Groups of users matching process and system
Technical field
The present invention relates to a kind of Data Matching technology, particularly a kind of groups of users matching process and system.
Background technology
Along with the rise in Web2.0 epoch, increasing interactive function is fused to various with in the online service website of social functions, and wherein groups of users is exactly one of function.
So-called groups of users, will have the population of same or similar hobby or feature to carrying out together chatting and the platform exchanged exactly.Groups of users be have identical hobby friend flock together composition gathering ground, more focus on everybody can better exchange, can be the friend be familiar with in your actual life in groups of users, also can be the stranger had never seen, everybody interested topic open to discussion, exchange oneself experience gains in depth of comprehension.Groups of users is also the cradle of various topic, and everyone can create oneself group, selects the topic that yourself likes.Meanwhile, the value that groups of users can bring to user is wherein huge, such as, when the user in groups of users has had problem, then can play the strength of colony, absorbs all the useful ideas and solves Problems existing.
Existing documents programme is: when user knows particular user group, selects the groups of users that will add according to the judgement of oneself.But, do not know to have particular user group user and be applicable to adding fashionable, being difficult to know that what groups of users is applicable to oneself and by what approach goes to add this kind of groups of users.
Summary of the invention
A fundamental purpose of the present invention is to provide a kind of groups of users matching process, the user thinking current upload file for user fast, accurately, match user group safely.
In addition, the present invention also provides a kind of groups of users matching system, the user thinking current upload file for user fast, accurately, match user group safely.
Another fundamental purpose of the present invention is to provide a kind of groups of users matching process, think all users of upload file fast, accurately, match user group safely.
In addition, the present invention also provides a kind of groups of users matching system, think all users of upload file fast, accurately, match user group safely.
A kind of groups of users matching process, the method comprising the steps of: file set up mapping relations user each in groups of users and groups of users uploaded; Obtain the cryptographic hash of the current file uploaded of user; The cryptographic hash of acquisition and the cryptographic hash of file that maps with each groups of users are compared; Identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result; When there being identical file to be stored in file reception end, match the user that the groups of users mapped with the same file found out is supplied to current upload file.
Preferably, the method also comprises: detect and whether the user analyzing current upload file selects to add the groups of users matched; When the user of current upload file selects to add the groups of users matched, the user authorizing current upload file accesses the authority of the groups of users matched the user of current upload file to be added the groups of users matched.
A kind of groups of users matching system, this system comprises: mapping relations set up module, for file set up mapping relations user each in groups of users and groups of users uploaded; Cryptographic hash computing module, for obtaining the cryptographic hash of the current file uploaded of user; Groups of users matching module, for the cryptographic hash of acquisition and the cryptographic hash of file that maps with each groups of users are compared, identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result, when there being identical file to be stored in file reception end, match the user that the groups of users mapped with the same file found out is supplied to current upload file.
Preferably, described groups of users matching module also for: to detect and whether the user analyzing current upload file selects to add the groups of users matched; When the user of current upload file selects to add the groups of users matched, the user authorizing current upload file accesses the authority of the groups of users matched the user of current upload file to be added the groups of users matched.
A kind of groups of users matching process, the method comprising the steps of: file set up mapping relations user each in groups of users and groups of users uploaded; Obtain the cryptographic hash of the All Files that user uploads; Compare in the cryptographic hash obtained; Identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result; When there being identical file to be stored in file reception end, matching the groups of users mapped with the same file found out and being supplied to and uploading this same file but the user also not adding the groups of users matched.
Preferably, the method also comprises: detect and analyze and upload this same file but whether the user also not adding the groups of users matched selects to add the groups of users matched; Upload this same file but also do not add the groups of users matched user select add the groups of users matched time, authorize and upload this same file but the user also not adding the groups of users matched accesses the authority of the groups of users matched, so that will this same file be uploaded but the user also not adding the groups of users matched adds the groups of users matched.
