CN109388722B - Method and equipment for adding or searching social contact - Google Patents
Method and equipment for adding or searching social contact Download PDFInfo
- Publication number
- CN109388722B CN109388722B CN201811159333.3A CN201811159333A CN109388722B CN 109388722 B CN109388722 B CN 109388722B CN 201811159333 A CN201811159333 A CN 201811159333A CN 109388722 B CN109388722 B CN 109388722B
- Authority
- CN
- China
- Prior art keywords
- social
- information
- user
- target image
- face information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The method comprises the steps of receiving a request for adding the social contact, submitted by a first social user through a user device, wherein the request for adding the social contact comprises a target image; matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information; and establishing a social connection between the first social contact user and the second social contact user according to the account information of the second social contact user. Compared with the prior art, the method and the device have the advantage that the user can still establish social contact with the other side when the social information of the social contact person to be added is unknown. And then the network equipment more accurately obtains the matched social contact persons according to the shooting position information and the shooting time information of the image, so that the social contact is conveniently established among users, and the user experience is improved.
Description
Technical Field
The present application relates to the field of communications, and more particularly, to techniques for adding or finding social contacts.
Background
With the development of the internet, social applications enable people to establish social connections with each other. Generally, a user adds a friend by inputting social information (such as a mobile phone number, a micro signal, a QQ number, a mailbox, and the like) of the friend to be added, and when the user does not know the social information of the friend to be added, the user cannot establish a social connection with the friend to be added, which is inconvenient for the user to establish more social connections.
Disclosure of Invention
One object of the present application is to provide a method and apparatus for adding social contacts.
According to one aspect of the present application, there is provided a method for adding social contacts, the method comprising: receiving a request for adding a social contact submitted by a first social user through user equipment, wherein the request for adding the social contact comprises a target image; matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information; and establishing a social connection between the first social contact user and the second social contact user according to the account information of the second social contact user.
According to another aspect of the present application, there is provided a method for locating social contacts, the method comprising: receiving a request for inquiring social contacts, which is submitted by a first social user through user equipment, wherein the request for inquiring the social contacts comprises a target image; matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information; and sending the social information of the second social user to the user equipment.
According to one aspect of the application, there is provided an apparatus for adding social contacts, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform: receiving a request for adding a social contact submitted by a first social user through user equipment, wherein the request for adding the social contact comprises a target image; matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information; and establishing a social connection between the first social contact user and the second social contact user according to the account information of the second social contact user.
According to one aspect of the application, a device for finding social contacts is provided, wherein the device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform: receiving a request for inquiring social contacts, which is submitted by a first social user through user equipment, wherein the request for inquiring the social contacts comprises a target image; matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information; and sending the social information of the second social user to the user equipment.
According to an aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to: receiving a request for adding a social contact submitted by a first social user through user equipment, wherein the request for adding the social contact comprises a target image; matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information; and establishing a social connection between the first social contact user and the second social contact user according to the account information of the second social contact user.
Compared with the prior art, the user uploads a social contact request to the network equipment through the user equipment, wherein the social contact request comprises image information of a social contact person to be added; the network equipment obtains the matched social contact persons according to the face information in the image, and therefore the problem that the user can still establish social contact with the other side when the social contact information of the social contact person to be added is unknown is solved. And then the network equipment can more accurately obtain matched social contact persons according to the shooting position information and the shooting time information of the image, so that the social contact is conveniently established among users, and the user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for adding social contacts according to one embodiment of the present application;
FIG. 2 illustrates a flow diagram of a method for locating social contacts according to another embodiment of the present application;
FIG. 3 shows a schematic diagram of a device for adding social contacts according to one embodiment of the present application;
FIG. 4 shows a schematic diagram of an apparatus for locating social contacts according to another embodiment of the present application;
FIG. 5 illustrates an exemplary system that can be used to implement the various embodiments described herein;
fig. 6a and fig. 6b respectively show a classic scenario application diagram of an embodiment of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
FIG. 1 shows a flow diagram of a method for adding social contacts according to one embodiment of the present application. The method comprises the steps of S11, S12 and S13, wherein in the step S11, a network device receives a request for adding a social contact person, submitted by a first social user through a user device, wherein the request for adding the social contact person comprises a target image; in step S12, the network device matches a query in a social information base according to the face information in the target image to determine a second social user matching the face information; in step S13, the network device establishes a social connection between the first social user and the second social user according to the account information of the second social user. Here, the target image includes image information of a social contact to be added by the first social user.
For example, the network device receives a request of adding a social contact person, which is submitted by a first social user a through the user device of the first social user a, wherein the request includes a target image, and the target image includes the social contact person to be added. The network equipment obtains the face information of the social contact person to be added from the target image based on a face recognition technology, and then the network equipment queries and obtains a second social user B matched with the face information from the social information base. In some embodiments, the network device detects a target image, accurately calibrates the position and size of a face in the image, extracts feature data of the face by image processing (such as light compensation, gray level transformation, histogram equalization, filtering or sharpening), namely obtains face information, searches and matches the extracted face information with a feature template stored in a social information base, and outputs a result obtained by matching when the similarity exceeds a preset threshold. A large amount of characteristic templates which are based on face image information and obtained through recognition algorithm and machine learning are stored in the social information base. The social information base may be stored in the network device or in a device other than the network device. Further, the network device establishes a social connection between the first social user a and the second social user B according to account information (e.g., "xikeai") associated with the second social user B. In some embodiments, the account information includes, but is not limited to, a cell phone number, a micro signal, a QQ number, a mailbox, a registered account, an access account, etc. of other instant messaging applications or other types of applications. In some embodiments, after the network device needs the first social user a to confirm the second social user B, the network device directly sends the request of adding friends from the first social user a to the user device of the second social user B; in other embodiments, the network device adds the first social user a and the second social user B as friends to each other, and notifies the two social users that they are friends of each other, respectively.
In some embodiments, the step S12 includes the network device matching, according to the face information in the target image and the shooting location information of the target image, a query in a social information base to determine a second social user matching the face information, where an activity area of the second social user covers the shooting location information. Here, the coverage includes that the activity area of the second user covers the shooting-position GPS information, or that the shortest distance between the activity area of the second user and the shooting-position GPS information is less than or equal to predetermined coverage-distance threshold information, which in some embodiments is preset by computer statistical analysis, for example 50 meters.
For example, the network device matches a query in a social information base according to the face information in the target image and shooting location information (e.g., XXX square) of the target image to determine a second social user B matching the face information, wherein, in some embodiments, an activity area of the second social user B covers the shooting location information, for example, an activity area XXX square of the second social user B, and the shooting location is a landscape fountain location in the XXX square; in other embodiments, the shortest distance between the activity area XXX square of the second user B and the shooting location GPS information XX coffee shop is equal to the predetermined coverage distance threshold of 50 meters. In some embodiments, the network device determines the shooting location information through EXIF (Exchangeable image file format) information of the target image, extracts GPS information (for example, 121 ° 27 'east, 31 ° 12' north) from the target image, and converts the GPS information into a geographic location to obtain the shooting location information "XXX square". In other embodiments, the network device performs matching query on the background building group of the target image in a geographic database to obtain shooting location information XXX square of the target image.
In some embodiments, step S12 includes the network device matching a query in a social information base according to the face information in the target image to determine one or more candidate second social users matching the face information; and screening second social users from the one or more candidate second social users according to the shooting position information of the target image and the activity area of each candidate second social user, wherein the activity area of the second social users covers the shooting position information. Here, the activity area of the second social user includes an activity area obtained by an activity track of the user.
For example, the network device determines a plurality of candidate second social users, such as a second social user B and a second social user C, matching queries in a social information base according to the face information in the target image; and then the network equipment screens a second social user C from the two second social users according to the shooting position information XXX square of the target image and the activity area of each candidate second social user, as shown in fig. 6a and 6B, the activity areas of the second social user B and the second social user C are respectively, wherein the activity area of the second social user C covers the shooting position information. As shown in fig. 6b, the activity area of the second user C covers the shooting location information XXX square, or the shortest distance between the activity area of the second user C and the scene of the shooting location information CCC is less than 300 meters, which in some embodiments is preset by computer statistical analysis, for example 300 meters.
In some embodiments, the method further comprises the network device detecting whether the target image meets a real-time shooting condition; step S12 includes, if the target image meets the real-time shooting condition, the network device screening second social users from the one or more candidate second social users according to the shooting location information of the target image and the activity area of each candidate second social user, where the activity area of the second social user covers the shooting location information. Here, the real-time photographing condition includes, but is not limited to, that the target image is obtained by live photographing, is processed by PS (Adobe Photoshop, image processing software) through live photographing, or is obtained by live photographing and forwarding; not including the EXIF (Exchangeable image file format) information obtained by screen capture (unable to carry the original picture) or by copying (copying by photographic method, new EXIF information will be generated).
For example, the network device detects whether the target image meets the real-time shooting condition, and if the target image is obtained by field shooting instead of screen capture and copying, the target image meets the real-time shooting condition; the network equipment acquires the shooting position information XXX square of the target image and the activity area of each candidate second social user, such as the activity area of a second social user B and the activity area of a second social user C shown in FIGS. 6a and 6B; the network equipment obtains a second social user C from the two second social users through screening, wherein the activity area of the second social user C covers the shooting position information. As shown in fig. 6b, the activity area of the second user C covers the shooting location information XXX square, or the shortest distance between the activity area of the second user C and the scene of the shooting location information CCC is less than 300 meters, which is preset by computer statistical analysis, for example, 300 meters in some embodiments.
In some embodiments, an activity area of the second social user when the target image is captured covers the capturing location information.
For example, the activity area XXX square of the second social user when the target image is captured covers the shooting location information XXX square of the target image, or the shortest distance between the activity area XXX square of the second social user when the target image is captured and the shooting location information CCC scene area of the target image is less than 300 meters, in some embodiments, the coverage distance threshold information is preset by computer statistical analysis, for example 300 meters.
In some embodiments, wherein the real-time shooting condition includes, but is not limited to, any one of the following or a combination thereof: the shooting information of the target image comprises shooting time information of the target image; the difference value between the receiving time information of the request for adding the social contact persons and the shooting time information of the target image is smaller than or equal to the preset time interval threshold value information; actual scene information in the target image is matched with shooting position information of the target image; and matching the actual scene information in the target image with the shooting time information of the target image.
For example, in some embodiments, the real-time photographing condition includes photographing information of the target image, such as photographing time information of the target image; that is, the photographing information of the target image including the photographing time information "2018/1/19, pm15. In some embodiments, the network device receives a difference value between the receiving time information "2018/1/19, pm15; in some embodiments, the predetermined time interval threshold information is obtained by computer statistical analysis for 48 hours. In other embodiments, for example, the network device obtains the actual scene information XXX square in the target image, and the shooting position information of the target image is the fountain landscape position in the XXX square, so that the real-time shooting condition is satisfied. For example, the network device obtains actual scene information XXX squares in target images, and shooting position information CCC scenic spot of the target images, wherein the distance between the XXX squares and the CCC scenic spot is 300 meters, and is less than a predetermined distance threshold 1000 meters, which is obtained by computer statistical analysis in some embodiments. For another example, the network device obtains actual scene information XXX city in a target image, and shooting location information AAA city of the target image, where the distance between the two cities is 3003 meters, and is greater than a predetermined distance threshold 1000 meters, and then the real-time shooting condition is not met, the target image may be obtained by copying, and in some embodiments, the predetermined distance threshold 1000 meters is obtained by computer statistical analysis. In other embodiments, the network device obtains the actual scene information in the target image, such as XXX square in the sun, and the shooting time information "2018/1/19, pm14" of the target image satisfies the real-time shooting condition. For another example, the network device obtains the XXX square under the sunlight of the actual scene information in the target image, and the shooting time information "2018/1/19, pm23" of the target image does not satisfy the real-time shooting condition, and the target image may be obtained by copying.
