Supercharge Your Innovation With Domain-Expert AI Agents!

A network video supervision method, device, equipment and readable storage medium

A network video and video technology, applied in the video field, can solve the problems of illegal, bad video, bad video source tracking, etc.

Active Publication Date: 2021-08-10
LAUNCH TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the source tracking of bad videos and illegal videos becomes a problem
That is to say, it is currently difficult to track users who upload illegal or bad videos. It is precisely this problem of finding the source of videos that gives lawbreakers an opportunity to appear illegal and bad videos on major video network platforms.
However, the dissemination of bad and illegal videos on the video network platform will cause a relatively large negative impact.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network video supervision method, device, equipment and readable storage medium
  • A network video supervision method, device, equipment and readable storage medium
  • A network video supervision method, device, equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0096] Please refer to figure 1 , figure 1 It is a flow chart of the first network video supervision method in the embodiment of the present application. This method can be applied to video network platforms. The method includes the following steps:

[0097] S101. Receive and analyze a video upload request sent by a target user.

[0098] Wherein, the target user may be any user in the video network platform. The target user can send a video upload request to the video network platform through a client of the target video network platform such as an APP, a web page, or a computer terminal, wherein the video upload request can specifically include the target video requested to be uploaded and the tag information corresponding to the target video. Among them, the label information can specifically be the category information to which the target video belongs, such as information such as entertainment, funny, surprise, horror, etc.; of course, the label information can also spec...

Embodiment 2

[0116] Please refer to figure 2 , figure 2 It is a flow chart of the second network video monitoring method in the embodiment of the present application. This method can be applied to video network platforms. The method includes the following steps:

[0117] S201. Receive and analyze a video upload request sent by a target user.

[0118] S202. Determine whether the target user is a legally registered user successfully authenticated by using the network ID card.

[0119] After determining whether the target user is a legitimate registered user, different operations can be performed according to different judgment results. Specifically, when the judgment result is no, the operation of step S203 is performed, and when the judgment result is yes, the operation of step S204 is performed.

[0120] S203. Use the network ID card to authenticate the target user, and store the identity information after the identity authentication is successful.

[0121] S204. Read the identity in...

Embodiment 3

[0128] Please refer to image 3 , image 3 It is a flow chart of the third network video supervision method in the embodiment of the present application. This method can be applied to video network platforms. The method includes the following steps:

[0129] S301. Receive and analyze a video upload request sent by a target user.

[0130] S302. Determine whether the target user is a legally registered user successfully authenticated by using the network ID card.

[0131] After determining whether the target user is a legitimate registered user, different operations can be performed according to different judgment results. Specifically, when the judgment result is no, the operation of step S303 is performed, and when the judgment result is yes, the operation of step S304 is performed.

[0132] S303. Use the network ID card to authenticate the target user, and store the identity information after the identity authentication is successful.

[0133] S304. Read the identity info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a network video supervision method, which includes: the video network platform receives and analyzes the video upload request sent by the target user; judges whether the target user is a legally registered user successfully authenticated by using the network ID card; if not, uses The network ID card authenticates the target user, and stores the identity information after the identity authentication is successful; if so, reads the identity information, and determines whether the label information of the target video to be transmitted matches the identity information according to the preset matching rules; If it matches, the target video is allowed to be uploaded; if not, the target video is not allowed to be uploaded. This approach enables video source supervision. The application also discloses a network video monitoring device, equipment and readable storage medium, which have corresponding technical effects.

Description

technical field [0001] The present application relates to the field of video technology, in particular to a network video monitoring method, device, equipment and readable storage medium. Background technique [0002] With the increasing popularity of the Internet, people browse more and more videos every day, and there are more and more video producers. However, the mass video quality is uneven, especially the major short video network platforms, in order to pursue profits and attract traffic, a large number of videos and users have appeared. The supervision and review of videos and their users is becoming more and more difficult. [0003] The current video network platform does not strictly supervise the videos uploaded by users, and because the users of the video network platform appear as virtual identities instead of real identities. In this way, the source tracking of bad videos and illegal videos becomes a problem. That is to say, it is currently difficult to track...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/258H04N21/254H04N21/239H04N21/466H04N21/454
CPCH04N21/2393H04N21/2541H04N21/25875H04N21/454H04N21/4668
Inventor 刘新袁飞霞
Owner LAUNCH TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More