another example, the server also dynamically updates the criterion rule in the preset correspondence according to the content type of the video content. Specifically, after detecting and processing illegal content of video content, the server generates a corresponding research rule hot patch based on the newly added video content through deep learning or a preset neural network model after detecting that the content type of the video content is updated in the video conference scene, dynamically maintains the existing research rule through the generated research rule hot patch, and updates the preset corresponding relation between the research rule and the terminal. And generating a hot patch of the judging rule according to the video content, and dynamically maintaining the judging rule in a hot patch mode to ensure the instantaneity and the correctness of the judging rule.
In addition, the detection of the illegal content on the video content can be carried out through a research and judgment server deployed at the cloud end, or can be directly carried out through a research and judgment module deployed on the intelligent terminal according to the acquired target research and judgment rule, and the deployment at the cloud end can determine that the traditional access terminal can also realize the health of the video content, so as to optimize the global processing resource; the method can be deployed on the intelligent terminal to ensure the purity of the uplink code stream and the downlink code stream more effectively, and the architecture and the deployment mode of the video conference system can be adjusted according to the needs in practical application, so that the specific deployment is not limited in the embodiment.
Moreover, it should be understood that the above steps of the various methods are divided, for clarity of description, and may be combined into one step or split into multiple steps when implemented, so long as they include the same logic relationship, and all the steps are within the scope of protection of the present patent; it is within the scope of this patent to add insignificant modifications to the algorithm or flow or introduce insignificant designs, but not to alter the core design of its algorithm and flow.
Another aspect of the embodiments of the present application further provides a video content display apparatus, referring to fig. 6, including:
the receiving module 601 is configured to receive a video content acquisition request of a user, and acquire an identity of the user.
The obtaining module 602 is configured to obtain a target criterion rule corresponding to the identity of the user according to the identity of the user and a preset correspondence between the user identity and the criterion rule; the judging rule is used for detecting whether illegal contents exist in the video contents.
And the processing module 603 is configured to detect the offensive content of the video content requested by the user according to the target research rule, mask the offensive content of the video content according to the detection result, and display the offensive content masked video content to the user.
It is to be noted that this embodiment is an apparatus embodiment corresponding to the method embodiment, and this embodiment may be implemented in cooperation with the method embodiment. The related technical details mentioned in the method embodiment are still valid in this embodiment, and in order to reduce repetition, they are not described here again. Accordingly, the related technical details mentioned in the present embodiment may also be applied in the method embodiment.
It should be noted that, each module involved in this embodiment is a logic module, and in practical application, one logic unit may be one physical unit, or may be a part of one physical unit, or may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present invention, units less closely related to solving the technical problem presented by the present invention are not introduced in the present embodiment, but it does not indicate that other units are not present in the present embodiment.
Another aspect of the embodiments of the present application further provides an electronic device, referring to fig. 7, including: comprising at least one processor 701; and a memory 702 communicatively coupled to the at least one processor 701; the memory 702 stores instructions executable by the at least one processor 701, and the instructions are executed by the at least one processor 701 to enable the at least one processor 701 to perform the video content presentation method described in any one of the method embodiments above.
Where memory 702 and processor 701 are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting the various circuits of the one or more processors 701 and memory 702 together. The bus may also connect various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or may be a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 701 is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor 701.
The processor 701 is responsible for managing the bus and general processing and may provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And memory 702 may be used to store data used by processor 701 in performing operations.
Embodiments of the present invention also provide a computer-readable storage medium storing a computer program. The computer program implements the above-described method embodiments when executed by a processor.
That is, it will be understood by those skilled in the art that all or part of the steps in implementing the methods of the embodiments described above may be implemented by a program stored in a storage medium, where the program includes several instructions for causing a device (which may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps in the methods of the embodiments described herein. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific embodiments in which the present application is implemented and that various changes in form and details may be made therein without departing from the spirit and scope of the present application.

Claims (11)

1. A method of video content presentation, comprising:
receiving a video content acquisition request of a user, and acquiring the identity of the user;
acquiring a target judging rule corresponding to the identity of the user according to the identity of the user and a preset corresponding relation between the user identity and the judging rule;
and detecting illegal contents of the video contents requested by the user according to the target research rule, shielding the illegal contents of the video contents according to the detection result, and displaying the video contents subjected to the illegal contents shielding to the user.
2. The video content presentation method of claim 1, further comprising, prior to said obtaining the identity of the user:
acquiring the terminal type of the user;
acquiring a target identification method according to the terminal type;
the obtaining the identity of the user comprises the following steps:
and acquiring the identity of the user according to the target identification method.
3. The video content presentation method according to claim 2, wherein the acquiring the target recognition method according to the terminal type includes:
in the case that the terminal type is a non-5G terminal, the acquiring the identity of the user according to the target recognition method includes one or any combination of the following:
identifying the identity of the user according to the login information of the user, identifying the identity of the user according to the voice of the user, and identifying the identity of the user according to the video image of the user;
in the case that the terminal type is a 5G terminal, the obtaining the identity of the user according to the target recognition method includes: and identifying the identity of the user according to the fingerprint information of the user and/or identifying the identity of the user according to the iris information of the user.
4. The video content presentation method of claim 1, wherein the target research rule comprises: audio and video or multidimensional grinding rules.
5. The method for displaying video content according to claim 4, wherein the detecting the offending content of the video content according to the target criterion includes one or any combination of:
and detecting sensitive words of the video content, detecting illegal actions of the video content, and detecting illegal pictures of the video content.
6. The method for displaying video content according to claim 5, wherein said masking of said video content against illegal contents according to the detection result comprises one or any combination of the following:
and silencing, deleting or replacing the sensitive words, coding, deleting or replacing the illegal actions, and coding, deleting or replacing the illegal pictures.
7. The video content presentation method of claim 1, further comprising, after the presenting of the video content to the user after the offending content masking:
periodically acquiring the identity of the user, and determining the target research rule according to the currently acquired identity of the user;
and under the condition that the target judging rule is changed, detecting illegal contents of the video contents according to the changed target judging rule.
8. The video content presentation method according to any one of claims 1 to 7, further comprising: and dynamically updating the research rule in the preset corresponding relation according to the content type of the video content.
9. A video content presentation device, comprising:
the receiving module is used for receiving a video content acquisition request of a user and acquiring the identity of the user;
the acquisition module is used for acquiring a target judging rule corresponding to the identity of the user according to the identity of the user and the preset corresponding relation between the user identity and the judging rule;
and the processing module is used for detecting the illegal content of the video content requested by the user according to the target research rule, shielding the illegal content of the video content according to the detection result, and displaying the video content subjected to the illegal content shielding to the user.
10. An electronic device, comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the video content presentation method of any one of claims 1 to 8.
11. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the video content presentation method of any one of claims 1 to 8.
CN202111619546.1A 2021-12-27 2021-12-27 Video content display method, device, electronic equipment and storage medium Pending CN116405629A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111619546.1A CN116405629A (en) 2021-12-27 2021-12-27 Video content display method, device, electronic equipment and storage medium
PCT/CN2022/137028 WO2023124840A1 (en) 2021-12-27 2022-12-06 Video content display method and apparatus, and electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111619546.1A CN116405629A (en) 2021-12-27 2021-12-27 Video content display method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116405629A true CN116405629A (en) 2023-07-07

Family

ID=86997623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111619546.1A Pending CN116405629A (en) 2021-12-27 2021-12-27 Video content display method, device, electronic equipment and storage medium

Country Status (2)

Country Link
CN (1) CN116405629A (en)
WO (1) WO2023124840A1 (en)

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939487A (en) * 2016-06-06 2016-09-14 乐视控股(北京)有限公司 Video processing method and device
CN109800868B (en) * 2018-12-25 2022-12-16 瑞芯微电子股份有限公司 Data coding chip and method based on deep learning
CN111432274A (en) * 2019-01-10 2020-07-17 百度在线网络技术(北京)有限公司 Video processing method and device
CN110852231A (en) * 2019-11-04 2020-02-28 云目未来科技(北京)有限公司 Illegal video detection method and device and storage medium
CN114303352B (en) * 2019-11-05 2024-06-04 深圳市欢太科技有限公司 Push content processing method and device, electronic equipment and storage medium
CN111209440B (en) * 2020-01-13 2023-04-14 深圳市雅阅科技有限公司 Video playing method, device and storage medium
CN111416997B (en) * 2020-03-31 2022-11-08 百度在线网络技术(北京)有限公司 Video playing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
WO2023124840A1 (en) 2023-07-06

Similar Documents

Publication Publication Date Title
KR101859433B1 (en) Method for processing of mosaic image and apparatus thereof
CN108897996B (en) Identification information association method and device, electronic equipment and storage medium
US9000927B2 (en) System and method for monitoring biometric data
US11636710B2 (en) Methods and apparatus for reducing false positives in facial recognition
US11341351B2 (en) Methods and apparatus for facial recognition on a user device
JP2024504092A (en) Mirroring methods, devices, electronic equipment and storage media
US11503110B2 (en) Method for presenting schedule reminder information, terminal device, and cloud server
WO2017166472A1 (en) Advertisement data matching method, device, and system
CN112528266A (en) Visiting registration method and related device
KR20130001512A (en) Method and system for providing information associated with image
CN112418863B (en) Client, cloud server, and identity recognition method, system and computer storage medium thereof
WO2023124448A1 (en) Object recognition method and system, storage medium, and program
CN103905430A (en) Real-name authentication method and system
CN104579665B (en) Method for authenticating and device
CN108989736A (en) multimedia resource encryption method, device, system, storage medium and processor
US20140041054A1 (en) Attestation of possession of media content items using fingerprints
CN112261347A (en) Method and device for adjusting participation right, storage medium and electronic device
CN116405629A (en) Video content display method, device, electronic equipment and storage medium
CN110602405A (en) Shooting method and device
CN114466215B (en) Data processing method and device
CN110673737A (en) Display content adjusting method and device based on smart home operating system
CN113362243B (en) Model training method, image processing method and device, medium and electronic equipment
CN109164986A (en) Cloud disk data processing method, device, electronic equipment and storage medium
CN114171172A (en) System and method for matching and distributing medical information
CN110177332B (en) Data transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication