CN113300860B - Chat group management method, device, service equipment and storage medium - Google Patents

Chat group management method, device, service equipment and storage medium Download PDF

Info

Publication number
CN113300860B
CN113300860B CN202110501384.5A CN202110501384A CN113300860B CN 113300860 B CN113300860 B CN 113300860B CN 202110501384 A CN202110501384 A CN 202110501384A CN 113300860 B CN113300860 B CN 113300860B
Authority
CN
China
Prior art keywords
user
stealth
group
chat
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110501384.5A
Other languages
Chinese (zh)
Other versions
CN113300860A (en
Inventor
罗先华
孙永霞
徐紫航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanguang Software Co Ltd
Original Assignee
Yuanguang Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanguang Software Co Ltd filed Critical Yuanguang Software Co Ltd
Priority to CN202110501384.5A priority Critical patent/CN113300860B/en
Publication of CN113300860A publication Critical patent/CN113300860A/en
Application granted granted Critical
Publication of CN113300860B publication Critical patent/CN113300860B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations
    • H04L12/18Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a management method, a device, service equipment and a storage medium of a chat group, belonging to the field of instant messaging, wherein the management method comprises the steps of receiving a group stealth setting request sent by user equipment of a user to be set; the group stealth setting request carries an identity of a user to be set; determining the identity type of the user to be set in the chat group according to the identity; when the identity type is not the group owner, determining a candidate stealth user list associated with the identity type in the chat group; selecting a target stealth user from a candidate stealth user list based on selection operation of a user to be set; setting the state of a user to be set as a stealth state aiming at a target stealth user; the stealth state indicates that the chat member list displayed on the user equipment of the target stealth user does not include the user to be set. The method and the device can meet the requirements of individuation and privacy protection of the user, avoid bombing disturbance of group messages and prevent strangers from maliciously searching and adding friends.

Description

Chat group management method, device, service equipment and storage medium
Technical Field
The present application relates to the field of computers, and in particular, to a method, an apparatus, a service device, and a storage medium for managing a chat group.
Background
At present, social platform tools are widely applied to personal work and life, and the social platform tools cannot be separated no matter work communication or interpersonal communication. The chat group is an important form of group chat, is one of the necessary functions of all social platform tools, and can be said that the group is ubiquitous. Each user may actively or passively join many chat groups, such as: a work group, a department group, a company group, a friend group, a colleague group, a project group, a customer group, a community group, a primary school group, a junior middle school group, a high school group, a college school group, an old and rural group, a preferential sharing group, a micro business group, and the like.
Whether or not the user authentication is required for joining a group, there is a possibility that the user is bombed by the group message once the user joins a certain group. An operable method to avoid being bombed by group messages is to set up a group message do not disturb function, but this is simply not to receive a group new message alert, and there is still a possibility of being harassed by strangers in the group.
Content of application
In order to solve the technical problem, the application provides a management method, a device, service equipment and a storage medium for a chat group, so that the selected user can be subjected to stealth processing, and disturbance of chat messages is reduced.
In a first aspect, the present application provides a method for managing a chat group, including:
receiving a group stealth setting request sent by user equipment of a user to be set; the group stealth setting request carries the identity of the user to be set;
determining the identity type of the user to be set in the chat group according to the identity;
when the identity type is not a group owner, determining a candidate stealth user list in the chat group;
selecting a target stealth user from the candidate stealth user list based on the selection operation of the user to be set;
and setting the state of the user to be set as the stealth state aiming at the target stealth user, so that the chat member list displayed on the user equipment of the target stealth user does not comprise the user to be set.
In a second aspect, the present application provides an apparatus for managing a chat group, including:
the receiving and sending unit is used for receiving a group stealth setting request sent by user equipment of a user to be set; the group stealth setting request carries the identity of the user to be set;
the identification unit is used for determining the identity type of the user to be set in the chat group according to the identity;
a determining unit, configured to determine, when the identity type is not a group owner, a candidate list of stealth users associated with the identity type in the chat group;
a selection unit, configured to select a target stealth user in the candidate stealth user list based on a selection operation of the user to be set;
the setting unit is used for setting the state of the user to be set as a stealth state aiming at the target stealth user; wherein the stealth state indicates that the chat member list displayed on the user equipment of the target stealth user does not include the user to be set
In a third aspect, the present application provides an instant messaging system, comprising: a service device and a plurality of user devices.
In another aspect, the present application provides an apparatus, which can implement the method for managing chat groups in the first aspect or the second aspect. The apparatus may be, for example, a chip (e.g., an application processor) or a server. The above-described method may be implemented by software, hardware, or by executing corresponding software by hardware.
In a possible implementation manner, the structure of the device comprises a processor, a memory; the processor is configured to support the apparatus to perform corresponding functions in the application testing method. The memory is used for coupling with the processor, which holds the necessary programs (instructions) and/or data for the device. Optionally, the apparatus may further include a communication interface for supporting communication between the apparatus and other network elements.
In another possible implementation manner, the apparatus may include unit modules that perform corresponding actions in the above-described method.
In yet another possible implementation manner, the system includes a processor and a transceiver, the processor is coupled to the transceiver, and the processor is configured to execute a computer program or instructions to control the transceiver to receive and transmit information; the processor is further configured to implement the above-described method when the processor executes the computer program or instructions.
Yet another aspect of the present application provides an apparatus, comprising: a memory and a processor; wherein the memory stores a set of program codes, and the processor is configured to call the program codes stored in the memory and execute the method of aspects.
Yet another aspect of the present application provides a computer-readable storage medium having stored therein instructions, which when executed on a computer, cause the computer to perform the method of the above-described aspects.
Yet another aspect of the present application provides a computer program product containing instructions which, when run on a computer, cause the computer to perform the method of the above-described aspects.
According to the embodiment, when a user needs to set the group hiding function, the candidate hiding user list is determined based on the identity type of the user, then the user selects a target hiding user from the candidate hiding user list, and the user is set to be in the hiding state aiming at the target hiding user, the chat member list displayed by the user equipment of the target hiding user does not display the user any more, so that the target hiding user cannot search the user from the chat group, and cannot initiate group call and add functions of friends and groups, and therefore the requirements of user individuation and privacy protection are met, the group message disturbance of the user is avoided, and the situation that strangers in the group maliciously search and add functions of friends and protect personal privacy is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a network structure diagram of an instant messaging system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a method for managing a chat group according to an embodiment of the present application;
