CN105740299A - Method and apparatus for network relation recognition, and server - Google Patents

Method and apparatus for network relation recognition, and server Download PDF

Info

Publication number
CN105740299A
CN105740299A CN201410771495.8A CN201410771495A CN105740299A CN 105740299 A CN105740299 A CN 105740299A CN 201410771495 A CN201410771495 A CN 201410771495A CN 105740299 A CN105740299 A CN 105740299A
Authority
CN
China
Prior art keywords
user
key assignments
main body
identified
cyberrelationship
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410771495.8A
Other languages
Chinese (zh)
Other versions
CN105740299B (en
Inventor
洪满伙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410771495.8A priority Critical patent/CN105740299B/en
Publication of CN105740299A publication Critical patent/CN105740299A/en
Application granted granted Critical
Publication of CN105740299B publication Critical patent/CN105740299B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a method and an apparatus for network relation recognition, and a server. The method comprises the steps of obtaining a first body and a second body of a to-be-recognized network relation; querying a first key value corresponding to the first body and querying a second key value corresponding to the second body from a key vale storage database corresponding to the first body and the second body; and when the first key and the second key value comprise the same information, determining that the first body and the second body have the network relation. By adoption of the embodiments of the invention, the query rate per second can be lowered, the storage space can be reduced, and the real-time property of the network application is also improved.

Description

Identify the method for cyberrelationship, device and server
Technical field
The application relates to network communication technology field, particularly relates to the identification method of cyberrelationship, device and server.
Background technology
Along with the fast development of the Internet and popularizing of network application, many users create substantial amounts of network application data by different terminal units, and also leave substantial amounts of interactive data information between user and user.Therefore, the cyberrelationship how effectively and rapidly to identify between user and terminal unit and user and user then becomes particularly important, and then can ensure the safety of network application according to this cyberrelationship.
In prior art, identify that the method for cyberrelationship is generally adopted iterative query and knows method for distinguishing.This iterative query refers to, first look for the good friend in the relational network of user, then for each good friend, iteration successively, inquire the common end device of each good friend, thus all terminal units obtained in the relational network of user, finally, all terminal units in the relational network of user inquire about terminal unit to be identified, if inquiring, then judge that user and terminal unit to be identified exist network associate, otherwise, then judge that user and terminal unit to be identified are absent from network associate.
But, when the relational network of user is more complicated, utilize iterative query identification then to make iterations be greatly increased, can cause that query rate per second (QueryPerSecond, QPS) is unprecedented soaring, have a strong impact on the real-time of network application.
Summary of the invention
The application provides the identification method of cyberrelationship, device and server, to solve in prior art when the relational network of user is more complicated, utilize iterative query identification then to make iterations be greatly increased, can cause that QPS is unprecedented soaring, the problem having a strong impact on the real-time of network application.
First aspect according to the embodiment of the present application, it is provided that a kind of method identifying cyberrelationship, described method includes:
Obtain the first main body and second main body of cyberrelationship to be identified;
The key assignments storage data base that described first main body is corresponding with the second main body inquires about the first key assignments corresponding to described first main body and inquires about the second key assignments that described second main body is corresponding;
When described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship.
Second aspect according to the embodiment of the present application, it is provided that a kind of device identifying cyberrelationship, described device includes:
Acquiring unit, for obtaining the first main body and second main body of cyberrelationship to be identified;
Query unit, for inquiring about the first key assignments corresponding to described first main body and inquire about the second key assignments that described second main body is corresponding in the key assignments storage data base corresponding with the second main body in described first main body;
Identifying unit, for when described first key assignments includes identical information with described second key assignments, then judging that described first main body and described second main body have cyberrelationship.
The third aspect according to the embodiment of the present application, it is provided that server, including:
Processor;For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Obtain the first main body and second main body of cyberrelationship to be identified;
The key assignments storage data base that described first main body is corresponding with the second main body inquires about the first key assignments corresponding to described first main body and inquires about the second key assignments that described second main body is corresponding;
When described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship.
In the embodiment of the present application, by obtaining the first main body and second main body of cyberrelationship to be identified, and inquire about the first key assignments corresponding to the first main body and inquire about the second key assignments that the second main body is corresponding in the key assignments storage data base that the first main body is corresponding with the second main body, when the first key assignments and the second key assignments include identical information, then judge that the first main body and the second main body have cyberrelationship, thus reducing QPS, saving memory space, also improve the real-time of network application.
Accompanying drawing explanation
Fig. 1 is the scene schematic diagram identifying cyberrelationship of the embodiment of the present application;
Fig. 2 is an embodiment flow chart of the method for the application identification cyberrelationship;
Fig. 3 is another scene schematic diagram identifying cyberrelationship of the embodiment of the present application;
Fig. 4 is another scene schematic diagram identifying cyberrelationship of the embodiment of the present application;
Fig. 5 is another scene schematic diagram identifying cyberrelationship of the embodiment of the present application;
Fig. 6 is an embodiment block diagram of the device of the application identification cyberrelationship;
Fig. 7 is another embodiment block diagram of the device of the application identification cyberrelationship.
Detailed description of the invention
Here in detail exemplary embodiment being illustrated, its example representation is in the accompanying drawings.When as explained below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the application.On the contrary, they only with in appended claims describe in detail, the application some in the example of consistent apparatus and method.
It is only merely for the purpose describing specific embodiment at term used in this application, and is not intended to be limiting the application." one ", " described " and " being somebody's turn to do " of the singulative used in the application and appended claims is also intended to include most form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and comprises any or all of one or more project of listing being associated and be likely to combination.
Although should be appreciated that and be likely to adopt term first, second, third, etc. to describe various information in the application, but these information should not necessarily be limited by these terms.These terms are only used for being distinguished from each other out same type of information.Such as, when without departing from the application scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as the first information.Depend on linguistic context, word as used in this " if " can be construed to " ... time " or " when ... " or " in response to determining ".
Referring to Fig. 1, for the scene schematic diagram identifying cyberrelationship of the embodiment of the present application.
Fig. 1 scene includes: user and terminal unit.Wherein, terminal unit can include various smart mobile phone, panel computer, PC (PersonalComputer, personal computer) etc..
Whether the purpose of the embodiment of the present application is to identify to have between cyberrelationship or user and user and whether have cyberrelationship between user and terminal unit.
When whether there is cyberrelationship between identification user and terminal unit, the relational network of user can be utilized, this relational network includes the good friend of user and the common equipment of good friend, if terminal unit to be identified is the common equipment of good friend, then user and terminal unit have cyberrelationship;If terminal unit to be identified is not the common equipment of good friend, then user and terminal unit do not have cyberrelationship.
When whether there is cyberrelationship between identification user and user, two users can be utilized whether to belong to consolidated network judge, if two users belong to consolidated network, then between two users, there is cyberrelationship, if two users of fruit are not belonging to consolidated network, then between two users, not there is cyberrelationship.
The iterative query method adopted in prior art identifies whether whether have between cyberrelationship or user and user between user and terminal unit has cyberrelationship, and the embodiment of the present application adopts space-time balance network relation recognition method identify, namely by twice parallel inquiry, and judge whether whether have between cyberrelationship or user and user between user and terminal unit has cyberrelationship according to Query Result, thus reducing QPS, saving memory space, also improve the real-time of network application.
Referring to Fig. 2, an embodiment flow chart for the method for the application identification cyberrelationship, the method can be applied on the webserver, and is capable of identify that between user and terminal unit whether have between cyberrelationship or user and user and whether have cyberrelationship, and described method includes:
Step 210: obtain the first main body and second main body of cyberrelationship to be identified.Wherein, the first main body can be user to be identified, and the second main body can be terminal unit to be identified, it is therefore an objective to identify whether have cyberrelationship between user and terminal unit;Or, the first main body is first user that can be to be identified, and the second main body is the second user to be identified, it is therefore an objective to identify whether have cyberrelationship between user.
Step 220: inquire about the first key assignments corresponding to described first main body and inquire about the second key assignments that described second main body is corresponding in the key assignments storage data base that the first main body is corresponding with the second main body.
Difference in the embodiment of the present application, according to the first main body and the second main body, it is possible to have inquiry modes different as follows:
First kind of way, when the first main body is user, and the second main body is terminal unit, now corresponding key assignments storage data base can include the first key assignments storage subdata base and the second key assignments storage subdata base.Wherein, the first key assignments storage subdata base includes the association user of user and this user, and the first key assignments storage subdata base includes the use user of terminal unit and this terminal unit.It addition, the first key assignments storage subdata base and the second key assignments storage subdata base may not be two subdata bases of key assignments storage data base, but two independent data bases.Here, simply for two subdata bases, concrete query script is described.
Store the association user inquiring about user to be identified in subdata base at the first key assignments, and the relevant user inquired is formed the first key assignments;And, store the use user inquiring about terminal unit to be identified in subdata base at the second key assignments, and all use users inquired are formed described second key assignments.
Such as: the first main body is user A, store the association user and good friend A, good friend B, good friend C and the good friend D that inquire user A in subdata base at the first key assignments, then this good friend A, good friend B, good friend C and good friend D form the first key assignments;Second main body is terminal unit X, stores the use user and the good friend B and good friend F that inquire terminal unit X in subdata base at the second key assignments, then good friend B and good friend F forms the second key assignments.
Additionally, when storing, at the first key assignments, the association user not inquiring user to be identified in subdata base, the first key assignments then obtained is that namely empty set does not include any information, or store the use user not inquiring user to be identified in subdata base at the second key assignments, then the second key assignments obtained is that namely empty set does not include any information.
The second way, when the first main body is first user, and the second main body is the second user, now corresponding key assignments storage data base includes the label of all users and each user being in consolidated network.Storing in data base at this key assignments is also store with Key-Value form, and the network user is Key, and the label of this network user is Value, and, the label of all users being in consolidated network is all identical.Wherein, this label can be value set in advance, such as: 1.
Store the label of data base querying first user at key assignments, the label of this first user is the first key assignments;And, the label inquiring about the second user in data base is stored at key assignments, the label of this second user is the second key assignments.Such as, the label of all users being in consolidated network is all set as 1, then the first key assignments and the second key assignments that inquire are all 1.
