CN107682250B - Method and equipment for executing social operation - Google Patents
Method and equipment for executing social operation Download PDFInfo
- Publication number
- CN107682250B CN107682250B CN201710973088.9A CN201710973088A CN107682250B CN 107682250 B CN107682250 B CN 107682250B CN 201710973088 A CN201710973088 A CN 201710973088A CN 107682250 B CN107682250 B CN 107682250B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- trust
- social
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application aims to provide a method for executing social operations, wherein the method comprises the following steps: obtaining social operation which is initiated by a first user and related to a second user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship; determining the trust information of the second user to the first user; and when the confidence level information meets the confidence level threshold information, executing the social operation. According to the method and the device, the trust between the users in the non-friend relationship in the social group is evaluated, and based on the trust meeting the trust threshold, the interaction between the users is facilitated, the communication safety between the users is ensured, and the user experience is improved.
Description
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for performing social operations.
Background
Along with the popularization of mobile equipment, the social mode of online communication is also widely concerned in daily life of people, people often establish social groups in social application to interact and communicate, users in the social groups are more, and potential safety hazards or complex operation exist in private interaction of adults in the groups.
Disclosure of Invention
One object of the present application is to provide a method and apparatus for performing social operations.
According to an aspect of the present application, there is provided a method for performing social operations, the method comprising:
obtaining social operation which is initiated by a first user and related to a second user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
determining the trust information of the second user to the first user;
and when the confidence level information meets the confidence level threshold information, executing the social operation.
According to another aspect of the present application, there is provided a method for performing social operations, wherein the method comprises:
determining the trust information of a second user to a first user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
and executing social operation according to the trust information of the second user to the first user.
According to an aspect of the present application, there is provided an apparatus for performing a social operation, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
obtaining social operation which is initiated by a first user and related to a second user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
determining the trust information of the second user to the first user;
and when the confidence level information meets the confidence level threshold information, executing the social operation.
According to an aspect of the present application, there is provided an apparatus for performing a social operation, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform:
determining the trust information of a second user to a first user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
and executing social operation according to the trust information of the second user to the first user.
According to an aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
obtaining social operation which is initiated by a first user and related to a second user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
determining the trust information of the second user to the first user;
and when the confidence level information meets the confidence level threshold information, executing the social operation.
According to another aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
determining the trust information of a second user to a first user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
and executing social operation according to the trust information of the second user to the first user.
Compared with the prior art, the method and the device have the advantages that the trust between the users in the non-friend relationship in the social group is evaluated, if the trust between the two users meets the preset trust threshold, the users in the non-friend relationship can not need verification when performing social operation, the safety of user communication is guaranteed, meanwhile, the complicated process of verification between the non-friend relationships is eliminated, and therefore user experience is greatly improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology for performing social operations according to one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a method for performing social operations, according to another embodiment of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 illustrates an application scenario of the present application, in which a first user and a second user belong to the same social group, but are in a non-friend relationship. When a first user wishes to perform social interaction with a second user, for example, invite the second user to join a new social group, the user equipment corresponding to the first user sends the social operation to network equipment (for example, a social application server), the network equipment side determines the trust information of the second user to the first user, and performs subsequent operation based on the trust information of the first user and the second user, for example, when the trust information between the first user and the second user meets a certain trust threshold, the social operation is executed, otherwise, the social operation is rejected. The method not only simplifies social operation among strange users and improves communication efficiency, but also protects social security of the users and avoids malicious information harassment.
FIG. 2 illustrates a method for performing social operations, including step S11, step S12, and step S13, according to one aspect of the subject application. In step S11, the network device obtains a social operation initiated by a first user with respect to a second user, where the first user and the second user belong to the same social group, and a current user relationship between the first user and the second user is a non-friend relationship; in step S12, the network device determines the trust information of the second user to the first user; in step S13, the network device executes the social operation when the confidence level information satisfies the confidence level threshold information. For example, the first user and the second user belong to the same social group, and the current user relationship of the first user and the second user is a non-friend relationship. The method comprises the steps that a first user holds user equipment and sends the user equipment to network equipment to execute social operation to corresponding equipment of a second user, the network equipment receives the social operation related to the second user and determines the trust degree information of the second user to the first user, and if the trust degree information meets the trust degree threshold information, the network equipment executes the social operation.
