Method and apparatus for identifying trustworthy user behavior in network interaction system
A technology of network interaction and behavior, applied in special data processing applications, instruments, calculations, etc., can solve problems such as time-consuming processing, difficulty in meeting real-time application requirements, and affecting user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0105]In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.
[0106] In this application, a method for identifying trusted behaviors of users in a network interaction system and a device for identifying trusted behaviors of users in a network interaction system are respectively provided. In the following embodiments one by one Describe in detail.
[0107] Please refer to figure 1 , which is a flow chart of an embodiment of a method for identifying user credible behavior in a network interaction system of the present application. The method comprises the steps of:
[0108] Ste...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com