It addition, do not inquire the label of first user when storing data base at key assignments, then the first key assignments obtained is that namely empty set does not include any information;Do not inquire the label of the second user when storing data base at key assignments, then the second key assignments obtained is that namely empty set does not include any information.
Step 230: when the first key assignments includes identical information with described second key assignments, then judge that the first main body and the second main body have cyberrelationship.Wherein, when when the first key assignments is empty set and/or the second key assignments is empty set, then directly judging that the first main body and the second main body do not have cyberrelationship.
Difference in the embodiment of the present application, according to the first main body and the second main body, it is possible to have decision procedures different as follows:
First kind of way, when the first main body is user, when second main body is terminal unit, association user in first key assignments and the use user in the second key assignments are compared, when at least one association user is identical with using user, then judge that user to be identified and terminal unit to be identified have cyberrelationship.
Such as: the first main body is user A, storing the association user inquiring in the first key assignments in subdata base at the first key assignments is good friend A, good friend B, good friend C and good friend D;Second main body is terminal unit X, storing, at the second key assignments, the use user inquired in the second key assignments in subdata base is good friend B and good friend F, above-mentioned good friend A, good friend B, good friend C and good friend D and good friend B and good friend F are compared one by one, find that good friend B is the association user of user A, it is again the use user of terminal unit X, then judges that user A and terminal unit X has cyberrelationship.
It addition, when the first key assignments be empty set namely do not include any information and/or the second key assignments be empty set namely do not include any information time, then directly judge that user and terminal unit do not have cyberrelationship.
The second way, when the first main body is first user, and the second main body is the second user, the label of the label of first user and the second user is compared, when the label of first user and the label of the second user are identical, then judge that first user and the second user have cyberrelationship.
It addition, when the first key assignments be empty set namely do not include any information and/or the second key assignments be empty set namely do not include any information time, then directly judge that first user and the second user do not have cyberrelationship.
As seen from the above-described embodiment, user all stores with key assignments form with the use user associating user and terminal unit and this terminal unit of this user, it is thus only necessary to twice inquiry and according to Query Result it is determined that whether there is cyberrelationship between user and terminal unit;Or, all users of consolidated network and the label of user store with key assignments form, need only to twice inquiry and according to Query Result it is determined that whether there is cyberrelationship between user and another user, thus reducing QPS, saving memory space, also improve the real-time of network application.
Further, the method for the application identification cyberrelationship also includes: set up key assignments storage data base.Wherein, this key assignments storage data base can carry out, according to the difference of the first main body and the second main body, the data base that sets up, it is also possible to utilizes the data base corresponding with this first main body and the second main body pre-build.
Wherein, the difference according to the first main body and the second main body, it is possible to have and different as follows set up mode:
First kind of way, when the first main body is user, and the second main body is terminal unit, the storage data base of foundation can include the first key assignments storage subdata base and the second key assignments storage subdata base.
Wherein, the first key assignments storage subdata base includes the association user of user and this user, and user is Key, and the association user of this user-association is Value;Second key assignments storage subdata base includes the use user of terminal unit and this terminal unit, and terminal unit is Key, and the use user of this terminal unit is Value.
The second way, when the first main body is first user, and the second main body is the second user, the key assignments storage data base of foundation includes the label of all users and the described user being in consolidated network, and user is Key, and the label of user is Value.Wherein, the label of all users being positioned at consolidated network is all identical.Such as, all labels are all set to 1.
The above-mentioned user being in consolidated network can be the good friend of same user, it is also possible to be the employee etc. of same company.
Referring to Fig. 3, for the scene schematic diagram identifying cyberrelationship of the embodiment of the present application.This scene schematic diagram presents the simple procedure whether between identification terminal equipment X and user A with cyberrelationship.
Fig. 3 scene includes: user's friend relation to and equipment user's relation pair.Wherein, user's friend relation is to referring to user A, and the association user good friend A of user A, good friend B, good friend C and good friend D;User B, and the association user good friend E and good friend F etc. of user B.Equipment user's relation is to referring to terminal unit 11, and good friend A;Terminal unit X, and good friend B and good friend F.
Based on user's friend relation to setting up a data base, including the association user of user He this user-association, and storing with key assignments (Key-Value) form, user is Key, and the association user of this user-association is Value.Such as, the association user of user A and user A is stored in data base with Key-Value form, then can inquire association user and good friend A, good friend B, good friend C and the good friend D of this user A in this data base according to user A.
