Malicious order identification method and device and electronic device

An order and malicious technology, applied in the network field, can solve the problems of low recognition success rate and narrow recognition range, and achieve the effect of increasing the success rate and expanding the scope

Active Publication Date: 2017-11-10
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that with the improvement of the anti-monitoring strategy of malicious orderers, the existing malicious order identification technology has a low identification success rate and a narrow identification range.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious order identification method and device and electronic device
  • Malicious order identification method and device and electronic device
  • Malicious order identification method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0056] In the prior art, the identification of malicious orders often adopts targeted identification in each link. For example, there is a method of identifying the IP address accessed by the order. When it is detected that the number of orders from the same IP address increases sharply within a period of time, These orders can be determined as malicious orders, or these orders can be determined as suspicious orders and further identified. However, when a malicious user uses malicious means to make the access IP address of each malicious order different, the above method cannot identify these malicious orders, which shows that the identification success rate of the existing methods is low.

[0057] Based on this, the inventor believes that the user's historical order behavior includes the user's order h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a malicious order identification method and device and an electronic device. The method comprises the steps of obtaining data of a to-be-identified order behavior; and analyzing the data of the to-be-identified order behavior through utilization of an analysis model and obtaining a malicious score of the to-be-identified order behavior, wherein the analysis model is obtained by carrying out model training according to the data of a preset order behavior; and judging whether the to-be-identified order behavior is a malicious order behavior or not according to the malicious score. Through application of the embodiment of the invention, the data of the to-be-identified order behavior is analyzed through utilization of the analysis model, so a malicious order identification success rate can be improved, and a malicious order identification range can be expanded.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a method, device and electronic equipment for identifying malicious orders. Background technique [0002] With the rise of Internet e-commerce, the safety of online shopping has also been paid more and more attention. Many malicious users take advantage of loopholes in e-commerce or price differences to swipe and snatch orders, causing disadvantages or even losses to consumers with normal needs and e-commerce. [0003] However, the inventor found in the process of realizing the present invention that the prior art has at least the following problems: [0004] Existing e-commerce companies adopt targeted identification in each link, such as a method for specifically identifying whether visits are too frequent, and a method for specifically identifying whether the address of the consignee is similar. These identification methods are independently based on limited functions to de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q30/06
CPCG06Q30/0609G06Q30/0635
Inventor 钱春江余文喆杜红光
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products