Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious user identification method and apparatus

A malicious user and identification method technology, applied in character and pattern recognition, instruments, electrical components, etc., can solve the problems of missing malicious behavior characteristics, not obvious malicious users, etc.

Active Publication Date: 2018-06-15
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When identifying malicious users in the prior art, in order to prevent normal users from being identified as malicious users, stricter rules are often adopted, and users with obvious malicious behavior characteristics are regarded as malicious users, but this will miss some malicious behavior characteristics. malicious user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious user identification method and apparatus
  • Malicious user identification method and apparatus
  • Malicious user identification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0044] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a malicious user identification method and apparatus. The method comprises the following steps: obtaining bullet screen sending behavior features of a plurality of users; calculating a similarity value of each two users in the plurality of users according to the bullet screen sending behavior features; setting a suspect degree value of a malicious user as a first initial suspect value, and setting the suspect degree value of a to-be-identified user as a second initial suspect value; for each user, performing iterative computation on the suspect degree value of the user through a probabilistic graphical model according to the current suspect degree value of the user and the similarity value of the user and the other users; and after multiple iterative computations, using the to-be-identified user with the suspect degree value greater than a suspect threshold as the malicious user. Therefore, according to the association of the to-be-identified user and the determined malicious user on the bullet screen sending behavior features, the malicious users with unobvious malicious behavior features can be effectively screened out.

Description

technical field [0001] The present application relates to the technical field of big data processing, in particular, to a malicious user identification method and device. Background technique [0002] The live broadcast platform is an Internet social platform that provides broadcasters with a channel to display live video and interact with other users online. There are often some malicious users seeking illegitimate interests through improper means on the live broadcast platform. For example, the live video platform reflects the influence and attention of the anchor through the attention of users to the anchor. Malicious users may gain benefits by creating a large number of false attention, which will destroy the ecology of the live broadcast platform and damage the interests of other normal users. In view of this situation, malicious users need to be identified to block or display the behavior of these malicious users on the live broadcast platform. When identifying malic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/442H04N21/466H04N21/4788H04N21/488G06K9/62
CPCH04N21/44213H04N21/4667H04N21/4788H04N21/4884G06F18/22
Inventor 王璐陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products