CN108984767A - A kind of method that virtual identity is verified - Google Patents

A kind of method that virtual identity is verified Download PDF

Info

Publication number
CN108984767A
CN108984767A CN201810806089.9A CN201810806089A CN108984767A CN 108984767 A CN108984767 A CN 108984767A CN 201810806089 A CN201810806089 A CN 201810806089A CN 108984767 A CN108984767 A CN 108984767A
Authority
CN
China
Prior art keywords
information
identity
virtual identity
network
library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810806089.9A
Other languages
Chinese (zh)
Inventor
罗奔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Hongqiao Hi Tech Co Ltd
Original Assignee
Zhuhai Hongqiao Hi Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Hongqiao Hi Tech Co Ltd filed Critical Zhuhai Hongqiao Hi Tech Co Ltd
Priority to CN201810806089.9A priority Critical patent/CN108984767A/en
Publication of CN108984767A publication Critical patent/CN108984767A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to information technology fields, disclose a kind of method that virtual identity is verified, include the following steps: S01: obtaining the direct information of target person, and establish virtual identity library according to direct information;S02: crawling the related information that target person is retained in network from network according to direct information, and by related information typing virtual identity library;S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.The present invention can utilize web crawlers, crawl mass data from internet, establish the virtual identity library of object.According to virtual identity library information, all kinds of clues are crawled to confirm the true identity of target person or the clue of its closer true identity.The confirmation efficiency for improving reply target person network identity facilitates solution internet-relevant violence, the quick of cipher crime cases is cracked.Therefore, it is suitble to promote.

Description

A kind of method that virtual identity is verified
Technical field
The invention belongs to information technology fields, and in particular to a kind of method that virtual identity is verified.
Background technique
As society is constantly progressive the continuous expansion with people life range, information security issue has become puzzlement people day The Social Events often lived, the especially authenticity questions of the network information.The development of network is more and more quicker at present, People's lives and work have been closely attached with network together, and a people often plays the part of multiple and different in a network Role.The internet-relevant violence occurred again and again in recent years even network crime event, because the authenticity of information is difficult to obtain in network It ensures, and the network information is mostly fragmentation information, is difficult to carry out the authenticity of some user identity in network at present true Recognize, is even more difficult to match its identity in real life.
In order to build safer, healthy network environment, the generation of internet-relevant violence and network crime event is reduced, is needed Network environment is cleared up, with greater need for being checked, being arranged to the network information, realizes the confirmation to network user identity and core Real, the departments such as especially national public security, safety need when doing target person identity validation or information clue is analyzed based on virtual Identity information verifies its true identity;In order to lock it in reality by getting the network information of user when necessary In identity, improve network and reality be closely connected, also improve cope with internet-relevant violence, the network crime reaction speed.
Therefore, in this field there are technical problem urgently to be resolved, need to propose more reasonable technical solution, solve with Upper technical problem.
Summary of the invention
It is an object of that present invention to provide a kind of methods that virtual identity is verified, it is intended to be deposited in network according to user and directly believe Breath, by crawling big data information and being matched to the information of more users, the comprehensive identity information library for establishing the user, by this The network identity of user is verified with real identification.
The technical scheme adopted by the invention is as follows:
A kind of method that virtual identity is verified, it is characterised in that include the following steps:
S01: the direct information of target person is obtained, and virtual identity library is established according to direct information;
S02: the related information that target person is retained in network is crawled from network according to direct information, and related information is recorded Enter virtual identity library;
S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.
Further, the virtual identity library includes at least the following information of target person: name, telephone number, QQ Number, WeChat ID, work unit, bank card, graduated school and grade's profession.
Further, the direct information includes at least name, telephone number, QQ number code or WeChat ID.
Further, the channel that related information is crawled in the step S02 includes at least social network sites and recruitment website.
Further, the related information include at least telephone number information, IP address information, bank's card number information or Person's financing account information.
Further, the identity information includes at least name, identification card number, household register information, certificate address information or family Front yard membership info.
The invention has the benefit that
The present invention can utilize web crawlers, crawl mass data from internet, establish the virtual identity library of object.According to Virtual identity library information crawls all kinds of clues to confirm the true identity of target person or the line of its closer true identity Rope.Improve reply target person network identity confirmation efficiency, facilitate solve internet-relevant violence, cipher crime cases it is quick It cracks.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings only shows section Example of the invention, therefore is not to be taken as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is flow diagram of the invention.
Specific embodiment
With reference to the accompanying drawing and specific embodiment does further explaination to the present invention.
Embodiment:
As shown in Figure 1, present embodiment discloses a kind of methods that virtual identity is verified, it is characterised in that including walking as follows It is rapid:
S01: the direct information of target person is obtained, and virtual identity library is established according to direct information;
S02: the related information that target person is retained in network is crawled from network according to direct information, and related information is recorded Enter virtual identity library;
S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.
The virtual identity library includes at least the following information of target person: name, telephone number, QQ number code, wechat Number, work unit, bank card, graduated school and grade profession.
The direct information includes at least name, telephone number, QQ number code or WeChat ID.
The channel that related information is crawled in the step S02 includes at least social network sites and recruitment website.
The related information includes at least telephone number information, IP address information, bank's card number information or financing account Family information.
The identity information includes at least name, identification card number, household register information, certificate address information or kinsfolk's relationship Information.
Using this method, by web crawlers technology microblogging, QQ, wechat, recruitment website, social network sites, forum, The websites such as Chinaren crawl related information and are put in storage, and by participle and paraphrase algorithm, extraction is crawled in content about name, electricity Talk about the information such as number, QQ number code, WeChat ID, work unit, bank card, graduated school and grade's profession.Personal void will be extracted Quasi- information forms virtual identity library, and by enriching constantly, personal virtual identity information is improved in virtual identity library.
After establishing virtual identity library, when needing to verify the wherein true identity of some object, then according to his virtual body Part information the whole network crawls personal related information.Such as crawl circle of friends information and friend reply in the place that occurs, name or other Related information crawls telephone number information or online address ip that website leaves, the friend referred in microblogging or the name of oneself The information such as word, occupation.
If obtaining telephone number information, the name for including in the record such as book rooms, book tickets can be inquired in public security private network And ID card information;If obtaining online IP address, upper netizen can be transferred after public security private network inquires Internet bar or internet records Identity information;If obtaining bank card number, financial big data platform inquiry holder's identity information can be docked;If obtained Alipay number, can dock ant gold and take big data searching platform and obtain identity information.
The present invention is not limited to above-mentioned optional embodiment, anyone can show that other are each under the inspiration of the present invention The product of kind form.Above-mentioned specific embodiment should not be understood the limitation of pairs of protection scope of the present invention, protection of the invention Range should be subject to be defined in claims, and specification can be used for interpreting the claims.

Claims (6)

1. a kind of method that virtual identity is verified, it is characterised in that include the following steps:
S01: the direct information of target person is obtained, and virtual identity library is established according to direct information;
S02: the related information that target person is retained in network is crawled from network according to direct information, and related information typing is empty Quasi- identity library;
S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.
2. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the virtual identity library is extremely It less include the following information of target person: name, telephone number, QQ number code, WeChat ID, work unit, bank card, graduated school And grade's profession.
3. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the direct information is at least Including name, telephone number, QQ number code or WeChat ID.
4. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: climbed in the step S02 The channel of related information is taken to include at least social network sites and recruitment website.
5. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the related information is at least Including telephone number information, IP address information, bank's card number information or financing account information.
6. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the identity information is at least Including name, identification card number, household register information, certificate address information or kinsfolk's relation information.
CN201810806089.9A 2018-07-20 2018-07-20 A kind of method that virtual identity is verified Pending CN108984767A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810806089.9A CN108984767A (en) 2018-07-20 2018-07-20 A kind of method that virtual identity is verified

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810806089.9A CN108984767A (en) 2018-07-20 2018-07-20 A kind of method that virtual identity is verified

Publications (1)

