CN115865485A - Stranger safety precaution method and system based on meta universe - Google Patents

Stranger safety precaution method and system based on meta universe Download PDF

Info

Publication number
CN115865485A
CN115865485A CN202211518960.8A CN202211518960A CN115865485A CN 115865485 A CN115865485 A CN 115865485A CN 202211518960 A CN202211518960 A CN 202211518960A CN 115865485 A CN115865485 A CN 115865485A
Authority
CN
China
Prior art keywords
user
data list
strange
relationship
relation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211518960.8A
Other languages
Chinese (zh)
Other versions
CN115865485B (en
Inventor
杨腾霄
乔梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Niudun Technology Co ltd
Original Assignee
Shanghai Niudun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Niudun Technology Co ltd filed Critical Shanghai Niudun Technology Co ltd
Priority to CN202211518960.8A priority Critical patent/CN115865485B/en
Publication of CN115865485A publication Critical patent/CN115865485A/en
Application granted granted Critical
Publication of CN115865485B publication Critical patent/CN115865485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a stranger security method and system based on a metasma, and belongs to the field of network security. The method comprises the following steps: when a user is informed of a friend adding request by a strange contact, acquiring information of the strange contact to generate a strange contact data list, wherein the strange contact data list comprises a friendly value used for representing the strange contact and the user friendliness; acquiring activity area information of the strange contact persons, and generating a strange contact person activity data list; collecting the favorite information of the strange contact persons to generate a favorite data list of the strange contact persons; and collecting the relation between the strange contact persons and the user to generate a strange contact person relation data list. According to the method and the device, when the stranger requests to add the friend, the user can know the contact degree between the stranger contact and the user through the friendly value, the stranger can be effectively prevented from harassing the user, and the user safety is protected.

