Anti-fraud prediction method and system based on network link backtracking
A network link and prediction method technology, applied in the Internet field, can solve problems such as fraudulent income, failure to achieve results, and inability to obtain platform discounts and benefits
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] figure 1 A schematic flow chart of an anti-fraud prediction method based on network link backtracking provided by an embodiment of the present invention, the anti-fraud prediction method includes the following steps:
[0053] Step 100: Obtain the unique identifier of the user according to the first network link;
[0054] Step 200: Encrypt the unique user identifier to generate a second network link; wherein, the first network link includes a mobile phone application connection or an H5 webpage network link, etc.;
[0055] Step 300: Obtain the number of deduplicated identifiers of the second network link in the historical time period according to the unique identifier of the user;
[0056] Since each second network link is unique, and each second network link may be clicked multiple times by a user, it is necessary to record the number of identifiers of the clicked second network connections after deduplication.
[0057] Step 400: Perform feature analysis on the histor...
Embodiment 2
[0105] figure 2 A schematic structural diagram of an anti-fraud prediction system based on network link backtracking provided by an embodiment of the present invention, the anti-fraud prediction system includes a first acquisition module, an encryption module, a second acquisition module, a first analysis module, a second analysis module, fusion module and prediction module; where,
[0106] The first obtaining module is used to obtain the user's unique identifier according to the first network link;
[0107] The encryption module encrypts the user unique identifier to generate a second network link;
[0108] The second acquiring module acquires the deduplicated number of identifiers of the second network link in a historical time period according to the unique identifier of the user;
[0109] The first analysis module performs characteristic analysis on the historical behavior of the historical promotion content according to the deduplication quantity of the identification,...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


