Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious order identification method and device

An identification method and malicious technology, applied in the field of electronic technology applications, can solve problems affecting interests and other issues

Active Publication Date: 2019-12-13
XIAOMI INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The actions of these malicious users have seriously affected the interests of other users with genuine purchase intentions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious order identification method and device
  • Malicious order identification method and device
  • Malicious order identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some of the embodiments of the present disclosure, not all of them. . Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0069] Picture 1-1 It is a schematic diagram of the implementation environment involved in the malicious order identification method provided by some embodiments of the present disclosure. The implementation environment may include: a server 110 and at least one terminal 120 . The server 110 may be one server, or a server cluster composed of several servers, or a cloud computing service center. The terminal 120 may be a smart phone, a comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious order identification method and device and belongs to the electronic technology application field. The method comprises the steps of: according a preset first word segmentation algorithm, carrying out word segmentation on an address to be identified, and obtaining words to be identified in the address to be identified; counting the number of words belonging to a malicious word database in the words to be identified, wherein the malicious word database is established in advance, and at least one malicious word used for identifying malicious addresses is recorded in the malicious word database; according to the number of words belonging to the malicious word database, judging whether the address to be identified is a malicious address; and when the address to be identified is the malicious address, determining that an order corresponding to the address to be identified is a malicious order. By adopting the malicious order identification method and device, the accuracy of malicious order identification is improved, and the problem in the prior art that the accuracy is relatively low when the malicious order is identified by means of similarity. The malicious order identification method and device are used for identifying malicious orders.

Description

technical field [0001] The present disclosure relates to the application field of electronic technology, in particular to a malicious order identification method and device. Background technique [0002] With the rapid development of e-commerce technology, various marketing methods emerge in an endless stream. At present, a marketing method of panic buying and big promotion is popular, for example: pricing commodities at a lower price and opening them for purchase at a specified time point. In this case, some malicious users may appear to seize resources in large quantities by violating the rules of the activity, and then sell them at high prices. The actions of these malicious users have seriously affected the interests of other users with real purchase intentions. [0003] In related technologies, when a malicious user makes a large amount of purchases on the e-commerce platform, a large amount of repeated information may appear in the malicious user's order information s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/06
CPCG06Q30/0609G06Q30/0637
Inventor 于亮马利超韩爱君
Owner XIAOMI INC