CN104021197A - System and method for virtual identity library entering inquiry - Google Patents

System and method for virtual identity library entering inquiry Download PDF

Info

Publication number
CN104021197A
CN104021197A CN201410267189.0A CN201410267189A CN104021197A CN 104021197 A CN104021197 A CN 104021197A CN 201410267189 A CN201410267189 A CN 201410267189A CN 104021197 A CN104021197 A CN 104021197A
Authority
CN
China
Prior art keywords
data
virtual identity
identity data
client
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410267189.0A
Other languages
Chinese (zh)
Inventor
侯济恭
黄文峰
刘少军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linewell Software Co Ltd
Original Assignee
Linewell Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linewell Software Co Ltd filed Critical Linewell Software Co Ltd
Priority to CN201410267189.0A priority Critical patent/CN104021197A/en
Publication of CN104021197A publication Critical patent/CN104021197A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs

Abstract

The invention provides a method for virtual identity library entering inquiry. The method comprises a first step of collecting N virtual identity data of an internet image; a second step of analyzing and extracting the collected N virtual identity data, and sending the extracted N valid virtual identity data to a database cluster through a library entering server; a third step of utilizing the database cluster to store the extracted N valid virtual identity data; a fourth step of utilizing the server to search corresponding valid virtual identity data from the database cluster and return the data to a client according to inquiry requests of the client; and a fifth step of utilizing the client to associate the returned valid virtual identity data with real identity data. The invention further provides a system for virtual identity library entering inquiry. By collecting, storing and managing data of a network virtual population, a network security sector can timely follow up a case, the time for the network security sector to obtain virtual data is greatly shortened, and working efficiency is improved.