For example, a first user holds user equipment, the user equipment installs a social application, the first user initiates a social operation to a second user in the application, a corresponding device of the first user sends the social operation about the second user to the network device, and after receiving the social operation, the network device determines the trust information of the second user to the first user based on group information or user characteristic information of the first user and the second user. If the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes social operation which is initiated by the first user and is related to the second user; and if the trust degree threshold value of the first user and the second user does not meet the preset trust degree threshold value information, the network equipment ignores the social operation.
In some embodiments, the social operations include, but are not limited to: the first user requests the second user to add a friend operation; the first user inviting the second user to join other social groups; the first user sends private chat information to the second user; and the first user sends recommendation information to the second user. For example, a first user requests a second user to add it as a friend; as another example, a first user invites a second user to join other social groups; in another example, the first user sends private chat information to the second user; as another example, the first user sends other friend recommendations or marketing campaigns to the second user.
For example, the corresponding device of the first user sends social operations about the second user to the network device, for example, the first user requests strangers in the same social group that the second user adds to be friends; as another example, a first user invites a stranger in the same social group, a second user, to join other social groups; for another example, the first user sends private chat information to a second user who is a stranger in the same social group, and for another example, the first user sends other friend recommendations or marketing activities to the second user. And after receiving the social operation, the network equipment determines the trust information of the second user to the first user. If the trust information of the second user to the first user meets the preset trust threshold information, the network device executes the social operation, for example, sends a friend adding request, a group invitation, a marketing activity and the like of the first user to the second user, or sends private chat information sent by the first user to the second user. More preferably, if the trust information of the second user to the first user meets the first trust threshold information, the network device forwards the social operation to the second user; if the trust level information of the second user to the first user meets the second trust level threshold information, the network device directly executes the social operation, for example, directly adds the second user to a friend list of the first user, or directly adds the second user to a social group invited by the first user, wherein the second trust level threshold information is greater than the first trust level threshold information.
In some embodiments, the social operation comprises the first user requesting the second user to add a friend operation; in step S13, when the confidence level information satisfies the confidence level threshold information, the network device establishes a friend relationship between the first user and the second user. For example, the social operation includes an operation that the first user requests the second user to add a friend, and if the trust information of the second user to the first user meets the preset trust threshold information, the friend verification operation of the second user is directly skipped, the second user is added to the friend list of the first user, or the first user and the second user are respectively added to the friend list of the other party.
For example, the corresponding device of the first user sends a social operation about the second user to the network device, e.g., the first user requests strangers in the same social group that the second user adds to be friends. And after receiving the social operation, the network equipment determines the trust information of the second user to the first user. If the trust information of the second user to the first user meets the preset trust threshold information, the network device executes the social operation, for example, the network device directly sends the request for adding the friend to the second user. More preferably, if the trust information of the second user to the first user meets the first trust threshold information, the network device forwards the social operation to the second user; if the trust information of the second user to the first user meets the second trust threshold information, the network device directly executes the social operation, for example, directly adds the second user to the friend list of the first user, or respectively adds the first user and the second user to the friend list of the other party.
In some embodiments, the social operation comprises the first user inviting the second user to join other social groups; in step S13, when the confidence level information satisfies the confidence level threshold information, the network device joins the second user to the other social group. For example, the social operation includes that the first user invites the second user to establish or join another social group based on the social group, and if the trust information of the second user to the first user meets the preset trust threshold information, the network device directly skips the group establishment or group adding verification operation of the second user and joins the second user to the social group established or invited by the first user.
