Identification method and identification device for cheating behavior

An identification method and identification device technology, applied in the computer field, can solve the problem of ignoring the sequence of account history behavior and the like

Active Publication Date: 2016-10-19
ADVANCED NEW TECH CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of implementing this application, the inventor found at least the following problems in the prior art: Although the entropy-ba

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method and identification device for cheating behavior
  • Identification method and identification device for cheating behavior
  • Identification method and identification device for cheating behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0083] In the embodiment of the present invention, it is possible to identify whether the device to be evaluated or the account is cheating by calculating the entropy rate value of the historical behavior event. In order to further improve the recognition probability, historical feature behaviors in the equipment to be evaluated or historical behavior events of accounts can be mined. Combining the weight value of the historical characteristic behavior and the entropy rate value to identify whether the device to be evaluated or the account implements a cheating behavior. The specific implementation steps are as figure 1 shown, including:

[0084] Step S101: Generate a historical behavior sequence according to the historical behavior of the device or account to be evaluated.

[0085] In actual situations, cheaters can use one account to cheat on one device, or use one account to cheat on multiple devices, or use multiple accounts to cheat on one device. Additionally, cheaters...

Embodiment 2

[0117] In order to further consider the sequentiality of the historical behavior sequence, the historical behavior sequence is segmented in the method for calculating the entropy rate in the above embodiment. Combining the weight value of the historical characteristic behavior and the entropy rate value to identify whether the device to be evaluated or the account implements a cheating behavior.

[0118] In this embodiment, multiple different entropy rates can be obtained according to different segmentation results of the historical behavior sequence, and the minimum value of the multiple entropy rates can be used as the entropy rate of the historical behavior sequence. Of course, this embodiment is not limited thereto, and other methods may also be used to determine the entropy rate of the historical behavior sequence.

[0119] The implementation method steps of this embodiment are the same as those of the previous embodiment. Step S101 is the same as the specific implementa...

Embodiment 3

[0161] In the second method embodiment, the extraction of feature subsequences may not be considered, and only the entropy value of the historical behavior time is calculated in segments, and the cheating behavior of the device or account to be evaluated may also be identified. The third embodiment of the method for identifying cheating is introduced below, such as Figure 7 As shown, there are five steps:

[0162] Step S701: Generate a historical behavior sequence according to the historical behavior events of the device or account to be evaluated.

[0163] The implementation manner is the same as that of step S101, and will not be repeated here.

[0164] Step S702: According to different orders, perform segmentation processing corresponding to the order on the historical behavior sequence to form different segmentation results.

[0165] The implementation manner is the same as that of step S401, and will not be repeated here.

[0166] Step S703: Calculate the corrected co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses an identification method and an identification device for a cheating behavior. The identification method comprises the steps of generating a historical behavior sequence according to a historical behavior event of to-be-evaluated equipment or account; calculating entropy rate of the historical behavior sequence; determining a characteristic subsequence of the historical behavior sequence; calculating the weight of the characteristic subsequence; and when the entropy rate is lower than a preset first threshold and the weight is larger than a preset second threshold, identifying cheating of the to-be-evaluated equipment or account in operation. The identification method provided by the embodiment of the invention has advantages considering regularity of the historical behavior of the to-be-evaluated equipment or account, excavating the behavior sub-characteristic of the historical behavior sequence which is arranged according to time, realizing consideration to regularity and sequence of the historical behavior sequence, and improving probability of identifying the cheating account.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a cheating identification method and device. Background technique [0002] In order to attract customers, Internet companies often provide a lot of marketing resources, such as gold coins for login, red envelopes for registration, etc. These marketing resources have also attracted many lawbreakers. These lawbreakers can use machine-assisted cheating to seize marketing resources and even sell these resources to competitors of the Internet company. Fraudulent behavior by criminals has led to companies not only failing to attract customers, but also benefiting competitors. Cheating behaviors can include account scanning, letter speculation, red envelope cheating, and library dragging. To complete the above cheating behaviors, cheaters often need to complete a large number of operations in a loop or repeatedly. These operations imply regularity, such as hype, cheaters ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/02
Inventor 郑丹丹林述民
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products