Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for identifying harmful video based on user ID and film tail content

A video and credits technology, applied in the field of information security, can solve problems such as insufficient recognition efficiency

Inactive Publication Date: 2019-07-16
HUIZHOU UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing identification methods are insufficient in identification efficiency. Under the circumstances of the development of big data and artificial intelligence, how to efficiently identify harmful videos has become a problem that needs to be considered.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying harmful video based on user ID and film tail content
  • Method and system for identifying harmful video based on user ID and film tail content
  • Method and system for identifying harmful video based on user ID and film tail content

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order for those skilled in the art to understand the technical solutions disclosed in the present disclosure, the technical solutions of various embodiments will be described below in conjunction with the embodiments and related drawings. The described embodiments are part of the embodiments of the present disclosure, rather than Full examples. The terms "first", "second" and the like used in the present disclosure are used to distinguish different objects, not to describe a specific order. Furthermore, "comprising" and "having", as well as any variations thereof, are intended to be inclusive and non-exclusive. For example, a process comprising a series of steps or units, or a method, or a system, or a product or a device is not limited to the listed steps or units, but optionally also includes steps or units not listed, or optionally It also includes other steps or elements inherent to these processes, methods, systems, products or devices.

[0020] Reference here...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for identifying a harmful video. The method comprises the following steps of when it is judged that the page elements of the webpage comprise the URL path of the video, identifying a user ID recorded in the page content of the webpage, acquiring a domain name contained in the URL or an IP address pointed by the URL according to a URL path of a video, andoutputting a first weight factor and a second weight factor based on the user ID, the IP address and a related query of the domain name; moreover, obtaining the video content of the film tail, carrying out the video copy detection on the video content of the film tail in a preset harmful video database, and outputting a third weight factor according to a monitoring result; and combining the firstweight factor, the second weight factor and the third weight factor to identify whether the video belongs to the harmful video. According to the method and the system, by combining a database made bythe big data, using the image processing means as few as possible and utilizing multiple modes, a scheme for identifying the harmful videos is provided.

Description

technical field [0001] The present disclosure belongs to the field of information security, and for example relates to a method and system for identifying harmful videos. Background technique [0002] In the information society, information flow is everywhere, including but not limited to text, video, audio, pictures, etc. Among them, video files often include auditory information and visual information, and the expressive ability is more comprehensive. However, with the popularization of the mobile Internet, the Internet is flooded with a large amount of harmful video content, which is more harmful than harmful text, harmful pictures and harmful audio due to the characteristics of visual intuition and impact. Therefore, it is necessary to identify these harmful videos , and then filter, delete, and eliminate hazards, it is very necessary. [0003] For the identification of harmful videos on the Internet, the current technologies can be mainly divided into two categories, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/955G06K9/00
CPCG06V20/47G06F16/955
Inventor 蔡昭权胡松胡辉蔡映雪陈伽黄翰梁椅辉罗伟黄思博
Owner HUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products