Method and device for identifying risk users

An identification method and user technology, applied in the field of data processing, can solve problems such as bad behavior hazards and user hazards, and achieve the effect of flexible detection methods and reduced hazards

Inactive Publication Date: 2014-02-12
ALIBABA GRP HLDG LTD
View PDF3 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the problem with this method is that the harm caused by bad behavior is not only the personal behavior of spam users, but many users participated in the dissemination of spam information related to bad behavior, which eventually caused the harm of bad behavior
Of course, some users unintentionally spread spam information related to bad behavior, while some users spread spam information related to bad behavior intentionally, users who intentionally spread spam information related to bad behavior also cause harm, so need to be regulated accordingly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying risk users
  • Method and device for identifying risk users
  • Method and device for identifying risk users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the above objects, features and advantages of the present application more obvious and understandable, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0039] In the prior art, it is only possible to punish spam users who perform these bad behaviors, but it is impossible to identify users who intentionally spread spam information related to bad behaviors.

[0040] The present application provides a method for identifying risky users, which can identify associated users who intentionally spread spam information related to bad behavior, so that risky users can be identified. Furthermore, the identified risk users can be monitored, and the operation authority of the risk users can be restricted, thereby further reducing the harm caused by bad behaviors.

[0041] The method described in this application will be described in detail below through examples.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for identifying risk users. By means of the method and device for identifying the risk users, users who spread junk information related to bad behaviors on purpose can be identified, and accordingly harm caused by the bad behaviors can be further reduced. The method includes the steps that all punished users are acquired as junk users; information initiated by each junk user is acquired, all associated users of the junk users are analyzed through the initiated information, and the weight of the associated users in the junk users is calculated, wherein the associated users are users who interact with the information initiated by the junk users; the junk users corresponding to the associated users are analyzed with the associated users as dimensionality, and the associated users are identified as the risk users according to the junk users corresponding to the associated users and the weight of the associated users in the corresponding junk users; the identified risk users are monitored, and operating authorization of the risk users is limited.

Description

technical field [0001] The present application relates to data processing technology, in particular to a risk user identification method and device. Background technique [0002] With the popularity of computers and the development of networks, networks are playing an increasingly important role in our lives. Users can transfer information on social network platforms, and can also trade and shop on electronic trading platforms. [0003] However, not all information on the Internet is safe and reliable. For example, on social networking platforms, spam users may spread rumors and attack other users. Another example is that in electronic trading platforms, spam users may commit fraud and sell fake and shoddy products. Once the above-mentioned bad behaviors are found, the managers of the platform usually find the root of the problem and punish the spam users who engage in these bad behaviors, for example, take measures such as sealing up the spam users’ accounts and adding t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/00
Inventor 陈春明王正刚许亮吴云崇
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products