A kind of groups of users matching system, this system comprises: mapping relations set up module, for file set up mapping relations user each in groups of users and groups of users uploaded; Cryptographic hash computing module, for obtaining the cryptographic hash of the All Files that user uploads; Groups of users matching module, for comparing in the cryptographic hash obtained, identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result, when there being identical file to be stored in file reception end, matching the groups of users mapped with the same file found out and being supplied to and uploading this same file but the user also not adding the groups of users matched.
Preferably, described groups of users matching module also for: detect and analyze and upload this same file but whether the user also not adding the groups of users matched selects to add the groups of users matched; Upload this same file but also do not add the groups of users matched user select add the groups of users matched time, authorize and upload this same file but the user also not adding the groups of users matched accesses the authority of the groups of users matched, so that will this same file be uploaded but the user also not adding the groups of users matched adds the groups of users matched.
Compare prior art, the file set up mapping relations of the present invention by user each in groups of users and groups of users is uploaded, the cryptographic hash of the file cryptographic hash of current for the user file uploaded uploaded with each user compares to find out the groups of users of mating with the user of current upload file, the cryptographic hash of All Files user uploaded is compared and is thought that all users of upload file match groups of users, ensure that groups of users quick, accurately, safely mate.
Accompanying drawing explanation
Fig. 1 is the running environment figure that the present invention realizes the server preferred embodiment of groups of users coupling.
Fig. 2 is the example of the groups of users that in Fig. 1, server is set up.
Fig. 3 is the hardware structure figure of server preferred embodiment in Fig. 1.
Fig. 4 is the functional block diagram of groups of users matching system preferred embodiment in Fig. 2.
Fig. 5 is the concrete implementing procedure figure of a groups of users matching process of the present invention preferred embodiment.
Fig. 6 is the concrete implementing procedure figure of another preferred embodiment of groups of users matching process of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, the running environment figure of the server preferred embodiment of groups of users coupling is realized for the present invention.This server 1 passes through in network 2 and at least one terminal 3(figure for 3) communicate to connect.This server 1 is for setting up groups of users, wherein, the user that each groups of users is liked by special interests forms, in network significance, described user refers to the identification information of the user of meter terminal 3 (such as, member system on ordinary meaning, described user refers to account and/or the password of the user of meter terminal 3).
In the present embodiment, this server 1 also stores end 4 communication linkage with at least one, store the file that end 4 is uploaded for storage terminal 3, server 1 is file reception end with storing end 4, and the file of reception is also stored into storage end 4 by the file that server 1 receiving terminal 3 is uploaded; In other embodiments of the invention, the file that described terminal 3 is uploaded is stored in server 1, and server 1 is file reception end, and server 1 receives the file that also storage terminal 3 is uploaded.
Described groups of users, such as, shown in Fig. 2, reporter group 221, photography group 222, focus discussion group 223 etc.The user that each groups of users is liked by special interests forms, such as, the user that reporter group 221 comprises be " reporter A ", " reporter B ", " reporter C ",,, (not shown).
Described network 2 can be internet, mobile radio communication or other any suitable communication networks.Described terminal 3 can be mobile phone, computing machine, panel computer, personal digital assistant (PersonalDigitalAssistant, PDA) or other any suitable data processing equipments.
As shown in Figure 3, be the hardware structure figure of server preferred embodiment in Fig. 1.This server 1 comprises groups of users matching system 11, processing unit 10 and storage unit 13.
This storage unit 13, for the service data of file, this groups of users matching system 11 and this groups of users matching system 11 that user in each groups of users uploads.
This processing unit 10, for calling and performing this groups of users matching system 11, with the file uploaded according to user for user matches corresponding groups of users.
As shown in Figure 4, be the functional block diagram of groups of users matching system preferred embodiment in Fig. 2.This groups of users matching system 11 comprises mapping relations and sets up module 110, cryptographic hash computing module 111 and groups of users matching module 112.
