Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for identifying trustworthy user behavior in network interaction system

A technology of network interaction and behavior, applied in special data processing applications, instruments, calculations, etc., can solve problems such as time-consuming processing, difficulty in meeting real-time application requirements, and affecting user experience

Active Publication Date: 2016-05-18
ADVANCED NEW TECH CO LTD
View PDF5 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the need to analyze risk rules and model algorithm calculations one by one for a large number of user behaviors, the processing process is time-consuming and inefficient. Behavior recognition methods have been difficult to meet the needs of online real-time applications; in addition, because the above-mentioned recognition methods need to rely on a large amount of additional data, the hardware storage cost of the entire system has been increased; and the recognition accuracy of this needle-in-a-haystack recognition method is low. Normal operation behaviors are identified as risky behaviors. On the one hand, it will cause indiscriminate disturbance to users and affect user experience. On the other hand, in order to improve accuracy, manual intervention and verification are required, which increases labor costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for identifying trustworthy user behavior in network interaction system
  • Method and apparatus for identifying trustworthy user behavior in network interaction system
  • Method and apparatus for identifying trustworthy user behavior in network interaction system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105]In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0106] In this application, a method for identifying trusted behaviors of users in a network interaction system and a device for identifying trusted behaviors of users in a network interaction system are respectively provided. In the following embodiments one by one Describe in detail.

[0107] Please refer to figure 1 , which is a flow chart of an embodiment of a method for identifying user credible behavior in a network interaction system of the present application. The method comprises the steps of:

[0108] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying a trustworthy user behavior in a network interaction system. The method comprises the steps of obtaining user behavior data in the network interaction system; and identifying whether the user behavior is trustworthy or not in any one of the following modes: identifying whether the user behavior is trustworthy or not by judging whether a comparison result of pre-generated trustworthy data and the user behavior data meets a preset rule or not; or, calculating an index value representing the creditability of the user behavior by adopting a pre-generated trustworthy behavior identification model, and identifying whether the user behavior is trustworthy or not by judging whether the index value is equal to a preset trustworthy threshold or not. At the same time, the invention provides an apparatus for identifying the trustworthy user behavior in the network interaction system. According to the technical scheme provided by the invention, a new thought of identifying the user behavior is provided and most trustworthy behaviors can be accurately and efficiently identified from mass user behaviors only by depending on trustworthy data and original behavior data.

Description

technical field [0001] The present application relates to the field of user behavior identification, in particular to a method for identifying user credible behavior in a network interaction system. The present application also provides a device for identifying user credible behavior in a network interaction system. Background technique [0002] With the rapid development of network technology and network applications, the Internet has gradually penetrated into every corner of people's lives. Online shopping, online reading, online video, online social networking, etc. have become an indispensable part of people's lives. While the Internet brings convenience to people, it also brings troubles in information security to people. The issue of network security has become the focus of people's attention for a long time. [0003] Although the use of traditional identity authentication and other technical means can basically solve the identity trust problem of network users, it ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/55G06F17/30
Inventor 黄海潘寒冰雷鑫
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products