Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User behavior identification method with transaction character

An identification method and user technology, applied in the information field, can solve the problems of limited use scenarios, lack of personality models, and neglect of user personality factors

Active Publication Date: 2021-06-15
DONGHUA UNIV
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has not changed the assessment methods of these traditional psychological theoretical models based on question-and-answer tests, and the use scenarios are still limited
Lack of available personality models, unable to identify users' personalities in real time
[0007] Therefore, due to the limitations of recognition performance caused by ignoring user personality factors and lack of suitable personality models, it is impossible to accurately identify user behaviors, especially when users face new scenarios and occasional behaviors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior identification method with transaction character
  • User behavior identification method with transaction character
  • User behavior identification method with transaction character

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments. This embodiment is carried out on the premise of the technical solution of the present invention, and detailed implementation and specific operation process are given, but the protection scope of the present invention is not limited to the following embodiments.

[0049] Such as figure 1 The frame flow diagram of the user behavior recognition system with transaction personality is shown in the figure. The user behavior recognition method with transaction personality in the present invention establishes the user behavior with transaction personality from the user transaction behavior benchmark, user caution portrait, and the distance relationship based on transaction behavior and prudence. Recognition model to realize behavior recognition. The method specifically includes the following steps:

[0050] (1) User transaction behavior benchmarks b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a user behavior recognition method with transaction characters, which establishes a user behavior recognition model with transaction characters from a user transaction behavior reference, a user careful portrait and a distance relationship based on transaction behaviors and careful degrees, thereby realizing behavior recognition. Based on the transaction data and the interaction data, the user is depicted from the perspective of transaction behaviors and transaction characters. According to the method, the fraudulent behavior in the electronic transaction can be effectively detected. From the perspective of practicability, an identification framework is established through transaction behaviors and references, cautious degrees and portraits, a relation model and a risk threshold value, and technical support is provided for solving fraudulent transaction detection.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for identifying user behavior with transactional characteristics. Background technique [0002] In recent years, with the mobileization of the global market and the informatization of financial and commodity transactions, the fraud risks exposed in the two major areas of digital finance and e-commerce in the mobile Internet have become more and more serious. The current main forms of mobile fraud include false user fraud, information theft fraud, malicious transaction fraud, financial payment fraud, online fraud, telecommunications fraud, online loan fraud, etc. [0003] User behavior recognition algorithms based on transaction behavior are widely used in the field of electronic transaction fraud detection. In the research on transaction behavior recognition, Bahnsen, A.C., Yu, Xie, Lutao, Zheng, and Kultur, Y. et al. constructed user behavior certificates based on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40
CPCG06Q20/4016
Inventor 章昭辉王鹏伟魏子明
Owner DONGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products