Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

187 results about "Virtual identity" patented technology

Virtual identity. Related Terms. In online virtual communities, such as online chat rooms or in online games, a virtual identity is one created by the human user that acts as an interface between the physical person and virtual person other users see on their computer screen. See also avatar.

Multi-identity network social intercourse system and implementation method

InactiveCN101599993APrivacy protectionGive full play to personal imaginationData switching networksEngineeringSystem structure
The invention discloses a multi-identity network social intercourse system and an implementation method. The steps thereof are as follows: A: registering to be a member; B: logging on by using a registered user name obtained in the step A, and filling in the personnel information and a head portrait of real identity; C: a user chooses whether activating the virtual identity or not; D: activating the virtual identity, and filling out the information of the virtual identity; E: according to the requirement of the member, choosing the switching of the identities, and switching into the state with two identities; F: according to the identity switching of the step E, the switched state is the state of real identity; and G: according to the identity switching of the step E, the switched state is the state of virtual identity. The identities are respectively connected with the personnel information, the relationship, the resources and the application and operation of the system. The invention favorably protects the privacy of the user, and favorably combines real-name registration with the anonymous registration, thereby providing a flexible and intimate platform for the user. The user can establish a stable network of social relationship, gain real friendship, etc. The system has the advantages of simple structure and easy operation.
Owner:WUHAN ZHONG PIN TECH

Unified identity authentication system based on cloud platform

The invention discloses a unified identity authentication system based on a cloud platform, comprising a management subsystem (101) which carries out centralized management to a user, a virtual computing resource, a virtual software resource and a virtual identity object and is responsible for correlation relationship management of the user and the virtual object; a mapping subsystem (102) which maps the virtual object and an entity object managed by the management subsystem (101); an access control subsystem (103) which defines the authority of the mapped entity object; a data storage subsystem (104) which stores the data, the entity AD (active directory) domain data and the entity NIS (network information service) domain data used by the management subsystem (101), wherein the user has an AD domain account and an NIS domain account, the entity object comprises an entity AD group and an entity NIS group, the AD is an active directory, NIS is network information service. Management and control problems of resource access authority after unified authentication are effectively solved by using the unified identity authentication system.
Owner:UNITED ELECTRONICS

Method for implementing multi-virtual identify of one mobile phone number in mobile immediate communication

This invention relates to a method for realizing multiple virtual identities by a cell phone number in mobile prompt communication characterizing that said server includes a corresponding relationship list that one number corresponding to multiple prompt communicated ID numbers, namely, one number includes multiple virtual prompt communicated identities. The method includes a registration flow, a cancel flow, a log-on flow, a log-out flow, a switch flow, a cipher-getting back flow and a background statistic flow.
Owner:蒋晓海

Unified identity authentication method based on cloud platform

The invention relates to a unified identity authentication method based on a cloud platform. The method comprises the steps of: managing information, wherein users, virtual calculation resources, virtual software resources and virtual identity objects are integrally managed, and associated relations between the users and the virtual objects are managed; mapping the objects, wherein the managed virtual objects in the information managing step are mapped to entity objects, and mapping relations between the virtual objects and the entity objects are managed; and controlling access, wherein authority of the entity objects after the object mapping step is defined, and data, entity AD domain data, entity NIS domain data used in the information managing step are stored in a preset database of the cloud platform. The unified identity authentication method effectively solves the problems of resource access authority management and control of different coordination after the unified authentication.
Owner:UNITED ELECTRONICS

Network user identity recognition method

The invention requests to protect an identity recognition method between a network identity and a real identity, comprising the following steps of: firstly, collecting real identity data of a specificobject in reality and specified network user data; then, formatting processing is performed on the acquired user identity data, and required information in the user identity data is extracted; Then,the relevance between the virtual identity and the real identity is mined and analyzed, and similarity analysis of basic identity information is carried out; then, virtual identity description information of the user is mined and analyzed through content information published on the network by the user, an association relationship between the virtual identity description information and the real identity description information is established in combination with a knowledge base, and correlation analysis of the identity description information is carried out; and finally, fusing the calculation results of the similarity of the basic identity information and the correlation of the identity description information, and inferring the relationship between the specified virtual identity and thereal identity. The public opinion supervision method is helpful for forensics investigation of specific user identities in cases, and public opinion supervision efficiency is improved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Virtual identity knowledge graph establishing method for aiming at network threat discovery

ActiveCN106230829AIncrease breadthImprove the efficiency of traceabilityTransmissionUser - individualKnowledge graph
The invention discloses a virtual identity knowledge graph establishing method for aiming at network thread discovery, wherein the method belongs to the field of network virtual identity tracking. The method aims to settle a technical problem of reducing time in searching virtual identity information for improving network tracking and tracing efficiency. The method comprises the steps of (1), searching the virtual identity information of a user through a plurality of ways which comprise searching user registration information of different Internet websites, directionally crawling user individual information which is disclosed in a preset website, and crawling the virtual identity information of the user based on a searching engine; (2), combining a plurality of sets of user registration information in a user registration information table for generating a data sheet I, (3), combining the data sheet I with a user individual information sheet for generating a data sheet II; and (4), combining a virtual identity information sheet with the data sheet II for generating the virtual identity knowledge graph. The identity information is searched through the virtual identity knowledge graph, thereby reducing time in searching the virtual identity information and improving efficiency in network tracking and tracing.
Owner:INSPUR COMMON SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products