Information identification method and equipment
An information identification and equipment technology, applied in the computer field, can solve the problem of low accuracy of illegal information identification, and achieve the effect of improving the accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] Such as figure 1 As shown, it is a schematic flow chart of the method for information identification in Embodiment 1 of the present application, and the method includes the following steps:
[0040] Step 101: The information identification device determines specific features in the execution information to be identified.
[0041] In this step, when an online shopping service is executed, the server will record the execution information of this online shopping service, and send the recorded execution information to the information identification device, requiring the information identification device to verify the legality of the received execution information. Make a judgment.
[0042] The specific features used in the first embodiment can be some features selected from the features of the execution information based on experience values, such as: select four-dimensional features {seller gender, buyer evaluation, purchase date, transaction volume} as specific features,...
Embodiment 2
[0062] Embodiment 2 of the present application describes the scheme of Embodiment 1 of the present application in detail through specific examples.
[0063] Assuming that the specific feature used in the second embodiment is a four-dimensional feature {seller's gender, buyer's evaluation, purchase date, transaction volume}, the scheme of the second embodiment includes the following steps:
[0064] Step 1: In the initial state, train and build a database.
[0065] Such as figure 2 As shown, the specific implementation process of this step includes the following:
[0066] First, select the execution information that needs to be written to the database.
[0067] The execution information that needs to be written into the database may be the original information recorded by the server each time the online shopping service is executed within a set period of time (such as 3 months). The execution information recorded by the server includes legal information and illegal informati...
Embodiment 3
[0111] Embodiment 3 of the present application also provides an information identification device, such as Figure 4 As shown, it includes a feature identification module 11, a similarity determination module 12 and a legality identification module 13, wherein: the feature identification module 11 is used to determine specific features in the execution information to be identified; the similarity determination module 12 is used to determine the Describe the similarity between the specific features in the execution information to be identified and the specific features in each piece of execution information that has been stored; the legality identification module 13 is used for illegal information and legal information in the M pieces of execution information with the highest similarity The calculated value of the information identifies that the execution information to be identified is illegal information or legal information, and the M is a positive integer greater than 0.
...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 