A method and device for realizing multiple identities of network users
A technology for network users and users, applied in the field of information security, can solve problems such as unfavorable privacy information protection, and achieve the effect of solving privacy protection difficulties
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.
[0036] Such as figure 1 It is a flow chart of a method for realizing multiple identities of network users provided by an embodiment of the present invention.
[0037] Including step 101, a user name has several identities.
[0038] Step 102, each identity is bound with its corresponding identity information and friend information.
[0039] Wherein, the identity information and friend information are separated according to different identities, and a friend user bound to a certain identity can only obtain user information bound to the identity.
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 