Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for mining cheating user

A technology for users and users, applied in the field of computer communication, it can solve the problems of uneven user level, high probability of cheating, and easy to miss.

Active Publication Date: 2013-05-01
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] As can be seen from the above, the existing anti-cheating methods determine whether the webpage is a cheating webpage by analyzing the content of the webpage, and filter or delete the webpages determined to be cheating, but fail to effectively identify the cheating user who created the cheating webpage. The cheating user can continue to cheat by creating other cheating webpages, which makes the probability of user cheating higher and the efficiency of anti-cheating lower; furthermore, since there are generally few data links (anchor text links) in community webpages, it is easy to distinguish through formulas Leaving out cheating web pages with few anchor text links, and the user level is uneven, and the cost of creating cheating data is low. For example, it is easy to use a popular keyword to cheat in a log. There are endless cheating methods. It is difficult to effectively detect cheating users with links and hidden content on web pages, and the efficiency of anti-cheating is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for mining cheating user
  • Method and device for mining cheating user
  • Method and device for mining cheating user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0077] In view of the fact that the existing anti-cheating method based on webpage link analysis combined with detection and concealment technology in the community fails to effectively identify cheating users, in the embodiment of the present invention, a method for mining cheating users with users as the granularity is proposed, by comprehensively analyzing the published content of users, and / Or, user operation behaviors are used to mine cheating users, thereby reducing the probability of cheating users cheating, solving the problems of few data links in community web pages and low cost of creating cheating data, improving the anti-cheating efficiency of the community, and providing Anti-cheating method.

[0078] figure 1 It is a sche...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for mining cheating users. The method comprises the following steps of: obtaining representation information of all users; calculating user cheating scores corresponding to the representation information of all the users according to preset scoring strategies; and determining users with user cheating scores which exceed a preset cheating score threshold as the cheating users. By using the method and the device for mining cheating users, the cheating users can be effectively recognized and the anti-cheating efficiency of communities is improved.

Description

technical field [0001] The invention relates to computer communication technology, in particular to a method and device for mining cheating users. Background technique [0002] With the development of computer communication technology, especially the development of 3G network and intelligent mobile terminals, users' network life is becoming more and more abundant, such as chatting, browsing news, watching movies, playing games, searching, shopping, and publishing information on the Internet. It has increasingly become a part of online life. For example, users can exchange and share information and obtain corresponding points by logging in to the community, posting information or replying to questions raised by other users. Among them, a community refers to a social network structure system composed of individuals or organizations, and the people or organizations in the social network structure system are connected through one or more relationships, including but not limited ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
Inventor 张发喜陈洪亮杨志峰余衍炳杨娜
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products