WO2020233366A1 - 无效用户操作路径识别方法、装置、设备及存储介质 - Google Patents

无效用户操作路径识别方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2020233366A1
WO2020233366A1 PCT/CN2020/087583 CN2020087583W WO2020233366A1 WO 2020233366 A1 WO2020233366 A1 WO 2020233366A1 CN 2020087583 W CN2020087583 W CN 2020087583W WO 2020233366 A1 WO2020233366 A1 WO 2020233366A1
Authority
WO
WIPO (PCT)
Prior art keywords
preset
target
user
target user
operation path
Prior art date
Application number
PCT/CN2020/087583
Other languages
English (en)
French (fr)
Inventor
李官宝
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020233366A1 publication Critical patent/WO2020233366A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Definitions

  • This application relates to the field of fraud detection, and in particular to methods, devices, equipment and storage media for identifying invalid user operation paths.
  • This application provides a method, device, equipment, and storage medium for identifying invalid user operation paths, which can identify invalid users through the user's operation path, which improves the promotion efficiency of operation promotion activities and also improves the use of funds for operation promotion activities Rate, avoiding the waste of funds.
  • the first aspect of the embodiments of the present application provides an invalid user operation path identification method, including: obtaining operation path information of the target user, the operation path information including account ID, device ID, operation type, total operation times, and operation path duration ; According to the operation path information of the target user, determine whether the operation path of the target user meets the preset invalid user operation path rule; if the operation path of the target user meets the preset invalid operation path rule, set the The target user is an invalid user; if the operation path of the target user does not conform to the preset invalid operation path rule, the target user is set as a valid user; if the target user is an invalid user, the preset wind is executed Control strategy, the preset risk control strategy is an operation of re-identifying the invalid user.
  • the second aspect of the embodiments of the present application provides an invalid user operation path identification device, including: an acquiring unit configured to acquire operation path information of a target user, the operation path information including account ID, device ID, operation type, total The number of operations and the duration of the operation path; a judging unit for judging whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user; the first setting unit, if the target user If the operation path of the target user meets the preset invalid operation path rule, it is used to set the target user to be an invalid user; the second setting unit is used to set the target user’s operation path to not meet the preset invalid operation path rule Set the target user as a valid user; the execution unit, if the target user is an invalid user, is used to execute a preset risk control strategy.
  • the third aspect of the embodiments of the present application provides an invalid user operation path identification device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and the processor executes all
  • the computer program implements the invalid user operation path identification method described in any of the foregoing embodiments.
  • the fourth aspect of the embodiments of the present application provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the steps of the invalid user operation path identification method described in any of the above embodiments .
  • invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids waste of funds.
  • FIG. 1 is a schematic diagram of an embodiment of an invalid user operation path identification method in an embodiment of the application
  • FIG. 2 is a schematic diagram of another embodiment of a method for identifying an invalid user operation path in an embodiment of this application;
  • FIG. 3 is a schematic diagram of an embodiment of an invalid user operation path identification device in an embodiment of the application.
  • FIG. 4 is a schematic diagram of another embodiment of an invalid user operation path identification device in an embodiment of the present invention.
  • Fig. 5 is a schematic diagram of an embodiment of an invalid user operation path identification device in an embodiment of this application.
  • the embodiments of the present application provide a method, device, device and storage medium for identifying invalid user operation paths. Invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities and also increases the funds for operation promotion activities. Utilization rate, avoiding the waste of funds.
  • FIG. 1 a flowchart of an invalid user operation path identification method provided by an embodiment of the present application, which specifically includes:
  • the operation path information includes account ID, device ID, operation type, total operation times, and operation path duration.
  • the server obtains the operation path information of the target user, and the operation path information includes account code (identity, ID), device ID, operation type, total operation times, and operation path duration. Specifically, the server obtains the target user's operation path information by adding a buried point at the location where the front-end calls the back-end interface operation; the server obtains the target user's operation path information by adding the function of recording flow information in the back-end interface.
  • the account ID is a unique document ID that can determine the identity of the target user, such as an ID.
  • the device ID is the server device ID used by the target user to log in to the server, such as the International Mobile Equipment Identity (IMEI). Each device sold through regular channels conforms to the global system for mobile communications (GSM) standard.
  • GSM global system for mobile communications
  • Operation types are all types of operations performed by the target user after starting the server.
  • the target user’s operation path is a series of operations for the target user to use a proprietary user ID and device to obtain benefits. For example, in an e-commerce application (application, APP)-based newcomer registration and coupon promotion, a certain The target user's operation path is to use his mobile phone number and mobile phone to register, log in, and receive coupons.
  • the server will call the corresponding back-end interface. For example, when the user fills in the registration information and submits it to the server, the server will call the back-end registration interface.
  • the operation path information of the target user determine whether the operation path of the target user meets a preset invalid user operation path rule.
  • the server determines whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user. Specifically, the server counts the total login times of the target account ID and the total login times of the target device ID through a preset counter; the server determines whether the total login times of the target account ID meets the preset first operation path feature through the preset matcher: target The total login times of the account ID exceeds the preset first login times.
  • the preset matcher is used to match the preset operation path characteristics that the target user matches and stores all preset operation path characteristic values; the server judges the target device ID through the preset matcher Whether the total number of login times meets the preset second operation path characteristic: The total login times of the target device ID exceeds the preset second login times; the server determines whether the target user's operation type meets the preset third operation path characteristic through the preset matcher : The target operation type is the preset operation type; the server judges whether the total number of target operations meets the preset fourth operation path feature through the preset matcher: the total number of target operations is less than the preset number of operations; the server judges through the preset matcher Whether the target operation path duration meets the preset fifth operation path feature: the target path operation duration is less than the preset duration; the server counts the number of preset operation path features matched by the preset matcher; if the number of preset operation path features exceeds the preset If the number of features is the number of features, it is determined that the target user's operation path
  • the preset operation path characteristic value includes the preset first login times, the preset second login times, the preset operation times, the preset operation type, the preset duration, and the preset feature quantity.
  • a user Du Fu used a script to obtain a large number of red envelopes for newcomers.
  • the server set the preset number of first logins to 10 times.
  • Set the second login times to 20 times
  • a set of preset operation types are registration, login, account opening, recharge and receive 50 yuan red envelope
  • the preset number of operations is 7
  • the preset duration is 2 minutes
  • the number of preset features is 2. .
  • Du Fu obtains the newcomer's red envelope through the shortest operation path.
  • Du Fu's operation type is the preset operation type. The number of operations for each type of operation is 1, and Du Fu’s total number of operations is 5 times less than the preset number of operations.
  • the registered account ID is the ID card ID, and the total number of logins using the ID card ID for registration is 18. Exceeds the preset first login times set by the server, the total login times of the terminal device ID used by Du Fu is 5, and does not exceed the preset second login times set by the server. According to statistics, the number of preset operation path features that Du Fu meets is 4 If the number of preset features is exceeded, the server will set the account registered by Du Fu as an invalid user.
  • the preset first login times, preset second login times, preset operation types, preset operation times, preset duration, and preset feature quantity can all be adjusted according to the operation characteristics of invalid users. For example, for operation types, most invalid users will obtain activity benefits through the fewest operations.
  • the server adds all necessary operation types to obtain benefits as a set of operation types to the preset operation types.
  • the server can also analyze the operation types of other invalid users.
  • the server sets the target user as an invalid user, and the invalid user is a user set by the server who cannot obtain benefits.
  • the server can distinguish whether the target user is an invalid user by adding a preset invalid identifier to the user classification identifier set of the invalid user.
  • the target user is set as a valid user.
  • the server sets the target user as a valid user.
  • the server can distinguish whether the target user is an invalid user by adding a preset effective identification to the user classification identification set of the effective user, and the user classification identification set is stored in the user's preset configuration file.
  • the server sets the benefit obtaining permission for the target user. Specifically, if the operation path of the target user does not meet the preset invalid operation path rule, the server adds a valid identifier to the preset configuration file of the target user; the server adds the configuration of preset permissions to the preset configuration file of the target user, The preset permission is the permission to obtain the preset benefits; when the target user initiates a request to obtain benefits, the server uses the preset permission detection module to detect whether there is a valid identifier in the preset configuration file of the target user; when the server detects the target user’s When there is a valid identifier in the preset configuration file, the server obtains a request for benefits through the target user.
  • the preset risk control strategy is executed, and the preset risk control strategy is an operation of re-authenticating the invalid user.
  • the server executes a preset risk control strategy.
  • the preset risk control strategy is the operation set by the server to re-authenticate invalid users.
  • the pre-built risk control strategy is to reduce the situation that operation promotion benefits are obtained by invalid users.
  • the preset risk control strategy includes: if the target user is an invalid user, the server will authenticate the target user through a preset verification operation; if the target user is authenticated, the server will change the target user to a valid user; if the target user If the identity verification fails, the server will add the target user to the blacklist. For example, the server will add the invalid user Li Bai’s registered account, ID card number and device ID to the blacklist, and Li Bai cannot use the registered account to obtain activity benefits. And when Li Bai uses the ID number and device ID in the blacklist to register next time, the server will prompt Li Bai to fail to register.
  • the preset verification operation is to verify that the target user is not an invalid user who obtains activity benefits in large quantities through the machine.
  • the preset verification operation can be a random questionnaire or a verification code, such as a sliding verification code or a distorted or deformed image verification code, or other verification methods, such as SMS verification. Do restrictions.
  • invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids the waste of funds.
  • another embodiment of the method for identifying invalid user operation paths in the embodiment of the present application includes:
  • the operation path information includes account ID, device ID, operation type, total operation frequency, and operation path duration.
  • the server obtains the operation path information of the target user through the buried point set at the front end.
  • the operation path information includes the account ID, the device ID, the operation type, the total number of operations, and the operation path length.
  • the server queries the buried points on the page, and the buried points are set at the position corresponding to the operation type on the page.
  • the ice is used to count the number of operations of each operation type and record the information of the operation type.
  • the server obtains red envelopes on the page.
  • the area setting buried point counts the number of times the target user clicks to obtain the red envelope area on the page.
  • the operation type information includes the trigger time of the operation type and the business information corresponding to the operation type.
  • the business information that needs to be recorded is: click Uniform resource locator URL, clicked page title (tittle), clicked location, etc.; the server obtains the account ID and device ID recorded when the target user logs in, and obtains the target account ID and target device ID of the target user; The server determines the operation type for which the number of operations counted by the embedded point is not zero, and takes the operation type for which the number of operations is not zero as the target operation type of the target user; the server adds the operation times of each target operation type to obtain the target total of the target user Operation times: The server calculates the target path operation duration of the target user according to the trigger moment of the buried point record.
  • the account ID is a unique document ID that can determine the identity of the target user, such as an ID.
  • the device ID is the server device ID used by the target user to log in to the server, such as the International Mobile Equipment Identity (IMEI). Every mobile phone sold through regular channels that conforms to the Global System for Mobile Communications standard GSM has a unique IMEI code.
  • Operation types are all types of operations performed by the target user after starting the server.
  • the target user's operation path is a series of operations for the target user to use a proprietary user ID and device to obtain benefits. For example, a certain target user's operation is based on an e-commerce application APP launched by a newcomer to register and send coupons.
  • the path is a series of operations such as registering, logging in, and receiving coupons using your mobile phone number and mobile phone.
  • the server calculates the target path operation duration of the target user according to the trigger time recorded by the buried point. Specifically, the server obtains the earliest trigger time and the latest trigger time of all operation types, and the server uses the latest trigger time minus the earliest trigger time to obtain the target The duration of the user's operation.
  • the operation path information includes account ID, device ID, operation type, total number of operations, and operation path duration.
  • the server records the flow information through the back-end interface, and obtains the operation path information of the target user according to the flow information.
  • the operation path information includes the account ID, device ID, operation type, total number of operations, and operation path duration.
  • the server records the flow information through the back-end interface corresponding to the operation type.
  • the flow information includes the time when the back-end interface is called, the type of the back-end interface, and the user token used to call the back-end interface.
  • the function of recording flow information is added to the interface to realize the function of recording flow information; the server adds the flow information to the user operation log, which is used to summarize the flow information recorded by the back-end interface; when the target user completes all operations, the server Obtain the target user operation log of the target user; the server parses the user token in the target user operation log to obtain the target account ID and target device ID of the target user; the server converts the back-end interface type in the target user operation log to the operation type to obtain All target operation types of the target user; the server counts the number of times all back-end interface types are recorded in the target user's operation log, and adds the number of times the back-end interface types are recorded to get the target total operation times of the target operation type; the server according to the target user The operation time of the target path of the target user is calculated at the time the back-end interface is called in the operation log.
  • the server parses the user token in the target user operation log to obtain the target user’s target account ID and target device ID.
  • the user token is a unique token allocated by the server according to the target user’s account information.
  • the user token is used in the backend Identify the user’s identity.
  • the server can retrieve the target user’s account information by parsing the target user’s user token.
  • the account information includes the target user’s account ID, device ID, and login IP address.
  • the user token can be in the form of session ID or The form of access token is not restricted here.
  • the server will call the corresponding back-end interface. For example, when the user fills in the registration information and submits it to the server, the server will call the back-end registration interface.
  • the account ID is a unique document ID that can determine the identity of the target user, such as an ID.
  • the device ID is the server device ID used by the target user to log in to the server, such as the International Mobile Equipment Identity (IMEI). Every mobile phone sold through regular channels that conforms to the Global System for Mobile Communications standard GSM has a unique IMEI code.
  • Operation types are all types of operations performed by the target user after starting the server.
  • the target user's operation path is a series of operations for the target user to use a proprietary user ID and device to obtain benefits. For example, a certain target user's operation is based on an e-commerce application APP launched by a newcomer to register and send coupons.
  • the path is a series of operations such as registering, logging in, and receiving coupons using your mobile phone number and mobile phone.
  • step 201 and step 202 can be performed, or step 201 and step 202 can be performed, and there is no inevitable order of step 201 and step 202.
  • Step 201 can be performed first and then step 202 can be performed, or it can be performed first.
  • Step 201 is executed after step 202, or step 201 and step 202 are executed at the same time.
  • the operation path information of the target user determine whether the operation path of the target user meets the preset invalid user operation path rule.
  • the server determines whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user. Specifically, the server counts the total login times of the target account ID and the total login times of the target device ID through a preset counter; the server determines whether the total login times of the target account ID meets the preset first operation path feature through the preset matcher: target The total login times of the account ID exceeds the preset first login times.
  • the preset matcher is used to match the preset operation path characteristics that the target user matches and stores all preset operation path characteristic values; the server judges the target device ID through the preset matcher Whether the total number of login times meets the preset second operation path characteristic: The total login times of the target device ID exceeds the preset second login times; the server determines whether the target user's operation type meets the preset third operation path characteristic through the preset matcher : The target operation type is the preset operation type; the server judges whether the total number of target operations meets the preset fourth operation path feature through the preset matcher: the total number of target operations is less than the preset number of operations; the server judges through the preset matcher Whether the target operation path duration meets the preset fifth operation path feature: the target path operation duration is less than the preset duration; the server counts the number of preset operation path features matched by the preset matcher; if the number of preset operation path features exceeds the preset The number of features, the server determines that the target user’s operation path complies with the prese
  • the preset operation path characteristic value includes the preset first login times, the preset second login times, the preset operation times, the preset operation type, the preset duration, and the preset feature quantity.
  • a user Du Fu used a script to obtain a large number of red envelopes for newcomers.
  • the server set the preset number of first logins to 10 times.
  • the preset operation types are registration, login, account opening, recharge and receive 50 yuan red envelope
  • the preset operation times is 7
  • the preset duration is 2 minutes
  • the preset feature number is 2.
  • Du Fu obtains the newcomer's red envelope through the shortest operation path.
  • Du Fu's operation type is the preset operation type.
  • the number of operations for each type of operation is 1, and Du Fu’s total number of operations is 5 times less than the preset number of operations.
  • the registered account ID is the ID card ID, and the total number of logins using the ID card ID for registration is 18. Exceeds the preset first login times set by the server, the total login times of the terminal device ID used by Du Fu is 5, and does not exceed the preset second login times set by the server. According to statistics, the number of invalid rules that Du Fu meets is 4, which exceeds If the number of rules is preset, the server sets the account registered by Du Fu as an invalid user.
  • the preset first login times, preset second login times, preset operation types, preset operation times, preset duration, and preset feature quantity can all be adjusted according to the operation characteristics of invalid users. For example, for operation types, most invalid users will obtain activity benefits through the fewest operations.
  • the server adds all necessary operation types to obtain benefits as a set of operation types to the preset operation types.
  • the server can also analyze the operation types of other invalid users.
  • the server sets the target user as an invalid user, and the invalid user is a user set by the server who cannot obtain benefits.
  • the server can distinguish whether the target user is an invalid user by adding a preset invalid identifier to the user classification identifier set of the invalid user.
  • the server sets the target user as a valid user.
  • the server can distinguish whether the target user is an invalid user by adding a preset effective identification to the user classification identification set of the effective user, and the user classification identification set is stored in the user's preset configuration file.
  • the server sets the benefit obtaining permission for the target user. Specifically, if the operation path of the target user does not meet the preset invalid operation path rule, the server adds a valid identifier to the preset configuration file of the target user; the server adds the configuration of preset permissions to the preset configuration file of the target user, The preset permission is the permission to obtain the preset benefits; when the target user initiates a request to obtain benefits, the server uses the preset permission detection module to detect whether there is a valid identifier in the preset configuration file of the target user; when the server detects the target user’s When there is a valid identifier in the preset configuration file, the server obtains a request for benefits through the target user.
  • the preset risk control strategy is executed, and the preset risk control strategy is an operation of re-identifying the invalid user.
  • the server executes a preset risk control strategy.
  • the preset risk control strategy is the operation set by the server to re-authenticate invalid users.
