Method for constructing online personal identity database automatically

A technology for automatic construction and network identity identification, applied in the field of automatic construction of network personal identity database, can solve the problems of unable to support the input and arrangement of massive data of network users, difficulty in tracing, and the inability to realize real-time update and maintenance of network personal identity database, etc. Achieve the effect of real-time update and maintenance

Inactive Publication Date: 2011-12-28
上海光华如新信息科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to various reasons, the online real-name system cannot be fully promoted for the time being. Netizens can conduct various anonymous behaviors online, which makes it very difficult to trace
[0003] The network personal identity database has a good application prospect in network supervision, but the current construction of the network personal identity database is still based on manual registration.
Obviously, such a method not only cannot support the entry and sorting of massive data of large-scale and multi-level network users, but also cannot realize the real-time update and maintenance of the network personal identity database, and thus cannot meet the requirements of comprehensive and timely network supervision.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing online personal identity database automatically
  • Method for constructing online personal identity database automatically
  • Method for constructing online personal identity database automatically

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0027] figure 1 It shows the flow of a preferred embodiment of the method for automatically constructing the network personal identity database of the present invention. See figure 1 Each step in the method flow will be described in detail below in conjunction with a specific example.

[0028] Data source description: the network application usage information and network access information used in the present invention can be collected by existing equipment and preprocessed by existing technologies.

[0029] Assume that in this embodiment, the network application usage information used is as shown in Table 1 of the network application usage information:

[0030] UID

AID

add

Time

chenjie518

hotmail.com

210.221.85.121

2006-05-22

09:31:18

shihaina11

msn.c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for automatically building a network personal identity database, which provides a technical support for an overall and timely network supervision and administration. According to the technical proposal, the method comprises the following steps: information to be processed is prepared; network access information and network application information are screened; the network access information and the network application information are associated processed about address and time to obtain a plurality of collection of network identity; the obtained collection of network identity is inserted into the network personal identity database. The invention is applied to the field of supervising and administrating network safety.

Description

technical field [0001] The invention relates to a network security technology, in particular to a method for automatically constructing a network personal identity database. Background technique [0002] With the development of the Internet, both network-based applications and users have shown explosive growth, and the same network user may use multiple different identities in different network applications, which poses a severe challenge to network supervision. In this regard, the existing technical solutions are usually the network real name system and the network personal identity database. However, due to various reasons, the online real-name system cannot be fully promoted for the time being. Netizens can conduct various anonymous behaviors on the Internet, which makes it very difficult to trace. [0003] The network personal identity database has a good application prospect in network supervision, but the current construction of the network personal identity database ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24G06F17/30
Inventor 张世永张远吴承荣郭巍谢剑峰
Owner 上海光华如新信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products