Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

187 results about "Virtual identity" patented technology

Virtual identity. Related Terms. In online virtual communities, such as online chat rooms or in online games, a virtual identity is one created by the human user that acts as an interface between the physical person and virtual person other users see on their computer screen. See also avatar.

Multi-identity network social intercourse system and implementation method

InactiveCN101599993APrivacy protectionGive full play to personal imaginationData switching networksEngineeringSystem structure
The invention discloses a multi-identity network social intercourse system and an implementation method. The steps thereof are as follows: A: registering to be a member; B: logging on by using a registered user name obtained in the step A, and filling in the personnel information and a head portrait of real identity; C: a user chooses whether activating the virtual identity or not; D: activating the virtual identity, and filling out the information of the virtual identity; E: according to the requirement of the member, choosing the switching of the identities, and switching into the state with two identities; F: according to the identity switching of the step E, the switched state is the state of real identity; and G: according to the identity switching of the step E, the switched state is the state of virtual identity. The identities are respectively connected with the personnel information, the relationship, the resources and the application and operation of the system. The invention favorably protects the privacy of the user, and favorably combines real-name registration with the anonymous registration, thereby providing a flexible and intimate platform for the user. The user can establish a stable network of social relationship, gain real friendship, etc. The system has the advantages of simple structure and easy operation.
Owner:WUHAN ZHONG PIN TECH

Network user identity recognition method

The invention requests to protect an identity recognition method between a network identity and a real identity, comprising the following steps of: firstly, collecting real identity data of a specificobject in reality and specified network user data; then, formatting processing is performed on the acquired user identity data, and required information in the user identity data is extracted; Then,the relevance between the virtual identity and the real identity is mined and analyzed, and similarity analysis of basic identity information is carried out; then, virtual identity description information of the user is mined and analyzed through content information published on the network by the user, an association relationship between the virtual identity description information and the real identity description information is established in combination with a knowledge base, and correlation analysis of the identity description information is carried out; and finally, fusing the calculation results of the similarity of the basic identity information and the correlation of the identity description information, and inferring the relationship between the specified virtual identity and thereal identity. The public opinion supervision method is helpful for forensics investigation of specific user identities in cases, and public opinion supervision efficiency is improved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Virtual identity knowledge graph establishing method for aiming at network threat discovery

ActiveCN106230829AIncrease breadthImprove the efficiency of traceabilityTransmissionUser - individualKnowledge graph
The invention discloses a virtual identity knowledge graph establishing method for aiming at network thread discovery, wherein the method belongs to the field of network virtual identity tracking. The method aims to settle a technical problem of reducing time in searching virtual identity information for improving network tracking and tracing efficiency. The method comprises the steps of (1), searching the virtual identity information of a user through a plurality of ways which comprise searching user registration information of different Internet websites, directionally crawling user individual information which is disclosed in a preset website, and crawling the virtual identity information of the user based on a searching engine; (2), combining a plurality of sets of user registration information in a user registration information table for generating a data sheet I, (3), combining the data sheet I with a user individual information sheet for generating a data sheet II; and (4), combining a virtual identity information sheet with the data sheet II for generating the virtual identity knowledge graph. The identity information is searched through the virtual identity knowledge graph, thereby reducing time in searching the virtual identity information and improving efficiency in network tracking and tracing.
Owner:INSPUR COMMON SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products