  • the pre-built risk control strategy is to reduce the situation that operation promotion benefits are obtained by invalid users.
  • the preset risk control strategy includes: if the target user is an invalid user, the server will authenticate the target user through a preset verification operation; if the target user is authenticated, the server will change the target user to a valid user; if the target user If the identity verification fails, the server will add the target user to the blacklist. For example, the server will add the invalid user Li Bai’s registered account, ID card number and device ID to the blacklist, and Li Bai cannot use the registered account to obtain activity benefits. And when Li Bai uses the ID number and device ID in the blacklist to register next time, the server will prompt Li Bai to fail to register.
  • the preset verification operation is to verify that the target user is not an invalid user who obtains activity benefits in large quantities through the machine.
  • the preset verification operation can be a random questionnaire or a verification code, such as a sliding verification code or a distorted or deformed image verification code, or other verification methods, such as SMS verification. Do restrictions.
  • invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids waste of funds.
  • the obtaining unit 301 is configured to obtain operation path information of the target user, the operation path information includes account ID, device ID, operation type, total operation times, and operation path duration; the judgment unit 302 is used to obtain operation path information of the target user The path information is used to determine whether the operation path of the target user meets the preset invalid user operation path rule; the first setting unit 303, if the operation path of the target user meets the preset invalid operation path rule, is used to set the The target user is an invalid user;
  • the second setting unit 304 is configured to set the target user as a valid user if the operation path of the target user does not meet the preset invalid operation path rule; the execution unit 305, if the target user is an invalid user, It is used to execute a preset risk control strategy, and the preset risk control strategy is an operation of re-identifying the invalid user.
  • invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids the waste of funds.
  • an embodiment of the device for identifying an invalid user operation path in the embodiment of the present invention includes: an obtaining unit 301, configured to obtain operation path information of a target user, the operation path information including account ID, device ID, operation type , The total number of operations and the duration of the operation path; the judging unit 302 is configured to judge whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user; the first setting unit 303, if If the operation path of the target user conforms to the preset invalid operation path rule, it is used to set the target user as an invalid user; the second setting unit 304, if the operation path of the target user does not conform to the preset invalid operation path The rule is used to set the target user as a valid user; the execution unit 305, if the target user is an invalid user, is used to execute a preset risk control strategy, and the preset risk control strategy is for the invalid user Perform authentication again.
  • the acquiring unit 301 includes: a first acquiring module 3011, configured to acquire operation path information of the target user through a buried point set at the front end; and a second acquiring module 3012, configured to record pipeline information through a back-end interface , And obtain the operation path information of the target user according to the flow information.
  • the first obtaining module 3011 is specifically configured to: query the buried point in the page, the buried point is set at a position corresponding to the operation type on the page and used to count the number of operations of each operation type And record the information of the operation type, the information of the operation type includes the trigger time of the operation type and the business information corresponding to the operation type; and obtain the information recorded when the target user performs the login operation Account ID and device ID, the target account ID and target device ID of the target user are obtained, and the target account ID and target device ID of the target user are obtained; the operation type for which the number of operations is not zero is determined, and the operation The operation type whose number of times is not zero is used as the target operation type of the target user; the operation times of each target operation type are added together to obtain the target total operation times of the target user; the trigger moment recorded according to the buried point Calculate the target path operation duration of the target user.
  • the first obtaining module 3012 is specifically configured to: record flow information through the back-end interface corresponding to the operation type, where the flow information includes the time when the back-end interface is called, the back-end interface type, and the call User token for the back-end interface; add the flow information to the user operation log; when the target user completes all operations, obtain the target user operation log of the target user; parse the user in the target user operation log Token to obtain the target account ID and target device ID of the target user; convert the back-end interface type in the target user operation log into the operation type to obtain the target operation type of the target user; statistics The number of times the back-end interface type is recorded in the target user operation log is added to the number of times the back-end interface type is recorded to obtain the target total number of operations of the target user; according to the target user operation Calculate the target path operation duration of the target user at the time when the back-end interface is called in the log.
  • the determining unit 302 is specifically configured to: count the total login times of the target account ID and the total login times of the target device ID through a preset counter; determine the total login times of the target account ID through a preset matcher Whether the times meet the preset first operation path characteristics: the total login times of the target account ID exceeds the preset first login times, and the preset matcher is used to match the preset operation path characteristics that the target user meets and store All preset operation path characteristic values; the preset matcher determines whether the total login times of the target device ID meets the preset second operation path characteristic: the total login times of the target device ID exceeds the preset second login The number of times; the preset matcher determines whether the target user's operation type meets the preset third operation path feature: the target operation type is a preset operation type; the preset matcher determines the target Whether the total number of operations meets the preset fourth operating path feature: the total number of target operations is less than the preset number of operations; the preset matcher determines whether the target operating
  • the execution unit 305 is specifically configured to: if the target user is an invalid user, perform identity verification on the target user through a preset verification operation, and the preset verification operation includes filling in a preset questionnaire, Identify the preset verification code and SMS verification; if the target user passes the identity verification, change the target user to a valid user; if the target user fails the identity verification, change the target user add to blacklist.
  • the second setting unit 304 is specifically configured to: if the operation path of the target user does not conform to the preset invalid operation path rule, add a valid identifier to the preset configuration file of the target user; The configuration of preset permissions is added to the preset configuration file of the target user, and the preset permissions are the acquisition permissions of preset benefits.
  • invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids waste of funds.
  • the above Figures 3 to 4 describe the invalid user operation path identification device in the embodiment of the present invention in detail from the perspective of modular functional entity, and the following describes the invalid user operation path identification device in the embodiment of the present invention from the perspective of hardware processing in detail.
  • FIG. 5 is a schematic structural diagram of an invalid user operation path identification device provided by an embodiment of the present application.
  • the invalid user operation path identification device 500 may have relatively large differences due to different configurations or performance, and may include one or more processors (central processing units, CPU) 501 (for example, one or more processors) and a memory 509, and one or more storage media 508 (for example, one or more storage devices with a large amount of data) storing application programs 507 or data 506.
  • the memory 509 and the storage medium 508 may be short-term storage or persistent storage.
  • the program stored in the storage medium 508 may include one or more modules (not shown in the figure), and each module may include a series of instruction operations in the device for identifying invalid user operation paths.
  • the instruction includes the implementation steps of any embodiment of the above-mentioned invalid user operation path identification method.
  • the processor 501 may be configured to communicate with the storage medium 508 and execute a series of instruction operations in the storage medium 508 on the device 500 for identifying an invalid user operation path.
  • the device 500 for identifying invalid user operation paths may also include one or more power supplies 502, one or more wired or wireless network interfaces 503, one or more input and output interfaces 504, and/or one or more operating systems 505, such as Windows Serve, Mac OS X, Unix, Linux, FreeBSD, etc.
  • Windows Serve Windows Serve
  • Mac OS X Unix
  • Linux FreeBSD
  • the processor 501 can execute the functions of the acquiring unit 301, the determining unit 302, the first setting unit 303, the second setting unit 304, and the executing unit 305 in the foregoing embodiment.
  • the processor 501 is the control center of the invalid user operation path identification device, and can perform processing according to the set information processing method.
  • the processor 501 uses various interfaces and lines to connect the various parts of the entire invalid user operation path identification device, and executes invalidation by running or executing software programs and/or modules stored in the memory 509, and calling data stored in the memory 509
  • the user operation path recognizes the various functions and processing data of the device, thereby realizing the identification of invalid user operation paths.
  • the storage medium 508 and the storage 509 are both carriers for storing data.
  • the storage medium 508 may refer to an internal storage with a small storage capacity but a fast speed
  • the storage 509 may be an external storage with a large storage capacity but a slow storage speed. Memory.
  • the memory 509 can be used to store software programs and modules, and the processor 501 executes various functional applications and data processing of the invalid user operation path identification device 500 by running the software programs and modules stored in the memory 509.
  • the memory 509 may mainly include a storage program area and a storage data area.
  • the storage program area may store an operating system, an application program required by at least one function (such as a program for obtaining operation path information of a target user, etc.); the storage data area may Store the data (such as user token, etc.) created by identifying the use of the device according to the invalid user operation path.
  • the memory 509 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • a non-volatile memory such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the instruction includes the implementation steps of any embodiment of the above-mentioned invalid user operation path identification method.
  • the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
  • the computer instructions may be passed from a website, a computer, or a data center. Wire (for example, coaxial cable, optical fiber, twisted pair) or wireless (for example, infrared, wireless, microwave, etc.) to transmit to another website, computer, or data center.
  • the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a data center integrated with one or more available media.
  • the computer-readable storage medium may be non-volatile or Can be volatile.
  • the readable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, an optical disk), or a semiconductor medium (for example, a solid state disk (SSD)).

