Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet authenticity consumer discrimination method, system and device

A discriminant method, a consumer technology, applied in the field of traffic analysis, can solve the problems that commercial applications cannot be realized, a large amount of computing resources and time, and high cost

Pending Publication Date: 2021-06-04
上海宏原信息科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the application of this method based on user characteristics is almost impossible to be realized in commercial applications as the amount of data on social platforms increases (billions, tens of billions).
The reason is that 1) the model needs to manually judge and label which are abnormal accounts as training data. If you want to find out which are abnormal accounts among 100 million pieces of user data, you need to manually label a large amount of data, which is costly
2) Even with marked abnormal account data, the prediction needs to spend a lot of computing resources and time
3) The accuracy of this type of model is usually around 80%, which is still a long way from commercial applications
[0005] Similarly, methods based on user relationship recognition rely on models such as graph theory and probability graphs, and will encounter problems similar to machine learning models in applications.
In addition, as Internet users pay more attention to the protection of personal privacy, the user social network data necessary for the method based on user relationship identification becomes very difficult to obtain, which further increases the difficulty of implementing this method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet authenticity consumer discrimination method, system and device
  • Internet authenticity consumer discrimination method, system and device
  • Internet authenticity consumer discrimination method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0045] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0046] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the technical field to w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to the Internet authenticity consumer discrimination method, system and device provided by the invention, a multi-mode abnormal account identification method is designed for social and vertical platforms, the speaking content and behavior of a user are combined, and the method comprises the following steps: randomly selecting a sample user, extracting behavior data of the user and publishing content data; establishing a dynamic threshold value of feature anomaly judgment to determine a quantitative difference between an abnormal behavior and a normal behavior of the user; and establishing an evaluation mechanism according to the dynamic threshold to dynamically evaluate the state of the user, and identifying an abnormal user account.

Description

technical field [0001] The invention relates to the technical field of flow analysis, in particular to a method, system and device for discriminating authentic Internet consumers. Background technique [0002] At present, there are mainly three methods for identifying fake consumers (abnormal network accounts): analysis based on content characteristics, analysis based on user behavior characteristics, and analysis methods based on user relationship characteristics. [0003] Content feature analysis refers to the use of natural language processing related technologies, such as text analysis and sentiment analysis to identify similarities and emotional tendencies between texts, so as to achieve the purpose of identifying abnormal accounts. This technology was widely used mainly in the early Internet era, such as identifying spam by detecting duplicate content. However, with the advancement of the Internet, abnormal accounts will hide themselves more and more, and can even imi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/2458G06Q50/00
CPCG06F16/2465G06F16/2462G06Q50/01
Inventor 杨骏郭奕楷
Owner 上海宏原信息科技有限公司