fig. 3 is another schematic flow chart of a method for managing chat groups according to an embodiment of the present application;
FIG. 4 is another schematic structural diagram of an apparatus according to an embodiment of the present disclosure;
fig. 5 is another schematic structural diagram of an apparatus according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance. It will be apparent to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to better understand an instant messaging system disclosed in the embodiments of the present application, a network architecture to which the embodiments of the present application are applicable is described below. Referring to fig. 1, fig. 1 is a schematic diagram of a network architecture according to an embodiment of the present disclosure. As shown in fig. 1, the network architecture may include: the service device is also called a background server, a component server and the like, and can be in communication connection with a plurality of user devices through the internet, and each user device corresponds to one user. In the network architecture shown in fig. 1, users corresponding to a plurality of user devices are located in the same chat group. In the embodiment of the present application, a chat group is simply a virtual space, and the identity types of users included in the chat group may be: group owner, administrator and general user; the users in the chat group can not only watch the voice, video or text interaction of other users through the user equipment. For example: and the user receives group voice call, group video call, friend adding or group @ operation and the like sent by other users in the chat group. In the embodiment of the application, the user equipment can be rich media user equipment integrating functions of group chat, live video, channel Karaoke, online games, online movies and the like. In the network architecture shown in fig. 1, the user devices include, but are not limited to, mobile phones, mobile computers, tablet computers, Personal Digital Assistants (PDAs), media players, smart tvs, smart watches, smart glasses, smart bracelets.
In order to explain the technical means described in the present application, the following description will be given by way of specific examples.
Referring to fig. 2, fig. 2 is a schematic flowchart of a method for managing a chat group according to an embodiment of the present application, where the method includes:
s201, receiving a group stealth setting request sent by user equipment of a user to be set.
The service equipment creates a chat group, the chat group comprises a plurality of users, and any two users in the chat group can be in friend relationship or stranger relationship; the user to be set is any one user in the chat group. The method comprises the steps that a user to be set logs in a service device through user equipment, the user equipment is called user equipment of the user to be set, the server device receives a group stealth setting request sent by the user equipment of the user to be set, the group stealth request carries an identity of the user to be set, the identity is a character string which uniquely represents the identity of the user to be set, and the message type of the group stealth setting request can be as follows: HTTP messages, UDP messages, or other types of messages. The group stealth setting request is used for carrying out group stealth setting on a user to be set.
For example: the service equipment creates a chat group comprising: the user A logs in the service equipment through the user equipment 1, the server equipment receives a UDP message sent by the user equipment 1, and the UDP message carries the identity of the user A.
S202, determining the identity type of the user to be set in the chat group according to the identity of the user.
In some instant messaging systems, the identity types in a chat group include three types: group owner, administrator and general user; the group owner is generally a creator of the chat group, has the highest-level management authority on the chat group, and the number of the group owners is one; the administrator generally designates users for the group owner, the number of the administrators can be one or more, the administrative authority of the administrators can be lower than that of the group owner, and the administrative authority can be designated by the group owner or by default; ordinary users do not have administrative rights, and generally refer to users other than the group owner and administrator in the chat group.
In other instant messaging systems, the types of identities in a chat group include only two types: the definition of the group owner and the general user refers to the above description, and is not described herein again.
The service device prestores a mapping relationship between the identity and the identity type, where the mapping relationship may be represented by a mapping table, a two-dimensional table, an array, or a database, and the application is not limited thereto. After receiving the group chat setting request, the service equipment analyzes the group chat application request to obtain the identity, and then inquires the identity type associated with the identity according to the mapping relation.
And S203, when the identity type is not the group owner, determining a candidate stealth user list associated with the identity type in the chat group.
According to the recognition result of S202, when the identity type of the user to be set is not a group owner, namely the identity type of the user to be set is an administrator or a common user, determining a candidate stealth user list associated with the identity type in the chat group; a chat group is a complete set of users stored on a service device, and different identity types may be associated with different lists of candidate stealth users, for example: the administrator and the common user have different candidate stealth user lists, and the candidate stealth user lists are the user set in the largest range of the stealth state relative to the user to be set. It is easy to understand that the list of candidate stealth users does not necessarily contain the user to be set itself.