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请涉及欺诈检测领域,公开了一种无效用户操作路径识别方法、装置、设备及存储介质,提高了运营推广活动的推广效率以及运营推广活动的资金利用率,避免了资金浪费。本申请方法包括:获取目标用户的操作路径信息,操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;根据目标用户的操作路径信息,判断目标用户的操作路径是否符合所述预置无效用户操作路径规则;若目标用户的操作路径符合预置无效操作路径规则,则设置目标用户是无效用户;若目标用户的操作路径不符合预置无效操作路径规则,则设置目标用户为有效用户;若目标用户是无效用户,则执行预置风控策略,预置风控策略为对无效用户再次进行身份验证的操作。

Description

无效用户操作路径识别方法、装置、设备及存储介质
本申请要求于2019年5月22日递交中国专利局、申请号为201910427058.7,发明名称为“无效用户操作路径识别方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及欺诈检测领域,尤其涉及无效用户操作路径识别方法、装置、设备及存储介质。
背景技术
企业为了推广产品展开了大量的运营推广活动,随着手机移动应用的发展,企业会基于应用软件做一些运营推广活动,目的是增加有效客户。
发明人发现,现在的推广应用软件无法识别参与活动的用户是否是无效用户,导致运营推广活动存在无效用户通过脚本大量获取福利的情况,造成运营推广活动资金的浪费,也没有达到预期的推广效果。
发明内容
本申请提供了一种无效用户操作路径识别方法、装置、设备及存储介质,能够通过用户的操作路径识别出无效用户,提高了运营推广活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。
本申请实施例的第一方面提供一种无效用户操作路径识别方法,包括:获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
本申请实施例的第二方面提供了一种无效用户操作路径识别装置,包括:获取单元,用于获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;判断单元,用于根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;第一设置单元,若所述目标用户的操作路径符合预置无效操作路径规则,则用于设置所述目标用户是无效用户;第二设置单元,若所述目标用户的操作路径不符合所述预置无效操作路径规则,则用于设置所述目标用户为有效用户;执行单元,若所述目标用户是无效用户,则用于执行预置风控策略。
本申请实施例的第三方面提供了一种无效用户操作路径识别设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现上述任一实施方式所述的无效用户操作路径识别方法。
本申请实施例的第四方面提供了一种计算机可读存储介质,包括指令,当所述指令在计算机上运行时,使得计算机执行上述任一实施方式所述的无效用户操作路径识别方法的步骤。
本发明实施例,通过用户的操作路径识别出无效用户,提高了运营推广活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。
附图说明
图1为本申请实施例中无效用户操作路径识别方法的一个实施例示意图;
图2为本申请实施例中无效用户操作路径识别方法的另一个实施例示意图;
图3为本申请实施例中无效用户操作路径识别装置的一个实施例示意图;
图4为本发明实施例中无效用户操作路径识别装置的另一个实施例示意图;
图5为本申请实施例中无效用户操作路径识别设备的一个实施例示意图。
具体实施方式
本申请实施例提供了一种无效用户操作路径识别方法、装置、设备及存储介质,通过用户的操作路径识别出无效用户,提高了运营推广活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。
请参阅图1,本申请实施例提供的一种无效用户操作路径识别方法的流程图,具体包括:
101、获取目标用户的操作路径信息,操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长。
服务器获取目标用户的操作路径信息,操作路径信息包括账号编码(identity,ID)、设备ID、操作类型、总操作次数以及操作路径时长。具体包括:服务器通过在前端调用后端接口操作的位置增加埋点,获取目标用户的操作路径信息;服务器通过在后端接口增加记录流水信息的功能,获取目标用户的操作路径信息。账号ID为能确定目标用户身份的唯一证件ID,如身份证ID。设备ID为目标用户用于登录服务器的服务器设备ID,如国际移动设备识别码(international mobile equipment identity,IMEI),每部通过正规渠道销售的符合全球移动通信***标准(global system for mobile communications,GSM)的手机均有唯一的IMEI码。操作类型为目标用户在启动服务器后进行的所有操作类型。目标用户的操作路径为目标用户使用专有的用户ID以及设备进行获取福利的一系列操作,例如,在基于某电商应用 (application,APP)推出的新人注册送优惠券的优惠活动中,某目标用户的操作路径为使用自己的手机号以及手机进行注册、登录以及领取优惠券等系列操作。
需要说明得是,目标用户在进行获取福利的过程中每进行一个操作,服务器会调用对应的后端接口,例如用户填写好注册信息提交给服务器时,服务器会调用后端的注册接口。
102、根据目标用户的操作路径信息,判断目标用户的操作路径是否符合预置无效用户操作路径规则。
服务器根据目标用户的操作路径信息,判断目标用户的操作路径是否符合预置无效用户操作路径规则。具体的,服务器通过预置计数器计数目标账号ID的总登录次数和目标设备ID的总登录次数;服务器通过预置匹配器判断目标账号ID的总登录次数是否符合预置第一操作路径特征:目标账号ID的总登录次数超过预置第一登录次数,预置匹配器用于匹配目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;服务器通过预置匹配器判断目标设备ID的总登录次数是否符合预置第二操作路径特征:目标设备ID的总登录次数超过预置第二登录次数;服务器通过预置匹配器判断目标用户的操作类型是否符合预置第三操作路径特征:目标操作类型为预置的操作类型;服务器通过预置匹配器判断目标总操作次数是否符合预置第四操作路径特征:目标操作总次数少于预置操作次数;服务器通过预置匹配器判断目标操作路径时长是否符合预置第五操作路径特征:目标路径操作时长少于预置时长;服务器统计预置匹配器匹配到的预置操作路径特征数量;若预置操作路径特征数量超过预置特征数量,则确定目标用户的操作路径符合预置无效用户操作路径规则;若预置操作路径特征数量未超过预置特征数量,则确定目标用户的操作路径不符合预置无效用户操作路径规则。
其中,预置操作路径特征值包括预置第一登录次数、预置第二登录次数、预置操作次数、预置的操作类型、预置时长以及预置特征数量。举例说明,在某面向新用户的办理银行卡并且充值1000则送50元红包的运营推广活动中,某用户杜甫利用脚本大量获取新人红包,服务器设置的预置第一登录次数为10次,预置第二登录次数为20次,一组预置的操作类型为注册,登录,开户,充值以及领取50元红包,预置操作次数为7,预置时长为2分钟,预置特征数量为2。杜甫通过时间最短的操作路径来获取新人红包,杜甫的操作类型为预置的操作类型。每个操作类型的操作次数为1次,杜甫的总操作次数为5次少于预置操作次数,注册的账号ID为身份证ID,使用该身份证ID进行注册登录的总登录次数为18,超过服务器设置的预置第一登录次数,杜甫使用的终端设备ID的总登录次数为5,未超过服务器设置的预置第二登录次数,经统计,杜甫符合的预置操作路径特征数量为4,超过了预置特征数量,则服务器将杜甫注册的账号设置为无效用户。
需要说明得是,预置第一登录次数、预置第二登录次数、预置的操作类型、预置操作次数、预置时长以及预置特征数量,均可根据无效用户的操作 特点进行调整,例如对于操作类型,大多数无效用户会通过最少的操作获取活动福利,服务器将获取福利的所有必要操作类型作为一组操作类型添加到预置的操作类型,服务器还可分析其他无效用户的操作类型特点对预置的操作类型进行调整,具体此处不做限制。
103、若目标用户的操作路径符合预置无效操作路径规则,则设置目标用户是无效用户。
若目标用户的操作路径符合预置无效操作路径规则,则服务器设置目标用户是无效用户,无效用户为服务器设置的无法获取福利的用户。服务器可通过在无效用户的用户分类标识集合里添加预设的无效标识来区分目标用户是否为无效用户。
104、若目标用户的操作路径不符合预置无效操作路径规则,则设置目标用户为有效用户。
若目标用户的操作路径不符合预置无效操作路径规则,则服务器设置目标用户为有效用户。服务器可通过在有效用户的用户分类标识集合里添加预设的有效标识来区分目标用户是否为无效用户,用户的分类标识集合存储于用户的预置配置文件中。
需要说明得是,若目标用户是有效用户,则服务器为目标用户设置福利获取权限。具体的,若目标用户的操作路径不符合预置无效操作路径规则,则服务器在目标用户的预置配置文件中增加有效标识;服务器在目标用户的预置配置文件中增加预置权限的配置,预置权限为预置福利的获取权限;当目标用户发起获取福利的请求时,服务器用预置的权限检测模块检测目标用户的预置配置文件中是否有有效标识;当服务器检测到目标用户的预置配置文件中有有效标识时,服务器通过目标用户获取福利的请求。
105、若目标用户是无效用户,则执行预置风控策略,预置风控策略为对无效用户再次进行身份验证的操作。
若目标用户是无效用户,则服务器执行预置风控策略。预置风控策略为服务器设置的用于对无效用户再次进行身份验证的操作。预置风控策略是为了减少运营推广福利被无效用户获取的情况。