It will be understood by those skilled in the art that the above-mentioned contents of the real-time photographing condition are only examples, and other contents of the real-time photographing condition that exist or may appear in the future, such as being applicable to the present application, should be included in the scope of the present application, and are included herein by reference.
In some embodiments, wherein the step S12 includes a substep S121 and a step S122 (both not shown), wherein, in the step S121, the network device extracts face information from the target image; in step S122, the network device matches a query in a social information base according to the face information to determine a second social user matching the face information.
For example, the network device extracts face information from a target image, and obtains the face information of the queried social contact from the target image based on a face recognition technology, and in some embodiments, the network device detects the target image, accurately calibrates the position and size of the face in the image, and further extracts feature data of the face from image processing (such as light compensation, gray scale transformation, histogram equalization, filtering, or sharpening), so as to obtain the face information. And the network equipment searches and matches the face information with the feature template stored in the social information base, and outputs the result obtained by matching when the similarity exceeds a preset threshold value. The social information base stores a large amount of characteristic templates which are obtained through recognition algorithm and machine learning and based on face image information. And the network equipment determines a second social user matched with the face information according to the matching query of the face information in the social information base.
In some embodiments, the substep S121 includes the network device extracting face information from the target image according to the selection mark information of the first social user in the target image. Here, the selection marker information includes marker information for selecting a social contact to be added by making a check or a circle in the target image.
For example, the first social user a selects the social contact to be added in the target image by checking. And the network equipment extracts face information from the target image according to the tick mark information of the first social user A in the target image.
It will be understood by those skilled in the art that the above-mentioned contents of the selectable marker information are merely examples, and that other contents of the selectable marker information, which are present or may appear in the future, such as applicable to the present application, are also included within the scope of the present application and are hereby incorporated by reference.
In some embodiments, the substep S122 includes the network device matching a query in a social information base according to the face information in the target image and the shooting location information of the target image, and the other face information in the target image to determine a second social user matching the face information, wherein the activity area of the other social users matching the other face information covers the shooting location information.
For example, in some embodiments, the target image includes a plurality of face information, including face information of a social contact to be added and face information of other social users C, and shooting location information XXX square of the target image; and the network equipment matches and queries in the social information base according to the face information of the social contact person to be added to determine a second social user B matched with the face information, and obtains other social users C based on other face information, wherein the activity area XXX square of the other social users C covers the shooting position information XXX square of the target image. In some embodiments, the other social users C include social users who have established a social connection with the first social user or social users who have not established a social connection with the first social user. In some embodiments, the network device may not obtain the activity area of the second social user B, but may obtain the activity areas of other social users C, and the activity areas of other social users C are consistent with the shoot location information, such as the activity areas XXX squares of other social users C, which are fountain landscape locations in the XXX squares.
FIG. 2 shows a flow diagram of a method for locating social contacts according to another embodiment of the present application. The method comprises the steps of S21, S22 and S23, wherein in the step S21, the network equipment receives a request for inquiring the social contact person, which is submitted by a first social user through user equipment, wherein the request for inquiring the social contact person comprises a target image; in step S22, the network device matches a query in a social information base according to the face information in the target image to determine a second social user matching the face information; in step S23, the network device sends the social information of the second social user to the user device. Here, the target image includes image information of social contacts to be queried by the first social user. The social information of the second social user includes, but is not limited to, social account information, social avatar information, or social connection information.
For example, the network device receives a query social contact request submitted by a first social user A through its user device, wherein the query social contact request includes a target image. The network equipment obtains the face information of the inquired social contact person from the target image based on a face recognition technology, and then the network equipment inquires a second social user B matched with the face information from the social information base. Social information (e.g., social account information) of the second social user B is sent to the user device of the first social user a. In some embodiments, the network device detects a target image, accurately marks the position and size of a face in the image, further extracts feature data of the face, that is, face information, from image processing (such as light compensation, gray level transformation, histogram equalization, filtering, or sharpening), searches and matches the face information with a feature template stored in a social information base, and outputs a result obtained from matching when the similarity exceeds a preset threshold. The social contact information base stores a large amount of face image information, the characteristic templates are obtained through an identification algorithm and machine learning, and the face in the target image is identified, so that the problem that a user can still be connected with the other side when the social contact information of a social contact person to be inquired is unknown is solved, the information of the other side is inquired between the users to establish a social relationship, and the social experience of the users is improved.
In some embodiments, the method further comprises the network device desensitizing social information of the second social user; sending the social information of the second social user to the user equipment, wherein the sending comprises sending the desensitized social information of the second social user to the user equipment by the network equipment. The desensitization processing comprises data desensitization, namely data deformation is carried out on sensitive information through desensitization rules, and reliable protection of sensitive private data is achieved.
For example, the network device desensitizes the social information of the second social user, where the social information of the second social user includes social account information, social avatar information, and social contact information (e.g., contact phone information), and the network device desensitizes the social contact information (e.g., contact phone information) therein. In some embodiments, the network device performs desensitization processing using desensitization methods, which include, but are not limited to, substitution, invalidation, out-of-order, or symmetric encryption. And the network equipment sends the desensitized social information (including social account information and social head portrait information) of the second social user to the user equipment of the first social user A.
In some embodiments, the method further comprises the network device receiving a request for adding a contact about the second social user sent by the first social user through the user device; the network device establishes a social connection between the first social user and the second social user.
For example, in some embodiments, the first social user a issues a request for adding a contact with respect to the second social user based on the social information of the second social user found in the foregoing, and the network device receives the request for adding the second social user B sent by the first social user a through its user device; the network device establishes a social connection of a first social user a with a second social user B.
In some embodiments, step S22 includes the network device matching a query in a social information base according to the face information in the target image and the shooting location information of the target image to determine a second social user matching the face information, where an activity area of the second social user covers the shooting location information. Here, the coverage includes that the activity area of the second user covers the shooting position GPS information, or that the shortest distance between the activity area of the second user and the shooting position GPS information is less than or equal to predetermined coverage distance threshold information, which in some embodiments is preset by computer statistical analysis, for example, 50 meters.
For example, the network device matches a query in a social information base according to the face information in the target image and shooting location information (e.g., XXX square) of the target image to determine a second social user B matching the face information, wherein, in some embodiments, an activity area of the second social user B covers the shooting location information, for example, an activity area XXX square of the second social user B, and the shooting location is a landscape fountain location in the XXX square; in other embodiments, the shortest distance between the activity area XXX square of the second user B and the shooting location GPS information XX coffee shop is equal to the predetermined coverage distance threshold of 50 meters. In some embodiments, the network device determines the shooting location information according to EXIF (Exchangeable image file format) information of the target image, extracts GPS information (for example, 121 ° 27 '15' east longitude and 31 ° 12 'north latitude 26') from the target image, and converts the GPS information into a geographic location to obtain the shooting location information "XXX square". In other embodiments, the network device performs matching query on the background building group of the target image in a geographic database to obtain shooting position information XXX square of the target image.
FIG. 3 illustrates a device structure diagram for adding social contacts according to one embodiment of the present application. The equipment comprises a first module, a second module and a third module, wherein the first module is used for receiving a request of adding the social contact person, which is submitted by a first social user through user equipment, by network equipment, wherein the request of adding the social contact person comprises a target image; the second module is used for the network equipment to match and inquire in a social information base according to the face information in the target image so as to determine a second social user matched with the face information; the third module is used for the network device to establish the social connection between the first social contact user and the second social contact user according to the account information of the second social contact user. Here, the target image includes image information of a social contact to be added by the first social user.
For example, the network device receives a request of adding a social contact person, which is submitted by a first social user a through the user device of the first social user a, wherein the request includes a target image, and the target image includes the social contact person to be added. The network equipment obtains the face information of the social contact person to be added from the target image based on a face recognition technology, and then the network equipment queries and obtains a second social user B matched with the face information from a social information base. In some embodiments, the network device detects a target image, accurately calibrates the position and size of a face in the image, further extracts feature data of the face from image processing (such as light compensation, gray level transformation, histogram equalization, filtering or sharpening), namely obtains face information, searches and matches the extracted face information with a feature template stored in a social information base, and outputs a result obtained by matching when the similarity exceeds a preset threshold. A large amount of characteristic templates which are based on face image information and obtained through recognition algorithm and machine learning are stored in the social information base. The social information base may be stored in the network device or in a device other than the network device. And the network equipment establishes the social connection between the first social user A and the second social user B according to the account information (such as 'xikeai') of the second social user B. In some embodiments, the account information includes, but is not limited to, a cell phone number, a micro signal, a QQ number, a mailbox, a registered account, an access account, etc. of other instant messaging applications or other types of applications. In some embodiments, after the network device needs the first social user a to confirm the second social user B, the network device directly sends the request of adding friends from the first social user a to the user device of the second social user B; in other embodiments, the network device adds the first social user a and the second social user B to each other as friends, and notifies the two social users that they are friends of each other respectively.
In some embodiments, the second module is configured to, by the network device, match a query in a social information base according to the face information in the target image and the shooting location information of the target image to determine a second social user matching the face information, where an activity area of the second social user covers the shooting location information. Here, the coverage includes that the activity area of the second user covers the shooting-position GPS information, or that the shortest distance between the activity area of the second user and the shooting-position GPS information is less than or equal to predetermined coverage-distance threshold information, which in some embodiments is preset by computer statistical analysis, for example 50 meters.
For example, the network device matches a query in the social information base according to the face information in the target image and shooting location information (e.g., XXX square) of the target image to determine a second social user B matching the face information, wherein in some embodiments, an activity area of the second social user B covers the shooting location information, for example, the activity area XXX square of the second social user B, and the shooting location is a fountain landscape location in the XXX square; in other embodiments, the shortest distance between the activity area XXX square of the second user B and the shooting location GPS information XX coffee shop is equal to the predetermined coverage distance threshold of 50 meters. In some embodiments, the network device determines the shooting location information through EXIF (Exchangeable image file format) information of the target image, extracts GPS information (for example, 121 ° 27 'east, 31 ° 12' north) from the target image, and converts the GPS information into a geographic location to obtain the shooting location information "XXX square". In other embodiments, the network device performs matching query on the background building group of the target image in a geographic database to obtain shooting position information XXX square of the target image.
In some embodiments, the second module is configured to match, by the network device, a query in a social information base according to the face information in the target image to determine one or more candidate second social users matching the face information; and screening second social users from the one or more candidate second social users according to the shooting position information of the target image and the activity area of each candidate second social user, wherein the activity area of the second social users covers the shooting position information. Here, the activity area of the second social user includes an activity area obtained through an activity track of the user.
For example, the network device determines a plurality of candidate second social users, such as a second social user B and a second social user C, matched with the face information according to a matching query of the face information in the target image in a social information base; and then the network equipment screens a second social user C from the two second social users according to the shooting position information XXX square of the target image and the activity area of each candidate second social user, such as the activity areas of the second social user B and the second social user C shown in the figures 6a and 6B, wherein the activity area of the second social user C covers the shooting position information. As shown in fig. 6b, the activity area of the second user C covers the shooting location information XXX square, or the shortest distance between the activity area of the second user C and the scene of the shooting location information CCC is less than 300 meters, which is preset by computer statistical analysis, for example, 300 meters in some embodiments.
In some embodiments, the device further comprises a network device for detecting whether the target image meets a real-time shooting condition; the second module is configured to, if the target image meets the real-time shooting condition, screen, by the network device, a second social user from the one or more candidate second social users according to the shooting location information of the target image and the activity area of each candidate second social user, where the activity area of the second social user covers the shooting location information. Here, the real-time photographing condition includes, but is not limited to, that the target image is obtained by live photographing, is processed by PS (Adobe Photoshop, image processing software) by live photographing, or is obtained by live photographing and forwarding; not including the EXIF (Exchangeable image file format) information obtained by screen capture (unable to carry the original picture) or by copying (copying by photographic method, new EXIF information will be generated).
For example, the network device detects whether the target image meets the real-time shooting condition, and if the target image is not obtained by screen capture and copying but by field shooting, the target image meets the real-time shooting condition; the network equipment acquires the shooting position information XXX square of the target image and the activity area of each candidate second social user, such as the activity area of a second social user B and the activity area of a second social user C shown in FIGS. 6a and 6B; the network equipment obtains a second social user C from the two second social users through screening, wherein the activity area of the second social user C covers the shooting position information. As shown in fig. 6b, the activity area of the second user C covers the shooting location information XXX square, or the shortest distance between the activity area of the second user C and the scene of the shooting location information CCC is less than 300 meters, which is preset by computer statistical analysis, for example, 300 meters in some embodiments.
In some embodiments, an activity area of the second social user when the target image is captured covers the capturing location information.
For example, the activity area XXX square of the second social user when the target image is captured covers the capturing position information XXX square of the target image, or the shortest distance between the activity area XXX square of the second social user when the target image is captured and the capturing position information CCC scene of the target image is less than 300 meters, in some embodiments, the coverage distance threshold information is preset by computer statistical analysis, for example 300 meters.
In some embodiments, the real-time shooting condition includes, but is not limited to, any one of the following or a combination thereof: the shooting information of the target image comprises shooting time information of the target image; the difference value between the receiving time information of the request for adding the social contact persons and the shooting time information of the target image is smaller than or equal to the preset time interval threshold value information; actual scene information in the target image is matched with shooting position information of the target image; and matching the actual scene information in the target image with the shooting time information of the target image.
For example, in some embodiments, the real-time photographing condition includes photographing information of the target image, such as photographing time information of the target image; that is, the shooting time information "2018/1/19" of the target image is included in the shooting information of the target image, and the pm15. In some embodiments, the network device receives a difference value between the reception time information "2018/1/19, pm15; in some embodiments, the predetermined time interval threshold information is obtained by computer statistical analysis for 48 hours. In other embodiments, for example, the network device obtains the actual scene information XXX square in the target image, and the shooting position information of the target image is the fountain landscape position in the XXX square, so that the real-time shooting condition is satisfied. For example, the network device obtains actual scene information XXX squares in the target image, and shooting location information CCC scenic region of the target image, wherein the distance between the XXX squares and the CCC scenic region is 300 meters, which is less than a predetermined distance threshold 1000 meters, and the real-time shooting condition is satisfied, and in some embodiments, the predetermined distance threshold 1000 meters is obtained by computer statistical analysis. For another example, the network device obtains actual scene information XXX city in a target image, and shooting location information AAA city of the target image, where the distance between the two cities is 3003 meters, and is greater than the predetermined distance threshold 1000 meters, and the real-time shooting condition is not satisfied, and the target image may be obtained by copying, and in some embodiments, the predetermined distance threshold 1000 meters is obtained by computer statistical analysis. In other embodiments, the network device obtains the actual scene information in the target image, such as XXX square in the sun, and the shooting time information "2018/1/19, pm14" of the target image satisfies the real-time shooting condition. For another example, the network device acquires the XXX plaza under the sunlight of the actual scene information in the target image, and the shooting time information "2018/1/19, pm23.
It will be understood by those skilled in the art that the above-mentioned contents of the real-time photographing condition are only examples, and other contents of the real-time photographing condition that exist or may appear in the future, such as being applicable to the present application, should be included in the scope of the present application, and are included herein by reference.
In some embodiments, the second module includes a second first module and a second module (both not shown), wherein the second first module is used for the network device to extract the face information from the target image; and the second module is used for the network equipment to determine a second social user matched with the face information according to the matching query of the face information in a social information base.
For example, the network device extracts face information from a target image, and obtains the face information of the queried social contact from the target image based on a face recognition technology, and in some embodiments, the network device detects the target image, accurately calibrates the position and size of the face in the image, and further extracts feature data of the face from image processing (such as light compensation, gray scale transformation, histogram equalization, filtering, or sharpening), so as to obtain the face information. And the network equipment searches and matches the face information with the feature template stored in the social information base, and outputs the result obtained by matching when the similarity exceeds a preset threshold value. A large amount of characteristic templates which are based on face image information and obtained through recognition algorithm and machine learning are stored in the social information base. And the network equipment determines a second social user matched with the face information according to the matching query of the face information in the social information base.
In some embodiments, the second module is configured to extract, by the network device, face information from the target image according to the selection marker information of the first social user in the target image. Here, the selection marker information includes marker information for selecting a social contact to be added by making a check or a circle in the target image.
For example, the first social user a selects the social contact to be added in the target image by checking. And the network equipment extracts face information from the target image according to the tick mark information of the first social contact user A in the target image.
It will be understood by those skilled in the art that the above-mentioned contents of the selectable marker information are merely examples, and that other contents of the selectable marker information, which are present or may appear in the future, such as applicable to the present application, are also included within the scope of the present application and are hereby incorporated by reference.
In some embodiments, the second module is configured to match, by the network device, a query in a social information base according to the face information in the target image, the shooting location information of the target image, and other face information in the target image, to determine a second social user matching the face information, where an activity area of other social users matching the other face information covers the shooting location information.
For example, in some embodiments, the target image includes a plurality of face information, including face information of a social contact to be added and face information of other social users C, and shooting location information XXX square of the target image; and the network equipment matches and queries in the social information base according to the face information of the social contact person to be added to determine a second social user B matched with the face information, and obtains other social users C based on other face information, wherein the activity area XXX square of the other social users C covers the shooting position information XXX square of the target image. In some embodiments, the other social users C include social users who have established a social connection with the first social user or social users who have not established a social connection with the first social user. In some embodiments, the network device may not obtain the activity area of the second social user B, but may obtain the activity areas of other social users C, and the activity areas of other social users C are consistent with the shoot location information, such as the activity areas XXX squares of other social users C, which are fountain landscape locations in the XXX squares.
FIG. 4 shows a schematic diagram of an apparatus for locating social contacts according to another embodiment of the present application. The device comprises a fourth module, a fifth module and a sixth module, wherein the fourth module is used for receiving a request for inquiring the social contact person, which is submitted by a first social user through user equipment, by the network device, wherein the request for inquiring the social contact person comprises a target image; the fifth module is used for the network equipment to match and query in a social information base according to the face information in the target image so as to determine a second social user matched with the face information; the sixth module is configured to send, by the network device, the social information of the second social user to the user device. Here, the target image includes image information of social contacts to be queried by the first social user. The social information of the second social user includes, but is not limited to, social account information, social avatar information, or social connection information.
For example, the network device receives a query social contact request submitted by a first social user A through its user device, wherein the query social contact request includes a target image. The network equipment obtains the face information of the inquired social contact person from the target image based on a face recognition technology, and then the network equipment inquires a second social user B matched with the face information from the social information base. Social information (e.g., social account information) of the second social user B is sent to the user device of the first social user a. In some embodiments, the network device detects a target image, accurately calibrates the position and size of a face in the image, further extracts feature data of the face, i.e., face information, from image processing (e.g., light compensation, gray level transformation, histogram equalization, filtering, or sharpening), searches and matches the face information with a feature template stored in a social information base, and outputs a result obtained from the matching when the similarity exceeds a preset threshold. The social contact information base stores a large amount of face image information, the characteristic templates obtained through an identification algorithm and machine learning are used for identifying faces in the target images, the problem that a user can still be connected with the other side when the social contact information of a social contact person to be inquired is unknown is solved, the information of the other side can be inquired conveniently to establish a social relationship between the users, and the social experience of the users is improved.
In some embodiments, the device is further configured for the network device to desensitize the social information of the second social user; sending the social information of the second social user to the user equipment, wherein the sending of the social information of the second social user to the user equipment comprises sending the desensitized social information of the second social user to the user equipment by network equipment. The desensitization processing comprises data desensitization, namely data deformation is carried out on sensitive information through desensitization rules, and reliable protection of sensitive private data is achieved.
For example, the network device desensitizes the social information of the second social user, where the social information of the second social user includes social account information, social avatar information, and social contact information (e.g., contact phone information), and the network device desensitizes the social contact information (e.g., contact phone information) therein. In some embodiments, the network device performs desensitization processing using desensitization methods, which include, but are not limited to, substitution, invalidation, out-of-order, or symmetric encryption. And the network equipment sends the desensitized social information (including social account information and social head portrait information) of the second social user to the user equipment of the first social user A.
In some embodiments, the device is further configured to receive, by the network device, a request for adding a contact about the second social user sent by the first social user through the user device; the network device establishes a social connection between the first social user and the second social user.
For example, in some embodiments, the first social user a issues a request for adding a contact with respect to the second social user based on the social information of the second social user found in the foregoing, and the network device receives the request for adding the second social user B sent by the first social user a through its user device; the network device establishes a social connection of a first social user a with a second social user B.
In some embodiments, the fifth module is configured to match, by the network device, a query in a social information base according to the face information in the target image and the shooting location information of the target image, to determine a second social user matching the face information, where an activity area of the second social user covers the shooting location information. Here, the coverage includes that the activity area of the second user covers the shooting position GPS information, or that the shortest distance between the activity area of the second user and the shooting position GPS information is less than or equal to predetermined coverage distance threshold information, which in some embodiments is preset by computer statistical analysis, for example, 50 meters.
For example, the network device matches a query in a social information base according to the face information in the target image and shooting location information (e.g., XXX square) of the target image to determine a second social user B matching the face information, wherein, in some embodiments, an activity area of the second social user B covers the shooting location information, for example, an activity area XXX square of the second social user B, and the shooting location is a landscape fountain location in the XXX square; in other embodiments, the shortest distance between the activity area XXX square of the second user B and the shooting location GPS information XX coffee shop is equal to the predetermined coverage distance threshold of 50 meters. In some embodiments, the network device determines the shooting location information according to EXIF (Exchangeable image file format) information of the target image, extracts GPS information (for example, 121 ° 27 '15' east longitude and 31 ° 12 'north latitude 26') from the target image, and converts the GPS information into a geographic location to obtain the shooting location information "XXX square". In other embodiments, the network device performs matching query on the background building group of the target image in a geographic database to obtain shooting location information XXX square of the target image.
FIG. 5 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as illustrated in FIG. 5, the system 500 can be a device that adds or locates social contacts in any of the described embodiments. In some embodiments, system 500 may include one or more computer-readable media (e.g., system memory or NVM/storage 520) having instructions and one or more processors (e.g., processor(s) 505) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 510 may include any suitable interface controllers to provide any suitable interface to at least one of the processor(s) 505 and/or any suitable device or component in communication with system control module 510.
For one embodiment, system control module 510 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 520 and communication interface(s) 525.
For example, NVM/storage 520 may be used to store data and/or instructions. NVM/storage 520 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drive(s) (HDD (s)), one or more Compact Disc (CD) drive(s), and/or one or more Digital Versatile Disc (DVD) drive (s)).
NVM/storage 520 may include storage resources that are physically part of a device on which system 500 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 520 may be accessed over a network via communication interface(s) 525.
Communication interface(s) 525 may provide an interface for system 500 to communicate over one or more networks and/or with any other suitable device. System 500 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 505 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 530) of system control module 510. For one embodiment, at least one of the processor(s) 505 may be packaged together with logic for one or more controller(s) of the system control module 510 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 505 may be integrated on the same die with logic for one or more controller(s) of the system control module 510. For one embodiment, at least one of the processor(s) 505 may be integrated on the same die with logic for one or more controller(s) of the system control module 510 to form a system on a chip (SoC).
In various embodiments, system 500 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a holding computing device, a tablet, a netbook, etc.). In various embodiments, system 500 may have more or fewer components and/or different architectures. For example, in some embodiments, system 500 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
Additionally, some portions of the present application may be applied as a computer program product, such as computer program instructions, which, when executed by a computer, may invoke or provide the method and/or solution according to the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. In this regard, computer readable media can be any available computer readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital, or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, feRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (12)
1. A method for adding social contacts, wherein the method comprises:
receiving a request for adding a social contact submitted by a first social user through user equipment, wherein the request for adding the social contact comprises a target image;
matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information;
establishing a social connection between the first social contact user and the second social contact user according to the account information of the second social contact user;
wherein, the matching query in a social information base according to the face information in the target image to determine a second social user matched with the face information comprises:
firstly, matching and inquiring in a social information base according to the face information in the target image to determine one or more candidate second social users matched with the face information;
detecting whether the target image meets a real-time shooting condition;
and if the target image meets the real-time shooting condition, screening second social users from the one or more candidate second social users according to the shooting position information of the target image and the activity area of each candidate second social user, wherein the activity area of the second social users covers the shooting position information, the activity area is obtained through the activity track of the second social users, and the real-time shooting condition comprises that the target image is obtained by field shooting instead of screen capture or copying.
2. The method of claim 1, wherein an activity area of the second social user when the target image is captured overlaps the capture location information.
3. The method according to claim 1 or 2, wherein the real-time photographing condition satisfies at least any one of:
the shooting information of the target image comprises shooting time information of the target image;
the difference value between the receiving time information of the request for adding the social contact persons and the shooting time information of the target image is smaller than or equal to the preset time interval threshold value information;
actual scene information in the target image is matched with shooting position information of the target image;
and matching the actual scene information in the target image with the shooting time information of the target image.
4. The method of any of claims 1-3, wherein the matching a query in a social information repository from the face information in the target image to determine a second social user matching the face information comprises:
extracting face information from the target image;
and matching and inquiring in a social information base according to the face information to determine a second social user matched with the face information.
5. The method of claim 4, wherein said extracting face information from the target image comprises:
and extracting face information from the target image according to the selective marker information of the first social user in the target image.
6. The method of claim 5, wherein the matching a query in a social information repository based on the face information to determine a second social user matching the face information comprises:
and matching and inquiring in a social information base according to the face information in the target image, the shooting position information of the target image and other face information in the target image to determine a second social user matched with the face information, wherein the shooting position information is covered by the activity area of other social users matched with the other face information.
7. A method for finding social contacts, comprising:
receiving a request for inquiring social contacts, which is submitted by a first social user through user equipment, wherein the request for inquiring the social contacts comprises a target image;
matching and querying in a social information base according to the face information in the target image to determine a second social user matched with the face information;
sending the social information of the second social user to the user equipment;
wherein, the matching query in a social information base according to the face information in the target image to determine a second social user matched with the face information comprises:
firstly, matching and inquiring in a social information base according to the face information in the target image to determine one or more candidate second social users matched with the face information;
detecting whether the target image meets a real-time shooting condition;
and if the target image meets the real-time shooting condition, screening second social users from the one or more candidate second social users according to the shooting position information of the target image and the activity area of each candidate second social user, wherein the activity area of the second social user covers the shooting position information, the activity area is obtained through the activity track of the second social user, and the real-time shooting condition comprises that the target image is obtained by shooting on site instead of through screen capture or copying.
8. The method of claim 7, wherein the method further comprises:
desensitizing social information of the second social user;
wherein sending the social information of the second social user to the user device comprises:
sending the social information of the second social user after desensitization processing to the user equipment.
9. The method of claim 7 or 8, wherein the method further comprises:
receiving a contact adding request sent by the first social user through the user equipment and about the second social user;
establishing a social connection between the first social user and the second social user.
10. An apparatus for adding social contacts, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 1 to 6.
11. An apparatus for locating a social contact, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of the method of any of claims 7 to 9.
12. A computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of any of the methods of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811159333.3A CN109388722B (en) | 2018-09-30 | 2018-09-30 | Method and equipment for adding or searching social contact |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811159333.3A CN109388722B (en) | 2018-09-30 | 2018-09-30 | Method and equipment for adding or searching social contact |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109388722A CN109388722A (en) | 2019-02-26 |
CN109388722B true CN109388722B (en) | 2022-10-11 |
Family
ID=65419103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811159333.3A Active CN109388722B (en) | 2018-09-30 | 2018-09-30 | Method and equipment for adding or searching social contact |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109388722B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110110240A (en) * | 2019-04-30 | 2019-08-09 | 上海掌门科技有限公司 | Establish the method and apparatus of social networks |
CN116385011A (en) * | 2019-12-20 | 2023-07-04 | 刘净 | Intelligent transaction method and system based on quantum AI remote sensing vision |
CN112667918A (en) * | 2020-12-24 | 2021-04-16 | 郑贤良 | Communication method based on social communication tool |
CN115002269B (en) * | 2021-03-01 | 2023-03-24 | 华为技术有限公司 | Method, device and system for reading address book and computer readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905976A (en) * | 2012-12-26 | 2014-07-02 | 腾讯科技(深圳)有限公司 | Social network user searching method, terminal, server and system |
WO2014179749A1 (en) * | 2013-05-02 | 2014-11-06 | Pribula Alexis Juri | Interactive real-time video editor and recorder |
CN106383913A (en) * | 2016-10-19 | 2017-02-08 | 珠海格力电器股份有限公司 | Face brushing friend-making method and device based on communication terminal |
CN107527012A (en) * | 2017-07-14 | 2017-12-29 | 深圳云天励飞技术有限公司 | Make a dash across the red light monitoring method, device and monitoring processing equipment |
CN107682250A (en) * | 2017-10-18 | 2018-02-09 | 上海掌门科技有限公司 | A kind of method and apparatus for being used to perform social operation |
CN108154074A (en) * | 2016-12-02 | 2018-06-12 | 金德奎 | A kind of image matching method identified based on position and image |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8670597B2 (en) * | 2009-08-07 | 2014-03-11 | Google Inc. | Facial recognition with social network aiding |
US20130156274A1 (en) * | 2011-12-19 | 2013-06-20 | Microsoft Corporation | Using photograph to initiate and perform action |
US20140207579A1 (en) * | 2013-01-18 | 2014-07-24 | Salesforce.Com, Inc. | Syndication of online message content using social media |
US20160275634A1 (en) * | 2015-03-18 | 2016-09-22 | Linkedln Corporation | Using large data sets to improve candidate analysis in social networking applications |
CN106484737A (en) * | 2015-09-01 | 2017-03-08 | 腾讯科技(深圳)有限公司 | A kind of network social intercourse method and network social intercourse device |
CN105429848B (en) * | 2015-10-23 | 2019-07-12 | 广东小天才科技有限公司 | Method, system and social system of social server for adding friends by taking pictures |
CN107154890B (en) * | 2016-03-02 | 2020-09-18 | 腾讯科技(深圳)有限公司 | Method, device and system for adding contact persons in social network |
US10298663B2 (en) * | 2016-04-27 | 2019-05-21 | International Business Machines Corporation | Method for associating previously created social media data with an individual or entity |
WO2018119599A1 (en) * | 2016-12-26 | 2018-07-05 | 深圳前海达闼云端智能科技有限公司 | Method and device for searching for person and communication system |
CN107395780A (en) * | 2017-06-23 | 2017-11-24 | 上海斐讯数据通信技术有限公司 | Social communication method, apparatus and computer-processing equipment based on recognition of face |
CN107302492A (en) * | 2017-06-28 | 2017-10-27 | 歌尔科技有限公司 | Friend-making requesting method, server, client terminal device and the system of social software |
-
2018
- 2018-09-30 CN CN201811159333.3A patent/CN109388722B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103905976A (en) * | 2012-12-26 | 2014-07-02 | 腾讯科技(深圳)有限公司 | Social network user searching method, terminal, server and system |
WO2014179749A1 (en) * | 2013-05-02 | 2014-11-06 | Pribula Alexis Juri | Interactive real-time video editor and recorder |
CN106383913A (en) * | 2016-10-19 | 2017-02-08 | 珠海格力电器股份有限公司 | Face brushing friend-making method and device based on communication terminal |
CN108154074A (en) * | 2016-12-02 | 2018-06-12 | 金德奎 | A kind of image matching method identified based on position and image |
CN107527012A (en) * | 2017-07-14 | 2017-12-29 | 深圳云天励飞技术有限公司 | Make a dash across the red light monitoring method, device and monitoring processing equipment |
CN107682250A (en) * | 2017-10-18 | 2018-02-09 | 上海掌门科技有限公司 | A kind of method and apparatus for being used to perform social operation |
Non-Patent Citations (3)
Title |
---|
Close Human Interaction Recognition Using Patch-Aware Models;Yu Kong等;《IEEE Transactions on Image Processing 》;20151105;第25卷(第1期);1-5 * |
位置社交网络中区域多样性增强推荐算法;孙兰兰;《兰州工业学院学报》;20171031;第24卷(第5期);69-74 * |
基于Android跌倒监测系统的设计与实现;李美惠;《中国优秀硕士学位论文全文数据库信息科技辑》;20170615(第6期);I140-383 * |
Also Published As
Publication number | Publication date |
---|---|
CN109388722A (en) | 2019-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057948B2 (en) | Method and apparatus for connecting to wireless access point | |
CN109388722B (en) | Method and equipment for adding or searching social contact | |
WO2018205970A1 (en) | Identity authentication method, device and system | |
CN106792992B (en) | A method and device for providing wireless access point information | |
JP6546315B2 (en) | Short range information transmission | |
US11221389B2 (en) | Statistical analysis of mismatches for spoofing detection | |
US10574728B2 (en) | User pairing method and apparatus, and data exchange method, apparatus, and system | |
US11212641B2 (en) | Method and apparatus for verifying entity information | |
JP2016517518A (en) | Access point selection for assistance data generation | |
CN111832579A (en) | Map interest point data processing method and device, electronic equipment and readable medium | |
CN109890024B (en) | Method and equipment for determining rescue group information | |
US11238563B2 (en) | Noise processing method and apparatus | |
CN106211321B (en) | For the method and apparatus for the positional information for determining user equipment | |
RU2628924C1 (en) | System and method of data protection, while the mobile device is interacting with computer | |
TW202025011A (en) | Management apparatus and management method thereof for electronic equipment | |
CN107396363B (en) | A method and device for pre-authorizing wireless connection to user equipment | |
CN106777072B (en) | A method, device and system for providing presentation information | |
US11122437B2 (en) | Detection of GPS spoofing using wireless network visibility to mobile devices | |
CN110635995A (en) | Method, device and system for realizing interaction between users | |
CN107404722B (en) | A method and device for pre-authorizing wireless connection to user equipment | |
JP2017046324A (en) | User terminal, object recognition server, notification method and user terminal program | |
CN115515116A (en) | Health information authentication method and system | |
CN108235246A (en) | A kind of indoor orientation method and system | |
CN111988215B (en) | Method, equipment and computer readable medium for pushing user | |
CN104967987A (en) | Method and server for mobile terminal positioning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |