Method for protecting privacy of users
A user privacy and user technology, applied in the field of Internet social networking and communication, can solve problems such as increasing the possibility, reducing the willingness of the message sender to use, and being cumbersome.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0029]Embodiment 1: download and install the social and communication software described in the present invention on the client, client comprises mobile phone, panel computer, notebook computer and desktop computer, starts and registers account number, uses this account number as user identity after successful registration Login, the user interface of social and communication software includes stranger address book, social circle, regular address book, life circle, enter the stranger address book, you can use the location function to search for other nearby users who use the social and communication software, these users It is the contact in the stranger's address book. You can view the distance information of the contact in the stranger's address book. You cannot view the avatar and nickname information independently set by the contact in the stranger's address book. Identify the identities of the contacts, select one of the contacts, send messages to them for chatting, send t...
Embodiment 2
[0030] Embodiment 2: download and install the social and communication software described in the present invention on the client, client comprises mobile phone, panel computer, notebook computer and desktop computer, starts and registers account number, uses this account number as user identity after successful registration Log in, choose to import contacts from the mobile phone address book, other users of the social and communication software who have successfully imported several mutually stored mobile phone numbers are contacts in the regular address book, and the contacts in the regular address book imported from the mobile phone address book are displayed The avatar and nickname information, does not display the distance information; other steps are the same as in embodiment 1.
Embodiment 3
[0031] Embodiment 3: download and install the social and communication software described in the present invention on the client, client comprises mobile phone, panel computer, notebook computer and desktop computer, starts and registers account number, uses this account number as user identity after successful registration Log in, choose to import contacts from WeChat address book, and successfully import several other users of the social and communication software who are WeChat friends as contacts in the regular address book, and display the contacts in the regular address book imported from the WeChat address book The avatar and nickname information, does not display the distance information; other steps are the same as in embodiment 1.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com