Method and device for user behavior recognition
A behavioral and user-based technology, applied in the direction of computer security devices, instruments, platform integrity maintenance, etc., can solve the problems of unavailable frequency of human operations and unsatisfactory blocking effects, and achieve accurate malicious behaviors and accurate evaluation results.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0079] Here, exemplary embodiments will be described in detail, and examples thereof are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present disclosure. Rather, they are merely examples of devices and methods consistent with some aspects of the present disclosure as detailed in the appended claims.
[0080] In related technologies, network activities are becoming more frequent, and online merchants often launch price-cut spike activities. In order to grab low-priced goods, users will frequently visit the merchant's website within a short period of time. Some users will realize it through some snap-up software. Panic buying software will visit the merchant's website more frequently than ord...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com