[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111651684A - Method and equipment for recommending social users - Google Patents

Method and equipment for recommending social users Download PDF

Info

Publication number
CN111651684A
CN111651684A CN202010514137.4A CN202010514137A CN111651684A CN 111651684 A CN111651684 A CN 111651684A CN 202010514137 A CN202010514137 A CN 202010514137A CN 111651684 A CN111651684 A CN 111651684A
Authority
CN
China
Prior art keywords
user
tag information
information
users
matched
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010514137.4A
Other languages
Chinese (zh)
Inventor
钟名铖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yijiao Wenshu Technology Co ltd
Original Assignee
Beijing Yijiao Wenshu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yijiao Wenshu Technology Co ltd filed Critical Beijing Yijiao Wenshu Technology Co ltd
Priority to CN202010514137.4A priority Critical patent/CN111651684A/en
Publication of CN111651684A publication Critical patent/CN111651684A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application aims to provide a method and equipment for recommending social users, wherein the method comprises the following steps: responding to trigger event information for anonymously recommending social friends for a first user in a social application, and acquiring one or more pieces of first tag information corresponding to the first user; determining at least one second user from a plurality of users corresponding to the social application, wherein at least one target second tag information in one or more second tag information corresponding to each second user is matched with the one or more first tag information; recommending the at least one second user to the first user, wherein at least one target second label information corresponding to each second user is invisible to the first user. The method and the device can enhance the communication desire of the user, improve the interestingness of social application, and solve the problem that strangers feel awkward and chatty at the beginning.

