CN104021197A - System and method for virtual identity library entering inquiry - Google Patents
System and method for virtual identity library entering inquiry Download PDFInfo
- Publication number
- CN104021197A CN104021197A CN201410267189.0A CN201410267189A CN104021197A CN 104021197 A CN104021197 A CN 104021197A CN 201410267189 A CN201410267189 A CN 201410267189A CN 104021197 A CN104021197 A CN 104021197A
- Authority
- CN
- China
- Prior art keywords
- data
- virtual identity
- identity data
- client
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
Abstract
The invention provides a method for virtual identity library entering inquiry. The method comprises a first step of collecting N virtual identity data of an internet image; a second step of analyzing and extracting the collected N virtual identity data, and sending the extracted N valid virtual identity data to a database cluster through a library entering server; a third step of utilizing the database cluster to store the extracted N valid virtual identity data; a fourth step of utilizing the server to search corresponding valid virtual identity data from the database cluster and return the data to a client according to inquiry requests of the client; and a fifth step of utilizing the client to associate the returned valid virtual identity data with real identity data. The invention further provides a system for virtual identity library entering inquiry. By collecting, storing and managing data of a network virtual population, a network security sector can timely follow up a case, the time for the network security sector to obtain virtual data is greatly shortened, and working efficiency is improved.
Description
Technical field
The present invention relates to a kind of virtual identity warehouse-in inquiry system and method.
Background technology
Current, along with the develop rapidly of internet, the comprehensive prevention and control System Construction of the public security of internet virtual society also becomes the important content of security work.When current network security department breaks laws and commit crime in strike internet, mainly by first mass data being screened, according to the data of screening, case is followed up and collected evidence again, the shortcoming of doing is like this: network security department all will carry out screening operation to mass data in the process of at every turn handling a case, case cannot be followed up in time, and cannot carry out effective management and control to online personnel, this has brought great inconvenience for actual handling a case.Therefore creating an internet virtual identity warehouse-in inquiry system is the major action that current network security department strengthens internet virtual " population " management.
Summary of the invention
The technical problem to be solved in the present invention, be to provide a kind of virtual identity warehouse-in inquiry system and method, by network virtual identity data are gathered, analyze and are stored, make network security department carry out case follow-up and carry out true identity data correlation according to effective virtual identity data of storage, thereby improve Network Campaign level.
One of the technical problem to be solved in the present invention, is to provide a kind of virtual identity warehouse-in querying method, specifically comprises the steps:
Step 1, utilize data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, N is natural number;
Step 2, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extract effective virtual identity data, afterwards by the N of extraction effectively virtual identity data by putting server in storage, pass to data-base cluster;
Step 3, data-base cluster are stored the N extracting effective virtual identity data respectively;
Step 4, server, according to the data query request of client, to the order of data base set pocket transmission data query, and return to client by the corresponding effective virtual identity data that find;
Step 5, client are carried out associated by effective virtual identity data of returning with true identity data.
Further, described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
Two of the technical problem to be solved in the present invention, is to provide a kind of virtual identity warehouse-in inquiry system, comprising:
Data acquisition module, utilizes data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, and N is natural number;
Data analysis module, utilizes data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extracts effective virtual identity data, afterwards the N of extraction effective virtual identity data is passed to data-base cluster by warehouse-in server;
Database module, data-base cluster is stored the N extracting effective virtual identity data respectively;
Server module, server, according to the data query request of client, to the order of data base set pocket transmission data query, and returns to client by the corresponding effective virtual identity data that find;
Client modules, client is carried out associated by effective virtual identity data of returning with true identity data.
Further, described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
Tool of the present invention has the following advantages: adopt distributed type assemblies mode, respectively network virtual identity data are gathered, analyze and stored, make network security department to case, follow up accurately and rapidly and to carry out associated to true identity data, both improve network fight capability, also improved the efficiency that network is fought.
Accompanying drawing explanation
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the flowchart of virtual identity warehouse-in querying method of the present invention one preferred embodiment.
Fig. 2 is the structured flowchart of virtual identity warehouse-in inquiry system of the present invention one preferred embodiment.
