Unlock instant, AI-driven research and patent intelligence for your innovation.

Ways to Effectively Realize Network Real Name System

A real-name system and network technology, applied in the field of computer network, computer application program, mobile phone equipment, computer system, can solve problems such as difficult real-name

Inactive Publication Date: 2015-12-23
姜兵
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, all real-name systems for netizens are limited to ID card verification, and it is difficult to achieve real real-name

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ways to Effectively Realize Network Real Name System
  • Ways to Effectively Realize Network Real Name System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] Such as figure 1 Shown is the network service provider integration flow chart. Merchants who want to integrate the Internet security system need to approve the application and the authenticity and legality of the network service provider's information. After the approval, they will integrate security controls, API interface integration and embedded code for the network service provider platform.

[0022] After the network service provider authorizes the contract and integrates the interface, the user accesses or uses the network service provider's platform and products, and the system will use security controls and embedded codes to control the user's computer hardware, mobile device, user browser, and user operations. System, user network, geographical location, access records and other information are collected, the collecte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of realizing effectively network real name system. The method comprises the following steps: A) performing integration of security control, embed code and API (application program interface) interface on the network service providers; B) performing data collection by using integrated security control, embed code and API interface; C) comparing the collected information of the identity card numbers with the data of the national citizen identity number inquiry service center to verify the real identities of users; D) performing behavioral analysis, user habit analysis and deep study on all the collected information, performing correlation analysis and deep analysis on all the information to find out all users with correlation property and similarity to perform classification, tidiness and statistics, and performing relevance on user information of same real identities. The method can bind real identity of a user with computer hardware used by the user, mobile devices, online behavior and online habit, so that netizen identity can be more effectively identified.

Description

technical field [0001] The invention relates to the technical fields of computer systems, mobile phone equipment, computer networks, and computer application programs, and in particular to a method for effectively realizing the real-name system of the network. Background technique [0002] With the popularity of the Internet, the Internet has become an important place for people to obtain information, release information, communicate with each other and network marketing. Many traditional industries have entered the Internet industry one after another. It is undeniable that the Internet has brought us many benefits. Online shopping, online news, online travel, online dating, online entertainment, online Q&A, Weibo, WeChat, blogs, etc., are so convenient, but in this Internet era full of business opportunities, a large number of negative problems follow. There are fraudulent websites in online shopping; online news, all kinds of false news appear to confuse the public; The ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 姜兵
Owner 姜兵