A method and apparatus for identify fraud

A technology for identifying methods and behaviors, applied in the Internet field, can solve problems such as easy accidental damage to normal accounts

Inactive Publication Date: 2019-01-15
ADVANCED NEW TECH CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, it is mainly to use the existing black sample collection to extract fraudulent keywords, and then monitor the fraudulent keywords in the user's social messages to avoid fraudulent behavior, but the existing technology is easy to accidentally damage normal accounts, or be Black production elements bypass monitoring by replacing text with pictures, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and apparatus for identify fraud
  • A method and apparatus for identify fraud
  • A method and apparatus for identify fraud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present specification as recited in the appended claims.

[0028] The terms used in this specification are for the purpose of describing particular embodiments only, and are not intended to limit the specification. As used in this specification and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a method and apparatus for identifying fraudulent accounts. Firstly, a preset social behavior evaluation rule is used to evaluate whether the social behavior of a target account is abnormal or not, and the social behavior of the target account is the state of a set of associated accounts of the target account. If the social behavior of the target account is abnormal, matching the social language of the target account with the fraud keyword, and evaluating the risk degree of the target account according to the weight of the fraud keyword contained in the sociallanguage of the target account; if the risk level is higher than the preset threshold, the target account is marked as fraudulent. The present application establishes a set of tags for aggregating high-risk users through a layer-by-layer filtering method in order to timely control and reduce the probability of accidentally injuring a normal account and being bypassed by a black element.

Description

technical field [0001] This specification relates to the Internet field, and in particular to a method and device for identifying fraudulent behavior. Background technique [0002] With the rise of the Internet, social networks have become an indispensable tool in people's lives. All major social platforms have launched social products with various forms and rich functions to provide users with low-threshold, low-cost, and convenient social services. Due to the virtual nature of the Internet, users' identities on social platforms have also become blurred, and it has become easier to hide or virtualize their identities. Fraudsters have taken advantage of this and started to use social platforms to commit fraud. [0003] In the existing technology, it is mainly to use the existing black sample collection to extract fraudulent keywords, and then monitor the fraudulent keywords in the user's social messages to avoid fraudulent behavior, but the existing technology is easy to acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/335G06Q50/00H04L29/06
CPCG06Q50/01H04L63/0227H04L63/1425
Inventor 张哲
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products