CN108984767A - A kind of method that virtual identity is verified - Google Patents
A kind of method that virtual identity is verified Download PDFInfo
- Publication number
- CN108984767A CN108984767A CN201810806089.9A CN201810806089A CN108984767A CN 108984767 A CN108984767 A CN 108984767A CN 201810806089 A CN201810806089 A CN 201810806089A CN 108984767 A CN108984767 A CN 108984767A
- Authority
- CN
- China
- Prior art keywords
- information
- identity
- virtual identity
- network
- library
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to information technology fields, disclose a kind of method that virtual identity is verified, include the following steps: S01: obtaining the direct information of target person, and establish virtual identity library according to direct information;S02: crawling the related information that target person is retained in network from network according to direct information, and by related information typing virtual identity library;S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.The present invention can utilize web crawlers, crawl mass data from internet, establish the virtual identity library of object.According to virtual identity library information, all kinds of clues are crawled to confirm the true identity of target person or the clue of its closer true identity.The confirmation efficiency for improving reply target person network identity facilitates solution internet-relevant violence, the quick of cipher crime cases is cracked.Therefore, it is suitble to promote.
Description
Technical field
The invention belongs to information technology fields, and in particular to a kind of method that virtual identity is verified.
Background technique
As society is constantly progressive the continuous expansion with people life range, information security issue has become puzzlement people day
The Social Events often lived, the especially authenticity questions of the network information.The development of network is more and more quicker at present,
People's lives and work have been closely attached with network together, and a people often plays the part of multiple and different in a network
Role.The internet-relevant violence occurred again and again in recent years even network crime event, because the authenticity of information is difficult to obtain in network
It ensures, and the network information is mostly fragmentation information, is difficult to carry out the authenticity of some user identity in network at present true
Recognize, is even more difficult to match its identity in real life.
In order to build safer, healthy network environment, the generation of internet-relevant violence and network crime event is reduced, is needed
Network environment is cleared up, with greater need for being checked, being arranged to the network information, realizes the confirmation to network user identity and core
Real, the departments such as especially national public security, safety need when doing target person identity validation or information clue is analyzed based on virtual
Identity information verifies its true identity;In order to lock it in reality by getting the network information of user when necessary
In identity, improve network and reality be closely connected, also improve cope with internet-relevant violence, the network crime reaction speed.
Therefore, in this field there are technical problem urgently to be resolved, need to propose more reasonable technical solution, solve with
Upper technical problem.
Summary of the invention
It is an object of that present invention to provide a kind of methods that virtual identity is verified, it is intended to be deposited in network according to user and directly believe
Breath, by crawling big data information and being matched to the information of more users, the comprehensive identity information library for establishing the user, by this
The network identity of user is verified with real identification.
The technical scheme adopted by the invention is as follows:
A kind of method that virtual identity is verified, it is characterised in that include the following steps:
S01: the direct information of target person is obtained, and virtual identity library is established according to direct information;
S02: the related information that target person is retained in network is crawled from network according to direct information, and related information is recorded
Enter virtual identity library;
S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.
Further, the virtual identity library includes at least the following information of target person: name, telephone number, QQ
Number, WeChat ID, work unit, bank card, graduated school and grade's profession.
Further, the direct information includes at least name, telephone number, QQ number code or WeChat ID.
Further, the channel that related information is crawled in the step S02 includes at least social network sites and recruitment website.
Further, the related information include at least telephone number information, IP address information, bank's card number information or
Person's financing account information.
Further, the identity information includes at least name, identification card number, household register information, certificate address information or family
Front yard membership info.
The invention has the benefit that
The present invention can utilize web crawlers, crawl mass data from internet, establish the virtual identity library of object.According to
Virtual identity library information crawls all kinds of clues to confirm the true identity of target person or the line of its closer true identity
Rope.Improve reply target person network identity confirmation efficiency, facilitate solve internet-relevant violence, cipher crime cases it is quick
It cracks.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings only shows section Example of the invention, therefore is not to be taken as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is flow diagram of the invention.
Specific embodiment
With reference to the accompanying drawing and specific embodiment does further explaination to the present invention.
Embodiment:
As shown in Figure 1, present embodiment discloses a kind of methods that virtual identity is verified, it is characterised in that including walking as follows
It is rapid:
S01: the direct information of target person is obtained, and virtual identity library is established according to direct information;
S02: the related information that target person is retained in network is crawled from network according to direct information, and related information is recorded
Enter virtual identity library;
S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.
The virtual identity library includes at least the following information of target person: name, telephone number, QQ number code, wechat
Number, work unit, bank card, graduated school and grade profession.
The direct information includes at least name, telephone number, QQ number code or WeChat ID.
The channel that related information is crawled in the step S02 includes at least social network sites and recruitment website.
The related information includes at least telephone number information, IP address information, bank's card number information or financing account
Family information.
The identity information includes at least name, identification card number, household register information, certificate address information or kinsfolk's relationship
Information.
Using this method, by web crawlers technology microblogging, QQ, wechat, recruitment website, social network sites, forum,
The websites such as Chinaren crawl related information and are put in storage, and by participle and paraphrase algorithm, extraction is crawled in content about name, electricity
Talk about the information such as number, QQ number code, WeChat ID, work unit, bank card, graduated school and grade's profession.Personal void will be extracted
Quasi- information forms virtual identity library, and by enriching constantly, personal virtual identity information is improved in virtual identity library.
After establishing virtual identity library, when needing to verify the wherein true identity of some object, then according to his virtual body
Part information the whole network crawls personal related information.Such as crawl circle of friends information and friend reply in the place that occurs, name or other
Related information crawls telephone number information or online address ip that website leaves, the friend referred in microblogging or the name of oneself
The information such as word, occupation.
If obtaining telephone number information, the name for including in the record such as book rooms, book tickets can be inquired in public security private network
And ID card information;If obtaining online IP address, upper netizen can be transferred after public security private network inquires Internet bar or internet records
Identity information;If obtaining bank card number, financial big data platform inquiry holder's identity information can be docked;If obtained
Alipay number, can dock ant gold and take big data searching platform and obtain identity information.
The present invention is not limited to above-mentioned optional embodiment, anyone can show that other are each under the inspiration of the present invention
The product of kind form.Above-mentioned specific embodiment should not be understood the limitation of pairs of protection scope of the present invention, protection of the invention
Range should be subject to be defined in claims, and specification can be used for interpreting the claims.
Claims (6)
1. a kind of method that virtual identity is verified, it is characterised in that include the following steps:
S01: the direct information of target person is obtained, and virtual identity library is established according to direct information;
S02: the related information that target person is retained in network is crawled from network according to direct information, and related information typing is empty
Quasi- identity library;
S03: crawling identity information according to related information from network, and by identity information typing virtual identity library.
2. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the virtual identity library is extremely
It less include the following information of target person: name, telephone number, QQ number code, WeChat ID, work unit, bank card, graduated school
And grade's profession.
3. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the direct information is at least
Including name, telephone number, QQ number code or WeChat ID.
4. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: climbed in the step S02
The channel of related information is taken to include at least social network sites and recruitment website.
5. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the related information is at least
Including telephone number information, IP address information, bank's card number information or financing account information.