For example, a corresponding device of a first user sends social operations to a network device regarding a second user, e.g., the first user invites the second user to establish or join other social groups based on the same social group. And after receiving the social operation, the network equipment determines the trust information of the second user to the first user. If the trust information of the second user to the first user meets the preset trust threshold information, the network device executes the social operation, for example, the network device directly joins the second user to a social group established or invited by the first user. More preferably, if the trust information of the second user to the first user meets the first trust threshold information, the network device forwards the social operation to the second user; if the trust information of the second user to the first user meets the second trust threshold information, the network device will directly join the second user to the social group established or invited by the first user.
In some embodiments, in step S12, the network device determines the second user' S trust information for the first user based on the same social group. For example, the network device determines the trust information of the second user to the first user according to group name information or group chat information of the same social group in which the first user and the second user are located.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After receiving the social operation, the network device determines the trust information of the second user to the first user based on the group name information or the group chat information of the same social group in which the first user and the second user are located, for example, if the frequency of the inter-group interaction in the group chat information is high, the trust information of the second user to the first user is given as high trust information. And if the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes the social operation.
In some embodiments, in step S12, the network device determines group trust information of the same social group according to group name information or group chat information of the same social group; and then, the network equipment determines the trust degree information of the second user to the first user according to the group trust degree information. For example, the network device determines group trust information of the social group based on group name information or group chat information of the same social group, and then determines trust information of the second user to the first user based on the group trust information, for example, if higher group trust information is determined based on the group name information or the group chat information of the social group, the trust information of the second user to the first user is given as higher trust information. More preferably, the network device may further determine, based on the group trust information and in combination with historical interaction information of the first user and the second user in the group, trust information of the second user to the first user. For example, if the network device determines that the group trust level information is higher, and the interaction frequency of the first user and the second user in the group meets the interaction frequency threshold or the average interaction frequency in the group, the trust level information of the second user to the first user is given as higher trust level information.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After receiving the social operation, the network device determines group trust degree information of the social group based on group name information or group chat information of the same social group, and then determines trust degree information of the second user to the first user based on the group trust degree information, for example, if higher group trust degree information is determined based on the group name information or the group chat information of the social group, the trust degree information of the second user to the first user is given as higher trust degree information. More preferably, the network device may further determine, based on the group trust information and in combination with historical interaction information of the first user and the second user in the group, trust information of the second user to the first user. For example, if the network device determines that the group trust level information is higher, and the interaction frequency of the first user and the second user in the group meets the interaction frequency threshold or the average interaction frequency in the group, the trust level information of the second user to the first user is given as higher trust level information. . And if the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes the social operation.
In some embodiments, in step S12, the network device determines group type information of the same social group according to group name information or group chat information of the same social group; and then, the network equipment determines the trust information of the second user to the first user according to the group type information. For example, the network device determines group type information (e.g., a company group, a classmate group, a family group, etc.) of the same social group based on group name information or group chat information of the social group, and then determines trust information of a second user to a first user based on the group type information, for example, if the social group is a company group, a classmate group, or a family group, the trust information of the second user to the first user is given as higher trust information; and if the social group is an unfamiliar group, an industry communication group or a forum group, the second user is given lower trust degree information to the first user. More preferably, the network device may further determine, based on the group type information and in combination with historical interaction information of the first user and the second user in the group, trust information of the second user for the first user. For example, if the social group is a company group, a classmate group, or a family group, and the interaction frequency of the first user and the second user is equal to or exceeds the interaction frequency threshold or the average interaction frequency within the group, the second user is given a higher confidence level information with respect to the trust level information of the first user.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After receiving the social operation, the network device determines group type information (such as a company group, a classmate group, a family group, and the like) of the social group based on group name information or group chat information of the same social group in which the first user and the second user are located, and then determines trust information of the second user to the first user based on the group type information, for example, if the social group is a company group, a classmate group, or a family group, the trust information of the first user and the second user is given as higher trust information; and if the social group is an unfamiliar group, an industry communication group or a forum group, the second user is given lower trust degree information to the first user. More preferably, the network device may further determine, based on the group type information and in combination with historical interaction information of the first user and the second user in the group, trust information of the second user for the first user. For example, if the social group is a company group, a classmate group, or a family group, and the frequency of interaction between the first user and the second user is equal to or exceeds the threshold of the frequency of interaction or the average frequency of interaction within the group, the confidence level information between the first user and the second user is given as higher confidence level information. And if the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes the social operation.
