Risk model training and junk account detection method, device and equipment

A technology of risk model and training method, applied in the direction of digital transmission system, data exchange network, electrical components, etc., can solve the problems of low platform value and garbage, etc.

Active Publication Date: 2018-08-17
ADVANCED NEW TECH CO LTD
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For bad purposes, some users or organizations will automatically register a large number of accounts through the machine and perform operations such as real-name authentication in batches. These accounts may bring risks to the platform, and they are also of low value to the platform, so they can be regarded as spam accounts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk model training and junk account detection method, device and equipment
  • Risk model training and junk account detection method, device and equipment
  • Risk model training and junk account detection method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The embodiment of this specification provides risk model training, spam account detection method, device and equipment.

[0048] In order to enable those skilled in the art to better understand the technical solutions in this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in the embodiments of this specification. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments of this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0049] In the risk control system of most business platforms, detecting spam accounts is of great significance in terms of risk control and security. Generally, no matter whether the account is involved in fraud or not, as ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a risk model training and junk account detection method, device and equipment. The risk model training method comprises the following steps: acquiring an account network diagram, wherein the account network diagram includes nodes and edges connecting the nodes, the nodes represent accounts, and at least part of the edges represent that the accounts represented by the nodes connected with the at least part of the edges are registered through the same medium; determining a characteristic vector of the nodes through unsupervised learning; and training a risk model through supervised learning according to the determined characteristic vector. According to the risk model training method provided by the invention, a junk account is detected by using thetrained risk model, wherein the risk model is a GBDT (Gradient Boosting Decision Tree) classifier and the like.

Description

technical field [0001] This specification relates to the technical field of computer software, and in particular to risk model training, spam account detection methods, devices and equipment. Background technique [0002] With the rapid development of computer and Internet technology, many services can be carried out online. To use these services, users often need to register corresponding accounts, such as e-commerce platform accounts, third-party payment platform accounts, forum platform accounts, etc. [0003] For bad purposes, some users or organizations will automatically register a large number of accounts through the machine and perform operations such as real-name authentication in batches. These accounts may bring risks to the platform, and are of low value to the platform, so they can be regarded as junk accounts. [0004] In the prior art, these spam accounts are usually dealt with correspondingly, such as freezing, canceling, etc., through user reporting. [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L63/1425
Inventor 曹绍升周俊
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products