In some possible embodiments, an instant messaging system including a group owner, an administrator, and a common member for the identity type. When the identity type of the user to be set is an administrator, the candidate stealth user list comprises users except the group owner in the chat group, namely the candidate stealth user list does not comprise the group owner, and the candidate stealth user list only comprises one or more users with the identity types of the administrator and the common user; or
When the identity type is a common user, the candidate stealth user list includes users other than the group owner and the administrator, that is, the candidate stealth user list does not include the group owner and the administrator, and the candidate stealth user list only includes one or more users having the identity type of a common user.
For example: the complete chat group created on the service device comprises: group owner, administrator 1, administrator 2, general user a, general user B, general user C, and general user D. When the user to be set is administrator 1, the candidate stealth user list corresponding to administrator 1 does not include a group owner, that is, the candidate stealth user list corresponding to administrator 1 includes: administrator 2, general user a, general user B, general user C, and general user D.
For another example, when the user to be set is the normal user a, the candidate stealth user list corresponding to the normal user a does not include the group owner and the administrator, and the candidate stealth user list corresponding to the normal user a includes the normal user B, the normal user C, and the normal user D.
In some possible embodiments, if the identity type only includes both the group owner and the common member, when the identity type of the user to be set is a common user, the candidate stealth user list corresponding to the user to be set includes other users except the group owner.
For example, a complete chat group created on the serving device includes: the system comprises a group owner, a common user A, a common user B, a common user C and a common user D. When the user to be set is the common user B, the candidate stealth user list corresponding to the common user B includes: a normal user a, a normal user C, and a normal user D.
Further, when the identity type is a common user, the candidate stealth user list does not include friends of the user to be set, that is, when the identity type of the user to be set is the common user, the candidate stealth user list does not include friends of the user to be set except the group owner and the administrator, that is, the candidate stealth user list only includes strangers of the user to be set.
For example, the service device creates a chat group including: group owner, administrator 1, administrator 2, general user a, general user B, general user C, and general user D. The user to be set is a common user D, the common user D and the common user A are in friend relationship, and the rest users are in stranger relationship. Then the list of candidate stealth users associated with regular user D includes: normal user B and normal user C.
Further, when the identity type of the user to be set is the group owner, the candidate stealth user list associated with the user to be set is regarded as an empty set, that is, the group owner does not include any user, and the group owner is in a visible state of all users in the chat group, that is, all chat member lists displayed on the user equipment by all users include the group owner. Meanwhile, the chat member list displayed on the user equipment by the group owner contains all the users.
For example, the service device creates a chat group including: group owner, administrator 1, administrator 2, general user a, general user B, general user C, and general user D. When the identity type of the user to be set is the group owner, the member list displayed by the user equipment of the group owner comprises: the group owner can realize the functions of group call, friend adding, @ group user and the like aiming at each user; the chat member lists displayed on the user devices of the users of the administrator 1, the administrator 2, the ordinary user a, the ordinary user B, the ordinary user C and the ordinary user D all include group owners.
And S204, selecting a target stealth user from the candidate stealth user list based on the selection operation of the user to be set.
The user to be set triggers a selection operation through the user equipment, the selection operation may be a mouse operation, a key operation, a touch operation, or the like, the user equipment sends a selection operation request to the service equipment after detecting the selection operation, the service equipment receives the selection operation request, a target stealth user is selected from the candidate stealth user list generated in S203, and the number of the selected target stealth users may be one or more.
Further, selecting a target stealth user from the candidate stealth user list based on the selection operation of the user to be set, including:
displaying a group stealth setting interface on user equipment of a user to be set; wherein, the group stealth user interface includes: a plurality of controls;
and responding to the selection operation of the user to be set for each control, and selecting a target stealth user from the candidate stealth user list.
The service equipment displays a group stealth setting interface on a display unit of a user to be set, the group stealth setting interface is a human-computer interaction interface, the group stealth setting interface can comprise controls of a plurality of users, the plurality of users are users contained in a candidate stealth user list in S203, each user is associated with one control, and the controls can be in the form of virtual buttons, virtual switches or virtual selection frames and the like. The user to be set can execute selection operation based on each control, the user equipment sends a selection operation request carrying the identity of the selected target stealth target to the service equipment according to the target stealth user selected by the user to be set, and the service equipment determines one or more target stealth users selected in the candidate stealth user list according to the selection operation request.
Optionally, a process of selecting a target stealth user on the group stealth setting interface is shown in fig. 3: the service equipment establishes a chat group, the user to be set is any one user in the chat group, when the identity type of the user to be set is a group owner, the service equipment determines that the group stealth function of the user to be set is unavailable, the server displays a group stealth setting interface on the user equipment of the user to be set, and the group stealth setting interface comprises 4 controls: control 1 (all group members visible), control 2 (only group owner visible), control 3 (only group owner and administrator visible), control 4 (only group owner, administrator and friends visible); the control 1 adopts highlight display to indicate that a user to be set is visible for all group members; the control 2, the control 3 and the control 4 are displayed in a gray scale mode, and a user to be set cannot select and operate the control 2, the control 3 and the control 4.
When the identity type of the user to be set is an administrator, the service equipment determines that the group stealth function of the user to be set is available, the controls 1 to 4 are displayed on the user equipment, the controls 1 to 4 are highlighted, and the user to be set can select any one of the 4 controls. When the control 1 is selected, the user to be set is in a visible state for all group members; when the control 2 is selected, the user to be set is in a visible state only aiming at the group owner; when the control 3 is selected, the user to be set is in a visible state only aiming at the group owner and the administrator; when the control 4 is selected, the user to be set is in a visible state only aiming at the group owner, the administrator and the friends.
When the identity type of the user to be set is a common user, the service equipment determines that the group stealth function of the user to be set is available, the control 1 to the control 4 are displayed on the user equipment, the control 1 to the control 4 are highlighted, and the user to be set can select any one of the 4 controls.
S205, setting the state of the user to be set as the stealth state aiming at the target stealth user.
The hidden state indicates that the chat member list displayed on the user equipment of the target hidden user does not comprise the user to be set, so that the user equipment of the target hidden user cannot search the user to be set in the chat group, and cannot execute group voice call, friend adding and group @ functions aiming at the user to be set, thereby reducing harassment of group messages. The user equipment of the user to be set can still correctly receive the group message in the chat group. Optionally, when determining the target stealth user, the service device may not need the participation of the user, count the number of chat messages sent by each user in the candidate stealth user list in the history time period, and the length of the history time period may be determined according to actual requirements, for example: the service equipment takes the users with the maximum chat message number or n users before the ranking as target stealth users within 1 hour, 30 minutes or 10 minutes and the like, so that frequent harassment of the chat messages can be better reduced.
For example, a chat group includes a group owner, an administrator, a normal user a, a normal user B, a normal user C, and a normal user D. If only the common user a sets the stealth state for the common user B, the chat member list displayed on the user equipment of the common user B includes: the group chat system comprises a group owner, an administrator, a common user B, a common user C and a common user D, wherein the common user B cannot search and inquire the common user A, and cannot execute group voice call, friend adding and group @ functions aiming at the common user A, so that the harassment of group messages is reduced, but the user equipment of the common user A can still receive the group chat messages from the common user B.
Further, the method of the present application further comprises:
receiving a group call request of the target stealth user; the type of the group call request can be a voice call or a video call;
determining other users except the user to be set in the chat group; the target stealth user is set to be in a stealth state by the user to be set, so that the user to be set is invisible relative to the target stealth user. The service equipment forwards the group call request to the other users, and does not send the group call request to the user to be set, so that the user is prevented from being disturbed by the group call mode.
Before determining the identity type of the user to be set in the chat group according to the identity, the method further includes:
determining attribute information of the user to be set in the chat group according to the identity; wherein the attribute information includes: one or more of user level, activity level, and recharge amount.
And when the attribute information meets a preset condition, determining the identity type of the user to be set in the chat group according to the identity identifier.
Wherein the activity level may be evaluated using the number of messages sent by the user over a historical period of time. Through setting a preset condition, when the tree information of the user to be set reaches the preset condition, the user to be set is allowed to start the group stealth setting function, so that the group social function can be enriched and the viscosity of the user can be improved.
By implementing the embodiment of the application, when a user needs to set the group hiding function, a candidate hiding user list is determined based on the identity type of the user, then the user selects a target hiding user from the candidate hiding user list, and sets the user to be in the hiding state aiming at the target hiding user, and a chat member list displayed by user equipment of the target hiding user does not display the user any more, so that the target hiding user cannot search the user in a chat group, and cannot initiate a group call, add friends and a group @ function aiming at the user, thereby meeting the requirements of user individuation and privacy protection, avoiding group message harassment of the user, preventing strangers in the group from maliciously searching for the added friends and protecting personal privacy.
Fig. 2 to 3 describe the management method of the chat group in detail. Correspondingly, the structure of a device in the embodiment of the application is schematically shown.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an apparatus 4 provided in the embodiment of the present application, where the apparatus 4 may include: a transceiving unit 401, a recognition unit 402, a determination unit 403, a selection unit 404, and a setting unit 405.
A transceiver unit 401, configured to receive a group stealth setting request sent by a user equipment of a user to be set; the group stealth setting request carries the identity of the user to be set;
the identifying unit 402 determines the identity type of the user to be set in the chat group according to the identity;
a determining unit 403, configured to determine, when the identity type is not a group owner, a candidate list of stealth users associated with the identity type in the chat group;
a selecting unit 404, configured to select a target stealth user in the candidate stealth user list based on a selection operation of the user to be set;
a setting unit 405 configured to set the state of the user to be set to a stealth state for the target stealth user; the stealth state represents that the chat member list displayed on the user equipment of the target stealth user does not comprise the user to be set.
In one or more possible embodiments, when the identity type is a group owner, the user to be set is in a visible state for all users in the chat group.
In one or more possible embodiments, when the identity type is administrator, the list of candidate stealth users includes users in the chat group other than a group owner; or
When the identity type is a common user, the candidate stealth user list comprises users except a group owner and an administrator in the chat group.
In one or more possible embodiments, when the identity type is a normal user, the list of candidate stealth users does not include friends of the user to be set.
In one or more possible embodiments, the selecting, based on the selection operation of the user to be set, a target stealth user in the candidate stealth user list includes:
displaying a group stealth setting interface on the user equipment; the group stealth setting interface comprises controls of a plurality of users;
and responding to the selection operation of the user to be set for each control, and selecting a target stealth user from the candidate stealth user list.
In one or more possible embodiments, the apparatus 4 further comprises:
the judging unit is used for determining the attribute information of the user to be set in the chat group according to the identity; wherein the attribute information includes: one or more of user level, activity level, and recharge amount.
And when the attribute information meets a preset condition, instructing the identification unit 402 to start working.
In one or more of the possible embodiments,
the transceiving unit 401 is further configured to receive a group call request of the target stealth user;
a determining unit 403, configured to determine other users in the chat group except the user to be set;
the transceiver 401 is further configured to forward the group call request to the other users.
The embodiment of the present application and the method embodiments of fig. 2 and 3 are based on the same concept, and the technical effects brought by the embodiment are also the same, and the specific process may refer to the description of the method embodiments of fig. 2 and 3, and will not be described again here.
The device 4 may be a service device, and the device 4 may also be a field-programmable gate array (FPGA), an application-specific integrated chip (asic), a system on chip (SoC), a Central Processing Unit (CPU), a Network Processor (NP), a digital signal processing circuit, a Micro Controller Unit (MCU), a Programmable Logic Device (PLD), or other integrated chips.
Fig. 5 is a schematic structural diagram of an apparatus provided in an embodiment of the present application, which is hereinafter referred to as an apparatus 5, where the apparatus 5 may be integrated in the foregoing service device, as shown in fig. 5, the apparatus includes: memory 502, processor 501, input device 503, output device 504, and communication interfaces.
The memory 502 may be a separate physical unit, and may be connected to the processor 501, the input device 503, and the output device 504 via a bus. The memory 502, the processor 501, the transceiver 503 may also be integrated, implemented by hardware, etc.
The memory 502 is used for storing a program for implementing the above method embodiment, or various modules of the apparatus embodiment, and the processor 501 calls the program to perform the operation of the above method embodiment.
Input devices 502 include, but are not limited to, a keyboard, a mouse, a touch panel, a camera, and a microphone; the output device includes, but is not limited to, a display screen.
Communication interfaces are used to send and receive various types of messages and include, but are not limited to, wireless interfaces or wired interfaces.
Alternatively, when part or all of the management method of the chat group of the above embodiment is implemented by software, the apparatus may include only the processor. The memory for storing the program is located outside the device and the processor is connected to the memory by means of circuits/wires for reading and executing the program stored in the memory.
The processor may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of a CPU and an NP.
The processor may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
The memory may include volatile memory (volatile memory), such as random-access memory (RAM); the memory may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD); the memory may also comprise a combination of the above kinds of memories.
The embodiment of the present application further provides a computer storage medium, which stores a computer program, where the computer program is used to execute the management method for the chat group provided in the above embodiment.
The embodiment of the present application further provides a computer program product containing instructions, which when run on a computer, causes the computer to execute the method for managing a chat group provided by the above embodiment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

Claims (10)

1. A method for managing chat groups, comprising:
receiving a group stealth setting request sent by user equipment of a user to be set; the group stealth setting request carries the identity of the user to be set;
determining the identity type of the user to be set in the chat group according to the identity;
when the identity type is not a group owner, determining a candidate stealth user list associated with the identity type in the chat group;
selecting a target stealth user from the candidate stealth user list based on the selection operation of the user to be set;
setting the state of the user to be set as a stealth state aiming at the target stealth user; the stealth state indicates that a chat member list in the chat group displayed on the user equipment of the target stealth user does not comprise the user to be set, and the target stealth user cannot search the user to be set in the chat group and cannot execute group voice call, friend adding and group @ functions aiming at the user to be set.
2. The method of claim 1,
and when the identity type is a group owner, the user to be set is in a visible state aiming at all users in the chat group.
3. The method according to claim 1 or 2,
when the identity type is an administrator, the candidate stealth user list comprises users except for a group owner in the chat group; or
When the identity type is a common user, the candidate stealth user list comprises users except a group owner and an administrator in the chat group.
4. The method of claim 3,
and when the identity type is a common user, the candidate stealth user list does not comprise friends of the user to be set.
5. The method according to claim 1 or 2, wherein the selecting a target stealth user in the candidate stealth user list based on the selection operation of the user to be set comprises:
displaying a group stealth setting interface on the user equipment; the group stealth setting interface comprises controls of a plurality of users;
and responding to the selection operation of the user to be set for each control, and selecting a target stealth user from the candidate stealth user list.
6. The method of claim 5, wherein before determining the identity type of the user to be set in the chat group according to the identity, the method further comprises:
determining attribute information of the user to be set in the chat group according to the identity; wherein the attribute information includes: one or more of user grade, activity level and recharge amount;
and when the attribute information meets a preset condition, determining the identity type of the user to be set in the chat group according to the identity identifier.
7. The method of claim 6, further comprising:
receiving a group call request of the target stealth user;
determining other users except the user to be set in the chat group;
and forwarding the group call request to the other users.
8. An apparatus for managing a chat group, comprising:
the receiving and sending unit is used for receiving a group stealth setting request sent by user equipment of a user to be set; the group stealth setting request carries the identity of the user to be set;
the identification unit is used for determining the identity type of the user to be set in the chat group according to the identity;
a determining unit, configured to determine, when the identity type is not a group owner, a candidate list of stealth users associated with the identity type in the chat group;
a selection unit, configured to select a target stealth user in the candidate stealth user list based on a selection operation of the user to be set;
the setting unit is used for setting the state of the user to be set as the stealth state aiming at the target stealth user; the stealth state indicates that a chat member list in the chat group displayed on the user equipment of the target stealth user does not include the user to be set, and the target stealth user cannot search the user to be set in the chat group and cannot execute group voice call, friend adding and group @ functions aiming at the user to be set.
9. A service device comprising a processor and a memory, wherein the memory is configured to store a computer program comprising program instructions, and wherein the processor is configured to invoke the program instructions to perform the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-7.
CN202110501384.5A 2021-05-08 2021-05-08 Chat group management method, device, service equipment and storage medium Active CN113300860B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110501384.5A CN113300860B (en) 2021-05-08 2021-05-08 Chat group management method, device, service equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110501384.5A CN113300860B (en) 2021-05-08 2021-05-08 Chat group management method, device, service equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113300860A CN113300860A (en) 2021-08-24
CN113300860B true CN113300860B (en) 2022-09-13

Family

ID=77321146

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110501384.5A Active CN113300860B (en) 2021-05-08 2021-05-08 Chat group management method, device, service equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113300860B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506177A (en) * 2016-10-17 2017-03-15 捷开通讯(深圳)有限公司 A kind of method of group chatting, server and client

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7885901B2 (en) * 2004-01-29 2011-02-08 Yahoo! Inc. Method and system for seeding online social network contacts
CN1992624B (en) * 2005-12-28 2010-06-23 腾讯科技(深圳)有限公司 Method for handling information flow of joining instant communication group communication in secret mode
CN102209081B (en) * 2010-03-29 2013-11-06 华为技术有限公司 Method for realizing stealth state of user and apparatus thereof
CN104202235A (en) * 2014-08-20 2014-12-10 上海梦荻网络科技有限公司 Instant messaging client and server
CN105991394A (en) * 2015-01-28 2016-10-05 阿里巴巴集团控股有限公司 Group chat method and device
CN105610681B (en) * 2015-10-23 2019-08-09 阿里巴巴集团控股有限公司 Information processing method and device based on instant messaging
CN107733788B (en) * 2017-11-27 2020-08-21 绿湾网络科技有限公司 Anonymous group chat method, device and equipment

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106506177A (en) * 2016-10-17 2017-03-15 捷开通讯(深圳)有限公司 A kind of method of group chatting, server and client

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
在QQ中让指定好友上线咱就隐身;王道才;《电脑知识与技术(经验技巧)》;20080705(第07期);全文 *

Also Published As

Publication number Publication date
CN113300860A (en) 2021-08-24

Similar Documents

Publication Publication Date Title
US11962548B2 (en) Message display method and apparatus, device, and storage medium
US10218657B2 (en) Method and system for providing private chat within a group chat
US9087363B2 (en) Methods, systems, and computer readable media for managing multiple personas within end user applications
CN109889424B (en) Information processing method, device and storage medium
US9224134B2 (en) Arranging a conversation among a plurality of participants
AU2013214758A1 (en) Unified communication application
KR20130061724A (en) System and method for social collection
KR20210052552A (en) Method, system, and non-transitory computer readable recording medium for message group management
US10200338B2 (en) Integrating communication modes in persistent conversations
KR101709831B1 (en) Initiating social interaction based on e-mail content
CN109446204B (en) Data storage method and device for instant messaging, electronic equipment and medium
EP2950263A1 (en) Method for managing privacy and security in a social network, by checking shared data and relationships between users
US11281761B2 (en) Method and system for using a plurality of accounts in an instant messaging application
KR20200020194A (en) Apparatus of work managing based on chat room, method by the same and storage media storing the same
CN112165390B (en) Information processing method and device, electronic equipment and computer readable storage medium
CN104092596A (en) Music user group management method, device and system
KR20200043659A (en) Method, system, and non-transitory computer readable record medium for collecting unreplied message
CN111130986A (en) Message sending method, device, equipment and storage medium
KR20160104421A (en) Method, user device and computer program for providing messenger service
CN110737844A (en) Data recommendation method and device, terminal equipment and storage medium
CN105490913B (en) Instant message processing method and device
CN112242948B (en) Group session processing method and device, computer equipment and storage medium
JP2023522672A (en) Information interaction method, device, electronic device, and storage medium
CN112907384A (en) Interaction method, device, equipment and storage medium for social account
CN112307357A (en) Social method and device for strangers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant