Method and device for processing false user recognition, equipment and storage medium

A technology for user identification and processing methods, applied in the field of equipment and storage media, devices, and processing methods for false user identification, can solve problems such as inaccurate identification, and achieve the effect of reducing false traffic and improving real validity.

Inactive Publication Date: 2019-03-01
TAIKANG LIFE INSURANCE CO LTD +1
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This application provides a processing method, device, equipment and storage medium for false user identification to solve defects such as inaccurate identification in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing false user recognition, equipment and storage medium
  • Method and device for processing false user recognition, equipment and storage medium
  • Method and device for processing false user recognition, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a processing method for false user identification, which is used to judge the authenticity of users who generate data traffic, so as to improve the authenticity of data traffic. The execution subject of this embodiment is a processing device for false user identification, and the device can be set in a computing device, such as a computing device such as a computer or a server.

[0057] Such as figure 1 As shown, it is a schematic flow chart of the processing method for false user identification provided in this embodiment, the method includes:

[0058] Step 101, acquiring user's device fingerprint information and IP address information.

[0059] Specifically, the device fingerprint information is the unique device fingerprint information planted directly by embedding executable code in the application program APP. When the user accesses the server through the APP on the client side, the server can obtain the user's device fingerprint informati...

Embodiment 2

[0069] This embodiment provides a further supplementary description of the method provided in the first embodiment.

[0070] Such as figure 2 As shown in , it is a schematic flowchart of the processing method for false user identification provided in this embodiment.

[0071] As an implementable manner, on the basis of the first embodiment above, optionally, the method may further include:

[0072] Step 2011, if the number of IP address changes corresponding to the device fingerprint information within the second preset time span exceeds a preset threshold and multiple traffic conversions occur, then determine that the user corresponding to the device fingerprint information is a fake user.

[0073] Step 2012, adding device fingerprint information and IP addresses to the blacklist.

[0074] Specifically, if within a period of time (the second preset duration), the IP address of the device corresponding to the fingerprint information of the same device often changes, and the...

Embodiment 3

[0125] This embodiment provides a device for processing false user identification, which is used to execute the method in the first embodiment above.

[0126] Such as image 3 As shown in , it is a schematic structural diagram of a processing device for false user identification provided in this embodiment. The device 30 for processing false user identification includes an acquisition module 31 and a processing module 32 .

[0127] Among them, the obtaining module 31 is used to obtain the user's device fingerprint information and IP address information; the processing module 32 is used to determine the IP address corresponding to the device fingerprint information if the device fingerprint information corresponds to at least two regional IP addresses within the first preset time length. The user is a fake user.

[0128] Regarding the apparatus in this embodiment, the specific manner in which each module executes operations has been described in detail in the embodiment of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a method and device for processing false user recognition, equipment and a storage medium. The method for processing the false user recognition comprises the following steps:obtaining equipment fingerprint information and IP address information of a user; and determining the user corresponding to the equipment fingerprint information to be a false user if the equipment fingerprint information corresponds to the IP addresses of at least two regions in a first preset duration. The judgment is carried out according to the equipment fingerprint information and IP addressinformation of the user; and if the equipment fingerprint information corresponds to the IP addresses of at least two regions in the first preset duration, the user corresponding to the equipment fingerprint information is determined to be a false user; therefore, the false user can be effectively recognized, false traffic can be reduced, and the true validity of data traffic can be improved.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a processing method, device, equipment and storage medium for false user identification. Background technique [0002] With the rapid development of the Internet, advertising through the Internet has become an effective way of publicity. However, fake users have become a key problem in the Internet advertising industry. False users are machine users. False users generate false traffic for the advertising industry, that is, machine traffic. For example, malicious visitors automatically and frequently send requests to web servers through script programs. The fake traffic not only does not produce any commercial and social value, but also brings usability and stability risks to the network server, inconvenience to normal users' access, and also brings large errors to the traffic analysis of the website. Therefore, false users need to be identified in order to co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/12H04W12/126H04W12/71
CPCH04L63/0876H04L63/1425H04W12/06H04W12/12
Inventor 张子成崔蓝艺
Owner TAIKANG LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products