Description

Method and equipment for recommending social users
Technical Field
The present application relates to the field of communications, and in particular, to a technique for recommending social users.
Background
With the development of the times, the social application meets new social requirements of people, and quickly becomes a main social mode of people, and a stranger friend making mode through the social application is brought out. A common way of recommending strangers in the prior art friend-making mode is to recommend strangers nearby or select people by sliding photos on a screen.
Disclosure of Invention
One object of the present application is to provide a method and apparatus for recommending social users.
According to one aspect of the present application, there is provided a method of recommending social users, the method comprising:
responding to trigger event information for anonymously recommending social friends for a first user in a social application, and acquiring one or more pieces of first tag information corresponding to the first user;
determining at least one second user from a plurality of users corresponding to the social application, wherein at least one target second tag information in one or more second tag information corresponding to each second user is matched with the one or more first tag information;
recommending the at least one second user to the first user, wherein at least one target second label information corresponding to each second user is invisible to the first user.
According to an aspect of the present application, there is provided an apparatus for recommending social users, the apparatus including:
the system comprises a one-to-one module, a first module and a second module, wherein the one-to-one module is used for responding to trigger event information for anonymously recommending social friends for a first user in a social application, and acquiring one or more pieces of first tag information corresponding to the first user;
a second module, configured to determine at least one second user from a plurality of users corresponding to the social application, where at least one target second tag information of one or more second tag information corresponding to each second user matches with the one or more first tag information;
and a third module, configured to recommend the at least one second user to the first user, where at least one target second tag information corresponding to each second user is invisible to the first user.
According to an aspect of the present application, there is provided an apparatus for recommending social users, wherein the apparatus includes:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to trigger event information for anonymously recommending social friends for a first user in a social application, and acquiring one or more pieces of first tag information corresponding to the first user;
determining at least one second user from a plurality of users corresponding to the social application, wherein at least one target second tag information in one or more second tag information corresponding to each second user is matched with the one or more first tag information;
recommending the at least one second user to the first user, wherein at least one target second label information corresponding to each second user is invisible to the first user.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
responding to trigger event information for anonymously recommending social friends for a first user in a social application, and acquiring one or more pieces of first tag information corresponding to the first user;
determining at least one second user from a plurality of users corresponding to the social application, wherein at least one target second tag information in one or more second tag information corresponding to each second user is matched with the one or more first tag information;
recommending the at least one second user to the first user, wherein at least one target second label information corresponding to each second user is invisible to the first user.
Compared with the prior art, the method and the device have the advantages that at least one second user which is possibly more interested in the first user can be anonymously recommended to the first user through matching of the tags, and at least one target second tag information corresponding to each second user is set to be invisible to the first user during recommendation, so that the first user does not know which tags are matched with the first user by each second user when seeing each second user of anonymous recommendation, the first user needs to find common interest points between the first user and the second user through communication with the second user, communication willingness of the user can be enhanced, interestingness of social applications is improved, the problem of stranger inconvenient chatting at first is solved, the recommendation to the first user is definitely a user with a certain common point, but the common point is invisible to the first user, and the first user needs to find the common point through subsequent chatting with the second user, so that the chat interest of the user can be enhanced; and at least one target second label information corresponding to each second user is set to be invisible to the first user, and the invisible target second label information is adjusted to be visible after subsequent deep chat, so that the user privacy can be protected to the maximum extent.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method of recommending social users according to one embodiment of the present application;
FIG. 2 illustrates a block diagram of a network device recommending social users, according to one embodiment of the present application;
FIG. 3 illustrates a second user's personal interface diagram of an example of the present application;
FIG. 4 shows a schematic of a personal interface of a second user of another example of the present application;
FIG. 5 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 is a flowchart illustrating a method for recommending social users on a network device side according to an embodiment of the present application, where the method includes step S11, step S12, and step S13. In step S11, the network device obtains, in response to trigger event information for anonymously recommending social friends for a first user in a social application, one or more pieces of first tag information corresponding to the first user; in step S12, the network device determines at least one second user from the plurality of users corresponding to the social application, wherein at least one target second tag information of the one or more second tag information corresponding to each second user matches with the one or more first tag information; in step S13, the network device recommends the at least one second user to the first user, where at least one target second tag information corresponding to each second user is invisible to the first user.
In step S11, the network device obtains, in response to trigger event information for anonymously recommending social friends for a first user in a social application, one or more pieces of first tag information corresponding to the first user. In some embodiments, the triggering event information includes any information related to an event for triggering anonymous recommendation of social friends for the first user, optionally, the triggering event information includes, but is not limited to, identification information of the first user, anonymous recommendation requirements, recommendation quantity, and the like. In some embodiments, the first tag information is used to indicate a tag corresponding to the first user, optionally, the first tag information includes a static tag and/or a dynamic tag corresponding to the first user; the static tag is used for representing a fixed and unchangeable tag, and optionally, the static tag corresponding to the first user can be set by the first user or generated for the first user by the network device; the dynamic tag is used for representing a dynamically determined tag, optionally, the dynamic tag corresponding to the first user is dynamically generated by the network device based on the historical behavior of the first user in the social application, if the network device determines that the first user has performed an operation of approval on more published contents related to the motion in a recent period of time based on the historical behavior of the first user, a dynamic tag "motion" is generated for the first user, optionally, if the network device determines that the first user has not performed a behavior related to a certain dynamic tag for more than a predetermined time, the dynamic tag may be cancelled. In some embodiments, for social friends that are anonymously recommended for the first user, the first user is only provided with partial permissions, such as allowing the first user to view only partial content of the recommended social friends. In some embodiments, a first user performs a predetermined operation in user equipment for requesting anonymous recommendation of a social friend, the user equipment sends trigger event information corresponding to the predetermined operation to network equipment, and the network equipment responds to the trigger event information to acquire one or more pieces of first tag information corresponding to the first user; in some embodiments, the network device automatically activates trigger event information to become a first user anonymous recommended social friend, and obtains one or more pieces of first tag information corresponding to the first user in response to the trigger event information, for example, the network device automatically activates trigger event information to become the first user anonymous recommended social friend each time the first user enters a social application, for example, the network device automatically triggers trigger event information to be generated to become the first user anonymous recommended social friend when detecting that the liveness of the first user is lower than a predetermined threshold, and for example, the network device periodically automatically activates trigger event information to become the first user anonymous recommended social friend.
In step S12, the network device determines at least one second user from the plurality of users corresponding to the social application, wherein at least one target second tag information of the one or more second tag information corresponding to each second user matches with the one or more first tag information. In some embodiments, the concept of the second tag information is the same as or similar to the concept of the first tag information, and is not repeated herein. In some embodiments, matching a first tag information with a second tag information means that the first tag information is the same as or similar to or associated with the second tag information. In some embodiments, the plurality of users are users who do not have a friend relationship with the first user, and the network device may determine the plurality of users corresponding to the social application in a variety of ways, such as the network device selecting a plurality of users with a liveness higher than a predetermined threshold from all users who are currently online, or the network device selecting a plurality of users in a city with the first user from all users who are currently online. The network device may determine the at least one second user from the plurality of users corresponding to the social application in any feasible manner, and in some embodiments, the network device determines at least one available first tag information from the one or more first tag information and then determines the at least one second user from the plurality of users corresponding to the social application based on the at least one available first tag information; in some embodiments, the network device initially determines one or more fourth users from the plurality of users corresponding to the social application, and then determines at least one second user from the one or more fourth users; in some embodiments, the network device matches one or more second tag information corresponding to each of the plurality of users with each of the one or more first tag information, obtains a matching result, and determines at least one second user from the plurality of users based on the matching result. In some embodiments, the determined presence of at least one target second tag information per second user, the at least one target second tag information matching at least one of the one or more first tag information, e.g., first user corresponding first tag information a1, B1, C1, D1, the network device determining second users U1, U2 from the plurality of users of the social application, U1 having second tag information a2 and B2 matching a1 and B1, respectively, and U2 having second tag information C2 matching C1.
In step S13, the network device recommends the at least one second user to the first user, where at least one target second tag information corresponding to each second user is invisible to the first user. In some embodiments, when at least one second user is recommended to the first user, all second tag information corresponding to each second user is invisible to the first user. In some embodiments, when at least one second user is recommended to the first user, the at least one target second tag information corresponding to each second user is invisible to the first user, but other second tag information than the at least one target second tag information is visible to the first user. In some embodiments, at least one target second tag information corresponding to the second user is originally visible to other users, and at this time, the at least one target second tag information needs to be set to be invisible to the first user. In some embodiments, the step of setting the at least one target second tag information corresponding to the second user to be invisible to the first user may not be performed, and the at least one target second tag information is directly invisible to the first user. For example, fig. 3 is a schematic diagram of a personal interface of a second user when the second user is recommended to the first user according to an example of the present application, where the personal interface includes an avatar (i.e., a circled portion) of the second user, a nickname ("XXXX") of the second user, second tag information "food" and "music" of the second user except for at least one target second tag information, that is, the two tags of "food" and "music" are not tags that match the first user, and the at least one target second tag information corresponding to the second user is not visible to the first user. It should be noted that, optionally, for each second user, the first tag information matched with the at least one target second tag information corresponding to the second user is also invisible to the second user. Therefore, when the first user sees each second user which is anonymously recommended, the first user does not know which labels of each second user are matched with the first user, so that the first user needs to discover common interest points between the first user and the second user through communication between the first user and the second user, communication willingness of the users can be enhanced, interestingness of social application is improved, the problem of inconvenient chatting of strangers is solved, the user who is recommended to the first user is determined to have a certain common point, but the common point is invisible to the first user, and the first user needs to discover the common point through subsequent chatting with the second user, so that chatting interest of the users can be enhanced.
