CN108875083A - Based on social networks looking-for-person method, device, computer equipment and storage medium - Google Patents

Based on social networks looking-for-person method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN108875083A
CN108875083A CN201810786369.8A CN201810786369A CN108875083A CN 108875083 A CN108875083 A CN 108875083A CN 201810786369 A CN201810786369 A CN 201810786369A CN 108875083 A CN108875083 A CN 108875083A
Authority
CN
China
Prior art keywords
search
rule
user
identity
searched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810786369.8A
Other languages
Chinese (zh)
Other versions
CN108875083B (en
Inventor
卢思亮
李舒扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Reunion (beijing) Technology Co Ltd
Original Assignee
Reunion (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Reunion (beijing) Technology Co Ltd filed Critical Reunion (beijing) Technology Co Ltd
Priority to CN201810786369.8A priority Critical patent/CN108875083B/en
Publication of CN108875083A publication Critical patent/CN108875083A/en
Application granted granted Critical
Publication of CN108875083B publication Critical patent/CN108875083B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves one kind to be based on social networks looking-for-person method, device, computer equipment and storage medium, this method is primarily based on the search database of the searched identity building of user's sets itself, the search database does not include the personal information of user, search content is sent to server by terminal in user later, when carrying out missing operation, the search content is subjected to content matching in search database, obtains candidate search rule, and then obtain the searched corresponding user of identity.Since the search rule searched in database in this method is search wish setting when setting searched identity based on user, this method can voluntarily be controlled the crowd of its social circle by user (i.e. which specific crowd can search out him).In addition, individual subscriber personal information can be effectively protected in the search database used not comprising userspersonal information for scanning for rule match in the method for the present embodiment, prevent from stealing userspersonal information by largely retrieving joining method malice.

Description

Based on social networks looking-for-person method, device, computer equipment and storage medium
Technical field
This application involves fields of communication technology, are based on social networks looking-for-person method, device, computer more particularly to one kind Equipment and storage medium.
Background technique
Specific crowd is found by social networks, is the common side that people find kith and kin or particular task in the modern life Formula.In traditional technology, when carrying out who object searching by network, it will use a large amount of personal information and matched, obtained Personal information is more comprehensive, and matching result is more accurate.Therefore service provider can improve each use when providing the search service as far as possible The personal information at family.
However, this allows other people by splicing to multiple retrieval information, the privacy information of user is obtained, is caused Userspersonal information's leakage.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of can guarantee userspersonal information's safety based on Social networks looking-for-person method, device, computer equipment and storage medium.
One kind being based on social networks looking-for-person method, the method includes:
Search setting request based on the received returns to search setting item, is arranged so that user sets item according to described search The search rule of searched identity;
By the search rule deposit search database of the searched identity;
Received search content is matched with the search rule in described search database, obtain in described search Hold matched candidate search rule;
Target user is determined according to the candidate search rule.
As an optional implementation manner, after the step of determining target user according to the candidate search rule also Including:
Obtain the identity authority of the corresponding searched identity of the candidate search rule;
The identity information of the target user is obtained from User Information Database according to the identity authority;
Export the identity information of the target user.
As an optional implementation manner, the method also includes:
The personal information of user's input is received, and personal information is stored in User Information Database;
The authority information that user is inputted by identity authority item is received, searched identity corresponding with the user is obtained Identity authority;
According to the identity authority of the searched identity, the personal information pass corresponding with identity information of the user is set System.
As an optional implementation manner, the step of determining target user according to the candidate search rule include:
It determines that target user carries out regular verification with described search content matching search rule to described, is effectively searched Rope rule;
Searched identity is obtained according to effective search rule.
As an optional implementation manner, the search by received search content and described search database is advised Then matched, obtain include with the step of the candidate search of described search content matching rule:
Judge whether described search content exactly matches with a certain search rule in described search database;
If the determination result is YES, then using a certain search rule as the candidate search rule.
As an optional implementation manner, the search by received search content and described search database is advised Then matched, obtain include with the step of the candidate search of described search content matching rule:
Search record is obtained, and described search is recorded and carries out data analysis, obtains the search setting of described search rule The content alias of item;
If described search content and the content alias of the content of described search rule or corresponding search setting item are complete Matching, then using described search rule as candidate search rule.
As an optional implementation manner, the method also includes:If by received search content and described search number Content matching is carried out according to the search rule in library, candidate search rule is not obtained, then submits cognition to request, and according to the cognition The search rule and search record of request active user setting, obtain the search target of active user;According to described search Target obtains cognition search rule, and the use of the cognition search rule is described search content in described search database With candidate search rule.
As an optional implementation manner, described search target includes similar setting target retrieval or opposite setting target Retrieval.
One kind being based on social networks missing device, and described device includes:
Rule settings module returns to search setting item, so that user is according to institute for search setting request based on the received State the search rule that searched identity is arranged in search setting item;
Database is searched for, for storing the search rule of the searched identity;
Matching module is obtained for received search content and the search rule searched in database to be carried out content matching To candidate search rule;
Processing module, for determining target user according to the candidate search rule.
A kind of computer equipment, including memory and processor are stored with and can be run on a processor on the memory Computer program, the processor realizes following steps when executing the computer program:
Search setting request based on the received returns to search setting item, is arranged so that user sets item according to described search The search rule of searched identity;
By the search rule deposit search database of the searched identity;
Received search content and the search rule searched in database are subjected to content matching, obtain candidate search rule Then;
Target user is determined according to the candidate search rule.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor Following steps are realized when row:
Search setting request based on the received returns to search setting item, is arranged so that user sets item according to described search The search rule of searched identity;
By the search rule deposit search database of the searched identity;
Received search content and the search rule searched in database are subjected to content matching, obtain candidate search rule Then;
Target user is determined according to the candidate search rule.
Above-mentioned to be based on social networks looking-for-person method, device, computer equipment and storage medium, this method is primarily based on user The search database of the searched identity building of sets itself, the search database do not include the personal information of user, Zhi Hou User by terminal send search content arrive server, carry out missing operation when, by the search content search for database in into Row content matching obtains candidate search rule, and then obtains the searched corresponding user of identity.Due to searching for data in this method Search rule in library is search wish setting when setting searched identity based on user, and therefore, this method can be by user Voluntarily control the crowd of its social circle (i.e. which specific crowd can search out him).In addition, the method for the present embodiment is carrying out Individual subscriber private can be effectively protected in the matched search database used not comprising userspersonal information of search rule People's information prevents from stealing userspersonal information by largely retrieving joining method malice.
Detailed description of the invention
Fig. 1 is the applied environment figure based on social networks looking-for-person method in one embodiment;
Fig. 2 is the flow diagram based on social networks looking-for-person method in one embodiment;
Fig. 3 is the supplement steps flow chart schematic diagram based on social networks looking-for-person method in one embodiment;
Fig. 4 is to obtain the step flow diagram of candidate search rule in one embodiment;
Fig. 5 is to obtain the step flow diagram of candidate search rule in one embodiment;
Fig. 6 is the supplement steps flow chart schematic diagram based on social networks looking-for-person method in another embodiment;
Fig. 7 is the structural block diagram based on social networks missing device in one embodiment;
Fig. 8 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
It is provided by the present application to be based on social networks looking-for-person method, it can be applied in application environment as shown in Figure 1.Its In, terminal 102 is communicated with server 104 by network by network.Wherein, terminal 102 can be, but not limited to be various Personal computer, laptop, smart phone, tablet computer and portable wearable device, server 104 can be with independently The server cluster of server either multiple servers composition realize.
In one embodiment, it as shown in Fig. 2, providing one kind based on social networks looking-for-person method, applies in this way It is illustrated, includes the following steps for server in Fig. 1:
Step 210, search setting request based on the received returns to search setting item, so that user sets according to described search Determine the search rule that searched identity is arranged in item.
Wherein, search setting item is the option for the category feature that user setting is searched identity, for limiting user oneself It is expected that searching the crowd of oneself.It may include keyword item, messenger item, location entries, class items etc..Wherein, keyword Item, messenger item can be multiple.Specifically, server 104 searches for setting request based on the received, returns to search setting item, So that user sets the search rule that searched identity is arranged in item according to described search.Optionally, user can be according to itself need Seek the multiple searched identity relevant to the user of setting.Optionally, the searched identity of user setting can be in its identity registration When, search setting can also be initiated to server 104 by terminal 102 and asked in the demand in need for increasing searched identity It asks.
Such as:User A can set searched identity 1 for the identity of its company X line manager;Finish for its F university The raw identity of industry sets searched identity 2.When user sets searched identity for this identity of company X line manager, first Search setting request is sent to server 104 by terminal 102, server 104 is returned according to search setting request to terminal 102 Search setting item is returned, it includes keyword item, messenger item, location entries, class items which, which sets item,.User can choose wherein One or more of search terms set.Such as:" company X " can be used as to key word item 1, " department Y " is used as keyword 2, it regard its work cell-phone number " 123-0000-0001 " as messenger item, not set location entries, the relevant information of class items, And the above-mentioned search setting item input information of exact matching is limited, it can just match its " company X line manager " this setting and be searched Rope identity.Server 104 generates search rule according to " company X ", " department Y " and " 123-0000-0001 ".The search of generation Rule can be stored in search database in table form, i.e., corresponding be filled to of above- mentioned information is searched for retrieval table in database Under corresponding list item.Certainly, above-mentioned search rule is also possible to keyword 1 " company X "+keyword 2 " department Y "+cell-phone number " 123- This form of 0000-0001 ".As long as the search rule can express the desired limit search condition of user, concrete form It can flexibly be set according to the data format requirement of search database itself, not do format herein and specifically limit.
Step 220, by the search rule deposit search database of the searched identity.
Wherein, it searches for and only stores the searched corresponding search rule of identity in database, do not store userspersonal information.With Family personal information is stored in the User Information Database individually set up.Optionally, the search rule that server 104 will acquire is deposited Enter and search for database, while establishing search rule and searched identity and the relation chain of user, which can be index Form or the other forms such as table.According to the available search rule of the relation chain and searched identity and user it Between corresponding relationship.
Step 230, received search content is matched with the search rule in described search database, is obtained and institute State the candidate search rule of search content matching.
Specifically, server 104 matches received search content with the search rule in described search database, It obtains and the candidate search of described search content matching rule.Optionally, server 104 receives user and is inputted by terminal 102 Search content after, traversal search database, by search for content with search database in search rule match, if described Content is matched with search rule, then the candidate search rule searched for the search rule of the successful match as this.
Step 240, target user is determined according to the candidate search rule.
Specifically, server 104 determines target user according to the candidate search rule.Optionally, server 104 is first Searched identity is determined according to candidate rule, is searched identity further according to this later and is determined target user.
It is above-mentioned to be based on social networks looking-for-person method, it is primarily based on the search number of the searched identity building of user's sets itself According to library, which does not include the personal information of user, is sent in user by terminal search for content to server later, When carrying out missing operation, which is subjected to content matching in search database, obtains candidate search rule, and then obtain To the corresponding user of searched identity.Since the search rule searched in database in this method is searched based on user's setting Search wish setting when identity, therefore, this method can voluntarily be controlled crowd's (i.e. which particular person of its social circle by user Group can search out him).In addition, the method for the present embodiment is scanning for the using not comprising individual subscriber of rule match The search database of information, can be effectively protected individual subscriber personal information, prevent by largely retrieving joining method malice Steal userspersonal information.
As an optional implementation manner, as shown in figure 3, determining target user's according to the candidate search rule Further include after step:
Step S250:Obtain the identity authority of the corresponding searched identity of the target search rule.
Wherein, which personal information is identity authority show to search user for limiting corresponding searched identity.Such as Show name, company, school, one or more of age.Specifically, it is right to obtain the target search rule for server 104 The identity authority for the searched identity answered.Optionally, which can be what user was arranged when creating searched identity, Be also possible to it is subsequent based on demand be arranged or modify.
Step S260:The identity letter of the target user is obtained from User Information Database according to the identity authority Breath.
Specifically, server 104 obtains the target user's according to the identity authority from User Information Database Identity information.Optionally, server is primarily based on searched identity and the relation chain of user, determines target user, further according to body Part permission calls associated personal information, forms the searched corresponding identity information of identity.
Step S270:Export the identity information of the target user.
Specifically, server 104 is exported the identity information of the target user as search result.
The method of the present embodiment can show that the personal of different range is believed to different social circles according to user oneself wish Breath.
As an optional implementation manner, above-mentioned to further include based on social networks looking-for-person method:
The personal information of user's input is received, and personal information is stored in User Information Database.
Specifically, server 104 receives the personal information of user's input, and personal information is stored in user information data Library.Optionally, which can acquire in user's registration, can also user it is subsequent using account during, according to Demand is modified.It should be understood that User Information Database and search database are independent two databases.
The authority information that user is inputted by identity authority item is received, searched identity corresponding with the user is obtained Identity authority.
Specifically, server 104 receives the authority information for the identity authority item input that user is shown by terminal 102, obtains To the identity authority of searched identity corresponding with the user.
According to the identity authority of the searched identity, the personal information pass corresponding with identity information of the user is set System.
Specifically, server 104 is according to the identity authority of the searched identity, be arranged the personal information of the user with The corresponding relationship of identity information.
Present embodiments provide it is a kind of building User Information Database in personal information with show search user identity The method of information can be used family and only be obtained by its desired crowd in protection personal information, individual privacy is effectively protected.
As an optional implementation manner, the step of determining target user according to the candidate search rule include:It is right It is described to determine that target user carries out regular verification with described search content matching search rule, effective search rule is obtained, and Searched identity is obtained according to effective search rule.
Specifically, server 104 determines that target user advises to the search rule with described search content matching It then verifies, obtains effective search rule, and searched identity is obtained according to effective search rule.
The method that the present embodiment proposes can screen out the undesirable particular condition being searched, example by rule verification Such as:The setting of negated condition in search rule.User can be helped preferably to limit the searched crowd of expectation.
As an optional implementation manner, as shown in figure 4, described will be in received search content and search database Search rule carries out content matching, and the step for obtaining candidate search rule includes:
Step S231a:Judge a certain search rule whether complete in described search content and described search database Match.Specifically, server 104 judges a certain search rule whether complete in described search content and described search database Match.
Step S232a:If the determination result is YES, then using a certain search rule as the candidate search rule.It can Selection of land, server 104 continues that content will be searched for and next search rule carries out content matching, until having traversed search database. Specifically, server 104 is when result, which is, is, using a certain search rule as the candidate search rule.
Step S233a:If judging result be it is no, skip a certain search rule, and will search content and next search Rule carries out content matching.Specifically, server 104 skips a certain search rule when judging result is, and will be in search Hold and carry out content matching with next search rule, until having traversed search database.
The present embodiment is when searching for database is that search content carries out content matching, it is desirable that exact matching, it can be effective Information is denoised.
As an optional implementation manner, as shown in figure 5, described will be in received search content and search database Search rule carries out content matching, and the step for obtaining candidate search rule includes:
Step S231b:Search record is obtained, and described search is recorded and carries out data analysis, obtains described search rule Search setting item content alias.Specifically, server 104 obtains search record, and records to described search and carry out data Analysis obtains the content alias of the search setting item of described search rule.Such as it can be arranged according to data analysis result and be searched for The content alias of item " company A " is set as " A Pty. Ltd. ".
Step S232b:If described search content sets the interior of item with the content of described search rule or corresponding search Hold alias exact matching, then using described search rule as candidate search rule.Specifically, server 104 is in described search When holding the content alias exact matching with the content of described search rule or corresponding search setting item, then described search is advised Then as candidate search rule.
For the present embodiment by being analyzed and processed to search record, the content for obtaining search setting item in search rule is other Name can help user effectively to expand social scope under the premise of limiting searched range.
As an optional implementation manner, as shown in fig. 6, above-mentioned be based on social networks looking-for-person method, further include:
Step S280:If received search content and the search rule searched in database are carried out content matching, not To candidate search rule, then submit cognition request, and according to it is described cognition request active user setting search rule and Search record, obtains the search target of active user.
Specifically, if received search content and the search rule searched in database are carried out content by server 104 Match, do not obtain candidate search rule, then cognition is submitted to request, and obtains the search rule and search record of active user's setting, Obtain the search target of active user.Optionally, which can be similar setting target retrieval or opposite setting target Retrieval.Wherein, it is similar set target retrieval as search user attempt to look for oneself setting a certain searched identity it is identical Retrieval.The opposite target retrieval that set is the identical inspection of the searched identity part of search for that user attempts to look for setting with oneself a certain Rope.Optionally, server may also feed back search user to received cognition request and be not up to preset cognition retrieval Standard, server 104 can direct feedback search result at this time.
Step S290:Cognition search rule is obtained according to described search target, and using the cognition search rule in institute It states in search database as described search content matching candidate search rule.
Specifically, server 104 obtains cognition search rule according to described search target, and uses cognition retrieval rule It is then described search content matching candidate search rule in described search database.
Further, it will acquire user and search for target as goal task building machine learning model, then using training The machine learning model of sample training building, until each network layer convergence of model.Finally data are carried out using the model trained Processing, can quickly obtain the search need of user.
Server requests received cognition in the present embodiment, can be divided based on search record of the server to acquisition Analysis study, the search need of the user obtained from, can service search user and searched user more with open arms, both make It is more easier to be searched out by the other side of intention.Optionally, it is recorded, is obtained by the search rule and search that are set to active user The search target of active user, can be realized by way of machine learning.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.In the present embodiment, use cell-phone number as the search rule of its friend's (searched identity) set by user A.This method Including:
Step S301:User A passes through phone number with uniqueness when using the above method for the first time by terminal 123-0000-0001 is registered, and is recorded into this phone number as unique index in the account data table of database.
Step S302:User A opens phone number in the search terms setting of the searched identity " friend " of its setting (allowing to search identity objects by registering phone number) option, is filled out in this, as search content, and by related content correspondence It is written under the list item in search setting tables of data.
Step S303:Server will to search database in search setting tables of data retrieve, check whether include The phone number of user A is that the record row for searching for content creates new record row with the user friend A in the case where no, Using phone number as search content, and search configuration switch is set as opening;Such as this is recorded existing, and search configuration switch is It closes, then the search configuration switch of more new record row is to open.
Step S304:User B is scanned in search by terminal input handset number 123-0000-0001.
Step S305:Server receives the request of user B, by phone number contrasting data library search set item into Row retrieval, searching mobile phone number is identical with search content, and searching for configuration switch is the record row opened.Finding user After the record that A is created in search set information table, the included correspondence identity objects of record row are replied to user B:User A.
Step S306:Result of the user B based on search feedback sends application good friend to user A, checks that information etc. is requested.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.In the present embodiment, use the pet name as the search rule of its friend's (searched identity) set by user A, B, C.The party Method includes:
Step S401:For user A when the search for filling in searched identity limits item, addition this search of the pet name sets item " Zhang San ";User B is when the search for filling in searched identity limits item, addition this search of pet name setting item " Zhang San ";User C When the search for filling in searched identity limits item, addition this search of pet name setting item " small Zhang San ".User A, B, C are being searched for In setting, opening pet name item (allows to search identity objects by object oriented) option, navigates in this, as search content Oneself, and will be under the corresponding list item filled in into search setting tables of data of related content.
Step S402:Server will retrieve the search set information in database, check above three users Whether comprising the record row with the pet name to search for content in record belonging to the searched identity set, in the case where no, with The searched identity creates new record row, using the pet name as search content, and search configuration switch is set as opening;Such as note Record it is existing, search configuration switch be close, then the search configuration switch of more new record row be open.
Step S403:User D is scanned for by terminal input " Zhang San ".
Step S404:Server receives the request of user D, and the pet name " Zhang San " sets the search of search setting tables of data Determine information to be retrieved, it is identical with content is searched for find the pet name, and searching for configuration switch is all record rows opened.? Find accordingly after search setting record, to user D reply the search of searched identity set set the pet name that item includes as The user of " Zhang San ", as user A and user B.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.In the present embodiment, use multiple keywords as the search rule of its friend's (searched identity) set by user A.It should Method includes:
Step S501:In the search setting item for setting searched identity " friend ", addition keyword (allows to lead to user A Cross keyword and search identity objects) option, oneself is navigated in this, as search content.User A is selected between keyword Relationship is "or", and restriction is at least correct to submit wherein 3 keywords, and provides " plande noodles, northern school gate east side, steamer, three Person-portion, 407,2000 " are used as keyword.Above search rule (y) formula is:A=" plande noodles ";B=" northern school gate east side ";c =" steamer ";D=" three person-portions ";E=" 407 ";F=" 2000 ";Y=(a ∨ b ∨ c ∨ d ∨ e ∨ f)∧3, wherein " ∧ " is indicated " and " relationship restriction, " ∨ " indicates that "or" relationship limits," non-" relationship of expression limits,^nIt then indicates at least to meet corresponding () Interior n condition.
Step S502:Server will retrieve the search set information in search setting tables of data, check whether to wrap The search prescribed information of the searched identity " friend " of the setting of A containing user, if comprising further determining that in the record whether wrap Containing using "or" as relationship, 3 be limitation quantity, and " plande noodles, northern school gate east side, steamer, three person-portions, 407 " is that search limits item Record row is searched identity " friend " with this and creates new record row, and search configuration switch is set as opening if not having;Such as This record it is existing, search configuration switch be close, then the search configuration switch of more new record row be open.
Step S503:ABC university was attended school in 2000 simultaneously with user A, and the user B for living 407 dormitories together is passing through end End input " ABC university, 2000, department of mathematics, 407 " scans for.
Step S504:User C with user's A dormitory all likes the knife of school gate at that time to cut during attending school with user A Face, user C are scanned for by terminal input " 407, plande noodles, steamer, three person-portions ".
Step S505:Server receives the request of user B, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.Because The keyword message that user B is searched for only has " 2000 " and " 407 " two content matchings, do not meet that user A sets at least With 3 restrictive rules, server, which replies to, will not include user A in the result of user B.
Step S506:Server receives the request of user C, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User The keyword that C is searched for meets the search rule of the searched identity " friend " of user A setting, and server replies to user C's As a result by the identity objects comprising user A in.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.In the present embodiment, by the search rule of user A its " old friend " (searched identity) set using compound rule.Specifically Ground, user A were once taken office as sales force in company ABC, were responsible for sale DEF product, were just left recently, and in GHI company Take up the post of governing positions, there is a special contact secret signal " leopard cat " between user A and old friend.User wish with it is some specific Old friend keeps, but is also no longer desire to contact oneself because of the selling operation of past ABC simultaneously.This method includes:
Step S601:User A is created following regular and interior when setting searched identity " old friend " search rule Hold:
Must include in 1 retrieval information (" and " relationship restriction) " leopard cat ".
(restriction of "or" relationship) 2 the following contents are included at least in 2 retrieval information:1) " company ABC, DEF product, system Framework, Lao Wang ";2) retrieving in information cannot include (restriction of " non-" relationship) " sale ".
Above-mentioned search rule (y) formula is:A=" leopard cat ";B=" company ABC ";C=" DEF product ";D=" system tray Structure ";E=" Lao Wang ";F=" sale ";Wherein " ∧ " expression " and " relationship limit, " ∨ " indicates that "or" relationship limits," non-" relationship of expression limits,^nIt then indicates at least to meet corresponding () interior n condition.
Step S602:Server will retrieve the search set information in search setting tables of data, check whether to wrap The search prescribed information of the searched identity " old friend " of the setting of A containing user, if not including, with searched identity " old friend " wound New record row is built, item is set as search content using the search of above-mentioned search rule, and search configuration switch is set as opening; Such as this is recorded existing, and search configuration switch is to close, then the search configuration switch of more new record row is to open.
Step S603:The colleague user B of user A is scanned for by terminal input " company ABC, DEF product, Lao Wang ".
Step S604:User C is scanned for by terminal input " company ABC, Lao Wang, leopard cat, sale ".
Step S605:User D is scanned for by terminal input " system architecture, Lao Wang, leopard cat, company ABC ".
Step S606:Server receives the request of user B, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User The keyword message that B is searched for has three to match with "or" relationship in setting, but because do not meet search rule " and " relationship wants " leopard cat " keyword asked, server reply to the identity objects that will not include user A in the result of user B.
Step S607:Server receives the request of user C, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User C search when meet "or" and " and " relationship, but because search key in be previously mentioned " sale ", violate in search rule The setting of " non-" relationship, server reply to the identity objects that will not include user A in the result of user C.
Step S608:Server receives the request of user D, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User D meets at least two " system architecture, Lao Wang, company ABCs " of "or" relationship, also meets search rule in retrieval " and " " leopard cat " of relationship, while not including " sale " of search rule " non-" relationship, it is wrapped in the result of server reply user D The identity objects of the A containing user.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.In the present embodiment, it is the sales force of company ABC " pineapple " participants in a bridge game's machine by user A, is responsible for selling the mobile phone products, make The search rule of its " old friend " (searched identity) is limited with classification.This method includes:
Step S701:User A is added to "or" relationship, and wrap when searched identity " old friend " search rule is arranged Contain " company ABC, pineapple, sale ", setting at least meets two, while user defines " pineapple " and is classified as " mobile phone ". When due to search " pineapple ", according to the search rule being normally set up, it is other as a result, still originally that a large amount of fruits may be matched " pineapple " has been defined under " mobile phone " classification by embodiment, can reduce search range, improves system response efficiency.
Step S702:Server retrieves the search set information of search setting tables of data, checks user setting Whether comprising the above setting in record belonging to searched identity " old friend ", in the case where no, to be searched identity " old friend The new record row of friend " creation limits item as search content using the search in search rule, and search configuration switch is set as out It opens;Such as this is recorded existing, and search configuration switch is to close, then the search configuration switch of more new record row is to open.
Step S703:User B is scanned for by inputting " pineapple, sale ".
Step S704:User C is scanned for by inputting " company ABC, pineapple ", and is classified as retrieval is selected " mobile phone ".
Step S705:Server receives the request of user D, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.Due to User B does not have to limit the classification of content when retrieving, and search rule are arranged to searched identity " old friend " so not meeting user A Then, server will not reply user A and give user B.
Step S706:Server receives the request of user D, will be in these keywords of submission and search setting tables of data Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.Due to The search content of user C input meets user A and search rule is arranged to searched identity " old friend ", and server replys user A Give user C.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.This method includes:
Step S801:User A sets "or" relationship when setting searched identity " friend ";Search setting item includes to close Keyword " company ABC, DEF product, technical adviser ", and set at least two keywords and meet, obtain search rule.
Step S802:Server will retrieve the search set information in search setting tables of data, check whether to wrap The search prescribed information of the searched identity " friend " of the setting of A containing user is searched identity " friend " creation newly with this if not having Record row, and by search configuration switch be set as opening;Such as this is recorded existing, and search configuration switch is to close, then updates note The search configuration switch of record row is to open.And handled based on the analysis to search record, " ABC & Co., Ltd. " is used as keyword The content alias of item " company ABC " is added to alias cognition set.
Step S803:User B has input " ABC & Co., Ltd., technical adviser " and retrieves.
Step S804:After server receives the retrieval request of user B, to search setting tables of data combination alias cognition collection Conjunction is traversed, and " ABC & Co., Ltd. " and " technical adviser " two keywords are searched for.This target object of user A is obtained, and will User A feeds back to user B.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method Method.This method includes:
Step S901:User A sets "or" relationship when setting searched identity " friend ", and search setting item includes to close Keyword " company ABC, DEF product, technical adviser ", and set at least two keywords and meet, obtain search rule.User A exists The retrieval " company ABC, technical adviser " continuously repeated in past several days, " ABC & Co., Ltd., technical adviser ", " DEF product, The approximation operations such as technical staff ", but it is matched to search result not successfully always.
Step S902:User B sets "or" relationship when setting searched identity " friend ";Search setting item includes to close Keyword " company ABC, DEF product, technology are pre-sales ", and set at least two keywords and meet, obtain search rule.User B exists The retrieval " company ABC is pre-sales " continuously repeated in past several days, " ABC & Co., Ltd.'s technology ", " DEF product technology personnel " etc. Approximation operation.
Step S903:System uses the cognition standard pair of default setting when receiving the retrieval request of user B next time User carries out rule of recogni-tion judgement, confirms user B when a certain searched identity is arranged according to judging result, the search of setting is advised Then and whether search behavior meets the setting that preset specific aim repeatedly is retrieved.
Step S904:, server obtains other user cognition history while executing step S903 again, and judges whether to wrap Containing with user B have it is similar setting target retrieval demand and/or to setting target retrieval demand user, obtain user A and setting When setting a certain searched identity, the search rule and search behavior of setting meet pre-set similar setting user and match mark It is quasi-.Server can include the search result of user A for the reply of user B at this time.
It should be understood that although each step in the flow chart of Fig. 2-6 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-6 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in fig. 7, providing one kind based on social networks missing device, described device includes:
Rule settings module 710 returns to search setting item, so that user's root for search setting request based on the received The search rule of searched identity is set according to described search setting item.
Database 720 is searched for, for storing the search rule of the searched identity.
Matching module 730, for received search content to be matched with the search rule in described search database, It obtains and the candidate search of described search content matching rule.
Processing module 740, for determining target user according to the candidate search rule.
As an optional implementation manner, processing module 740, for obtaining, the candidate search rule is corresponding to be searched The identity authority of rope identity;The identity letter of the target user is obtained from User Information Database according to the identity authority Breath;Export the identity information of the target user.
As an optional implementation manner, described to be based on social networks missing device, it further include User Information Database 740, for storing the personal information of user's input;It is defeated by identity authority item to be also used to receive user for rule settings module 710 The authority information entered obtains the identity authority of searched identity corresponding with the user;According to the body of the searched identity Part permission, is arranged the personal information of the user and the corresponding relationship of identity information.
As an optional implementation manner, matching module 730, for described and described search content matching search Rule determines that target user carries out regular verification, obtains effective search rule;It is searched according to effective search rule Identity.
As an optional implementation manner, matching module 730, for judging described search content and described search data Whether a certain search rule in library exactly matches;If the determination result is YES, then using a certain search rule as the time Select search rule.
As an optional implementation manner, matching module 730 are recorded for obtaining search record, and to described search Data analysis is carried out, the content alias of the search setting item of described search rule is obtained;If described search content and described search The content alias exact matching of the content of rule or corresponding search setting item, then using described search rule as candidate search Rule.
As an optional implementation manner, matching module 730, if being also used to received search content and search data Search rule in library carries out content matching, does not obtain candidate search rule, then submits cognition to request, and asked according to the cognition The search rule for obtaining active user's setting and search record are asked, the search target of active user is obtained;According to described search mesh Mark obtains cognition search rule, and the use of the cognition search rule is described search content matching in described search database Candidate search rule.
It may refer to about the specific restriction based on social networks missing device above for based on social networks missing The restriction of method, details are not described herein.The above-mentioned modules based in social networks missing device can be fully or partially through Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more The corresponding operation of modules.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 8.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing search rule.The network interface of the computer equipment is used to pass through network with external terminal Connection communication.It is a kind of based on social networks looking-for-person method to realize when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 8, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specifically computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is deposited on the memory The computer program that can be run on a processor is contained, processor realizes following steps when executing computer program:According to reception Search set request, search setting item is returned to, so that user sets the search that searched identity is arranged in item according to described search Rule;By the search rule deposit search database of the searched identity;By received search content and described search data Search rule in library is matched, and is obtained and the candidate search of described search content matching rule;According to the candidate search Rule determines target user.
In one embodiment, following steps are also realized when processor executes computer program:Obtain the candidate search The identity authority of the corresponding searched identity of rule;The target is obtained from User Information Database according to the identity authority The identity information of user;Export the identity information of the target user.
In one embodiment, following steps are also realized when processor executes computer program:Receive of user's input People's information, and personal information is stored in User Information Database;The authority information that user is inputted by identity authority item is received, is obtained To the identity authority of searched identity corresponding with the user;According to the identity authority of the searched identity, described in setting The personal information of user and the corresponding relationship of identity information.
In one embodiment, following steps are also realized when processor executes computer program:To described and described search The search rule of content matching determines that target user carries out regular verification, obtains effective search rule;According to effective search Rule obtains searched identity.
In one embodiment, following steps are also realized when processor executes computer program:Judge described search content Whether exactly matched with a certain search rule in described search database;If the determination result is YES, then by a certain search Rule is as the candidate search rule.
In one embodiment, following steps are also realized when processor executes computer program:Search record is obtained, and right Described search record carries out data analysis, obtains the content alias of the search setting item of described search rule;If in described search Hold and exactly matched with the content alias of the content of described search rule or corresponding search setting item, then by described search rule As candidate search rule.
In one embodiment, following steps are also realized when processor executes computer program:If by received search Hold and carry out content matching with the search rule in search database, does not obtain candidate search rule, then submit cognition to request, and root According to the search rule and search record of the cognition request active user setting, the search target of active user is obtained;Root Cognition search rule is obtained according to described search target, and the use of the cognition search rule is described in described search database Search for content matching candidate search rule.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes following steps when being executed by processor:Search setting request based on the received returns to search setting item, to use Family sets the search rule that searched identity is arranged in item according to described search;The search rule deposit of the searched identity is searched Rope database;Received search content is matched with the search rule in described search database, is obtained and described search The candidate search rule of content matching;Target user is determined according to the candidate search rule.
In one embodiment, following steps are also realized when computer program is executed by processor:The candidate is obtained to search The identity authority of the corresponding searched identity of rope rule;The mesh is obtained from User Information Database according to the identity authority Mark the identity information of user;Export the identity information of the target user.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive user's input Personal information, and personal information is stored in User Information Database;The authority information that user is inputted by identity authority item is received, Obtain the identity authority of searched identity corresponding with the user;According to the identity authority of the searched identity, institute is set State the personal information of user and the corresponding relationship of identity information.
In one embodiment, following steps are also realized when computer program is executed by processor:It is searched to described with described The search rule of rope content matching determines that target user carries out regular verification, obtains effective search rule;It is effectively searched according to described Rope rule obtains searched identity.
In one embodiment, following steps are also realized when computer program is executed by processor:Judge in described search Hold and whether is exactly matched with a certain search rule in described search database;If the determination result is YES, then it a certain is searched described Rope rule is as the candidate search rule.
In one embodiment, following steps are also realized when computer program is executed by processor:Search record is obtained, and Described search is recorded and carries out data analysis, obtains the content alias of the search setting item of described search rule;If described search Content is exactly matched with the content alias of the content of described search rule or corresponding search setting item, then is advised described search Then as candidate search rule.
In one embodiment, following steps are also realized when computer program is executed by processor:If by received search Search rule in content and search database carries out content matching, does not obtain candidate search rule, then cognition is submitted to request, and According to the search rule and search record of the cognition request active user setting, the search target of active user is obtained; Cognition search rule is obtained according to described search target, and the use of the cognition search rule is institute in described search database State search content matching candidate search rule.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (11)

1. one kind is based on social networks looking-for-person method, which is characterized in that the method includes:
Search setting request based on the received returns to search setting item, is searched so that user sets item setting according to described search The search rule of rope identity;
By the search rule deposit search database of the searched identity;
Received search content is matched with the search rule in described search database, is obtained and described search content The candidate search rule matched;
Target user is determined according to the candidate search rule.
2. the method according to claim 1, wherein determining target user's according to the candidate search rule Further include after step:
Obtain the identity authority of the corresponding searched identity of the candidate search rule;
The identity information of the target user is obtained from User Information Database according to the identity authority;
Export the identity information of the target user.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The personal information of user's input is received, and personal information is stored in User Information Database;
The authority information that user is inputted by identity authority item is received, the identity of searched identity corresponding with the user is obtained Permission;
According to the identity authority of the searched identity, the personal information of the user and the corresponding relationship of identity information are set.
4. the method according to claim 1, wherein determining the step of target user according to the candidate search rule Suddenly include:
It determines that target user carries out regular verification with described search content matching search rule to described, obtains effectively searching for rule Then;
Searched identity is obtained according to effective search rule.
5. the method according to claim 1, wherein described by received search content and described search database In search rule matched, obtain include with the step of the candidate search of described search content matching rule:
Judge whether described search content exactly matches with a certain search rule in described search database;
If the determination result is YES, then using a certain search rule as the candidate search rule.
6. method according to claim 1-5, which is characterized in that described to search received search content with described Search rule in rope database is matched, obtain include with the step of the candidate search of described search content matching rule:
Search record is obtained, and described search is recorded and carries out data analysis, obtains the search setting item of described search rule Content alias;
If the content alias match of described search content and the content of described search rule or corresponding search setting item, will Described search rule is as candidate search rule.
7. method according to claim 1-5, which is characterized in that the method also includes:
If the search rule in received search content and described search database is carried out content matching, candidate search is not obtained Rule then submits cognition to request, and is recorded according to the search rule and search of the cognition request active user setting, obtains To the search target of active user;
Cognition search rule is obtained according to described search target, and using the cognition search rule in described search database For described search content matching candidate search rule.
8. the method according to the description of claim 7 is characterized in that described search target includes similar setting target retrieval or phase To setting target retrieval.
9. one kind is based on social networks missing device, which is characterized in that described device includes:
Rule settings module returns to search setting item, so that user searches according to described for search setting request based on the received Rope sets the search rule that searched identity is arranged in item;
Database is searched for, for storing the search rule of the searched identity;
Matching module is waited for received search content and the search rule searched in database to be carried out content matching Select search rule;
Processing module, for determining target user according to the candidate search rule.
10. a kind of computer equipment, including memory and processor, be stored on the memory to run on a processor Computer program, which is characterized in that the processor realizes any one of claims 1 to 8 when executing the computer program The step of the method.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any item of the claim 1 to 8 is realized when being executed by processor.
CN201810786369.8A 2018-07-17 2018-07-17 Social network-based person searching method and device, computer equipment and storage medium Active CN108875083B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810786369.8A CN108875083B (en) 2018-07-17 2018-07-17 Social network-based person searching method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810786369.8A CN108875083B (en) 2018-07-17 2018-07-17 Social network-based person searching method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108875083A true CN108875083A (en) 2018-11-23
CN108875083B CN108875083B (en) 2021-01-19

Family

ID=64302664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810786369.8A Active CN108875083B (en) 2018-07-17 2018-07-17 Social network-based person searching method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108875083B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110544096A (en) * 2019-09-05 2019-12-06 腾讯科技(深圳)有限公司 Block chain-based data acquisition method, device, equipment and storage medium
CN111428126A (en) * 2019-12-29 2020-07-17 王焕土 Matching person finding frame mode applied to network platform and matching search method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103412910A (en) * 2013-08-02 2013-11-27 北京小米科技有限责任公司 Methods and devices for building tag library and searching users
CN103942271A (en) * 2014-03-27 2014-07-23 宇龙计算机通信科技(深圳)有限公司 User information finding system and method
CN104834743A (en) * 2015-05-21 2015-08-12 孟勐 Interpersonal connection displaying and searching method
US20150363499A1 (en) * 2014-06-17 2015-12-17 Alibaba Group Holding Limited Search based on combining user relationship datauser relationship data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103412910A (en) * 2013-08-02 2013-11-27 北京小米科技有限责任公司 Methods and devices for building tag library and searching users
CN103942271A (en) * 2014-03-27 2014-07-23 宇龙计算机通信科技(深圳)有限公司 User information finding system and method
US20150363499A1 (en) * 2014-06-17 2015-12-17 Alibaba Group Holding Limited Search based on combining user relationship datauser relationship data
CN104834743A (en) * 2015-05-21 2015-08-12 孟勐 Interpersonal connection displaying and searching method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110544096A (en) * 2019-09-05 2019-12-06 腾讯科技(深圳)有限公司 Block chain-based data acquisition method, device, equipment and storage medium
CN110544096B (en) * 2019-09-05 2023-12-12 腾讯科技(深圳)有限公司 Block chain-based data acquisition method, device, equipment and storage medium
CN111428126A (en) * 2019-12-29 2020-07-17 王焕土 Matching person finding frame mode applied to network platform and matching search method

Also Published As

Publication number Publication date
CN108875083B (en) 2021-01-19

Similar Documents

Publication Publication Date Title
US11323347B2 (en) Systems and methods for social graph data analytics to determine connectivity within a community
US11252256B2 (en) System for association of customer information across subscribers
US10042939B2 (en) Techniques for personalizing expertise related searches
WO2020019565A1 (en) Search sorting method and apparatus, and electronic device and storage medium
TWI647583B (en) Prompt method and prompting device for login account
CN110765295A (en) Graph database-based query method and device, computer equipment and storage medium
US20150205822A1 (en) Methods and Systems for Contact Management
CN108153876A (en) Intelligent answer method and system
CN103109291A (en) People directory with social privacy and contact association features
WO2020019562A1 (en) Search sorting method and device, electronic device, and storage medium
CN107155362A (en) The search results ranking that will be inquired about for members profiles
CN107992513A (en) A kind of information processing system and its method for realizing information processing
WO2013097026A1 (en) Systems and methods for visualizing social graphs
CN108959644A (en) Search ordering method, device, computer equipment and storage medium
US9928272B1 (en) Determining contact-related information
US10867053B2 (en) Creating software packages for performing secure computations
US12019684B2 (en) Application programming interface arranged to interface with a plurality of data sources
CN108875083A (en) Based on social networks looking-for-person method, device, computer equipment and storage medium
CN107092667A (en) Group's lookup method and device based on social networks
CN109460541A (en) Lexical relation mask method, device, computer equipment and storage medium
CN109087053B (en) Collaborative office processing method, device, equipment and medium based on association topological graph
US20210241215A1 (en) Data processing systems for generating and populating a data inventory
CN112989216B (en) Colleague recommendation method, device, computer equipment and storage medium
US20170004456A1 (en) Search by applicant ranker scores
CN116578984A (en) Risk management and control method, system, equipment and medium for business data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant