Method and device for identifying target user of service provider

A target user and identification method technology, applied in the computer field, can solve problems such as incomplete holding data of the unit and failure to identify the target user of the service provider

Active Publication Date: 2020-07-28
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In traditional technology, the method of equity penetration is generally used to mine the target users of the service provider. However, due to the f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying target user of service provider
  • Method and device for identifying target user of service provider
  • Method and device for identifying target user of service provider

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The solutions provided in this specification will be described below in conjunction with the accompanying drawings.

[0027] In order to effectively identify the target users of the service provider, the inventors of the present application propose to identify the target users of the service provider based on knowledge graphs. The service parties mentioned in this specification can be, for example, organizations such as enterprises, schools, and hospitals. The target users of the service party include but are not limited to the ultimate beneficiary.

[0028] The knowledge graph described in this specification can be constructed based on several service parties and the association relationship between each service party and their respective individual users. The service provider here may include, but not limited to, the first type of service provider that has not identified the target user and the second type of service provider that has identified the target user. In ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for identifying a target user of a service provider, and the method comprises the steps: obtaining a knowledge graph which comprises a plurality of nodes, wherein each node represents one entity and corresponds to one entity vector; and in the plurality of nodes, connecting the nodes with the association relationship through connecting edges, wherein each connecting edge corresponds to one association vector; for the first node of any first type of service party in the knowledge graph, when a target user is identified, determining asecond node of the second type of service party and a third node of the target user of the second type of service party in the knowledge graph; determining a reference entity vector based on the entity vector of the first node and the association vector of the connection edge of the second node and the third node; calculating distance between the reference entity vector and an entity vector of a node of each person user;. based on the distance, selecting a target node, and taking a personal user represented by the target node as a target user of the first type of service provider.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular to a method and device for identifying a target user of a server. Background technique [0002] In the Internet field, in order to implement risk control, it is usually necessary to identify the user's identity. The users here can include two categories: individual users and unit users (also called service parties). For an individual user, the identity of the user is usually identified based on the user's description information, such as age, salary, and occupation. As for the service provider, the identification of the service provider is realized by identifying the identity of the target user. The target users here may include, but are not limited to, the ultimate beneficiary, etc. Among them, the ultimate beneficiary refers to the natural person who ultimately controls the unit directly or indirectly. [0003] In traditional technology, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/36G06Q40/04
CPCG06F16/367G06Q40/04
Inventor 曾威龙王膂钱隽夫刘丹丹
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products