Based on equipment user's relation to setting up another data base, including the use user of terminal unit He this terminal unit, being also store with Key-Value form, terminal unit is Key, and the use user of this terminal unit is Value.Such as, the use user of terminal unit X and this terminal unit X and good friend B and good friend F are stored in this another data base with Key-Value form, then can inquire terminal unit X and good friend B and the good friend F of this terminal unit X in this another data base according to terminal unit X.Wherein, the user that uses of this terminal unit refers to the use user of this terminal unit commonly used, i.e. conventional user.
Above-mentioned two data base can be two independent data bases, it is also possible to is two subdata bases in a data base.
When judging whether to there is cyberrelationship between user A and terminal unit X, the good friend A, good friend B, good friend C and the good friend D that associate with user A can be inquired in an above-mentioned data base, and in another data base, inquire use user and the good friend B and good friend F of terminal unit X.The use user of the user A good friend associated and terminal unit X is compared one by one, obtains the good friend that good friend B is user A association more afterwards, be again the use user of terminal unit X, then judge that user A and terminal unit X has cyberrelationship;If not obtaining is the user A good friend associated, when being again the use user of terminal unit X, then judge that user A and terminal unit X does not have cyberrelationship.
As seen from the above-described embodiment, user's friend relation to and equipment user's relation to all storing with key assignments form, need only to twice inquiry and according to Query Result it is determined that whether there is cyberrelationship between user and terminal unit, QPS is greatly reduced compared with iterative query method of the prior art, with the user of traditional exhaustive method and good friend's device relationships to compared with, greatly reduce storage data volume, thus saving memory space, and better assure that the real-time of network application.
Below for Fig. 4 customer relationship network scenarios provided, calculate storage data volume when using user to store with key assignments form of the terminal unit in the embodiment of the present application and this terminal unit respectively, and in traditional exhaustive method with user and good friend's equipment for relation to storage data volume when storing.
Referring to Fig. 4, for another scene schematic diagram of the embodiment of the present application identification cyberrelationship:
Fig. 4 scene includes: the terminal unit 1 that user 1 and user 1 use;User 2, and user 1 use terminal unit 1;The terminal unit 3 that user 3 and user 3 use;The terminal unit 4 that user 4 and user 4 use;User 5, and user 5 use terminal unit 5;The terminal unit 6 that user 6 and user 6 use.Wherein, user 6 and user 2 are the good friends of user 1.And analogize, each user all has two good friends.
Storage data when storing with key assignments form are specifically included by the use user of the terminal unit in the embodiment of the present application and this terminal unit i.e. relation of (terminal unit, use user):
(terminal unit 1, user 1);
(terminal unit 2, user 2);
(terminal unit 3, user 3);
(terminal unit 4, user 4);
(terminal unit 5, user 5);
(terminal unit 6, user 6).
And in traditional exhaustive method with user and good friend's equipment namely (user, good friend's equipment) stores time storage data specifically include:
(user 1, terminal unit 2);
(user 1, terminal unit 6);
(user 2, terminal unit 1);
(user 2, terminal unit 3);
(user 3, terminal unit 2);
(user 3, terminal unit 4).
(user 4, terminal unit 3);
(user 4, terminal unit 5);
(user 5, terminal unit 4);
(user 5, terminal unit 5);
(user 6, terminal unit 1);
(user 6, terminal unit 5).
As seen from the above-described embodiment, the embodiment of the present application need the data of storage far less than the data needing storage in traditional exhaustive method, thus greatly reducing storage data volume, thus saving memory space.
Referring to Fig. 5, for the scene schematic diagram identifying cyberrelationship of the embodiment of the present application.This scene schematic diagram presents and identifies the simple procedure whether between user A and user B with cyberrelationship.
All users based on consolidated network can set up a data base, and this data base includes the label of user and this user, and stores with Key-Value form, and user is Key, and the label of user is Value.Such as, the label A of user A and user A is stored in data base with Key-Value form, then can inquire the label A of this user A in this data base according to user A.Wherein, the label of user can be the value preset in advance, and such as, the label of all users being in consolidated network is 1.
When judging whether to there is cyberrelationship between user A and user B, above-mentioned data base inquires about the label A of user A and the label B of inquiry user B, the label B of the label A of user A and user B is compared, when the two is identical, then judges that user A and user B has cyberrelationship.When the label B of the label A inquired about in above-mentioned data base less than user A or user B, then judge that user A and user B does not have cyberrelationship.
As seen from the above-described embodiment, all users of consolidated network and the label of user store with key assignments form, need only to twice inquiry and according to Query Result it is determined that whether there is cyberrelationship between user and another user, thus reducing QPS, saving memory space, also improve the real-time of network application.
Corresponding with the embodiment of the method for the application identification cyberrelationship, present invention also provides the embodiment of the device identifying cyberrelationship.
The present invention verifies that the embodiment of the device of business operation safety can be applied on terminal or service server respectively.Device embodiment can be realized by software, it is also possible to is realized by the mode of hardware or software and hardware combining.Implemented in software for example, as the device on a logical meaning, it is that computer program instructions corresponding in nonvolatile memory is read to run in internal memory and formed by the CPU by its place equipment.Say from hardware view; as shown in Figure 6; a kind of hardware structure diagram for the device place equipment of identification cyberrelationship of the present invention; except the CPU shown in Fig. 6, internal memory, network interface and nonvolatile memory; in embodiment, the equipment at device place generally can also include other hardware, and this Fig. 6 is no longer shown respectively.
