User identification method and device

A user identification and user technology, applied in the computer field, can solve the problems of incompleteness and single method of identifying real network users, and achieve the effect of accurate user identification and smooth user experience

Inactive Publication Date: 2016-12-14
LETV HLDG BEIJING CO LTD +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a user identification method and device, which is used to solve the problem that the method for identifying real network users in the prior art is relatively single and incomplete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method and device
  • User identification method and device
  • User identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] figure 1 A schematic flowchart of the user identification method provided by Embodiment 1 of the present invention is shown. The execution subject of the method provided in Embodiment 1 of the present invention may be a user identification device, which may be a hardware with an embedded program integrated on the terminal, or an applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a user identification method and device and relates to the technical field of computers. The user identification method includes: acquiring network behavior records of a user, wherein the network behavior records include at least one operation record; configuring weights for the operation records; calculating scores according to the weight of each operation record in the network behavior records; identifying whether the user is a real network user or not according to the scores. By the technical scheme, the user is identified on the basis of the network behavior records of the user, so that the identifying mode is more comprehensive and accurate; a current operation of the user does not need to be interrupted, so that user experience is smoother.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a user identification method and device. Background technique [0002] With the development of network technology, the network has become increasingly popular. People can conduct transactions through e-commerce, and use online media platforms to watch TV programs, TV dramas, movies, etc. At present, there are many cheating behaviors on the Internet to obtain better Internet search rankings, and there are also web crawlers that simulate users' normal behaviors to pirate or stream videos. [0003] In the prior art, there are usually two methods for identifying whether a user is a real network user: [0004] Method 1. During the user's use, ask a question, such as 2+2=? , let the user answer, if the answer is correct, it will be considered as a real network user, otherwise, it will be considered as a virtual machine simulating operation. This method will interrupt the use of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/31G06F17/30
CPCG06F16/955G06F21/316
Inventor 陈翔胡勇
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products