A method of virtual identity verification

A virtual identity and identity information technology, applied in the information field, can solve problems such as user identity confirmation, identity matching, and difficulty in ensuring the authenticity of information, and achieve the effect of improving confirmation efficiency and solving cyber violence

Inactive Publication Date: 2018-12-11
宏桥高科技集团有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, there have been frequent incidents of cyber violence and even cyber crimes. Because the authenticity of information on the Internet is difficult to guarantee, and most of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of virtual identity verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] like figure 1 As shown, this embodiment discloses a method for virtual identity verification, which is characterized in that it includes the following steps:

[0023] S01: Obtain the direct information of the target person, and establish a virtual identity database based on the direct information;

[0024] S02: Crawl the related information of the target person from the network according to the direct information, and enter the related information into the virtual identity database;

[0025] S03: Crawl the identity information from the network according to the associated information, and enter the identity information into the virtual identity database.

[0026] The virtual identity library includes at least the following information of the target person: name, phone number, QQ number, WeChat ID, work unit, bank card, graduate school and grade major.

[0027] The direct information includes at least name, phone number, QQ number or WeChat ID.

[0028] The channels fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of information technology and discloses a method of virtual identity verification. The method comprises the following steps: S01, acquiring direct information of a target person and establishing a virtual identity database according to the direct information; S02, crawling the association information retained by the target person in the network from the network according to the direct information, and inputting the association information into the virtual identity database; S03, crawling the identity information from the network according to the associated information, and inputting the identity information into the virtual identity database. The method can utilize the network crawler to crawl a large amount of data from the Internet to establish a virtual identity database of an object. According to the information of the virtual identity database, the clues to confirm the real identity of the target or closer to the real identity of the target are crawled. The method improves the efficiency of confirming the network identity of the target person and helps to solve the cyber violence and cyber crime cases. So, the method is suitable for popularization.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a virtual identity verification method. Background technique [0002] With the continuous progress of society and the continuous expansion of people's living circle, information security has become a major social problem that plagues people's daily life, especially the authenticity of network information. At present, the development of the network is getting faster and faster, people's life and work have been closely connected with the network, and a person often plays multiple different roles in the network. In recent years, there have been frequent incidents of cyber violence and even cyber crimes. Because the authenticity of information on the Internet is difficult to guarantee, and most of the information on the Internet is fragmented, it is currently difficult to confirm the authenticity of a user’s identity on the Internet. Difficult to match who it is in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 罗奔
Owner 宏桥高科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products