预置风控策略包括:若目标用户是无效用户,则通服务器过预置的验证操作对目标用户进行身份验证;若目标用户通过身份验证,则服务器将目标用户更改为有效用户;若目标用户未通过身份验证,服务器则将目标用户加入黑名单,举例说明,服务器将无效用户李白的注册账号、用于注册的身份证号码以及设备ID加入黑名单,李白无法用该注册账号获取活动福利,并且当李白下次使用黑名单中的身份证号码以及设备ID进行注册时,服务器将提示李白注册失败。需要说明得是,预置的验证操作是为了验证目标用户不是通过机器大批量获取活动福利的无效用户。预置的验证操作可以是随机问卷的方式,也可以是验证码的方式,例如滑动验证码或者经过扭曲或变形的图片验证码,还可以是其他的验证方式,如短信验证,具体此处不做限制。
本申请实施例,通过用户的操作路径识别出无效用户,提高了运营推广 活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。
请参阅图2,本申请实施例中无效用户操作路径识别方法的另一个实施例包括:
201、通过在前端设置的埋点,获取目标用户的操作路径信息,操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长。
服务器通过在前端设置的埋点,获取目标用户的操作路径信息,操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长。具体的,服务器查询页面中的埋点,埋点设置在页面中与操作类型对应的位置上冰用于统计每个操作类型的操作次数以及记录操作类型的信息,例如服务器在页面上获取红包的区域设置埋点统计目标用户点击页面上获取红包区域的次数,操作类型的信息包括操作类型的触发时刻以及与操作类型对应的业务信息,例如对于一个点击操作,则需要记录的业务信息有:点击的统一资源定位符URL、点击的页面标题(tittle)、点击位置等;服务器获取埋点在目标用户进行登录操作时记录的账号ID以及设备ID,得到目标用户的目标账号ID以及目标设备ID;服务器确定埋点统计的操作次数不为零的操作类型,将操作次数不为零的操作类型作为目标用户的目标操作类型;服务器将各个目标操作类型的操作次数相加,得到目标用户的目标总操作次数;服务器根据埋点记录的触发时刻计算目标用户的目标路径操作时长。
需要说明的是,账号ID为能确定目标用户身份的唯一证件ID,如身份证ID。设备ID为目标用户用于登录服务器的服务器设备ID,如国际移动设备识别码IMEI,每部通过正规渠道销售的符合全球移动通信***标准GSM的手机均有唯一的IMEI码。操作类型为目标用户在启动服务器后进行的所有操作类型。目标用户的操作路径为目标用户使用专有的用户ID以及设备进行获取福利的一系列操作,例如,在基于某电商应用APP推出的新人注册送优惠券的优惠活动中,某目标用户的操作路径为使用自己的手机号以及手机进行注册、登录以及领取优惠券等系列操作。
其中,服务器根据埋点记录的触发时刻计算目标用户的目标路径操作时长,具体为,服务器获取所有操作类型的最早触发时刻以及最迟触发时刻,服务器用最迟触发时刻减去最早触发时刻得到目标用户的操作时长。
202、通过后端接口记录流水信息,并根据流水信息获取目标用户的操作路径信息,操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长。
服务器通过后端接口记录流水信息,并根据流水信息获取目标用户的操作路径信息,操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长。具体的,服务器通过操作类型对应的后端接口记录流水信息,流水信息包括后端接口被调用的时刻、后端接口类型、调用后端接口的用户令牌,其中,服务器通过在所有的后端接口中增加记录流水信息的函数来实现记录流水信息的功能;服务器将流水信息添加到用户操作日志,该用 户操作日志用于汇总后端接口记录的流水信息;当目标用户完成所有操作时,服务器获取目标用户的目标用户操作日志;服务器解析目标用户操作日志中的用户令牌得到目标用户的目标账号ID以及目标设备ID;服务器将目标用户操作日志中的后端接口类型转换为操作类型,得到目标用户所有的目标操作类型;服务器统计目标用户操作日志中所有后端接口类型被记录的次数,将后端接口类型被记录的次数相加得到目标操作类型的目标总操作次数;服务器根据目标用户操作日志中后端接口被调用的时刻计算目标用户的目标路径操作时长。
其中,服务器解析目标用户操作日志中的用户令牌得到目标用户的目标账号ID以及目标设备ID,用户令牌是服务器根据目标用户的账号信息分配的唯一令牌,用户令牌用于在后端识别用户的身份。服务器可通过解析目标用户的用户令牌检索到目标用户的账号信息,账号信息包括目标用户的账号ID,设备ID以及登录IP地址,用户令牌可以是会话(session)ID的形式,也可以是访问令牌(access token)的形式,具体此处不做限制。
需要说明得是,目标用户在进行获取福利的过程中每进行一个操作,服务器会调用对应的后端接口,例如用户填写好注册信息提交给服务器时,服务器会调用后端的注册接口。
账号ID为能确定目标用户身份的唯一证件ID,如身份证ID。设备ID为目标用户用于登录服务器的服务器设备ID,如国际移动设备识别码IMEI,每部通过正规渠道销售的符合全球移动通信***标准GSM的手机均有唯一的IMEI码。操作类型为目标用户在启动服务器后进行的所有操作类型。目标用户的操作路径为目标用户使用专有的用户ID以及设备进行获取福利的一系列操作,例如,在基于某电商应用APP推出的新人注册送优惠券的优惠活动中,某目标用户的操作路径为使用自己的手机号以及手机进行注册、登录以及领取优惠券等系列操作。
本实施例可以执行步骤201和步骤202中的任意一个,也可以执行步骤201和步骤202,并且步骤201和步骤202没有必然的先后顺序,可以先执行步骤201后执行步骤202,也可以先执行步骤202后执行步骤201,或者同时执行步骤201和步骤202。
203、根据目标用户的操作路径信息,判断目标用户的操作路径是否符合预置无效用户操作路径规则。
服务器根据目标用户的操作路径信息,判断目标用户的操作路径是否符合预置无效用户操作路径规则。具体的,服务器通过预置计数器计数目标账号ID的总登录次数和目标设备ID的总登录次数;服务器通过预置匹配器判断目标账号ID的总登录次数是否符合预置第一操作路径特征:目标账号ID的总登录次数超过预置第一登录次数,预置匹配器用于匹配目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;服务器通过预置匹配器判断目标设备ID的总登录次数是否符合预置第二操作路径特征:目标设备ID的总登录次数超过预置第二登录次数;服务器通过预置匹配器判断目标用 户的操作类型是否符合预置第三操作路径特征:目标操作类型为预置的操作类型;服务器通过预置匹配器判断目标总操作次数是否符合预置第四操作路径特征:目标操作总次数少于预置操作次数;服务器通过预置匹配器判断目标操作路径时长是否符合预置第五操作路径特征:目标路径操作时长少于预置时长;服务器统计预置匹配器匹配到的预置操作路径特征数量;若预置操作路径特征数量超过预置特征数量,则服务器确定目标用户的操作路径符合预置无效用户操作路径规则;若预置操作路径特征数量未超过预置特征数量,则服务器确定目标用户的操作路径不符合预置无效用户操作路径规则。
其中,预置操作路径特征值包括预置第一登录次数、预置第二登录次数、预置操作次数、预置的操作类型、预置时长以及预置特征数量。
举例说明,在某面向新用户的办理银行卡并且充值1000则送50元红包的运营推广活动中,某用户杜甫利用脚本大量获取新人红包,服务器设置的预置第一登录次数为10次,预置第二登录次数为20次,预置的操作类型为注册,登录,开户,充值以及领取50元红包,预置操作次数为7,预置时长为2分钟,预置特征数量为2。杜甫通过时间最短的操作路径来获取新人红包,杜甫的操作类型为预置的操作类型。每个操作类型的操作次数为1次,杜甫的总操作次数为5次少于预置操作次数,注册的账号ID为身份证ID,使用该身份证ID进行注册登录的总登录次数为18,超过服务器设置的预置第一登录次数,杜甫使用的终端设备ID的总登录次数为5,未超过服务器设置的预置第二登录次数,经统计,杜甫符合的无效规则数量为4,超过了预置规则数,则服务器将杜甫注册的账号设置为无效用户。
需要说明得是,预置第一登录次数、预置第二登录次数、预置的操作类型、预置操作次数、预置时长以及预置特征数量,均可根据无效用户的操作特点进行调整,例如对于操作类型,大多数无效用户会通过最少的操作获取活动福利,服务器将获取福利的所有必要操作类型作为一组操作类型添加到预置的操作类型,服务器还可分析其他无效用户的操作类型特点对预置的操作类型进行调整,具体此处不做限制。
204、若目标用户的操作路径符合预置无效操作路径规则,则设置目标用户是无效用户。
若目标用户的操作路径符合预置无效操作路径规则,则服务器设置目标用户是无效用户,无效用户为服务器设置的无法获取福利的用户。服务器可通过在无效用户的用户分类标识集合里添加预设的无效标识来区分目标用户是否为无效用户。
205、若目标用户的操作路径不符合预置无效操作路径规则,则设置目标用户为有效用户。
若目标用户的操作路径不符合预置无效操作路径规则,则服务器设置目标用户为有效用户。服务器可通过在有效用户的用户分类标识集合里添加预设的有效标识来区分目标用户是否为无效用户,用户的分类标识集合存储于用户的预置配置文件中。
需要说明得是,若目标用户是有效用户,则服务器为目标用户设置福利获取权限。具体的,若目标用户的操作路径不符合预置无效操作路径规则,则服务器在目标用户的预置配置文件中增加有效标识;服务器在目标用户的预置配置文件中增加预置权限的配置,预置权限为预置福利的获取权限;当目标用户发起获取福利的请求时,服务器用预置的权限检测模块检测目标用户的预置配置文件中是否有有效标识;当服务器检测到目标用户的预置配置文件中有有效标识时,服务器通过目标用户获取福利的请求。
206、若目标用户是无效用户,则执行预置风控策略,预置风控策略为对无效用户再次进行身份验证的操作。
若目标用户是无效用户,则服务器执行预置风控策略。预置风控策略为服务器设置的用于对无效用户再次进行身份验证的操作。预置风控策略是为了减少运营推广福利被无效用户获取的情况。
预置风控策略包括:若目标用户是无效用户,则通服务器过预置的验证操作对目标用户进行身份验证;若目标用户通过身份验证,则服务器将目标用户更改为有效用户;若目标用户未通过身份验证,服务器则将目标用户加入黑名单,举例说明,服务器将无效用户李白的注册账号、用于注册的身份证号码以及设备ID加入黑名单,李白无法用该注册账号获取活动福利,并且当李白下次使用黑名单中的身份证号码以及设备ID进行注册时,服务器将提示李白注册失败。
需要说明得是,预置的验证操作是为了验证目标用户不是通过机器大批量获取活动福利的无效用户。预置的验证操作可以是随机问卷的方式,也可以是验证码的方式,例如滑动验证码或者经过扭曲或者变形的图片验证码,还可以是其他的验证方式,如短信验证,具体此处不做限制。
本申请实施例,通过用户的操作路径识别出无效用户,提高了运营推广活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。
上面对本申请实施例中无效用户操作路径识别方法进行了描述,下面对本申请实施例中无效用户操作路径识别装置进行描述,请参阅图3,本申请实施例中无效用户操作路径识别装置的一个实施例包括:
获取单元301,用于获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;判断单元302,用于根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;第一设置单元303,若所述目标用户的操作路径符合所述预置无效操作路径规则,则用于设置所述目标用户是无效用户;
第二设置单元304,若所述目标用户的操作路径不符合所述预置无效操作路径规则,则用于设置所述目标用户为有效用户;执行单元305,若所述目标用户是无效用户,则用于执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
本申请实施例,通过用户的操作路径识别出无效用户,提高了运营推广 活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。
请参阅图4,本发明实施例中无效用户操作路径识别装置的一个实施例包括:获取单元301,用于获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;判断单元302,用于根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;第一设置单元303,若所述目标用户的操作路径符合预置无效操作路径规则,则用于设置所述目标用户是无效用户;第二设置单元304,若所述目标用户的操作路径不符合所述预置无效操作路径规则,则用于设置所述目标用户为有效用户;执行单元305,若所述目标用户是无效用户,则用于执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
可选的,获取单元301包括:第一获取模块3011,用于通过在前端设置的埋点,获取所述目标用户的操作路径信息;第二获取模块3012,用于通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
可选的,第一获取模块3011具体用于:查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的位置上且用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID,得到所述目标用户的目标账号ID以及目标设备ID;确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
可选的,第一获取模块3012具体用于:通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;将所述流水信息添加到用户操作日志;当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日志;解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;;根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
可选的,判断单元302具体用于:通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一操作路径特征:所述目标账号ID 的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操作路径特征:所述目标操作类型为预置的操作类型;通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;统计所述预置匹配器匹配到的预置操作路径特征数量;若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
可选的,执行单元305具体用于:若所述目标用户是无效用户,则通过预置的验证操作对所述目标用户进行身份验证,所述预置的验证操作包括填写预置的问卷、识别预置的验证码以及短信验证;若所述目标用户通过所述身份验证,则将所述目标用户更改为有效用户;若所述目标用户未通过所述身份验证,则将所述目标用户加入黑名单。
可选的,第二设置单元304具体用于:若所述目标用户的操作路径不符合所述预置无效操作路径规则,则在所述目标用户的预置配置文件中增加有效标识;在所述目标用户的预置配置文件中增加预置权限的配置,所述预置权限为预置福利的获取权限。
本发明实施例,通过用户的操作路径识别出无效用户,提高了运营推广活动的推广效率,同时也提高了运营推广活动的资金利用率,避免了资金浪费。上面图3至图4从模块化功能实体的角度对本发明实施例中的无效用户操作路径识别装置进行详细描述,下面从硬件处理的角度对本发明实施例中无效用户操作路径识别设备进行详细描述。
图5是本申请实施例提供的一种无效用户操作路径识别设备的结构示意图,该无效用户操作路径识别设备500可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上处理器(central processing units,CPU)501(例如,一个或一个以上处理器)和存储器509,一个或一个以上存储应用程序507或数据506的存储介质508(例如一个或一个以上海量存储设备)。其中,存储器509和存储介质508可以是短暂存储或持久存储。存储在存储介质508的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对无效用户操作路径识别设备中的一系列指令操作。所述指令包括上述无效用户操作路径识别方法任一实施例的实现步骤。更可选的,处理器501可以设置为与存储介质508通信,在无效用户操作路径识别设备500上执行存储介质508中的一系列指令操作。无效用户操作路径识别设备500还可以包括一个或一个以上电源502,一个或一个以上有线或无线网络接口503,一 个或一个以上输入输出接口504,和/或,一个或一个以上操作***505,例如Windows Serve,Mac OS X,Unix,Linux,FreeBSD等等。本领域技术人员可以理解,图5中示出的无效用户操作路径识别设备结构并不构成对无效用户操作路径识别设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。处理器501可以执行上述实施例中获取单元301、判断单元302、第一设置单元303、第二设置单元304以及执行单元305的功能。
下面结合图5对无效用户操作路径识别设备的各个构成部件进行具体的介绍:
处理器501是无效用户操作路径识别设备的控制中心,可以按照设置的信息处理方法进行处理。处理器501利用各种接口和线路连接整个无效用户操作路径识别设备的各个部分,通过运行或执行存储在存储器509内的软件程序和/或模块,以及调用存储在存储器509内的数据,执行无效用户操作路径识别设备的各种功能和处理数据,从而实现无效用户操作路径的识别。存储介质508和存储器509都是存储数据的载体,实施例中,存储介质508可以是指储存容量较小,但速度快的内存储器,而存储器509可以是储存容量大,但储存速度慢的外存储器。
存储器509可用于存储软件程序以及模块,处理器501通过运行存储在存储器509的软件程序以及模块,从而执行无效用户操作路径识别设备500的各种功能应用以及数据处理。存储器509可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作***、至少一个功能所需的应用程序(比如获取目标用户的操作路径信息的程序等)等;存储数据区可存储根据无效用户操作路径识别设备的使用所创建的数据(比如用户令牌等)等。此外,存储器509可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。在本申请实施例中提供的无效用户操作路径识别方法程序和接收到的数据流存储在存储器中,当需要使用时,处理器501从存储器509中调用。
在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述指令包括上述无效用户操作路径识别方法任一实施例的实现步骤。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、或数据中心通过有线(例如同轴电缆、光纤、双绞线)或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存储的任何可用介质或者是包含一个或多个可用介质集成的、数据中心等数据存储设备,所述计算机可读存储介质可以是非易失性的,也可以是易失性的。所述可读介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,光盘)、或者半导体介质(例如固态硬盘(Solid  State Disk,SSD))等。

Claims (20)

  1. 一种无效用户操作路径识别方法,其中,包括:
    获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;
    根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;
    若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;
    若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;
    若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
  2. 根据权利要求1所述的无效用户操作路径识别方法,其中,所述获取目标用户的操作路径信息,包括:
    通过在前端设置的埋点,获取所述目标用户的操作路径信息;或,
    通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
  3. 根据权利要求2所述的无效用户操作路径识别方法,其中,所述通过在前端设置的埋点,获取所述目标用户的操作路径信息,包括:
    查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的位置上并用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;
    获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID;
    确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;
    将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;
    根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
  4. 根据权利要求2所述的无效用户操作路径识别方法,其中,所述通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息,包括:
    通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;
    将所述流水信息添加到用户操作日志;
    当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日 志;
    解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;
    将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;
    统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;
    根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
  5. 根据权利要求3或4所述的无效用户操作路径识别方法,其中,所述根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则,包括:
    通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;
    通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一操作路径特征:所述目标账号ID的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;
    通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;
    通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操作路径特征:所述目标操作类型为预置的操作类型;
    通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;
    通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;
    统计所述预置匹配器匹配到的预置操作路径特征数量;
    若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;
    若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
  6. 根据权利要求1-4中任一所述的无效用户操作路径识别方法,其中,所述若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作,包括:
    若所述目标用户是无效用户,则通过预置的验证操作对所述目标用户进行身份验证,所述预置的验证操作包括填写预置的问卷、识别预置的验证码以及短信验证;
    若所述目标用户通过所述身份验证,则将所述目标用户更改为有效用户;
    若所述目标用户未通过所述身份验证,则将所述目标用户加入黑名单。
  7. 根据权利要求1-4中任一所述的无效用户操作路径识别方法,其中,所述若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户,包括:
    若所述目标用户的操作路径不符合所述预置无效操作路径规则,则在所述目标用户的预置配置文件中增加有效标识;
    在所述目标用户的预置配置文件中增加预置权限的配置,所述预置权限为预置福利的获取权限。
  8. 一种无效用户操作路径识别装置,其中,包括:
    获取单元,用于获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;
    判断单元,用于根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;
    第一设置单元,若所述目标用户的操作路径符合预置无效操作路径规则,则用于设置所述目标用户是无效用户;
    第二设置单元,若所述目标用户的操作路径不符合所述预置无效操作路径规则,则用于设置所述目标用户为有效用户;
    执行单元,若所述目标用户是无效用户,则用于执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
  9. 一种无效用户操作路径识别设备,其中,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如下步骤:
    获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;
    根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;
    若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;
    若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;
    若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
  10. 根据权利要求9所述的无效用户操作路径识别设备,其中,所述获取目标用户的操作路径信息,包括:
    通过在前端设置的埋点,获取所述目标用户的操作路径信息;或,
    通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
  11. 根据权利要求10所述的无效用户操作路径识别设备,其中,所述通过在前端设置的埋点,获取所述目标用户的操作路径信息,包括:
    查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的 位置上并用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;
    获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID;
    确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;
    将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;
    根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
  12. 根据权利要求10所述的无效用户操作路径识别设备,其中,所述通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息,包括:
    通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;
    将所述流水信息添加到用户操作日志;
    当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日志;
    解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;
    将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;
    统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;
    根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
  13. 根据权利要求11或12所述的无效用户操作路径识别设备,其中,所述根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则,包括:
    通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;
    通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一操作路径特征:所述目标账号ID的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;
    通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;
    通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操 作路径特征:所述目标操作类型为预置的操作类型;
    通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;
    通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;
    统计所述预置匹配器匹配到的预置操作路径特征数量;
    若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;
    若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
  14. 根据权利要求9-12中任一所述的无效用户操作路径识别设备,其中,所述若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作,包括:
    若所述目标用户是无效用户,则通过预置的验证操作对所述目标用户进行身份验证,所述预置的验证操作包括填写预置的问卷、识别预置的验证码以及短信验证;
    若所述目标用户通过所述身份验证,则将所述目标用户更改为有效用户;
    若所述目标用户未通过所述身份验证,则将所述目标用户加入黑名单。
  15. 根据权利要求9-12任一所述的无效用户操作路径识别设备,其中,所述若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户,包括:
    若所述目标用户的操作路径不符合所述预置无效操作路径规则,则在所述目标用户的预置配置文件中增加有效标识;
    在所述目标用户的预置配置文件中增加预置权限的配置,所述预置权限为预置福利的获取权限。
  16. 一种计算机可读存储介质,其中,包括指令,当所述指令在计算机上运行时,使得计算机执行如下步骤:
    获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;
    根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;
    若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;
    若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;
    若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
  17. 根据权利要求16所述的计算机可读存储介质,其中,所述获取目标用户的操作路径信息,包括:
    通过在前端设置的埋点,获取所述目标用户的操作路径信息;或,
    通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
  18. 根据权利要求17所述的计算机可读存储介质,其中,所述通过在前端设置的埋点,获取所述目标用户的操作路径信息,包括:
    查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的位置上并用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;
    获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID;
    确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;
    将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;
    根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
  19. 根据权利要求17所述的计算机可读存储介质,其中,所述通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息,包括:
    通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;
    将所述流水信息添加到用户操作日志;
    当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日志;
    解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;
    将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;
    统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;
    根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
  20. 根据权利要求18或19所述的计算机可读存储介质,其中,所述根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则,包括:
    通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;
    通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一 操作路径特征:所述目标账号ID的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;
    通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;
    通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操作路径特征:所述目标操作类型为预置的操作类型;
    通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;
    通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;
    统计所述预置匹配器匹配到的预置操作路径特征数量;
    若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;
    若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
PCT/CN2020/087583 2019-05-22 2020-04-28 无效用户操作路径识别方法、装置、设备及存储介质 WO2020233366A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910427058.7 2019-05-22
CN201910427058.7A CN110322250A (zh) 2019-05-22 2019-05-22 无效用户操作路径识别方法、装置、设备及存储介质

Publications (1)

Publication Number Publication Date
WO2020233366A1 true WO2020233366A1 (zh) 2020-11-26

Family

ID=68113247

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/087583 WO2020233366A1 (zh) 2019-05-22 2020-04-28 无效用户操作路径识别方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN110322250A (zh)
WO (1) WO2020233366A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110322250A (zh) * 2019-05-22 2019-10-11 深圳壹账通智能科技有限公司 无效用户操作路径识别方法、装置、设备及存储介质
CN111049675B (zh) * 2019-11-26 2022-11-22 中国联合网络通信集团有限公司 在线选号防刷方法和装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1081607A2 (en) * 1999-08-31 2001-03-07 Lucent Technologies Inc. Method for providing fast access to dynamic content on the world wide web
US20040122943A1 (en) * 2002-06-28 2004-06-24 Brett Error Custom event and attribute generation for use in website traffic data collection
CN102946319A (zh) * 2012-09-29 2013-02-27 焦点科技股份有限公司 网络用户行为信息分析***及其分析方法
CN106156194A (zh) * 2015-04-21 2016-11-23 阿里巴巴集团控股有限公司 一种形成用户操作路径的方法及装置
CN109558561A (zh) * 2018-12-04 2019-04-02 深圳创维数字技术有限公司 一种用户行为路径采集方法、装置、设备及介质
CN110322250A (zh) * 2019-05-22 2019-10-11 深圳壹账通智能科技有限公司 无效用户操作路径识别方法、装置、设备及存储介质

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4906581B2 (ja) * 2007-05-09 2012-03-28 日本電信電話株式会社 認証システム
CN106372472A (zh) * 2016-08-31 2017-02-01 深圳天珑无线科技有限公司 应用操作方法和应用操作装置
CN106559487A (zh) * 2016-11-11 2017-04-05 美通云动(北京)科技有限公司 一种访问应用的方法及装置
CN108462704B (zh) * 2018-02-27 2019-08-06 平安科技(深圳)有限公司 登录验证方法、装置、计算机设备及存储介质
CN108874909A (zh) * 2018-05-28 2018-11-23 深圳壹账通智能科技有限公司 用户访问路径获取方法、服务器及计算机存储介质
CN109740089A (zh) * 2018-11-30 2019-05-10 东软集团股份有限公司 数据采集方法、装置、***、可读存储介质及电子设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1081607A2 (en) * 1999-08-31 2001-03-07 Lucent Technologies Inc. Method for providing fast access to dynamic content on the world wide web
US20040122943A1 (en) * 2002-06-28 2004-06-24 Brett Error Custom event and attribute generation for use in website traffic data collection
CN102946319A (zh) * 2012-09-29 2013-02-27 焦点科技股份有限公司 网络用户行为信息分析***及其分析方法
CN106156194A (zh) * 2015-04-21 2016-11-23 阿里巴巴集团控股有限公司 一种形成用户操作路径的方法及装置
CN109558561A (zh) * 2018-12-04 2019-04-02 深圳创维数字技术有限公司 一种用户行为路径采集方法、装置、设备及介质
CN110322250A (zh) * 2019-05-22 2019-10-11 深圳壹账通智能科技有限公司 无效用户操作路径识别方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN110322250A (zh) 2019-10-11

Similar Documents

Publication Publication Date Title
EP2748781B1 (en) Multi-factor identity fingerprinting with user behavior
CN107196950B (zh) 校验方法、装置及服务端
CN110888838B (zh) 基于对象存储的请求处理方法、装置、设备及存储介质
US7512973B1 (en) Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content
US8751184B2 (en) Transaction based workload modeling for effective performance test strategies
WO2020233366A1 (zh) 无效用户操作路径识别方法、装置、设备及存储介质
US20100262506A1 (en) Mobile content delivery on a mobile network
US11429698B2 (en) Method and apparatus for identity authentication, server and computer readable medium
WO2020125074A1 (zh) 消息到达率确定方法、装置、数据统计服务器及存储介质
CN110224992B (zh) 共享资源限制复用的方法、设备、***及计算机可读介质
WO2020233009A1 (zh) 身份验证方法、装置、计算设备和存储介质
CN104899744A (zh) 钱币邮票收藏品交易***与交易方法
WO2021093369A1 (zh) 一种信息投放方法、装置、***及电子设备
WO2018080967A1 (en) Security mechanism for multi-tiered server­implemented applications
US10158650B1 (en) Token verification from incremental inputs
US20150101059A1 (en) Application License Verification
WO2015085735A1 (en) Information requesting method and system
CN114826946A (zh) 未授权访问接口的检测方法、装置、设备及存储介质
CN105184559B (zh) 一种支付***及方法
CN111371811B (zh) 一种资源调用方法、资源调用装置、客户端及业务服务器
CN109040056B (zh) 一种基于服务器的用户验证方法
WO2023011233A1 (zh) 流量管理方法、装置、设备及计算机可读存储介质
CN108809909B (zh) 数据处理方法及数据处理装置
CN111552949B (zh) 一种物联网设备加密方法、装置及电子设备
CN110248326B (zh) 一种数据处理方法及其装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20809482

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20809482

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18.03.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20809482

Country of ref document: EP

Kind code of ref document: A1