Malicious registration detection method, device, computer readable medium and electronic device

A malicious registration and detection method technology, which is applied to computer components, computing, and secure communication devices, can solve problems such as inability to cheat user monitoring, disrupt platform order, and destroy Internet services, so as to increase the cost of illegal cheating and improve detection. Efficiency and detection accuracy, high scalability effect

Active Publication Date: 2022-03-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, most Internet-based services require users to register accounts to ensure that users can use the functions of the platform normally. However, there are unavoidable behaviors of gray and black products registering and using malicious accounts, which seriously disrupt the order of the platform and cause serious damage to Internet services. huge destruction
[0003] At present, the method of identifying malicious registration behaviors is mainly to use user behaviors to conduct audits and to conduct policy optimization and logic optimization based on data judgments. Correspondingly, there will be the following problems. First, user behaviors can only be obtained after malicious behaviors occur. , so due to the post-event audit, it will be impossible to resist the malicious behavior of cheating users beforehand. Secondly, the strategy optimization and logic optimization based on data judgment is an independent business audit mode, and thus it is impossible to comprehensively monitor cheating users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious registration detection method, device, computer readable medium and electronic device
  • Malicious registration detection method, device, computer readable medium and electronic device
  • Malicious registration detection method, device, computer readable medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art.

[0035] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details, or other methods, components, means, steps, etc. may be employed. In other instances, well-known methods, ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a malicious registration detection method, device, computer readable medium and electronic equipment, and relates to the technical field. The method includes: obtaining the account number and network environment information in the registration request of the target user, and simultaneously obtaining account characteristic information corresponding to the account and behavior information corresponding to the registration request, the behavior information being the submission frequency of the registration request ; Comparing the behavior information with a preset frequency threshold, and determining a first risk result according to the comparison result; processing the account feature information and the network environment information through a risk model to obtain a second risk result; The first risk result and the second risk result determine a risk value corresponding to the registration request, and judge whether the registration request is a malicious registration according to the risk value. The disclosure can improve the efficiency and accuracy of malicious registration detection, and has high scalability.

Description

technical field [0001] The present disclosure relates to the technical field of artificial intelligence, in particular, to a malicious registration detection method, a malicious registration detection device, a computer-readable medium, and an electronic device. Background technique [0002] With the development of e-commerce, more and more users are getting used to online shopping, online reading, online making friends and so on. At present, most Internet-based services require users to register accounts to ensure that users can use the functions of the platform normally. However, there are unavoidable behaviors of gray and black products registering and using malicious accounts, which seriously disrupt the order of the platform and cause serious damage to Internet services. Huge destruction. [0003] At present, the method of identifying malicious registration behaviors is mainly to use user behaviors to conduct audits and to conduct policy optimization and logic optimiza...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/1396H04L67/60G06K9/62
CPCH04L63/20H04L67/535H04L67/60G06F18/214
Inventor 金炼孙睿
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products