Key user identification method and device, readable storage medium and computer equipment
A key user and identification method technology, applied in the computer field, can solve the problem of low accuracy rate and achieve the effect of improving accuracy rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0052] figure 1 It is an application environment diagram of the key user identification method in an embodiment. refer tofigure 1 , the key user identification method is applied to the server 120. Terminal 110 and server 120 are connected via a network. When the key user identification method is applied to the terminal 110, the terminal 110 extracts the characteristics of the game player's activity dimension according to the game player's activity data in the database; according to the game player's social data in the database, extracts the characteristics of the game pl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


