Method and device for processing user network behavior

A processing method and user technology, applied in the network field, can solve problems such as loss of game developers and promoters, troubles of normal users, etc., and achieve the effects of improving the accuracy of judgment, reducing the possibility of false strikes, and reducing losses

Inactive Publication Date: 2016-05-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This brings different degrees of losses to game developers and promoters, and also brings troubles to normal users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing user network behavior
  • Method and device for processing user network behavior
  • Method and device for processing user network behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0024] The main idea of ​​the scheme of the embodiment of the present invention is: by acquiring the user's network operation behavior; using the pre-created first evaluation strategy, to score the user's network operation behavior for the first time; if the scoring result conforms to the preset of the first evaluation strategy conditions, it is judged that the user is a suspicious user; the user is maliciously attacked by using the set strategy, so that the effective interception of malicious behaviors in the network such as network advertisements, network activity services, and web application services can be realized, reducing application developers and Sponsor's Loss. Furthermore, users who are judged as suspicious can be scored for a second time using a pre-created second evaluation strategy, and normal users can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a device for processing a user network behavior. The method comprises steps: a network operation behavior of the user is acquired; a first evaluation strategy which is built in advance is adopted to carry out first scoring on the network operation behavior of the user; if the scoring result meets a preset condition for the first evaluation strategy, the user is judged to be a suspicious user; and a set strategy is adopted for the user for malicious attack. Malicious behaviors in a network ad, network activity service, network application service and the like can be effectively intercepted, and losses of an application developer and a promoter can be reduced. Further, as for the user who is judged to be a suspicious user, a second evaluation strategy which is built in advance is adopted to carry out second scoring, normal users are selected, the malicious user judgment accuracy is improved, and the wrong attach possibility is reduced.

Description

technical field [0001] The invention relates to the field of network technologies, in particular to a method and device for processing user network behaviors. Background technique [0002] At present, web games have a large number of user groups no matter on the PC end or on the mobile terminal. While web games bring entertainment experience to users, they also encounter some malicious cheating behaviors, such as malicious clicks and malicious rewards (such as malicious swiping event rewards, swiping game gift bags, virtual currency, etc.) and other cheating behaviors are common exist. This brings different degrees of losses to game developers and promoters, and also brings troubles to normal users. Contents of the invention [0003] Embodiments of the present invention provide a method and device for processing user network behaviors, aiming at effectively intercepting malicious behaviors in the network and reducing losses of application developers and promoters. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 张延巍吴蒿钱淑钗王翔王春辉
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products