WO2018072375A1 - 用户变身控制方法及系统 - Google Patents

用户变身控制方法及系统 Download PDF

Info

Publication number
WO2018072375A1
WO2018072375A1 PCT/CN2017/075729 CN2017075729W WO2018072375A1 WO 2018072375 A1 WO2018072375 A1 WO 2018072375A1 CN 2017075729 W CN2017075729 W CN 2017075729W WO 2018072375 A1 WO2018072375 A1 WO 2018072375A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
morphing
information
function
transformation
Prior art date
Application number
PCT/CN2017/075729
Other languages
English (en)
French (fr)
Inventor
姚金明
Original Assignee
武汉斗鱼网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 武汉斗鱼网络科技有限公司 filed Critical 武汉斗鱼网络科技有限公司
Publication of WO2018072375A1 publication Critical patent/WO2018072375A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Definitions

  • the present invention relates to the field of Internet technologies, and in particular, to a user morphing control method and system.
  • Users can perform certain permissions on the website, such as watching videos, downloading files, posting comments, and more. However, for some reasons, the operation rights of some users may be restricted, for example, the user is banned, etc. In this case, the user's online experience may be affected, which is not conducive to the maintenance of the website for the user. In this regard, the user can additionally register a user to operate, however, this method not only wastes the registration resources, but also the user operation is cumbersome.
  • the present invention has been made in order to provide a user morphing control method and system that overcomes the above problems or at least partially solves the above problems.
  • a user morphing control method includes: knowing an event that a user's operation authority is restricted; reading user information of the user, and determining, according to the user information, whether the user has been activated or not If the user has activated the morphing function, the avatar user is generated for the user, and the morphing operation authority is assigned to the morphing user; if the user does not open the morphing function, the user is prompted to operate the privilege limit.
  • the method further includes: acquiring registration information of the user, calculating a level of the user according to the registration information; If the level exceeds a preset level threshold, the user is prompted to open the transformation function; the transformation identifier is set for the user, and the user transformation identifier is assigned according to whether the user activates the transformation function and Saved in the user information.
  • the reading the user information of the user, determining whether the user has activated the transformation function according to the user information comprises: extracting the user transformation identifier from the user information; The value of the user transformation identifier is determined to determine whether the user has activated the transformation function.
  • the registration information includes one or more of user registration time length information, payment degree information, activity level information, violation history information, and current authority status information.
  • the generating the transformed user for the user comprises: searching from the expired user name, selecting a expired user name as the username of the transformed user; or randomly generating a string, The character string is used as the username of the morphing user.
  • the manner of searching from the expired user name is: according to the user of the current user Name, according to the principle of fuzzy matching, select the expired user corresponding to the current user name; and/or, perform the flashback sorting according to the time when the login is not registered, and select the user who has not logged in for the longest time by default; and/or filter out The last time the logged in network community is not in the current user's online community and has been used by the morphing user.
  • the method further includes: setting, for the morphing user, a morphing authority effective time and/or a morphing authority effective range corresponding to the morphing function that is turned on; The user is allowed to operate within the effective range of the morphing authority and/or the privilege privilege as the morphing user.
  • the method further includes: determining that the identity of the transformed user is invalid if the operation of the transformed user has exceeded the valid time of the transformed authority and/or the valid range of the transformed authority; prompting the user that the transformation has expired, And/or, prompting the user to turn on the morph function again.
  • a user morphing control system includes: a limit event learning module for knowing an event that a user's operation authority is restricted; and a user information reading module for reading the user of the user
  • the morphing function determining module is configured to determine, according to the user information read by the user information reading module, whether the user has activated the morphing function; and the morphing control module is configured to perform the morphing function in the user And generating a transformation operation authority for the user, and assigning the transformation operation authority to the transformation user; and the restriction reminding module is configured to prompt the user that the operation authority is restricted when the user does not open the transformation function.
  • the method further includes: a level calculation module, configured to acquire registration information of the user, calculate a level of the user according to the registration information, and a transformation prompt module, configured to: when the level of the user exceeds a preset level threshold, The user sends a prompt for opening the transformation function; the transformation identifier setting module is configured to set a transformation identifier for the user, and assign a value to the user transformation identifier according to whether the user activates the transformation function and saves the User information.
  • a level calculation module configured to acquire registration information of the user, calculate a level of the user according to the registration information
  • a transformation prompt module configured to: when the level of the user exceeds a preset level threshold, The user sends a prompt for opening the transformation function
  • the transformation identifier setting module is configured to set a transformation identifier for the user, and assign a value to the user transformation identifier according to whether the user activates the transformation function and saves the User information.
  • the morphing function determining module is specifically configured to: extract the user morphing identifier from the user information; and read a value of the user morphing identifier to determine whether the user has been turned on or not Body function.
  • the registration information includes one or more of user registration time length information, payment degree information, activity level information, violation history information, and current authority status information.
  • the morphing control module is specifically configured to: retrieve from the expired user name, select a failed username as the username of the morphing user; or randomly generate a string to the string The username as the morphing user.
  • the morphing control module retrieves the invalidated user name by: according to the current user's user name, according to the fuzzy matching principle, selecting the expired user corresponding to the current user name; and/or , according to the time of the unregistered time, the flashback sorting, the default selection of the unlogged time is the most A long-time user; and/or, filtering out the last time the logged-on network community is not in the current user's online community and has been used by the morphing feature.
  • the method further includes: a morphing execution module, configured to set, for the morphing user, a morphing authority effective time and/or a morphing authority effective range corresponding to the opened morphing function; and allowing the user to The morphing user identity operates within the effective time of the morphing authority and/or the privilege of the morphing authority.
  • a morphing execution module configured to set, for the morphing user, a morphing authority effective time and/or a morphing authority effective range corresponding to the opened morphing function; and allowing the user to The morphing user identity operates within the effective time of the morphing authority and/or the privilege of the morphing authority.
  • the method further includes: a transformation failure control module, configured to determine that the identity of the transformed user is invalid when the operation of the transformed user has exceeded the effective time of the transformed authority and/or the effective range of the transformed authority And, prompting the user to morph has expired, and/or prompting the user to turn on the morph function again.
  • a transformation failure control module configured to determine that the identity of the transformed user is invalid when the operation of the transformed user has exceeded the effective time of the transformed authority and/or the effective range of the transformed authority And, prompting the user to morph has expired, and/or prompting the user to turn on the morph function again.
  • the user morphing control method and system can automatically generate a morphing user for the user after the user's operation authority is restricted, and allow the user to change the user identity by assigning the operation authority to the morphing user. Perform certain operations to improve the user experience.
  • the invention automatically completes the user transformation on the server side without requiring the user to perform another operation such as registering the user name, which is convenient and quick.
  • the morph function is turned on only for advanced users with a certain level, thereby preferentially guaranteeing the operation rights of the advanced users.
  • FIG. 1 shows a flow chart of a user morphing control method according to the present invention
  • Fig. 2 is a block diagram showing the structure of a user morphing control device according to the present invention.
  • the present invention provides a user morphing control method, by controlling the user to transform, Thus, the user can continue to be allowed to perform a certain degree of operation.
  • a user transformation control method provided by the present invention includes the following steps S101-S104.
  • S101 An event that knows that the user's operation authority is restricted.
  • User's operation rights include, but are not limited to, picture browsing/video viewing, comments (including real-time speech by commentary, comments), file downloading, posting, follow-up, etc. For some reason, such as the personal preference of the network administrator, or the personal image or privacy considerations of the anchor in the anchor website, some users' operation rights will be restricted by users with higher authority such as network management or anchor. After the network management or the anchor sets a limit on the operation authority of a certain user on the client, the server on the network side receives the restriction event notification message, thereby realizing the event that the user's operation authority is restricted.
  • S102 Read user information of the user, and determine, according to the user information, whether the user has activated the transformation function.
  • an operation of opening a morphing function for a specific advanced user may be performed.
  • the specific advanced user refers to a user with a certain level. For example, first, by acquiring the registration information of the user, the user's level is calculated according to the registration information, wherein the registration information includes but is not limited to: the user registration time length information and the payment degree information.
  • One or more of the activity level information, the violation history information, and the current authority status information then, by determining whether the user level is higher than a preset level threshold, and if so, determining that the user is an advanced user, then The advanced user sends a prompt to open the user function; then, receives the result of whether the user activates the transformation function, and sets the transformation identifier for the user, and assigns and saves the user transformation identifier according to whether the user activates the transformation function.
  • the user information for example, when the user activates the morphing function, the user morphing flag is assigned a value of 1. If the user is accustomed to the morphing function, the user morphing flag is defaulted to 0.
  • the present invention preferably turns on the morphing function for a specific advanced user, instead of turning on the morphing function for all users.
  • the purpose of the processing is to focus on maintaining the satisfaction of high-level users and avoiding advanced users. Deadweight loss caused by personal restrictions such as webmasters or anchors. Of course, all users are also allowed to have the ability to turn on the morph function, which is not limited.
  • the user's user information can be read to determine whether the user has activated the morphing function.
  • the user information may include, in addition to the user registration information, record information about the morphing function, for example, information including the above-described user morphing identity.
  • the specific judgment process is: first, the user transformation identifier is extracted from the user information; then, the value of the user transformation identifier is read to determine whether the user has activated the transformation function.
  • the value of the read user transformation identifier is 1, it is determined that the user has turned on the transformation function, and if the value of the read user transformation identifier is 0, it is determined that the user has not activated the transformation function.
  • the morphing user After determining that the user has turned on the morphing feature, the morphing user can be generated for the user.
  • the so-called morphing user can understand the vest user who is another identity of the current user, or the temporary user who is understood to be another identity of the current user, and its role is to "blind" the network management or the anchor, thereby performing operations within a certain authority.
  • one way is to retrieve from the expired user name and select a user name that has expired as the temporary user.
  • the retrieval of the invalid user can be completed in the background.
  • the searched rules may be arbitrarily set, and the preferred search rules include, but are not limited to, one or a combination of the following: according to the user name of the current user, according to the principle of fuzzy matching, the expired user corresponding to the current user name is selected; When the time is not logged in, the user sorts out. The default is to select the user who has not logged in for the longest time. The last time the logged-on network community is not in the current user's online community and has been used.
  • the string can be randomly generated, and the string is used as the username of the transformed user.
  • the authority for the operation it is generally necessary to set the authority for the operation, for example, it can be restricted from the perspective of the effective time of the transformed authority or the effective range of the modified authority.
  • the user is allowed to open the morph function once: the user is allowed to perform the barrage comment within 10 minutes in the current "room" (the play interface of an anchor).
  • the corresponding effective time of the transformation authority and/or the effective scope of the transformation authority can be set for the transformation user.
  • the user can activate the morphing function by means of payment, etc., therefore, the effective time of the morphing authority and/or the effective range of the morphing authority can be set according to the number of purchases by the user.
  • the user After setting the effective time of the morphing authority and/or the effective range of the morphing authority corresponding to the morphing function opened for the morphing user, the user can be allowed to change the privilege effective time and/or transform in the identity of the morphing user. Operate within the valid range of permissions.
  • the morphing user's operation has exceeded the morphing authority effective time and/or the morphing authority effective range, it is determined that the morphing user's identity is invalid.
  • they can prompt the user, for example, prompting the user that the transformation has failed, or prompting the user to turn on the transformation function again.
  • the present invention preferably only turns on the morph function for advanced users with a certain level.
  • the "user has not activated the morphing function” there are two situations in which the "user has not activated the morphing function". In the first case, the user is not an advanced user with a certain level, so it does not have the qualification to turn on the morphing function; the second case Yes, the user is a premium user with a certain level, but has not been turned on before. Therefore, in order to prevent the advanced user from opening the transition function, the user can be given the opportunity to turn on the transformation function once.
  • a specific advanced user refers to a user having a certain level. For example, first, by acquiring registration information of the user, the user's level is calculated according to the registration information, wherein the registration information includes but is not limited to: the length of the user registration time.
  • the user sends a prompt to the advanced user to activate the function of transforming the user; then, receiving the result of whether the user activates the transformation function, and setting a transformation identifier for the user, and transforming the user according to whether the user activates the transformation function.
  • the identifier is assigned and stored in the user information. For example, when the user activates the morph function, the user morph identifier is assigned a value of 1. If the user is turned on, the user morph identifier defaults to 0.
  • the process After performing the operation of "turning on the morphing function for the specific advanced user" after the step S104, the process returns to the step S102 to determine whether the user has turned on the morphing function by reading the user information. If the setting is turned on, the step S103 is performed. Otherwise, the process ends.
  • the user morphing control method provided by the present invention can automatically generate a morphing user for the user after the user's operation authority is restricted, and allow the user to perform a certain operation by transforming the user identity by assigning the operation authority to the morphing user. To improve the user experience.
  • the invention automatically completes the user transformation on the server side without requiring the user to perform another operation such as registering the user name, which is convenient and quick.
  • the morph function is turned on only for advanced users with a certain level, thereby preferentially guaranteeing the operation rights of the advanced users.
  • the embodiment of the present invention develops a high-level user by adopting a mode of "user function package" by transforming a user (transformed vest) through a mode of paying when the high-level user is restricted by the super-manager/house management/host. .
  • a high-level user speaks in the live broadcast room
  • the function of transforming the vest is reasonably avoided to limit the user, thereby improving the experience of the high-level user in performing the barrage transmission.
  • This embodiment includes the following steps.
  • the front end turned into a vest to get / use (step 1-3)
  • Step 1 The user gets the avatar function.
  • the user identifier Uid is obtained, and the level corresponding to the user is queried in the background user server according to the user Uid. If the user's level (GradeLevel) is greater than a certain threshold (eg, level 35), the user is graded.
  • a certain threshold eg, level 35
  • the barrage server receives the user Uid and the level flag, it determines whether the user has turned on the morph function. If it is not open, when the user enters the live room, a prompt box will pop up to prompt the user to open the vest function. This feature is automatically turned on (enabled) if the user is turned on.
  • Step 2 The barrage server records the morphing logo.
  • the barrage server When the user has acquired the morph function and is turned on, the barrage server sets an available morph identifier for the user at the front end, for example, 1 means available, 0 means unavailable, and the morph ID is stored in the memory. The morph identification is verified each time the user sends a barrage. If the morph is 1, the default is that the user is in a normal morph state, and the normal barrage can be sent. If the morphing flag is 0, the user will remind the user that the user has changed the function by using a certain number of times (for example, 3 times) when the user sends the barrage.
  • a certain number of times for example, 3 times
  • Step 3 Other users (Super Manager/Room/Host) restrict users.
  • the restriction of users by other users is the triggering condition of the vest, because the vest function is passive recording, and the user cannot actively trigger it, only when the user is restricted by other users. trigger.
  • other users (super tube/house management/owner) ban/block the user in the front-end live room, the background will actively trigger the user's transforming vest function.
  • Step 4 Read the user information to determine whether it has the function of transforming the vest.
  • the background user server When the user is restricted by other users, the background user server first obtains the Uid of the current user, and simultaneously transmits the operation code of the user restriction operation to the foreground barrage server. Barrage server The obtained information is parsed, firstly, the restricted user ID and the user ID are provided with the morphing identifier in the memory, and the initial judgment is made according to whether the avatar identifier is provided.
  • Step 5 The barrage server judges.
  • the barrage server acts as an intermediate layer for information transmission, and performs judgment and operation through the user's transformed logo in the memory. If the user's morph ID is 0, go to step 6; if the user's morph ID is 1, go to step 7.
  • Step 6 Prompt the user has been restricted.
  • the barrage server returns no such function flag (user UID, restricted operation code) to the background user server.
  • the user server modifies the user account status according to the user Uid and the restricted operation code. The user status is successfully modified and returned to the barrage server. The user has been restricted from performing the operation successfully.
  • the barrage server calls the foreground user broadcast, and according to the user Uid, the user is notified that the user has been restricted from speaking/blocking.
  • Step 7 Record the user ID to push to the background.
  • the barrage server returns the user UID to the background user server.
  • Step 8 User server operation.
  • the user server After receiving the user UID indication, the user server retrieves the validity of the user in the background and returns the retrieved status to the barrage server. According to the UID, the live broadcast partition where the current user is located is searched, and the user's partition is used as a parameter for the user to retrieve the condition, and the state in which the user is restricted is not modified.
  • Step 9 retrieve the nickname of the user who has expired in the background.
  • the user who has expired in the background (for example, the user who has not logged in for more than 6 months) is selected, and the user who has expired is searched.
  • the search can follow the following three retrieval conditions: 1. According to the current user's user nickname, according to the fuzzy matching In principle, the corresponding invalid user is queried; secondly, the flashback sorting is performed according to the time when the login is not performed, and the user who has not logged in for the longest time is obtained by default; third, the partition that has been logged in for the latest month and the last login is not in the partition where the current user is located. , users who have been used in the vest function.
  • Step 10 Grab the user nickname and return.
  • the user who meets the requirements is queried.
  • the user's logo of whether the vest function is changed or not is modified.
  • the user is restricted from logging in. (If the user logs in, the default limit of 3 verification codes fails. If the user is logged in, the user who uses the transformed vest obtains the transformed nickname automatically from the expired user. In the process of retrieving according to the principle of grabbing the user's nickname). After the user nicknames the crawl, the user nickname is returned.
  • Step 11 Start the vest function.
  • the user server returns the result to the barrage server based on the UID and the success of the fetch.
  • the barrage server receives the UID and the success of the capture, and calls the room broadcast in the barrage service. If the success of the capture is marked as no, the other users (super-tube/house management/owner) are prompted, for example, “System operation failed! Please re-operate.”. If the success or failure of the capture is marked as yes, the broadcast server broadcast (in-room broadcast) is called to broadcast the users of different roles.
  • Step 12 (Super Manager/Room/Host) The live broadcast indicates that the user has been restricted.
  • Step 13 Other users receive the user's restricted prompt.
  • Step 14 The user receives a function reminder for the transformed vest.
  • the user will receive two broadcast reminders.
  • the first one is, for example, the prompt “xxx user has been banned/blocked”, and the user displayed at this time is the real nickname of the restricted user; the second article is for example: “ The vest has been activated! The account has not been banned, please speak carefully!.
  • the user is not restricted (prohibited/banned) when speaking, and the user can perform the barrage transmission by the identity after the transformation.
  • Step 15 The current user shows that the user nickname has not changed.
  • the transformation of the vest function is successfully released, and the user's nickname display rule can be as follows: in the live broadcast room, the current user sees that his user nickname has not changed (for example, the user nickname is subjected to gray ash processing), and other users (ordinary user/super tube/ The house management/owner) saw the user's nickname change, which is called the user nickname after the transformation.
  • Step 16 The system prompts the user to change the effective time of the next function.
  • the background of the barrage input frame is modified when the user performs the barrage transmission.
  • the background of the barrage input box indicates that the user's transformed vest function has failed, and the next time How long is the effective time, or how much the user can directly purchase the function of transforming the vest.
  • Step 17 Whether to limit within the expiration time.
  • the morphing flag stored in the barrage service is set to 0. If the user does not make a purchase or does not make a purchase at this time, and is continuously restricted by other users (super tube/house pipe/owner), the vest function is disabled.
  • Step 18 The system prompts the user to be restricted, and the morph function has expired.
  • the barrage server prompts the user that the transformation has failed, and the user can recharge within a predetermined time (for example, 3 minutes) to release the restriction. If the user does not recharge within 3 minutes (purchase the vest function), the user is restricted.
  • a predetermined time for example, 3 minutes
  • the present invention also provides a user morphing control system.
  • FIG. 2 a schematic structural diagram of a user morphing control system of the present invention is shown.
  • the system includes:
  • the limit event learning module 201 is configured to learn an event that the user's operation authority is restricted
  • the user information reading module 202 is configured to read user information of the user
  • the morphing function determining module 203 is configured to determine, according to the user information read by the user information reading module, whether the user has activated the morphing function;
  • the morphing control module 204 is configured to generate a morphing user for the user when the user has turned on the morphing function, and assign the morphing operation authority to the morphing user;
  • the restriction reminding module 205 is configured to prompt the user that the operation authority is restricted when the user does not open the transformation function.
  • the system further comprises:
  • a level calculation module 206 configured to acquire registration information of the user, and calculate a level of the user according to the registration information
  • the morphing prompting module 207 is configured to send a prompt for opening the morphing function to the user when the level of the user exceeds a preset level threshold;
  • the morphing identifier setting module 208 is configured to set a morphing identifier for the user, and assign a value to the user morphing identifier and save the user information according to whether the user activates the morphing function.
  • the morphing function determining module 202 is specifically configured to: extract the user morphing identifier from the user information; and read a value of the user morphing identifier to determine whether the user has been activated. Transform function.
  • the registration information includes one or more of user registration time length information, payment degree information, activity level information, violation history information, and current authority status information.
  • the morphing control module 204 is specifically configured to: retrieve from the expired user name, select a failed username as the username of the morphing user; or randomly generate a string with the character The string is the username of the transformed user.
  • the morphing control module 204 retrieves from the expired user name by: according to the user name of the current user, according to the principle of fuzzy matching, selecting the expired user corresponding to the current user name; and / Or, the flashback sorting is performed according to the time when the login is not performed, and the user who has not logged in for the longest time is selected by default; and/or, the user whose last login network community is not in the current user's online community and has been used for the transformation function is filtered out.
  • the system further comprises:
  • the morphing execution module 209 is configured to set, for the morphing user, a morphing authority effective time and/or a morphing authority effective range corresponding to the opened morphing function; and allowing the user to be a morphing user The operation is performed within the effective range of the morphing authority and/or the privilege authority.
  • the system further comprises:
  • the morphing failure control module 210 is configured to determine that the identity of the morphing user is invalid when the operation of the morphing user has exceeded the morphing authority effective time and/or the morphing authority effective range; and prompting the user The morph has failed, and/or, prompting the user to turn on the morph function again.
  • modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment.
  • the modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components.
  • any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined.
  • Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.
  • the various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof.
  • a microprocessor or digital signal processor may be used in practice to implement some or all of the functionality of some or all of the components of the user morphing control system in accordance with embodiments of the present invention.
  • the invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein.
  • a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种用户变身控制方法及系统,其中的方法包括:获知用户的操作权限被限制的事件(S101);读取所述用户的用户信息,根据所述用户信息判断所述用户是否已开通变身功能(S102);若所述用户已开通变身功能,为所述用户生成变身用户,并为所述变身用户分配变身操作权限(S103);若所述用户未开通变身功能,提示用户操作权限被限制(S104)。本方法可自动完成用户变身,方便高效。

