WO2020093854A1 - 信息交互方法、装置、系统、服务器用户终端及存储介质 - Google Patents
信息交互方法、装置、系统、服务器用户终端及存储介质 Download PDFInfo
- Publication number
- WO2020093854A1 WO2020093854A1 PCT/CN2019/111945 CN2019111945W WO2020093854A1 WO 2020093854 A1 WO2020093854 A1 WO 2020093854A1 CN 2019111945 W CN2019111945 W CN 2019111945W WO 2020093854 A1 WO2020093854 A1 WO 2020093854A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- information
- current user
- target
- social
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 86
- 238000004891 communication Methods 0.000 claims abstract description 59
- 230000003993 interaction Effects 0.000 claims description 51
- 238000013459 approach Methods 0.000 abstract description 13
- 230000006855 networking Effects 0.000 abstract description 9
- 238000010586 diagram Methods 0.000 description 13
- 238000012545 processing Methods 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000010079 rubber tapping Methods 0.000 description 2
- 230000003997 social interaction Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
Definitions
- This application relates to the field of communication technologies, and in particular, to information interaction methods, devices, systems, server user terminals, and storage media.
- the inventor realizes that the adoption of the above-mentioned social mode has lost the channel for content consumers to know strangers, resulting in limited social interaction of users.
- the purpose of the embodiments of the present application is to provide an information interaction method, device, system, server user terminal, and storage medium, so as to increase user social channels.
- the specific technical solutions are as follows:
- an embodiment of the present application provides an information interaction method, which is applied to a server.
- the method includes:
- an embodiment of the present application provides an information interaction method, which is applied to a user terminal, and the method includes:
- the communication with the target user terminal of the target social user is established according to the first concealed connection information.
- an information interaction device which is located at a server, and the device includes:
- the social instruction receiving module is configured to obtain user information of the current user corresponding to the hidden social instruction when receiving the hidden social instruction;
- the social user matching module is configured to match the target social user to the current user according to the user information of the current user;
- the hidden information sending module is configured to hide the identity information of the target social user to send the first hidden connection information to the current user terminal of the current user, and hide the identity information of the current user to the target user of the target social user
- the terminal sends second concealed connection information to establish communication between the current user terminal and the target user terminal.
- an information interaction device which is located at a user terminal, and the device includes:
- the social instruction sending module is configured to send a hidden social instruction to the server when receiving an instruction used by the current user to trigger hidden social matching, wherein the hidden social instruction is used to make the server match the target for the current user Social users
- the concealed information receiving module is configured to, after receiving the first concealed connection information concealing the identity information of the target social user sent by the server, establish a target user terminal with the target social user according to the first concealed connection information Communication.
- an embodiment of the present application provides a server, including:
- Memory for storing processor executable instructions
- the processor is configured to: when receiving the hidden social instruction, acquire the user information of the current user corresponding to the hidden social instruction; match the target social user for the current user according to the user information of the current user ; Hide the identity information of the target social user to send the first hidden connection information to the current user terminal of the current user, hide the current user's identity information to send the second hidden connection information to the target user terminal of the target social user To establish communication between the current user terminal and the target user terminal.
- an embodiment of the present application provides a user terminal, including:
- Memory for storing processor executable instructions
- the processor is configured to:
- a hidden social instruction is sent to the server, where the hidden social instruction is used to make the server match the target social user for the current user;
- the first concealed connection information concealing the identity information of the target social user sent by the server, the communication with the target user terminal of the target social user is established according to the first concealed connection information.
- an embodiment of the present application provides an information interaction system.
- the system includes: a server and a user terminal;
- the user terminal is configured to send a hidden social instruction to the server when receiving an instruction used by the current user to trigger hidden social matching; and upon receiving a first hidden connection sent by the server to hide the identity information of the target social user After the information, establish communication with the target user terminal according to the first concealed connection information;
- the server is configured to, when receiving the hidden social instruction, obtain user information of the current user corresponding to the hidden social instruction; match the target social user for the current user according to the user information of the current user; Hide the identity information of the target social user and send first concealed connection information to the current user terminal of the current user, hide the identity information of the current user and send second concealed connection information to the target user terminal of the target social user, To establish communication between the current user terminal and the target user terminal.
- an embodiment of the present application provides a non-transitory computer-readable storage medium.
- the mobile terminal can perform an information interaction method.
- the methods described include:
- an embodiment of the present application provides a non-transitory computer-readable storage medium.
- the mobile terminal can execute an information interaction method.
- the methods described include:
- the tenth aspect provides a computer program product that, when executed on a processor, implements the information interaction method applied to a server according to any one of the first aspect above.
- an embodiment of the present application provides a computer program product that, when executed on a processor, implements any of the information interaction methods described in the second aspect that are applied to a user terminal.
- a network social method for users and strange users is provided, which can increase the user's network social approach and hide the user's identity information, increasing Social security.
- Fig. 1 is a first schematic flowchart of an information interaction method applied to a server according to an exemplary embodiment.
- Fig. 2 is a second schematic flowchart of an information interaction method applied to a server according to an exemplary embodiment.
- Fig. 3 is a first schematic flowchart of an information interaction method applied to a user terminal according to an exemplary embodiment.
- Fig. 4 is a first schematic diagram showing a user terminal display interface according to an exemplary embodiment.
- Fig. 5 is a second schematic flowchart of an information interaction method applied to a user terminal according to an exemplary embodiment.
- Fig. 6 is a second schematic diagram showing a user terminal display interface according to an exemplary embodiment.
- Fig. 7 is a third schematic diagram showing a user terminal display interface according to an exemplary embodiment.
- Fig. 8 is a fourth schematic diagram showing a user terminal display interface according to an exemplary embodiment.
- Fig. 9 is a schematic diagram of an information interaction device located on a server according to an exemplary embodiment.
- Fig. 10 is a schematic diagram of an information interaction device at a user terminal according to an exemplary embodiment.
- Fig. 11 is a schematic diagram of an information interaction system according to an exemplary embodiment.
- Fig. 12 is a schematic diagram of a user terminal according to an exemplary embodiment.
- Fig. 13 is a schematic diagram of a server according to an exemplary embodiment.
- Fig. 1 is a flowchart of an information interaction method according to an exemplary embodiment. As shown in Fig. 1, the information interaction method is applied to a server and includes the following steps.
- the information interaction method in the embodiment of the present application is applied to a server, so it can be implemented by the server.
- the current user decides to hide the identity for social purposes, the current user enters an instruction for triggering the hidden social matching in the current user terminal used by him to trigger the current user terminal to send the hidden social instruction to the server.
- the hidden social instruction contains the current user's identity, such as the current user's account number or the current user's ID (Identification, identification, etc.).
- the server After the server receives the hidden social instruction sent by the current user terminal, the server obtains the user information of the current user in the database according to the identity of the current user in the hidden social instruction.
- the user information of the user may include information such as the user's age, gender, location, and hobbies.
- the server matches the social object for the current user, that is, the target social user, through a preset matching algorithm.
- the preset matching algorithm can be set according to the actual situation, for example, the user with the highest similarity to the user information of the current user is selected as the target social user.
- the server may count the same points of each social friend of the current user, and match the user including the same points as the target social user.
- the user information of the current user includes at least one of the current user's gender, age, geographic location, and hobbies; the above S102, matching the target social user for the current user according to the user information of the current user includes:
- step A it is judged whether the above-mentioned custom matching information of the current user is received.
- the user-defined matching information is set by the user.
- the user can set one or more types of information such as the age, gender, hobby, and geographic location of the social user who wants to match through the user-defined matching information.
- Step B If the user-defined matching information of the current user is received, match the target social user satisfying the user-defined matching information for the current user according to the user information of the current user.
- the server receives the custom matching information of the current user
- the user who matches the custom matching information for the current user is regarded as the target social user.
- the target social user needs to also perform hidden social matching, that is, the target social user is a user who has sent a hidden social instruction to the server.
- step C if the custom matching information of the current user is not received, the target social user meeting the preset matching condition is matched for the current user according to the user information of the current user.
- the user information of the current user includes the gender, age, geographic location, and hobbies of the current user; in step C, if the custom matching information of the current user is not received, the current user
- the user information of the target social user that matches the preset matching conditions for the current user includes:
- the difference between the age and the age of the current user is selected to be less than the preset age threshold, the gender is different from the gender of the current user, the geographic location is A user whose geographical distance of the current user is less than a preset distance threshold and whose similarity to the hobby of the current user is greater than the preset similarity threshold is regarded as the target social user of the current user, where the target social user is Users who have sent hidden social instructions to the server.
- the preset age threshold can be set according to actual needs, such as 1 year, 2 years, or 5 years.
- the preset hobby similarity can also be set according to actual needs, for example, 50%, 60%, or 80%.
- the preset distance threshold can be set according to actual needs, for example, 10 kilometers, 50 kilometers, or 100 kilometers.
- the server matches the social object for the current user, that is, the target social user, and requires that the social object matched for the current user also sends a hidden social instruction, and no other users are matched and the matching is not ended. If there are multiple social objects that satisfy the conditions, the server may randomly select a seat target social user. If it is a social object that matches the conditions, return the matching failure information.
- matching social objects for users according to age, gender, and hobbies can match objects with high similarity to users, and the user has a good social matching experience.
- S103 Hide the identity information of the target social user and send first concealed connection information to the current user terminal of the current user; hide the identity information of the current user and send second concealed connection information to the target user terminal of the target social user to establish Communication between the current user terminal and the target user terminal.
- the user's identity information includes the user's name, homepage link, and contact information.
