Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious user identification method and device

A malicious user and identification method technology, applied in the Internet field, can solve the problem of inaccurate identification of malicious users

Active Publication Date: 2019-05-14
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In traditional technology, malicious users are identified based on the message content submitted by users to the server. However, malicious users who submit spam usually add interference information to the content of spam (for example, adding symbols between characters of sensitive words, etc.) ), making the identification of malicious users inaccurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious user identification method and device
  • Malicious user identification method and device
  • Malicious user identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] Unless the context clearly states otherwise, the number of elements and components in the present invention can exist in a single form or in multiple forms, and the present invention is not limited thereto. Although the steps in the present invention are arranged with labels, they are not used to limit the order of the steps. Unless the order of the steps is clearly stated or the execution of a certain step requires other steps as a basis, the relative order of the steps can be adjusted. It can be understood that the term "and / or" used herein refers to and covers any and all possible combina...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious user identification method. The malicious user identification method includes the following steps that: user identifiers of global users are obtained, and credit corresponding to the user identifiers is calculated, and global user credit distribution is generated according to the credit corresponding to the user identifiers of the global users; user identifiers of conditional users are screened from the user identifiers of the global users according to query conditions; credit corresponding to the user identifiers of the conditional users is obtained, and conditional user credit distribution is generated according to the credit corresponding to the user identifiers of the conditional users; the number of global high-quality users and the number of conditional high-quality users of which the credit is larger than a credit threshold value are respectively obtained from the global user credit distribution and the conditional user credit distribution; and a preset threshold value of the number of high-quality users is obtained, and the difference value of the number of the global high-quality users and the number of the conditional high-quality users is calculated, and whether the query conditions are corresponding to malicious users can be judged according to the difference value and the threshold value of the number of the high-quality users. The above malicious user identification method can improve the accuracy of identification.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a malicious user identification method and device. Background technique [0002] In traditional social network applications, some malicious users usually use multiple social network accounts under the same IP to mass-spend advertisements, pornography, violence or spam with political purposes. In traditional technology, malicious users are identified based on the message content submitted by users to the server. However, malicious users who submit spam usually add interference information to the content of spam (for example, adding symbols between characters of sensitive words, etc.) ), making the identification of malicious users inaccurate. Contents of the invention [0003] Based on this, it is necessary to provide a method for identifying malicious users that can improve the accuracy of identification. [0004] A malicious user identification method, comprising: [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 谢波周斌赵立刘婷婷
Owner TENCENT TECH (SHENZHEN) CO LTD