Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for identifying harmful video based on user IP and video copying

A video and user technology, applied in the field of information security, can solve problems such as insufficient recognition efficiency

Pending Publication Date: 2019-07-16
HUIZHOU UNIV
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing identification methods are insufficient in identification efficiency. Under the circumstances of the development of big data and artificial intelligence, how to efficiently identify harmful videos has become a problem that needs to be considered.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying harmful video based on user IP and video copying
  • Method and system for identifying harmful video based on user IP and video copying
  • Method and system for identifying harmful video based on user IP and video copying

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order for those skilled in the art to understand the technical solutions disclosed in the present disclosure, the technical solutions of various embodiments will be described below in conjunction with the embodiments and related drawings. The described embodiments are part of the embodiments of the present disclosure, rather than Full examples. The terms "first", "second" and the like used in the present disclosure are used to distinguish different objects, not to describe a specific order. Furthermore, "comprising" and "having", as well as any variations thereof, are intended to be inclusive and non-exclusive. For example, a process comprising a series of steps or units, or a method, or a system, or a product or a device is not limited to the listed steps or units, but optionally also includes steps or units not listed, or optionally It also includes other steps or elements inherent to these processes, methods, systems, products or devices.

[0020] Reference here...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for identifying harmful videos. The method comprises the steps of when it is judged that the page elements of a webpage comprise the URL path of the video,identifying an IP address or an IP address field of a user recorded in the page content of the webpage, acquiring a domain name contained in the URL or an IP address pointed by the URL according to the URL path of a video, and outputting a first weight factor and a second weight factor based on the related query of the IP address and the domain name; obtaining a video file at the lowest picture quality, and carrying out the video copy detection on the video file of the lowest picture quality in a pre-established harmful video database, and outputting a third weight factor according to a monitoring result; and combining the first weight factor, the second weight factor and the third weight factor to identify whether the video belongs to the harmful video. According to the method and the system, by combining a database made by the big data, using the image processing means as few as possible and utilizing multiple modes, a scheme for identifying the harmful videos is provided.

Description

technical field [0001] The present disclosure belongs to the field of information security, and for example relates to a method and system for identifying harmful videos. Background technique [0002] In the information society, information flow is everywhere, including but not limited to text, video, audio, pictures, etc. Among them, video files often include auditory information and visual information, and the expressive ability is more comprehensive. However, with the popularization of the mobile Internet, the Internet is flooded with a large amount of harmful video content, which is more harmful than harmful text, harmful pictures and harmful audio due to the characteristics of visual intuition and impact. Therefore, it is necessary to identify these harmful videos , and then filter, delete, and eliminate hazards, it is very necessary. [0003] For the identification of harmful videos on the Internet, the current technologies can be mainly divided into two categories, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/955G06F16/783G06K9/00H04L29/06H04L29/12
CPCH04L63/0236G10L25/57G06V20/41H04L61/4511G06F16/7834G06F16/9566G06F16/783G06F16/955H04L61/00
Inventor 蔡昭权胡松胡辉蔡映雪陈伽黄翰梁椅辉罗伟黄思博
Owner HUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products