These mapping relations set up module 110, for file set up mapping relations user each in groups of users and groups of users uploaded.Such as, the file that file, " reporter C " that the file " reporter A " uploaded, " reporter B " are uploaded upload,,,, set up mapping relations with groups of users " reporter group 221 ".
Below in order to better describe the function of cryptographic hash computing module 111 and groups of users matching module 112 in this groups of users matching system 11, set forth respectively with two embodiments below:
Embodiment one:
This groups of users matching system 11 is user's match user group according to the current file uploaded of user.
This cryptographic hash computing module 111, for obtaining the cryptographic hash of the current file uploaded of user.Described cryptographic hash can be such as MD5 value and/or SHA1 value.If when the current file uploaded of user has had a corresponding cryptographic hash, then this cryptographic hash computing module 111 extracting directly has gone out the cryptographic hash of the current upload file of user; If when the current file uploaded of user does not have a corresponding cryptographic hash, then this cryptographic hash computing module 111 directly calculates the cryptographic hash of the current upload file of user.
It should be noted that, the mode that this cryptographic hash computing module 111 calculates the cryptographic hash of the file that user uploads has multiple, sets forth the cryptographic hash of this cryptographic hash computing module 111 how calculation document below with two examples:
Example one: the cryptographic hash of calculation document full content.It is emphasized that the cryptographic hash computing velocity of this embodiment is slower relative to following example two when calculating relatively large file.
Example two: whether the size of Study document is greater than pre-set threshold value; When the size of file is greater than pre-set threshold value, from file, extract content according to the rule preset, and the content calculating cryptographic hash for extracting; When the size of file is less than or equal to pre-set threshold value, for file full content calculates cryptographic hash.
Described default rule can be: the content of file is divided into more than two deciles (such as, being divided into 5 deciles); Afterbody in the content of each decile extracts content and the size sum of all extraction contents equals the above-mentioned pre-set threshold value (content size of extraction, such as, the content size that the afterbody of the content of first decile extracts is A, the content size that the afterbody of the content of second decile extracts is B, the content size that the afterbody of the content of the 3rd decile extracts is C, the content size that the afterbody of the content of the 4th decile extracts is D, the content size that the afterbody of the content of the 5th decile extracts is E, and above-mentioned pre-set threshold value=A+B+C+D+E).
Described default rule can also be: the content of file is divided into more than two deciles (such as, being divided into 5 deciles), afterbody in the content of last decile extracts content, stem in other deciles extracts content, and the size sum of all extraction contents equals the above-mentioned pre-set threshold value (content size of extraction, such as, the content size that the stem of the content of first decile is extracted is A, the content size that the stem of the content of second decile is extracted is B, the content size that the stem of the content of the 3rd decile is extracted is C, the content size that the stem of the content of the 4th decile is extracted is D, the content size that the afterbody of the content of the 5th decile extracts is E, and above-mentioned pre-set threshold value=A+B+C+D+E).
Described default rule can also be other any suitable contents extraction rules, two concrete examples of the described default rule more than provided are non exhaustive row, and those skilled in the art can expect other any suitable equivalent contents extraction rules easily with reference to the example of described default rule.
This groups of users matching module 112, for the cryptographic hash of acquisition and the cryptographic hash of file that maps with each groups of users are compared, identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result, when there being identical file to be stored in file reception end, match the user that the groups of users mapped with the same file found out is supplied to current upload file.
In order to reach a better technique effect further, preferably, this groups of users matching module 112 is also for detect and whether the user analyzing current upload file selects to add the groups of users matched, when the user of current upload file selects to add the groups of users matched, the user authorizing current upload file accesses the authority of the groups of users matched the user of current upload file to be added the groups of users matched.In this preferred version, this groups of users matching module 112 provides options to select whether add the groups of users matched for user.
Embodiment two:
This groups of users matching system 11 is all user's match user groups of upload file according to the All Files that user uploads.