Description

A kind of virtual identity warehouse-in inquiry system and method
Technical field
The present invention relates to a kind of virtual identity warehouse-in inquiry system and method.
Background technology
Current, along with the develop rapidly of internet, the comprehensive prevention and control System Construction of the public security of internet virtual society also becomes the important content of security work.When current network security department breaks laws and commit crime in strike internet, mainly by first mass data being screened, according to the data of screening, case is followed up and collected evidence again, the shortcoming of doing is like this: network security department all will carry out screening operation to mass data in the process of at every turn handling a case, case cannot be followed up in time, and cannot carry out effective management and control to online personnel, this has brought great inconvenience for actual handling a case.Therefore creating an internet virtual identity warehouse-in inquiry system is the major action that current network security department strengthens internet virtual " population " management.
Summary of the invention
The technical problem to be solved in the present invention, be to provide a kind of virtual identity warehouse-in inquiry system and method, by network virtual identity data are gathered, analyze and are stored, make network security department carry out case follow-up and carry out true identity data correlation according to effective virtual identity data of storage, thereby improve Network Campaign level.
One of the technical problem to be solved in the present invention, is to provide a kind of virtual identity warehouse-in querying method, specifically comprises the steps:
Step 1, utilize data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, N is natural number;
Step 2, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extract effective virtual identity data, afterwards by the N of extraction effectively virtual identity data by putting server in storage, pass to data-base cluster;
Step 3, data-base cluster are stored the N extracting effective virtual identity data respectively;
Step 4, server, according to the data query request of client, to the order of data base set pocket transmission data query, and return to client by the corresponding effective virtual identity data that find;
Step 5, client are carried out associated by effective virtual identity data of returning with true identity data.
Further, described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
Two of the technical problem to be solved in the present invention, is to provide a kind of virtual identity warehouse-in inquiry system, comprising:
Data acquisition module, utilizes data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, and N is natural number;
Data analysis module, utilizes data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extracts effective virtual identity data, afterwards the N of extraction effective virtual identity data is passed to data-base cluster by warehouse-in server;
Database module, data-base cluster is stored the N extracting effective virtual identity data respectively;
Server module, server, according to the data query request of client, to the order of data base set pocket transmission data query, and returns to client by the corresponding effective virtual identity data that find;
Client modules, client is carried out associated by effective virtual identity data of returning with true identity data.
Further, described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
Tool of the present invention has the following advantages: adopt distributed type assemblies mode, respectively network virtual identity data are gathered, analyze and stored, make network security department to case, follow up accurately and rapidly and to carry out associated to true identity data, both improve network fight capability, also improved the efficiency that network is fought.
Accompanying drawing explanation
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the flowchart of virtual identity warehouse-in querying method of the present invention one preferred embodiment.
Fig. 2 is the structured flowchart of virtual identity warehouse-in inquiry system of the present invention one preferred embodiment.
Embodiment
Please refer to shown in Fig. 1, a preferred embodiment of virtual identity warehouse-in querying method of the present invention, comprises the steps:
Step 1, utilize data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, N is natural number; Described virtual identity data comprise online identity information (information such as online card number, Email Accounts), place information (information such as address, place and surrounding environment), specific crowd information (information such as specific region crowd, given age crowd) and identity event trace information (information such as time of frequent appearance, place);
Step 2, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, mainly comprise the various information of collection is carried out to confluence analysis etc., and therefrom extract effective virtual identity data (data such as QQ account, Email Accounts), afterwards the N of extraction effective virtual identity data are passed to data-base cluster by warehouse-in server;
Step 3, data-base cluster are stored the N extracting effective virtual identity data respectively, for server (take WEB server here as example), call;
Step 4, WEB server are according to the data query request of sending of client, to the order of data base set pocket transmission data query, data-base cluster is searched corresponding effectively virtual identity data according to the querying command receiving, and by WEB server, the corresponding effective virtual identity data that find is returned to client;
Step 5, client are carried out effective virtual identity data of returning and true identity data associated, thereby realize the accurate follow-up to case.
Please refer to shown in Fig. 2, a preferred embodiment of virtual identity warehouse-in inquiry system of the present invention, comprising:
Data acquisition module, utilizes data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, and N is natural number; Described virtual identity data comprise online identity information (information such as online card number, Email Accounts, Sina's account), place information (information such as address, place and surrounding environment), specific crowd information (information such as specific region crowd, given age crowd) and identity event trace information (information such as time of frequent appearance, place);
Data analysis module, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, mainly comprise the various information of collection is carried out to confluence analysis etc., and therefrom extract effective virtual identity data (data such as QQ account, Email Accounts), afterwards the N of extraction effective virtual identity data are passed to data-base cluster by warehouse-in server;
Database module, data-base cluster is stored N after analyzing effective virtual identity data respectively, for server (take WEB server here as example), calls;
Server module, WEB server is according to the data query request of sending of client, to the order of data base set pocket transmission data query, data-base cluster is searched corresponding effectively virtual identity data according to the querying command receiving, and by WEB server, the corresponding effective virtual identity data that find is returned to client;
Client modules, client is carried out effective virtual identity data of returning and true identity data associated, thereby realizes the accurate follow-up to case.
Although more than described the specific embodiment of the present invention; but being familiar with those skilled in the art is to be understood that; our described specific embodiment is illustrative; rather than for the restriction to scope of the present invention; those of ordinary skill in the art are in equivalent modification and the variation done according to spirit of the present invention, all should be encompassed in the scope that claim of the present invention protects.

Claims (4)

1. a virtual identity warehouse-in querying method, is characterized in that: comprise the steps:
Step 1, utilize data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, N is natural number;
Step 2, utilize data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extract effective virtual identity data, afterwards by the N of extraction effectively virtual identity data by putting server in storage, pass to data-base cluster;
Step 3, data-base cluster are stored the N extracting effective virtual identity data respectively;
Step 4, server, according to the data query request of client, to the order of data base set pocket transmission data query, and return to client by the corresponding effective virtual identity data that find;
Step 5, client are carried out associated by effective virtual identity data of returning with true identity data.
2. a kind of virtual identity warehouse-in querying method as claimed in claim 1, is characterized in that: described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
3. virtual identity is put an inquiry system in storage, it is characterized in that: comprising:
Data acquisition module, utilizes data acquisition equipment cluster respectively the N of internet mirror image virtual identity data to be gathered, and N is natural number;
Data analysis module, utilizes data analysis facilities cluster respectively to N the virtual identity data analysis gathering, and therefrom extracts effective virtual identity data, afterwards the N of extraction effective virtual identity data is passed to data-base cluster by warehouse-in server;
Database module, data-base cluster is stored the N extracting effective virtual identity data respectively;
Server module, server, according to the data query request of client, to the order of data base set pocket transmission data query, and returns to client by the corresponding effective virtual identity data that find;
Client modules, client is carried out associated by effective virtual identity data of returning with true identity data.
4. a kind of virtual identity warehouse-in inquiry system as claimed in claim 3, is characterized in that: described virtual identity data comprise online identity information, place information, specific crowd information and identity event trace information.
CN201410267189.0A 2014-06-16 2014-06-16 System and method for virtual identity library entering inquiry Pending CN104021197A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410267189.0A CN104021197A (en) 2014-06-16 2014-06-16 System and method for virtual identity library entering inquiry

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410267189.0A CN104021197A (en) 2014-06-16 2014-06-16 System and method for virtual identity library entering inquiry

Publications (1)

Publication Number Publication Date
CN104021197A true CN104021197A (en) 2014-09-03

Family

ID=51437951

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410267189.0A Pending CN104021197A (en) 2014-06-16 2014-06-16 System and method for virtual identity library entering inquiry

Country Status (1)

Country Link
CN (1) CN104021197A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679240A (en) * 2017-10-27 2018-02-09 中国计量大学 A kind of virtual identity method for digging

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040068518A1 (en) * 2002-10-03 2004-04-08 International Business Machines Corporation Layered virtual identity system and method
CN1804882A (en) * 2006-01-25 2006-07-19 深圳市中科新业信息科技发展有限公司 Virtual population system and its building method
CN101588322A (en) * 2009-06-18 2009-11-25 中山大学 Mailbox system based on speech recognition
US20120323686A1 (en) * 2011-06-20 2012-12-20 Microsoft Corporation Virtual identity manager
CN103368917A (en) * 2012-04-01 2013-10-23 阿里巴巴集团控股有限公司 Method and system for risk control of network virtual users

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040068518A1 (en) * 2002-10-03 2004-04-08 International Business Machines Corporation Layered virtual identity system and method
CN1804882A (en) * 2006-01-25 2006-07-19 深圳市中科新业信息科技发展有限公司 Virtual population system and its building method
CN101588322A (en) * 2009-06-18 2009-11-25 中山大学 Mailbox system based on speech recognition
US20120323686A1 (en) * 2011-06-20 2012-12-20 Microsoft Corporation Virtual identity manager
CN103368917A (en) * 2012-04-01 2013-10-23 阿里巴巴集团控股有限公司 Method and system for risk control of network virtual users

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679240A (en) * 2017-10-27 2018-02-09 中国计量大学 A kind of virtual identity method for digging

Similar Documents

Publication Publication Date Title
CN107229708B (en) Personalized travel service big data application system and method
CN110223168B (en) Label propagation anti-fraud detection method and system based on enterprise relationship map
CN110956547B (en) Method and system for identifying fraudulent party in real time based on search engine
CN107341183B (en) Website classification method based on comprehensive characteristics of hidden network website
CN108268565B (en) Method and system for processing user browsing behavior data based on data warehouse
CN103838785A (en) Vertical search engine in patent field
US11816172B2 (en) Data processing method, server, and computer storage medium
CN105354196A (en) Information pushing method and information pushing apparatus
CN112165462A (en) Attack prediction method and device based on portrait, electronic equipment and storage medium
CN111930868A (en) Big data behavior trajectory analysis method based on multi-dimensional data acquisition
CN104182506A (en) Log management method
CN101141370A (en) Gridding service based electric power enterprise real-time data processing method
CN106407429A (en) File tracking method, device and system
CN103838754A (en) Information searching device and method
KR20150018880A (en) Information aggregation, classification and display method and system
CN104182482A (en) Method for judging news list page and method for screening news list page
CN106649498A (en) Network public opinion analysis system based on crawler and text clustering analysis
Sujatha Improved user navigation pattern prediction technique from web log data
CN102984162B (en) The recognition methods of credible website and gathering system
CN104750812A (en) Automatic data collecting method based on webpage label analysis
CN104021197A (en) System and method for virtual identity library entering inquiry
Shrestha et al. High-performance classification of phishing URLs using a multi-modal approach with MapReduce
CN106708835A (en) Data table classification method and device
CN115619245A (en) Portrait construction and classification method and system based on data dimension reduction method
CN104376021A (en) File recommending system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140903

WD01 Invention patent application deemed withdrawn after publication