This application is based on and claims priority to Chinese Patent Application No. 201510462784.4, filed on Jul. 31, 2015, the entire contents of which are incorporated herein by reference.
The present disclosure generally relates to the field of communications technologies, and more particularly, to a photo sharing method and device.
Smart mobile terminals of today can take high quality photos and have largely replaced dedicated cameras as a quick way to record snapshots of people's daily lives. In group activities such as parties and other social gatherings, each participant may take some photos, and may share these photos with other participants. The participants may achieve photo sharing by manually sending photos to each other via, e.g., social media platforms such as WeChat. For example, A, B, C and D may have participated in a party and have each taken some party photos. To share the photos, A may manually send photos taken by her to B, C and D using WeChat™, Twitter, short messaging or the like. In a similar way, B may send his photos to A, C and D; C may send her photos to A, B and D; and D may send his photos to A, B and C.
The present disclosure provides a photo sharing method and device. This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In one embodiment, a photo sharing method is disclosed. The method includes receiving by a cloud server an event photo sharing request sent by a terminal of an initiator of the request, wherein the event photo sharing request comprises an event marker and account identification information of an cloud account of the initiator in the cloud server; acquiring by the cloud server, from a cloud album corresponding to the cloud account of the initiator, a first event photo set based on the event marker; acquiring by the cloud server, according to at least one contact contained in a contact list in the cloud account of the initiator, at least one second event photo set each from a cloud album of a corresponding one of the at least one contact of the initiator, wherein each photo in the at least one second event photo set is marked with the event marker; and sending a combined event photo set comprising the first event photo set and the at least one second event photo set to the initiator and each contact of the initiator corresponding to each of the at least one second event photo set.
In another embodiment, a photo sharing system is disclosed. The photo sharing system includes a processor; and a memory configured to store instructions executable by the processor, wherein the processor is configured to cause the photo sharing system to receive an event photo sharing request sent by a terminal of an initiator of the request, wherein the event photo sharing request comprises an event marker and account identification information of an cloud account of the initiator in the system, acquire, from a cloud album corresponding to the cloud account of the initiator, a first event photo set based on the event marker, acquire, according to at least one contact contained in a contact list in the cloud account of the initiator, at least one second event photo set each from a cloud album of a corresponding one of the at least one contact of the initiator, wherein each photo in the at least one second event photo set is marked with the event marker, and end a combined event photo set comprising the first event phot set and the at least one second event photo set to the initiator and each contact of the initiator corresponding to each of the at least one second event photo set.
In yet another embodiment, a non-transitory computer-readable storage medium is disclosed. The storage medium has stored therein instructions that, when executed by a processor of a server, causes the server to receive an event photo sharing request sent by a terminal of an initiator of the request, wherein the event photo sharing request comprises an event marker and account identification information of an cloud account of the initiator in the server; acquire, from a cloud album corresponding to the cloud account of the initiator, a first event photo set based on the event marker; acquire, according to at least one contact contained in a contact list in the cloud account of the initiator, at least one second event photo set each from a cloud album of a corresponding one of the at least one contact of the initiator, wherein each photo in the at least one second event photo set is marked with the event marker; and send a combined event photo set comprising the first event photo set and the at least one second event photo set to the initiator and each contact of the initiator corresponding to each of the at least one second event photo set.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and, together with the description, serve to explain the principles of the disclosure.
Specific embodiments of the present disclosure are shown by the above drawings, and more detailed description will be made hereinafter. These drawings and text description are not for limiting the scope of conceiving the present disclosure in any way, but for illustrating the concept of the present disclosure for those skilled in the art by referring to specific embodiments.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise represented. The implementations set forth in the following description of exemplary embodiments do not represent all implementations consistent with the disclosure. Instead, they are merely examples of apparatuses and methods consistent with aspects related to the disclosure as recited in the appended claims.
Terms used in the disclosure are only for purpose of describing particular embodiments, and are not intended to be limiting. The terms “a”, “said” and “the” used in singular form in the disclosure and appended claims are intended to include a plural form, unless the context explicitly indicates otherwise. It should be understood that the term “and/or” used in the description means and includes any or all combinations of one or more associated and listed terms.
It should be understood that, although the disclosure may use terms such as “first”, “second” and “third” to describe various information, the information should not be limited herein. These terms are only used to distinguish information of the same type from each other. For example, first information may also be referred to as second information, and the second information may also be referred to as the first information, without departing from the scope of the disclosure. Based on context, the word “if” used herein may be interpreted as “when”, or “while”, or “in response to a determination”.
The term “smart terminal”, “terminal device”, “terminal”, “mobile phone”, “smart phone”, “terminal device”, “mobile terminal”, “mobile device” and the like are used interchangeably in this disclosure. An “application” or “app” refers to a software program that may be installed on a mobile terminal. An application may appear as an icon on the displayed interface of an operating system of the mobile terminal. An application may be run by a user when activated by the user via appropriate input means (e.g., double click through a mouth-cursor input means, or click of the app icon via a touch screen). An application, when being run on the mobile terminal, may provide a user interface for accepting user instructions and may communicate with an application server via any form of communication channels to obtain services desired by the user.
By way of introduction to the method and device embodiments according to the present disclosure,
Each collection of photos for a particular user is herein referred to as a cloud album. User photos stored in the cloud may be associated with labels or markers indicating the context information for each individual photo, such as time, date, and location. Thus, photos with like time, date and location in the cloud photo album of a user may be recognizable as a set of photos taken from one event or setting. Sets of such photos are illustrated by 6-A, 6-B, 6-C, and 6-D. The cloud service may further include an image analysis tool 7 with face-recognition capability (herein referred to as “face-recognition tool”) that may be used for analyzing photos in various embodiments disclosed below. For example, the face recognition tool may be used to find faces belonging to a same person across albums (of different users). Thus, photo sets from different users taken from like time and location and further with common faces may be positively identified as related sets associated with the same event or setting, such as the sets within 6-A, 6-B, 6-C, and 6-D identified as “July 4th party set” in
The contact information 4A, 4B, 4C and 4D of a contact of the respective user again may include but is not limited to name, phone number, email address, account ID within this same cloud service, other social media account IDs, and profile picture such as a portrait of the contact. The cloud service may use the contact information to automatically share photos by for example, copying the photos to be shared into the photo album of the user to be shared within the same cloud service 1 (if the contact is also a user of and thus has an account with the could service 1). Alternatively, the photos to be shared may be sent to the phone number, email address, or other social media accounts of the user to be shared with. In the example illustrated in
The cloud service may further contain software component 8, herein referred to as “association software”, that is capable of associating images in user photo albums with contacts across user accounts via the face-recognition tool. Specifically, a face in the profile picture of the contact information for contact (which may also be a user of the cloud service 1) may be matched with a face in a photo image in an album. The user corresponding to that contact information may thus be recognized automatically as one of the targets for photo sharing. In the example
Photos may alternatively be marked by the cloud service. Specifically, the cloud service may analyze and tag or mark each photo according to the time, location, and the facility information when the photo was taken based on image tagging algorithms. The cloud service may further refine the tagging or marker by analyzing a group of photos and finding the correlation between the photos and tag the photos in groups. The users may access the tags or markers under their cloud. When the user decides to and makes request to share a single or a group of photos, the markers for these photos may be directly identified by the cloud service receiving the request.
All these photos may be also stored in cloud accounts for A, B, C, and D. Specifically, each user may upload and store data contents (such as a contact list, photos, and the like) in the user terminal into the cloud server under the corresponding cloud account for each user. The event marker information discussed above and as part of the photos will be stored in the cloud accounts as well. The markers may be stored by the cloud services together with the photo (as, for example, part of header information for the photo) or separate from the photo itself. For this purpose, each user may register and obtain a user account in the cloud server prior to using the service, and correspondingly the cloud server may allocate certain memory space for each registered user to store data contents related to the user including the photos and associated markers.
For an exemplary application of step 101, the user of terminal A may be the initiator of the request to share July 4th party photos and may send the request to the cloud server. Specifically, the cloud app installed in terminal A may provide functions and an interface for sending request for sharing event photos among participants. The user of terminal A may thus start the cloud app and input the user account (or alternatively, the user account information may be already stored in the cloud app and attached to the request automatically) and determine marker information for the set of photos that the user of terminal A desires to share. For example, the user may select one of the photos in her album and use marker for that photo as the marker information for the set of photos that she desire to share. The cloud app may combine at least the user account and marker information into an event photo sharing request and sends it to the cloud server.
In Step 102 of
In one implementation of the step 103 above, after the each contact contained in the contact list corresponding to the initiator user account is obtained, cloud account identifying information corresponding to each contact in the contact list may be determined by the cloud server according to a correspondence relation between the each contact user account and each contact information in the contact list of the initiator (such as the name of the contact or the phone number information of the contact). Then, for the album of cloud account of each contact, the cloud server determines whether an event photo set (i.e., one of the second event photo sets) marked with marker information identical to the marker information in the event photo sharing request is present and acquire the photo set (if exist) as one of the second sets of event photos.
In Step 104, the server combines the first set of event photos and all the second sets of event photos in to a combined collection of event photos to-be-shared (also referred to herein as a combined event photos or event photos to-be-shared). In Step 105, the collection of event photos to-be-shared is sent to the initiator and each contact in the contact list of the initiator corresponding to each set of the second sets of event photosrespectively according to contact information of the initiator and contact information of each corresponding contact. Thus, a contact whose album does not contain any identified photo of the same event may not be sent the collection of event photos to-be-shared. That way, it is more probable that the photos are only shared among the likely participants of the event. Alternatively, the cloud may also be configured to send the collection to all contacts of the initiator regardless of whether a contact have any identified event photos in its album (the rationale for this alternative is that all of the initiator's friend may want to see photos related to the initiator).
For example, in the context of
Thus, in the embodiment of
However, in one practical situation, there may be a false identification in the method of
Specifically,
In one implementation, determining whether two face image sets are weakly correlated may comprise determining a number of unique identical face images between the two face image sets; determining an occurrence number of identical face images between the two face image sets; and determining that the two face image sets are weakly correlated when the number of unique identical face images is smaller than a preset number threshold and the occurrence number of identical face images is smaller than a preset occurrence number threshold.
For example, assume that the first event photo set (identified from initiator A's album) corresponds to a first face image set A1. A second identified event photo set of one of A's contacts, B, corresponds to a second face image set B1. Another identified second event photo set of another contact of A, i.e., C, correspond to another second face image set C1. And yet another identified second event photo set of yet another contact of A, i.e., D, corresponds to yet another second face image set D1. Supposing the face-recognition tool determines that multiple face images (e.g., six for B1 and seven for C1) identical to some face images in Al are found in B1 and C1, and the number of the unique identical face images (e.g., four between B1 and Al, and five between C1 and A1) is greater than the preset number threshold (e.g., three) and the occurrence number of identical images (six for B1, and seven for C1) is greater than the occurrence number threshold (e.g., five), the server may then determine that B1 and C1 are strongly correlated with Al, indicating that A, B and C are probably co-participants of the same party. Contrarily, if the number of unique identical face images between D1 and A1 (e.g., two) is smaller than the preset number threshold (three) and the occurrence number of identical face images between D1 and A1 (e.g., four) is smaller than the occurrence number threshold (five), the cloud server may determine that D1 is weakly correlated with A1, indicating that D and A probably participated in different parties and the second event photo set corresponding to D's album thus may be removed from the collection of event photos to-be-shared. Afterward, the redacted collection of event photos to-be-shared containing the first event photo set (corresponding to A), and second event photo sets (corresponding to B, and C) may be sent to A, B, and C.
Those of ordinary skill in the art understand that in some implementation, one of the number of unique identical face images and the occurrence number of identical face images between two face image sets, rather than both numbers, is used for determining whether two face image sets are weakly correlated.
Thus, in this embodiment of
A practical application may present another special case. That is, in some situation, a participant of the event may fail to take any event photo but yet desire to receive the collection of event photos to-be-shared. Following the embodiment in either
Specifically,
In Step 302, among the contacts of the initiator's contact list and all secondary contact lists (referred herein as combined contact lists), the contacts that have corresponding event photo sets in their cloud album are identified and marked. The rest of the contacts (unmarked contacts) in the combined contact lists are thus those not at the event or those that were at the event but did not take any photos. For example, assume that the contact list of the initiator A includes B and C, the secondary contact list of contacts of B includes A, C and E, and the secondary contact list of contacts of C includes A, B, and F. So the combined contact lists include A, B, C, E, and F. Assume further that A, B, and C were at the event and took photo, E was at the event and thus appeared in some event photos taken by others but did not take event photo himself, and F was not at the even at all. Among all contacts in the combined contact lists, A, B, and C may be identified and marked in Step 302 because they are the ones who were at the party and took event photos. E is not identified or marked because E did not take any photo. F is not identified or marked either because F is not at the event at all.
Further assume that each foregoing secondary contact list not only includes the name and contact information for listed contacts but also includes a profile photo of each listed contact, such as a photo sticker. Then, if the face in the profile photo of an unmarked contact within the combined contact lists matches at least one face image in the first or second face image sets discussed previously (faces appeared in all event photos), it suggests that this particular unmarked contact is in at least one of the event photos and was thus a participant of the event. Thus, in Step 303, each face image contained in the first and second face image sets is compared with the face extracted by the face-recognition tool from the profile picture of each unmarked contact within the combined contact lists, and the cloud server determine whether there is at least one match (see previous discussions in
In the above example, only contacts E and F are not marked. Thus the face images (of the first and second face image sets) are compared with faces of E and F extracted by the face recognition tool from the profile picture of E and F. The cloud server find that E has a face extracted from its profile picture (in B's contact list) that matches one of the face images extracted from the event photo sets and thus the cloud server determines that E is a hidden participant. The cloud server, however, could not find a match for F (F did not participate in the July 4th party). In this situation, the cloud server determines that the collection of July 4th party photos may be sent to the hidden party participant E among others. The cloud server then acquires E's contact information from B's cloud account (in B's contact list) and sends the collection of photos to-be-shared to E.
Thus, in embodiment of
Although
In this embodiment, it is assumed that each user registers a user account in the cloud server to enable cloud storage for data contents (such as a contact list, a photo, an audio/video or the like) stored in the terminal.
Specifically, the user who wanted to send an event photo set (i.e., several photos at a party) to a cloud album corresponding to the user account at the cloud server for storage may need to name or mark the event photo set. Specifically, the event photo set may be organized into a folder containing the event photo set and the folder may be named using an event marker. The specific composition of event marker is described in the embodiments above. Alternatively, the markers for the photo may be determined by the cloud service using various tagging and marking algorithms as described above.
In one implementation of the second acquiring module 13, the second acquiring module 13 may include a first determining submodule 13-1, a second determining submodule 13-2 and an acquiring submodule 13-3. The first determining submodule 13-1 is configured to determine each contact user account corresponding to the each contact contained in the contact list of the initiator. The second determining submodule 13-2 is configured to determine whether a second event photo set marked with the event marker is present in a cloud album corresponding to the user account of each contact of the initiator. The acquiring submodule 13-3 is configured to acquire, if the second event photo set marked with the event marker is present, each second event photo set, and determine each contact corresponding to each second event photo set according to the first contact list.
With respect to the photo sharing device in the above embodiments, detailed description of specific manners and functions for the modules and submodules has been made in the embodiments related to the method. Discussions above in the corresponding method embodiments apply.
The above embodiments illustrate the internal function and structure of the photo sharing device. As shown in
The device 1900 may also include a power supply component 1926 configured to execute the power management of the device 1900, a wired or wireless network interface 1950 configured to connect the device 1900 to the network, and an input/output (I/O) interface 1958. The device 1900 can operate an operating system based on and stored in the memory 1932, for example, Windows Server™, Mac OS X™, Unix™, Linux™, FreeBSD™ or other similar operating systems.
Each module or unit discussed above for
The illustrations of the embodiments described herein are intended to provide a general understanding of the structure of the various embodiments. The illustrations are not intended to serve as a complete description of all of the elements and features of apparatus and systems that utilize the structures or methods described herein. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following the general principles thereof and including such departures from the present disclosure as come within known or customary practice in the art. It is intended that the specification and examples are considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims in addition to the disclosure.
It will be appreciated that the present invention is not limited to the exact construction that has been described above and illustrated in the accompanying drawings, and that various modifications and changes can be made without departing from the scope thereof. It is intended that the scope of the invention only be limited by the appended claims.
| Number | Date | Country | Kind |
|---|---|---|---|
| 201510462784.4 | Jul 2015 | CN | national |