Referring to Fig. 6, for an embodiment block diagram of the device of the application identification cyberrelationship, this device can be applied on the webserver, it is possible to for performing Fig. 2 method identifying cyberrelationship provided.This device includes: acquiring unit 61, query unit 62 and identifying unit 63.
Wherein, acquiring unit 61 is for obtaining the first main body and second main body of cyberrelationship to be identified;
Query unit 62 is for inquiring about the first key assignments corresponding to described first main body and inquire about the second key assignments that described second main body is corresponding in the key assignments storage data base corresponding with the second main body in described first main body;
Identifying unit 63 is for when described first key assignments includes identical information with described second key assignments, then judging that described first main body and described second main body have cyberrelationship.
In an optional implementation: this device also includes first and sets up unit (not shown in Fig. 6).
Wherein, first sets up unit for setting up described key assignments storage data base, and described storage data base includes the first key assignments storage subdata base and the second key assignments storage subdata base;Wherein, described first key assignments storage subdata base includes the association user of user and described user, and described second key assignments storage subdata base includes the use user of terminal unit and described terminal unit.
And, described query unit 62 is additionally operable to inquire about the association user of described user to be identified in described first key assignments storage subdata base, described in the relevant user that inquires form described first key assignments;And, in described second key assignments storage subdata base, inquire about the use user of described user to be identified, described in all use users of inquiring form described second key assignments.
Described identifying unit 63 is additionally operable to compare the association user in described first key assignments and the use user in described second key assignments, when at least one association user is identical with using user, then judge that described user to be identified and described terminal unit to be identified have cyberrelationship.
In another optional implementation: this device also includes second and sets up unit (not shown in Fig. 6).
Wherein, second sets up unit for setting up described key assignments storage data base, and described first key assignments storage data base includes the label of all users and the described user being in consolidated network, and wherein, the label of all users of described consolidated network is all identical.
And, described query unit 62 is additionally operable to store, at described key assignments, the label inquiring about described first user to be identified in data base, and the label of described first user is described first key assignments;And, the label inquiring about described second user to be identified in data base is stored at described key assignments, the label of described second user is described second key assignments.
Described identifying unit 63 is additionally operable to when the label of described first user is identical with the label of described second user, then judge that described first user to be identified and described second user to be identified have cyberrelationship.
What in said apparatus, the function of unit and the process that realizes of effect specifically referred in said method corresponding step realizes process, does not repeat them here.
For device embodiment, owing to it corresponds essentially to embodiment of the method, so relevant part illustrates referring to the part of embodiment of the method.Device embodiment described above is merely schematic, the wherein said unit illustrated as separating component can be or may not be physically separate, the parts shown as unit can be or may not be physical location, namely may be located at a place, or can also be distributed on multiple NE.Some or all of module therein can be selected according to the actual needs to realize the purpose of the application scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
The embodiment of the present application additionally provides a kind of server, and this server includes:
Processor;For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Obtain the first main body and second main body of cyberrelationship to be identified;
The key assignments storage data base that described first main body is corresponding with the second main body inquires about the first key assignments corresponding to described first main body and inquires about the second key assignments that described second main body is corresponding;
When described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship.
As seen from the above-described embodiment, when identify whether there is cyberrelationship between the first main body and the second main body time, can pass through to inquire about the first key assignments corresponding to the first main body and inquire about the second key assignments that the second main body is corresponding in the key assignments storage data base that the first main body is corresponding with the second main body, and need only to twice inquiry and according to Query Result it is determined that whether there is cyberrelationship between the first main body and the second main body, thus reducing QPS, saving memory space, also improve the real-time of network application.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to other embodiment of the application.The application is intended to any modification of the application, purposes or adaptations, and these modification, purposes or adaptations are followed the general principle of the application and include the undocumented known general knowledge in the art of the application or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the application and spirit are pointed out by claim below.
It should be appreciated that the application is not limited to precision architecture described above and illustrated in the accompanying drawings, and various amendment and change can carried out without departing from the scope.Scope of the present application is only limited by appended claim.

