CN111181843A - Multidimensional setting method of social software dynamic permission, storage medium and terminal - Google Patents
Multidimensional setting method of social software dynamic permission, storage medium and terminal Download PDFInfo
- Publication number
- CN111181843A CN111181843A CN201911409922.7A CN201911409922A CN111181843A CN 111181843 A CN111181843 A CN 111181843A CN 201911409922 A CN201911409922 A CN 201911409922A CN 111181843 A CN111181843 A CN 111181843A
- Authority
- CN
- China
- Prior art keywords
- social software
- dynamic
- setting
- users
- multidimensional
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 238000004590 computer program Methods 0.000 claims description 9
- 238000012216 screening Methods 0.000 abstract description 6
- 230000006870 function Effects 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a multidimensional setting method of social software dynamic permission, a storage medium and a terminal. The method comprises the following steps: s01, setting dynamic authority by the user according to the requirement; s02, the social software background filters all users according to the dynamic authority set by the users, and judges whether the dynamic authority set by the users is met; and S03, controlling who is dynamically opened and shielded according to the social software background judgment result. By adopting the functions, the invention can dynamically only see the objects with the requirements of age, color value and asset meeting through the user multi-dimensional screening display mechanism and the shielding mechanism, avoid other objects which do not meet the requirements from seeing, avoid causing misunderstanding, and reduce the operation cost for the user to manually select the corresponding user through the user multi-dimensional screening interval setting.
Description
Technical Field
The invention relates to the field of multidimensional setting of social dynamic permissions, in particular to a multidimensional setting method of social software dynamic permissions, a storage medium and a terminal.
Background
As an important segment of the mobile social market, strangers' social contact continues to develop with the help of the wind gap for pervasive entertainment. The social users of Chinese strangers in 2018 are 5.92 hundred million people in size. By 2019, the whole user scale is expected to break through 6 hundred million and reach 6.22 hundred million people.
The method for playing the strangers in social contact with the fishes and dragons is diversified, but people who want to find the people with all matched conditions are difficult to find, for example: age mismatch; the distances do not coincide; the study calendar is not consistent; the wealth is not consistent; the color values do not match; human disagreement, etc.
In many cases, after the knowledge by the social software, the user needs to know and understand each other for a long time, and after a large amount of time is spent, the user finds that the user is not suitable, which wastes much time and energy.
In addition, in some social situations, the dynamic state of the user needs to be limited, that is, a part of people needs to be shielded, but the shielding mode in the market generally adds the people needing to be shielded manually, which is time-consuming and labor-consuming.
Therefore, there is a need in the market for a multidimensional setting method, a storage medium and a terminal for social software dynamic permissions, which can solve one or more of the above problems.
Disclosure of Invention
In order to solve one or more problems in the prior art, the invention provides a multidimensional setting method of social software dynamic permission, a storage medium and a terminal.
The technical scheme adopted by the invention to achieve the aim is as follows:
the invention provides a multidimensional setting method of social software dynamic permission, which comprises the following steps:
s01, setting dynamic authority by the user according to the requirement;
s02, the social software background filters all users according to the dynamic authority set by the users, and judges whether the dynamic authority set by the users is met;
and S03, controlling who is dynamically opened and shielded according to the social software background judgment result.
In some embodiments, the dynamic rights in S01 include gender, age, color value, and asset.
In some embodiments, the dynamic permissions in S01 further include users who have joined the buddy list.
In some embodiments, the age authority ranges from 18 years to 50 years.
In some embodiments, the score ranges from 0 to 100, and the uploaded avatar is scored by the social software backend.
In some embodiments, the assets range from 0-1 billion dollars.
The invention also proposes a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the above-mentioned method for multidimensional setting of social software dynamic permissions.
The invention further provides a terminal which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the multidimensional setting method of the social software dynamic permission when executing the computer program.
