Unlock instant, AI-driven research and patent intelligence for your innovation.

Black product user identification method and device, storage medium and computer equipment

A user identification and user technology, applied in the field of network security, can solve the problems of low identification rate, high false alarm rate, and high false negative rate of illegal users, and achieve the goal of reducing the false negative rate, reducing the false positive rate, and improving the accuracy rate Effect

Pending Publication Date: 2022-07-29
广州方硅信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under the temptation of huge profits, the modus operandi and criminal technology of illegal users are being upgraded faster and faster. The traditional method of identifying illegal users through statistical methods makes the recognition rate of illegal users low, the false alarm rate high and the The problem of high false negative rate is becoming more and more prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Black product user identification method and device, storage medium and computer equipment
  • Black product user identification method and device, storage medium and computer equipment
  • Black product user identification method and device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.

[0035] It should be clear that the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without creative work fall within the protection scope of the embodiments of the present application.

[0036] Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. In the description of this application, it should be understood that the terms "first", "second", "third", etc. are only used to distinguish similar objects, and are not necessari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the field of network security, and provides a black product user identification method and device, a storage medium and computer equipment, and the method comprises the steps: obtaining first transaction data in a business platform within a first preset time; obtaining a plurality of pieces of first transaction feature information according to the first transaction data; inputting the first transaction feature information into an adaptive parameter training model for training to obtain a target adaptive parameter; inputting the target adaptation parameter and the first transaction feature information into a black product user identification model for training to obtain a trained black product user identification model; obtaining second transaction data in a second preset time in the business platform; obtaining second transaction feature information according to the second transaction data; and inputting the second transaction feature information into a corresponding trained black product user identification model to obtain a black product user identification result. According to the embodiment of the invention, the black product user identification accuracy can be improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of network security, and in particular, to a method, device, storage medium, and computer equipment for identifying a black product user. Background technique [0002] With the rapid development of Internet technology, various industries such as travel, online shopping and webcasting have continued to grow, and more and more merchants have entered this market. In order to attract new users and cultivate users' consumption habits in the fierce competition, various types of marketing activities and subsidy activities are emerging one after another. While bringing benefits to normal users, it has also spawned a group of black-produced users who focus on marketing activities. Black-produced users refer to users who register a large number of accounts, find loopholes in rules, find marketing routines, and earn a lot of subsidies from merchants. [0003] At present, the behavior of bl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q30/02G06Q40/08G06N3/04G06N3/08
CPCG06Q30/0225G06Q40/08G06N3/08G06N3/044G06N3/045
Inventor 许创标赖俊帆陈征
Owner 广州方硅信息技术有限公司