Commodity recommendation method and system for simple mixed privacy protection scene
A product recommendation and privacy protection technology, applied in the field of information processing, can solve the problems that cannot meet the privacy requirements of simple mixed scenarios, and achieve the effect of meeting privacy requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] This embodiment provides a product recommendation method for simple hybrid privacy protection scenes, the product recommendation method is applied to the product recommendation party, figure 1 It is a flow block diagram of a product recommendation method for a simple hybrid privacy protection scene according to an embodiment of the present invention. like figure 1 As shown, the product recommendation method generally includes the following steps:
[0049]S10: After receiving the recommended request of the target user, obtain the user ID corresponding to the target user and sends the user ID to the aid;
[0050] Pre-stored users and corresponding user IDs in the product recommendation, one of the users who pre-stored in the commodity recommendation party. After receiving the recommended request issued by the target user, the product recommendary is acquired the user ID corresponding to the target user based on the pre-stored user and the corresponding user ID, and transmits ...
Embodiment 2
[0088] image 3 It is a structural block diagram of a product recommendation system for a simple hybrid privacy protection scene according to an embodiment of the present invention. like image 3 As shown, corresponding to the product recommendation method for the simple hybrid privacy protection scene, the second embodiment provides a product recommendation system for simple hybrid privacy protection scenarios, which generally includes acquisition module 10, calculated Module 20 and determination module 30. After the acquisition module 10 is used to obtain the user ID corresponding to the target user after receiving the recommended request to the target user, and send the user ID to the aid. The calculation module 20 is coupled to the acquisition module 10 for receiving a user representation of the auxiliary party feedback, and represents all the items obtained by the user and through the preset model to represent the candidate product, the user represents The auxiliary part is ca...
Embodiment 3
[0092] According to the above method, the present invention also provides a computer device, including:
[0093] Processors and memory, memory programs that can be run on can be run on the processor, and when the computer program is executed by the processor, a product recommendation method for simple hybrid privacy protection scenarios provided for simple hybrid privacy protection scenarios is performed.
[0094] in, Figure 4 The exemplary display of the computer device can include a processor 1510, a video display adapter 1511, a disk drive 1512, an input / output interface 1513, a network interface 1514, and a memory 1520. The processor 1510, the video display adapter 1511, the disk drive 1512, the input / output interface 1513, and the network interface 1514, and the memory boss can communicate with the memory bus 1530.
[0095] The processor 1510 can be implemented using a universal CPU (Central Processing Unit, Central Processor), Microprocessor, Application Specific Integra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