In some embodiments, the method further comprises step S14 (not shown). In step S14, the network device determines, according to at least one session message sent by the first user or the target second user in history, specific second tag information in one or more second tag information corresponding to the target second user, and adjusts the specific second tag information to be visible to the first user. In some embodiments, if at least one session message historically sent by the first user or the target second user matches the semantics of a particular second tag information of the one or more second tag information that is currently invisible to the first user, the particular second tag information is adjusted to be visible to the first user. In some embodiments, the one or more second tag information is adjusted to be visible to the first user if a number of session messages historically sent by the first user or the target second user that semantically match a particular second tag information of the one or more second tag information that is not currently visible to the first user meets a predetermined number threshold. For example, fig. 3 is a schematic diagram of a personal interface of a second user when the second user is recommended to a first user according to an example of the present application, where the network device determines a specific second tag information "motion" according to at least one session message sent by the first user and the second user in history, and then adjusts the specific second tag information "motion" to be visible to the first user, and the schematic diagram of the personal interface of the second user after adjustment is shown in fig. 4. In some embodiments, after adjusting the specific second tag information to be visible to the first user, the network device may send a prompt message for prompting that the specific second tag information is adjusted to be visible to the first user and the target second user, and in other contexts, in a scenario involving adjusting a target second tag from being invisible to being visible, the network device may also send a corresponding prompt message.
In some embodiments, the step S14 includes: if at least one session message sent by the first user or the target second user in history is matched with specific second tag information in at least one target second tag information corresponding to the target second user, the network equipment sets the specific second tag information to be visible to the first user. For example, if the session message "i just come back from gym" historically sent by the first user or the target second user matches the particular second tag information "sports" semantic that is currently invisible to the first user, then the particular second tag information "sports" is set to be visible to the first user.
In some embodiments, the step S14 includes: if the number of the session messages which are sent by the first user and the target second user in the history and are matched with the specific second tag information in the at least one target second tag information corresponding to the target second user is larger than or equal to a preset number threshold, the network equipment sets the specific second tag information to be visible for the first user. For example, a conversation message "i just come back from a gym", "do you have recently played basketball", "i are ready to play football" in the morning "and" how do you swim "that is historically sent by a first user or a target second user that is semantically matched with specific second tag information" sports "that is currently invisible to the first user matches, the number of conversation messages 4 is greater than a predetermined number threshold (e.g., 3), and the specific second tag information" sports "is set to be visible to the first user.
In some embodiments, the method further comprises step S15 (not shown). In step S15, the network device provides, to the first user, second tag information that is currently visible to the first user among one or more pieces of second tag information corresponding to the target second user, in response to an access request for the first user to view the tag information of the target second user. In some embodiments, a first user triggers (e.g., clicks) to view tag information of a target second user in a social application, an access request for viewing the tag information of the target second user is sent to a network device, after receiving the access request, the network device searches for one or more second tag information corresponding to the target second user from a cache or a database, and may return, to the first user, second tag information that is currently visible to the first user in the one or more second tag information, or may return, to the first user, target second tag information that is currently visible to the first user in at least one target second tag information that is matched with first tag information corresponding to the first user, so as to present the target second tag information in the social application of the first user.
In some embodiments, the step S15 includes: the network equipment responds to an access request of the first user for checking the label information of a target second user, and determines whether a preset label access triggering condition is met or not according to the historical chat record information of the first user and the target second user; if so, adjusting second label information which is invisible to the first user in one or more second label information corresponding to the target second user to be visible to the first user, and providing the one or more second label information corresponding to the target second user to the first user; otherwise, providing the second label information which is currently visible to the first user in one or more second label information corresponding to the target second user to the first user. In some embodiments, in response to an access request for a first user to view tag information of a target second user, the network device determines whether a predetermined tag access trigger condition is met according to a history chat record of the first user and the target second user, and if so, may adjust second tag information, which is currently invisible to the first user, of one or more pieces of second tag information corresponding to the target second user to be visible to the first user, and return all the second tag information to the first user for presentation, or may return only all target second tag information matching the first tag information corresponding to the first user for presentation, and if not, may return only the second tag information currently visible to the first user for presentation, or may return only the second tag information currently visible to the first user, And returning the target second label information matched with the first label information corresponding to the first user for presentation. In some embodiments, the tag access triggering condition may be that the number of historical conversation messages between the first user and the target second user or the number of conversation messages in the latest predetermined time is greater than or equal to a predetermined number threshold, or may also be that the frequency of sending the historical conversation messages between the first user and the target second user or the frequency of sending the conversation messages in the latest predetermined time is greater than or equal to a predetermined frequency threshold, which is to be noted that the above tag access triggering condition is only an example and is not a limitation of the present application.
In some embodiments, the method further comprises step S16 (not shown). In step S16, when the network device meets a predetermined time condition, if there is remaining second tag information invisible to the first user in one or more second tag information corresponding to the target second user, providing, by the network device, prompt information of the remaining second tag information to the first user. In some embodiments, the predetermined time conditions include, but are not limited to: the predetermined time point is reached and the time period from the last second tag information changing from invisible to visible reaches a predetermined time length. In some embodiments, when a predetermined time condition is met, remaining second tag information invisible to the first user still exists in one or more second tag information corresponding to the target second user, and then prompt information for prompting the remaining second tag information is sent to the first user for presentation on the social application of the first user. In some embodiments, the prompt message may be the upper label message of the remaining second label message, for example, if the remaining label message is "basketball," the upper label message "sports" of the remaining label message is provided to the first user for reference by the first user.
In some embodiments, the step S16 includes: when the network equipment meets a preset time condition, if one or more pieces of second label information corresponding to the target second user have remaining second label information invisible to the first user, determining whether a preset label prompt triggering condition is met according to historical chat record information of the first user and the target second user; and if so, providing prompt information of the residual second label information to the first user. In some embodiments, when a predetermined time condition is met, remaining second tag information invisible to the first user still exists in one or more second tag information corresponding to the target second user, it is determined whether the predetermined tag prompt trigger condition is met according to the historical chat records of the first user and the target second user, and if so, prompt information for prompting the remaining second tag information is sent to the first user so as to be presented on the social application of the first user. In some embodiments, the tag prompt triggering condition may be that the number of historical conversation messages between the first user and the target second user or the number of conversation messages in the latest predetermined time is less than or equal to a predetermined number threshold, or may also be that the sending frequency of historical conversation messages between the first user and the target second user or the sending frequency of conversation messages in the latest predetermined time is less than or equal to a predetermined frequency threshold, which is to be noted that the above tag prompt triggering condition is only an example and is not a limitation of the present application.
In some embodiments, the method further comprises: if each piece of second tag information in one or more pieces of second tag information corresponding to the target second user is visible to the first user, the network device sends a friend adding request to the target second user, wherein the friend adding request is used for requesting that the target second user is added as a friend of the first user. In some embodiments, when the target second user is recommended to the first user, the target second user is not in a friend relationship with the first user, and as the two parties go deeper in a subsequent chat, if at least one session message sent by the first user or the target second user in history matches with the semantics of the specific second tag information which is invisible to the first user currently in the one or more second tag information, the specific second tag information is adjusted to be visible to the first user, and if each piece of the second tag information is visible to the first user currently, a friend adding request for requesting the target second user to add friends is sent to the target second user.
In some embodiments, said sending an add buddy request to said target second user comprises: sending friend adding prompt information to the first user, wherein the friend adding prompt information is used for prompting that the target second user is added as a friend of the first user; and responding to a preset confirmation operation of the first user for the friend adding prompt information, and sending a friend adding request to the target second user. In some embodiments, sending the first user request to add the friend adding request that the target second user is a friend to the target second user may be sending friend adding prompt information to the first user for prompting that the first user may add the target second user as a friend, and sending the friend adding request that the first user request to add the target second user as a friend to the target second user via the network device in response to a predetermined determination operation (e.g., click) by the first user for the friend adding prompt information.