6. the method that a kind of virtual identity according to claim 1 is verified, it is characterised in that: the identity information is at least
Including name, identification card number, household register information, certificate address information or kinsfolk's relation information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810806089.9A CN108984767A (en) | 2018-07-20 | 2018-07-20 | A kind of method that virtual identity is verified |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810806089.9A CN108984767A (en) | 2018-07-20 | 2018-07-20 | A kind of method that virtual identity is verified |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108984767A true CN108984767A (en) | 2018-12-11 |
Family
ID=64550065
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810806089.9A Pending CN108984767A (en) | 2018-07-20 | 2018-07-20 | A kind of method that virtual identity is verified |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108984767A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113779520A (en) * | 2021-09-07 | 2021-12-10 | 中国船舶重工集团公司第七0九研究所 | Cross-space target virtual identity correlation method based on multilayer attribute analysis |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103778162A (en) * | 2012-10-26 | 2014-05-07 | 广州市邦富软件有限公司 | Internet people search information integration and analysis method |
CN105681183A (en) * | 2014-11-18 | 2016-06-15 | 中兴通讯股份有限公司 | Method and system for identifying user in marked net |
CN106230829A (en) * | 2016-08-03 | 2016-12-14 | 浪潮通用软件有限公司 | Network-oriented threatens the construction method of the virtual identity knowledge mapping found |
CN108171113A (en) * | 2017-12-01 | 2018-06-15 | 国政通科技股份有限公司 | A kind of identity authentication method and system |
-
2018
- 2018-07-20 CN CN201810806089.9A patent/CN108984767A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103778162A (en) * | 2012-10-26 | 2014-05-07 | 广州市邦富软件有限公司 | Internet people search information integration and analysis method |
CN105681183A (en) * | 2014-11-18 | 2016-06-15 | 中兴通讯股份有限公司 | Method and system for identifying user in marked net |
CN106230829A (en) * | 2016-08-03 | 2016-12-14 | 浪潮通用软件有限公司 | Network-oriented threatens the construction method of the virtual identity knowledge mapping found |
CN108171113A (en) * | 2017-12-01 | 2018-06-15 | 国政通科技股份有限公司 | A kind of identity authentication method and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113779520A (en) * | 2021-09-07 | 2021-12-10 | 中国船舶重工集团公司第七0九研究所 | Cross-space target virtual identity correlation method based on multilayer attribute analysis |
CN113779520B (en) * | 2021-09-07 | 2023-06-13 | 中国船舶重工集团公司第七0九研究所 | Cross-space target virtual identity association method based on multi-layer attribute analysis |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3532968A1 (en) | Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features | |
Khatun et al. | Data modeling for E-voting system using smart card based E-governance system | |
CN108984767A (en) | A kind of method that virtual identity is verified | |
Singh et al. | Ring signature and improved multi‐transaction mode consortium blockchain‐based private information retrieval for privacy‐preserving smart parking system | |
Pinter et al. | Towards a multi-party, blockchain-based identity verification solution to implement clear name laws for online media platforms | |
CN110706143A (en) | Identity authentication method and device based on government affair service | |
Carlson | When is a tweet not an admissible tweet: Closing the authentication gap in the federal rules of evidence | |
US20220343025A1 (en) | Process for managing the rights and assets of a user on a blockchain | |
CN106572053A (en) | Secure monitoring method and equipment for social communication application | |
Waldman | Navigating Privacy on Gay-Oriented Mobile Dating Applications∗ | |
Luther et al. | Partisanship over security: Public narratives via Twitter on foreign interferences in the 2016 and 2020 US presidential elections | |
Schafer | Surveillance for the masses: the political and legal landscape of the UK Investigatory Powers Bill | |
Terranova | The new geography of asylum: digital identity, artificial intelligence and blockchain | |
Alhussain et al. | Biometric authentication for mobile government security | |
Oganesian | The right to privacy and data protection in the information age | |
KR102296322B1 (en) | Identity authentication system and method thereof | |
Ramseyer et al. | Comfort Women: The North Korean Connection | |
RU2693314C1 (en) | System and method of cryptographic purses identification based on transaction analysis | |
KR102431546B1 (en) | Financial transaction system and method thereof | |
Hale-Ross et al. | Terrorism and State Surveillance of Communications | |
Ayalew | Untrodden paths towards the right to privacy in the digital era under African human rights law | |
Habib et al. | Blockchain Based Secured Refugee Identity Management by Using the Assistance Smart Contract | |
Dewan et al. | Secure Electronic Voting System based on Mobile-app and Blockchain | |
Kumar et al. | E-Commerce and Data Privacy in India: A Critical Examination of Legal Implications and Regulatory Framework | |
Zhao et al. | A bibliometric study of research trends in cross-border cybercrime |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181211 |
|
RJ01 | Rejection of invention patent application after publication |