Black product user identification method and device, storage medium and computer equipment
A user identification and user technology, applied in the field of network security, can solve the problems of low identification rate, high false alarm rate, and high false negative rate of illegal users, and achieve the goal of reducing the false negative rate, reducing the false positive rate, and improving the accuracy rate Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] In order to make the objectives, technical solutions and advantages of the present application clearer, the embodiments of the present application will be further described in detail below with reference to the accompanying drawings.
[0035] It should be clear that the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without creative work fall within the protection scope of the embodiments of the present application.
[0036] Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. In the description of this application, it should be understood that the terms "first", "second", "third", etc. are only used to distinguish similar objects, and are not necessari...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