Claims (15)

1. the method identifying cyberrelationship, it is characterised in that described method includes:
Obtain the first main body and second main body of cyberrelationship to be identified;
The key assignments storage data base that described first main body is corresponding with the second main body inquires about the first key assignments corresponding to described first main body and inquires about the second key assignments that described second main body is corresponding;
When described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship.
2. method according to claim 1, it is characterised in that described first main body is user to be identified, and described second main body is terminal unit to be identified, and described method also includes:
Setting up described key assignments storage data base, described storage data base includes the first key assignments storage subdata base and the second key assignments storage subdata base;Wherein, described first key assignments storage subdata base includes the association user of user and described user, and described second key assignments storage subdata base includes the use user of terminal unit and described terminal unit.
3. method according to claim 2, it is characterised in that described storage in data base at key assignments inquires about the first key assignments corresponding to described first main body and the second key assignments corresponding to described second main body specifically includes:
Described first key assignments storage subdata base inquires about the association user of described user to be identified, described in the relevant user that inquires form described first key assignments;And, in described second key assignments storage subdata base, inquire about the use user of described user to be identified, described in all use users of inquiring form described second key assignments.
4. method according to claim 3, it is characterised in that described when described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship and specifically include:
Association user in described first key assignments and the use user in described second key assignments are compared, when at least one association user is identical with using user, then judges that described user to be identified and described terminal unit to be identified have cyberrelationship.
5. method according to claim 1, it is characterised in that described first main body is first user to be identified, and described second main body is the second user to be identified, and described method also includes:
Setting up described key assignments storage data base, described first key assignments storage data base includes the label of all users and the described user being in consolidated network, and wherein, the label of all users of described consolidated network is all identical.
6. method according to claim 5, it is characterised in that described storage in data base at key assignments inquires about the first key assignments corresponding to described first main body and the second key assignments corresponding to described second main body specifically includes:
Store the label inquiring about described first user to be identified in data base at described key assignments, the label of described first user is described first key assignments;And, the label inquiring about described second user to be identified in data base is stored at described key assignments, the label of described second user is described second key assignments.
7. method according to claim 6, it is characterised in that described when described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship and specifically include:
When the label of described first user is identical with the label of described second user, then judge that described first user to be identified and described second user to be identified have cyberrelationship.
8. the device identifying cyberrelationship, it is characterised in that described device includes:
Acquiring unit, for obtaining the first main body and second main body of cyberrelationship to be identified;
Query unit, for inquiring about the first key assignments corresponding to described first main body and inquire about the second key assignments that described second main body is corresponding in the key assignments storage data base corresponding with the second main body in described first main body;
Identifying unit, for when described first key assignments includes identical information with described second key assignments, then judging that described first main body and described second main body have cyberrelationship.
9. device according to claim 8, it is characterised in that described device also includes:
First sets up unit, is used for setting up described key assignments storage data base, and described storage data base includes the first key assignments storage subdata base and the second key assignments storage subdata base;Wherein, described first key assignments storage subdata base includes the association user of user and described user, and described second key assignments storage subdata base includes the use user of terminal unit and described terminal unit.
10. device according to claim 9, it is characterised in that described query unit is additionally operable to inquire about the association user of described user to be identified in described first key assignments storage subdata base, described in the relevant user that inquires form described first key assignments;And, in described second key assignments storage subdata base, inquire about the use user of described user to be identified, described in all use users of inquiring form described second key assignments.
11. device according to claim 10, it is characterized in that, described identifying unit is additionally operable to compare the association user in described first key assignments and the use user in described second key assignments, when at least one association user is identical with using user, then judge that described user to be identified and described terminal unit to be identified have cyberrelationship.
12. device according to claim 8, it is characterised in that described device also includes:
Second sets up unit, is used for setting up described key assignments storage data base, and described first key assignments storage data base includes the label of all users and the described user being in consolidated network, and wherein, the label of all users of described consolidated network is all identical.
13. device according to claim 12, it is characterised in that described query unit is additionally operable to store, at described key assignments, the label inquiring about described first user to be identified in data base, and the label of described first user is described first key assignments;And, the label inquiring about described second user to be identified in data base is stored at described key assignments, the label of described second user is described second key assignments.
14. device according to claim 13, it is characterized in that, described identifying unit is additionally operable to when the label of described first user is identical with the label of described second user, then judge that described first user to be identified and described second user to be identified have cyberrelationship.
15. a server, it is characterised in that including:
Processor;For storing the memorizer of described processor executable;
Wherein, described processor is configured to:
Obtain the first main body and second main body of cyberrelationship to be identified;
The key assignments storage data base that described first main body is corresponding with the second main body inquires about the first key assignments corresponding to described first main body and inquires about the second key assignments that described second main body is corresponding;
When described first key assignments includes identical information with described second key assignments, then judge that described first main body and described second main body have cyberrelationship.
CN201410771495.8A 2014-12-12 2014-12-12 Identify the method, apparatus and server of cyberrelationship Active CN105740299B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410771495.8A CN105740299B (en) 2014-12-12 2014-12-12 Identify the method, apparatus and server of cyberrelationship