- the server hides the identity information of the target social user, and sends the first hidden connection information to the current user terminal of the current user. Because the server hides the identity information of the target social user when sending the first concealed connection information, the identity information of the user is not displayed in the current user terminal; similarly, the target social user is not displayed in the target user terminal Identity Information.
- the user's real identity information can be replaced by randomly generated virtual identity information or using default virtual identity information, that is, the virtual identity information is displayed in the current user terminal and the target user terminal.
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the method further includes:
- S104 After receiving the identity disclosure instruction of the current user terminal and receiving the identity disclosure instruction of the target user terminal, send the identity information of the target social user to the current user terminal and send the current user to the target user terminal Identity information.
- the current user may input a command for disclosing the identity in the current user terminal, so that the current user terminal sends the current user's identity disclosure instruction to the server.
- the target social user may input a command for disclosing the identity in the target user terminal, so that the target user terminal sends the target social user's identity disclosure instruction to the server.
- the server receives the identity disclosure instruction of the current user terminal, and receives the identity disclosure instruction of the target user terminal, it sends the identity information of the target social user to the current user terminal, so that the current user terminal displays the identity information of the target social user.
- the target user terminal sends the identity information of the current user, so that the target user terminal displays the identity information of the current user.
- the target user's identity information is displayed on the current user terminal, and the current user's identity information is displayed on the target user terminal to complete the current user and target social
- the user's identity interaction provides support for its further communication.
- the information interaction method applied to the server according to the embodiment of the present application further includes:
- the server can also send the common point display information to the current user terminal and the target user terminal.
- the common point display information includes the current Users and the target social users have in common.
- the common point display information may also be included in the first hidden connection information and the second hidden connection information and sent. After the current user terminal and the target user terminal receive the common point display information, the current user terminal and the target user terminal each show the common points of the current user and the target social user.
- the common point display information is sent to enable the current user terminal and the target user terminal to display the common points of the current user and the target social user, so as to facilitate the communication between the current user and the target social user.
- Fig. 3 is a flowchart of an information interaction method according to an exemplary embodiment. As shown in Fig. 3, the information interaction method is applied to a user terminal and includes the following steps.
- the information interaction method in the embodiment of the present application is applied to a user terminal, so it can be implemented by the user terminal.
- the current user can operate the user terminal and input an instruction for triggering hidden social matching.
- the current user terminal receives the instruction used by the current user to trigger hidden social matching
- the current user terminal sends the hidden social instruction of the current user to the server.
- the current user can input an instruction to trigger hidden social matching by tapping the touch screen, by specifying a voice, or by specifying a gesture.
- the user opens a designated display page of the current user terminal, and clicks a matching button to input an instruction for triggering hidden social matching.
- the user terminal detects that the matching button of the designated display page is clicked, it sends a hidden social instruction to the server.
- it can display a preset matching animation while waiting for the service response.
- the server When receiving the hidden social instruction, the server obtains the user information of the current user corresponding to the hidden social instruction; matches the target social user for the current user according to the current user's user information; and hides the identity information of the target social user to the current user's current user terminal Send the first concealed connection information, conceal the identity information of the current user, and send the second concealed connection information to the target user terminal of the target social user.
- the current user terminal After receiving the first hidden connection information, the current user terminal establishes communication with the target user terminal according to the first hidden connection information. Because the identity information of the target social user is hidden in the first concealed connection information, because the current user terminal cannot display the real identity information of the target social user, in a possible implementation manner, the randomly generated virtual identity information or The set virtual identity information replaces the real identity information of the target social user.
- the communication between the current user terminal and the target user terminal may include one or more of voice, video, and text, and the privacy of the current user and the target social user may be protected by voice change technology or face occlusion technology.
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the above method after receiving the first concealed connection information that conceals the identity information of the target social user sent by the server, establish a target user terminal with the target social user according to the first concealed connection information.
- the above method also includes:
- the current user may input an instruction used by the user to trigger the identity disclosure in the current user terminal.
- the current user terminal After the current user terminal receives the instruction for triggering the identity disclosure, the current user terminal sends the current user's identity disclosure instruction to the server.
- the current user can input an instruction for triggering identity disclosure by tapping the touch screen, by specifying a voice, or by specifying a gesture.
- the user opens a designated display page of the current user terminal, and clicks a heart-shaped button to input an instruction for triggering identity disclosure.
- the user terminal detects that the heart-shaped button of the designated display page is clicked, the instruction of the current user's identity is disclosed to the server.
- the designated display page may display that the current user has entered the instruction for triggering the identity disclosure.
- S304 After receiving the identity information of the target social user sent by the server, display the identity information of the target social user, where the identity information of the target social user is the identity disclosure instruction received by the server for the current user, and Sent after receiving the above-mentioned target social user's identity disclosure instruction.
- the server After receiving the identity disclosure instruction of the current user and receiving the identity disclosure instruction of the target social user, the server sends the identity information of the target social user to the current user terminal and sends the identity information of the current user to the target user terminal. After receiving the identity information of the target social user sent by the server, the current user terminal displays the identity information of the target social user. In a possible implementation manner, as shown in FIG. 7, in order to improve the user experience, it may be displayed on the designated display page that the target social user has entered an instruction to trigger the disclosure of identity, and may also be in the process of waiting for the service response To display the preset cutscenes.
- the target user's identity information is displayed on the current user terminal, and the current user's identity information is displayed on the target user terminal to complete the current user and target social
- the user's identity interaction provides support for its further communication.
- the information interaction method applied to a user terminal further includes:
- the common point presentation information After receiving the common point presentation information sent by the server, the common point of the current user and the target social user is displayed, wherein the common point presentation information includes the common point of the current user and the target social user.
- the server can also send the common point display information to the current user terminal.
- the common point display information includes the common points of the current user and the target social user, for example, the common points of the current user and the target social user in age and the common points of hobbies, etc.
- the common point display information may also include the location information of the current user and the target social user.
- the current user terminal displays the common points of the current user and the target social user on the designated display page.
- the display image may be as shown in FIG. 8.
- the common point display information is sent to enable the current user terminal and the target user terminal to display the common points of the current user and the target social user, so as to facilitate the communication between the current user and the target social user.
- Fig. 9 is a block diagram of an information interaction device according to an exemplary embodiment, which is applied to a server.
- the device includes a social instruction receiving module 901, a social user matching module 902, and a hidden information sending module 903.
- the social instruction receiving module 901 is configured to obtain user information of the current user corresponding to the hidden social instruction when receiving the hidden social instruction;
- the social user matching module 902 is configured to match the target social user for the current user according to the user information of the current user;
- the hidden information sending module 903 is configured to hide the identity information of the target social user and send the first concealed connection information to the current user terminal of the current user, and hide the identity information of the current user to send the first information to the target user terminal of the target social user. Second, conceal the connection information to establish the communication between the current user terminal and the target user terminal.
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the information interaction device on the server according to the embodiment of the present application further includes:
- the identity information sending module is configured to send the identity information of the target social user to the current user terminal after receiving the identity disclosure instruction of the current user terminal and receiving the identity disclosure instruction of the target user terminal, so that the above
- the current user terminal displays the identity information of the target social user, and sends the identity information of the current user to the target user terminal, so that the target user terminal displays the identity information of the current user.
- the user information of the current user includes the gender, age and hobbies of the current user
- the social user matching module 902 is specifically configured to select the difference between the age and the age of the current user is less than a preset age threshold according to the user information of the current user, the gender is different from the gender of the current user, and the hobby is different from the current
- a user whose similarity degree of a user's hobby is greater than a preset preference similarity threshold is regarded as the target social user of the current user, wherein the target social user is a user who has sent a hidden social instruction to the server.
- the information interaction device on the server according to the embodiment of the present application further includes:
- the common point information sending module is configured to send common point presentation information to the current user terminal and the target user terminal, so that the current user terminal and the target user terminal show the common points of the current user and the target social user, wherein
- the common point display information includes the common points of the current user and the target social user.
- Fig. 10 is a block diagram of an information interaction device according to an exemplary embodiment, which is applied to a server.
- the device includes: located at a user terminal, the device includes: a social instruction sending module 1001 and a hidden information receiving module 1002.
- the social instruction sending module 1001 is configured to send a hidden social instruction to the server when receiving an instruction for the current user to trigger hidden social matching, wherein the hidden social instruction is used to make the server match the target social user for the current user ;
- the hidden information receiving module 1002 is configured to, after receiving the first hidden connection information that hides the identity information of the target social user sent by the server, establish communication with the target user terminal of the target social user according to the first hidden connection information .
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the information interaction device at the user terminal further includes:
- the public instruction sending module is configured to send the above-mentioned current user's identity disclosure instruction to the above-mentioned server after receiving the above-mentioned current user's instruction for triggering the identity disclosure;
- the identity information receiving module is configured to display the identity information of the target social user after receiving the identity information of the target social user sent by the server, wherein the identity information of the target social user is the current user received by the server Is sent after receiving the identity disclosure instruction of the target social user.
- the information interaction device at the user terminal further includes:
- the common point information receiving module is configured to display the common points of the current user and the target social user after receiving the common point display information sent by the server, wherein the common point display information includes the current user and the target What social users have in common.
- An embodiment of the present application also provides an information interaction system.
- the system includes: a server 1101 and a user terminal 1102;
- the user terminal 1102 is configured to send a hidden social instruction to the server 1101 when receiving an instruction used by the current user to trigger hidden social matching; and upon receiving the first concealment of the identity information of the hidden target social user sent by the server 1101 After the connection information, establish communication with the target user terminal according to the first concealed connection information;
- the server 1101 is configured to obtain the user information of the current user corresponding to the hidden social instruction when receiving the hidden social instruction; match the target social user for the current user according to the user information of the current user; hide the target social
- the user's identity information sends the first concealed connection information to the current user terminal of the current user, and the concealed identity information of the current user sends second concealed connection information to the target user terminal of the target social user to establish the current user terminal Target user terminal communication.
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- server 1101 may also execute:
- the identity information of the target social user is sent to the current user terminal, and the identity of the current user is sent to the target user terminal information.
- the user information of the current user includes at least one of the current user's gender, age, geographic location, and hobbies;
- the matching of the current social user with the target social user according to the user information of the current user includes:
- the target social user meeting the preset matching condition is matched for the current user according to the user information of the current user.
- the user information of the current user includes the gender, age, geographic location, and hobbies of the current user;
- matching the target social user satisfying the preset matching conditions for the current user according to the user information of the current user includes:
- the difference between the age and the age of the current user is selected to be less than the preset age threshold, the gender is different from the gender of the current user, the geographic location is A user whose geographical distance of the current user is less than a preset distance threshold and whose similarity to the hobby of the current user is greater than the preset similarity threshold is regarded as the target social user of the current user, where the target social user is Users who have sent hidden social instructions to the server.
- server 1101 may also execute:
- the user terminal 1102 may also execute:
- the user terminal 1102 may also execute:
- the common point presentation information After receiving the common point presentation information sent by the server, the common point of the current user and the target social user is displayed, wherein the common point presentation information includes the common point of the current user and the target social user.
- An embodiment of the present application also provides a user terminal, including:
- Processor memory for storing processor executable instructions
- the above processor is configured as:
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the above The processor can also execute:
- the above processor may also execute:
- the common point presentation information After receiving the common point presentation information sent by the server, the common point of the current user and the target social user is displayed, wherein the common point presentation information includes the common point of the current user and the target social user.
- Fig. 12 is a block diagram of a user terminal 1200 according to an exemplary embodiment.
- the user terminal 1200 may be a mobile phone, a computer, a digital broadcasting terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, and so on.
- the user terminal 1200 may include one or more of the following components: a processing component 1202, a memory 1204, a power component 1206, a multimedia component 1208, an audio component 1210, an input / output (I / O) interface 1212, and a sensor component 1214 , And communication components 1216.
- the processing component 1202 generally controls the overall operations of the user terminal 1200, such as operations associated with display, telephone calls, data communication, camera operations, and recording operations.
- the processing component 1202 may include one or more processors 1220 to execute instructions to complete all or part of the steps in the above method.
- the processing component 1202 may include one or more modules to facilitate interaction between the processing component 1202 and other components.
- the processing component 1202 may include a multimedia module to facilitate interaction between the multimedia component 1208 and the processing component 1202.
- the memory 1204 is configured to store various types of data to support operations at the user terminal 1200. Examples of these data include instructions for any application or method operated on the user terminal 1200, contact data, phone book data, messages, pictures, videos, and the like.
- the memory 1204 may be implemented by any type of volatile or non-volatile storage device or a combination thereof, such as static random access memory (SRAM), electrically erasable programmable read only memory (EEPROM), erasable and removable Programmable read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory, magnetic disk or optical disk.
- SRAM static random access memory
- EEPROM electrically erasable programmable read only memory
- EPROM erasable and removable Programmable read only memory
- PROM programmable read only memory
- ROM read only memory
- magnetic memory flash memory
- flash memory magnetic disk or optical disk.
- the power supply component 1206 provides power to various components of the user terminal 1200.
- the power supply component 1206 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the user terminal 1200.
- the multimedia component 1208 includes a screen that provides an output interface between the user terminal 1200 and the user.
- the screen may include a liquid crystal display (LCD) and a touch panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from the user.
- the touch panel includes one or more touch sensors to sense touch, swipe, and gestures on the touch panel. The touch sensor may not only sense the boundary of the touch or sliding action, but also detect the duration and pressure related to the touch or sliding operation.
- the multimedia component 1208 includes a front camera and / or a rear camera. When the user terminal 1200 is in an operation mode, such as a shooting mode or a video mode, the front camera and / or the rear camera may receive external multimedia data. Each front camera and rear camera can be a fixed optical lens system or have focal length and optical zoom capabilities.
- the audio component 1210 is configured to output and / or input audio signals.
- the audio component 1210 includes a microphone (MIC).
- the microphone is configured to receive an external audio signal.
- the received audio signal may be further stored in the memory 1204 or sent via the communication component 1216.
- the audio component 1210 further includes a speaker for outputting audio signals.
- the input / output interface 1212 provides an interface between the processing component 1202 and a peripheral interface module.
- the peripheral interface module may be a keyboard, a click wheel, or a button. These buttons may include, but are not limited to: home button, volume button, start button, and lock button.
- the sensor component 1214 includes one or more sensors for providing the user terminal 1200 with status evaluation in various aspects.
- the sensor component 1214 can detect the on / off state of the user terminal 1200, and the relative positioning of the components, for example, the component is the display and keypad of the user terminal 1200, and the sensor component 1214 can also detect the user terminal 1200 or The position of the component changes, the presence or absence of contact between the user and the user terminal 1200, the orientation or acceleration / deceleration of the user terminal 1200, and the temperature change of the user terminal 1200.
- the sensor assembly 1214 may include a proximity sensor configured to detect the presence of nearby objects without any physical contact.
- the sensor assembly 1214 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications.
- the sensor assembly 1214 may further include an acceleration sensor, a gyro sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
- the communication component 1216 is configured to facilitate wired or wireless communication between the user terminal 1200 and other devices.
- the user terminal 1200 may access a wireless network based on a communication standard, such as WiFi, an operator network (such as 2G, 3G, 4G, or 5G), or a combination thereof.
- the communication component 1216 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel.
- the communication component 1216 further includes a near field communication (NFC) module to facilitate short-range communication.
- the NFC module can be implemented based on radio frequency identification (RFID) technology, infrared data association (IrDA) technology, ultra-wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
- RFID radio frequency identification
- IrDA infrared data association
- UWB ultra-wideband
- Bluetooth Bluetooth
- the user terminal 1200 may be used by one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field Programming gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are used to implement the above method.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing devices
- PLDs programmable logic devices
- FPGA field Programming gate array
- controller microcontroller, microprocessor or other electronic components are used to implement the above method.
- a non-transitory computer-readable storage medium including instructions is also provided, such as a memory 1204 including instructions, which can be executed by the processor 1220 of the user terminal 1200 to complete the above method.
- the non-transitory computer-readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, or the like.
- An embodiment of the present application also provides a server, including:
- Processor memory for storing processor executable instructions
- the processor is configured to: when receiving the hidden social instruction, obtain the user information of the current user corresponding to the hidden social instruction; match the target social user for the current user according to the user information of the current user; hide the target The identity information of the social user sends the first concealed connection information to the current user terminal of the current user, and the identity information of the concealed current user sends the second concealed connection information to the target user terminal of the target social user to establish the current user terminal and The above communication of the target user terminal.
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the processor may also execute:
- the identity information of the target social user is sent to the current user terminal, and the identity of the current user is sent to the target user terminal information.
- the user information of the current user includes at least one of the current user's gender, age, geographic location, and hobbies;
- the matching of the current social user with the target social user according to the user information of the current user includes:
- the target social user meeting the preset matching condition is matched for the current user according to the user information of the current user.
- the user information of the current user includes the gender, age, geographic location, and hobbies of the current user;
- matching the target social user satisfying the preset matching conditions for the current user according to the user information of the current user includes:
- the difference between the age and the age of the current user is selected to be less than the preset age threshold, the gender is different from the gender of the current user, the geographic location is A user whose geographical distance of the current user is less than a preset distance threshold and whose similarity to the hobby of the current user is greater than the preset similarity threshold is regarded as the target social user of the current user, where the target social user is Users who have sent hidden social instructions to the server.
- the above processor may also execute:
- Fig. 13 is a block diagram of a server 1300 according to an exemplary embodiment.
- the server 1300 includes a processing component 1322, which further includes one or more processors, and memory resources represented by the memory 1332, for storing instructions executable by the processing component 1322, such as application programs.
- the application programs stored in the memory 1332 may include one or more modules each corresponding to a set of instructions.
- the server 1300 may also include a power component 1328 configured to perform power management of the server 1300, a wired or wireless network interface 1350 configured to connect the server 1300 to the network, and an input output (I / O) interface 1358.
- the server 1300 can operate based on an operating system stored in the memory 1332, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
- Embodiments of the present application also provide a non-transitory computer-readable storage medium.
- the instructions in the storage medium are executed by the processor of the mobile terminal, the mobile terminal can execute an information interaction method.
- the method includes:
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the first hidden connection information is sent to the current user terminal of the current user in the hiding of the identity information of the target social user
- the second hidden connection is sent to the target user terminal of the target social user in hiding the identity information of the current user
- the identity information of the target social user is sent to the current user terminal, and the identity of the current user is sent to the target user terminal information.
- the user information of the current user includes at least one of the current user's gender, age, geographic location, and hobbies;
- the foregoing matching the target social user for the current user according to the user information of the current user includes:
- the target social user meeting the preset matching condition is matched for the current user according to the user information of the current user.
- the user information of the current user includes the gender, age, geographic location, and hobbies of the current user;
- matching the target social user satisfying the preset matching conditions for the current user according to the user information of the current user includes:
- the difference between the age and the age of the current user is selected to be less than the preset age threshold, the gender is different from the gender of the current user, the geographic location is A user whose geographical distance of the current user is less than a preset distance threshold and whose similarity to the hobby of the current user is greater than the preset similarity threshold is regarded as the target social user of the current user, where the target social user is Users who have sent hidden social instructions to the server.
- the above method further includes:
- Embodiments of the present application also provide a non-transitory computer-readable storage medium.
- the instructions in the storage medium are executed by the processor of the mobile terminal, the mobile terminal can execute an information interaction method.
- the method includes:
- a hidden social instruction is sent to the server, where the hidden social instruction is used to make the server match the target social user for the current user;
- the communication with the target user terminal of the target social user is established according to the first concealed connection information.
- a method of network socialization between a user and an unfamiliar user is provided, which can increase the user's network social approach and hide the user's identity information, thereby increasing social security.
- the above The method also includes:
- the identity disclosure instruction of the current user is sent to the server;
- the identity information of the target social user After receiving the identity information of the target social user sent by the server, the identity information of the target social user is displayed, wherein the identity information of the target social user is the identity disclosure instruction of the current user received by the server and received Sent after the above-mentioned target social user's identity disclosure instruction.
- the above method further includes:
- the common point presentation information After receiving the common point presentation information sent by the server, the common point of the current user and the target social user is displayed, wherein the common point presentation information includes the common point of the current user and the target social user.
- An embodiment of the present application further provides a computer program product.
- an information interaction method can be executed. The method includes:
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the first hidden connection information is sent to the current user terminal of the current user in the hiding of the identity information of the target social user
- the second hidden connection is sent to the target user terminal of the target social user in hiding the identity information of the current user
- the identity information of the target social user is sent to the current user terminal, and the identity of the current user is sent to the target user terminal information.
- the user information of the current user includes at least one of the current user's gender, age, geographic location, and hobbies;
- the matching of the current social user with the target social user according to the user information of the current user includes:
- the target social user meeting the preset matching condition is matched for the current user according to the user information of the current user.
- the user information of the current user includes the gender, age, geographic location, and hobbies of the current user;
- matching the target social user satisfying the preset matching conditions for the current user according to the user information of the current user includes:
- the difference between the age and the age of the current user is selected to be less than the preset age threshold, the gender is different from the gender of the current user, the geographic location is A user whose geographical distance of the current user is less than a preset distance threshold and whose similarity to the hobby of the current user is greater than the preset similarity threshold is regarded as the target social user of the current user, where the target social user is Users who have sent hidden social instructions to the server.
- the above method further includes:
- An embodiment of the present application further provides a computer program product.
- an information interaction method can be executed. The method includes:
- a hidden social instruction is sent to the server, where the hidden social instruction is used to make the server match the target social user for the current user;
- the communication with the target user terminal of the target social user is established according to the first concealed connection information.
- a method of network socialization between a user and a stranger is provided, which can increase the user's network social approach, and hide the user's identity information, thereby increasing social security.
- the above The method also includes:
- the identity disclosure instruction of the current user is sent to the server;
- the identity information of the target social user After receiving the identity information of the target social user sent by the server, the identity information of the target social user is displayed, wherein the identity information of the target social user is the identity disclosure instruction of the current user received by the server and received Sent after the above-mentioned target social user's identity disclosure instruction.
- the above method further includes:
- the common point presentation information After receiving the common point presentation information sent by the server, the common point of the current user and the target social user is displayed, wherein the common point presentation information includes the common point of the current user and the target social user.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Health & Medical Sciences (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
本申请实施例提供了一种信息交互方法、装置、系统、服务器用户终端及存储介质,应用于通信技术领域,上述信息交互方法包括:在接收到隐匿社交指令时,获取隐匿社交指令对应的当前用户的用户信息;按照当前用户的用户信息,为当前用户匹配目标社交用户;隐匿目标社交用户的身份信息向当前用户的当前用户终端发送第一隐匿连接信息,隐匿当前用户的身份信息向目标社交用户的目标用户终端发送第二隐匿连接信息,以建立当前用户终端与目标用户终端的通信。本申请实施例的信息交互方法,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
Description
本申请要求于2018年11月6日提交中国专利局、申请号为201811315229.9发明名称为“信息交互方法、装置、系统、服务器用户终端及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及通信技术领域,特别是涉及信息交互方法、装置、系统、服务器用户终端及存储介质。
随着互联网技术的发展,网络社交成为人们的主流社交方式之一。在互联网内容社区产品领域,人与人之间的社交往往是始于内容的,也就是说先发现对方产出的内容,再通过内容与对方产生联系。比如发现对方产出的视频作品,通过作品进入对方个人主页,再与对方聊天,以加深认识。
发明人意识到采用上述社交方式,对于内容消费者来说失去了认识陌生人的渠道,导致用户社交受限。
发明内容
本申请实施例的目的在于提供一种信息交互方法、装置、系统、服务器用户终端及存储介质,以实现增加用户社交途径。具体技术方案如下:
第一方面,本申请实施例提供了一种信息交互方法,应用于服务器,所述方法包括:
在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;
按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;
隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
第二方面,本申请实施例提供了一种信息交互方法,应用于用户终端,所述方法包括:
在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,所述隐匿社交指令用于使所述服务器为所述当前用户匹配目标社交用户;
在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
第三方面,本申请实施例提供了一种信息交互装置,位于服务器,所述装置包括:
社交指令接收模块,被配置为在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;
社交用户匹配模块,被配置为按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;
隐匿信息发送模块,被配置为隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
第四方面,本申请实施例提供了一种信息交互装置,位于用户终端,所述装置包括:
社交指令发送模块,被配置为在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,所述隐匿社交指令用于使所述服务器为所述当前用户匹配目标社交用户;
隐匿信息接收模块,被配置为在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
第五方面,本申请实施例提供了一种服务器,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;按照所述当前用户的用户信息,为所 述当前用户匹配目标社交用户;隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
第六方面,本申请实施例提供了一种用户终端,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,所述隐匿社交指令用于使所述服务器为所述当前用户匹配目标社交用户;在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
第七方面,本申请实施例提供了一种信息交互系统,所述系统包括:服务器及用户终端;
所述用户终端,被配置为在接收到当前用户用于触发隐匿社交匹配的指令时,向所述服务器发送隐匿社交指令;在接收到服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与目标用户终端的通信;
所述服务器,被配置为在接收到所述隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向所述目标社交用户的目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
第八方面,本申请实施例提供了一种非临时性计算机可读存储介质,当所述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行一种信息交互方法,所述方法包括:
在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用 户信息;
按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;
隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
第九方面,本申请实施例提供了一种非临时性计算机可读存储介质,当所述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行一种信息交互方法,所述方法包括:
在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,所述隐匿社交指令用于使所述服务器为所述当前用户匹配目标社交用户;
在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
第十方面本申请实施例提供了一种计算机程序产品,所述计算机程序产品在处理器上被执行时,实现上述第一方面任一所述的应用于服务器的信息交互方法。
第十一方面本申请实施例提供了一种计算机程序产品,所述计算机程序产品在处理器上被执行时,实现上述第二方面任一所述的应用于用户终端的信息交互方法。
本申请的实施例提供的技术方案可以包括以下有益效果:在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
为了更清楚地说明本申请实施例和现有技术的技术方案,下面对实施例和现有技术中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出 创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是根据一示例性实施例示出的应用于服务器的信息交互方法的第一种流程示意图。
图2是根据一示例性实施例示出的应用于服务器的信息交互方法的第二种流程示意图。
图3是根据一示例性实施例示出的应用于用户终端的信息交互方法的第一种流程示意图。
图4是根据一示例性实施例示出的用户终端展示界面的第一种示意图。
图5是根据一示例性实施例示出的应用于用户终端的信息交互方法的第二种流程示意图。
图6是根据一示例性实施例示出的用户终端展示界面的第二种示意图。
图7是根据一示例性实施例示出的用户终端展示界面的第三种示意图。
图8是根据一示例性实施例示出的用户终端展示界面的第四种示意图。
图9是根据一示例性实施例示出的位于服务器的信息交互装置的一种示意图。
图10是根据一示例性实施例示出的位于用户终端的信息交互装置的一种示意图。
图11是根据一示例性实施例示出的信息交互系统的一种示意图。
图12是根据一示例性实施例示出的用户终端的一种示意图。
图13是根据一示例性实施例示出的服务器的一种示意图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的一种信息交互方法的流程图,如图1所示,信息交互方法应用于服务器中,包括以下步骤。
S101,在接收到隐匿社交指令时,获取上述隐匿社交指令对应的当前用 户的用户信息。
本申请实施例中的信息交互方法应用于服务器,因此可以由服务器实现。在当前用户决定隐匿身份进行社交时,当前用户在其使用的当前用户终端中输入用于触发隐匿社交匹配的指令,以触发当前用户终端向服务器发送隐匿社交指令。隐匿社交指令中包含当前用户的身份标识,例如当前用户的账号或当前用户的ID(Identification,身份证明)等。
在服务器接收到由当前用户终端发送的隐匿社交指令后,服务器按照隐匿社交指令中当前用户的身份标识,在数据库中获取当前用户的用户信息。
S102,按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户。
用户的用户信息可以包括用户的年龄、性别、位置及爱好等信息。服务器按照当前用户的用户信息,通过预设匹配算法,为当前用户匹配社交对象,即目标社交用户。预设匹配算法可以根据实际情况进行设定,例如选取与当前用户的用户信息相似度最高的用户,作为目标社交用户等。可选的,服务器可以统计当前用户的各社交好友的相同点,并匹配包括该相同点的用户,作为目标社交用户。
可选的,当前用户的用户信息包括当前用户的性别、年龄、地理位置及爱好中的至少一种;上述S102,按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户,包括:
步骤A,判断是否接收到上述当前用户的自定义匹配信息。
自定义匹配信息由用户自定义设定,用户可以通过自定义匹配信息设定希望匹配的社交用户的年龄、性别、爱好及地理位置等信息中的一种或多种。
步骤B,若接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足上述自定义匹配信息的目标社交用户。
若服务器收到当前用户的自定义匹配信息,为当前用户匹配满足自定义匹配信息的用户作为目标社交用户。例如,当前用户的用户信息为男性,当前用户的自定义匹配信息为异性,则为当前用户匹配性别为女性的用户作为目标社交用户。其中,目标社交用户需要也在进行隐匿社交匹配,即目标社交用户为已向服务器发送隐匿社交指令的用户。
步骤C,若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户。
在一种可能的实施方式中,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好;上述步骤C,若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户,包括:
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,选取年龄与上述当前用户的年龄的差值小于预设年龄阈值、性别与上述当前用户的性别不同,地理位置与上述当前用户的地理位置的距离小于预设距离阈值,且爱好与上述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为上述当前用户的目标社交用户,其中,上述目标社交用户为已向服务器发送隐匿社交指令的用户。
预设年龄阈值可以按照实际需求进行设定,例如设定为1年、2年或5年等。预设爱好相似度同样可以按照实际需求进行设定,例如设定为50%、60%或80%等。预设距离阈值可以按照实际需求进行设定,例如设置为10公里、50公里或100公里等。服务器按照当前用户的用户信息,为当前用户匹配社交对象,即目标社交用户,要求为当前用户匹配的社交对象同样发送了隐匿社交指令,且未匹配到其他用户及未结束匹配。若存在多个满足条件的社交对象,服务器可以随机选取一个座位目标社交用户。若为匹配到满足条件的社交对象,返回匹配失败信息。在本申请实施例中,按照年龄、性别及爱好为用户匹配社交对象,能够匹配到与用户相似度高的对象,用户社交匹配体验好。
S103,隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信。
用户的身份信息包括用户的名称、主页链接及联系方式等信息。服务器隐匿目标社交用户的身份信息,向当前用户的当前用户终端发送第一隐匿连接信息。因为服务器在发送第一隐匿连接信息时隐匿了目标社交用户的身份 信息,因此,在上述当前用户终端中不显示用户的身份信息;同理,在上述目标用户终端中,不显示目标社交用户的身份信息。在一种可能的实施方式中,可以通过随机产生的虚拟身份信息或利用默认的虚拟身份信息,来代替用户的真实身份信息,即在当前用户终端及目标用户终端中显示虚拟身份信息。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,参见图2,在上述隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信之后,上述方法还包括:
S104,在接收到上述当前用户终端的身份公开指令,且接收到上述目标用户终端的身份公开指令后,向上述当前用户终端发送上述目标社交用户的身份信息,向上述目标用户终端发送上述当前用户的身份信息。
当前用户可以在当前用户终端中输入用于公开身份的命令,以使当前用户终端向服务器发送当前用户的身份公开指令。目标社交用户可以在目标用户终端中输入用于公开身份的命令,以使目标用户终端向服务器发送目标社交用户的身份公开指令。在服务器接收到当前用户终端的身份公开指令,且接收到目标用户终端的身份公开指令后,向当前用户终端发送目标社交用户的身份信息,以使当前用户终端展示目标社交用户的身份信息,向目标用户终端发送当前用户的身份信息,以使目标用户终端展示当前用户的身份信息。
在本申请实施例中,在当前用户及目标社交用户均同意公开身份时,在当前用户终端展示目标社交用户的身份信息,在目标用户终端展示当前用户的身份信息,以完成当前用户及目标社交用户的身份交互,为其进一步交流提供支持。
可选的,本申请实施例的应用于服务器的信息交互方法还包括:
向上述当前用户终端及上述目标用户终端发送共同点展示信息,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
在向当前用户终端发送第一隐匿连接信息,向目标用户终端发送第二隐 匿连接信息的同时,服务器还可以向当前用户终端及目标用户终端发送共同点展示信息,共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。当然共同点展示信息还可以包含在第一隐匿连接信息及第二隐匿连接信息中发送。在当前用户终端及目标用户终端接收到共同点展示信息后,当前用户终端及目标用户终端各自展示当前用户及目标社交用户的共同点。
在本申请实施例中,发送共同点展示信息,以使当前用户终端及目标用户终端展示当前用户及目标社交用户的共同点,方便当前用户与目标社交用户的交流。
图3是根据一示例性实施例示出的一种信息交互方法的流程图,如图3所示,信息交互方法应用于用户终端中,包括以下步骤。
S301,在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,上述隐匿社交指令用于使上述服务器为上述当前用户匹配目标社交用户。
本申请实施例中的信息交互方法应用于用户终端,因此可以通过用户终端实现。
在当前用户希望进行隐匿社交时,当前用户可以操作用户终端,输入用于触发隐匿社交匹配的指令。在当前用户终端接收到当前用户用于触发隐匿社交匹配的指令时,当前用户终端向服务器发送当前用户的隐匿社交指令。当前用户可以通过点击触摸屏、通过指定语音或通过指定手势输入用于触发隐匿社交匹配的指令。例如,在一种可能的实施方式中,如图4所示,用户打开当前用户终端的指定展示页面,并通过点击匹配按钮,实现输入用于触发隐匿社交匹配的指令。在用户终端检测到指定展示页面的匹配按钮被点击时,向服务器发送隐匿社交指令,为了提升用户体验,可以在等待服务响应的过程中,显示预设的匹配动画。
服务器在接收到隐匿社交指令时,获取隐匿社交指令对应的当前用户的用户信息;按照当前用户的用户信息,为当前用户匹配目标社交用户;隐匿目标社交用户的身份信息向当前用户的当前用户终端发送第一隐匿连接信息,隐匿当前用户的身份信息向目标社交用户的目标用户终端发送第二隐匿连接信息。
S302,在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信。
当前用户终端在接收第一隐匿连接信息后,按照第一隐匿连接信息建立与目标用户终端的通信。因为第一隐匿连接信息中隐匿了目标社交用户的身份信息,因为当前用户终端中无法显示目标社交用户的真实身份信息,在一种可能的实施方式中,可以通过随机生成的虚拟身份信息或预先设定的虚拟身份信息来代替目标社交用户的真实身份信息。当前用户终端与目标用户终端的通信可以包括语音、视频及文字中的一种或多种,可以通过变音技术或面部遮挡等技术来保护当前用户及目标社交用户的隐私。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,参见图5,在上述在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信之后,上述方法还包括:
S303,在接收到上述当前用户用于触发身份公开的指令后,向上述服务器发送上述当前用户的身份公开指令。
在当前用户希望公开自己的身份信息时,可以在当前用户终端中输入用户用于触发身份公开的指令。在当前用户终端接收到用于触发身份公开的指令后,当前用户终端向服务器发送当前用户的身份公开指令。当前用户可以通过点击触摸屏、通过指定语音或通过指定手势输入用于触发身份公开的指令。例如,在一种可能的实施方式中,如图6所示,用户打开当前用户终端的指定展示页面,并通过点击心形按钮,实现输入用于触发身份公开的指令。在用户终端检测到指定展示页面的心形按钮被点击时,向服务器当前用户的身份公开指令,为了提升用户体验,可以在指定展示页面中,显示当前用户输入了用于触发身份公开的指令。
S304,在接收到上述服务器发送的上述目标社交用户的身份信息后,展示上述目标社交用户的身份信息,其中,上述目标社交用户的身份信息为上述服务器接收到上述当前用户的身份公开指令,且接收到上述目标社交用户 的身份公开指令后发送的。
在服务器接收到当前用户的身份公开指令,且接收到目标社交用户的身份公开指令后,向当前用户终端发送目标社交用户的身份信息,向目标用户终端发送当前用户的身份信息。在当前用户终端接收到服务器发送的目标社交用户的身份信息后,展示目标社交用户的身份信息。在一种可能的实施方式中,如图7所示,为了提升用户体验,可以在指定展示页面中,显示目标社交用户输入了用于触发身份公开的指令,还可以在等待服务响应的过程中,显示预设的过场动画。
在本申请实施例中,在当前用户及目标社交用户均同意公开身份时,在当前用户终端展示目标社交用户的身份信息,在目标用户终端展示当前用户的身份信息,以完成当前用户及目标社交用户的身份交互,为其进一步交流提供支持。
可选的,本申请实施例的应用于用户终端的信息交互方法还包括:
在接收到上述服务器发送的共同点展示信息后,展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
服务器还可以向当前用户终端发送共同点展示信息,共同点展示信息中包括当前用户及目标社交用户的共同点,例如,当前用户及目标社交用户的年龄的共同点及爱好的共同点等,可选的,共同点展示信息中还可以包括当前用户及目标社交用户的位置信息。当前用户终端在接收到共同点展示信息后,在指定展示页面中展示当前用户及目标社交用户的共同点,在一种可能的实施方式中,其展示图像可以如图8所示。
在本申请实施例中,发送共同点展示信息,以使当前用户终端及目标用户终端展示当前用户及目标社交用户的共同点,方便当前用户与目标社交用户的交流。
图9是根据一示例性实施例示出的一种信息交互装置框图,应用于服务器,参照图9,该装置包括:社交指令接收模块901,社交用户匹配模块902和隐匿信息发送模块903。
社交指令接收模块901,被配置为在接收到隐匿社交指令时,获取上述隐 匿社交指令对应的当前用户的用户信息;
社交用户匹配模块902,被配置为按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户;
隐匿信息发送模块903,被配置为隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,本申请实施例的位于服务器的信息交互装置还包括:
身份信息发送模块,被配置为在接收到上述当前用户终端的身份公开指令,且接收到上述目标用户终端的身份公开指令后,向上述当前用户终端发送上述目标社交用户的身份信息,以使上述当前用户终端展示上述目标社交用户的身份信息,向上述目标用户终端发送上述当前用户的身份信息,以使上述目标用户终端展示上述当前用户的身份信息。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄及爱好;
上述社交用户匹配模块902,具体被配置为按照上述当前用户的用户信息,选取年龄与上述当前用户的年龄的差值小于预设年龄阈值、性别与上述当前用户的性别不同,且爱好与上述当前用户的爱好的相似度大于预设爱好相似度阈值的用户,作为上述当前用户的目标社交用户,其中,上述目标社交用户为已向服务器发送隐匿社交指令的用户。
可选的,本申请实施例的位于服务器的信息交互装置还包括:
共同点信息发送模块,被配置为向上述当前用户终端及上述目标用户终端发送共同点展示信息,以使上述当前用户终端及上述目标用户终端展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
图10是根据一示例性实施例示出的一种信息交互装置框图,应用于服务器,参照图10,该装置包括:位于用户终端,该装置包括:社交指令发送模 块1001和隐匿信息接收模块1002。
社交指令发送模块1001,被配置为在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,上述隐匿社交指令用于使上述服务器为上述当前用户匹配目标社交用户;
隐匿信息接收模块1002,被配置为在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,本申请实施例的位于用户终端的信息交互装置还包括:
公开指令发送模块,被配置为在接收到上述当前用户用于触发身份公开的指令后,向上述服务器发送上述当前用户的身份公开指令;
身份信息接收模块,被配置为在接收到上述服务器发送的上述目标社交用户的身份信息后,展示上述目标社交用户的身份信息,其中,上述目标社交用户的身份信息为上述服务器接收到上述当前用户的身份公开指令,且接收到上述目标社交用户的身份公开指令后发送的。
可选的,本申请实施例的位于用户终端的信息交互装置还包括:
共同点信息接收模块,被配置为在接收到上述服务器发送的共同点展示信息后,展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
本申请实施例还提供了一种信息交互系统,参见图11,所述系统包括:服务器1101及用户终端1102;
上述用户终端1102,被配置为在接收到当前用户用于触发隐匿社交匹配的指令时,向上述服务器1101发送隐匿社交指令;在接收到服务器1101发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与目标用户终端的通信;
上述服务器1101,被配置为在接收到上述隐匿社交指令时,获取上述隐 匿社交指令对应的当前用户的用户信息;按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户;隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向上述目标社交用户的目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,上述服务器1101还可以执行:
在接收到上述当前用户终端的身份公开指令,且接收到上述目标用户终端的身份公开指令后,向上述当前用户终端发送上述目标社交用户的身份信息,向上述目标用户终端发送上述当前用户的身份信息。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好中的至少一种;
上述按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户,包括:
判断是否接收到上述当前用户的自定义匹配信息;
若接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足上述自定义匹配信息的目标社交用户;
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好;
上述若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户,包括:
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,选取年龄与上述当前用户的年龄的差值小于预设年龄阈值、性别与上述当前用户的性别不同,地理位置与上述当前用户的地理位置的距离小于预设距离阈值,且爱好与上述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为上述当前用户的目标社交用户,其中,上述目标社交用户为已 向服务器发送隐匿社交指令的用户。
可选的,上述服务器1101还可以执行:
向上述当前用户终端及上述目标用户终端发送共同点展示信息,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
可选的,上述用户终端1102还可以执行:
在接收到上述当前用户用于触发身份公开的指令后,向上述服务器发送上述当前用户的身份公开指令;在接收到上述服务器发送的上述目标社交用户的身份信息后,展示上述目标社交用户的身份信息,其中,上述目标社交用户的身份信息为上述服务器接收到上述当前用户的身份公开指令,且接收到上述目标社交用户的身份公开指令后发送的。
可选的,上述用户终端1102还可以执行:
在接收到上述服务器发送的共同点展示信息后,展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
本申请实施例还提供了一种用户终端,包括:
处理器;用于存储处理器可执行指令的存储器;
其中,上述处理器被配置为:
在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,上述隐匿社交指令用于使上述服务器为上述当前用户匹配目标社交用户;在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,在上述在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信之后,上述处理器还可以执行:
在接收到上述当前用户用于触发身份公开的指令后,向上述服务器发送上述当前用户的身份公开指令;在接收到上述服务器发送的上述目标社交用 户的身份信息后,展示上述目标社交用户的身份信息,其中,上述目标社交用户的身份信息为上述服务器接收到上述当前用户的身份公开指令,且接收到上述目标社交用户的身份公开指令后发送的。
可选的,上述处理器还可以执行:
在接收到上述服务器发送的共同点展示信息后,展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
图12是根据一示例性实施例示出的用户终端1200的框图。例如,用户终端1200可以是移动电话,计算机,数字广播终端,消息收发设备,游戏控制台,平板设备,医疗设备,健身设备,个人数字助理等。
参照图12,用户终端1200可以包括以下一个或多个组件:处理组件1202,存储器1204,电源组件1206,多媒体组件1208,音频组件1210,输入/输出(I/O)的接口1212,传感器组件1214,以及通信组件1216。
处理组件1202通常控制用户终端1200的整体操作,诸如与显示,电话呼叫,数据通信,相机操作和记录操作相关联的操作。处理组件1202可以包括一个或多个处理器1220来执行指令,以完成上述的方法的全部或部分步骤。此外,处理组件1202可以包括一个或多个模块,便于处理组件1202和其他组件之间的交互。例如,处理组件1202可以包括多媒体模块,以方便多媒体组件1208和处理组件1202之间的交互。
存储器1204被配置为存储各种类型的数据以支持在用户终端1200的操作。这些数据的示例包括用于在用户终端1200上操作的任何应用程序或方法的指令,联系人数据,电话簿数据,消息,图片,视频等。存储器1204可以由任何类型的易失性或非易失性存储设备或者它们的组合实现,如静态随机存取存储器(SRAM),电可擦除可编程只读存储器(EEPROM),可擦除可编程只读存储器(EPROM),可编程只读存储器(PROM),只读存储器(ROM),磁存储器,快闪存储器,磁盘或光盘。
电源组件1206为用户终端1200的各种组件提供电力。电源组件1206可以包括电源管理系统,一个或多个电源,及其他与为用户终端1200生成、管理和分配电力相关联的组件。
多媒体组件1208包括在所述用户终端1200和用户之间的提供一个输出接口的屏幕。在一些实施例中,屏幕可以包括液晶显示器(LCD)和触摸面板(TP)。如果屏幕包括触摸面板,屏幕可以被实现为触摸屏,以接收来自用户的输入信号。触摸面板包括一个或多个触摸传感器以感测触摸、滑动和触摸面板上的手势。所述触摸传感器可以不仅感测触摸或滑动动作的边界,而且还检测与所述触摸或滑动操作相关的持续时间和压力。在一些实施例中,多媒体组件1208包括一个前置摄像头和/或后置摄像头。当用户终端1200处于操作模式,如拍摄模式或视频模式时,前置摄像头和/或后置摄像头可以接收外部的多媒体数据。每个前置摄像头和后置摄像头可以是一个固定的光学透镜系统或具有焦距和光学变焦能力。
音频组件1210被配置为输出和/或输入音频信号。例如,音频组件1210包括一个麦克风(MIC),当用户终端1200处于操作模式,如呼叫模式、记录模式和语音识别模式时,麦克风被配置为接收外部音频信号。所接收的音频信号可以被进一步存储在存储器1204或经由通信组件1216发送。在一些实施例中,音频组件1210还包括一个扬声器,用于输出音频信号。
输入/输出接口1212为处理组件1202和外围接口模块之间提供接口,上述外围接口模块可以是键盘,点击轮,按钮等。这些按钮可包括但不限于:主页按钮、音量按钮、启动按钮和锁定按钮。
传感器组件1214包括一个或多个传感器,用于为用户终端1200提供各个方面的状态评估。例如,传感器组件1214可以检测到用户终端1200的打开/关闭状态,组件的相对定位,例如所述组件为用户终端1200的显示器和小键盘,传感器组件1214还可以检测用户终端1200或用户终端1200一个组件的位置改变,用户与用户终端1200接触的存在或不存在,用户终端1200方位或加速/减速和用户终端1200的温度变化。传感器组件1214可以包括接近传感器,被配置用来在没有任何的物理接触时检测附近物体的存在。传感器组件1214还可以包括光传感器,如CMOS或CCD图像传感器,用于在成像应用中使用。在一些实施例中,该传感器组件1214还可以包括加速度传感器,陀螺仪传感器,磁传感器,压力传感器或温度传感器。
通信组件1216被配置为便于用户终端1200和其他设备之间有线或无线 方式的通信。用户终端1200可以接入基于通信标准的无线网络,如WiFi,运营商网络(如2G、3G、4G或5G),或它们的组合。在一个示例性实施例中,通信组件1216经由广播信道接收来自外部广播管理系统的广播信号或广播相关信息。在一个示例性实施例中,所述通信组件1216还包括近场通信(NFC)模块,以促进短程通信。例如,在NFC模块可基于射频识别(RFID)技术,红外数据协会(IrDA)技术,超宽带(UWB)技术,蓝牙(BT)技术和其他技术来实现。
在示例性实施例中,用户终端1200可以被一个或多个应用专用集成电路(ASIC)、数字信号处理器(DSP)、数字信号处理设备(DSPD)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、控制器、微控制器、微处理器或其他电子元件实现,用于执行上述方法。
在示例性实施例中,还提供了一种包括指令的非临时性计算机可读存储介质,例如包括指令的存储器1204,上述指令可由用户终端1200的处理器1220执行以完成上述方法。例如,所述非临时性计算机可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本申请实施例还提供了一种服务器,包括:
处理器;用于存储处理器可执行指令的存储器;
其中,上述处理器被配置为:在接收到隐匿社交指令时,获取上述隐匿社交指令对应的当前用户的用户信息;按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户;隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,在上述隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终 端与上述目标用户终端的通信之后,上述处理器还可以执行:
在接收到上述当前用户终端的身份公开指令,且接收到上述目标用户终端的身份公开指令后,向上述当前用户终端发送上述目标社交用户的身份信息,向上述目标用户终端发送上述当前用户的身份信息。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好中的至少一种;
上述按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户,包括:
判断是否接收到上述当前用户的自定义匹配信息;
若接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足上述自定义匹配信息的目标社交用户;
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好;
上述若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户,包括:
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,选取年龄与上述当前用户的年龄的差值小于预设年龄阈值、性别与上述当前用户的性别不同,地理位置与上述当前用户的地理位置的距离小于预设距离阈值,且爱好与上述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为上述当前用户的目标社交用户,其中,上述目标社交用户为已向服务器发送隐匿社交指令的用户。
可选的,上述处理器还可以执行:
向上述当前用户终端及上述目标用户终端发送共同点展示信息,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
图13是根据一示例性实施例示出的一种服务器1300的框图。参照图13,服务器1300包括处理组件1322,其进一步包括一个或多个处理器,以及由存储器1332所代表的存储器资源,用于存储可由处理组件1322的执行的指令, 例如应用程序。存储器1332中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。
服务器1300还可以包括一个电源组件1328被配置为执行服务器1300的电源管理,一个有线或无线网络接口1350被配置为将服务器1300连接到网络,和一个输入输出(I/O)接口1358。服务器1300可以操作基于存储在存储器1332的操作系统,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本申请实施例还提供了一种非临时性计算机可读存储介质,当上述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行一种信息交互方法,该方法包括:
在接收到隐匿社交指令时,获取上述隐匿社交指令对应的当前用户的用户信息;
按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户;
隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,在上述隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信之后,上述方法还包括:
在接收到上述当前用户终端的身份公开指令,且接收到上述目标用户终端的身份公开指令后,向上述当前用户终端发送上述目标社交用户的身份信息,向上述目标用户终端发送上述当前用户的身份信息。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好中的至少一种;
上述按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户, 包括:
判断是否接收到上述当前用户的自定义匹配信息;
若接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足上述自定义匹配信息的目标社交用户;
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好;
上述若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户,包括:
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,选取年龄与上述当前用户的年龄的差值小于预设年龄阈值、性别与上述当前用户的性别不同,地理位置与上述当前用户的地理位置的距离小于预设距离阈值,且爱好与上述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为上述当前用户的目标社交用户,其中,上述目标社交用户为已向服务器发送隐匿社交指令的用户。
可选的,上述方法还包括:
向上述当前用户终端及上述目标用户终端发送共同点展示信息,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
本申请实施例还提供了一种非临时性计算机可读存储介质,当上述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行一种信息交互方法,该方法包括:
在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,上述隐匿社交指令用于使上述服务器为上述当前用户匹配目标社交用户;
在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加 用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,在上述在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信之后,上述方法还包括:
在接收到上述当前用户用于触发身份公开的指令后,向上述服务器发送上述当前用户的身份公开指令;
在接收到上述服务器发送的上述目标社交用户的身份信息后,展示上述目标社交用户的身份信息,其中,上述目标社交用户的身份信息为上述服务器接收到上述当前用户的身份公开指令,且接收到上述目标社交用户的身份公开指令后发送的。
可选的,上述方法还包括:
在接收到上述服务器发送的共同点展示信息后,展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品在处理器上被执行时,能够执行一种信息交互方法,该方法包括:
在接收到隐匿社交指令时,获取上述隐匿社交指令对应的当前用户的用户信息;
按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户;
隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,在上述隐匿上述目标社交用户的身份信息向上述当前用户的当前用户终端发送第一隐匿连接信息,隐匿上述当前用户的身份信息向目标社交用户的上述目标用户终端发送第二隐匿连接信息,以建立上述当前用户终端与上述目标用户终端的通信之后,上述方法还包括:
在接收到上述当前用户终端的身份公开指令,且接收到上述目标用户终端的身份公开指令后,向上述当前用户终端发送上述目标社交用户的身份信息,向上述目标用户终端发送上述当前用户的身份信息。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好中的至少一种;
上述按照上述当前用户的用户信息,为上述当前用户匹配目标社交用户,包括:
判断是否接收到上述当前用户的自定义匹配信息;
若接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足上述自定义匹配信息的目标社交用户;
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户。
可选的,上述当前用户的用户信息包括上述当前用户的性别、年龄、地理位置及爱好;
上述若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,为上述当前用户匹配满足预设匹配条件的目标社交用户,包括:
若未接收到上述当前用户的自定义匹配信息,按照上述当前用户的用户信息,选取年龄与上述当前用户的年龄的差值小于预设年龄阈值、性别与上述当前用户的性别不同,地理位置与上述当前用户的地理位置的距离小于预设距离阈值,且爱好与上述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为上述当前用户的目标社交用户,其中,上述目标社交用户为已向服务器发送隐匿社交指令的用户。
可选的,上述方法还包括:
向上述当前用户终端及上述目标用户终端发送共同点展示信息,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
本申请实施例还提供了一种计算机程序产品,所述计算机程序产品在处理器上被执行时,能够执行一种信息交互方法,该方法包括:
在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,上述隐匿社交指令用于使上述服务器为上述当前用户匹配 目标社交用户;
在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信。
在本申请实施例中,提供了用户与陌生用户的网络社交方法,能够增加用户的网络社交途径,并且隐匿用户的身份信息,增加了社交的安全性。
可选的,在上述在接收到上述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照上述第一隐匿连接信息建立与上述目标社交用户的目标用户终端的通信之后,上述方法还包括:
在接收到上述当前用户用于触发身份公开的指令后,向上述服务器发送上述当前用户的身份公开指令;
在接收到上述服务器发送的上述目标社交用户的身份信息后,展示上述目标社交用户的身份信息,其中,上述目标社交用户的身份信息为上述服务器接收到上述当前用户的身份公开指令,且接收到上述目标社交用户的身份公开指令后发送的。
可选的,上述方法还包括:
在接收到上述服务器发送的共同点展示信息后,展示上述当前用户及上述目标社交用户的共同点,其中,上述共同点展示信息中包括上述当前用户及上述目标社交用户的共同点。
本领域技术人员在考虑说明书及实践这里公开的申请后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求指出。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明保护的范围之内。
Claims (21)
- 一种信息交互方法,应用于服务器,所述方法包括:在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
- 根据权利要求1所述的方法,在所述隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信之后,所述方法还包括:在接收到所述当前用户终端的身份公开指令,且接收到所述目标用户终端的身份公开指令后,向所述当前用户终端发送所述目标社交用户的身份信息,向所述目标用户终端发送所述当前用户的身份信息。
- 根据权利要求1所述的方法,所述当前用户的用户信息包括所述当前用户的性别、年龄、地理位置及爱好中的至少一种;所述按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户,包括:判断是否接收到所述当前用户的自定义匹配信息;若接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,为所述当前用户匹配满足所述自定义匹配信息的目标社交用户;若未接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,为所述当前用户匹配满足预设匹配条件的目标社交用户。
- 根据权利要求3所述的方法,所述当前用户的用户信息包括所述当前用户的性别、年龄、地理位置及爱好;所述若未接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,为所述当前用户匹配满足预设匹配条件的目标社交用户,包括:若未接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,选取年龄与所述当前用户的年龄的差值小于预设年龄阈值、性别与所述当前用户的性别不同,地理位置与所述当前用户的地理位置的距离小于预设距离阈值,且爱好与所述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为所述当前用户的目标社交用户,其中,所述目标社交用户为已向所述服务器发送隐匿社交指令的用户。
- 根据权利要求1所述的方法,所述方法还包括:向所述当前用户终端及所述目标用户终端发送共同点展示信息,其中,所述共同点展示信息中包括所述当前用户及所述目标社交用户的共同点。
- 一种信息交互方法,应用于用户终端,所述方法包括:在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,所述隐匿社交指令用于使所述服务器为所述当前用户匹配目标社交用户;在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
- 根据权利要求6所述的方法,在所述在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信之后,所述方法还包括:在接收到所述当前用户用于触发身份公开的指令后,向所述服务器发送所述当前用户的身份公开指令;在接收到所述服务器发送的所述目标社交用户的身份信息后,展示所述目标社交用户的身份信息,其中,所述目标社交用户的身份信息为所述服务器接收到所述当前用户的身份公开指令,且接收到所述目标社交用户的身份公开指令后发送的。
- 根据权利要求6所述的方法,所述方法还包括:在接收到所述服务器发送的共同点展示信息后,展示所述当前用户及所述目标社交用户的共同点,其中,所述共同点展示信息中包括所述当前用户及所述目标社交用户的共同点。
- 一种信息交互装置,应用于服务器,所述装置包括:社交指令接收模块,被配置为在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;社交用户匹配模块,被配置为按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;隐匿信息发送模块,被配置为隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
- 根据权利要求9所述的装置,所述装置还包括:身份信息发送模块,被配置为在接收到所述当前用户终端的身份公开指令,且接收到所述目标用户终端的身份公开指令后,向所述当前用户终端发送所述目标社交用户的身份信息,向所述目标用户终端发送所述当前用户的身份信息。
- 根据权利要求9所述的装置,所述当前用户的用户信息包括所述当前用户的性别、年龄、地理位置及爱好中的至少一种;所述社交用户匹配模块,包括:条件判断子模块,被配置为判断是否接收到所述当前用户的自定义匹配信息;第一匹配子模块,被配置为若接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,为所述当前用户匹配满足所述自定义匹配信息的目标社交用户;第二匹配子模块,被配置为若未接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,为所述当前用户匹配满足预设匹配条件的目标社交用户。
- 根据权利要求11所述的装置,所述当前用户的用户信息包括所述当前用户的性别、年龄、地理位置及爱好;所述第二匹配子模块,被配置为:若未接收到所述当前用户的自定义匹配信息,按照所述当前用户的用户信息,选取年龄与所述当前用户的年龄的差值小于预设年龄阈值、性别与所述当前用户的性别不同,地理位置与所述当前用户的地理位置的距离小于预设距离阈值,且爱好与所述当前用户爱好的相似度大于预设爱好相似度阈值的用户,作为所述当前用户的目标社交用户,其中,所述目标社交用户为已向所述服务器发送隐匿社交指令的用户。
- 根据权利要求9所述的装置,所述装置还包括:共同点信息发送模块,被配置为向所述当前用户终端及所述目标用户终端发送共同点展示信息,其中,所述共同点展示信息中包括所述当前用户及所述目标社交用户的共同点。
- 一种信息交互装置,应用于用户终端,所述装置包括:社交指令发送模块,被配置为在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,其中,所述隐匿社交指令用于使所述服务器为所述当前用户匹配目标社交用户;隐匿信息接收模块,被配置为在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
- 根据权利要求14所述的装置,所述装置还包括:公开指令发送模块,被配置为在接收到所述当前用户用于触发身份公开的指令后,向所述服务器发送所述当前用户的身份公开指令;身份信息接收模块,被配置为在接收到所述服务器发送的所述目标社交用户的身份信息后,展示所述目标社交用户的身份信息,其中,所述目标社 交用户的身份信息为所述服务器接收到所述当前用户的身份公开指令,且接收到所述目标社交用户的身份公开指令后发送的。
- 根据权利要求14所述的装置,所述装置还包括:共同点信息接收模块,被配置为在接收到所述服务器发送的共同点展示信息后,展示所述当前用户及所述目标社交用户的共同点,其中,所述共同点展示信息中包括所述当前用户及所述目标社交用户的共同点。
- 一种服务器,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行权利要求1-5中任一信息交互方法。
- 一种用户终端,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为执行权利要求6-8中任一信息交互方法。
- 一种信息交互系统,所述系统包括:服务器及用户终端;所述用户终端,被配置为在接收到当前用户用于触发隐匿社交匹配的指令时,向所述服务器发送隐匿社交指令;在接收到服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与目标用户终端的通信;所述服务器,被配置为在接收到所述隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向所述目标社交用户的目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
- 一种非临时性计算机可读存储介质,当所述存储介质中的指令由移 动终端的处理器执行时,使得移动终端能够执行一种信息交互方法,所述方法包括:在接收到隐匿社交指令时,获取所述隐匿社交指令对应的当前用户的用户信息;按照所述当前用户的用户信息,为所述当前用户匹配目标社交用户;隐匿所述目标社交用户的身份信息向所述当前用户的当前用户终端发送第一隐匿连接信息,隐匿所述当前用户的身份信息向目标社交用户的所述目标用户终端发送第二隐匿连接信息,以建立所述当前用户终端与所述目标用户终端的通信。
- 一种非临时性计算机可读存储介质,当所述存储介质中的指令由移动终端的处理器执行时,使得移动终端能够执行一种信息交互方法,所述方法包括:在接收到当前用户用于触发隐匿社交匹配的指令时,向服务器发送隐匿社交指令,以使所述服务器为所述当前用户匹配目标社交用户;在接收到所述服务器发送的隐匿目标社交用户的身份信息的第一隐匿连接信息后,按照所述第一隐匿连接信息建立与所述目标社交用户的目标用户终端的通信。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811315229.9A CN109450894A (zh) | 2018-11-06 | 2018-11-06 | 信息交互方法、装置、系统、服务器用户终端及存储介质 |
CN201811315229.9 | 2018-11-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020093854A1 true WO2020093854A1 (zh) | 2020-05-14 |
Family
ID=65551302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/111945 WO2020093854A1 (zh) | 2018-11-06 | 2019-10-18 | 信息交互方法、装置、系统、服务器用户终端及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109450894A (zh) |
WO (1) | WO2020093854A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112996138A (zh) * | 2021-02-04 | 2021-06-18 | 维沃移动通信(杭州)有限公司 | 通信建立方法、装置及存储介质 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450894A (zh) * | 2018-11-06 | 2019-03-08 | 北京达佳互联信息技术有限公司 | 信息交互方法、装置、系统、服务器用户终端及存储介质 |
CN111970576B (zh) | 2020-08-28 | 2022-01-14 | 北京字节跳动网络技术有限公司 | 信息交互方法、装置及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102629945A (zh) * | 2012-04-16 | 2012-08-08 | 腾讯科技(深圳)有限公司 | 用户信息获取方法、服务器和终端 |
WO2014003341A1 (ko) * | 2012-06-29 | 2014-01-03 | Lee Sun Woong | 소셜 네트워크에서 음악적 관심사를 이용한 친구추천방법 및 동적 커뮤니티 생성방법 |
CN104796310A (zh) * | 2014-01-16 | 2015-07-22 | 腾讯科技(深圳)有限公司 | 社交通信方法和系统 |
CN109450894A (zh) * | 2018-11-06 | 2019-03-08 | 北京达佳互联信息技术有限公司 | 信息交互方法、装置、系统、服务器用户终端及存储介质 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090055485A1 (en) * | 2007-08-22 | 2009-02-26 | Tu-Hsin Tsai | Location based anonymous instant message exchange method and system |
WO2012116197A2 (en) * | 2011-02-23 | 2012-08-30 | Supyo, Inc. | Platform for pseudo-anonymous video chat with intelligent matching of chat partners |
KR20150018698A (ko) * | 2013-08-08 | 2015-02-24 | 주식회사 레드퀸 | 연락처 기반 익명 대화 서비스 제공 시스템 및 이를 이용한 익명 대화 구현 방법 |
CN104394169B (zh) * | 2014-12-11 | 2018-09-14 | 北京奇虎科技有限公司 | 双方采用匿名方式发送私信方法及服务器 |
CN104811368A (zh) * | 2015-04-21 | 2015-07-29 | 北京陪我科技有限公司 | 一种匿名聊天方法及系统 |
-
2018
- 2018-11-06 CN CN201811315229.9A patent/CN109450894A/zh active Pending
-
2019
- 2019-10-18 WO PCT/CN2019/111945 patent/WO2020093854A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102629945A (zh) * | 2012-04-16 | 2012-08-08 | 腾讯科技(深圳)有限公司 | 用户信息获取方法、服务器和终端 |
WO2014003341A1 (ko) * | 2012-06-29 | 2014-01-03 | Lee Sun Woong | 소셜 네트워크에서 음악적 관심사를 이용한 친구추천방법 및 동적 커뮤니티 생성방법 |
CN104796310A (zh) * | 2014-01-16 | 2015-07-22 | 腾讯科技(深圳)有限公司 | 社交通信方法和系统 |
CN109450894A (zh) * | 2018-11-06 | 2019-03-08 | 北京达佳互联信息技术有限公司 | 信息交互方法、装置、系统、服务器用户终端及存储介质 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112996138A (zh) * | 2021-02-04 | 2021-06-18 | 维沃移动通信(杭州)有限公司 | 通信建立方法、装置及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN109450894A (zh) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9602516B2 (en) | Method, server and terminal device for establishing communication session | |
CN106028166B (zh) | 直播过程中直播间切换方法及装置 | |
US11861153B2 (en) | Simplified sharing of content among computing devices | |
CN104506410B (zh) | 即时通讯的方法和装置 | |
EP3113466A1 (en) | Method and device for warning | |
CN109521918B (zh) | 一种信息分享方法、装置、电子设备及存储介质 | |
CN106790043B (zh) | 直播应用中发送消息的方法及装置 | |
WO2020093854A1 (zh) | 信息交互方法、装置、系统、服务器用户终端及存储介质 | |
CN109039869B (zh) | 社交通信方法、装置、电子设备及存储介质 | |
CN107959757B (zh) | 用户信息处理方法、装置、app服务器和终端设备 | |
US20180035154A1 (en) | Method, Apparatus, and Storage Medium for Sharing Video | |
WO2017219497A1 (zh) | 消息生成方法及装置 | |
WO2023056766A1 (zh) | 信息显示方法及装置 | |
CN106648650A (zh) | 对终端显示状态进行调整的方法及装置 | |
WO2020078092A1 (zh) | 信息处理方法、装置、服务器、终端及存储介质 | |
CN106506808A (zh) | 对通讯消息提示的方法及装置 | |
CN105656639B (zh) | 群组消息显示方法及装置 | |
CN111859208A (zh) | 显示方法、装置及存储介质 | |
CN106708930B (zh) | 应用页面刷新的方法及装置 | |
CN112104546B (zh) | “临时会话”实现方法、装置、服务器、客户端、终端及存储介质 | |
US9871884B2 (en) | Method and device for transferring messages | |
CN107330016A (zh) | 设置用户信息的方法、装置及存储介质 | |
CN110113256B (zh) | 信息互动方法、装置、服务器、用户终端及可读存储介质 | |
CN109391944B (zh) | 无线网络备注方法及装置 | |
CN107707453B (zh) | 提醒方法及装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19882090 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19882090 Country of ref document: EP Kind code of ref document: A1 |