Network user identity recognition method

A network user and identity recognition technology, which is applied in character and pattern recognition, instruments, computing, etc., can solve the problems of in-depth mining without identity characteristics, insufficient information utilization, and insufficient granularity of user groups, so as to improve efficiency and improve The effect of precision

Active Publication Date: 2019-07-05
CHONGQING UNIV OF POSTS & TELECOMM
View PDF10 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current research mainly focuses on mining the information and tendencies of user groups, without in-depth analysis of the characteristics and attributes of individual users; the utilization of information in the network is not comprehensive enough, focusing on the personal information and social relations of users, and there is no analysis of the information published by users on the network. In-depth mining of identity characteristics in the content; when analyzing user group characteristics and attributes, the granularity is not fine enough, it is difficult to guess the real identity of individual users, and there is no consideration for the real identity recognition requirements in forensic investigation scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network user identity recognition method
  • Network user identity recognition method
  • Network user identity recognition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions in the embodiments of the present invention will be described clearly and in detail below with reference to the drawings in the embodiments of the present invention. The described embodiments are only some of the embodiments of the invention.

[0042] The technical scheme that the present invention solves the problems of the technologies described above is:

[0043] Such as figure 1 As shown, the specific steps of a network user identification method:

[0044] Step 11: Obtain the real identity information of the specified object.

[0045] Such as figure 1 As shown, a person's identity information contains two types of information: one is basic identity information, and the other is identity description information. Basic identity information includes seven attribute information: gender, date of birth, place of origin, place of work, relationship status, educational background, and work unit. The identity description information of real ident...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention requests to protect an identity recognition method between a network identity and a real identity, comprising the following steps of: firstly, collecting real identity data of a specificobject in reality and specified network user data; then, formatting processing is performed on the acquired user identity data, and required information in the user identity data is extracted; Then,the relevance between the virtual identity and the real identity is mined and analyzed, and similarity analysis of basic identity information is carried out; then, virtual identity description information of the user is mined and analyzed through content information published on the network by the user, an association relationship between the virtual identity description information and the real identity description information is established in combination with a knowledge base, and correlation analysis of the identity description information is carried out; and finally, fusing the calculation results of the similarity of the basic identity information and the correlation of the identity description information, and inferring the relationship between the specified virtual identity and thereal identity. The public opinion supervision method is helpful for forensics investigation of specific user identities in cases, and public opinion supervision efficiency is improved.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to an identity identification method for establishing an association relationship between a network user's virtual network identity and a real identity in real life. Background technique [0002] The network is a major tool for human beings to use computing technology and information technology to carry out information exchange, establish interpersonal interaction and other social activities. Today, it has become an important medium for netizens to obtain news and current events, interpersonal communication, self-expression, social sharing and social participation, and an important platform for social public opinion. A large number of active users and mobile information in the network have become an important and widely used information carrier and transmission medium, and have an increasing impact on our daily work and life. However, the rapid release and disseminati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62
CPCG06F18/22
Inventor 陈龙郁鸣辰
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products