Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identification method and device

An identification method and user technology, applied in the field of user identification method and device, to achieve the effect of accurate risk score

Active Publication Date: 2014-02-12
ADVANCED NEW TECH CO LTD
View PDF5 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there are slight and serious differences between the above-mentioned behaviors of users. For example, in e-commerce platforms, some users deliberately sell counterfeit and shoddy products as genuine products to make profits, while some users conduct false transactions when new products are just launched. In order to increase the confidence of the seller, there is nothing wrong with the product itself

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method and device
  • User identification method and device
  • User identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the above objects, features and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0037] The impact caused by the user's behavior has a slight difference and a serious difference, and the existing technology cannot distinguish this.

[0038] The present application provides a method for identifying users, which can distinguish the severity of behaviors of different users, and process the users differently according to the severity of the behaviors.

[0039] The method described in this application will be described in detail below through examples.

[0040] refer to figure 1 , a flow chart of a method for identifying a user described in the embodiment of the present application is given.

[0041] Step 11, obtaining the behavior information of each user, and distinguishing various types of associated use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user identification method and device. According to the user identification method and device, the degree of severity of behaviors of different users can be distinguished, and distinction processing is carried out on the users according to the order of severity of the behaviors. The user identification method comprises the steps of obtaining behavior information of each user, and distinguishing various associated users of each user according to the behavior information, wherein the associated users are users who carry out interaction with the behavior information of the corresponding user; carrying out weighting on the various associated users of each user according to preset risk weights of the associated users according to each user to obtain a risk value of the user; carrying out corresponding monitoring operation and limiting operation on the users according to the risk values of the users.

Description

technical field [0001] The present application relates to data processing technology, in particular to a user identification method and device. Background technique [0002] With the popularity of computers and the development of networks, networks are playing an increasingly important role in our lives. Users can transfer information on social network platforms, and can also trade and shop on electronic trading platforms. [0003] However, not all information on the Internet is safe and reliable. For example, on a social networking platform, some users may spread rumors, and some users may attack other users. For another example, in the electronic trading platform, some users may conduct false transactions in order to improve credit, and some users may sell fake and shoddy products. [0004] There are hundreds of millions of data running and interacting on the platform every day, and the data related to the above-mentioned behaviors of users is very hidden. Usually, only...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/00
Inventor 陈春明王正刚许亮吴云崇
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products