Embodiment
Please refer to shown in Fig. 1, a preferred embodiment of virtual identity warehouse-in querying method of the present invention, comprises the steps:
Step 1, utilize data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, N is natural number; Described virtual identity data comprise online identity information (information such as online card number, Email Accounts), place information (information such as address, place and surrounding environment), specific crowd information (information such as specific region crowd, given age crowd) and identity event trace information (information such as time of frequent appearance, place);
Step 2, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, mainly comprise the various information of collection is carried out to confluence analysis etc., and therefrom extract effective virtual identity data (data such as QQ account, Email Accounts), afterwards the N of extraction effective virtual identity data are passed to data-base cluster by warehouse-in server;
Step 3, data-base cluster are stored the N extracting effective virtual identity data respectively, for server (take WEB server here as example), call;
Step 4, WEB server are according to the data query request of sending of client, to the order of data base set pocket transmission data query, data-base cluster is searched corresponding effectively virtual identity data according to the querying command receiving, and by WEB server, the corresponding effective virtual identity data that find is returned to client;
Step 5, client are carried out effective virtual identity data of returning and true identity data associated, thereby realize the accurate follow-up to case.
Please refer to shown in Fig. 2, a preferred embodiment of virtual identity warehouse-in inquiry system of the present invention, comprising:
Data acquisition module, utilizes data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, and N is natural number; Described virtual identity data comprise online identity information (information such as online card number, Email Accounts, Sina's account), place information (information such as address, place and surrounding environment), specific crowd information (information such as specific region crowd, given age crowd) and identity event trace information (information such as time of frequent appearance, place);
Data analysis module, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, mainly comprise the various information of collection is carried out to confluence analysis etc., and therefrom extract effective virtual identity data (data such as QQ account, Email Accounts), afterwards the N of extraction effective virtual identity data are passed to data-base cluster by warehouse-in server;
Database module, data-base cluster is stored N after analyzing effective virtual identity data respectively, for server (take WEB server here as example), calls;
Server module, WEB server is according to the data query request of sending of client, to the order of data base set pocket transmission data query, data-base cluster is searched corresponding effectively virtual identity data according to the querying command receiving, and by WEB server, the corresponding effective virtual identity data that find is returned to client;
Client modules, client is carried out effective virtual identity data of returning and true identity data associated, thereby realizes the accurate follow-up to case.
Although more than described the specific embodiment of the present invention; but being familiar with those skilled in the art is to be understood that; our described specific embodiment is illustrative; rather than for the restriction to scope of the present invention; those of ordinary skill in the art are in equivalent modification and the variation done according to spirit of the present invention, all should be encompassed in the scope that claim of the present invention protects.
Claims (4)
1. a virtual identity warehouse-in querying method, is characterized in that: comprise the steps:
Step 1, utilize data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, N is natural number;
Step 2, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extract effective virtual identity data, afterwards by the N of extraction effectively virtual identity data by putting server in storage, pass to data-base cluster;
Step 3, data-base cluster are stored the N extracting effective virtual identity data respectively;
Step 4, server, according to the data query request of client, to the order of data base set pocket transmission data query, and return to client by the corresponding effective virtual identity data that find;
Step 5, client are carried out associated by effective virtual identity data of returning with true identity data.
2. a kind of virtual identity warehouse-in querying method as claimed in claim 1, is characterized in that: described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
3. virtual identity is put an inquiry system in storage, it is characterized in that: comprising:
Data acquisition module, utilizes data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, and N is natural number;
Data analysis module, utilizes data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extracts effective virtual identity data, afterwards the N of extraction effective virtual identity data is passed to data-base cluster by warehouse-in server;
Database module, data-base cluster is stored the N extracting effective virtual identity data respectively;
Server module, server, according to the data query request of client, to the order of data base set pocket transmission data query, and returns to client by the corresponding effective virtual identity data that find;
Client modules, client is carried out associated by effective virtual identity data of returning with true identity data.
4. a kind of virtual identity warehouse-in inquiry system as claimed in claim 3, is characterized in that: described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410267189.0A CN104021197A (en) | 2014-06-16 | 2014-06-16 | System and method for virtual identity library entering inquiry |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410267189.0A CN104021197A (en) | 2014-06-16 | 2014-06-16 | System and method for virtual identity library entering inquiry |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104021197A true CN104021197A (en) | 2014-09-03 |
Family
ID=51437951
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410267189.0A Pending CN104021197A (en) | 2014-06-16 | 2014-06-16 | System and method for virtual identity library entering inquiry |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104021197A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679240A (en) * | 2017-10-27 | 2018-02-09 | 中国计量大学 | A kind of virtual identity method for digging |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040068518A1 (en) * | 2002-10-03 | 2004-04-08 | International Business Machines Corporation | Layered virtual identity system and method |
CN1804882A (en) * | 2006-01-25 | 2006-07-19 | 深圳市中科新业信息科技发展有限公司 | Virtual population system and its building method |
CN101588322A (en) * | 2009-06-18 | 2009-11-25 | 中山大学 | Mailbox system based on speech recognition |
US20120323686A1 (en) * | 2011-06-20 | 2012-12-20 | Microsoft Corporation | Virtual identity manager |
CN103368917A (en) * | 2012-04-01 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Method and system for risk control of network virtual users |
-
2014
- 2014-06-16 CN CN201410267189.0A patent/CN104021197A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040068518A1 (en) * | 2002-10-03 | 2004-04-08 | International Business Machines Corporation | Layered virtual identity system and method |
CN1804882A (en) * | 2006-01-25 | 2006-07-19 | 深圳市中科新业信息科技发展有限公司 | Virtual population system and its building method |
CN101588322A (en) * | 2009-06-18 | 2009-11-25 | 中山大学 | Mailbox system based on speech recognition |
US20120323686A1 (en) * | 2011-06-20 | 2012-12-20 | Microsoft Corporation | Virtual identity manager |
CN103368917A (en) * | 2012-04-01 | 2013-10-23 | 阿里巴巴集团控股有限公司 | Method and system for risk control of network virtual users |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107679240A (en) * | 2017-10-27 | 2018-02-09 | 中国计量大学 | A kind of virtual identity method for digging |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107229708B (en) | Personalized travel service big data application system and method | |
CN110223168B (en) | Label propagation anti-fraud detection method and system based on enterprise relationship map | |
CN110956547B (en) | Method and system for identifying fraudulent party in real time based on search engine | |
CN107341183B (en) | Website classification method based on comprehensive characteristics of hidden network website | |
CN108268565B (en) | Method and system for processing user browsing behavior data based on data warehouse | |
CN103838785A (en) | Vertical search engine in patent field | |
US11816172B2 (en) | Data processing method, server, and computer storage medium | |
CN105354196A (en) | Information pushing method and information pushing apparatus | |
CN112165462A (en) | Attack prediction method and device based on portrait, electronic equipment and storage medium | |
CN111930868A (en) | Big data behavior trajectory analysis method based on multi-dimensional data acquisition | |
CN104182506A (en) | Log management method | |
CN101141370A (en) | Gridding service based electric power enterprise real-time data processing method | |
CN106407429A (en) | File tracking method, device and system | |
CN103838754A (en) | Information searching device and method | |
KR20150018880A (en) | Information aggregation, classification and display method and system | |
CN104182482A (en) | Method for judging news list page and method for screening news list page | |
CN106649498A (en) | Network public opinion analysis system based on crawler and text clustering analysis | |
Sujatha | Improved user navigation pattern prediction technique from web log data | |
CN102984162B (en) | The recognition methods of credible website and gathering system | |
CN104750812A (en) | Automatic data collecting method based on webpage label analysis | |
CN104021197A (en) | System and method for virtual identity library entering inquiry | |
Shrestha et al. | High-performance classification of phishing URLs using a multi-modal approach with MapReduce | |
CN106708835A (en) | Data table classification method and device | |
CN115619245A (en) | Portrait construction and classification method and system based on data dimension reduction method | |
CN104376021A (en) | File recommending system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140903 |
|
WD01 | Invention patent application deemed withdrawn after publication |