In some embodiments, the step S12 includes a step S121 (not shown) and a step S122 (not shown). In step S121, the network device determines at least one available first tag information from the one or more first tag information; in step S122, the network device determines at least one second user from the plurality of users corresponding to the social application according to the at least one available first tag information, where at least one target second tag information of the one or more second tag information corresponding to each second user matches with the at least one available first tag information. In some embodiments, the network device determines at least one available first tag information from the one or more first tag information if the number of first tag information exceeds a predetermined number. In some embodiments, a part of the first tag information having a high weight may be determined as available first tag information from the one or more first tag information according to the weight of the tag. In some embodiments, determining at least one available first tag information from the one or more first tag information may simplify the tag matching process, significantly reduce the computational complexity in the tag matching process, and greatly reduce the tag matching time.
In some embodiments, wherein the step S121 comprises: the network equipment determines at least one available first label information from the one or more first label information according to the weight of each first label information, wherein each available first label information meets at least one of the following conditions: the weight of the available first tag information is greater than or equal to a predetermined weight threshold; the weight of the available first label information is greater than or equal to the weight of the other first label information. In some embodiments, the weight of the first tag information may be determined according to the confidence and importance of the first tag information, the higher the confidence and importance is, the larger the weight is, optionally, the confidence and importance of each first tag information may be set by the first user, and may also be determined by performing data statistical analysis on the historical behavior of the first user by the network device, and the confidence and importance of the first tag information may be static or dynamically adjustable, for example, the first user may adjust the confidence and importance of the first tag information based on its current interest, and for example, the network device may adjust the confidence and importance of the first tag information based on the social behavior of the first user in a social application in a recent period of time. In some embodiments, according to the weight of each first label information, the first label information with the corresponding weight greater than or equal to a predetermined weight threshold is used as the available label information. In some embodiments, the plurality of first tag information is sorted based on a weight of each first tag information, and a predetermined number of first tag information sorted in the top is determined as available tag information. In some embodiments, the first label information with the largest weight is selected from the plurality of first label information, and the first label information is determined as the available label information.
In some embodiments, the trigger event information includes additional condition information; wherein the determining at least one second user from the plurality of users corresponding to the social application comprises: determining one or more third users meeting the attachment condition information from a plurality of users corresponding to the social application according to the attachment condition information; at least one second user is determined from the one or more third users. In some embodiments, the trigger event information includes attachment condition information, which may be specified by the first user or automatically determined by the network device, e.g., the network device determines the attachment condition information based on the portrait information of the first user. In some embodiments, according to the attachment condition information, a third user meeting the attachment condition information is determined from all users of the social application, and then a second user matching the first user is determined from the third user to recommend to the first user, for example, the attachment condition information is "5 kilometers around the first user", the third user (e.g., user UA, user UB, user UC) meeting "5 kilometers around the first user" is determined from all users of the social application (e.g., user UA, user UB, user UC), and then the second user matching the first user is determined from the third user to recommend to the first user (e.g., user UA).
In some embodiments, the step S12 includes: for each user in a plurality of users corresponding to the social application, the network device matches one or more pieces of second tag information corresponding to the user with each piece of first tag information in the one or more pieces of first tag information to obtain a matching result; determining at least one second user from the plurality of users according to the matching result, wherein each second user satisfies at least one of the following conditions: the number of the first label information matched with the second user is larger than or equal to a preset number threshold value; the number of the first label information matched with the second user is larger than or equal to the number of the first label information matched with other users; the sum of the weights of the first label information matched with the second user is greater than or equal to a preset first weight threshold value; the weight sum of the first label information matched with the second user is greater than or equal to the weight sum of the first label information matched with other users; and one or more second label information corresponding to each second user and matched with the one or more first label information is used as at least one target second label information corresponding to the second user. In some embodiments, one or more second tag information corresponding to each user in the social application is respectively matched with each first tag information in the one or more first tag information to obtain a matching result, and at least one second user is determined from the multiple users in the social application according to the matching result, where each second user needs to satisfy at least one of the following conditions: the number of first label information matched with one or more second label information corresponding to the second user is greater than or equal to a predetermined number threshold, the number of first label information matched with one or more second label information corresponding to the second user is greater than or equal to the number of first label information matched with one or more second label information corresponding to other users, the sum of weights of each first label information matched with one or more second label information corresponding to the second user is greater than or equal to a predetermined weight threshold, the sum of weights of each first label information matched with one or more second label information corresponding to the second user is greater than or equal to the sum of weights of each first label information matched with one or more second label information corresponding to other users, it should be noted that the above-mentioned conditions that the second user needs to satisfy are only examples, and not as restrictive to the present application. In some embodiments, the second tag information matched with the at least one first tag information in the one or more second tag information corresponding to each second user is used as the target second tag information corresponding to the second user. For example, the first tag information includes "sports", "travel", "computer game", and the second tag information corresponding to the user UA includes "kicking ball", "singing", "programming", "fitness", "travel", and the number 2 of the first tag information ("sports", "travel") matched with the user UA is greater than a predetermined number threshold (e.g., 1), the second tag information "kicking ball", "fitness", "travel" corresponding to the user UA is taken as the target second tag information corresponding to the user UA. For another example, the first tag information includes "motion" (weight 0.5), "travel" (weight 0,6), "computer game" (weight 0.4), and the second tag information corresponding to the user UA includes "kick ball," "sing," "programming," "fitness," and "travel," and the sum of weights 1.1(0.5+0.6) of the first tag information ("motion," "travel") matching the user UA is greater than a predetermined weight threshold (e.g., 1), and the second tag information "kick ball," "fitness," and "travel" corresponding to the user UA is set as the target second tag information corresponding to the user UA.
In some embodiments, the step S12 includes: for each first tag information in the one or more first tag information, the network device determines one or more fourth users matched with the first tag information from a plurality of users corresponding to the social application, wherein each fourth user corresponds to one or more second tag information matched with the first tag information; determining at least one second user according to one or more fourth users matched with each first label information, wherein each second user meets at least one of the following conditions: the number of times the second user is matched is greater than or equal to a predetermined number threshold; the number of times that the second user is matched is greater than or equal to the number of times that other fourth users are matched; the sum of the matched weights of the second user is greater than or equal to a predetermined second weight threshold; the weight sum matched by the second user is greater than or equal to the weight sum matched by other fourth users; and one or more second label information corresponding to each second user and matched with the one or more first label information is used as at least one target second label information corresponding to the second user. In some embodiments, for each first tag information, a fourth user matching the first tag information is determined from a plurality of users corresponding to the social application, each fourth user corresponding to one or more second tag information matching the first tag information, and then at least one second user is determined according to the fourth user matching each first tag information, each second user satisfying at least one of the following: the number of times that the second user is matched is greater than or equal to a predetermined number threshold, the number of times that the second user is matched is greater than or equal to the number of times that other fourth users are matched, the weight sum of each piece of first tag information that the second user is matched is greater than or equal to a predetermined weight threshold, and the weight sum of each piece of first tag information that the second user is matched is greater than or equal to the weight sum of each piece of first tag information that other fourth users are matched. In some embodiments, the second tag information matched with the at least one first tag information in the one or more second tag information corresponding to each second user is used as the target second tag information corresponding to the second user. For example, the first tag information includes "sports", "travel", "computer game", and the second tag information corresponding to the user UA includes "kicking ball", "singing", "programming", "fitness", "travel", and the number of times 3 that the user UA is matched (the "kicking ball" is matched with the "sports", the "fitness" is matched with the "sports", the "travel" is matched with the "travel") is greater than a predetermined threshold number of times (for example, 2), and then the second tag information "kicking ball", "fitness", "travel" corresponding to the user UA is used as the target second tag information corresponding to the user UA. For another example, the first tag information includes "motion" (weight 0.5), "travel" (weight 0,6), "computer game" (weight 0.4), the second tag information corresponding to the user UA includes "kick ball," "sing," "program," "body-building," "travel," and the sum of weights 1.6(0,.5+0.5+0.6) of the user UA matched to each first tag information is greater than a predetermined weight threshold (e.g., 1.5), then the second tag information corresponding to the user UA "kick ball," "body-building," "travel" is used as the target second tag information corresponding to the user UA.
In some embodiments, said recommending said at least one second user to said first user comprises: recommending one or more second users, whose matching degree with the first user meets a preset matching degree threshold value, of the at least one second user to the first user. In some embodiments, all of the second users may be recommended to the first user, for example, in the form of a list. In some embodiments, second users having a matching degree with the first user greater than or equal to a predetermined matching degree threshold are recommended to the first user according to the matching degree between each second user and the first user.
In some embodiments, said recommending said at least one second user to said first user comprises: and ranking the at least one second user according to the matching degree between each second user and the first user, and recommending a preset number of second users ranked in the front to the first user. In some embodiments, the second users are ranked in order from high to low according to the matching degree between each second user and the first user, and a predetermined number (which may be 1 or more) of the second users ranked at the top are recommended to the first user.
In some embodiments, said recommending said at least one second user to said first user comprises: recommending one or more second users of the at least one second user, the number of same or similar labels of which with the first user meets a preset label number threshold value, to the first user. For example, "fitness dabber" is the same label as "fitness dabber," fitness dabber "is a similar label as" fitness enthusiast. In some embodiments, second users having the same or similar number of tags greater than or equal to a predetermined tag number threshold are recommended to the first user based on the same or similar number of tags between each second user and the first user.
In some embodiments, said recommending said at least one second user to said first user comprises: and ranking the at least one second user according to the number of the same or similar labels between each second user and the first user, and recommending the pre-determined number of second users ranked in the front to the first user. In some embodiments, the second users are ranked in order of the number of tags from high to low according to the number of the same or similar tags between each second user and the first user, and a predetermined number (which may be 1 or more) of the second users ranked at the top are recommended to the first user.
In some embodiments, wherein the step S11 includes: the method comprises the steps that a network device responds to trigger event information for anonymously recommending social friends for a first user in a social application, and if the current position information of the first user meets a preset position change condition, one or more pieces of first label information corresponding to the first user are obtained. In some embodiments, the location change condition includes, but is not limited to, that a distance between a current location of the first user and a location of the first user when the second user was last recommended is greater than or equal to a predetermined distance threshold (e.g., 10 kilometers), and the current location of the first user and the location of the first user when the second user was last recommended belong to two different areas (e.g., belong to two different cities), which is to be mentioned as an example only and is not a limitation of the present application. In some embodiments, if the current location information of the first user meets a predetermined location change condition, at least one second user matching the first user needs to be re-determined from a plurality of users corresponding to the social application, and the re-determined at least one second user needs to be recommended to the first user again.
In some embodiments, the step S11 includes: the method comprises the steps that a network device responds to trigger event information for anonymously recommending social friends for a first user in a social application, obtains at least one historical recommendation user recommended to the first user at the last time, and if the at least one historical recommendation user meets a preset recommendation user change condition, obtains one or more pieces of first tag information corresponding to the first user. In some embodiments, at least one historical recommending user recommended to a first user last time is obtained, if the at least one historical recommending user meets a predetermined recommending user change condition, at least one second user matched with the first user needs to be re-determined from a plurality of users corresponding to the social application, and the re-determined at least one second user is recommended to the first user again. In some embodiments, the recommended user change condition includes, but is not limited to, that the total activity or the average activity of the historical recommended users is less than or equal to a predetermined activity threshold, and the number of active users in the historical recommended users is less than or equal to a predetermined number threshold, which is to be noted as an example and not a limitation of the present application.
In some embodiments, the step S11 includes: the method comprises the steps that network equipment responds to a recommendation request which is initiated by a first user in social application and used for requesting anonymous recommendation of social friends, whether portrait information of the first user meets a preset recommendation condition is judged, if yes, one or more pieces of first tag information corresponding to the first user are obtained, and if not, portrait improvement prompt information corresponding to the portrait information is generated and sent to the first user so as to prompt the first user to improve the portrait information. In some embodiments, in response to a recommendation request for requesting anonymous recommendation of a social friend initiated by a first user, it is determined whether portrait information of the first user meets a predetermined recommendation condition, where the recommendation condition may be that the perfectness of the portrait information is greater than or equal to a predetermined perfectness threshold, and the higher the perfectness of the portrait information is, the higher the recommendation accuracy rate is, or the recommendation condition may also be that the portrait information includes a specific portrait feature, such as an interest characteristic, a lifestyle characteristic, and the like. In some embodiments, the portrait perfection prompt instructs the user to make a portrait perfected entry that the user may click on to enter a page for perfecting the portrait information, or the portrait perfection prompt includes one or more perfectable questions recommended that the user may answer directly in the prompt page. In some embodiments, if the portrait information of the first user meets a predetermined recommendation condition, one or more first tag information corresponding to the first user is obtained, otherwise, according to the current portrait information of the first user, a place where the current portrait information needs to be further improved is obtained, portrait improvement prompt information is generated and sent to the first user equipment for presentation, so that the first user is prompted to improve the portrait information of the first user.
In some embodiments, the step S11 includes: if the portrait information of the first user meets a preset recommendation condition, the network equipment generates an automatic recommendation request for anonymously recommending social friends for the first user, and responds to the automatic recommendation request to obtain one or more pieces of first tag information corresponding to the first user. In some embodiments, if it is detected that the portrait information of the first user satisfies a predetermined recommendation condition, an automatic recommendation request for anonymously recommending social friends for the first user may be periodically generated to anonymously recommend social friends for the first user, or, whenever it is detected that a condition for triggering automatic recommendation is satisfied (e.g., when the first user logs in or when an online time of the first user satisfies a predetermined time), an automatic recommendation request for anonymously recommending social friends for the first user may be generated to anonymously recommend social friends for the first user.
Fig. 2 shows a structure diagram of a network device for recommending social users according to an embodiment of the present application, which includes a one-module 11, a two-module 12, and a three-module 13. The one-to-one module 11 is configured to respond to trigger event information for anonymously recommending social friends for a first user in a social application, and acquire one or more pieces of first tag information corresponding to the first user; a second module 12, configured to determine at least one second user from a plurality of users corresponding to the social application, where at least one target second tag information of one or more second tag information corresponding to each second user matches with the one or more first tag information; a third module 13, configured to recommend the at least one second user to the first user, where at least one target second tag information corresponding to each second user is invisible to the first user.
The one-to-one module 11 is configured to, in response to trigger event information for anonymously recommending social friends for a first user in a social application, obtain one or more pieces of first tag information corresponding to the first user. In some embodiments, the triggering event information includes any information related to an event for triggering anonymous recommendation of social friends for the first user, optionally, the triggering event information includes, but is not limited to, identification information of the first user, anonymous recommendation requirements, recommendation quantity, and the like. In some embodiments, the first tag information is used to indicate a tag corresponding to the first user, optionally, the first tag information includes a static tag and/or a dynamic tag corresponding to the first user; the static tag is used for representing a fixed and unchangeable tag, and optionally, the static tag corresponding to the first user can be set by the first user or generated for the first user by the network device; the dynamic tag is used for representing a dynamically determined tag, optionally, the dynamic tag corresponding to the first user is dynamically generated by the network device based on the historical behavior of the first user in the social application, if the network device determines that the first user has performed an operation of approval on more published contents related to the motion in a recent period of time based on the historical behavior of the first user, a dynamic tag "motion" is generated for the first user, optionally, if the network device determines that the first user has not performed a behavior related to a certain dynamic tag for more than a predetermined time, the dynamic tag may be cancelled. In some embodiments, for social friends that are anonymously recommended for the first user, the first user is only provided with partial permissions, such as allowing the first user to view only partial content of the recommended social friends. In some embodiments, a first user performs a predetermined operation in user equipment for requesting anonymous recommendation of a social friend, the user equipment sends trigger event information corresponding to the predetermined operation to network equipment, and the network equipment responds to the trigger event information to acquire one or more pieces of first tag information corresponding to the first user; in some embodiments, the network device automatically activates trigger event information to become a first user anonymous recommended social friend, and obtains one or more pieces of first tag information corresponding to the first user in response to the trigger event information, for example, the network device automatically activates trigger event information to become the first user anonymous recommended social friend each time the first user enters a social application, for example, the network device automatically triggers trigger event information to be generated to become the first user anonymous recommended social friend when detecting that the liveness of the first user is lower than a predetermined threshold, and for example, the network device periodically automatically activates trigger event information to become the first user anonymous recommended social friend.
A secondary module 12, configured to determine at least one second user from the plurality of users corresponding to the social application, where at least one target second tag information of the one or more second tag information corresponding to each second user matches with the one or more first tag information. In some embodiments, the concept of the second tag information is the same as or similar to the concept of the first tag information, and is not repeated herein. In some embodiments, matching a first tag information with a second tag information means that the first tag information is the same as or similar to or associated with the second tag information. In some embodiments, the plurality of users are users who do not have a friend relationship with the first user, and the network device may determine the plurality of users corresponding to the social application in a variety of ways, such as the network device selecting a plurality of users with a liveness higher than a predetermined threshold from all users who are currently online, or the network device selecting a plurality of users in a city with the first user from all users who are currently online. The network device may determine the at least one second user from the plurality of users corresponding to the social application in any feasible manner, and in some embodiments, the network device determines at least one available first tag information from the one or more first tag information and then determines the at least one second user from the plurality of users corresponding to the social application based on the at least one available first tag information; in some embodiments, the network device initially determines one or more fourth users from the plurality of users corresponding to the social application, and then determines at least one second user from the one or more fourth users; in some embodiments, the network device matches one or more second tag information corresponding to each of the plurality of users with each of the one or more first tag information, obtains a matching result, and determines at least one second user from the plurality of users based on the matching result. In some embodiments, the determined presence of at least one target second tag information per second user, the at least one target second tag information matching at least one of the one or more first tag information, e.g., first user corresponding first tag information a1, B1, C1, D1, the network device determining second users U1, U2 from the plurality of users of the social application, U1 having second tag information a2 and B2 matching a1 and B1, respectively, and U2 having second tag information C2 matching C1.
A third module 13, configured to recommend the at least one second user to the first user, where at least one target second tag information corresponding to each second user is invisible to the first user. In some embodiments, when at least one second user is recommended to the first user, all second tag information corresponding to each second user is invisible to the first user. In some embodiments, when at least one second user is recommended to the first user, the at least one target second tag information corresponding to each second user is invisible to the first user, but other second tag information than the at least one target second tag information is visible to the first user. In some embodiments, at least one target second tag information corresponding to the second user is originally visible to other users, and at this time, the at least one target second tag information needs to be set to be invisible to the first user. In some embodiments, the step of setting the at least one target second tag information corresponding to the second user to be invisible to the first user may not be performed, and the at least one target second tag information is directly invisible to the first user. For example, fig. 3 is a schematic diagram of a personal interface of a second user when the second user is recommended to the first user according to an example of the present application, where the personal interface includes an avatar (i.e., a circled portion) of the second user, a nickname ("XXXX") of the second user, second tag information "food" and "music" of the second user except for at least one target second tag information, that is, the two tags of "food" and "music" are not tags that match the first user, and the at least one target second tag information corresponding to the second user is not visible to the first user. It should be noted that, optionally, for each second user, the first tag information matched with the at least one target second tag information corresponding to the second user is also invisible to the second user. Therefore, when the first user sees each second user of the anonymous recommendation, the first user does not know which labels of each second user are matched with the first user, so that the first user needs to find the common interest point between the first user and the second user through communication between the first user and the second user, the communication willingness of the first user can be enhanced, the interestingness of social applications is improved, the problem of inconvenient chatting of strangers is solved, the user who is recommended to the first user and has a certain common point is certainly recommended, but the common point is invisible to the first user, and the first user needs to find the common point through subsequent chatting with the second user, and the chatting interest of the first user can be enhanced.
In some embodiments, the apparatus further comprises a quad-module 14 (not shown). A fourth module 14, configured to determine, according to at least one session message sent by the first user or the target second user in history, specific second tag information in one or more second tag information corresponding to the target second user, and adjust the specific second tag information to be visible to the first user. Here, the specific implementation of a quad-module 14 is the same as or similar to the embodiment related to step S14 in fig. 1, and therefore, the detailed description is omitted, and the detailed implementation is incorporated herein by reference.
In some embodiments, the one-four module 14 is configured to: if at least one session message sent by the first user or the target second user in history is matched with specific second tag information in at least one target second tag information corresponding to the target second user, the network equipment sets the specific second tag information to be visible to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the one-four module 14 is configured to: if the number of the session messages which are sent by the first user and the target second user in the history and are matched with the specific second tag information in the at least one target second tag information corresponding to the target second user is larger than or equal to a preset number threshold, the network equipment sets the specific second tag information to be visible for the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus further comprises a five module 15 (not shown). A fifth module 15, configured to, in response to an access request for the first user to view the tag information of the target second user, provide, to the first user, second tag information that is currently visible to the first user in one or more second tag information corresponding to the target second user. Here, the specific implementation manner of the fifth module 15 is the same as or similar to the embodiment related to step S15 in fig. 1, and therefore, the detailed description is not repeated here, and is incorporated herein by reference.
In some embodiments, the one-five module 15 is configured to: responding to an access request of the first user for viewing the tag information of a target second user, and determining whether a preset tag access triggering condition is met according to the historical chat record information of the first user and the target second user; if so, adjusting second label information which is invisible to the first user in one or more second label information corresponding to the target second user to be visible to the first user, and providing the one or more second label information corresponding to the target second user to the first user; otherwise, providing the second label information which is currently visible to the first user in one or more second label information corresponding to the target second user to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus further comprises a six-module 16 (not shown). A sixth module 16, configured to, when a predetermined time condition is met, provide, to the first user, prompt information of remaining second tag information that is invisible to the first user if the remaining second tag information exists in one or more pieces of second tag information corresponding to the target second user. Here, the specific implementation of a sixth module 16 is the same as or similar to the embodiment related to step S16 in fig. 1, and therefore, the detailed description is omitted, and the detailed implementation is incorporated herein by reference.
In some embodiments, the one-six module 16 is configured to: when a preset time condition is met, if one or more pieces of second label information corresponding to the target second user have remaining second label information invisible to the first user, determining whether a preset label prompt triggering condition is met according to historical chat record information of the first user and the target second user; and if so, providing prompt information of the residual second label information to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the apparatus is further configured to: if each piece of second tag information in one or more pieces of second tag information corresponding to the target second user is visible to the first user, the network device sends a friend adding request to the target second user, wherein the friend adding request is used for requesting that the target second user is added as a friend of the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, said sending an add buddy request to said target second user comprises: sending friend adding prompt information to the first user, wherein the friend adding prompt information is used for prompting that the target second user is added as a friend of the first user; and responding to a preset confirmation operation of the first user for the friend adding prompt information, and sending a friend adding request to the target second user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the two-module 12 includes a two-one module 121 (not shown) and a two-two module 122 (not shown). A module for determining 121 at least one available first tag information from the one or more first tag information; a second module 122, configured to determine at least one second user from the plurality of users corresponding to the social application according to the at least one available first tag information, where at least one target second tag information of the one or more second tag information corresponding to each second user matches with the at least one available first tag information. Here, the specific implementation manners of the first-second module 121 and the second-second module 122 are the same as or similar to the embodiments related to steps S121 and S122 in fig. 1, and therefore, the detailed descriptions are omitted, and the detailed descriptions are incorporated herein by reference.
In some embodiments, the one-two-one module 121 is configured to: determining at least one available first tag information from the one or more first tag information according to the weight of each first tag information, wherein each available first tag information satisfies at least one of the following: the weight of the available first tag information is greater than or equal to a predetermined weight threshold; the weight of the available first label information is greater than or equal to the weight of the other first label information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the trigger event information includes additional condition information; wherein the determining at least one second user from the plurality of users corresponding to the social application comprises: determining one or more third users meeting the attachment condition information from a plurality of users corresponding to the social application according to the attachment condition information; at least one second user is determined from the one or more third users. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the secondary module 12 is configured to: for each user in a plurality of users corresponding to the social application, matching one or more second tag information corresponding to the user with each first tag information in the one or more first tag information to obtain a matching result; determining at least one second user from the plurality of users according to the matching result, wherein each second user satisfies at least one of the following conditions: the number of the first label information matched with the second user is larger than or equal to a preset number threshold value; the number of the first label information matched with the second user is larger than or equal to the number of the first label information matched with other users; the sum of the weights of the first label information matched with the second user is greater than or equal to a preset first weight threshold value; the weight sum of the first label information matched with the second user is greater than or equal to the weight sum of the first label information matched with other users; and one or more second label information corresponding to each second user and matched with the one or more first label information is used as at least one target second label information corresponding to the second user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the secondary module 12 is configured to: for each first tag information in the one or more first tag information, determining one or more fourth users matched with the first tag information from a plurality of users corresponding to the social application, wherein each fourth user corresponds to one or more second tag information matched with the first tag information; determining at least one second user according to one or more fourth users matched with each first label information, wherein each second user meets at least one of the following conditions: the number of times the second user is matched is greater than or equal to a predetermined number threshold; the number of times that the second user is matched is greater than or equal to the number of times that other fourth users are matched; the sum of the matched weights of the second user is greater than or equal to a predetermined second weight threshold; the weight sum matched by the second user is greater than or equal to the weight sum matched by other fourth users; and one or more second label information corresponding to each second user and matched with the one or more first label information is used as at least one target second label information corresponding to the second user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, said recommending said at least one second user to said first user comprises: recommending one or more second users, whose matching degree with the first user meets a preset matching degree threshold value, of the at least one second user to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, said recommending said at least one second user to said first user comprises: and ranking the at least one second user according to the matching degree between each second user and the first user, and recommending a preset number of second users ranked in the front to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, said recommending said at least one second user to said first user comprises: recommending one or more second users of the at least one second user, the number of same or similar labels of which with the first user meets a preset label number threshold value, to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, said recommending said at least one second user to said first user comprises: and ranking the at least one second user according to the number of the same or similar labels between each second user and the first user, and recommending the pre-determined number of second users ranked in the front to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the module 11 is configured to: responding to trigger event information of anonymously recommending social friends for a first user in a social application, and if the current position information of the first user meets a preset position change condition, acquiring one or more pieces of first tag information corresponding to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the module 11 is configured to: responding to trigger event information of anonymously recommending social friends for a first user in a social application, obtaining at least one historical recommending user recommended to the first user last time, and if the at least one historical recommending user meets a preset recommending user change condition, obtaining one or more pieces of first tag information corresponding to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the module 11 is configured to: responding to a recommendation request for requesting anonymous recommendation of social friends initiated by a first user in social applications, judging whether portrait information of the first user meets a preset recommendation condition, if so, acquiring one or more pieces of first tag information corresponding to the first user, and if not, generating portrait improvement prompt information corresponding to the portrait information and sending the portrait improvement prompt information to the first user so as to prompt the first user to improve the portrait information. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
In some embodiments, the module 11 is configured to: if the portrait information of the first user meets a preset recommendation condition, generating an automatic recommendation request for anonymously recommending social friends for the first user, and responding to the automatic recommendation request to obtain one or more pieces of first tag information corresponding to the first user. Here, the related operations are the same as or similar to those of the embodiment shown in fig. 1, and therefore are not described again, and are included herein by reference.
FIG. 3 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
In some embodiments, as shown in FIG. 3, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a holding computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (10)

