Filtering structured search queries based on privacy settings
Filtering Structured Search Queries Based on Privacy Settings In particular embodiments, a method includes receiving an unstructured text query, identifying nodes and edges from a social graph that correspond to n-grams in the text query, generating structured queries that include references to the...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Filtering Structured Search Queries Based on Privacy Settings In particular embodiments, a method includes receiving an unstructured text query, identifying nodes and edges from a social graph that correspond to n-grams in the text query, generating structured queries that include references to the identified nodes and edges, receiving a selection of a structured query, identifying target nodes that correspond to the structured query, and then generating search results that include target nodes with privacy settings where the nodes and edges along the path connecting the target node and the querying user are all visible to the user. ACCESSING A SOCIAL GRAPH COMPRISING A PLURALITY OF NODES AND A PLURALITY OF EDGES 810--. CONNECTING THE NODES, THE NODES COMPRISING A FIRST-USER NODE AND A PLURALITY OF SECOND USER NODES BEING WITHIN A THRESHOLD DEGREE OF SEPARATION OF THE FIRST-USER NODE 820-i RECEIVING FROM THE FIRST USER A TEXT QUERY COMPRISING ONE OR MORE CHARACTER STRINGS IDENTIFYING ONE OR MORE OF THE SECOND 830-w USER NODES, EACH OF THE IDENTIFIED SECOND-USER NODE CORRESPONDING TO ONE OR MORE OF THE CHARACTER STRINGS DENTIFYING ONE OR MORE OF THE EDGES, EACH OF THE IDENTIFIED EDGES BEING CONNECTED TO 840- ONE OF THE SECOND-USER NODES, AND EACH OF THE IDENTIFIED EDGES CORRESPONDING TO ONE OR MORE OF THE CHARACTER STRINGS GENERATING ONE OR MORE RECOMMENDED QUERIES THAT EACH COMPRISE 850 REFERENCES TO ONE OR MORE OF THE IDENTIFIED SECOND-USER NODES AND ONE OR MORE OF THE IDENTIFIED EDGES |
---|