WO2018023710A1 - Secure playing method and system for video - Google Patents
Secure playing method and system for video Download PDFInfo
- Publication number
- WO2018023710A1 WO2018023710A1 PCT/CN2016/093552 CN2016093552W WO2018023710A1 WO 2018023710 A1 WO2018023710 A1 WO 2018023710A1 CN 2016093552 W CN2016093552 W CN 2016093552W WO 2018023710 A1 WO2018023710 A1 WO 2018023710A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- video
- viewing video
- analysis result
- present
- malicious
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/24—Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/81—Monomedia components thereof
Definitions
- the present invention relates to the field of television broadcasting, and in particular, to a video security playing method and system.
- TV is a commonly used device in people's daily life. With the development of TV, TV is also considered as a service for broadcasting and television group (such as TV station). The TV has evolved from the initial wireless TV to cable TV and the current network. TV, the way of playing is also divided into TV broadcasting and TV multicast. For TV, more is still TV broadcasting. As the main TV broadcasting provider in Shenzhen, it can provide users with high-quality multi-set TV programs.
- a video security playback method is provided, which solves the shortcomings of the prior art with low security.
- Whether the viewing video is a malicious video is determined according to the analysis result.
- the method further includes:
- a video security playback system comprising:
- An obtaining unit configured to acquire a viewing video opened by a user
- An analyzing unit configured to input the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result
- the determining unit is configured to determine, according to the analysis result, whether the viewing video is a malicious video.
- system further includes:
- system further includes:
- a recording unit for recording information of the viewing video.
- FIG. 2 is a structural diagram of a video security playback system provided by the present invention.
- Step S101 Obtain a viewing video opened by a user
- Step S103 Determine, according to the analysis result, whether the viewing video is a malicious video.
- the technical solution provided by the specific embodiment of the present invention acquires the viewing video opened by the user, inputs the identifier of the viewing video into the trained support vector machine, analyzes the analysis result, and determines whether the viewing video is a malicious video according to the analysis result. Therefore, it has the advantage of high security.
- the foregoing method may further include:
- FIG. 2 is a video security playback system according to a second preferred embodiment of the present invention:
- the obtaining unit 201 is configured to acquire a viewing video opened by the user;
- the analyzing unit 202 is configured to input the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;
- the determining unit 203 is configured to determine, according to the analysis result, whether the viewing video is a malicious video.
- the technical solution provided by the specific embodiment of the present invention acquires the viewing video opened by the user, inputs the identifier of the viewing video into the trained support vector machine, analyzes the analysis result, and determines whether the viewing video is a malicious video according to the analysis result. Therefore, it has the advantage of high security.
- the above system may further include:
- the alarm unit 204 is configured to send an alarm message to the client, such as a malicious video.
- the above system may further include:
- the recording unit 205 is configured to record the information of the viewing video.
- Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of computer video from one location to another.
- a storage medium may be any available media that can be accessed by a computer.
- the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired video code in the form of an instruction or data structure and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
- a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
Abstract
The present invention provides a secure playing method and system for a video. The method comprises the following steps: acquiring a video opened and viewed by a user; inputting an identifier of the viewed video into a trained support vector machine for analysis so as to obtain an analysis result; and determining, according to the analysis result, whether the viewed video is a malicious video. The technical solution provided in the present invention has the advantage of high security.
Description
本发明涉及电视广播领域,尤其涉及一种视频安全播放方法及系统。The present invention relates to the field of television broadcasting, and in particular, to a video security playing method and system.
电视,是人们日常生活中常用的设备,随着慢慢的发展,电视也被认为是广电集团(例如电视台)提供服务的一种称呼,电视从最初的无线电视发展到有线电视以及现在的网络电视,播放方式也分电视广播以及电视组播,对于电视来说,更多的还是电视广播。作为深圳地区主要的电视广播提供商,其能够为用户提供优质多套电视节目。Television is a commonly used device in people's daily life. With the development of TV, TV is also considered as a service for broadcasting and television group (such as TV station). The TV has evolved from the initial wireless TV to cable TV and the current network. TV, the way of playing is also divided into TV broadcasting and TV multicast. For TV, more is still TV broadcasting. As the main TV broadcasting provider in Shenzhen, it can provide users with high-quality multi-set TV programs.
但是现有的电视广播中无法实现观看视频的监控,安全性低。However, the monitoring of watching video cannot be realized in the existing television broadcasting, and the security is low.
提供一种视频安全播放方法,其解决了现有技术安全性低的缺点。A video security playback method is provided, which solves the shortcomings of the prior art with low security.
一方面,提供一种视频安全播放方法,所述方法包括如下步骤:In one aspect, a video security playback method is provided, the method comprising the following steps:
获取用户打开的观看视频;Obtain a viewing video opened by the user;
将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果;Inputting the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;
依据该分析结果确定该观看视频是否为恶意视频。Whether the viewing video is a malicious video is determined according to the analysis result.
可选的,所述方法还包括:Optionally, the method further includes:
如为恶意视频,向客户端下发告警消息。If it is a malicious video, send an alarm message to the client.
可选的,所述方法还包括:Optionally, the method further includes:
将该观看视频的信息记录。Record the information of the viewing video.
第二方面,提供一种视频安全播放系统,所述系统包括:In a second aspect, a video security playback system is provided, the system comprising:
获取单元,用于获取用户打开的观看视频;An obtaining unit, configured to acquire a viewing video opened by a user;
分析单元,用于将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果;An analyzing unit, configured to input the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;
判断单元,用于依据该分析结果确定该观看视频是否为恶意视频。The determining unit is configured to determine, according to the analysis result, whether the viewing video is a malicious video.
可选的,所述系统还包括:Optionally, the system further includes:
告警单元,用于如为恶意视频,向客户端下发告警消息。The alarm unit is configured to send an alarm message to the client as a malicious video.
可选的,所述系统还包括:Optionally, the system further includes:
记录单元,用于将该观看视频的信息记录。a recording unit for recording information of the viewing video.
本发明具体实施方式提供的技术方案获取用户打开的观看视频,将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果,依据该分析结果确定该观看视频是否为恶意视频,所以其具有安全性高的优点。The technical solution provided by the specific embodiment of the present invention acquires the viewing video opened by the user, inputs the identifier of the viewing video into the trained support vector machine, analyzes the analysis result, and determines whether the viewing video is a malicious video according to the analysis result. Therefore, it has the advantage of high security.
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明提供的一种视频安全播放方法的流程图;1 is a flowchart of a video security playing method provided by the present invention;
图2为本发明提供的一种视频安全播放系统的结构图。2 is a structural diagram of a video security playback system provided by the present invention.
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参阅图1,图1为本发明第一较佳实施方式提供的一种视频安全播放方法的流程图,该方法由服务器来完成,该方法如图1所示,包括如下步骤:Referring to FIG. 1 , FIG. 1 is a flowchart of a video security playing method according to a first preferred embodiment of the present invention. The method is implemented by a server. The method is as shown in FIG. 1 and includes the following steps:
步骤S101、获取用户打开的观看视频;Step S101: Obtain a viewing video opened by a user;
步骤S102、将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果;Step S102: input the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;
步骤S103、依据该分析结果确定该观看视频是否为恶意视频。Step S103: Determine, according to the analysis result, whether the viewing video is a malicious video.
本发明具体实施方式提供的技术方案获取用户打开的观看视频,将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果,依据该分析结果确定该观看视频是否为恶意视频,所以其具有安全性高的优点。The technical solution provided by the specific embodiment of the present invention acquires the viewing video opened by the user, inputs the identifier of the viewing video into the trained support vector machine, analyzes the analysis result, and determines whether the viewing video is a malicious video according to the analysis result. Therefore, it has the advantage of high security.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
如为恶意视频,向客户端下发告警消息。If it is a malicious video, send an alarm message to the client.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
将该观看视频的信息记录。Record the information of the viewing video.
参阅图2,图2为本发明第二较佳实施方式提供的一种视频安全播放系统:Referring to FIG. 2, FIG. 2 is a video security playback system according to a second preferred embodiment of the present invention:
获取单元201,用于获取用户打开的观看视频;The obtaining unit 201 is configured to acquire a viewing video opened by the user;
分析单元202 ,用于将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果;The analyzing unit 202 is configured to input the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;
判断单元203,用于依据该分析结果确定该观看视频是否为恶意视频。The determining unit 203 is configured to determine, according to the analysis result, whether the viewing video is a malicious video.
本发明具体实施方式提供的技术方案获取用户打开的观看视频,将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果,依据该分析结果确定该观看视频是否为恶意视频,所以其具有安全性高的优点。The technical solution provided by the specific embodiment of the present invention acquires the viewing video opened by the user, inputs the identifier of the viewing video into the trained support vector machine, analyzes the analysis result, and determines whether the viewing video is a malicious video according to the analysis result. Therefore, it has the advantage of high security.
可选的,上述系统还可以包括:Optionally, the above system may further include:
告警单元204,用于如为恶意视频,向客户端下发告警消息。The alarm unit 204 is configured to send an alarm message to the client, such as a malicious video.
可选的,上述系统还可以包括:Optionally, the above system may further include:
记录单元205,用于将该观看视频的信息记录。The recording unit 205 is configured to record the information of the viewing video.
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments or embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not subject to the described action sequence. Limitations, as certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments or examples described in the specification are preferred embodiments, and the actions and units involved are not necessarily required by the present invention.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present invention may be sequentially adjusted, merged, and deleted according to actual needs.
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。The units in the apparatus of the embodiment of the present invention may be combined, divided, and deleted according to actual needs. Those skilled in the art can combine or combine the different embodiments described in the specification and the features of the different embodiments.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机视频的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random
Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically
Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only
Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的视频代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital
Subscriber
Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。Through the description of the above embodiments, those skilled in the art can clearly understand that the present invention can be implemented in hardware, firmware implementation, or a combination thereof. When implemented in software, the functions described above may be stored in or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of computer video from one location to another. A storage medium may be any available media that can be accessed by a computer. Taking this as an example, but not limited to: the computer readable medium may include random access memory (Random)
Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically
Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only
Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired video code in the form of an instruction or data structure and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium. For example, if the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital
Subscriber
Line, DSL) or wireless technology such as infrared, radio and microwave transmission from a website, server or other remote source, then coaxial cable, fiber optic cable, twisted pair, DSL or such as infrared, wireless and microwave Wireless technology is included in the fixing of the associated medium. As used in the present invention, a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
In summary, the above description is only a preferred embodiment of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.
Claims (6)
- 一种视频安全播放方法,其特征在于,所述方法包括如下步骤: A video security playing method, characterized in that the method comprises the following steps:获取用户打开的观看视频;Obtain a viewing video opened by the user;将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果;Inputting the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;依据该分析结果确定该观看视频是否为恶意视频。Whether the viewing video is a malicious video is determined according to the analysis result.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:如为恶意视频,向客户端下发告警消息。If it is a malicious video, send an alarm message to the client.
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:将该观看视频的信息记录。Record the information of the viewing video.
- 一种视频安全播放系统,其特征在于,所述系统包括:A video security playback system, characterized in that the system comprises:获取单元,用于获取用户打开的观看视频;An obtaining unit, configured to acquire a viewing video opened by a user;分析单元,用于将该观看视频的标识输入到训练好的支持向量机中进行分析得到分析结果;An analyzing unit, configured to input the identifier of the viewing video into the trained support vector machine for analysis to obtain an analysis result;判断单元,用于依据该分析结果确定该观看视频是否为恶意视频。The determining unit is configured to determine, according to the analysis result, whether the viewing video is a malicious video.
- 根据权利要求4所述的系统,其特征在于,所述系统还包括:The system of claim 4, wherein the system further comprises:告警单元,用于如为恶意视频,向客户端下发告警消息。The alarm unit is configured to send an alarm message to the client as a malicious video.
- 根据权利要求4所述的系统,其特征在于,所述系统还包括:The system of claim 4, wherein the system further comprises:记录单元,用于将该观看视频的信息记录。 a recording unit for recording information of the viewing video.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/093552 WO2018023710A1 (en) | 2016-08-05 | 2016-08-05 | Secure playing method and system for video |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/093552 WO2018023710A1 (en) | 2016-08-05 | 2016-08-05 | Secure playing method and system for video |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018023710A1 true WO2018023710A1 (en) | 2018-02-08 |
Family
ID=61072777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/093552 WO2018023710A1 (en) | 2016-08-05 | 2016-08-05 | Secure playing method and system for video |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2018023710A1 (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834982A (en) * | 2010-05-28 | 2010-09-15 | 上海交通大学 | Hierarchical screening method of violent videos based on multiplex mode |
CN102509084A (en) * | 2011-11-18 | 2012-06-20 | 中国科学院自动化研究所 | Multi-examples-learning-based method for identifying horror video scene |
CN102902981A (en) * | 2012-09-13 | 2013-01-30 | 中国科学院自动化研究所 | Violent video detection method based on slow characteristic analysis |
CN103093180A (en) * | 2011-10-28 | 2013-05-08 | 阿里巴巴集团控股有限公司 | Method and system for detecting pornography images |
CN103218608A (en) * | 2013-04-19 | 2013-07-24 | 中国科学院自动化研究所 | Network violent video identification method |
CN103544498A (en) * | 2013-09-25 | 2014-01-29 | 华中科技大学 | Video content detection method and video content detection system based on self-adaption sampling |
CN105574489A (en) * | 2015-12-07 | 2016-05-11 | 上海交通大学 | Layered stack based violent group behavior detection method |
CN106210784A (en) * | 2016-08-05 | 2016-12-07 | 黄新勇 | Video security player method and system |
-
2016
- 2016-08-05 WO PCT/CN2016/093552 patent/WO2018023710A1/en active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101834982A (en) * | 2010-05-28 | 2010-09-15 | 上海交通大学 | Hierarchical screening method of violent videos based on multiplex mode |
CN103093180A (en) * | 2011-10-28 | 2013-05-08 | 阿里巴巴集团控股有限公司 | Method and system for detecting pornography images |
CN102509084A (en) * | 2011-11-18 | 2012-06-20 | 中国科学院自动化研究所 | Multi-examples-learning-based method for identifying horror video scene |
CN102902981A (en) * | 2012-09-13 | 2013-01-30 | 中国科学院自动化研究所 | Violent video detection method based on slow characteristic analysis |
CN103218608A (en) * | 2013-04-19 | 2013-07-24 | 中国科学院自动化研究所 | Network violent video identification method |
CN103544498A (en) * | 2013-09-25 | 2014-01-29 | 华中科技大学 | Video content detection method and video content detection system based on self-adaption sampling |
CN105574489A (en) * | 2015-12-07 | 2016-05-11 | 上海交通大学 | Layered stack based violent group behavior detection method |
CN106210784A (en) * | 2016-08-05 | 2016-12-07 | 黄新勇 | Video security player method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018023710A1 (en) | Secure playing method and system for video | |
WO2018023708A1 (en) | Method and system for monitoring program in broadcast system | |
WO2018023711A1 (en) | Real-time monitoring method and system in audio broadcasting network | |
WO2018023709A1 (en) | Method and system for monitoring and prompting energy consumption in broadcast network | |
WO2018023704A1 (en) | Quick payment method and system in form of membership | |
WO2018018387A1 (en) | Icon highlighting method and system based on television broadcasting | |
WO2018018591A1 (en) | Specific method and system for recommending video advertisement | |
WO2018018588A1 (en) | Shielding strategy method and system for video advertisement | |
WO2018027557A1 (en) | Wifi attendance record method and system in security | |
WO2018023342A1 (en) | Method and system for counting number of viewing times in video advertisement | |
WO2018023542A1 (en) | Method and system for acquiring subtitles during television broadcast | |
WO2018018457A1 (en) | Method and system for distinguishing watching types in television broadcasting | |
WO2018023706A1 (en) | Payment method and system for single video in broadcast television | |
WO2018023539A1 (en) | Method and system for rapidly downloading video in broadcast | |
WO2018023541A1 (en) | Image downloading method and system for television broadcast | |
WO2018023534A1 (en) | Video capturing method and system for television broadcast | |
WO2018023535A1 (en) | Method and system for acquiring video in television broadcast | |
WO2018023707A1 (en) | Application method and system for channel payment in broadcast television | |
WO2018023703A1 (en) | Vip-based payment method and system for broadcast television | |
WO2018023538A1 (en) | Method and system for extracting television broadcast subtitle | |
WO2018023540A1 (en) | Method and system for proximately downloading audio | |
WO2018018384A1 (en) | Interface displaying method and system in television broadcast | |
WO2018023537A1 (en) | Method and system for acquiring director's name during television broadcast | |
WO2018023536A1 (en) | Method and system for extracting image | |
WO2018018455A1 (en) | Statistical method and system for watched content of user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16911305 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16911305 Country of ref document: EP Kind code of ref document: A1 |