1. A method for recommending social users is applied to a network device, wherein the method comprises the following steps:
responding to trigger event information for anonymously recommending social friends for a first user in a social application, and acquiring one or more pieces of first tag information corresponding to the first user;
determining at least one second user from a plurality of users corresponding to the social application, wherein at least one target second tag information in one or more second tag information corresponding to each second user is matched with the one or more first tag information;
recommending the at least one second user to the first user, wherein at least one target second label information corresponding to each second user is invisible to the first user.
2. The method of claim 1, wherein the determining at least one second user from a plurality of users corresponding to the social application comprises:
for each user in a plurality of users corresponding to the social application, matching one or more second tag information corresponding to the user with each first tag information in the one or more first tag information to obtain a matching result;
determining at least one second user from the plurality of users according to the matching result, wherein each second user satisfies at least one of the following conditions:
the number of the first label information matched with the second user is larger than or equal to a preset number threshold value;
the number of the first label information matched with the second user is larger than or equal to the number of the first label information matched with other users;
the sum of the weights of the first label information matched with the second user is greater than or equal to a preset first weight threshold value;
the weight sum of the first label information matched with the second user is greater than or equal to the weight sum of the first label information matched with other users;
and one or more second label information corresponding to each second user and matched with the one or more first label information is used as at least one target second label information corresponding to the second user.
3. The method of claim 1, wherein the determining at least one second user from a plurality of users corresponding to the social application comprises:
for each first tag information in the one or more first tag information, determining one or more fourth users matched with the first tag information from a plurality of users corresponding to the social application, wherein each fourth user corresponds to one or more second tag information matched with the first tag information;
determining at least one second user according to one or more fourth users matched with each first label information, wherein each second user meets at least one of the following conditions:
the number of times the second user is matched is greater than or equal to a predetermined number threshold;
the number of times that the second user is matched is greater than or equal to the number of times that other fourth users are matched;
the sum of the matched weights of the second user is greater than or equal to a predetermined second weight threshold;
the weight sum matched by the second user is greater than or equal to the weight sum matched by other fourth users;
and one or more second label information corresponding to each second user and matched with the one or more first label information is used as at least one target second label information corresponding to the second user.
4. The method of claim 1, the determining at least one second user from a plurality of users corresponding to the social application, comprising:
determining at least one available first tag information from the one or more first tag information;
and determining at least one second user from the plurality of users corresponding to the social application according to the at least one available first tag information, wherein at least one target second tag information in the one or more second tag information corresponding to each second user is matched with the at least one available first tag information.
5. The method of claim 4, wherein the determining at least one available first tag information from the one or more first tag information comprises:
determining at least one available first tag information from the one or more first tag information according to the weight of each first tag information, wherein each available first tag information satisfies at least one of the following:
the weight of the available first tag information is greater than or equal to a predetermined weight threshold;
the weight of the available first label information is greater than or equal to the weight of the other first label information.
6. The method of any of claims 1-5, wherein the trigger event information includes additional condition information;
wherein the determining at least one second user from the plurality of users corresponding to the social application comprises:
determining one or more third users meeting the attachment condition information from a plurality of users corresponding to the social application according to the attachment condition information;
at least one second user is determined from the one or more third users.
7. The method of any of claims 1 to 6, wherein the recommending the at least one second user to the first user comprises at least any of:
recommending one or more second users, of the at least one second user, whose matching degree with the first user meets a preset matching degree threshold value to the first user;
ranking the at least one second user according to the matching degree between each second user and the first user, and recommending a preset number of second users ranked in the front to the first user;
recommending one or more second users of the at least one second user, whose number of same or similar tags with the first user meets a predetermined tag number threshold, to the first user;
and ranking the at least one second user according to the number of the same or similar labels between each second user and the first user, and recommending the pre-determined number of second users ranked in the front to the first user.
8. The method of any one of claims 1 to 7, wherein the obtaining one or more pieces of first tag information corresponding to a first user in response to trigger event information for anonymously recommending social friends for the first user in a social application comprises at least any one of:
responding to trigger event information of anonymously recommending social friends for a first user in a social application, and if the current position information of the first user meets a preset position change condition, acquiring one or more pieces of first label information corresponding to the first user;
responding to trigger event information of anonymously recommending social friends for a first user in a social application, obtaining at least one historical recommending user recommended to the first user last time, and if the at least one historical recommending user meets a preset recommending user change condition, obtaining one or more pieces of first tag information corresponding to the first user;
responding to a recommendation request for requesting anonymous recommendation of social friends initiated by a first user in social application, judging whether portrait information of the first user meets a preset recommendation condition, if so, acquiring one or more pieces of first tag information corresponding to the first user, and if not, generating portrait improvement prompt information corresponding to the portrait information and sending the portrait improvement prompt information to the first user so as to prompt the first user to improve the portrait information;
if the portrait information of the first user meets a preset recommendation condition, generating an automatic recommendation request for anonymously recommending social friends for the first user, and responding to the automatic recommendation request to obtain one or more pieces of first tag information corresponding to the first user.
9. An apparatus for recommending social users, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1 to 8.
10. A computer-readable medium storing instructions that, when executed, cause a system to perform the operations of any of the methods of claims 1-8.
CN202010514137.4A 2020-06-08 2020-06-08 Method and equipment for recommending social users Pending CN111651684A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010514137.4A CN111651684A (en) 2020-06-08 2020-06-08 Method and equipment for recommending social users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010514137.4A CN111651684A (en) 2020-06-08 2020-06-08 Method and equipment for recommending social users

Publications (1)

Publication Number Publication Date
CN111651684A true CN111651684A (en) 2020-09-11

Family

ID=72347380

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010514137.4A Pending CN111651684A (en) 2020-06-08 2020-06-08 Method and equipment for recommending social users

Country Status (1)

Country Link
CN (1) CN111651684A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014564A (en) * 2021-02-19 2021-06-22 提亚有限公司 User matching method and device, computer equipment and storage medium
CN113014994A (en) * 2021-04-14 2021-06-22 杭州网易云音乐科技有限公司 Multimedia playing control method and device, storage medium and electronic equipment
CN113469828A (en) * 2021-07-05 2021-10-01 北京意匠文枢科技有限公司 Method, device, medium and program product for oriented social contact
CN114124876A (en) * 2021-11-17 2022-03-01 网易(杭州)网络有限公司 Information interaction method, device, equipment and storage medium
CN115186664A (en) * 2022-09-13 2022-10-14 深圳市爱聊科技有限公司 Method and system for measuring and calculating degree of coincidence between subjects based on multiple dimensions
CN116662654A (en) * 2023-05-26 2023-08-29 惠州市西子湖畔网络有限公司 Big data-based affinity matching system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017024316A1 (en) * 2015-08-06 2017-02-09 Hrl Laboratories, Llc System and method for identifying user interests through social media
CN107615733A (en) * 2015-04-14 2018-01-19 蔡宏铭 Realization is shared with pedestrian's instant messaging, peer message and the method and system of commending contents
CN107948047A (en) * 2016-10-13 2018-04-20 腾讯科技(深圳)有限公司 A kind of user recommends method and terminal
CN109102415A (en) * 2018-07-03 2018-12-28 重庆小萝卜科技有限公司 Data processing method and system
CN110489663A (en) * 2019-08-05 2019-11-22 腾讯科技(深圳)有限公司 A kind of social content control method, device and computer equipment
CN110688586A (en) * 2019-09-30 2020-01-14 上海掌门科技有限公司 Method and equipment for recommending social activities or friends for user
US20200026743A1 (en) * 2017-03-31 2020-01-23 Shanghai Zhangmen Science And Technology Co.,Ltd. Method, device and system for providing social objects

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107615733A (en) * 2015-04-14 2018-01-19 蔡宏铭 Realization is shared with pedestrian's instant messaging, peer message and the method and system of commending contents
WO2017024316A1 (en) * 2015-08-06 2017-02-09 Hrl Laboratories, Llc System and method for identifying user interests through social media
CN107948047A (en) * 2016-10-13 2018-04-20 腾讯科技(深圳)有限公司 A kind of user recommends method and terminal
US20200026743A1 (en) * 2017-03-31 2020-01-23 Shanghai Zhangmen Science And Technology Co.,Ltd. Method, device and system for providing social objects
CN109102415A (en) * 2018-07-03 2018-12-28 重庆小萝卜科技有限公司 Data processing method and system
CN110489663A (en) * 2019-08-05 2019-11-22 腾讯科技(深圳)有限公司 A kind of social content control method, device and computer equipment
CN110688586A (en) * 2019-09-30 2020-01-14 上海掌门科技有限公司 Method and equipment for recommending social activities or friends for user

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113014564A (en) * 2021-02-19 2021-06-22 提亚有限公司 User matching method and device, computer equipment and storage medium
CN113014994A (en) * 2021-04-14 2021-06-22 杭州网易云音乐科技有限公司 Multimedia playing control method and device, storage medium and electronic equipment
CN113469828A (en) * 2021-07-05 2021-10-01 北京意匠文枢科技有限公司 Method, device, medium and program product for oriented social contact
CN114124876A (en) * 2021-11-17 2022-03-01 网易(杭州)网络有限公司 Information interaction method, device, equipment and storage medium
CN115186664A (en) * 2022-09-13 2022-10-14 深圳市爱聊科技有限公司 Method and system for measuring and calculating degree of coincidence between subjects based on multiple dimensions
CN115186664B (en) * 2022-09-13 2023-01-13 深圳市爱聊科技有限公司 Method and system for measuring and calculating coincidence degree between subjects based on multiple dimensions
CN116662654A (en) * 2023-05-26 2023-08-29 惠州市西子湖畔网络有限公司 Big data-based affinity matching system and method
CN116662654B (en) * 2023-05-26 2024-04-09 惠州市西子湖畔网络有限公司 Big data-based affinity matching system and method

Similar Documents

Publication Publication Date Title
CN111651684A (en) Method and equipment for recommending social users
US9220984B2 (en) Social information game system
US20190171724A1 (en) Method and apparatus for determining hot event
CN111930277B (en) Method and equipment for providing presence information
US11025741B2 (en) Dynamic cognitive user interface
CN110827061A (en) Method and equipment for providing presentation information in novel reading process
CN110765395A (en) Method and equipment for providing novel information
CN111523039B (en) Method and device for processing book promotion request in reading application
CN113704638A (en) Method and equipment for identifying presentation information in social group chat
CN111817945B (en) Method and equipment for replying communication information in instant communication application
CN110768894A (en) Method and equipment for deleting session message
CN110765389A (en) Method and equipment for forwarding social sharing information
US9159081B2 (en) Content item type determination and selection
US12014111B2 (en) Democratic skip
CN114191824B (en) Method and equipment for sending friend recall information to user
CN110781269A (en) Method and equipment for searching books in reading application
CN110968819A (en) Data processing method, device and machine readable medium
CN113051476B (en) Method and device for sending message
US20120284327A1 (en) Apparatus and methods for providing real time advice online
US20170171330A1 (en) Method for pushing information and electronic device
EP4320573A1 (en) Intelligent assistant content generation
CN114710342A (en) Community management method, device, medium and program product
CN110765388A (en) Method and equipment for publishing shared information in social space
CN111211969B (en) Question-answer interaction method and equipment
CN111831372A (en) Method and equipment for presenting dynamic cartoon information in cartoon application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination