Method for identifying malicious users according to negative comments of users

A malicious user and user technology, applied in data processing applications, special data processing applications, electronic digital data processing, etc., can solve problems such as easy misjudgments and missed judgments, failure to meet the accuracy requirements for identifying malicious users, and achieve The effect of improving the recognition rate

Inactive Publication Date: 2019-09-27
达疆网络科技(上海)有限公司
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the actual effect of the above-mentioned scheme depends heavily on the personal experience and personal ability of the makers of the scoring mechanism, and is inevitably su

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying malicious users according to negative comments of users
  • Method for identifying malicious users according to negative comments of users
  • Method for identifying malicious users according to negative comments of users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0046] Such as Figure 1-6 As shown, the present invention proposes a method for identifying malicious users according to the user's bad reviews, and the method includes the following steps:

[0047] S1. Collect the user's order information in the historical time period; judge the user's shopping tendency and shopping frequency by collecting the user's order information in the historical time period, which is beneficial ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for identifying the malicious users according to the negative comments of the users. The method comprises the following steps of S1, acquiring the order information of a user in a historical time period; S2, collecting the evaluation information of the user in the historical time period; S3, updating a sensitive word bank in real time and analyzing the negative comment information; S4, judging the risk level of the user by combining the order and the negative comment information; and S5, classifying different users. By utilizing the negative comment records in the specified historical time period of the user and combining the user order dimension attributes to formulate a negative comment risk user level, the blacklist management is carried out on the high-risk risk users; by marking a medium-risk user as a risk, and waiting for the manual checking processing, the low-risk user is not processed and is filtered automatically; meanwhile, in combination with the sensitive word bank, the word bank has the characteristic of dynamic updating, the word segmentation is conducted on the user negative comment data through a word segmentation device, and the weighted calculation is conducted on the user risks through the sensitive words, so that the high-risk user recognition rate is effectively increased.

Description

technical field [0001] The invention relates to the technical field of e-commerce platform monitoring, in particular to a method for identifying malicious users according to user negative reviews. Background technique [0002] With the development of network technology, network servers can provide information services for a large number of access users in parallel by virtue of their powerful processing performance, such as software downloads, online chat, online shopping and so on. However, among the users who access the network server, there are often some malicious users who use technical means to damage the rights and interests of others. For example, malicious negative reviews aimed at merchant stores affect the reputation of merchants and seriously damage the rights and interests of sellers and other consumers. [0003] In order to effectively stop the behavior of malicious users, there are some schemes that can identify malicious users in user groups. For example, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/06G06Q10/06G06F17/27G06F16/33
CPCG06Q30/0609G06Q10/0635G06F16/3344G06F40/289
Inventor 韩强刘伟从杜小莎王浩韩友师
Owner 达疆网络科技(上海)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products