Abnormal user identification method and apparatus, and computing device

A computing device and user identification technology, which is applied in the Internet field, can solve problems such as relationship errors, program crashes, and excessive business mapping, and achieve the effect of improving information richness, improving effectiveness, and increasing data quality

Active Publication Date: 2019-06-18
BEIJING TENGYUN TIANXIA SCI & TECH CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current relationship between user IDs is usually stored and processed through the row-column relationship, resulting in time-consuming and labor-intensive data query and relational operations.
Moreover, it is also difficult to find outliers in the data, which will increase the difficulty of data processing problems and business problems, such as data overflow, program crashes, frequent task retries, excessive business mapping, matching rate errors and relationship wrong question
In addition, it is also difficult to trace, clean and eliminate "false data" such as brush volume in the data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal user identification method and apparatus, and computing device
  • Abnormal user identification method and apparatus, and computing device
  • Abnormal user identification method and apparatus, and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0033] figure 1is a block diagram of a computing device 100 according to one embodiment of the invention. In a basic configuration 102 , computing device 100 typically includes system memory 106 and one or more processors 104 . A memory bus 108 may be used for communication between the processor 104 and the system memory 106 .

[0034] Depending on the desired configuration, processor 104 may be any type of processing including, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an abnormal user identification method suitable for being executed in computing equipment, and the method comprises the steps: collecting user identification records generatedby a plurality of pieces of equipment in a service request, each user identification record comprising a plurality of user identifications; generating a user identifier relation between every two useridentifiers in each user identifier record; generating a corresponding user relationship network by taking the user identifier as a network node and the user identifier relationship as a network path, the user relationship network comprising the reliability of the network node and the strength of the network path; identifying a normal network in the user relationship network, and monitoring the infection time and infection nodes when the normal network is infected as an abnormal network; and marking the user identifier corresponding to the infected node as an abnormal user identifier. The invention also discloses a corresponding abnormal user identification device and computing equipment, which can effectively distinguish a normal network from an abnormal network and solve the trouble ofabnormal identification on business and data processing.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an abnormal user identification method, device and computing equipment. Background technique [0002] With the rapid development of mobile communication technology, more and more people obtain information through the Internet to meet their daily study, work and life needs. During these processes, a variety of user identification providers will be collected, so that abnormal users, brush volume data, etc. can be determined by analyzing the application identification. However, the current relationship between user IDs is usually stored and processed through the row-column relationship, resulting in time-consuming and labor-intensive data query and relational operations. Moreover, it is also difficult to find outliers in the data, which will increase the difficulty of data processing problems and business problems, such as data overflow, program crashes, frequent task retries,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/12H04W12/60
Inventor 刘金龙王鹏
Owner BEIJING TENGYUN TIANXIA SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products