Description

Stranger safety precaution method and system based on meta universe
Technical Field
The invention relates to a stranger security method and system based on a meta universe, and belongs to the field of network security.
Background
The Meta universe (Metaverse) is a novel virtual-real fused internet application and social form generated by integrating multiple new technologies, provides immersive experience based on an extended reality technology, generates a mirror image of a real world based on a digital twin technology, builds an economic system based on a block chain technology, closely fuses the virtual world and the real world on an economic system, a social system and an identity system, and allows each user to perform content production and world editing.
In the prior art, as patent numbers: chinese patent CN 113645205A proposes a safety control method for preventing adding contacts during phishing, which is characterized by comprising the following steps: acquiring an application request of a user for adding a friend or joining a chat group through an instant messaging tool; acquiring identity attribute information of the user to judge whether the user belongs to a sensitive user type; when the type of the sensitive user is judged, acquiring preset anti-phishing associated contact person information, and establishing an anti-phishing group together with the user based on the anti-phishing associated contact person; and sending the application request information to the anti-phishing group for auditing. According to the scheme, when a friend is added to a stranger, the attribute of the user can be judged, if the stranger belongs to the sensitive user type, the sensitive user can be audited through the anti-phishing group, so that the safety of the user is guaranteed, however, in the mode, the auditing needs to be carried out through the anti-phishing group, the auditing workload is very large under the huge system of the metas, and the contact among the users can be greatly influenced.
Therefore, a stranger security prevention method based on the metauniverse and an application are designed to solve the problems.
Disclosure of Invention
The application provides a stranger security prevention method and system based on a metasma, when a friend is added to a stranger, a friend value of the stranger and a user can be obtained by collecting related information of the stranger and the user, and the user judges that the friend is not required to be added based on the friend value, so that the user is prevented from being harassed, and the network security awareness of the user is improved.
In order to solve the technical problems, the invention comprises the following technical scheme:
a stranger security protection method based on a meta universe comprises the following steps:
when a user is sent a message of a friend adding request by a strange contact person, acquiring information of the strange contact person, and generating a strange contact person data list, wherein the strange contact person data list comprises a friendly value used for representing the friend degree of the strange person and the user;
acquiring activity area information and preference information of the unfamiliar contact persons and information of the relationship between the unfamiliar contact persons and the user, and correspondingly generating an unfamiliar contact person activity data list, an unfamiliar contact person preference data list and an unfamiliar contact person relationship data list;
and performing data integration on the strange contact person activity data list, the strange contact person preference data list and the strange contact person relationship data list to generate a friendly value of the strange contact person to the user friendliness degree.
Further, the friendly value generation method comprises,
generating an activity similarity data list based on the strange contact activity data list;
generating a preference similarity data list based on the preference data list of the strange contacts;
generating a relation data list based on the strange contact relation data list;
collecting the time of the user for participating in the activity, the time of the user for participating in the favorite articles and the time of the user for participating in the interaction with the friend contact person, and generating a invested time weight list;
and integrating the activity similarity data list, the preference similarity data list and the relation data list based on the invested time weight data list to generate a user-friendly value of the strange contact.
Further, the method for generating the relational data list comprises the following steps,
presetting a data list of relation values, and acquiring information of relation persons related to a user, wherein the relation persons and the relation value data list form a mapping relation;
the information of the relatives comprises the intimacy between the user and the relatives;
acquiring relationship information between strange contacts and relations, and generating a strange contact relationship data list, wherein the strange contact relationship data list and the relation value data list form a mapping relationship;
for strange contacts belonging to the relation, acquiring relation values of the strange contacts based on the relation value data list, acquiring the ratio of the relation values to the maximum relation value of the relation value data list, and generating a relation degree data list;
for strange contacts which do not belong to the relation person, acquiring the relation between the strange contacts and the relation person to generate an indirect relation list, and acquiring the maximum relation value between the strange contacts and the user to generate a strange contact relation value;
and collecting the product of the relationship values of the intimacy and the strange contact of the corresponding relationship person and the user in the indirect relationship list and the ratio of the product to the maximum relationship value of the relationship value data list to generate a relationship degree data list.
Further, the affinity is used to represent an amount of interaction between the user and the related person, the amount of interaction including one or all of chat, co-activity, and shopping together.
Further, the relationship value comprises a negative value and zero, and the stranger contact with the relationship value being the negative value comprises all or one of the stranger contact actively shielded by the user and the stranger contact actively shielded by the relationship person;
a strange contact with a relationship value of zero is a strange contact that has no relationship with the user.
Further, an affinity threshold value is set for a preset number of relatives with the highest relationship value, and the affinity threshold value is used for preventing the affinity from being low due to the fact that the interaction between the user and the relatives is less.
Further, the time of the user engaging in the activity investment, the time of the user investing in the favorite articles and the time of the user investing in the interaction with the friend contact can be mutually overlapped, and the weight value of each time is independently calculated.
Further, the time of the user participating in the activity comprises all, part or one of the time of the user going to a shopping mall, the time of the user going to a restaurant and the time of participating in the external entertainment activity.
Further, the time that the user attends the event includes the time that the user visits a virtual mall, a virtual restaurant, and a virtual recreational event.
A metastic-based stranger security system, the system comprising:
the information acquisition subsystem is used for acquiring the activity area information of the unfamiliar contact persons, generating an unfamiliar contact person activity data list, acquiring the preference information of the unfamiliar contact persons, generating an unfamiliar contact person preference data list, acquiring the relationship between the unfamiliar contact persons and the user and generating an unfamiliar contact person relationship data list;
and the data processing server is used for performing data integration on the unfamiliar contact person activity data list, the unfamiliar contact person preference data list and the unfamiliar contact person relationship data list to generate a friendly value of the unfamiliar contact person to the user friendliness degree.
Due to the adoption of the technical scheme, compared with the prior art, the invention has the following advantages and positive effects: according to the stranger safety precaution method based on the metasma, when a stranger contact adds a user as a friend, the association degree of the stranger contact and the user is evaluated in a friendly value mode, the user can judge whether the stranger contact is added as the friend or not based on the friendly value, accordingly, the network safety awareness of the user is improved, the network safety of the user is protected, in addition, the friendly value is obtained based on the activity area, the preference and the interpersonal relationship of the user, and the friend making standard of the user can be better met.
Drawings
Fig. 1 is a schematic step diagram of a stranger security method based on the meta universe in this embodiment.
Fig. 2 is a schematic diagram illustrating steps for generating a friendly value in the stranger security method based on the meta universe in this embodiment, which is an embodiment.
Fig. 3 is an embodiment of a data list generated by friendly values in the stranger security method based on the meta universe in the present embodiment.
Fig. 4 is a schematic diagram illustrating a step of generating a relationship data list in the stranger security method based on the meta universe in this embodiment, which is an embodiment.
Fig. 5 is a data list of relationship values in the stranger security method based on the meta universe in this embodiment, which is an embodiment.
Fig. 6 is a data list generated by the relationship degree in the stranger security method based on the meta universe in this embodiment, which is an embodiment.
Fig. 7 is a schematic structural diagram of a stranger security system based on the metasma in this embodiment.
The numbers in the figures are as follows:
100-an information acquisition subsystem; 200-data processing server.
Detailed Description
The stranger security method and system based on the metasma provided by the invention are further described in detail with reference to the drawings and the specific embodiments. It should be noted that technical features or combinations of technical features described in the following embodiments should not be considered in isolation, and they may be combined with each other to achieve better technical effects. In the drawings of the embodiments described below, the same reference numerals appearing in the respective drawings denote the same features or components, and may be applied to different embodiments. Thus, once an item is defined in one drawing, it need not be further discussed in subsequent drawings.
It should be noted that the structures, proportions, sizes, and other dimensions shown in the drawings and described in the specification are only for the purpose of understanding and reading the present disclosure, and are not intended to limit the scope of the invention, which is defined by the claims, and any modifications of the structures, changes in the proportions and adjustments of the sizes and other dimensions, should be construed as falling within the scope of the invention unless the function and objectives of the invention are affected. The scope of the preferred embodiments of the present invention includes additional implementations in which functions may be executed out of order from that described or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate. In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
Before further detailed description of the embodiments of the present application, terms and expressions referred to in the embodiments of the present application will be described, and the terms and expressions referred to in the embodiments of the present application will be used for the following explanation.
(1) The metauniverse (Metaverse) is a novel virtual-real fused internet application and social modality resulting from integration of a variety of new technologies, provides immersive experience based on an augmented reality technology, generates a mirror image of a real world based on a digital twin technology, builds an economic system based on a block chain technology, closely fuses the virtual world and the real world on an economic system, a social system, an identity system, and allows each user to perform content production and world editing.
(2) Cosine similarity measures the similarity between two vectors by measuring their cosine values of their angle. The cosine value of the 0-degree angle is 1, and the cosine value of any other angle is not more than 1; and its minimum value is-1. The cosine of the angle between the two vectors thus determines whether the two vectors point in approximately the same direction. When the two vectors have the same direction, the cosine similarity value is 1; when the included angle of the two vectors is 90 degrees, the value of the cosine similarity is 0; the cosine similarity has a value of-1 when the two vectors point in completely opposite directions. The result is independent of the length of the vector, only the pointing direction of the vector. Cosine similarity is commonly used in the positive space, and therefore gives values between-1 and 1.
(3) Intimacy means that the interaction heat of the user and the friend is expressed by a specific score. The calculated content comprises the intersection, the mutual visit behavior, the one-way interaction, the mutual participation and the like of the personal data, and the intimacy is given in a percentage manner.
(4) Instant Messaging (IM) refers to services capable of sending and receiving internet messages and the like instantly. Since 1998, particularly with the rapid development in recent years, the functions of instant messaging are becoming more and more abundant, and various functions such as e-mail, blog, music, television, game, and search are gradually integrated. Instant messaging is not a simple chat tool, and has been developed into a comprehensive information platform integrating communication, information, entertainment, search, e-commerce, office collaboration, enterprise customer service and the like.
Examples
Referring to fig. 1, in the present embodiment, a stranger security method based on the meta universe includes the following steps:
s101, when a user is sent a message of a friend adding request by a strange contact, acquiring information of the strange contact, and generating a strange contact data list, wherein the strange contact data list comprises a friendly value used for representing the degree of friendliness of the strange contact and the user.
And S102, acquiring activity area information and preference information of the strange contacts and information of the relationship between the strange contacts and the user, and correspondingly generating a strange contact activity data list, a strange contact preference data list and a strange contact relationship data list.
S103, performing data integration on the strange contact activity data list, the strange contact preference data list and the strange contact relation data list to generate a friendly value of the strange contact to the user friendliness degree.
In the embodiment, a user enters the virtual world of the metasma to perform social activities, when a request from an unfamiliar contact person to add a friend is received, a friendly value between the user and the unfamiliar contact person can be looked up, the friendly value is only visible to the user, the friendly value is obtained by collecting activity area information and preference information of the unfamiliar contact person and a relationship between the unfamiliar contact person and the user, and after seeing the unfamiliar contact person and the friendly value of the user, the user can judge whether the unfamiliar contact person is added to the friend or not, so that the user is prevented from being harassed or cheated by the unfamiliar contact person.
With reference to fig. 2 and fig. 3, in this embodiment, the friendly value generation method includes:
s201, generating an activity similarity data list based on the strange contact activity data list.
And S202, generating a preference similarity data list based on the strange contact preference data list.
And S203, generating a relation data list based on the strange contact relation data list.
S204, collecting the time of the user for participating in the activity, the time of the user for participating in the favorite articles and the time of the user for participating in the interaction with the friend contact person, and generating a invested time weight list.
And S205, integrating the activity similarity data list, the preference similarity data list and the relation data list based on the input time weight data list to generate a user-friendly value of stranger contacts.
In this embodiment, after the activity data of the strange contact is collected, the similarity between the strange contact and the user in the location area may be obtained by using a cosine similarity algorithm, so as to determine whether the activity place of the strange contact in the metaspace space is similar to the user or not and whether the user has an intersection with the strange contact or not. For example, as the cosine similarity is-1 to 1, a negative similarity indicates that the similarity between the strange contact and the user is opposite, but if the similarity is negative, the friend value between the strange contact and the user is reduced, but if the two people are different only in the location area, the friend value is not affected, and similarly, the preference data is also the same, so that a value with the cosine similarity larger than 0 and a value smaller than 0 can be taken as values.
For example, the similarity between the user and the stranger in the area position is calculated as follows by using the cosine similarity:
areas A, B, C and D exist in the virtual world, and users often move in the areas A and C, so that the areas A and C take the value of 1, B and D take the value of 0, and the vector value of the users is (1, 0,1, 0); acquiring that strange contacts often move in an area A and an area D, so that the area A and the area D take values of 1, B, and the area C takes values of 0, and then the vector value of the strange contacts takes values of (1, 0, 1); using the cosine similarity formula:
Figure DEST_PATH_IMAGE001
then the strange contact is 50% similar to the user on the location activity area.
Similarly, when preference data of strange contacts are collected, the cosine similarity can be used for obtaining the similarity between the preference of the strange contacts and the preference of the user, and the user can be helped to screen friends with related interests through the preference.
The relationship data list of the strange contacts can be used to judge whether the strange contacts have a relationship with the user, for example, the strange contacts may be relatives, classmates, colleagues, etc. of the user, and the strange contacts having the relationship may not be friends of the user temporarily, so that the strange contacts having the relationship have more friendly value when the user is added as friends.
Because the time of the user investing in activities, favorite articles or interpersonal relationship is different, the time of the user investing in the above aspects can be used as a weight, and when a final friendly value is calculated, the three aspects of the user favorite, the activity area and the interpersonal relationship are integrated according to the weight of the time, so that the friendly value between the strange contact and the user is obtained.
As an example, as shown in fig. 5, when the activity similarity of the strange contact a and the user calculated through the collection is 50%, the preference similarity is 30%, and the relationship degree is 20%, the investment of the user in the activity is 60 minutes, the investment in the preference is 30 minutes, the investment in the interpersonal interaction is 40 minutes, and the time for the user to enter the metauniverse virtual space is 120 minutes, it is possible to obtain a weight of 60/120=0.5 of the user in the activity, a weight of 30/120=0.25 of the user in the preference, and a cost of 40/120=0.33 of the user in the interpersonal interaction, and thus obtain a friendly value of 0.5 × 50% +0.25 × 30% +0.33 × 20% =0.391 of the strange contact and the user.
It should be noted that the cosine similarity algorithm is already a mature algorithm, and is not described herein in detail, and similarly, when the similarity between a strange contact and a user is obtained, other similarity algorithms may also be used, and are not described herein one by one. When collecting the range of activities, preferences and relationships between the user and strange contacts, the method can be not limited to the virtual world of the metasuniverse, also can be used for collecting in the real world, and when strange contacts add friends, a friendly value providing mode can be not limited to the virtual world of the metasuniverse, and can also be used in real-time communication of the real world.
With reference to fig. 4, fig. 5, and fig. 6, in this embodiment, the method for generating the relationship degree data list includes the following steps:
s301, presetting a data list of relation values, and collecting information of relation persons related to the user, wherein the relation persons and the relation value data list form a mapping relation.
S302, the information of the relationship person comprises the intimacy degree of the user and the relationship person.
S303, collecting relationship information between strange contacts and relations, and generating a strange contact relationship data list, wherein the strange contact relationship data list and the relationship value data list form a mapping relationship.
S304, for strange contacts belonging to the relation persons, acquiring relation values of the strange contacts based on the relation value data list, acquiring the ratio of the relation values to the maximum relation value of the relation value data list, and generating a relation degree data list.
S305, for strange contacts not belonging to the relation person, collecting the relation between the strange contacts and the relation person, generating an indirect relation list, and collecting the maximum relation value between the strange contacts and the user, and generating a strange contact relation value.
S306, collecting the product of the intimacy degree of the corresponding relation person and the user in the indirect relation list and the relation value of the strange contact person, and comparing the product with the maximum relation value of the relation value data list to generate a relation degree data list.
In this embodiment, a relationship value of a relationship person related to a user may be obtained through a preset relationship value data list, the closer the relationship person is to the user, the higher the preset relationship is, for example, as shown in fig. 5, a relationship value of a parent of the user is 30, meanwhile, for different relationship persons, the user has a difference between the relationship person and the user, so as to collect the intimacy degree between the relationship person and the user as a value for judging the interaction between the user and the relationship person, as an example, the user mother often chats with the user, participates in activities of the metaspace together, and plays a role in store shopping and the like of the metaspace, thereby obtaining the intimacy degree between the mother and the user of 90%, and the method for judging the intimacy degree belongs to a mature technology in instant messaging, and will not be described in detail here.
When it is collected that the relationship between the strange contact and the user belongs to the contact, as an example, as shown in fig. 6, when it is collected that the strange contact added with a friend is a classmate of the user's real world, the classmate relationship belongs to the relationship within the contact, and in the case of such a relationship, the obtained data list without strange relationship degree is a ratio of a classmate relationship value 20 to a relationship value data list with a big relationship value 30, and is 20/30=0.67.
If the relationship between the strange contact and the user is not the relationship in the relationship, the closest relationship between the strange contact and the relationship is collected, for example, as shown in fig. 5 and 6, the strange contact belongs to a friend of a student B of the user, the relationship value of the friend of the student in the relationship data list is 15, 15 is used as the relationship value of the strange contact, when the relationship degree of the strange contact is calculated, the intimacy between the student B and the user needs to be obtained, for example, the student B often chats and interacts with the user, the relationship degree of the strange contact is 95% of the intimacy degree of the corresponding relationship B in the indirect relationship list, and the product of the relationship value of the strange contact and the relationship value 15 is 15 × 95%/30, which is the ratio of the maximum relationship value 30 of the relationship data list is 15 × 95%/30.475. If the corresponding relation person in the indirect relation list is the classmate C of the user, the contact between the classmate C of the user and the user is very little, and therefore the intimacy is only 30%, the degree of relation of the strange contact person is 15 multiplied by 30%/30=0.15, and therefore the degree of relation between the strange contact person and the user can be reflected.
It should be noted that the relationship person is a person having a direct relationship with the user, such as a family relative, a classmate, a friend, a teacher, and the like, and the relationship may be a real relationship in reality or a virtual relationship in the meta universe.
Preferably, the affinity is used for representing the interaction amount between the user and the related person, and the interaction amount comprises one or all of chatting, acting together and shopping together.
In this embodiment, the intimacy degree can be represented by the amount of interaction between the user and the related person, where the amount of interaction includes real world chat, shopping, participation in activities, shopping, and the like, and also includes virtual world chat, shopping, participation in activities, and shopping, and the intimacy degree judgment method belongs to the mature prior art, and will not be described herein in any greater detail.
Preferably, in this embodiment, the relationship value includes a negative value and zero, and the strange contacts with a relationship value of a negative value include all or one of strange contacts actively shielded by the user and strange contacts actively shielded by the relationship; a strange contact with a relationship value of zero is a strange contact that has no relationship with the user.
As shown in fig. 5, if a user shields a stranger contact, it is shown that the relationship between the stranger contact and the user is not consistent, or the stranger contact often harasses the user, at this time, the relationship between the stranger contact and the user is a negative value, and similarly, the relationship value of the stranger contact shielded by the relationship related to the user may also be a negative value, so that the network security of the user can be ensured, and the stranger contact is far away from harassment of a bad stranger contact; strange contacts with relation value of zero have no relation with the user, so the degree of relation between the strange contacts and the user is also zero.
Preferably, in this embodiment, an affinity threshold is set for a preset number of relatives with the highest relationship value, so as to prevent the user from interacting with the relatives less and causing the affinity to be low.
Since it is impossible for the user to maintain a high degree of affinity with all of the relatives of the user, it is necessary to set an affinity threshold value for some of the persons having the highest degree of relationship with the user. As an example, the user is going out alone and only contacts the parent once a week, so the user has less interaction with the parent, resulting in less affinity of the user with the parent, so the affinity of the user with the parent is set to a threshold of 60%, for which reason the affinity of the user with the parent is calculated as 60% if less than 60%.
Preferably, in this embodiment, the time of the user engaging in the activity investment, the time of the user investing in the favorite items, and the time of the user investing in the interaction with the friend contact person can be overlapped, and the weight of each time is calculated independently.
Because the user can interact with the friends when participating in the activity or participate in the favorite activity, the time of the user participating in the activity, the time of the interaction with the friends and the time of the investment of favorite articles can be overlapped, but the weight is calculated independently, for example, the time of the user investing in the activity is 60 minutes, in the 60 minutes, the user still interacts with the friends within 10 minutes, in the next 30 minutes, the user is all used for interacting with the friends, and finally the user spends 30 minutes to invest in favorite articles, and then the user leaves the Yuan universe world; at this time, when calculating the time, the time that the user takes part in the activity is 60 minutes, the time of interacting with the friend is 10+30=40 minutes, and the time spent on the preference of the user is 30 minutes.
Preferably, in this embodiment, the time when the user participates in the activity includes all, part or one of the time when the user goes to a shopping mall, the time when the user goes to a restaurant and the time when the user participates in the external entertainment activity.
The user's participation in the activity represents the range of the user's activity, and the time the user has been invested in the activity may include visiting a mall, attending a concert, going to a restaurant, etc.
Preferably, in this embodiment, the time when the user participates in the activity includes the time when the user visits a virtual mall, a virtual restaurant and a virtual entertainment activity.
The user's participation in the virtual arena in the meta universe may also be used to indicate the time the user is participating in the event.
Referring to fig. 7, in this embodiment, a system for security protection of strangers based on a meta universe includes:
the information acquisition subsystem 100 is used for acquiring activity area information of the unfamiliar contacts, generating an unfamiliar contact activity data list, acquiring preference information of the unfamiliar contacts, generating an unfamiliar contact preference data list, acquiring the relationship between the unfamiliar contacts and a user, and generating an unfamiliar contact relationship data list;
and the data processing server 200 is used for performing data integration on the unfamiliar contact activity data list, the unfamiliar contact preference data list and the unfamiliar contact relationship data list to generate a friendly value of the unfamiliar contact to the user friendliness.
The information acquisition subsystem 100 can acquire the activity places and the preferences of the strange contacts and the relationship between the strange contacts and the user, the information acquisition subsystem 100 transmits the acquired information to the data processing server 200, the data processing server 200 processes the information and then obtains the user friendly value of the strange contacts in combination with the personal related information of the user, and the user can judge whether the strange contacts are required to be added as friends or not according to the user friendly value.
Other technical features are referred to in the previous embodiments and are not described herein.
In the description above, the components may be selectively and operatively combined in any number within the scope of the targeted protection of this disclosure. In addition, terms like "comprising," "including," and "having" should be interpreted as inclusive or open-ended, rather than exclusive or closed-ended, by default, unless explicitly defined to the contrary. All technical, scientific, or other terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, unless defined otherwise. Common terms found in dictionaries should not be interpreted too ideally or too realistically in the context of related art documents unless the present disclosure expressly limits them to that.
While exemplary aspects of the present disclosure have been described for illustrative purposes, those skilled in the art will appreciate that the foregoing description is by way of description of the preferred embodiments of the present disclosure only, and is not intended to limit the scope of the present disclosure in any way, which includes additional implementations in which functions may be performed out of the order of presentation or discussion. Any changes and modifications of the present invention based on the above disclosure will be within the scope of the appended claims.

Claims (10)

1. A stranger security protection method based on a meta universe is characterized by comprising the following steps:
when a user is sent a message of a friend adding request by a strange contact person, acquiring information of the strange contact person, and generating a strange contact person data list, wherein the strange contact person data list comprises a friendly value used for representing the friend degree of the strange person and the user;
acquiring activity area information and preference information of the unfamiliar contact persons and information of the relationship between the unfamiliar contact persons and the user, and correspondingly generating an unfamiliar contact person activity data list, an unfamiliar contact person preference data list and an unfamiliar contact person relationship data list;
and performing data integration on the strange contact person activity data list, the strange contact person preference data list and the strange contact person relationship data list to generate a friendly value of the strange contact person to the user friendliness degree.
2. A metastic-based stranger security method as claimed in claim 1, wherein: the method for generating the friendly value comprises the following steps,
generating an activity similarity data list based on the strange contact activity data list;
generating a preference similarity data list based on the preference data list of the strange contacts;
generating a relation data list based on the strange contact relation data list;
collecting the time of the user for participating in the activity, the time of the user for participating in the favorite articles and the time of the user for participating in the friend contact person in interaction, and generating a invested time weight list;
and integrating the activity similarity data list, the preference similarity data list and the relation data list based on the invested time weight data list to generate a user-friendly value of the strange contact.
3. The metastic-based stranger security method as claimed in claim 2, wherein the generating method of the relational degree data list comprises the steps of,
presetting a data list of relation values, and acquiring information of relation persons related to a user, wherein the relation persons and the relation value data list form a mapping relation;
the information of the relatives comprises the intimacy between the user and the relatives;
acquiring relationship information between strange contacts and relationship persons, and generating a strange contact relationship data list, wherein the strange contact relationship data list and the relationship value data list form a mapping relationship;
for strange contacts belonging to the relation, acquiring relation values of the strange contacts based on the relation value data list, acquiring the ratio of the relation values to the maximum relation value of the relation value data list, and generating a relation degree data list;
for strange contacts which do not belong to the relation person, acquiring the relation between the strange contacts and the relation person to generate an indirect relation list, and acquiring the maximum relation value between the strange contacts and the user to generate a strange contact relation value;
and collecting the product of the relationship values of the intimacy and the strange contact of the corresponding relationship person and the user in the indirect relationship list and the ratio of the product to the maximum relationship value of the relationship value data list to generate a relationship degree data list.
4. A metastic-based stranger security method as claimed in claim 3, wherein: the intimacy degree is used for representing the interaction amount between the user and the relatives, and the interaction amount comprises one or all of chatting, acting together and shopping together.
5. A metastic-based stranger security method as claimed in claim 3, wherein: the relation value comprises a negative value and zero, and the strange contacts with the relation value being the negative value comprise all or one of strange contacts actively shielded by the user and strange contacts actively shielded by the relation;
a strange contact with a relationship value of zero is a strange contact that has no relationship with the user.
6. A metastic-based stranger security method as claimed in claim 3, wherein: and setting an intimacy threshold value for the preset number of relatives with the highest relationship value to prevent the intimacy from being lower due to less interaction between the user and the relatives.
7. The metastic-universe-based stranger security method of claim 2, wherein: the time of the user for participating in the activity, the time of the user for participating in the favorite articles and the time of the user for interacting with the friend contact persons can be overlapped, and the weight value of each time is calculated independently.
8. The metastic-universe-based stranger security method of claim 2, wherein: the time of the user participating in the activity comprises all, part or one of the time of the user going to a shopping mall, the time of the user going to a restaurant and the time of participating in the external entertainment activity.
9. The metastic-based stranger security system as recited in claim 8, wherein: the time that the user attends the event includes the time of the virtual mall, the virtual restaurant and the virtual entertainment event that the user visits.
10. A metastic-based stranger security system, the system comprising:
the information acquisition subsystem is used for acquiring the activity area information of the unfamiliar contact persons, generating an unfamiliar contact person activity data list, acquiring the preference information of the unfamiliar contact persons, generating an unfamiliar contact person preference data list, acquiring the relationship between the unfamiliar contact persons and the user and generating an unfamiliar contact person relationship data list;
and the data processing server is used for performing data integration on the unfamiliar contact person activity data list, the unfamiliar contact person favorite data list and the unfamiliar contact person relationship data list to generate a friendly value of the unfamiliar contact person to the user friendliness degree.
CN202211518960.8A 2022-11-30 2022-11-30 Stranger safety precaution method and system based on meta universe Active CN115865485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211518960.8A CN115865485B (en) 2022-11-30 2022-11-30 Stranger safety precaution method and system based on meta universe

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211518960.8A CN115865485B (en) 2022-11-30 2022-11-30 Stranger safety precaution method and system based on meta universe

Publications (2)

Publication Number Publication Date
CN115865485A true CN115865485A (en) 2023-03-28
CN115865485B CN115865485B (en) 2024-06-07

Family

ID=85668244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211518960.8A Active CN115865485B (en) 2022-11-30 2022-11-30 Stranger safety precaution method and system based on meta universe

Country Status (1)

Country Link
CN (1) CN115865485B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103390244A (en) * 2013-07-24 2013-11-13 南京欣网视讯信息技术有限公司 User friend relation polymerization method and platform with operator characteristics
KR20140119939A (en) * 2013-03-29 2014-10-13 (주)위메이드엔터테인먼트 Method and terminal for providing a friend list in social game
CN104717124A (en) * 2013-12-13 2015-06-17 腾讯科技(深圳)有限公司 Friend recommendation method, device and server
CN106686198A (en) * 2015-11-06 2017-05-17 中国移动通信集团公司 Address book management method, intimacy information management method, address book management device, and intimacy information management device
CN108282393A (en) * 2017-12-29 2018-07-13 五八有限公司 A kind of good friend's adding method, device, computer equipment and readable storage medium storing program for executing
CN108427715A (en) * 2018-01-30 2018-08-21 重庆邮电大学 A kind of social networks friend recommendation method of fusion degree of belief
CN109658279A (en) * 2018-12-19 2019-04-19 成都康赛信息技术有限公司 Social network relationships recommended method based on cohesion and credit worthiness
CN109992724A (en) * 2019-04-03 2019-07-09 西咸新区心灯软件科技有限公司 A kind of calculation method and device of user's compatible degree based on personal characteristic information
CN113645205A (en) * 2021-07-28 2021-11-12 上海纽盾网安科技有限公司 Safety control method, client and system for preventing phishing and adding contacts
CN114168785A (en) * 2021-11-09 2022-03-11 天翼爱音乐文化科技有限公司 Music recommendation method, system, device and storage medium based on social contact and distance

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140119939A (en) * 2013-03-29 2014-10-13 (주)위메이드엔터테인먼트 Method and terminal for providing a friend list in social game
CN103390244A (en) * 2013-07-24 2013-11-13 南京欣网视讯信息技术有限公司 User friend relation polymerization method and platform with operator characteristics
CN104717124A (en) * 2013-12-13 2015-06-17 腾讯科技(深圳)有限公司 Friend recommendation method, device and server
CN106686198A (en) * 2015-11-06 2017-05-17 中国移动通信集团公司 Address book management method, intimacy information management method, address book management device, and intimacy information management device
CN108282393A (en) * 2017-12-29 2018-07-13 五八有限公司 A kind of good friend's adding method, device, computer equipment and readable storage medium storing program for executing
CN108427715A (en) * 2018-01-30 2018-08-21 重庆邮电大学 A kind of social networks friend recommendation method of fusion degree of belief
CN109658279A (en) * 2018-12-19 2019-04-19 成都康赛信息技术有限公司 Social network relationships recommended method based on cohesion and credit worthiness
CN109992724A (en) * 2019-04-03 2019-07-09 西咸新区心灯软件科技有限公司 A kind of calculation method and device of user's compatible degree based on personal characteristic information
CN113645205A (en) * 2021-07-28 2021-11-12 上海纽盾网安科技有限公司 Safety control method, client and system for preventing phishing and adding contacts
CN114168785A (en) * 2021-11-09 2022-03-11 天翼爱音乐文化科技有限公司 Music recommendation method, system, device and storage medium based on social contact and distance

Also Published As

Publication number Publication date
CN115865485B (en) 2024-06-07

Similar Documents

Publication Publication Date Title
US11271879B2 (en) Information transmission control method, apparatus, and system
JP5401461B2 (en) Dynamic update of privacy settings in social networks
JP5575886B2 (en) Method and apparatus for processing an authentication request message in a social network
US8026918B1 (en) Controlling communications with proximate avatars in virtual world environment
EP2849411B1 (en) Session establishment methods and corresponding server
US10122723B1 (en) Supervised contact list for user accounts
JP2020502711A (en) Method and apparatus for distributing augmented reality based virtual objects
US20150058957A1 (en) Systems and methods to present messages in location-based social networking communities
CN109479159A (en) The video of user's selection is shared in group communication
US20080109741A1 (en) User-generated content with instant-messaging functionality
US11750680B2 (en) Systems and methods to selectively combine video streams
TW201532408A (en) Video communication method and system in instant communication
CN102138156A (en) Persisting a group in an instant messaging application
WO2009074037A1 (en) An instant communication method, device and system
US10248932B2 (en) Informing users of a virtual universe of real world events
US10645137B2 (en) Systems and methods to create composite videos
US11818138B2 (en) Preventing unauthorized account access based on location and time
US11058956B2 (en) Consent verification
US20190028410A1 (en) Configuring presence and notifications in persistent conversations
JP2022017327A (en) Interface display method and device for providing social network service via anonymous infrastructure profile
US8250476B2 (en) Asynchronous immersive communications in a virtual universe
TW201107993A (en) Communication integration between a virtual universe and an external device
US9398115B2 (en) Unified location and presence, communication across real and virtual worlds
KR101679348B1 (en) Device, method for providing social network service and computer readable recording medium
CN104093081A (en) On-line instant chat system based on digital television and implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant