Method distinguishing identities of access users, and device
A technology for accessing users and users, which is applied in the Internet field and can solve problems such as poor accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Before describing further details of various embodiments of the application, one suitable computing architecture that can be used to implement the principles of the application will be described. In the following description, unless indicated otherwise, various embodiments of the present application are described with reference to acts and symbolic representations of operations that are performed by one or more computers. It will thus be appreciated that such acts and operations, which are sometimes referred to as computer-implemented, include the manipulation of electrical signals representing data in a structured form by the processing unit of a computer. This manipulation transforms the data or maintains it at a location in the computer's memory system, which reconfigures or changes the operation of the computer in a manner well understood by those skilled in the art. A data structure that maintains data is a physical location in memory that has specific properties d...
Embodiment 2
[0065] According to an embodiment of the present invention, a method embodiment for implementing the above-mentioned system embodiment is also provided. It should be noted that the steps shown in the flow charts of the drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0066] According to an embodiment of the present invention, there is also provided a method for implementing the above-mentioned distinction of access user identities, such as figure 2 As shown, the method may include the following steps:
[0067] Step S202: can pass figure 1 The shown first acquisition module acquires multiple behavioral feature information of the current visiting user.
[0068] Step S204: can pass figure 1 The shown second acquisition module acquires the legal featur...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com