This cryptographic hash computing module 111, for obtaining the cryptographic hash of the All Files that user uploads.Described cryptographic hash can be such as MD5 value and/or SHA1 value.If when the file that user uploads has had a corresponding cryptographic hash, then this cryptographic hash computing module 111 extracting directly has gone out the cryptographic hash of user's upload file; If when the file having user to upload does not have a corresponding cryptographic hash, then this cryptographic hash computing module 111 directly calculates the cryptographic hash of the upload file not having corresponding cryptographic hash.
It should be noted that, the mode that this cryptographic hash computing module 111 calculates the cryptographic hash of the file that user uploads has multiple, sets forth the cryptographic hash of this cryptographic hash computing module 111 how calculation document below with two examples:
Example one: the cryptographic hash of calculation document full content.It is emphasized that the cryptographic hash computing velocity of this embodiment is slower relative to following example two when calculating relatively large file.
Example two: whether the size of Study document is greater than pre-set threshold value; When the size of file is greater than pre-set threshold value, from file, extract content according to the rule preset, and the content calculating cryptographic hash for extracting; When the size of file is less than or equal to pre-set threshold value, for file full content calculates cryptographic hash.
Described default rule can be: the content of file is divided into more than two deciles (such as, being divided into 5 deciles); Afterbody in the content of each decile extracts content and the size sum of all extraction contents equals the above-mentioned pre-set threshold value (content size of extraction, such as, the content size that the afterbody of the content of first decile extracts is A, the content size that the afterbody of the content of second decile extracts is B, the content size that the afterbody of the content of the 3rd decile extracts is C, the content size that the afterbody of the content of the 4th decile extracts is D, the content size that the afterbody of the content of the 5th decile extracts is E, and above-mentioned pre-set threshold value=A+B+C+D+E).
Described default rule can also be: the content of file is divided into more than two deciles (such as, being divided into 5 deciles), afterbody in the content of last decile extracts content, stem in other deciles extracts content, and the size sum of all extraction contents equals the above-mentioned pre-set threshold value (content size of extraction, such as, the content size that the stem of the content of first decile is extracted is A, the content size that the stem of the content of second decile is extracted is B, the content size that the stem of the content of the 3rd decile is extracted is C, the content size that the stem of the content of the 4th decile is extracted is D, the content size that the afterbody of the content of the 5th decile extracts is E, and above-mentioned pre-set threshold value=A+B+C+D+E).
Described default rule can also be other any suitable contents extraction rules, two concrete examples of the described default rule more than provided are non exhaustive row, and those skilled in the art can expect other any suitable equivalent contents extraction rules easily with reference to the example of described default rule.
This groups of users matching module 112, for comparing in the cryptographic hash obtained, identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result, when there being identical file to be stored in file reception end, matching the groups of users mapped with the same file found out and being supplied to and uploading this same file but the user also not adding the groups of users matched.
In order to reach a better technique effect further, preferably, this groups of users matching module 112 also uploads this same file but whether the user also not adding the groups of users matched selects to add the groups of users matched for detecting and analyzing, upload this same file but also do not add the groups of users matched user select add the groups of users matched time, authorize and upload this same file but the user also not adding the groups of users matched accesses the authority of the groups of users matched, so that will this same file be uploaded but the user also not adding the groups of users matched adds the groups of users matched.In this preferred version, this groups of users matching module 112 provides options to select whether add the groups of users matched for user.
As shown in Figure 5, be the concrete implementing procedure figure of a groups of users matching process of the present invention preferred embodiment.
It is emphasized that: process flow diagram shown in Fig. 5 is only a preferred embodiment, those skilled in the art is when knowing, any embodiment built around inventive concept should not depart from the scope contained in following technical scheme:
By the file set up mapping relations that user each in groups of users and groups of users uploads; Obtain the cryptographic hash of the current file uploaded of user; The cryptographic hash of acquisition and the cryptographic hash of file that maps with each groups of users are compared; Identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result; When there being identical file to be stored in file reception end, match the user that the groups of users mapped with the same file found out is supplied to current upload file.
It is below the user's match user group being progressively embodied as current upload file in conjunction with the present embodiment.
Step S10, these mapping relations set up the file set up mapping relations that user each in groups of users and groups of users uploads by module 110.Such as, the file that file, " reporter C " that the file " reporter A " uploaded, " reporter B " are uploaded upload,,,, set up mapping relations with groups of users " reporter group 221 ".
Step S11, this cryptographic hash computing module 111 obtains the cryptographic hash of the current file uploaded of user.
Step S13, the cryptographic hash of acquisition and the cryptographic hash of file that maps with each groups of users are compared by this groups of users matching module 112.
Step S15, whether this groups of users matching module 112 has identical file to be stored in file reception end according to the analysis of cryptographic hash comparison result.
When there being identical file to be stored in file reception end, proceed to and perform following step S16, or when not having identical file to be stored in file reception end, flow process terminating.
Step S16, this groups of users matching module 112 matches the user that the groups of users mapped with the same file found out is supplied to current upload file.
Step S17, this groups of users matching module 112 is detected and whether the user analyzing current upload file selects to add the groups of users matched.
When the user of current upload file selects to add the groups of users matched, proceed to and perform following step S18, or when the user of current upload file does not add the groups of users matched, flow process terminates.
Step S18, the user that this groups of users matching module 112 authorizes current upload file accesses the authority of the groups of users matched the user of current upload file to be added the groups of users matched.
As shown in Figure 6, be the concrete implementing procedure figure of another preferred embodiment of groups of users matching process of the present invention.
It is emphasized that: process flow diagram shown in Fig. 6 is only a preferred embodiment, those skilled in the art is when knowing, any embodiment built around inventive concept should not depart from the scope contained in following technical scheme:
By the file set up mapping relations that user each in groups of users and groups of users uploads; Obtain the cryptographic hash of the All Files that user uploads; Compare in the cryptographic hash obtained; Identical file whether is had to be stored in file reception end according to the analysis of cryptographic hash comparison result; When there being identical file to be stored in file reception end, matching the groups of users mapped with the same file found out and being supplied to and uploading this same file but the user also not adding the groups of users matched.
Below all user's match user groups being progressively embodied as upload file in conjunction with the present embodiment.
Step S20, these mapping relations set up the file set up mapping relations that user each in groups of users and groups of users uploads by module 110.Such as, the file that file, " reporter C " that the file " reporter A " uploaded, " reporter B " are uploaded upload,,,, set up mapping relations with groups of users " reporter group 221 ".
Step S21, this cryptographic hash computing module 111 obtains the cryptographic hash of the All Files that user uploads.
Step S23, this groups of users matching module 112 is compared in the cryptographic hash obtained.
Step S25, whether this groups of users matching module 112 has identical file to be stored in file reception end according to the analysis of cryptographic hash comparison result.
When there being identical file to be stored in file reception end, proceed to and perform following step S26, or when not having identical file to be stored in file reception end, flow process terminating.
Step S26, this groups of users matching module 112 matches the groups of users mapped with the same file found out and is supplied to and uploads this same file but the user also not adding the groups of users matched.
Step S27, this groups of users matching module 112 is detected and is analyzed and uploads this same file but whether the user also not adding the groups of users matched selects to add the groups of users matched.
Upload this same file but also do not add the groups of users matched user select add the groups of users matched time, proceed to and perform following step S28, or, when uploading this same file but the user also not adding the groups of users matched does not add the groups of users matched, flow process terminates.
Step S28, this groups of users matching module 112 is authorized and is uploaded this same file but the user also not adding the groups of users matched accesses the authority of the groups of users matched, will upload this same file but the user also not adding the groups of users matched adds the groups of users matched.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.