User behavior pattern recognition method and device

A behavior and user technology, applied in character and pattern recognition, calculation models, data processing applications, etc., can solve problems such as low risk judgment efficiency, and achieve the effect of improving accuracy and reducing workload

Active Publication Date: 2022-07-05
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditionally, operators need to manually analyze a large number of illegal operation events to summarize certain illegal operation rules, especially the user behavior patterns existing in illegal operations, and the risk judgment efficiency is very low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior pattern recognition method and device
  • User behavior pattern recognition method and device
  • User behavior pattern recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The solution provided by the present invention will be described below with reference to the accompanying drawings.

[0069] As mentioned earlier, operational risk control is required in many industries. For example, in electronic payment and transaction platforms, risk operators often need to analyze the illegal operation links of some risk cases, and analyze some common illegal operation patterns from them. Usually, the behavior link of a user in the client application may be very complex, for example, it may include various complex behaviors such as registration, login, click, visit, request submission, and purchase.

[0070] However, for the illegal operation of a specific scenario, the user's behavior link may be very similar. For example, in the scenario of account theft, the typical illegal operation sequence often includes, for example, changing passwords, changing bindings, verifying identity, paying In a fraud scenario, the typical action sequence of the defr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for determining a user behavior pattern, and the method comprises the steps: obtaining N user behavior sequences with labels, and each user behavior sequence comprises a plurality of sequential operation behaviors; constructing a behavior transfer relation graph according to the N user behavior sequences; the behavior transfer relation graph comprises nodes and directed edges between the nodes, the nodes correspond to the operation behaviors, and the directed edges correspond to a transfer relation between two continuous operation behaviors in the N user behavior sequences; determining the information value of each transfer relationship relative to the label; according to the information value and the transfer relation graph, Q values of other operation behaviors adopted after all the operation behaviors are determined, and the Q values represent the multi-step accumulated information value; and according to the Q value and the transfer relation graph, determining an optimized path from each operation behavior to a final operation behavior of each user behavior sequence, the optimized path being used for determining a behavior pattern of the user.

Description

technical field [0001] One or more embodiments of this specification relate to the fields of data mining and machine learning, and in particular, to a method and apparatus for identifying user behavior patterns. Background technique [0002] Risk control exists in many industries. For example, in electronic payment and trading platforms, operators often need to analyze whether there is a risk of illegal operations, especially illegal transactions, based on user behavior links. Traditionally, operators need to manually analyze a large number of illegal operation events in order to summarize certain illegal operation laws, especially the user behavior patterns existing in illegal operations, and their risk judgment efficiency is very low. [0003] Therefore, in order to improve the risk judgment efficiency of operators, a new identification method of user behavior patterns is required. SUMMARY OF THE INVENTION [0004] The embodiments in this specification aim to provide a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/40G06Q40/04G06K9/62G06N20/00
CPCG06Q20/4016G06Q40/04G06N20/00G06F18/23G06F18/214
Inventor 王宝坤张屹綮石磊磊
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products