The invention has the beneficial effects that: by adopting the functions, the invention can dynamically only see the objects with the requirements of age, color value and asset meeting through the user multi-dimensional screening display mechanism and the shielding mechanism, avoid other objects which do not meet the requirements from seeing, avoid causing misunderstanding, and reduce the operation cost for the user to manually select the corresponding user through the user multi-dimensional screening interval setting.
Drawings
Fig. 1 is a flowchart of a method for accurately matching and pushing social software resources according to a preferred embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
As shown in fig. 1, the present invention discloses a multidimensional setting method for social software dynamic permissions, which includes:
s01, setting dynamic authority by the user according to the requirement;
s02, the social software background filters all users according to the dynamic authority set by the users, and judges whether the dynamic authority set by the users is met;
and S03, controlling who is dynamically opened and shielded according to the social software background judgment result.
In some embodiments, the dynamic rights in S01 include gender, age, color value, and asset.
In some embodiments, the dynamic permissions in S01 further include users who have joined the buddy list.
In some embodiments, the age authority ranges from 18 years to 50 years.
In some embodiments, the score ranges from 0 to 100, and the uploaded avatar is scored by the social software backend.
In some embodiments, the assets range from 0-1 billion dollars.
Specifically, when the method is implemented, firstly, the dynamic authority of the user is set by the user, for example, three conditions of 20-30 years old of foreign body, color value being more than 80 and unlimited assets can be screened, the three conditions can be met, the social software background screens the user according to the set conditions, the user meeting the conditions is screened, the user meeting the conditions can be checked, and the user can be checked, so that the dynamic authority of the user cannot be checked by other users.
By adopting the scheme, certain crowds can be quickly shielded, the crowds needing shielding do not need to be manually added, the shielding efficiency is greatly improved, and meanwhile, the directivity is good.
Meanwhile, it should be noted that a condition, such as a color value, may also be filtered, and some users only have requirements on the color value, so that only the condition of limitation may be added, which is very flexible.
The invention also proposes a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the above-mentioned method for multidimensional setting of social software dynamic permissions.
The invention further provides a terminal which comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the multidimensional setting method of the social software dynamic permission when executing the computer program.
In summary, by adopting the above functions, the invention can make the user only see the object whose age, color value and asset requirements all meet their requirements dynamically through the user multidimensional screening display mechanism and the shielding mechanism, and avoid other objects which do not meet the requirements to avoid misunderstandings, and reduce the operation cost for the user to manually select the corresponding user through the user multidimensional screening interval setting.
The above examples only show two embodiments of the present invention, and the description thereof is specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (8)
1. A multidimensional setting method for social software dynamic authority is characterized by comprising the following steps:
s01, setting dynamic authority by the user according to the requirement;
s02, the social software background filters all users according to the dynamic authority set by the users, and judges whether the dynamic authority set by the users is met;
and S03, controlling who is dynamically opened and shielded according to the social software background judgment result.
2. The method for setting the social software dynamic authority in multiple dimensions as claimed in claim 1, wherein the dynamic authority in S01 includes gender, age, color value and property.
3. The method for setting the social software dynamic authority in multiple dimensions as claimed in claim 1 or 2, wherein the dynamic authority in S01 further includes users who have joined a buddy list.
4. The method for multidimensional setting of social software dynamic permissions of claim 2 wherein said age permissions range from 18 years to 50 years.
5. The method for setting the social software dynamic permission according to claim 2, wherein the score ranges from 0 to 100, and the uploaded head portrait is scored through a social software background.
6. The method for multidimensional setting of social software dynamic permissions of claim 2 wherein said assets range from 0-1 billion dollars.
7. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method for multidimensional setting of social software dynamic permissions of any of claims 1-6.
8. A terminal comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program implements the steps of the method for multidimensional setting of social software dynamic permissions according to any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911409922.7A CN111181843A (en) | 2019-12-31 | 2019-12-31 | Multidimensional setting method of social software dynamic permission, storage medium and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911409922.7A CN111181843A (en) | 2019-12-31 | 2019-12-31 | Multidimensional setting method of social software dynamic permission, storage medium and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111181843A true CN111181843A (en) | 2020-05-19 |
Family
ID=70657721
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911409922.7A Pending CN111181843A (en) | 2019-12-31 | 2019-12-31 | Multidimensional setting method of social software dynamic permission, storage medium and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111181843A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101374148A (en) * | 2008-09-18 | 2009-02-25 | 腾讯科技(深圳)有限公司 | Method and system for managing blog intimate authority |
US20100005518A1 (en) * | 2008-07-03 | 2010-01-07 | Motorola, Inc. | Assigning access privileges in a social network |
CN102253952A (en) * | 2011-01-14 | 2011-11-23 | 北京开心人信息技术有限公司 | Method and system for protecting privacy of users in social network |
CN106549964A (en) * | 2016-10-31 | 2017-03-29 | 天脉聚源(北京)科技有限公司 | The method to set up and device of user right |
-
2019
- 2019-12-31 CN CN201911409922.7A patent/CN111181843A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100005518A1 (en) * | 2008-07-03 | 2010-01-07 | Motorola, Inc. | Assigning access privileges in a social network |
CN101374148A (en) * | 2008-09-18 | 2009-02-25 | 腾讯科技(深圳)有限公司 | Method and system for managing blog intimate authority |
CN102253952A (en) * | 2011-01-14 | 2011-11-23 | 北京开心人信息技术有限公司 | Method and system for protecting privacy of users in social network |
CN106549964A (en) * | 2016-10-31 | 2017-03-29 | 天脉聚源(北京)科技有限公司 | The method to set up and device of user right |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tsesis | The right to erasure: Privacy, data brokers, and the indefinite retention of data | |
Manivannan | FCJ-158 Tits or GTFO: The logics of misogyny on 4chan’s Random–/b | |
Acharya et al. | The Myth of the second front: Localizing the ‘war on terror’in southeast Asia | |
Australian Human Rights Commission | Face the facts: Lesbian, gay, bisexual, trans and intersex people | |
O’Reilly | The pluralization of high policing: Convergence and divergence at the public–private interface | |
Paik et al. | The impact of patent wars on firm strategy: Evidence from the global smartphone market | |
CN111181843A (en) | Multidimensional setting method of social software dynamic permission, storage medium and terminal | |
Hao et al. | An effective approach to measuring and assessing the risk of android application | |
Coleman | Beacons of freedom | |
De Haan et al. | Self-regulation | |
Woolley | The Reality Game: A gripping investigation into deepfake videos, the next wave of fake news and what it means for democracy | |
Roose | Australian-born Muslims: The emergence of political project identities | |
Castro | Content Moderation in Multi-User Immersive Experiences: AR/VR and the Future of Online Speech | |
Fioramonti et al. | Methodological note on the CIVICUS’Civil Society Enabling Environment Index (EE Index) | |
Poland | Haters | |
Combes | Who’s Not Afraid of ISIS? | |
Dupont | China strategy: Get a bigger stick with which to protect ourselves | |
Udoh et al. | Ethical responsibilities: The smart card engineer | |
Paul et al. | Gezi Park one month on: what lies ahead? | |
Pynnoniemi | Perceptions of Patriotism Introduction | |
Koehler | Understanding Cyber Risk: Protecting Your Corporate Assets | |
ENGVIG | All Your Games Belong to Us: A Case Study of the Eighth Generation of Video Game Consoles and the Export Control of High-Performance Computers | |
Bui | Sex hacker: Configuring Chinese women in the age of digital penetration | |
Soon | Civil society and technology: whither the change? | |
McInerney | Yellow Techno-Peril: The ‘Clash of Civilizations’ and anti-Chinese racial rhetoric in the US–China AI arms race |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200519 |
|
RJ01 | Rejection of invention patent application after publication |