Publication Number Publication Date
CN108984767A true CN108984767A (en) 2018-12-11

Family

ID=64550065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810806089.9A Pending CN108984767A (en) 2018-07-20 2018-07-20 A kind of method that virtual identity is verified

Country Status (1)

Country Link
CN (1) CN108984767A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779520A (en) * 2021-09-07 2021-12-10 中国船舶重工集团公司第七0九研究所 Cross-space target virtual identity correlation method based on multilayer attribute analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778162A (en) * 2012-10-26 2014-05-07 广州市邦富软件有限公司 Internet people search information integration and analysis method
CN105681183A (en) * 2014-11-18 2016-06-15 中兴通讯股份有限公司 Method and system for identifying user in marked net
CN106230829A (en) * 2016-08-03 2016-12-14 浪潮通用软件有限公司 Network-oriented threatens the construction method of the virtual identity knowledge mapping found
CN108171113A (en) * 2017-12-01 2018-06-15 国政通科技股份有限公司 A kind of identity authentication method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103778162A (en) * 2012-10-26 2014-05-07 广州市邦富软件有限公司 Internet people search information integration and analysis method
CN105681183A (en) * 2014-11-18 2016-06-15 中兴通讯股份有限公司 Method and system for identifying user in marked net
CN106230829A (en) * 2016-08-03 2016-12-14 浪潮通用软件有限公司 Network-oriented threatens the construction method of the virtual identity knowledge mapping found
CN108171113A (en) * 2017-12-01 2018-06-15 国政通科技股份有限公司 A kind of identity authentication method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113779520A (en) * 2021-09-07 2021-12-10 中国船舶重工集团公司第七0九研究所 Cross-space target virtual identity correlation method based on multilayer attribute analysis
CN113779520B (en) * 2021-09-07 2023-06-13 中国船舶重工集团公司第七0九研究所 Cross-space target virtual identity association method based on multi-layer attribute analysis

Similar Documents

Publication Publication Date Title
EP3532968A1 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
Khatun et al. Data modeling for E-voting system using smart card based E-governance system
CN108984767A (en) A kind of method that virtual identity is verified
Singh et al. Ring signature and improved multi‐transaction mode consortium blockchain‐based private information retrieval for privacy‐preserving smart parking system
Pinter et al. Towards a multi-party, blockchain-based identity verification solution to implement clear name laws for online media platforms
CN110706143A (en) Identity authentication method and device based on government affair service
Carlson When is a tweet not an admissible tweet: Closing the authentication gap in the federal rules of evidence
US20220343025A1 (en) Process for managing the rights and assets of a user on a blockchain
CN106572053A (en) Secure monitoring method and equipment for social communication application
Waldman Navigating Privacy on Gay-Oriented Mobile Dating Applications∗
Luther et al. Partisanship over security: Public narratives via Twitter on foreign interferences in the 2016 and 2020 US presidential elections
Schafer Surveillance for the masses: the political and legal landscape of the UK Investigatory Powers Bill
Terranova The new geography of asylum: digital identity, artificial intelligence and blockchain
Alhussain et al. Biometric authentication for mobile government security
Oganesian The right to privacy and data protection in the information age
KR102296322B1 (en) Identity authentication system and method thereof
Ramseyer et al. Comfort Women: The North Korean Connection
RU2693314C1 (en) System and method of cryptographic purses identification based on transaction analysis
KR102431546B1 (en) Financial transaction system and method thereof
Hale-Ross et al. Terrorism and State Surveillance of Communications
Ayalew Untrodden paths towards the right to privacy in the digital era under African human rights law
Habib et al. Blockchain Based Secured Refugee Identity Management by Using the Assistance Smart Contract
Dewan et al. Secure Electronic Voting System based on Mobile-app and Blockchain
Kumar et al. E-Commerce and Data Privacy in India: A Critical Examination of Legal Implications and Regulatory Framework
Zhao et al. A bibliometric study of research trends in cross-border cybercrime

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181211

RJ01 Rejection of invention patent application after publication