Method distinguishing identities of access users, and device

A technology for accessing users and users, which is applied in the Internet field and can solve problems such as poor accuracy

Active Publication Date: 2015-08-12
TENCENT TECH (BEIJING) CO LTD
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Embodiments of the present invention provide a method and device for distinguishing access user identities t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method distinguishing identities of access users, and device
  • Method distinguishing identities of access users, and device
  • Method distinguishing identities of access users, and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] Before describing further details of various embodiments of the application, one suitable computing architecture that can be used to implement the principles of the application will be described. In the following description, unless indicated otherwise, various embodiments of the present application are described with reference to acts and symbolic representations of operations that are performed by one or more computers. It will thus be appreciated that such acts and operations, which are sometimes referred to as computer-implemented, include the manipulation of electrical signals representing data in a structured form by the processing unit of a computer. This manipulation transforms the data or maintains it at a location in the computer's memory system, which reconfigures or changes the operation of the computer in a manner well understood by those skilled in the art. A data structure that maintains data is a physical location in memory that has specific properties d...

Embodiment 2

[0065] According to an embodiment of the present invention, a method embodiment for implementing the above-mentioned system embodiment is also provided. It should be noted that the steps shown in the flow charts of the drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0066] According to an embodiment of the present invention, there is also provided a method for implementing the above-mentioned distinction of access user identities, such as figure 2 As shown, the method may include the following steps:

[0067] Step S202: can pass figure 1 The shown first acquisition module acquires multiple behavioral feature information of the current visiting user.

[0068] Step S204: can pass figure 1 The shown second acquisition module acquires the legal featur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method distinguishing identities of access users, and a device. The method comprises acquiring a plurality of behavior characteristic information of a current access user, acquiring a legal characteristic probability value and an illegal characteristic probability value of each behavior characteristic information in a sample database, performing a condition probability calculation according to the legal characteristic probability value and the illegal characteristic probability value of each behavior characteristic information to obtain a legal access probability value and an illegal access probability value of the current access user, and comparing the legal access probability value of the current access user and the illegal access probability value of the current access user to determine the current access user to be a legal access user or to be an illegal access user. Through adoption of the method and the device, the technical problem of poor accuracy of the fact that the user is determined to be the legal user or the illegal user in the prior art is solved, the effect that the user is accurately determined to be the legal user or the illegal user is achieved, and then the missing judgment rate and the misjudgment rate for the illegal user are reduced.

Description

technical field [0001] The present invention relates to the field of the Internet, in particular to a method and device for distinguishing access user identities. Background technique [0002] In the Internet industry, users who start using the application within a certain period of time and continue to use the application after a period of time are considered retained, and these users are retained users. In the prior art, operations such as guiding users to visit or download are used to keep users active, so as to increase retained users and increase visits. For example, in the design of video activities, users generally only need to complete some immediate tasks to participate in the lottery draw. The immediate tasks can be just click on the video link, open the video page, etc., or other users who do not need to pay to access or Click behavior, the participating groups of video activities can be users who have visited or not visited this website. [0003] The authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 王博
Owner TENCENT TECH (BEIJING) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products