Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Target user identification method, illegal merchant identification method and device

A target user and identification method technology, which is applied in business, data processing applications, sales/lease transactions, etc., can solve problems such as platform legality and health operation and maintenance threats, and achieve the effect of risk control

Active Publication Date: 2022-04-29
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These illegal transactions are often hidden and pose a threat to the legal and healthy operation and maintenance of the platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Target user identification method, illegal merchant identification method and device
  • Target user identification method, illegal merchant identification method and device
  • Target user identification method, illegal merchant identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be clearly and completely described below in conjunction with specific embodiments of the present application and corresponding drawings. Apparently, the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0099] The technical solutions provided by various embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.

[0100] see figure 1 As shown, the embodiment of the present application provides a target user identification method, which may specifically include:

[0101] S101: Determine a f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a method for identifying a target user, including: determining a first user and a second user with an association relationship, the first user includes a first calibrated user and a first non-marked user; according to the first calibrated user's first Label information, determine the second calibration user among the second users, at least one of the second calibration users has an association relationship with the first calibration user; based on the first label information of the first calibration user and the second calibration user of the second calibration user The tag information identifies the target user from the first non-marked users, and there is an association relationship between the target user and the second marked user. Using the above method, the target user can be identified through the second calibration user that has an association relationship with the first calibration user that has been identified according to the association relationship. Therefore, users who may have illegal behaviors (that is, target users) can be actively identified. Realize the risk control of platform transactions.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a target user identification method and device. Background technique [0002] With the development and popularization of Internet technology, various online business platforms have emerged as the times require, and more and more users (including merchant users and consumer users, etc.) choose to use online business platforms for transactions. [0003] At the same time, some illegal users may also use online business platforms to conduct transactions that violate regulations or restrictions, such as gambling. These illegal transactions are often hidden and pose a threat to the legal and healthy operation and maintenance of the platform. [0004] Therefore, there is an urgent need for a target user identification method in order to actively identify users who may have illegal behaviors and realize risk control of platform transactions. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/06G06Q30/00
CPCG06Q30/0185G06Q30/0609
Inventor 陆逊
Owner ADVANCED NEW TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More