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410771495.8A CN105740299B (en) 2014-12-12 2014-12-12 Identify the method, apparatus and server of cyberrelationship

Publications (2)

Publication Number Publication Date
CN105740299A true CN105740299A (en) 2016-07-06
CN105740299B CN105740299B (en) 2019-06-21

Family

ID=56241634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410771495.8A Active CN105740299B (en) 2014-12-12 2014-12-12 Identify the method, apparatus and server of cyberrelationship

Country Status (1)

Country Link
CN (1) CN105740299B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106886581A (en) * 2017-01-26 2017-06-23 中国光大银行股份有限公司 Data network Automated generalization method and device
CN110457593A (en) * 2019-07-29 2019-11-15 平安科技(深圳)有限公司 A kind of analysis method and system, relevant device of user good friend data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080301182A1 (en) * 2005-11-03 2008-12-04 Koninklijke Philips Electronics, N.V. Object-Based Real-Time Information Management Method and Apparatus
CN101499101A (en) * 2009-03-10 2009-08-05 腾讯科技(深圳)有限公司 Method and device for extracting characteristic relationship ring in social network
CN101937547A (en) * 2010-09-15 2011-01-05 宇龙计算机通信科技(深圳)有限公司 Software and/or software information pushing method, system, acquisition device, software shop service system and mobile terminal
CN103002013A (en) * 2012-11-06 2013-03-27 深圳中兴网信科技有限公司 Social music query system and social music query method
CN103164416A (en) * 2011-12-12 2013-06-19 阿里巴巴集团控股有限公司 Identification method and device of user relationship

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080301182A1 (en) * 2005-11-03 2008-12-04 Koninklijke Philips Electronics, N.V. Object-Based Real-Time Information Management Method and Apparatus
CN101499101A (en) * 2009-03-10 2009-08-05 腾讯科技(深圳)有限公司 Method and device for extracting characteristic relationship ring in social network
CN101937547A (en) * 2010-09-15 2011-01-05 宇龙计算机通信科技(深圳)有限公司 Software and/or software information pushing method, system, acquisition device, software shop service system and mobile terminal
CN103164416A (en) * 2011-12-12 2013-06-19 阿里巴巴集团控股有限公司 Identification method and device of user relationship
CN103002013A (en) * 2012-11-06 2013-03-27 深圳中兴网信科技有限公司 Social music query system and social music query method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106886581A (en) * 2017-01-26 2017-06-23 中国光大银行股份有限公司 Data network Automated generalization method and device
CN106886581B (en) * 2017-01-26 2019-10-11 中国光大银行股份有限公司 Data network Automated generalization method and device
CN110457593A (en) * 2019-07-29 2019-11-15 平安科技(深圳)有限公司 A kind of analysis method and system, relevant device of user good friend data
CN110457593B (en) * 2019-07-29 2022-03-04 平安科技(深圳)有限公司 Method and system for analyzing friend data of user and related equipment

Also Published As

Publication number Publication date
CN105740299B (en) 2019-06-21

Similar Documents

Publication Publication Date Title
CN103488528B (en) A kind of Quick Response Code processing method and processing device based on mobile terminal
US8838679B2 (en) Providing state service for online application users
WO2019024496A1 (en) Enterprise recommendation method and application server
CN105929976A (en) Input method-based dynamic expression input method and system
CN110019540A (en) Implementation method, methods of exhibiting and the device of enterprise's map, equipment
CN104579909B (en) Method and equipment for classifying user information and acquiring user grouping information
CN108804516A (en) Similar users search device, method and computer readable storage medium
CN110704476A (en) Data processing method, device, equipment and storage medium
CN105574089A (en) Mapping knowledge domain generation method and device, and object comparison method and device
CN111797134A (en) Data query method and device of distributed database and storage medium
CN102404242B (en) A kind of user profile updating device, electronic equipment and updating method of user information
CN107992210A (en) Input method vocabulary recommends method, intelligent terminal and the device with store function
CN110677506B (en) Network access method, device, computer equipment and storage medium
CN106934679A (en) information matching method and device
CN105630995A (en) Method and system for querying credit
CN105740299A (en) Method and apparatus for network relation recognition, and server
CN112035676B (en) User operation behavior knowledge graph construction method and device
US8230335B2 (en) Enhanced visual representations of company related data and generation of virtual business cards
CN107220283B (en) Data processing method, device, storage medium and electronic equipment
CN110825756B (en) Data synchronization method, device, storage medium and equipment
US9449036B2 (en) Handling an increase in transactional data without requiring relocation of preexisting data between shards
CN103473290B (en) The processing method and processing device of the attribute data of point of interest
CN104281926A (en) Hotel management information system
CN113779616B (en) Method and device for identifying data
CN109636578A (en) Risk checking method, device, equipment and the readable storage medium storing program for executing of credit information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200918

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200918

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.