Description

用户变身控制方法及系统 技术领域
本发明涉及互联网技术领域,具体涉及一种用户变身控制方法及系统。
背景技术
用户可以在网站进行一定权限的操作,例如,观看视频、下载文件、发表评论,等等。然而由于某些原因,一些用户的操作权限会被限制,例如,用户被禁言等,这种情况下,会影响用户上网体验,不利于网站对于用户的维持。对此,用户可以另外注册一个用户进行操作,然而,这种方式不但浪费了注册资源,而且用户操作繁琐。
发明内容
鉴于上述问题,提出了本发明以便提供一种克服上述问题或者至少部分地解决上述问题的用户变身控制方法及系统。
依据本发明的一个方面,提供一种用户变身控制方法,包括:获知用户的操作权限被限制的事件;读取所述用户的用户信息,根据所述用户信息判断所述用户是否已开通变身功能;若所述用户已开通变身功能,为所述用户生成变身用户,并为所述变身用户分配变身操作权限;若所述用户未开通变身功能,提示用户操作权限被限制。
优选的,在所述读取所述用户的用户信息之前,或者,在所述提示用户操作权限被限制之后,还包括:获取用户的注册信息,根据所述注册信息计算用户的等级;如果用户的等级超过预先设定的等级阈值,则向所述用户发送开通变身功能的提示;为所述用户设置变身标识,并根据用户是否开通变身功能,为所述用户变身标识赋值并保存在所述用户信息中。
优选的,所述读取所述用户的用户信息,根据所述用户信息判断所述用户是否已开通变身功能,包括:从所述用户信息中提取出所述用户变身标识;读取所述用户变身标识的值,确定所述用户是否已开通变身功能。
优选的,所述注册信息包括:用户注册时间长度信息、付费程度信息、活跃程度信息、违规历史信息、当前权限状态信息中的一项或多项。
优选的,所述为所述用户生成变身用户,包括:从已失效用户名中进行检索,选取一个已失效用户名作为所述变身用户的用户名;或者,随机产生字符串,以所述字符串作为所述变身用户的用户名。
优选的,所述从已失效用户名中进行检索的方式为:根据当前用户的用户 名称,按照模糊匹配的原则,选取出与当前用户名称对应的已失效的用户;和/或,按照未登录的时间进行倒叙排序,默认选取未登录时间最久的用户;和/或,过滤掉最后一次登录的网络社区不在当前用户所在网络社区且被使用过变身功能的用户。
优选的,在为所述变身用户分配变身操作权限之后,还包括:为所述变身用户设置与所开通的变身功能对应的变身权限有效时间和/或变身权限有效范围;允许所述用户以变身用户身份在所述变身权限有效时间和/或变身权限有效范围之内进行操作。
优选的,还包括:若所述变身用户的操作已超过所述变身权限有效时间和/或变身权限有效范围,则确定所述变身用户的身份失效;提示用户变身已失效,和/或,提示用户再次开通变身功能。
依据本发明的一个方面,提供一种用户变身控制系统,包括:限制事件获知模块,用于获知用户的操作权限被限制的事件;用户信息读取模块,用于读取所述用户的用户信息;变身功能判断模块,用于根据用户信息读取模块读取的所述用户信息判断所述用户是否已开通变身功能;变身控制模块,用于在所述用户已开通变身功能时,为所述用户生成变身用户,并为所述变身用户分配变身操作权限;限制提醒模块,用于在所述用户未开通变身功能时,提示用户操作权限被限制。
优选的,还包括:等级计算模块,用于获取用户的注册信息,根据所述注册信息计算用户的等级;变身提示模块,用于在用户的等级超过预先设定的等级阈值时,则向所述用户发送开通变身功能的提示;变身标识设置模块,用于为所述用户设置变身标识,并根据用户是否开通变身功能,为所述用户变身标识赋值并保存在所述用户信息中。
优选的,所述变身功能判断模块具体用于,从所述用户信息中提取出所述用户变身标识;以及,读取所述用户变身标识的值,确定所述用户是否已开通变身功能。
优选的,所述注册信息包括:用户注册时间长度信息、付费程度信息、活跃程度信息、违规历史信息、当前权限状态信息中的一项或多项。
优选的,所述变身控制模块具体用于:从已失效用户名中进行检索,选取一个已失效用户名作为所述变身用户的用户名;或者,随机产生字符串,以所述字符串作为所述变身用户的用户名。
优选的,所述变身控制模块从已失效用户名中进行检索的方式为:根据当前用户的用户名称,按照模糊匹配的原则,选取出与当前用户名称对应的已失效的用户;和/或,按照未登录的时间进行倒叙排序,默认选取未登录时间最 久的用户;和/或,过滤掉最后一次登录的网络社区不在当前用户所在网络社区且被使用过变身功能的用户。
优选的,还包括:变身执行模块,用于为所述变身用户设置与所开通的变身功能对应的变身权限有效时间和/或变身权限有效范围;以及,允许所述用户以变身用户身份在所述变身权限有效时间和/或变身权限有效范围之内进行操作。
优选的,还包括:变身失效控制模块,用于在所述变身用户的操作已超过所述变身权限有效时间和/或变身权限有效范围时,确定所述变身用户的身份失效;以及,提示用户变身已失效,和/或,提示用户再次开通变身功能。
可见,通过本发明提供的用户变身控制方法及系统,可以在用户的操作权限被限制之后,自动为用户生成变身用户,通过为变身用户分配操作权限,从而允许用户以变身用户身份进行一定的操作,改善用户操作体验。本发明在服务器端自动完成用户变身,而无需用户进行另外注册用户名等操作,方便快捷。在优选方式中,仅为具有一定等级的高级用户开启变身功能,从而优先保证这部分高级用户的操作权限。
上述说明仅是本发明技术方案的概述,为了能够更清楚了解本发明的技术手段,而可依照说明书的内容予以实施,并且为了让本发明的上述和其它目的、特征和优点能够更明显易懂,以下特举本发明的具体实施方式。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本发明的用户变身控制方法流程图;
图2示出了根据本发明的用户变身控制装置结构示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
如前所述的,在用户的操作权限被限制的情况下,用户的体验度和满意度下降,因此,本发明提供一种用户变身控制方法,通过控制用户进行变身, 从而可以继续允许用户进行一定程度的操作。
参见图1,为本发明提供的一种用户变身控制方法,包括如下步骤S101-S104。
S101:获知用户的操作权限被限制的事件。
用户的操作权限包括但不限于:图片浏览/视频观看、评论(包括通过弹幕的方式实时发言、评论)、文件下载、发帖、跟贴等等的在网站上的各类操作。由于某种原因,例如网管的个人喜好,或者主播类网站中主播的个人形象或隐私考虑,一些用户的操作权限会被网管或主播等具有更高权限的用户予以限制。当网管或主播在客户端对某个用户的操作权限设置了限制之后,网络侧的服务器会接收到限制事件通知消息,借此,可以实现“获知用户的操作权限被限制的事件”。
S102:读取用户的用户信息,根据用户信息判断用户是否已开通变身功能。
在步骤S102之前(或者在步骤S104之后,后续说明),优选的,可以执行为特定高级用户开通变身功能的操作。所谓特定高级用户,是指具有一定等级的用户,例如,首先,通过获取用户的注册信息,根据注册信息计算用户的等级,其中,注册信息包括但不限于:用户注册时间长度信息、付费程度信息、活跃程度信息、违规历史信息、当前权限状态信息中的一项或多项;然后,通过判断用户等级是否高于预置的等级阈值,如果是,则确定该用户为高级用户,则向该高级用户发送开通变身用户功能的提示;继而,接收用户是否开通变身功能的结果,并且,为用户设置变身标识,并根据用户是否开通变身功能,为用户变身标识赋值并保存在所述用户信息中,例如,当用户开通了变身功能之后,将用户变身标识赋值为1,如果用户为开通变身功能,用户变身标识默认为0。
需要说明的是,本发明优选的是为特定的高级用户开启变身功能,而不是为所有用户都开启变身功能,这样处理的目的在于,重点维持高级别用户的满意度,避免高级用户因为网管或主播等个人限制行为而造成的的无谓流失。当然,也可以允许所有用户都有开启变身功能的资格,对此不作限制。
在为用户变身标识赋值并保存在用户信息中之后,即可通过读取用户的用户信息来判断用户是否已开通变身功能。用户信息除了可以包括用户注册信息之外,还可包括有关变身功能的记录信息,例如,包括上述用户变身标识的信息。具体判断过程是,首先,从用户信息中提取出用户变身标识;然后,读取用户变身标识的值,确定用户是否已开通变身功能。仍如上面例子,如果读取用户变身标识的值为1,则确定用户已开通变身功能,如果读取用户变身标识的值为0,则确定用户未开通变身功能。
S103:若用户已开通变身功能,为用户生成变身用户,并为变身用户分配变身操作权限。
在确定用户已开通变身功能之后,即可为用户生成变身用户。所谓变身用户,可以理解是当前用户的另一个身份的马甲用户,或者理解为是当前用户的另一个身份的临时用户,其作用是“蒙蔽”网管或主播,从而进行一定权限内的操作。
为用户生成变身用户的方式可以有多种。
例如,一种方式是从已失效用户名中进行检索,选取一个已失效用户名作为临时用户的用户名。具体的,可以在后台完成失效用户的检索。检索的规则可以任意设定,优选的检索规则包括但不限于以下的一种或组合:根据当前用户的用户名称,按照模糊匹配的原则,选取出与当前用户名称对应的已失效的用户;按照未登录的时间进行倒叙排序,默认选取未登录时间最久的用户;过滤掉最后一次登录的网络社区不在当前用户所在网络社区且被使用过变身功能的用户。
再如,另一种方式是通过随机产生的用户名作为变身用户。具体的,可以通过随机产生字符串,以字符串作为变身用户的用户名。
需要说明的是,除了为变身用户设置用户名之外,一般无需为变身用户设置其他用户信息,这是因为变身用户一般都是临时的,只是为了临时获得一定的操作权限而产生的,因此无需设置其他的用户信息。
为了更好的对变身用户的操作进行控制,一般需要对其操作的权限进行设置,例如,可以从变身权限有效时间或变身权限有效范围两个角度进行限制。比如,可以设置用户开启一次变身功能的有效时间为10分钟,或者,设置用户开启一次变身功能的范围为当前网站的当前板块,也可以将上述二者结合的方式,例如,在主播类网站中,设置用户开启一次变身功能的使用条件是:允许用户在当前“房间”(某个主播的播放界面)且10分钟之内进行弹幕评论。具体实现中,可以根据用户开通的变身功能,为变身用户设置相应的变身权限有效时间和/或变身权限有效范围。用户可以通过付费等方式开通变身功能,因此,可以根据用户购买数量,设置变身权限有效时间和/或变身权限有效范围。
在为变身用户设置与所开通的变身功能对应的变身权限有效时间和/或变身权限有效范围之后,即可允许用户以变身用户身份在变身权限有效时间和/或变身权限有效范围之内进行操作。
如果变身用户的操作已超过变身权限有效时间和/或变身权限有效范围,则确定变身用户的身份失效。对于变身失效的用户,可以向用户进行提示,例如,提示用户变身已失效,或者,还可以提示用户再次开通变身功能。
S104:若用户未开通变身功能,提示用户操作权限被限制。
在用户为开通变身功能的情况下,需要向用户进行操作权限被限制的提示,以及时告知用户无法进行某些操作。
如前描述的,本发明优选的仅针对具有一定等级的高级用户开启变身功能。在该优选方式中,“用户未开通变身功能”有两种情形,第一种情形是,该用户不是具有一定等级的高级用户,因此其不具备开启变身功能的资格;第二种情形是,该用户是具有一定等级的高级用户,但是之前还未开启。因此,为了避免高级用户漏开通变身功能的情况,可以再给该用户用户一次开启变身功能的机会。
因此,可以在步骤S104“提示用户操作权限被限制”之后,执行为特定高级用户开通变身功能的操作。如前描述的,所谓特定高级用户,是指具有一定等级的用户,例如,首先,通过获取用户的注册信息,根据注册信息计算用户的等级,其中,注册信息包括但不限于:用户注册时间长度信息、付费程度信息、活跃程度信息、违规历史信息、当前权限状态信息中的一项或多项;然后,通过判断用户等级是否高于预置的等级阈值,如果是,则确定该用户为高级用户,则向该高级用户发送开通变身用户功能的提示;继而,接收用户是否开通变身功能的结果,并且,为用户设置变身标识,并根据用户是否开通变身功能,为用户变身标识赋值并保存在所述用户信息中,例如,当用户开通了变身功能之后,将用户变身标识赋值为1,如果用户为开通变身功能,用户变身标识默认为0。
在步骤S104之后执行一次“为特定高级用户开通变身功能的操作”之后,再返回执行步骤S102,通过读取用户信息确定用户是否开通变身功能,此时如果确定开通,则执行步骤S103,否则,结束流程。
通过本发明提供的用户变身控制方法,可以在用户的操作权限被限制之后,自动为用户生成变身用户,通过为变身用户分配操作权限,从而允许用户以变身用户身份进行一定的操作,改善用户操作体验。本发明在服务器端自动完成用户变身,而无需用户进行另外注册用户名等操作,方便快捷。在优选方式中,仅为具有一定等级的高级用户开启变身功能,从而优先保证这部分高级用户的操作权限。
下面通过直播网站为应用背景,对本发明一个具体实施例进行介绍。
随着直播行业的快速发展,同时也带来了弹幕的快速成长。由于弹幕的快速发展在直播间中围绕弹幕互动也日趋活跃。在用户通过弹幕与主播或其他用户进行沟通时,由于人员的理解和素质的良莠不齐,在发送弹幕时存在一定程度的违规情况,此时直播间的巡查超管(超级管理员)/房管(房间管理员)/ 主播会对部分弹幕发言存在问题的用户进行限制。尤其是房管/主播会对针对自己不利的弹幕用户进行限制,从而限制了部分用户的弹幕发送积极性,尤其是在针对高等级用户进行限制时,会极大的引起用户的意见。另外在弹幕活跃时,对部分活跃用户(高等级)进行限制时会引起用户的投诉和不满。
因此,本发明实施例针对高等级用户在被超管/房管/主播限制时通过付费的的模式,将变身用户(变身马甲)通过“用户功能包”的模式,对高等级用户进行开发。在高等级用户在直播间发言时,通过变身马甲的功能合理规避用户被限制,从而提高高等级用户在进行弹幕发送的体验度。
该实施例包括如下各步骤。
一、前端变身马甲获取/使用(步骤1-3)
步骤1:用户获得变身马甲功能。
在用户登录直播网站时,获取用户标识Uid,并根据用户Uid,在后台用户服务器中查询用户对应的等级。如果,用户的等级(GradeLevel)大于一定阈值(例如35级),则对该用户进行等级标记。在用户登录到任意直播间时,将用户Uid及等级标记发送给弹幕服务器。弹幕服务器在接收到用户Uid和等级标记时,判断用户是否开通变身功能。如果未开通,在用户进入直播间时,弹出提示框“提示用户开通变身马甲功能”。如果用户已开通,则自动开启(启用状态)该功能。
步骤2:弹幕服务器记录变身标识。
当用户已获取变身功能且处于开启状态时,弹幕服务器会在前端对该用户设置一个可用的变身标识,例如1表示可用、0表示不可用,并将该变身标识存在内存中。每次用户进行弹幕发送时,都对该变身标识进行验证。如果该变身标识为1则默认为用户处于正常变身状态,可进行正常弹幕的发送。如果变身标识为0,则用户在发送弹幕时,在用户发送弹幕时默认提醒一定次数(例如3次)用户变身功能已使用,请用户谨慎发言。
步骤3:其他用户(超管/房管/主播)对用户进行限制。
其他用户(超管/房管/主播)对用户进行限制是变身马甲的触发使用条件,这是因为变身马甲功能为被动记录,用户不能主动去触发,只有当用户被其他用户进行限制时才能触发。当其他用户(超管/房管/主播)在前端直播间中对用户进行禁言/封禁时,后台会主动触发用户的变身马甲功能。
二、变身马甲功能被动释放(步骤4-步骤14)
步骤4:读取用户信息,判断是否具备变身马甲功能。
当用户被其他用户限制时,后台用户服务器会首先获取当前用户的Uid,并同时将对该用户限制操作的操作代码同步传入前台弹幕服务器。弹幕服务器 解析获取的信息,首先获取到被限制的用户ID和该用户ID在内存中是否具备变身标识,根据是否具备变身标识进行初步判断。
步骤5:弹幕服务器判断。
弹幕服务器起信息传导的中间层的作用,通过内存中用户的变身标识,进行判断和操作。如果用户的变身标识为0,则转到步骤6;如果用户的变身标识为1,则转到步骤7。
步骤6:提示用户已被限制。
如果该用户变身标识标记为0,则说明该用户无变身功能,不能够免限制操作,此时,弹幕服务器返回无此功能标示(用户UID、被限制操作代码)给后台用户服务器。用户服务器在接收到标示之后,根据用户Uid、被限制操作代码,修改用户账户状态。用户状态修改成功,返回给弹幕服务器,用户被限制操作已成功执行。弹幕服务器在接收反馈结果之后,调用前台用户广播,根据用户Uid通知该用户已被限制发言/封禁。
步骤7:记录用户ID推送至后台。
如果该用户变身标识标记为1,则说明该用户有变身功能,具备免限制操作。此时,弹幕服务器返回用户UID给后台用户服务器。
步骤8:用户服务器操作。
用户服务器在接收到用户UID标示之后,在后台对该用户的有效性进行检索,并将检索的状态返回给弹幕服务器。并根据UID查询出当前用户所在的直播分区,并将用户的所在的分区作为一个参数进行用户检索的条件,且用户被限制的状态不进行修改。
步骤9:检索后台已失效用户昵称。
默认选取后台已失效的用户(例如,未登陆超过6个月的用户),对已失效的用户进行检索,检索可遵循以下三个检索条件:一、根据当前用户的用户昵称,按照模糊匹配的原则,查询出对应已失效的用户;二、则按照未登录的时间进行倒叙排序,默认获取未登录时间最久的用户;三、过滤掉最近一个月且最后一次登录的分区不在当前用户所在分区,被变身马甲功能使用过的用户。
步骤10:抓取用户昵称并返回。
按照检索的条件查询符合要求的用户,在对符合条件用户进行选取时,首先,将该用户的是否被变身马甲功能使用的标示进行修改。同时在该用户被使用期间,限制该用户登录(如果该用户登录,则默认限制3次验证码失败。如果该用户已登录,则使用变身马甲用户获取变身昵称自动从已失效用户备选中,按照抓取用户昵称的原则重新进行抓取)。用户昵称抓取成功之后返回抓取用户昵称标示。
步骤11:启动变身马甲功能。
用户服务器根据UID和抓取成功与否的标示,返回结果给弹幕服务器。弹幕服务器在接收UID和抓取成功与否的标示,调用弹幕服务中的房间广播。如果抓取成功与否标示为否,则提示其他用户(超管/房管/主播),例如,“系统操作失败!请重新进行操作。”。如果抓取成功与否标示为是,则调用弹幕服务器广播(房间内广播)对不同角色用户进行广播。
步骤12:(超管/房管/主播)直播间提示该用户已被限制。
其他用户在进行禁言/封禁操作之后,收到对应的广播。如果当前用户已被成功限制,则在当前房间内的弹幕服务器中提示“xxx用户已被禁言/封禁”此时显示的用户为被限制用户的真实昵称。
步骤13:其他用户收到该用户被限制提示。
直播间内其他用户可以同样的收到“xxx用户已被禁言/封禁”的提示,且此时显示的用户为被限制用户的真实昵称。
步骤14:该用户收到变身马甲使用功能提示.
该用户会收到两条广播提醒,第一条例如为:“xxx用户已被禁言/封禁”的提示,且此时显示的用户为被限制用户的真实昵称;第二条例如为:“变身马甲已启动!账户未被封禁,请谨慎发言!”。此时用户在进行发言时未被限制(禁言/封禁),用户可以进行通过变身之后的身份进行弹幕发送。
三、变身马甲释放后处理(步骤15-步骤18)
步骤15:当前用户显示用户昵称未发生变化。
变身马甲功能成功释放,用户的昵称显示规则可如下:在直播间中当前用户看到自己的用户昵称未发生变化(例如,用户昵称进行标灰处理),其他用户(普通用户/超管/房管/主播)看到该用户的昵称发生变化,该昵称为已变身之后的用户昵称。
步骤16:系统提示用户下次变身功能有效时间。
在变身马甲功能被被触发之后,在用户进行弹幕发送时,对弹幕输入框的背景进行修改,例如,弹幕输入框的背景显示该用户的变身马甲功能已失效,距离下次生效的时间为多少时间,或者用户可以通过多少额度直接购买一次变身马甲的功能。
步骤17:是否在失效时间内进行限制.
在用户是否一次变身马甲功能之后,将弹幕服务中存储的变身标识进行置0处理。如果用户在未到时间或未进行购买,此时,又连续被其他用户(超管/房管/主播)进行限制,则变身马甲功能失效。
步骤18:系统提示用户被限制,变身功能已失效。
此时弹幕服务器提示用户变身已失效,用户可以在预定时间内(例如3分钟)之内进行充值来解除本次限制。如果用户在3分钟内未进行充值(购买变身马甲功能),则用户被限制。
与上述方法实施例相对应,本发明还提供一种用户变身控制系统。参见图2,示出漏本发明的用户变身控制系统结构示意图。
该系统包括:
限制事件获知模块201,用于获知用户的操作权限被限制的事件;
用户信息读取模块202,用于读取所述用户的用户信息;
变身功能判断模块203,用于根据用户信息读取模块读取的所述用户信息判断所述用户是否已开通变身功能;
变身控制模块204,用于在所述用户已开通变身功能时,为所述用户生成变身用户,并为所述变身用户分配变身操作权限;
限制提醒模块205,用于在所述用户未开通变身功能时,提示用户操作权限被限制。
优选的,该系统还包括:
等级计算模块206,用于获取用户的注册信息,根据所述注册信息计算用户的等级;
变身提示模块207,用于在用户的等级超过预先设定的等级阈值时,则向所述用户发送开通变身功能的提示;
变身标识设置模块208,用于为所述用户设置变身标识,并根据用户是否开通变身功能,为所述用户变身标识赋值并保存在所述用户信息中。
优选的,所述变身功能判断模块202具体用于,从所述用户信息中提取出所述用户变身标识;以及,读取所述用户变身标识的值,确定所述用户是否已开通变身功能。
优选的,所述注册信息包括:用户注册时间长度信息、付费程度信息、活跃程度信息、违规历史信息、当前权限状态信息中的一项或多项。
优选的,所述变身控制模块204具体用于:从已失效用户名中进行检索,选取一个已失效用户名作为所述变身用户的用户名;或者,随机产生字符串,以所述字符串作为所述变身用户的用户名。
优选的,所述变身控制模块204从已失效用户名中进行检索的方式为:根据当前用户的用户名称,按照模糊匹配的原则,选取出与当前用户名称对应的已失效的用户;和/或,按照未登录的时间进行倒叙排序,默认选取未登录时间最久的用户;和/或,过滤掉最后一次登录的网络社区不在当前用户所在网络社区且被使用过变身功能的用户。
优选的,该系统还包括:
变身执行模块209,用于为所述变身用户设置与所开通的变身功能对应的变身权限有效时间和/或变身权限有效范围;以及,允许所述用户以变身用户身份在所述变身权限有效时间和/或变身权限有效范围之内进行操作。
优选的,该系统还包括:
变身失效控制模块210,用于在所述变身用户的操作已超过所述变身权限有效时间和/或变身权限有效范围时,确定所述变身用户的身份失效;以及,提示用户变身已失效,和/或,提示用户再次开通变身功能。
在此提供的算法和显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本发明也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本发明的内容,并且上面对特定语言所做的描述是为了披露本发明的最佳实施方式。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本发明的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个发明方面中的一个或多个,在上面对本发明的示例性实施例的描述中,本发明的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本发明要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,发明方面在于少于前面公开的单个实施例的所有特征。因此,遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本发明的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此所述的一些实施例包括其它 实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本发明的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本发明的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本发明实施例的用户变身控制的系统中的一些或者全部部件的一些或者全部功能。本发明还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本发明的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
应该注意的是上述实施例对本发明进行说明而不是对本发明进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本发明可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。

Claims (10)

  1. 一种用户变身控制方法,其特征在于,包括:
    获知用户的操作权限被限制的事件;
    读取所述用户的用户信息,根据所述用户信息判断所述用户是否已开通变身功能;
    若所述用户已开通变身功能,为所述用户生成变身用户,并为所述变身用户分配变身操作权限;
    若所述用户未开通变身功能,提示用户操作权限被限制。
  2. 如权利要求1所述的方法,其特征在于,在所述读取所述用户的用户信息之前,或者,在所述提示用户操作权限被限制之后,还包括:
    获取用户的注册信息,根据所述注册信息计算用户的等级;
    如果用户的等级超过预先设定的等级阈值,则向所述用户发送开通变身功能的提示;
    为所述用户设置变身标识,并根据用户是否开通变身功能,为所述用户变身标识赋值并保存在所述用户信息中。
  3. 如权利要求2所述的方法,其特征在于,所述读取所述用户的用户信息,根据所述用户信息判断所述用户是否已开通变身功能,包括:
    从所述用户信息中提取出所述用户变身标识;
    读取所述用户变身标识的值,确定所述用户是否已开通变身功能。
  4. 如权利要求2所述的方法,其特征在于,所述注册信息包括:用户注册时间长度信息、付费程度信息、活跃程度信息、违规历史信息、当前权限状态信息中的一项或多项。
  5. 如权利要求1所述的方法,其特征在于,所述为所述用户生成变身用户,包括:
    从已失效用户名中进行检索,选取一个已失效用户名作为所述变身用户的用户名;或者,
    随机产生字符串,以所述字符串作为所述变身用户的用户名。
  6. 如权利要求5所述的方法,其特征在于,所述从已失效用户名中进行检索的方式为:
    根据当前用户的用户名称,按照模糊匹配的原则,选取出与当前用户名称对应的已失效的用户;和/或,
    按照未登录的时间进行倒叙排序,默认选取未登录时间最久的用户;和/或,
    过滤掉最后一次登录的网络社区不在当前用户所在网络社区且被使用过 变身功能的用户。
  7. 如权利要求1所述的方法,其特征在于,在为所述变身用户分配变身操作权限之后,还包括:
    为所述变身用户设置与所开通的变身功能对应的变身权限有效时间和/或变身权限有效范围;
    允许所述用户以变身用户身份在所述变身权限有效时间和/或变身权限有效范围之内进行操作。
  8. 如权利要求7所述的方法,其特征在于,还包括:
    若所述变身用户的操作已超过所述变身权限有效时间和/或变身权限有效范围,则确定所述变身用户的身份失效;
    提示用户变身已失效,和/或,提示用户再次开通变身功能。
  9. 一种用户变身控制系统,其特征在于,包括:
    限制事件获知模块,用于获知用户的操作权限被限制的事件;
    用户信息读取模块,用于读取所述用户的用户信息;
    变身功能判断模块,用于根据用户信息读取模块读取的所述用户信息判断所述用户是否已开通变身功能;
    变身控制模块,用于在所述用户已开通变身功能时,为所述用户生成变身用户,并为所述变身用户分配变身操作权限;
    限制提醒模块,用于在所述用户未开通变身功能时,提示用户操作权限被限制。
  10. 如权利要求9所述的系统,其特征在于,还包括:
    等级计算模块,用于获取用户的注册信息,根据所述注册信息计算用户的等级;
    变身提示模块,用于在用户的等级超过预先设定的等级阈值时,则向所述用户发送开通变身功能的提示;
    变身标识设置模块,用于为所述用户设置变身标识,并根据用户是否开通变身功能,为所述用户变身标识赋值并保存在所述用户信息中。
PCT/CN2017/075729 2016-10-21 2017-03-06 用户变身控制方法及系统 WO2018072375A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610922221.3 2016-10-21
CN201610922221.3A CN106503155B (zh) 2016-10-21 2016-10-21 用户变身控制方法及系统

Publications (1)

Publication Number Publication Date
WO2018072375A1 true WO2018072375A1 (zh) 2018-04-26

Family

ID=58319349

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/075729 WO2018072375A1 (zh) 2016-10-21 2017-03-06 用户变身控制方法及系统

Country Status (2)

Country Link
CN (1) CN106503155B (zh)
WO (1) WO2018072375A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113518262A (zh) * 2021-07-09 2021-10-19 珠海云迈网络科技有限公司 广告弹幕发布者识别方法、装置、计算机设备及其存储介质
CN113949885A (zh) * 2020-07-15 2022-01-18 腾讯科技(深圳)有限公司 直播处理方法、装置、电子设备及计算机可读存储介质

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449614B (zh) * 2018-03-14 2021-01-15 广东亿迅科技有限公司 基于访客行为的直播连麦方法及装置
CN109688476A (zh) * 2018-12-05 2019-04-26 北京潘达互娱科技有限公司 用户名修改方法、装置、设备和存储介质
CN111475783B (zh) * 2019-01-24 2024-02-27 阿里巴巴集团控股有限公司 数据检测方法、系统及设备
CN110139152B (zh) * 2019-05-20 2020-07-24 北京字节跳动网络技术有限公司 禁言方法、装置、电子设备及计算机可读存储介质
CN114885191A (zh) * 2022-04-29 2022-08-09 广州方硅信息技术有限公司 基于直播间专属昵称的互动方法、系统、装置及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310138A (zh) * 2012-03-08 2013-09-18 尹钟善 帐户管理装置及方法
CN104468635A (zh) * 2014-12-31 2015-03-25 广州东海网络科技有限公司 网络平台的用户权限升级认证方法及系统
CN104518873A (zh) * 2013-09-29 2015-04-15 北京新媒传信科技有限公司 匿名登录方法和装置
CN105187417A (zh) * 2015-08-25 2015-12-23 北京京东尚科信息技术有限公司 权限获取方法和装置
CN106027494A (zh) * 2016-04-29 2016-10-12 深圳市永兴元科技有限公司 权限管理方法、服务器及系统
US20160306803A1 (en) * 2014-06-10 2016-10-20 Tencent Technology (Shenzhen) Company Limited Group user level association method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247504B (zh) * 2007-12-27 2010-07-07 华为技术有限公司 设置临时权限的方法和设备
JP2011070289A (ja) * 2009-09-24 2011-04-07 Hitachi Solutions Ltd 権限設定一時変更システム
CN103297318B (zh) * 2012-03-01 2016-01-13 腾讯科技(深圳)有限公司 一种微博变身方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103310138A (zh) * 2012-03-08 2013-09-18 尹钟善 帐户管理装置及方法
CN104518873A (zh) * 2013-09-29 2015-04-15 北京新媒传信科技有限公司 匿名登录方法和装置
US20160306803A1 (en) * 2014-06-10 2016-10-20 Tencent Technology (Shenzhen) Company Limited Group user level association method and system
CN104468635A (zh) * 2014-12-31 2015-03-25 广州东海网络科技有限公司 网络平台的用户权限升级认证方法及系统
CN105187417A (zh) * 2015-08-25 2015-12-23 北京京东尚科信息技术有限公司 权限获取方法和装置
CN106027494A (zh) * 2016-04-29 2016-10-12 深圳市永兴元科技有限公司 权限管理方法、服务器及系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113949885A (zh) * 2020-07-15 2022-01-18 腾讯科技(深圳)有限公司 直播处理方法、装置、电子设备及计算机可读存储介质
CN113949885B (zh) * 2020-07-15 2023-08-15 腾讯科技(深圳)有限公司 直播处理方法、装置、电子设备及计算机可读存储介质
US11917213B2 (en) 2020-07-15 2024-02-27 Tencent Technology (Shenzhen) Company Limited Live streaming processing method, apparatus, electronic device, and computer-readable storage medium
CN113518262A (zh) * 2021-07-09 2021-10-19 珠海云迈网络科技有限公司 广告弹幕发布者识别方法、装置、计算机设备及其存储介质

Also Published As

Publication number Publication date
CN106503155B (zh) 2020-01-03
CN106503155A (zh) 2017-03-15

Similar Documents

Publication Publication Date Title
WO2018072375A1 (zh) 用户变身控制方法及系统
Chang et al. Citizen co‐production of cyber security: Self‐help, vigilantes, and cybercrime
US9591126B2 (en) Personal allowed number system
Henderson Fourth Amendment Time Machines (and What They Might Say about Policy Body Cameras)
EP2779572A1 (en) System and method for monitoring authentication attempts
US20080168548A1 (en) Method For Automatically Controlling Access To Internet Chat Rooms
TW201025069A (en) Method and apparatus for information recovery in using snap shot database
US20230061236A1 (en) Targeted venue based message and communication distribution based on proximity data
Roht-Arriaza The role of international actors in national accountability processes
CN106534102A (zh) 设备访问的方法及装置、电子设备
US10873547B2 (en) Methods and systems for providing mobile consent verification
Gecas Gunfire Game Changer or Big Brother's Hidden Ears: Fourth Amendment and Admissibility Quandaries Relating to Shotspotter Technology
Horsman et al. Identifying offenders on Twitter: A law enforcement practitioner guide
CN108345613B (zh) 一种风险识别方法和装置
Bartow Privacy Laws and Privacy Levers: Online Surveillance Versus Economic Development in the People's Republic of China
Boehme State Behavior and the International Criminal Court: Between Cooperation and Resistance
Hunt-Blackwell You Have the Right to Remain Private: Safeguarding Biometric Identifiers in Civil and Criminal Contexts
US11605054B2 (en) System and method for recognizing environment and/or location using object identification techniques
US9984517B2 (en) System and method for determining entry to a secured area at a checkpoint
US9842441B1 (en) System and method for determining entry into a secured facility at a checkpoint
CN104378224B (zh) 帐号安全信息维护方法及装置
JP6537816B2 (ja) 情報表示システム及び情報表示方法
Victor et al. Grandparent visitation: A survey of history, jurisprudence, and legislative trends across the united states in the past decade
Kitchen Smart Devices and Criminal Investigations: Protecting Suspects’ Privacy and Fourth Amendment Rights
Perego A New Age of Surveillance: Facial Recognition in Policing and Why It Should Be Abolished

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17863108

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17863108

Country of ref document: EP

Kind code of ref document: A1