Method and system for identifying potential malicious user in website
A malicious user and user technology, applied in the field of data analysis, can solve the problems of single statistical dimension, disadvantageous identification of potential malicious users, and little retained information.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0011] Other aspects, advantages and salient features of the present invention will become apparent to those skilled in the art from the following detailed description of exemplary embodiments of the present invention when taken in conjunction with the accompanying drawings.
[0012] In the present invention, the terms "include" and "comprising" and their derivatives mean to include but not limit; the term "or" is inclusive, meaning and / or.
[0013] In this specification, the various embodiments described below to describe the principles of the present invention are illustrative only and should not be construed as limiting the scope of the invention in any way. The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the present invention as defined by the claims and their equivalents. The following description includes numerous specific details to aid in understanding, but these sh...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com