System and method for virtual identity library entering inquiry

A technology of virtual identity and query method, which is applied in the field of virtual identity storage query system, can solve the problems of inability to follow up cases in time, inconvenience, and effective management and control of personnel who cannot access the Internet, and achieve the effect of improving network combat capability and efficiency.

Inactive Publication Date: 2014-09-03
LINEWELL SOFTWARE
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, when the network security department cracks down on Internet crimes, it mainly screens a large amount of data, and then follows up the case and collects evidence based on the screened data. The disadvantage of this is that the network secur

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for virtual identity library entering inquiry
  • System and method for virtual identity library entering inquiry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Please refer to figure 1 As shown, a preferred embodiment of the virtual identity storage query method of the present invention includes the following steps:

[0023] Step 1, utilize the cluster of data collection equipments to collect respectively N virtual identity data of Internet mirror image, N is a natural number; Described virtual identity data comprises online identity information (for example information such as online card number, email account number), place information (such as place Information such as address and surrounding environment), specific group information (such as specific area group, specific age group, etc.), and identity activity track information (such as frequent occurrence time, place, etc.);

[0024] Step 2. Use the data analysis equipment cluster to analyze the collected N virtual identity data, mainly including integrating and analyzing the collected information, and extracting valid virtual identity data (such as QQ account, email accou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for virtual identity library entering inquiry. The method comprises a first step of collecting N virtual identity data of an internet image; a second step of analyzing and extracting the collected N virtual identity data, and sending the extracted N valid virtual identity data to a database cluster through a library entering server; a third step of utilizing the database cluster to store the extracted N valid virtual identity data; a fourth step of utilizing the server to search corresponding valid virtual identity data from the database cluster and return the data to a client according to inquiry requests of the client; and a fifth step of utilizing the client to associate the returned valid virtual identity data with real identity data. The invention further provides a system for virtual identity library entering inquiry. By collecting, storing and managing data of a network virtual population, a network security sector can timely follow up a case, the time for the network security sector to obtain virtual data is greatly shortened, and working efficiency is improved.

Description

technical field [0001] The invention relates to a virtual identity storage query system and method. Background technique [0002] At present, with the rapid development of the Internet, the construction of a comprehensive public security prevention and control system in the Internet virtual society has also become an important content of security work. At present, when the network security department cracks down on Internet crimes, it mainly screens a large amount of data, and then follows up the case and collects evidence based on the screened data. The disadvantage of this is that the network security department must Screening a large amount of data makes it impossible to follow up the case in a timely manner, and it is also impossible to effectively control the Internet users, which brings great inconvenience to the actual handling of the case. Therefore, creating an Internet virtual identity storage query system is a major measure for the current network security depart...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30H04L29/08
CPCG06F16/2457
Inventor 侯济恭黄文峰刘少军
Owner LINEWELL SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products