In some embodiments, in step S12, the network device determines the trust information of the first user and the second user according to the user characteristic information of the first user and the second user. For example, the network device may further obtain one or more pieces of user feature information of the first user and the second user, then match the matching information of the first user and the second user in each piece of user feature information, and calculate, according to the matching information of each piece of user feature information and the weight of each piece of user feature information, the trust information of the second user to the first user.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After the network device receives the social operation, the network device may determine the trust degree information based on the user feature information of the first user and the second user, for example, the network device obtains one or more user feature information of the first user and the second user, then matches the matching information of the first user and the second user in each user feature information, and calculates the trust degree information of the second user to the first user according to the matching information of each user feature information and the weight of each user feature information. And if the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes the social operation.
In some embodiments, in step S12, the user characteristic information includes at least any one of: group characteristic information of the first user or the second user; address book information of the first user or the second user; intended friend information of the first user or the second user; the information of the installed application program in the user equipment corresponding to the first user or the second user; geographic location information of the first user or the second user.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After the network device receives the social operation, the network device may determine its trust level information based on the user characteristic information of the first user and the second user, for example, the network device obtains one or more user characteristic information of the first user and the second user, then matching the matching information of the first user and the second user in the characteristic information of each user, calculating to obtain the trust information of the second user to the first user according to the matching information of the characteristic information of each user and the weight of the characteristic information of each user, wherein, the user characteristic information can be group characteristic information of the first user or the second user, can be address book information of the first user or the second user, the intention friend information of the first user or the second user may be application information installed in user equipment corresponding to the first user or the second user, or may be geographical location information of the first user or the second user. And if the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes the social operation.
In some embodiments, in step S12, the network device matches coincidence information of the user feature information of the first user and the second user according to the user feature information of the first user and the second user, determines feature matching information of the first user and the second user based on the coincidence information and the user feature information of the first user, and determines trust information of the second user for the first user according to the feature matching information. For example, the network device matches the same social group to obtain group feature coincidence information according to group feature information of the first user or the second user, obtains group feature matching information based on the group feature coincidence information and the group feature information of the first user, and determines the trust information of the second user to the first user according to the group feature matching information, for example, directly uses the group feature matching as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to numerical mapping of the group feature matching. For another example, the network device matches the common user with the address book information of the first user or the second user to obtain address book feature overlapping information, then obtains address book matching information based on the address book feature overlapping information and the address book feature information of the first user, and determines the trust information of the second user to the first user according to the address book matching information, for example, directly uses the address book matching information as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping of the address book matching. For another example, the network device matches the common user to obtain the intended friend feature coincidence information according to the friend application object information of the first user or the second user, then obtains the intended friend matching information based on the intended friend feature coincidence information and the intended friend feature information of the first user, and determines the trust information of the second user to the first user according to the intended friend matching information, for example, directly matches the intended friend as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping of the intended friend matching. For another example, the network device matches the same installed application program in the user device corresponding to the first user or the second user according to the installed application program information in the user device corresponding to the first user or the second user to obtain application program feature overlapping information, then obtains application program matching information based on the application program feature overlapping information and the application program overlapping feature information of the first user, and determines the trust information of the second user to the first user according to the application program matching information, for example, directly matches the application program as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping matched by the application program. For another example, the network device matches, according to the geographic location information of the first user or the second user, the proportion of the time of the first user in the same geographic location in the day time to obtain geographic location feature coincidence information, then obtains geographic location matching information based on the geographic location feature coincidence information and the geographic location feature information of the first user, and determines the trust information of the second user to the first user according to the geographic location matching information, for example, directly uses the geographic location matching information as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping of the geographic location matching.
In some embodiments, the network device calculates, based on matching and weighting information corresponding to the characteristic trust level information of each group of users, trust level information of the second user to the first user.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After the network device receives the social operation, the network device may determine its trust level information based on the user characteristic information of the first user and the second user. If the user characteristic information comprises any one of the following items: group characteristic information of the first user or the second user; address book information of the first user or the second user; the information of the installed application program in the user equipment corresponding to the first user or the second user; geographic location information of the first user or the second user. For example, the network device matches the same social group to obtain group feature coincidence information according to group feature information of the first user or the second user, then obtains group feature matching information based on the group feature coincidence information and the group feature information of the first user, and determines the trust information of the second user to the first user according to the group feature matching information, for example, directly uses the group feature matching as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to numerical mapping of the group feature matching. For another example, the network device matches the common user with the address book information of the first user or the second user to obtain address book feature overlapping information, then obtains address book matching information based on the address book feature overlapping information and the address book feature information of the first user, and determines the trust information of the second user to the first user according to the address book matching information, for example, directly uses the address book matching information as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping of the address book matching. For another example, the network device matches the common user to obtain the intended friend feature coincidence information according to the friend application object information of the first user or the second user, then obtains the intended friend matching information based on the intended friend feature coincidence information and the intended friend feature information of the first user, and determines the trust information of the second user to the first user according to the intended friend matching information, for example, directly matches the intended friend as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping of the intended friend matching. For another example, the network device matches the same installed application program in the user device corresponding to the first user or the second user according to the installed application program information in the user device corresponding to the first user or the second user to obtain application program feature overlapping information, then obtains application program matching information based on the application program feature overlapping information and the application program overlapping feature information of the first user, and determines the trust information of the second user to the first user according to the application program matching information, for example, directly matches the application program as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping matched by the application program. For another example, the network device matches, according to the geographic location information of the first user or the second user, the proportion of the time of the first user in the same geographic location in the day time to obtain geographic location feature coincidence information, then obtains geographic location matching information based on the geographic location feature coincidence information and the geographic location feature information of the first user, and determines the trust information of the second user to the first user according to the geographic location matching information, for example, directly uses the geographic location matching information as the trust information of the second user to the first user, or obtains the trust information of the second user to the first user according to the numerical mapping of the geographic location matching.
In some embodiments, if the user characteristic information includes at least two of: group characteristic information of the first user or the second user; address book information of the first user or the second user; the information of the installed application program in the user equipment corresponding to the first user or the second user; and calculating the information of the geographic position of the first user or the second user, for example, the information of the trust degree of the second user to the first user by the network device based on the matching and weight information corresponding to the characteristic trust degree information of each group of users. More preferably, table 1 shows a matching and weighting information corresponding to each user feature confidence level information, for example, the number of groups for the first user is 100, there are 200 contacts friends, 150 intended friends, the corresponding devices have 100 applications and the activity track of a certain day, the number of the second user groups is 80, the number of the address book friends is 220, the number of the intention friends is 120, the corresponding devices are installed and applied with 90 and the activity tracks of a certain day, 11 common groups, 34 common friends in the address list, 30 friends with the same intention are obtained through matching, 23 corresponding to the same applications of the installation of the device, and a coincidence time of the trajectory of one day of 7 hours and 40 minutes, the matching of the user characteristic information of the second user with respect to the first user is (11%, 17%, 20%, 23%, 32%), respectively, and the weighted average of the confidence level information of the second user with respect to the first user is 0.213. If the preset confidence threshold information of the second user and the first user is 0.150, the confidence information of the second user to the first user is greater than the confidence threshold information, and the network equipment executes the social operation.
TABLE 1
In some embodiments, if the network device receives a revocation operation of the social operation sent by the device corresponding to the second user when the network device executes the social operation, the network device cancels the execution of the social operation. More preferably, the network device reduces a certain trust level between the first user and the second user according to the revocation operation.
In some embodiments, in step S12, the network device determines first trust information of the second user for the first user according to the same social group, and determines second trust information of the second user for the first user according to user characteristics of the first user and the second user; and then, the network equipment determines the trust degree information of the second user to the first user according to the first trust degree information and the second trust degree information.
For example, a corresponding device of a first user sends social operations about a second user to a network device. After the network equipment receives the social operation, the network equipment determines first trust information of the second user to the first user according to the same social group, and determines second trust information of the second user to the first user according to the user characteristics of the first user and the second user; and then, the network equipment determines the trust degree information of the second user to the first user according to the first trust degree information and the second trust degree information. For example, the network device determines first trust information of a second user to a first user according to group trust information of the same social group, then obtains one or more user feature information of the first user and the second user, then matches matching information of the first user and the second user in each user feature information, calculates second trust information of the second user to the first user according to the matching information of each user feature information and weight of each user feature information, and obtains trust information of the second user to the first user by combining group trust information and user feature trust information mapping. And if the trust information of the second user to the first user meets the preset trust threshold information, the network equipment executes the social operation.
In some embodiments, a method for performing social operations is provided according to another aspect of the present application, wherein the method comprises: the network equipment determines the trust information of a second user to a first user, wherein the first user and the second user belong to the same social group, the current user relationship of the first user and the second user is a non-friend relationship, and the social operation is executed according to the trust information of the second user to the first user. For example, the first user and the second user are in the same social group and are in a non-friend relationship, the network device determines the trust degree information of the second user to the first user based on the group chat information and other user characteristic information of the first user and the second user in the group, and executes social operations, such as recommending other friends, sending trust degree reminders, recommending marketing activities and the like, to the first user or the second user according to the trust degree information. In some embodiments, the social operations further comprise sending trust information of the first user by the second user to the first user.
For example, a first user holds a user device, the user device installs a social application, the first user and a second user are in the same social group, and the first user and the second user are in a non-friend relationship. The network device determines the trust information of the second user to the first user based on group information or user characteristic information of the first user and the second user, wherein the group information includes but is not limited to group chat information, group name information, group type information and the like, and the user characteristic information includes but is not limited to group characteristic information of the first user or the second user, address book information, intention friend information, application information installed in the corresponding user device, geographical location information and the like. If the trust information of the second user to the first user meets the preset trust threshold information, the network device executes social operation to the second user or the first user, for example, the network device sends a trust prompt to the second user or the first user, the trust prompt includes information such as friend adding operation and private chat authority, and for example, the network device sends some marketing activities meeting the trust threshold to the first user or the second user. In some embodiments, the network device further sends the trust information of the second user to the first user to the user device corresponding to the first user, and the user device receives and presents the trust information to assist the first user in deciding whether to accept the social operation performed by the network device.
It should be understood by those skilled in the art that the user characteristic information and/or the group information are only examples, and other contents of the user characteristic information and/or the group information, which may be present or later appear, should be included in the scope of the present application if applicable, and are included by reference.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (12)
1. A method for performing social operations, wherein the method comprises:
obtaining social operation which is initiated by a first user and related to a second user, wherein the first user and the second user belong to the same social group, and the current user relationship between the first user and the second user is a non-friend relationship;
matching coincidence information of the user characteristic information of the first user and the second user according to the user characteristic information of the first user and the second user, and determining the characteristic matching information of the first user and the second user based on the coincidence information and the user characteristic information of the first user;
obtaining the trust information of the second user to the first user according to the numerical mapping of the feature matching information;
when the trust degree information of the second user to the first user meets the trust degree threshold information, executing the social operation;
wherein the user characteristic information comprises at least any one of:
address book information of the first user or the second user;
intended friend information of the first user or the second user;
the information of the installed application program in the user equipment corresponding to the first user or the second user;
geographic location information of the first user or the second user.
2. The method of claim 1, wherein the social operations comprise at least any one of:
the first user requests the second user to add a friend operation;
the first user inviting the second user to join other social groups;
the first user sends private chat information to the second user;
and the first user sends recommendation information to the second user.
3. The method of claim 2, wherein the social operation comprises the first user requesting the second user to add a friend operation;
wherein, when the confidence information of the second user to the first user meets the confidence threshold information, the social operation is executed, including:
and when the trust degree information of the second user to the first user meets the trust degree threshold information, establishing the friend relationship between the first user and the second user.
4. The method of claim 2, wherein the social operation comprises the first user inviting the second user to join other social groups;
wherein, when the confidence information of the second user to the first user meets the confidence threshold information, the social operation is executed, including:
and when the trust information of the second user to the first user meets the trust threshold information, adding the second user to the other social groups.
5. The method of any of claims 1-4, wherein the determining trust information of the first user by the second user comprises:
and determining the trust information of the second user to the first user according to the same social group.
6. The method of claim 5, wherein the determining trust information of the first user by the second user from the same social group comprises:
determining group trust information of the same social group according to the group name information or the group chat information of the same social group;
and determining the trust degree information of the second user to the first user according to the group trust degree information.
7. The method of claim 5, wherein the determining trust information of the first user by the second user from the same social group comprises:
determining group type information of the same social group according to the group name information or the group chat information of the same social group;
and determining the trust information of the second user to the first user according to the group type information.
8. The method of claim 1, wherein the determining trust information of the first user by the second user comprises:
determining first trust information of the second user to the first user according to the same social group;
determining second trust information of the second user to the first user according to the user characteristics of the first user and the second user;
and determining the trust degree information of the second user to the first user according to the first trust degree information and the second trust degree information.
9. A method for performing social operations, wherein the method comprises:
matching coincidence information of the user characteristic information of a first user and a second user according to the user characteristic information of the first user and the second user, and determining the characteristic matching information of the first user and the second user based on the coincidence information and the user characteristic information of the first user;
obtaining the trust information of a second user to a first user according to the numerical mapping of the feature matching information, wherein the first user and the second user belong to the same social group, and the current user relationship of the first user and the second user is a non-friend relationship;
executing social operation according to the trust information of the second user to the first user;
wherein the user characteristic information comprises at least any one of:
address book information of the first user or the second user;
intended friend information of the first user or the second user;
the information of the installed application program in the user equipment corresponding to the first user or the second user;
geographic location information of the first user or the second user.
10. The method of claim 9, wherein the social operations further comprise sending trust information of the first user by the second user to the first user.
11. An apparatus for performing social operations, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 10.
12. A computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of any of the methods of claims 1-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710973088.9A CN107682250B (en) | 2017-10-18 | 2017-10-18 | Method and equipment for executing social operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710973088.9A CN107682250B (en) | 2017-10-18 | 2017-10-18 | Method and equipment for executing social operation |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107682250A CN107682250A (en) | 2018-02-09 |
CN107682250B true CN107682250B (en) | 2020-09-08 |
Family
ID=61140751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710973088.9A Active CN107682250B (en) | 2017-10-18 | 2017-10-18 | Method and equipment for executing social operation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107682250B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109388722B (en) * | 2018-09-30 | 2022-10-11 | 上海碳蓝网络科技有限公司 | Method and equipment for adding or searching social contact |
CN109495282B (en) * | 2018-10-31 | 2022-03-29 | 上海连尚网络科技有限公司 | Information processing method and device |
CN110300053B (en) * | 2019-06-30 | 2021-08-20 | 上海连尚网络科技有限公司 | A method and device for adding friends |
CN110708663B (en) * | 2019-09-27 | 2020-11-27 | 上海盛付通电子支付服务有限公司 | Bluetooth-based social contact method and device |
CN111314324B (en) * | 2020-01-22 | 2022-02-25 | 北京达佳互联信息技术有限公司 | Social relationship establishing method, device, terminal, server, storage medium and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428069A (en) * | 2012-05-15 | 2013-12-04 | 腾讯科技(深圳)有限公司 | Method and device for adding friends in social network |
CN103929349A (en) * | 2013-01-16 | 2014-07-16 | 腾讯科技(深圳)有限公司 | Method, device and system for adding instant message contacts |
CN105407041A (en) * | 2015-11-20 | 2016-03-16 | 珠海多玩信息技术有限公司 | Method for adding group or friend, server, client and system |
CN105407031A (en) * | 2014-09-10 | 2016-03-16 | 深圳市汉普电子技术开发有限公司 | Method and system for building instant communication based on members in same group |
CN107004224A (en) * | 2014-12-27 | 2017-08-01 | 英特尔公司 | For the technology for the social networks for managing the social group of computing device |
-
2017
- 2017-10-18 CN CN201710973088.9A patent/CN107682250B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428069A (en) * | 2012-05-15 | 2013-12-04 | 腾讯科技(深圳)有限公司 | Method and device for adding friends in social network |
CN103929349A (en) * | 2013-01-16 | 2014-07-16 | 腾讯科技(深圳)有限公司 | Method, device and system for adding instant message contacts |
CN105407031A (en) * | 2014-09-10 | 2016-03-16 | 深圳市汉普电子技术开发有限公司 | Method and system for building instant communication based on members in same group |
CN107004224A (en) * | 2014-12-27 | 2017-08-01 | 英特尔公司 | For the technology for the social networks for managing the social group of computing device |
CN105407041A (en) * | 2015-11-20 | 2016-03-16 | 珠海多玩信息技术有限公司 | Method for adding group or friend, server, client and system |
Also Published As
Publication number | Publication date |
---|---|
CN107682250A (en) | 2018-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107682250B (en) | Method and equipment for executing social operation | |
CN110046998B (en) | Cross-chain right using system, method, device, electronic equipment and storage medium | |
US20180374097A1 (en) | A distributed user profile identity verification system for e-commerce transaction security | |
US11212248B2 (en) | Method and device for managing a user | |
Liu et al. | Spectrum trading and sharing in unmanned aerial vehicles based on distributed blockchain consortium system | |
CN105592011B (en) | Account login method and device | |
US9282092B1 (en) | Systems and methods for determining trust when interacting with online resources | |
CN107135149B (en) | Method and equipment for recommending social users | |
US20200177595A1 (en) | Deriving confidence scores based on device sharing | |
WO2011082995A1 (en) | Automatically synchronizing new contacts across multiple social networking sites | |
US10939228B2 (en) | Mobile device location proofing | |
US20200082285A1 (en) | User recommendation method and device | |
CN106550004A (en) | The recommendation method and device of business object | |
CN110765395A (en) | Method and equipment for providing novel information | |
CN107018115B (en) | Account processing method and device | |
CN113704638A (en) | Method and equipment for identifying presentation information in social group chat | |
EP3040899B1 (en) | Methods and systems for managing permissions to access mobile device resources | |
CN110768894B (en) | Method and equipment for deleting session message | |
WO2018228225A2 (en) | Method and device for user recommendation | |
WO2018214792A1 (en) | Method and device for traffic control of user equipment | |
CN114710342B (en) | Community management method, equipment, medium and program product | |
US20150195708A1 (en) | Application installation system and method | |
CN112688861B (en) | Method and equipment for sending session information in social application | |
CN112948142B (en) | Method, apparatus, medium and program product for determining target feedback information | |
CN114429361A (en) | Method, device, medium and program product for extracting resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |