CN108875083A - Based on social networks looking-for-person method, device, computer equipment and storage medium - Google Patents
Based on social networks looking-for-person method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN108875083A CN108875083A CN201810786369.8A CN201810786369A CN108875083A CN 108875083 A CN108875083 A CN 108875083A CN 201810786369 A CN201810786369 A CN 201810786369A CN 108875083 A CN108875083 A CN 108875083A
- Authority
- CN
- China
- Prior art keywords
- search
- rule
- user
- identity
- searched
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 78
- 230000019771 cognition Effects 0.000 claims description 34
- 238000004590 computer program Methods 0.000 claims description 29
- 238000007405 data analysis Methods 0.000 claims description 8
- 238000012795 verification Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 5
- 239000000047 product Substances 0.000 description 10
- 241000234671 Ananas Species 0.000 description 7
- 235000007119 Ananas comosus Nutrition 0.000 description 7
- 241001501970 Prionailurus bengalensis Species 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 235000012149 noodles Nutrition 0.000 description 4
- 238000010801 machine learning Methods 0.000 description 3
- 238000004458 analytical method Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 239000013589 supplement Substances 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 150000001875 compounds Chemical class 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Landscapes
- Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- Software Systems (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application involves one kind to be based on social networks looking-for-person method, device, computer equipment and storage medium, this method is primarily based on the search database of the searched identity building of user's sets itself, the search database does not include the personal information of user, search content is sent to server by terminal in user later, when carrying out missing operation, the search content is subjected to content matching in search database, obtains candidate search rule, and then obtain the searched corresponding user of identity.Since the search rule searched in database in this method is search wish setting when setting searched identity based on user, this method can voluntarily be controlled the crowd of its social circle by user (i.e. which specific crowd can search out him).In addition, individual subscriber personal information can be effectively protected in the search database used not comprising userspersonal information for scanning for rule match in the method for the present embodiment, prevent from stealing userspersonal information by largely retrieving joining method malice.
Description
Technical field
This application involves fields of communication technology, are based on social networks looking-for-person method, device, computer more particularly to one kind
Equipment and storage medium.
Background technique
Specific crowd is found by social networks, is the common side that people find kith and kin or particular task in the modern life
Formula.In traditional technology, when carrying out who object searching by network, it will use a large amount of personal information and matched, obtained
Personal information is more comprehensive, and matching result is more accurate.Therefore service provider can improve each use when providing the search service as far as possible
The personal information at family.
However, this allows other people by splicing to multiple retrieval information, the privacy information of user is obtained, is caused
Userspersonal information's leakage.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of can guarantee userspersonal information's safety based on
Social networks looking-for-person method, device, computer equipment and storage medium.
One kind being based on social networks looking-for-person method, the method includes:
Search setting request based on the received returns to search setting item, is arranged so that user sets item according to described search
The search rule of searched identity;
By the search rule deposit search database of the searched identity;
Received search content is matched with the search rule in described search database, obtain in described search
Hold matched candidate search rule;
Target user is determined according to the candidate search rule.
As an optional implementation manner, after the step of determining target user according to the candidate search rule also
Including:
Obtain the identity authority of the corresponding searched identity of the candidate search rule;
The identity information of the target user is obtained from User Information Database according to the identity authority;
Export the identity information of the target user.
As an optional implementation manner, the method also includes:
The personal information of user's input is received, and personal information is stored in User Information Database;
The authority information that user is inputted by identity authority item is received, searched identity corresponding with the user is obtained
Identity authority;
According to the identity authority of the searched identity, the personal information pass corresponding with identity information of the user is set
System.
As an optional implementation manner, the step of determining target user according to the candidate search rule include:
It determines that target user carries out regular verification with described search content matching search rule to described, is effectively searched
Rope rule;
Searched identity is obtained according to effective search rule.
As an optional implementation manner, the search by received search content and described search database is advised
Then matched, obtain include with the step of the candidate search of described search content matching rule:
Judge whether described search content exactly matches with a certain search rule in described search database;
If the determination result is YES, then using a certain search rule as the candidate search rule.
As an optional implementation manner, the search by received search content and described search database is advised
Then matched, obtain include with the step of the candidate search of described search content matching rule:
Search record is obtained, and described search is recorded and carries out data analysis, obtains the search setting of described search rule
The content alias of item;
If described search content and the content alias of the content of described search rule or corresponding search setting item are complete
Matching, then using described search rule as candidate search rule.
As an optional implementation manner, the method also includes:If by received search content and described search number
Content matching is carried out according to the search rule in library, candidate search rule is not obtained, then submits cognition to request, and according to the cognition
The search rule and search record of request active user setting, obtain the search target of active user;According to described search
Target obtains cognition search rule, and the use of the cognition search rule is described search content in described search database
With candidate search rule.
As an optional implementation manner, described search target includes similar setting target retrieval or opposite setting target
Retrieval.
One kind being based on social networks missing device, and described device includes:
Rule settings module returns to search setting item, so that user is according to institute for search setting request based on the received
State the search rule that searched identity is arranged in search setting item;
Database is searched for, for storing the search rule of the searched identity;
Matching module is obtained for received search content and the search rule searched in database to be carried out content matching
To candidate search rule;
Processing module, for determining target user according to the candidate search rule.
A kind of computer equipment, including memory and processor are stored with and can be run on a processor on the memory
Computer program, the processor realizes following steps when executing the computer program:
Search setting request based on the received returns to search setting item, is arranged so that user sets item according to described search
The search rule of searched identity;
By the search rule deposit search database of the searched identity;
Received search content and the search rule searched in database are subjected to content matching, obtain candidate search rule
Then;
Target user is determined according to the candidate search rule.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
Following steps are realized when row:
Search setting request based on the received returns to search setting item, is arranged so that user sets item according to described search
The search rule of searched identity;
By the search rule deposit search database of the searched identity;
Received search content and the search rule searched in database are subjected to content matching, obtain candidate search rule
Then;
Target user is determined according to the candidate search rule.
Above-mentioned to be based on social networks looking-for-person method, device, computer equipment and storage medium, this method is primarily based on user
The search database of the searched identity building of sets itself, the search database do not include the personal information of user, Zhi Hou
User by terminal send search content arrive server, carry out missing operation when, by the search content search for database in into
Row content matching obtains candidate search rule, and then obtains the searched corresponding user of identity.Due to searching for data in this method
Search rule in library is search wish setting when setting searched identity based on user, and therefore, this method can be by user
Voluntarily control the crowd of its social circle (i.e. which specific crowd can search out him).In addition, the method for the present embodiment is carrying out
Individual subscriber private can be effectively protected in the matched search database used not comprising userspersonal information of search rule
People's information prevents from stealing userspersonal information by largely retrieving joining method malice.
Detailed description of the invention
Fig. 1 is the applied environment figure based on social networks looking-for-person method in one embodiment;
Fig. 2 is the flow diagram based on social networks looking-for-person method in one embodiment;
Fig. 3 is the supplement steps flow chart schematic diagram based on social networks looking-for-person method in one embodiment;
Fig. 4 is to obtain the step flow diagram of candidate search rule in one embodiment;
Fig. 5 is to obtain the step flow diagram of candidate search rule in one embodiment;
Fig. 6 is the supplement steps flow chart schematic diagram based on social networks looking-for-person method in another embodiment;
Fig. 7 is the structural block diagram based on social networks missing device in one embodiment;
Fig. 8 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
It is provided by the present application to be based on social networks looking-for-person method, it can be applied in application environment as shown in Figure 1.Its
In, terminal 102 is communicated with server 104 by network by network.Wherein, terminal 102 can be, but not limited to be various
Personal computer, laptop, smart phone, tablet computer and portable wearable device, server 104 can be with independently
The server cluster of server either multiple servers composition realize.
In one embodiment, it as shown in Fig. 2, providing one kind based on social networks looking-for-person method, applies in this way
It is illustrated, includes the following steps for server in Fig. 1:
Step 210, search setting request based on the received returns to search setting item, so that user sets according to described search
Determine the search rule that searched identity is arranged in item.
Wherein, search setting item is the option for the category feature that user setting is searched identity, for limiting user oneself
It is expected that searching the crowd of oneself.It may include keyword item, messenger item, location entries, class items etc..Wherein, keyword
Item, messenger item can be multiple.Specifically, server 104 searches for setting request based on the received, returns to search setting item,
So that user sets the search rule that searched identity is arranged in item according to described search.Optionally, user can be according to itself need
Seek the multiple searched identity relevant to the user of setting.Optionally, the searched identity of user setting can be in its identity registration
When, search setting can also be initiated to server 104 by terminal 102 and asked in the demand in need for increasing searched identity
It asks.
Such as:User A can set searched identity 1 for the identity of its company X line manager;Finish for its F university
The raw identity of industry sets searched identity 2.When user sets searched identity for this identity of company X line manager, first
Search setting request is sent to server 104 by terminal 102, server 104 is returned according to search setting request to terminal 102
Search setting item is returned, it includes keyword item, messenger item, location entries, class items which, which sets item,.User can choose wherein
One or more of search terms set.Such as:" company X " can be used as to key word item 1, " department Y " is used as keyword
2, it regard its work cell-phone number " 123-0000-0001 " as messenger item, not set location entries, the relevant information of class items,
And the above-mentioned search setting item input information of exact matching is limited, it can just match its " company X line manager " this setting and be searched
Rope identity.Server 104 generates search rule according to " company X ", " department Y " and " 123-0000-0001 ".The search of generation
Rule can be stored in search database in table form, i.e., corresponding be filled to of above- mentioned information is searched for retrieval table in database
Under corresponding list item.Certainly, above-mentioned search rule is also possible to keyword 1 " company X "+keyword 2 " department Y "+cell-phone number " 123-
This form of 0000-0001 ".As long as the search rule can express the desired limit search condition of user, concrete form
It can flexibly be set according to the data format requirement of search database itself, not do format herein and specifically limit.
Step 220, by the search rule deposit search database of the searched identity.
Wherein, it searches for and only stores the searched corresponding search rule of identity in database, do not store userspersonal information.With
Family personal information is stored in the User Information Database individually set up.Optionally, the search rule that server 104 will acquire is deposited
Enter and search for database, while establishing search rule and searched identity and the relation chain of user, which can be index
Form or the other forms such as table.According to the available search rule of the relation chain and searched identity and user it
Between corresponding relationship.
Step 230, received search content is matched with the search rule in described search database, is obtained and institute
State the candidate search rule of search content matching.
Specifically, server 104 matches received search content with the search rule in described search database,
It obtains and the candidate search of described search content matching rule.Optionally, server 104 receives user and is inputted by terminal 102
Search content after, traversal search database, by search for content with search database in search rule match, if described
Content is matched with search rule, then the candidate search rule searched for the search rule of the successful match as this.
Step 240, target user is determined according to the candidate search rule.
Specifically, server 104 determines target user according to the candidate search rule.Optionally, server 104 is first
Searched identity is determined according to candidate rule, is searched identity further according to this later and is determined target user.
It is above-mentioned to be based on social networks looking-for-person method, it is primarily based on the search number of the searched identity building of user's sets itself
According to library, which does not include the personal information of user, is sent in user by terminal search for content to server later,
When carrying out missing operation, which is subjected to content matching in search database, obtains candidate search rule, and then obtain
To the corresponding user of searched identity.Since the search rule searched in database in this method is searched based on user's setting
Search wish setting when identity, therefore, this method can voluntarily be controlled crowd's (i.e. which particular person of its social circle by user
Group can search out him).In addition, the method for the present embodiment is scanning for the using not comprising individual subscriber of rule match
The search database of information, can be effectively protected individual subscriber personal information, prevent by largely retrieving joining method malice
Steal userspersonal information.
As an optional implementation manner, as shown in figure 3, determining target user's according to the candidate search rule
Further include after step:
Step S250:Obtain the identity authority of the corresponding searched identity of the target search rule.
Wherein, which personal information is identity authority show to search user for limiting corresponding searched identity.Such as
Show name, company, school, one or more of age.Specifically, it is right to obtain the target search rule for server 104
The identity authority for the searched identity answered.Optionally, which can be what user was arranged when creating searched identity,
Be also possible to it is subsequent based on demand be arranged or modify.
Step S260:The identity letter of the target user is obtained from User Information Database according to the identity authority
Breath.
Specifically, server 104 obtains the target user's according to the identity authority from User Information Database
Identity information.Optionally, server is primarily based on searched identity and the relation chain of user, determines target user, further according to body
Part permission calls associated personal information, forms the searched corresponding identity information of identity.
Step S270:Export the identity information of the target user.
Specifically, server 104 is exported the identity information of the target user as search result.
The method of the present embodiment can show that the personal of different range is believed to different social circles according to user oneself wish
Breath.
As an optional implementation manner, above-mentioned to further include based on social networks looking-for-person method:
The personal information of user's input is received, and personal information is stored in User Information Database.
Specifically, server 104 receives the personal information of user's input, and personal information is stored in user information data
Library.Optionally, which can acquire in user's registration, can also user it is subsequent using account during, according to
Demand is modified.It should be understood that User Information Database and search database are independent two databases.
The authority information that user is inputted by identity authority item is received, searched identity corresponding with the user is obtained
Identity authority.
Specifically, server 104 receives the authority information for the identity authority item input that user is shown by terminal 102, obtains
To the identity authority of searched identity corresponding with the user.
According to the identity authority of the searched identity, the personal information pass corresponding with identity information of the user is set
System.
Specifically, server 104 is according to the identity authority of the searched identity, be arranged the personal information of the user with
The corresponding relationship of identity information.
Present embodiments provide it is a kind of building User Information Database in personal information with show search user identity
The method of information can be used family and only be obtained by its desired crowd in protection personal information, individual privacy is effectively protected.
As an optional implementation manner, the step of determining target user according to the candidate search rule include:It is right
It is described to determine that target user carries out regular verification with described search content matching search rule, effective search rule is obtained, and
Searched identity is obtained according to effective search rule.
Specifically, server 104 determines that target user advises to the search rule with described search content matching
It then verifies, obtains effective search rule, and searched identity is obtained according to effective search rule.
The method that the present embodiment proposes can screen out the undesirable particular condition being searched, example by rule verification
Such as:The setting of negated condition in search rule.User can be helped preferably to limit the searched crowd of expectation.
As an optional implementation manner, as shown in figure 4, described will be in received search content and search database
Search rule carries out content matching, and the step for obtaining candidate search rule includes:
Step S231a:Judge a certain search rule whether complete in described search content and described search database
Match.Specifically, server 104 judges a certain search rule whether complete in described search content and described search database
Match.
Step S232a:If the determination result is YES, then using a certain search rule as the candidate search rule.It can
Selection of land, server 104 continues that content will be searched for and next search rule carries out content matching, until having traversed search database.
Specifically, server 104 is when result, which is, is, using a certain search rule as the candidate search rule.
Step S233a:If judging result be it is no, skip a certain search rule, and will search content and next search
Rule carries out content matching.Specifically, server 104 skips a certain search rule when judging result is, and will be in search
Hold and carry out content matching with next search rule, until having traversed search database.
The present embodiment is when searching for database is that search content carries out content matching, it is desirable that exact matching, it can be effective
Information is denoised.
As an optional implementation manner, as shown in figure 5, described will be in received search content and search database
Search rule carries out content matching, and the step for obtaining candidate search rule includes:
Step S231b:Search record is obtained, and described search is recorded and carries out data analysis, obtains described search rule
Search setting item content alias.Specifically, server 104 obtains search record, and records to described search and carry out data
Analysis obtains the content alias of the search setting item of described search rule.Such as it can be arranged according to data analysis result and be searched for
The content alias of item " company A " is set as " A Pty. Ltd. ".
Step S232b:If described search content sets the interior of item with the content of described search rule or corresponding search
Hold alias exact matching, then using described search rule as candidate search rule.Specifically, server 104 is in described search
When holding the content alias exact matching with the content of described search rule or corresponding search setting item, then described search is advised
Then as candidate search rule.
For the present embodiment by being analyzed and processed to search record, the content for obtaining search setting item in search rule is other
Name can help user effectively to expand social scope under the premise of limiting searched range.
As an optional implementation manner, as shown in fig. 6, above-mentioned be based on social networks looking-for-person method, further include:
Step S280:If received search content and the search rule searched in database are carried out content matching, not
To candidate search rule, then submit cognition request, and according to it is described cognition request active user setting search rule and
Search record, obtains the search target of active user.
Specifically, if received search content and the search rule searched in database are carried out content by server 104
Match, do not obtain candidate search rule, then cognition is submitted to request, and obtains the search rule and search record of active user's setting,
Obtain the search target of active user.Optionally, which can be similar setting target retrieval or opposite setting target
Retrieval.Wherein, it is similar set target retrieval as search user attempt to look for oneself setting a certain searched identity it is identical
Retrieval.The opposite target retrieval that set is the identical inspection of the searched identity part of search for that user attempts to look for setting with oneself a certain
Rope.Optionally, server may also feed back search user to received cognition request and be not up to preset cognition retrieval
Standard, server 104 can direct feedback search result at this time.
Step S290:Cognition search rule is obtained according to described search target, and using the cognition search rule in institute
It states in search database as described search content matching candidate search rule.
Specifically, server 104 obtains cognition search rule according to described search target, and uses cognition retrieval rule
It is then described search content matching candidate search rule in described search database.
Further, it will acquire user and search for target as goal task building machine learning model, then using training
The machine learning model of sample training building, until each network layer convergence of model.Finally data are carried out using the model trained
Processing, can quickly obtain the search need of user.
Server requests received cognition in the present embodiment, can be divided based on search record of the server to acquisition
Analysis study, the search need of the user obtained from, can service search user and searched user more with open arms, both make
It is more easier to be searched out by the other side of intention.Optionally, it is recorded, is obtained by the search rule and search that are set to active user
The search target of active user, can be realized by way of machine learning.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.In the present embodiment, use cell-phone number as the search rule of its friend's (searched identity) set by user A.This method
Including:
Step S301:User A passes through phone number with uniqueness when using the above method for the first time by terminal
123-0000-0001 is registered, and is recorded into this phone number as unique index in the account data table of database.
Step S302:User A opens phone number in the search terms setting of the searched identity " friend " of its setting
(allowing to search identity objects by registering phone number) option, is filled out in this, as search content, and by related content correspondence
It is written under the list item in search setting tables of data.
Step S303:Server will to search database in search setting tables of data retrieve, check whether include
The phone number of user A is that the record row for searching for content creates new record row with the user friend A in the case where no,
Using phone number as search content, and search configuration switch is set as opening;Such as this is recorded existing, and search configuration switch is
It closes, then the search configuration switch of more new record row is to open.
Step S304:User B is scanned in search by terminal input handset number 123-0000-0001.
Step S305:Server receives the request of user B, by phone number contrasting data library search set item into
Row retrieval, searching mobile phone number is identical with search content, and searching for configuration switch is the record row opened.Finding user
After the record that A is created in search set information table, the included correspondence identity objects of record row are replied to user B:User A.
Step S306:Result of the user B based on search feedback sends application good friend to user A, checks that information etc. is requested.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.In the present embodiment, use the pet name as the search rule of its friend's (searched identity) set by user A, B, C.The party
Method includes:
Step S401:For user A when the search for filling in searched identity limits item, addition this search of the pet name sets item
" Zhang San ";User B is when the search for filling in searched identity limits item, addition this search of pet name setting item " Zhang San ";User C
When the search for filling in searched identity limits item, addition this search of pet name setting item " small Zhang San ".User A, B, C are being searched for
In setting, opening pet name item (allows to search identity objects by object oriented) option, navigates in this, as search content
Oneself, and will be under the corresponding list item filled in into search setting tables of data of related content.
Step S402:Server will retrieve the search set information in database, check above three users
Whether comprising the record row with the pet name to search for content in record belonging to the searched identity set, in the case where no, with
The searched identity creates new record row, using the pet name as search content, and search configuration switch is set as opening;Such as note
Record it is existing, search configuration switch be close, then the search configuration switch of more new record row be open.
Step S403:User D is scanned for by terminal input " Zhang San ".
Step S404:Server receives the request of user D, and the pet name " Zhang San " sets the search of search setting tables of data
Determine information to be retrieved, it is identical with content is searched for find the pet name, and searching for configuration switch is all record rows opened.?
Find accordingly after search setting record, to user D reply the search of searched identity set set the pet name that item includes as
The user of " Zhang San ", as user A and user B.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.In the present embodiment, use multiple keywords as the search rule of its friend's (searched identity) set by user A.It should
Method includes:
Step S501:In the search setting item for setting searched identity " friend ", addition keyword (allows to lead to user A
Cross keyword and search identity objects) option, oneself is navigated in this, as search content.User A is selected between keyword
Relationship is "or", and restriction is at least correct to submit wherein 3 keywords, and provides " plande noodles, northern school gate east side, steamer, three
Person-portion, 407,2000 " are used as keyword.Above search rule (y) formula is:A=" plande noodles ";B=" northern school gate east side ";c
=" steamer ";D=" three person-portions ";E=" 407 ";F=" 2000 ";Y=(a ∨ b ∨ c ∨ d ∨ e ∨ f)∧3, wherein " ∧ " is indicated
" and " relationship restriction, " ∨ " indicates that "or" relationship limits," non-" relationship of expression limits,^nIt then indicates at least to meet corresponding ()
Interior n condition.
Step S502:Server will retrieve the search set information in search setting tables of data, check whether to wrap
The search prescribed information of the searched identity " friend " of the setting of A containing user, if comprising further determining that in the record whether wrap
Containing using "or" as relationship, 3 be limitation quantity, and " plande noodles, northern school gate east side, steamer, three person-portions, 407 " is that search limits item
Record row is searched identity " friend " with this and creates new record row, and search configuration switch is set as opening if not having;Such as
This record it is existing, search configuration switch be close, then the search configuration switch of more new record row be open.
Step S503:ABC university was attended school in 2000 simultaneously with user A, and the user B for living 407 dormitories together is passing through end
End input " ABC university, 2000, department of mathematics, 407 " scans for.
Step S504:User C with user's A dormitory all likes the knife of school gate at that time to cut during attending school with user A
Face, user C are scanned for by terminal input " 407, plande noodles, steamer, three person-portions ".
Step S505:Server receives the request of user B, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.Because
The keyword message that user B is searched for only has " 2000 " and " 407 " two content matchings, do not meet that user A sets at least
With 3 restrictive rules, server, which replies to, will not include user A in the result of user B.
Step S506:Server receives the request of user C, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User
The keyword that C is searched for meets the search rule of the searched identity " friend " of user A setting, and server replies to user C's
As a result by the identity objects comprising user A in.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.In the present embodiment, by the search rule of user A its " old friend " (searched identity) set using compound rule.Specifically
Ground, user A were once taken office as sales force in company ABC, were responsible for sale DEF product, were just left recently, and in GHI company
Take up the post of governing positions, there is a special contact secret signal " leopard cat " between user A and old friend.User wish with it is some specific
Old friend keeps, but is also no longer desire to contact oneself because of the selling operation of past ABC simultaneously.This method includes:
Step S601:User A is created following regular and interior when setting searched identity " old friend " search rule
Hold:
Must include in 1 retrieval information (" and " relationship restriction) " leopard cat ".
(restriction of "or" relationship) 2 the following contents are included at least in 2 retrieval information:1) " company ABC, DEF product, system
Framework, Lao Wang ";2) retrieving in information cannot include (restriction of " non-" relationship) " sale ".
Above-mentioned search rule (y) formula is:A=" leopard cat ";B=" company ABC ";C=" DEF product ";D=" system tray
Structure ";E=" Lao Wang ";F=" sale ";Wherein " ∧ " expression " and " relationship limit,
" ∨ " indicates that "or" relationship limits," non-" relationship of expression limits,^nIt then indicates at least to meet corresponding () interior n condition.
Step S602:Server will retrieve the search set information in search setting tables of data, check whether to wrap
The search prescribed information of the searched identity " old friend " of the setting of A containing user, if not including, with searched identity " old friend " wound
New record row is built, item is set as search content using the search of above-mentioned search rule, and search configuration switch is set as opening;
Such as this is recorded existing, and search configuration switch is to close, then the search configuration switch of more new record row is to open.
Step S603:The colleague user B of user A is scanned for by terminal input " company ABC, DEF product, Lao Wang ".
Step S604:User C is scanned for by terminal input " company ABC, Lao Wang, leopard cat, sale ".
Step S605:User D is scanned for by terminal input " system architecture, Lao Wang, leopard cat, company ABC ".
Step S606:Server receives the request of user B, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User
The keyword message that B is searched for has three to match with "or" relationship in setting, but because do not meet search rule " and " relationship wants
" leopard cat " keyword asked, server reply to the identity objects that will not include user A in the result of user B.
Step S607:Server receives the request of user C, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User
C search when meet "or" and " and " relationship, but because search key in be previously mentioned " sale ", violate in search rule
The setting of " non-" relationship, server reply to the identity objects that will not include user A in the result of user C.
Step S608:Server receives the request of user D, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.User
D meets at least two " system architecture, Lao Wang, company ABCs " of "or" relationship, also meets search rule in retrieval
" and " " leopard cat " of relationship, while not including " sale " of search rule " non-" relationship, it is wrapped in the result of server reply user D
The identity objects of the A containing user.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.In the present embodiment, it is the sales force of company ABC " pineapple " participants in a bridge game's machine by user A, is responsible for selling the mobile phone products, make
The search rule of its " old friend " (searched identity) is limited with classification.This method includes:
Step S701:User A is added to "or" relationship, and wrap when searched identity " old friend " search rule is arranged
Contain " company ABC, pineapple, sale ", setting at least meets two, while user defines " pineapple " and is classified as " mobile phone ".
When due to search " pineapple ", according to the search rule being normally set up, it is other as a result, still originally that a large amount of fruits may be matched
" pineapple " has been defined under " mobile phone " classification by embodiment, can reduce search range, improves system response efficiency.
Step S702:Server retrieves the search set information of search setting tables of data, checks user setting
Whether comprising the above setting in record belonging to searched identity " old friend ", in the case where no, to be searched identity " old friend
The new record row of friend " creation limits item as search content using the search in search rule, and search configuration switch is set as out
It opens;Such as this is recorded existing, and search configuration switch is to close, then the search configuration switch of more new record row is to open.
Step S703:User B is scanned for by inputting " pineapple, sale ".
Step S704:User C is scanned for by inputting " company ABC, pineapple ", and is classified as retrieval is selected
" mobile phone ".
Step S705:Server receives the request of user D, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.Due to
User B does not have to limit the classification of content when retrieving, and search rule are arranged to searched identity " old friend " so not meeting user A
Then, server will not reply user A and give user B.
Step S706:Server receives the request of user D, will be in these keywords of submission and search setting tables of data
Search set information retrieved, find content it is identical, and search for configuration switch be unlatching all record rows.Due to
The search content of user C input meets user A and search rule is arranged to searched identity " old friend ", and server replys user A
Give user C.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.This method includes:
Step S801:User A sets "or" relationship when setting searched identity " friend ";Search setting item includes to close
Keyword " company ABC, DEF product, technical adviser ", and set at least two keywords and meet, obtain search rule.
Step S802:Server will retrieve the search set information in search setting tables of data, check whether to wrap
The search prescribed information of the searched identity " friend " of the setting of A containing user is searched identity " friend " creation newly with this if not having
Record row, and by search configuration switch be set as opening;Such as this is recorded existing, and search configuration switch is to close, then updates note
The search configuration switch of record row is to open.And handled based on the analysis to search record, " ABC & Co., Ltd. " is used as keyword
The content alias of item " company ABC " is added to alias cognition set.
Step S803:User B has input " ABC & Co., Ltd., technical adviser " and retrieves.
Step S804:After server receives the retrieval request of user B, to search setting tables of data combination alias cognition collection
Conjunction is traversed, and " ABC & Co., Ltd. " and " technical adviser " two keywords are searched for.This target object of user A is obtained, and will
User A feeds back to user B.
It is proposed in one of the embodiments, using the above-mentioned side for finding target user based on social networks looking-for-person method
Method.This method includes:
Step S901:User A sets "or" relationship when setting searched identity " friend ", and search setting item includes to close
Keyword " company ABC, DEF product, technical adviser ", and set at least two keywords and meet, obtain search rule.User A exists
The retrieval " company ABC, technical adviser " continuously repeated in past several days, " ABC & Co., Ltd., technical adviser ", " DEF product,
The approximation operations such as technical staff ", but it is matched to search result not successfully always.
Step S902:User B sets "or" relationship when setting searched identity " friend ";Search setting item includes to close
Keyword " company ABC, DEF product, technology are pre-sales ", and set at least two keywords and meet, obtain search rule.User B exists
The retrieval " company ABC is pre-sales " continuously repeated in past several days, " ABC & Co., Ltd.'s technology ", " DEF product technology personnel " etc.
Approximation operation.
Step S903:System uses the cognition standard pair of default setting when receiving the retrieval request of user B next time
User carries out rule of recogni-tion judgement, confirms user B when a certain searched identity is arranged according to judging result, the search of setting is advised
Then and whether search behavior meets the setting that preset specific aim repeatedly is retrieved.
Step S904:, server obtains other user cognition history while executing step S903 again, and judges whether to wrap
Containing with user B have it is similar setting target retrieval demand and/or to setting target retrieval demand user, obtain user A and setting
When setting a certain searched identity, the search rule and search behavior of setting meet pre-set similar setting user and match mark
It is quasi-.Server can include the search result of user A for the reply of user B at this time.
It should be understood that although each step in the flow chart of Fig. 2-6 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-6
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in fig. 7, providing one kind based on social networks missing device, described device includes:
Rule settings module 710 returns to search setting item, so that user's root for search setting request based on the received
The search rule of searched identity is set according to described search setting item.
Database 720 is searched for, for storing the search rule of the searched identity.
Matching module 730, for received search content to be matched with the search rule in described search database,
It obtains and the candidate search of described search content matching rule.
Processing module 740, for determining target user according to the candidate search rule.
As an optional implementation manner, processing module 740, for obtaining, the candidate search rule is corresponding to be searched
The identity authority of rope identity;The identity letter of the target user is obtained from User Information Database according to the identity authority
Breath;Export the identity information of the target user.
As an optional implementation manner, described to be based on social networks missing device, it further include User Information Database
740, for storing the personal information of user's input;It is defeated by identity authority item to be also used to receive user for rule settings module 710
The authority information entered obtains the identity authority of searched identity corresponding with the user;According to the body of the searched identity
Part permission, is arranged the personal information of the user and the corresponding relationship of identity information.
As an optional implementation manner, matching module 730, for described and described search content matching search
Rule determines that target user carries out regular verification, obtains effective search rule;It is searched according to effective search rule
Identity.
As an optional implementation manner, matching module 730, for judging described search content and described search data
Whether a certain search rule in library exactly matches;If the determination result is YES, then using a certain search rule as the time
Select search rule.
As an optional implementation manner, matching module 730 are recorded for obtaining search record, and to described search
Data analysis is carried out, the content alias of the search setting item of described search rule is obtained;If described search content and described search
The content alias exact matching of the content of rule or corresponding search setting item, then using described search rule as candidate search
Rule.
As an optional implementation manner, matching module 730, if being also used to received search content and search data
Search rule in library carries out content matching, does not obtain candidate search rule, then submits cognition to request, and asked according to the cognition
The search rule for obtaining active user's setting and search record are asked, the search target of active user is obtained;According to described search mesh
Mark obtains cognition search rule, and the use of the cognition search rule is described search content matching in described search database
Candidate search rule.
It may refer to about the specific restriction based on social networks missing device above for based on social networks missing
The restriction of method, details are not described herein.The above-mentioned modules based in social networks missing device can be fully or partially through
Software, hardware and combinations thereof are realized.Above-mentioned each module can be embedded in the form of hardware or independently of the place in computer equipment
It manages in device, can also be stored in a software form in the memory in computer equipment, in order to which processor calls execution or more
The corresponding operation of modules.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 8.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing search rule.The network interface of the computer equipment is used to pass through network with external terminal
Connection communication.It is a kind of based on social networks looking-for-person method to realize when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 8, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specifically computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, is deposited on the memory
The computer program that can be run on a processor is contained, processor realizes following steps when executing computer program:According to reception
Search set request, search setting item is returned to, so that user sets the search that searched identity is arranged in item according to described search
Rule;By the search rule deposit search database of the searched identity;By received search content and described search data
Search rule in library is matched, and is obtained and the candidate search of described search content matching rule;According to the candidate search
Rule determines target user.
In one embodiment, following steps are also realized when processor executes computer program:Obtain the candidate search
The identity authority of the corresponding searched identity of rule;The target is obtained from User Information Database according to the identity authority
The identity information of user;Export the identity information of the target user.
In one embodiment, following steps are also realized when processor executes computer program:Receive of user's input
People's information, and personal information is stored in User Information Database;The authority information that user is inputted by identity authority item is received, is obtained
To the identity authority of searched identity corresponding with the user;According to the identity authority of the searched identity, described in setting
The personal information of user and the corresponding relationship of identity information.
In one embodiment, following steps are also realized when processor executes computer program:To described and described search
The search rule of content matching determines that target user carries out regular verification, obtains effective search rule;According to effective search
Rule obtains searched identity.
In one embodiment, following steps are also realized when processor executes computer program:Judge described search content
Whether exactly matched with a certain search rule in described search database;If the determination result is YES, then by a certain search
Rule is as the candidate search rule.
In one embodiment, following steps are also realized when processor executes computer program:Search record is obtained, and right
Described search record carries out data analysis, obtains the content alias of the search setting item of described search rule;If in described search
Hold and exactly matched with the content alias of the content of described search rule or corresponding search setting item, then by described search rule
As candidate search rule.
In one embodiment, following steps are also realized when processor executes computer program:If by received search
Hold and carry out content matching with the search rule in search database, does not obtain candidate search rule, then submit cognition to request, and root
According to the search rule and search record of the cognition request active user setting, the search target of active user is obtained;Root
Cognition search rule is obtained according to described search target, and the use of the cognition search rule is described in described search database
Search for content matching candidate search rule.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes following steps when being executed by processor:Search setting request based on the received returns to search setting item, to use
Family sets the search rule that searched identity is arranged in item according to described search;The search rule deposit of the searched identity is searched
Rope database;Received search content is matched with the search rule in described search database, is obtained and described search
The candidate search rule of content matching;Target user is determined according to the candidate search rule.
In one embodiment, following steps are also realized when computer program is executed by processor:The candidate is obtained to search
The identity authority of the corresponding searched identity of rope rule;The mesh is obtained from User Information Database according to the identity authority
Mark the identity information of user;Export the identity information of the target user.
In one embodiment, following steps are also realized when computer program is executed by processor:Receive user's input
Personal information, and personal information is stored in User Information Database;The authority information that user is inputted by identity authority item is received,
Obtain the identity authority of searched identity corresponding with the user;According to the identity authority of the searched identity, institute is set
State the personal information of user and the corresponding relationship of identity information.
In one embodiment, following steps are also realized when computer program is executed by processor:It is searched to described with described
The search rule of rope content matching determines that target user carries out regular verification, obtains effective search rule;It is effectively searched according to described
Rope rule obtains searched identity.
In one embodiment, following steps are also realized when computer program is executed by processor:Judge in described search
Hold and whether is exactly matched with a certain search rule in described search database;If the determination result is YES, then it a certain is searched described
Rope rule is as the candidate search rule.
In one embodiment, following steps are also realized when computer program is executed by processor:Search record is obtained, and
Described search is recorded and carries out data analysis, obtains the content alias of the search setting item of described search rule;If described search
Content is exactly matched with the content alias of the content of described search rule or corresponding search setting item, then is advised described search
Then as candidate search rule.
In one embodiment, following steps are also realized when computer program is executed by processor:If by received search
Search rule in content and search database carries out content matching, does not obtain candidate search rule, then cognition is submitted to request, and
According to the search rule and search record of the cognition request active user setting, the search target of active user is obtained;
Cognition search rule is obtained according to described search target, and the use of the cognition search rule is institute in described search database
State search content matching candidate search rule.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (11)
1. one kind is based on social networks looking-for-person method, which is characterized in that the method includes:
Search setting request based on the received returns to search setting item, is searched so that user sets item setting according to described search
The search rule of rope identity;
By the search rule deposit search database of the searched identity;
Received search content is matched with the search rule in described search database, is obtained and described search content
The candidate search rule matched;
Target user is determined according to the candidate search rule.
2. the method according to claim 1, wherein determining target user's according to the candidate search rule
Further include after step:
Obtain the identity authority of the corresponding searched identity of the candidate search rule;
The identity information of the target user is obtained from User Information Database according to the identity authority;
Export the identity information of the target user.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The personal information of user's input is received, and personal information is stored in User Information Database;
The authority information that user is inputted by identity authority item is received, the identity of searched identity corresponding with the user is obtained
Permission;
According to the identity authority of the searched identity, the personal information of the user and the corresponding relationship of identity information are set.
4. the method according to claim 1, wherein determining the step of target user according to the candidate search rule
Suddenly include:
It determines that target user carries out regular verification with described search content matching search rule to described, obtains effectively searching for rule
Then;
Searched identity is obtained according to effective search rule.
5. the method according to claim 1, wherein described by received search content and described search database
In search rule matched, obtain include with the step of the candidate search of described search content matching rule:
Judge whether described search content exactly matches with a certain search rule in described search database;
If the determination result is YES, then using a certain search rule as the candidate search rule.
6. method according to claim 1-5, which is characterized in that described to search received search content with described
Search rule in rope database is matched, obtain include with the step of the candidate search of described search content matching rule:
Search record is obtained, and described search is recorded and carries out data analysis, obtains the search setting item of described search rule
Content alias;
If the content alias match of described search content and the content of described search rule or corresponding search setting item, will
Described search rule is as candidate search rule.
7. method according to claim 1-5, which is characterized in that the method also includes:
If the search rule in received search content and described search database is carried out content matching, candidate search is not obtained
Rule then submits cognition to request, and is recorded according to the search rule and search of the cognition request active user setting, obtains
To the search target of active user;
Cognition search rule is obtained according to described search target, and using the cognition search rule in described search database
For described search content matching candidate search rule.
8. the method according to the description of claim 7 is characterized in that described search target includes similar setting target retrieval or phase
To setting target retrieval.
9. one kind is based on social networks missing device, which is characterized in that described device includes:
Rule settings module returns to search setting item, so that user searches according to described for search setting request based on the received
Rope sets the search rule that searched identity is arranged in item;
Database is searched for, for storing the search rule of the searched identity;
Matching module is waited for received search content and the search rule searched in database to be carried out content matching
Select search rule;
Processing module, for determining target user according to the candidate search rule.
10. a kind of computer equipment, including memory and processor, be stored on the memory to run on a processor
Computer program, which is characterized in that the processor realizes any one of claims 1 to 8 when executing the computer program
The step of the method.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any item of the claim 1 to 8 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810786369.8A CN108875083B (en) | 2018-07-17 | 2018-07-17 | Social network-based person searching method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810786369.8A CN108875083B (en) | 2018-07-17 | 2018-07-17 | Social network-based person searching method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108875083A true CN108875083A (en) | 2018-11-23 |
CN108875083B CN108875083B (en) | 2021-01-19 |
Family
ID=64302664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810786369.8A Active CN108875083B (en) | 2018-07-17 | 2018-07-17 | Social network-based person searching method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108875083B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110544096A (en) * | 2019-09-05 | 2019-12-06 | 腾讯科技(深圳)有限公司 | Block chain-based data acquisition method, device, equipment and storage medium |
CN111428126A (en) * | 2019-12-29 | 2020-07-17 | 王焕土 | Matching person finding frame mode applied to network platform and matching search method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103412910A (en) * | 2013-08-02 | 2013-11-27 | 北京小米科技有限责任公司 | Methods and devices for building tag library and searching users |
CN103942271A (en) * | 2014-03-27 | 2014-07-23 | 宇龙计算机通信科技(深圳)有限公司 | User information finding system and method |
CN104834743A (en) * | 2015-05-21 | 2015-08-12 | 孟勐 | Interpersonal connection displaying and searching method |
US20150363499A1 (en) * | 2014-06-17 | 2015-12-17 | Alibaba Group Holding Limited | Search based on combining user relationship datauser relationship data |
-
2018
- 2018-07-17 CN CN201810786369.8A patent/CN108875083B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103412910A (en) * | 2013-08-02 | 2013-11-27 | 北京小米科技有限责任公司 | Methods and devices for building tag library and searching users |
CN103942271A (en) * | 2014-03-27 | 2014-07-23 | 宇龙计算机通信科技(深圳)有限公司 | User information finding system and method |
US20150363499A1 (en) * | 2014-06-17 | 2015-12-17 | Alibaba Group Holding Limited | Search based on combining user relationship datauser relationship data |
CN104834743A (en) * | 2015-05-21 | 2015-08-12 | 孟勐 | Interpersonal connection displaying and searching method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110544096A (en) * | 2019-09-05 | 2019-12-06 | 腾讯科技(深圳)有限公司 | Block chain-based data acquisition method, device, equipment and storage medium |
CN110544096B (en) * | 2019-09-05 | 2023-12-12 | 腾讯科技(深圳)有限公司 | Block chain-based data acquisition method, device, equipment and storage medium |
CN111428126A (en) * | 2019-12-29 | 2020-07-17 | 王焕土 | Matching person finding frame mode applied to network platform and matching search method |
Also Published As
Publication number | Publication date |
---|---|
CN108875083B (en) | 2021-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11323347B2 (en) | Systems and methods for social graph data analytics to determine connectivity within a community | |
US11252256B2 (en) | System for association of customer information across subscribers | |
US10042939B2 (en) | Techniques for personalizing expertise related searches | |
WO2020019565A1 (en) | Search sorting method and apparatus, and electronic device and storage medium | |
TWI647583B (en) | Prompt method and prompting device for login account | |
CN110765295A (en) | Graph database-based query method and device, computer equipment and storage medium | |
US20150205822A1 (en) | Methods and Systems for Contact Management | |
CN108153876A (en) | Intelligent answer method and system | |
CN103109291A (en) | People directory with social privacy and contact association features | |
WO2020019562A1 (en) | Search sorting method and device, electronic device, and storage medium | |
CN107155362A (en) | The search results ranking that will be inquired about for members profiles | |
CN107992513A (en) | A kind of information processing system and its method for realizing information processing | |
WO2013097026A1 (en) | Systems and methods for visualizing social graphs | |
CN108959644A (en) | Search ordering method, device, computer equipment and storage medium | |
US9928272B1 (en) | Determining contact-related information | |
US10867053B2 (en) | Creating software packages for performing secure computations | |
US12019684B2 (en) | Application programming interface arranged to interface with a plurality of data sources | |
CN108875083A (en) | Based on social networks looking-for-person method, device, computer equipment and storage medium | |
CN107092667A (en) | Group's lookup method and device based on social networks | |
CN109460541A (en) | Lexical relation mask method, device, computer equipment and storage medium | |
CN109087053B (en) | Collaborative office processing method, device, equipment and medium based on association topological graph | |
US20210241215A1 (en) | Data processing systems for generating and populating a data inventory | |
CN112989216B (en) | Colleague recommendation method, device, computer equipment and storage medium | |
US20170004456A1 (en) | Search by applicant ranker scores | |
CN116578984A (en) | Risk management and control method, system, equipment and medium for business data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |