WO2020233366A1 - 无效用户操作路径识别方法、装置、设备及存储介质 - Google Patents
无效用户操作路径识别方法、装置、设备及存储介质 Download PDFInfo
- Publication number
- WO2020233366A1 WO2020233366A1 PCT/CN2020/087583 CN2020087583W WO2020233366A1 WO 2020233366 A1 WO2020233366 A1 WO 2020233366A1 CN 2020087583 W CN2020087583 W CN 2020087583W WO 2020233366 A1 WO2020233366 A1 WO 2020233366A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- preset
- target
- user
- target user
- operation path
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Definitions
- This application relates to the field of fraud detection, and in particular to methods, devices, equipment and storage media for identifying invalid user operation paths.
- This application provides a method, device, equipment, and storage medium for identifying invalid user operation paths, which can identify invalid users through the user's operation path, which improves the promotion efficiency of operation promotion activities and also improves the use of funds for operation promotion activities Rate, avoiding the waste of funds.
- the first aspect of the embodiments of the present application provides an invalid user operation path identification method, including: obtaining operation path information of the target user, the operation path information including account ID, device ID, operation type, total operation times, and operation path duration ; According to the operation path information of the target user, determine whether the operation path of the target user meets the preset invalid user operation path rule; if the operation path of the target user meets the preset invalid operation path rule, set the The target user is an invalid user; if the operation path of the target user does not conform to the preset invalid operation path rule, the target user is set as a valid user; if the target user is an invalid user, the preset wind is executed Control strategy, the preset risk control strategy is an operation of re-identifying the invalid user.
- the second aspect of the embodiments of the present application provides an invalid user operation path identification device, including: an acquiring unit configured to acquire operation path information of a target user, the operation path information including account ID, device ID, operation type, total The number of operations and the duration of the operation path; a judging unit for judging whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user; the first setting unit, if the target user If the operation path of the target user meets the preset invalid operation path rule, it is used to set the target user to be an invalid user; the second setting unit is used to set the target user’s operation path to not meet the preset invalid operation path rule Set the target user as a valid user; the execution unit, if the target user is an invalid user, is used to execute a preset risk control strategy.
- the third aspect of the embodiments of the present application provides an invalid user operation path identification device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, and the processor executes all
- the computer program implements the invalid user operation path identification method described in any of the foregoing embodiments.
- the fourth aspect of the embodiments of the present application provides a computer-readable storage medium, including instructions, which when run on a computer, cause the computer to execute the steps of the invalid user operation path identification method described in any of the above embodiments .
- invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids waste of funds.
- FIG. 1 is a schematic diagram of an embodiment of an invalid user operation path identification method in an embodiment of the application
- FIG. 2 is a schematic diagram of another embodiment of a method for identifying an invalid user operation path in an embodiment of this application;
- FIG. 3 is a schematic diagram of an embodiment of an invalid user operation path identification device in an embodiment of the application.
- FIG. 4 is a schematic diagram of another embodiment of an invalid user operation path identification device in an embodiment of the present invention.
- Fig. 5 is a schematic diagram of an embodiment of an invalid user operation path identification device in an embodiment of this application.
- the embodiments of the present application provide a method, device, device and storage medium for identifying invalid user operation paths. Invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities and also increases the funds for operation promotion activities. Utilization rate, avoiding the waste of funds.
- FIG. 1 a flowchart of an invalid user operation path identification method provided by an embodiment of the present application, which specifically includes:
- the operation path information includes account ID, device ID, operation type, total operation times, and operation path duration.
- the server obtains the operation path information of the target user, and the operation path information includes account code (identity, ID), device ID, operation type, total operation times, and operation path duration. Specifically, the server obtains the target user's operation path information by adding a buried point at the location where the front-end calls the back-end interface operation; the server obtains the target user's operation path information by adding the function of recording flow information in the back-end interface.
- the account ID is a unique document ID that can determine the identity of the target user, such as an ID.
- the device ID is the server device ID used by the target user to log in to the server, such as the International Mobile Equipment Identity (IMEI). Each device sold through regular channels conforms to the global system for mobile communications (GSM) standard.
- GSM global system for mobile communications
- Operation types are all types of operations performed by the target user after starting the server.
- the target user’s operation path is a series of operations for the target user to use a proprietary user ID and device to obtain benefits. For example, in an e-commerce application (application, APP)-based newcomer registration and coupon promotion, a certain The target user's operation path is to use his mobile phone number and mobile phone to register, log in, and receive coupons.
- the server will call the corresponding back-end interface. For example, when the user fills in the registration information and submits it to the server, the server will call the back-end registration interface.
- the operation path information of the target user determine whether the operation path of the target user meets a preset invalid user operation path rule.
- the server determines whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user. Specifically, the server counts the total login times of the target account ID and the total login times of the target device ID through a preset counter; the server determines whether the total login times of the target account ID meets the preset first operation path feature through the preset matcher: target The total login times of the account ID exceeds the preset first login times.
- the preset matcher is used to match the preset operation path characteristics that the target user matches and stores all preset operation path characteristic values; the server judges the target device ID through the preset matcher Whether the total number of login times meets the preset second operation path characteristic: The total login times of the target device ID exceeds the preset second login times; the server determines whether the target user's operation type meets the preset third operation path characteristic through the preset matcher : The target operation type is the preset operation type; the server judges whether the total number of target operations meets the preset fourth operation path feature through the preset matcher: the total number of target operations is less than the preset number of operations; the server judges through the preset matcher Whether the target operation path duration meets the preset fifth operation path feature: the target path operation duration is less than the preset duration; the server counts the number of preset operation path features matched by the preset matcher; if the number of preset operation path features exceeds the preset If the number of features is the number of features, it is determined that the target user's operation path
- the preset operation path characteristic value includes the preset first login times, the preset second login times, the preset operation times, the preset operation type, the preset duration, and the preset feature quantity.
- a user Du Fu used a script to obtain a large number of red envelopes for newcomers.
- the server set the preset number of first logins to 10 times.
- Set the second login times to 20 times
- a set of preset operation types are registration, login, account opening, recharge and receive 50 yuan red envelope
- the preset number of operations is 7
- the preset duration is 2 minutes
- the number of preset features is 2. .
- Du Fu obtains the newcomer's red envelope through the shortest operation path.
- Du Fu's operation type is the preset operation type. The number of operations for each type of operation is 1, and Du Fu’s total number of operations is 5 times less than the preset number of operations.
- the registered account ID is the ID card ID, and the total number of logins using the ID card ID for registration is 18. Exceeds the preset first login times set by the server, the total login times of the terminal device ID used by Du Fu is 5, and does not exceed the preset second login times set by the server. According to statistics, the number of preset operation path features that Du Fu meets is 4 If the number of preset features is exceeded, the server will set the account registered by Du Fu as an invalid user.
- the preset first login times, preset second login times, preset operation types, preset operation times, preset duration, and preset feature quantity can all be adjusted according to the operation characteristics of invalid users. For example, for operation types, most invalid users will obtain activity benefits through the fewest operations.
- the server adds all necessary operation types to obtain benefits as a set of operation types to the preset operation types.
- the server can also analyze the operation types of other invalid users.
- the server sets the target user as an invalid user, and the invalid user is a user set by the server who cannot obtain benefits.
- the server can distinguish whether the target user is an invalid user by adding a preset invalid identifier to the user classification identifier set of the invalid user.
- the target user is set as a valid user.
- the server sets the target user as a valid user.
- the server can distinguish whether the target user is an invalid user by adding a preset effective identification to the user classification identification set of the effective user, and the user classification identification set is stored in the user's preset configuration file.
- the server sets the benefit obtaining permission for the target user. Specifically, if the operation path of the target user does not meet the preset invalid operation path rule, the server adds a valid identifier to the preset configuration file of the target user; the server adds the configuration of preset permissions to the preset configuration file of the target user, The preset permission is the permission to obtain the preset benefits; when the target user initiates a request to obtain benefits, the server uses the preset permission detection module to detect whether there is a valid identifier in the preset configuration file of the target user; when the server detects the target user’s When there is a valid identifier in the preset configuration file, the server obtains a request for benefits through the target user.
- the preset risk control strategy is executed, and the preset risk control strategy is an operation of re-authenticating the invalid user.
- the server executes a preset risk control strategy.
- the preset risk control strategy is the operation set by the server to re-authenticate invalid users.
- the pre-built risk control strategy is to reduce the situation that operation promotion benefits are obtained by invalid users.
- the preset risk control strategy includes: if the target user is an invalid user, the server will authenticate the target user through a preset verification operation; if the target user is authenticated, the server will change the target user to a valid user; if the target user If the identity verification fails, the server will add the target user to the blacklist. For example, the server will add the invalid user Li Bai’s registered account, ID card number and device ID to the blacklist, and Li Bai cannot use the registered account to obtain activity benefits. And when Li Bai uses the ID number and device ID in the blacklist to register next time, the server will prompt Li Bai to fail to register.
- the preset verification operation is to verify that the target user is not an invalid user who obtains activity benefits in large quantities through the machine.
- the preset verification operation can be a random questionnaire or a verification code, such as a sliding verification code or a distorted or deformed image verification code, or other verification methods, such as SMS verification. Do restrictions.
- invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids the waste of funds.
- another embodiment of the method for identifying invalid user operation paths in the embodiment of the present application includes:
- the operation path information includes account ID, device ID, operation type, total operation frequency, and operation path duration.
- the server obtains the operation path information of the target user through the buried point set at the front end.
- the operation path information includes the account ID, the device ID, the operation type, the total number of operations, and the operation path length.
- the server queries the buried points on the page, and the buried points are set at the position corresponding to the operation type on the page.
- the ice is used to count the number of operations of each operation type and record the information of the operation type.
- the server obtains red envelopes on the page.
- the area setting buried point counts the number of times the target user clicks to obtain the red envelope area on the page.
- the operation type information includes the trigger time of the operation type and the business information corresponding to the operation type.
- the business information that needs to be recorded is: click Uniform resource locator URL, clicked page title (tittle), clicked location, etc.; the server obtains the account ID and device ID recorded when the target user logs in, and obtains the target account ID and target device ID of the target user; The server determines the operation type for which the number of operations counted by the embedded point is not zero, and takes the operation type for which the number of operations is not zero as the target operation type of the target user; the server adds the operation times of each target operation type to obtain the target total of the target user Operation times: The server calculates the target path operation duration of the target user according to the trigger moment of the buried point record.
- the account ID is a unique document ID that can determine the identity of the target user, such as an ID.
- the device ID is the server device ID used by the target user to log in to the server, such as the International Mobile Equipment Identity (IMEI). Every mobile phone sold through regular channels that conforms to the Global System for Mobile Communications standard GSM has a unique IMEI code.
- Operation types are all types of operations performed by the target user after starting the server.
- the target user's operation path is a series of operations for the target user to use a proprietary user ID and device to obtain benefits. For example, a certain target user's operation is based on an e-commerce application APP launched by a newcomer to register and send coupons.
- the path is a series of operations such as registering, logging in, and receiving coupons using your mobile phone number and mobile phone.
- the server calculates the target path operation duration of the target user according to the trigger time recorded by the buried point. Specifically, the server obtains the earliest trigger time and the latest trigger time of all operation types, and the server uses the latest trigger time minus the earliest trigger time to obtain the target The duration of the user's operation.
- the operation path information includes account ID, device ID, operation type, total number of operations, and operation path duration.
- the server records the flow information through the back-end interface, and obtains the operation path information of the target user according to the flow information.
- the operation path information includes the account ID, device ID, operation type, total number of operations, and operation path duration.
- the server records the flow information through the back-end interface corresponding to the operation type.
- the flow information includes the time when the back-end interface is called, the type of the back-end interface, and the user token used to call the back-end interface.
- the function of recording flow information is added to the interface to realize the function of recording flow information; the server adds the flow information to the user operation log, which is used to summarize the flow information recorded by the back-end interface; when the target user completes all operations, the server Obtain the target user operation log of the target user; the server parses the user token in the target user operation log to obtain the target account ID and target device ID of the target user; the server converts the back-end interface type in the target user operation log to the operation type to obtain All target operation types of the target user; the server counts the number of times all back-end interface types are recorded in the target user's operation log, and adds the number of times the back-end interface types are recorded to get the target total operation times of the target operation type; the server according to the target user The operation time of the target path of the target user is calculated at the time the back-end interface is called in the operation log.
- the server parses the user token in the target user operation log to obtain the target user’s target account ID and target device ID.
- the user token is a unique token allocated by the server according to the target user’s account information.
- the user token is used in the backend Identify the user’s identity.
- the server can retrieve the target user’s account information by parsing the target user’s user token.
- the account information includes the target user’s account ID, device ID, and login IP address.
- the user token can be in the form of session ID or The form of access token is not restricted here.
- the server will call the corresponding back-end interface. For example, when the user fills in the registration information and submits it to the server, the server will call the back-end registration interface.
- the account ID is a unique document ID that can determine the identity of the target user, such as an ID.
- the device ID is the server device ID used by the target user to log in to the server, such as the International Mobile Equipment Identity (IMEI). Every mobile phone sold through regular channels that conforms to the Global System for Mobile Communications standard GSM has a unique IMEI code.
- Operation types are all types of operations performed by the target user after starting the server.
- the target user's operation path is a series of operations for the target user to use a proprietary user ID and device to obtain benefits. For example, a certain target user's operation is based on an e-commerce application APP launched by a newcomer to register and send coupons.
- the path is a series of operations such as registering, logging in, and receiving coupons using your mobile phone number and mobile phone.
- step 201 and step 202 can be performed, or step 201 and step 202 can be performed, and there is no inevitable order of step 201 and step 202.
- Step 201 can be performed first and then step 202 can be performed, or it can be performed first.
- Step 201 is executed after step 202, or step 201 and step 202 are executed at the same time.
- the operation path information of the target user determine whether the operation path of the target user meets the preset invalid user operation path rule.
- the server determines whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user. Specifically, the server counts the total login times of the target account ID and the total login times of the target device ID through a preset counter; the server determines whether the total login times of the target account ID meets the preset first operation path feature through the preset matcher: target The total login times of the account ID exceeds the preset first login times.
- the preset matcher is used to match the preset operation path characteristics that the target user matches and stores all preset operation path characteristic values; the server judges the target device ID through the preset matcher Whether the total number of login times meets the preset second operation path characteristic: The total login times of the target device ID exceeds the preset second login times; the server determines whether the target user's operation type meets the preset third operation path characteristic through the preset matcher : The target operation type is the preset operation type; the server judges whether the total number of target operations meets the preset fourth operation path feature through the preset matcher: the total number of target operations is less than the preset number of operations; the server judges through the preset matcher Whether the target operation path duration meets the preset fifth operation path feature: the target path operation duration is less than the preset duration; the server counts the number of preset operation path features matched by the preset matcher; if the number of preset operation path features exceeds the preset The number of features, the server determines that the target user’s operation path complies with the prese
- the preset operation path characteristic value includes the preset first login times, the preset second login times, the preset operation times, the preset operation type, the preset duration, and the preset feature quantity.
- a user Du Fu used a script to obtain a large number of red envelopes for newcomers.
- the server set the preset number of first logins to 10 times.
- the preset operation types are registration, login, account opening, recharge and receive 50 yuan red envelope
- the preset operation times is 7
- the preset duration is 2 minutes
- the preset feature number is 2.
- Du Fu obtains the newcomer's red envelope through the shortest operation path.
- Du Fu's operation type is the preset operation type.
- the number of operations for each type of operation is 1, and Du Fu’s total number of operations is 5 times less than the preset number of operations.
- the registered account ID is the ID card ID, and the total number of logins using the ID card ID for registration is 18. Exceeds the preset first login times set by the server, the total login times of the terminal device ID used by Du Fu is 5, and does not exceed the preset second login times set by the server. According to statistics, the number of invalid rules that Du Fu meets is 4, which exceeds If the number of rules is preset, the server sets the account registered by Du Fu as an invalid user.
- the preset first login times, preset second login times, preset operation types, preset operation times, preset duration, and preset feature quantity can all be adjusted according to the operation characteristics of invalid users. For example, for operation types, most invalid users will obtain activity benefits through the fewest operations.
- the server adds all necessary operation types to obtain benefits as a set of operation types to the preset operation types.
- the server can also analyze the operation types of other invalid users.
- the server sets the target user as an invalid user, and the invalid user is a user set by the server who cannot obtain benefits.
- the server can distinguish whether the target user is an invalid user by adding a preset invalid identifier to the user classification identifier set of the invalid user.
- the server sets the target user as a valid user.
- the server can distinguish whether the target user is an invalid user by adding a preset effective identification to the user classification identification set of the effective user, and the user classification identification set is stored in the user's preset configuration file.
- the server sets the benefit obtaining permission for the target user. Specifically, if the operation path of the target user does not meet the preset invalid operation path rule, the server adds a valid identifier to the preset configuration file of the target user; the server adds the configuration of preset permissions to the preset configuration file of the target user, The preset permission is the permission to obtain the preset benefits; when the target user initiates a request to obtain benefits, the server uses the preset permission detection module to detect whether there is a valid identifier in the preset configuration file of the target user; when the server detects the target user’s When there is a valid identifier in the preset configuration file, the server obtains a request for benefits through the target user.
- the preset risk control strategy is executed, and the preset risk control strategy is an operation of re-identifying the invalid user.
- the server executes a preset risk control strategy.
- the preset risk control strategy is the operation set by the server to re-authenticate invalid users.
- the pre-built risk control strategy is to reduce the situation that operation promotion benefits are obtained by invalid users.
- the preset risk control strategy includes: if the target user is an invalid user, the server will authenticate the target user through a preset verification operation; if the target user is authenticated, the server will change the target user to a valid user; if the target user If the identity verification fails, the server will add the target user to the blacklist. For example, the server will add the invalid user Li Bai’s registered account, ID card number and device ID to the blacklist, and Li Bai cannot use the registered account to obtain activity benefits. And when Li Bai uses the ID number and device ID in the blacklist to register next time, the server will prompt Li Bai to fail to register.
- the preset verification operation is to verify that the target user is not an invalid user who obtains activity benefits in large quantities through the machine.
- the preset verification operation can be a random questionnaire or a verification code, such as a sliding verification code or a distorted or deformed image verification code, or other verification methods, such as SMS verification. Do restrictions.
- invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids waste of funds.
- the obtaining unit 301 is configured to obtain operation path information of the target user, the operation path information includes account ID, device ID, operation type, total operation times, and operation path duration; the judgment unit 302 is used to obtain operation path information of the target user The path information is used to determine whether the operation path of the target user meets the preset invalid user operation path rule; the first setting unit 303, if the operation path of the target user meets the preset invalid operation path rule, is used to set the The target user is an invalid user;
- the second setting unit 304 is configured to set the target user as a valid user if the operation path of the target user does not meet the preset invalid operation path rule; the execution unit 305, if the target user is an invalid user, It is used to execute a preset risk control strategy, and the preset risk control strategy is an operation of re-identifying the invalid user.
- invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids the waste of funds.
- an embodiment of the device for identifying an invalid user operation path in the embodiment of the present invention includes: an obtaining unit 301, configured to obtain operation path information of a target user, the operation path information including account ID, device ID, operation type , The total number of operations and the duration of the operation path; the judging unit 302 is configured to judge whether the operation path of the target user meets the preset invalid user operation path rule according to the operation path information of the target user; the first setting unit 303, if If the operation path of the target user conforms to the preset invalid operation path rule, it is used to set the target user as an invalid user; the second setting unit 304, if the operation path of the target user does not conform to the preset invalid operation path The rule is used to set the target user as a valid user; the execution unit 305, if the target user is an invalid user, is used to execute a preset risk control strategy, and the preset risk control strategy is for the invalid user Perform authentication again.
- the acquiring unit 301 includes: a first acquiring module 3011, configured to acquire operation path information of the target user through a buried point set at the front end; and a second acquiring module 3012, configured to record pipeline information through a back-end interface , And obtain the operation path information of the target user according to the flow information.
- the first obtaining module 3011 is specifically configured to: query the buried point in the page, the buried point is set at a position corresponding to the operation type on the page and used to count the number of operations of each operation type And record the information of the operation type, the information of the operation type includes the trigger time of the operation type and the business information corresponding to the operation type; and obtain the information recorded when the target user performs the login operation Account ID and device ID, the target account ID and target device ID of the target user are obtained, and the target account ID and target device ID of the target user are obtained; the operation type for which the number of operations is not zero is determined, and the operation The operation type whose number of times is not zero is used as the target operation type of the target user; the operation times of each target operation type are added together to obtain the target total operation times of the target user; the trigger moment recorded according to the buried point Calculate the target path operation duration of the target user.
- the first obtaining module 3012 is specifically configured to: record flow information through the back-end interface corresponding to the operation type, where the flow information includes the time when the back-end interface is called, the back-end interface type, and the call User token for the back-end interface; add the flow information to the user operation log; when the target user completes all operations, obtain the target user operation log of the target user; parse the user in the target user operation log Token to obtain the target account ID and target device ID of the target user; convert the back-end interface type in the target user operation log into the operation type to obtain the target operation type of the target user; statistics The number of times the back-end interface type is recorded in the target user operation log is added to the number of times the back-end interface type is recorded to obtain the target total number of operations of the target user; according to the target user operation Calculate the target path operation duration of the target user at the time when the back-end interface is called in the log.
- the determining unit 302 is specifically configured to: count the total login times of the target account ID and the total login times of the target device ID through a preset counter; determine the total login times of the target account ID through a preset matcher Whether the times meet the preset first operation path characteristics: the total login times of the target account ID exceeds the preset first login times, and the preset matcher is used to match the preset operation path characteristics that the target user meets and store All preset operation path characteristic values; the preset matcher determines whether the total login times of the target device ID meets the preset second operation path characteristic: the total login times of the target device ID exceeds the preset second login The number of times; the preset matcher determines whether the target user's operation type meets the preset third operation path feature: the target operation type is a preset operation type; the preset matcher determines the target Whether the total number of operations meets the preset fourth operating path feature: the total number of target operations is less than the preset number of operations; the preset matcher determines whether the target operating
- the execution unit 305 is specifically configured to: if the target user is an invalid user, perform identity verification on the target user through a preset verification operation, and the preset verification operation includes filling in a preset questionnaire, Identify the preset verification code and SMS verification; if the target user passes the identity verification, change the target user to a valid user; if the target user fails the identity verification, change the target user add to blacklist.
- the second setting unit 304 is specifically configured to: if the operation path of the target user does not conform to the preset invalid operation path rule, add a valid identifier to the preset configuration file of the target user; The configuration of preset permissions is added to the preset configuration file of the target user, and the preset permissions are the acquisition permissions of preset benefits.
- invalid users are identified through the user's operation path, which improves the promotion efficiency of operation promotion activities, and at the same time improves the fund utilization rate of operation promotion activities, and avoids waste of funds.
- the above Figures 3 to 4 describe the invalid user operation path identification device in the embodiment of the present invention in detail from the perspective of modular functional entity, and the following describes the invalid user operation path identification device in the embodiment of the present invention from the perspective of hardware processing in detail.
- FIG. 5 is a schematic structural diagram of an invalid user operation path identification device provided by an embodiment of the present application.
- the invalid user operation path identification device 500 may have relatively large differences due to different configurations or performance, and may include one or more processors (central processing units, CPU) 501 (for example, one or more processors) and a memory 509, and one or more storage media 508 (for example, one or more storage devices with a large amount of data) storing application programs 507 or data 506.
- the memory 509 and the storage medium 508 may be short-term storage or persistent storage.
- the program stored in the storage medium 508 may include one or more modules (not shown in the figure), and each module may include a series of instruction operations in the device for identifying invalid user operation paths.
- the instruction includes the implementation steps of any embodiment of the above-mentioned invalid user operation path identification method.
- the processor 501 may be configured to communicate with the storage medium 508 and execute a series of instruction operations in the storage medium 508 on the device 500 for identifying an invalid user operation path.
- the device 500 for identifying invalid user operation paths may also include one or more power supplies 502, one or more wired or wireless network interfaces 503, one or more input and output interfaces 504, and/or one or more operating systems 505, such as Windows Serve, Mac OS X, Unix, Linux, FreeBSD, etc.
- Windows Serve Windows Serve
- Mac OS X Unix
- Linux FreeBSD
- the processor 501 can execute the functions of the acquiring unit 301, the determining unit 302, the first setting unit 303, the second setting unit 304, and the executing unit 305 in the foregoing embodiment.
- the processor 501 is the control center of the invalid user operation path identification device, and can perform processing according to the set information processing method.
- the processor 501 uses various interfaces and lines to connect the various parts of the entire invalid user operation path identification device, and executes invalidation by running or executing software programs and/or modules stored in the memory 509, and calling data stored in the memory 509
- the user operation path recognizes the various functions and processing data of the device, thereby realizing the identification of invalid user operation paths.
- the storage medium 508 and the storage 509 are both carriers for storing data.
- the storage medium 508 may refer to an internal storage with a small storage capacity but a fast speed
- the storage 509 may be an external storage with a large storage capacity but a slow storage speed. Memory.
- the memory 509 can be used to store software programs and modules, and the processor 501 executes various functional applications and data processing of the invalid user operation path identification device 500 by running the software programs and modules stored in the memory 509.
- the memory 509 may mainly include a storage program area and a storage data area.
- the storage program area may store an operating system, an application program required by at least one function (such as a program for obtaining operation path information of a target user, etc.); the storage data area may Store the data (such as user token, etc.) created by identifying the use of the device according to the invalid user operation path.
- the memory 509 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- a non-volatile memory such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- the instruction includes the implementation steps of any embodiment of the above-mentioned invalid user operation path identification method.
- the computer may be a general-purpose computer, a special-purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in a computer-readable storage medium, or transmitted from one computer-readable storage medium to another computer-readable storage medium.
- the computer instructions may be passed from a website, a computer, or a data center. Wire (for example, coaxial cable, optical fiber, twisted pair) or wireless (for example, infrared, wireless, microwave, etc.) to transmit to another website, computer, or data center.
- the computer-readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a data center integrated with one or more available media.
- the computer-readable storage medium may be non-volatile or Can be volatile.
- the readable medium may be a magnetic medium (for example, a floppy disk, a hard disk, and a magnetic tape), an optical medium (for example, an optical disk), or a semiconductor medium (for example, a solid state disk (SSD)).
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (20)
- 一种无效用户操作路径识别方法,其中,包括:获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
- 根据权利要求1所述的无效用户操作路径识别方法,其中,所述获取目标用户的操作路径信息,包括:通过在前端设置的埋点,获取所述目标用户的操作路径信息;或,通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
- 根据权利要求2所述的无效用户操作路径识别方法,其中,所述通过在前端设置的埋点,获取所述目标用户的操作路径信息,包括:查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的位置上并用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID;确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
- 根据权利要求2所述的无效用户操作路径识别方法,其中,所述通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息,包括:通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;将所述流水信息添加到用户操作日志;当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日 志;解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
- 根据权利要求3或4所述的无效用户操作路径识别方法,其中,所述根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则,包括:通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一操作路径特征:所述目标账号ID的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操作路径特征:所述目标操作类型为预置的操作类型;通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;统计所述预置匹配器匹配到的预置操作路径特征数量;若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
- 根据权利要求1-4中任一所述的无效用户操作路径识别方法,其中,所述若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作,包括:若所述目标用户是无效用户,则通过预置的验证操作对所述目标用户进行身份验证,所述预置的验证操作包括填写预置的问卷、识别预置的验证码以及短信验证;若所述目标用户通过所述身份验证,则将所述目标用户更改为有效用户;若所述目标用户未通过所述身份验证,则将所述目标用户加入黑名单。
- 根据权利要求1-4中任一所述的无效用户操作路径识别方法,其中,所述若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户,包括:若所述目标用户的操作路径不符合所述预置无效操作路径规则,则在所述目标用户的预置配置文件中增加有效标识;在所述目标用户的预置配置文件中增加预置权限的配置,所述预置权限为预置福利的获取权限。
- 一种无效用户操作路径识别装置,其中,包括:获取单元,用于获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;判断单元,用于根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;第一设置单元,若所述目标用户的操作路径符合预置无效操作路径规则,则用于设置所述目标用户是无效用户;第二设置单元,若所述目标用户的操作路径不符合所述预置无效操作路径规则,则用于设置所述目标用户为有效用户;执行单元,若所述目标用户是无效用户,则用于执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
- 一种无效用户操作路径识别设备,其中,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如下步骤:获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
- 根据权利要求9所述的无效用户操作路径识别设备,其中,所述获取目标用户的操作路径信息,包括:通过在前端设置的埋点,获取所述目标用户的操作路径信息;或,通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
- 根据权利要求10所述的无效用户操作路径识别设备,其中,所述通过在前端设置的埋点,获取所述目标用户的操作路径信息,包括:查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的 位置上并用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID;确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
- 根据权利要求10所述的无效用户操作路径识别设备,其中,所述通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息,包括:通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;将所述流水信息添加到用户操作日志;当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日志;解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
- 根据权利要求11或12所述的无效用户操作路径识别设备,其中,所述根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则,包括:通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一操作路径特征:所述目标账号ID的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操 作路径特征:所述目标操作类型为预置的操作类型;通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;统计所述预置匹配器匹配到的预置操作路径特征数量;若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
- 根据权利要求9-12中任一所述的无效用户操作路径识别设备,其中,所述若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作,包括:若所述目标用户是无效用户,则通过预置的验证操作对所述目标用户进行身份验证,所述预置的验证操作包括填写预置的问卷、识别预置的验证码以及短信验证;若所述目标用户通过所述身份验证,则将所述目标用户更改为有效用户;若所述目标用户未通过所述身份验证,则将所述目标用户加入黑名单。
- 根据权利要求9-12任一所述的无效用户操作路径识别设备,其中,所述若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户,包括:若所述目标用户的操作路径不符合所述预置无效操作路径规则,则在所述目标用户的预置配置文件中增加有效标识;在所述目标用户的预置配置文件中增加预置权限的配置,所述预置权限为预置福利的获取权限。
- 一种计算机可读存储介质,其中,包括指令,当所述指令在计算机上运行时,使得计算机执行如下步骤:获取目标用户的操作路径信息,所述操作路径信息包括账号ID、设备ID、操作类型、总操作次数以及操作路径时长;根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则;若所述目标用户的操作路径符合所述预置无效操作路径规则,则设置所述目标用户是无效用户;若所述目标用户的操作路径不符合所述预置无效操作路径规则,则设置所述目标用户为有效用户;若所述目标用户是无效用户,则执行预置风控策略,所述预置风控策略为对所述无效用户再次进行身份验证的操作。
- 根据权利要求16所述的计算机可读存储介质,其中,所述获取目标用户的操作路径信息,包括:通过在前端设置的埋点,获取所述目标用户的操作路径信息;或,通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息。
- 根据权利要求17所述的计算机可读存储介质,其中,所述通过在前端设置的埋点,获取所述目标用户的操作路径信息,包括:查询页面中的所述埋点,所述埋点设置在页面中与所述操作类型对应的位置上并用于统计每个操作类型的操作次数以及记录所述操作类型的信息,所述操作类型的信息包括所述操作类型的触发时刻以及与所述操作类型对应的业务信息;获取所述埋点在所述目标用户进行登录操作时记录的账号ID以及设备ID,得到所述目标用户的目标账号ID以及目标设备ID;确定所述操作次数不为零的操作类型,将所述操作次数不为零的操作类型作为所述目标用户的目标操作类型;将各个目标操作类型的操作次数相加,得到所述目标用户的目标总操作次数;根据所述埋点记录的所述触发时刻计算所述目标用户的目标路径操作时长。
- 根据权利要求17所述的计算机可读存储介质,其中,所述通过后端接口记录流水信息,并根据所述流水信息获取所述目标用户的操作路径信息,包括:通过所述操作类型对应的后端接口记录流水信息,所述流水信息包括所述后端接口被调用的时刻、后端接口类型、调用所述后端接口的用户令牌;将所述流水信息添加到用户操作日志;当所述目标用户完成所有操作时,获取所述目标用户的目标用户操作日志;解析所述目标用户操作日志中的用户令牌,得到所述目标用户的目标账号ID以及目标设备ID;将所述目标用户操作日志中的所述后端接口类型转换为所述操作类型,得到所述目标用户的目标操作类型;统计所述目标用户操作日志中所述后端接口类型被记录的次数,将所述后端接口类型被记录的次数相加,得到所述目标用户的目标总操作次数;根据所述目标用户操作日志中所述后端接口被调用的时刻计算所述目标用户的目标路径操作时长。
- 根据权利要求18或19所述的计算机可读存储介质,其中,所述根据所述目标用户的操作路径信息,判断所述目标用户的操作路径是否符合预置无效用户操作路径规则,包括:通过预置计数器计数所述目标账号ID的总登录次数和所述目标设备ID的总登录次数;通过预置匹配器判断所述目标账号ID的总登录次数是否符合预置第一 操作路径特征:所述目标账号ID的总登录次数超过预置第一登录次数,所述预置匹配器用于匹配所述目标用户符合的预置操作路径特征且存储了所有预置操作路径特征值;通过所述预置匹配器判断所述目标设备ID的总登录次数是否符合预置第二操作路径特征:所述目标设备ID的总登录次数超过预置第二登录次数;通过所述预置匹配器判断所述目标用户的操作类型是否符合预置第三操作路径特征:所述目标操作类型为预置的操作类型;通过所述预置匹配器判断所述目标总操作次数是否符合预置第四操作路径特征:所述目标操作总次数少于预置操作次数;通过所述预置匹配器判断所述目标操作路径时长是否符合预置第五操作路径特征:所述目标路径操作时长少于预置时长;统计所述预置匹配器匹配到的预置操作路径特征数量;若所述预置操作路径特征数量超过预置特征数量,则确定所述目标用户的操作路径符合所述预置无效用户操作路径规则;若所述预置操作路径特征数量未超过所述预置特征数量,则确定所述目标用户的操作路径不符合所述预置无效用户操作路径规则。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910427058.7 | 2019-05-22 | ||
CN201910427058.7A CN110322250A (zh) | 2019-05-22 | 2019-05-22 | 无效用户操作路径识别方法、装置、设备及存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020233366A1 true WO2020233366A1 (zh) | 2020-11-26 |
Family
ID=68113247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/087583 WO2020233366A1 (zh) | 2019-05-22 | 2020-04-28 | 无效用户操作路径识别方法、装置、设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110322250A (zh) |
WO (1) | WO2020233366A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110322250A (zh) * | 2019-05-22 | 2019-10-11 | 深圳壹账通智能科技有限公司 | 无效用户操作路径识别方法、装置、设备及存储介质 |
CN111049675B (zh) * | 2019-11-26 | 2022-11-22 | 中国联合网络通信集团有限公司 | 在线选号防刷方法和装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1081607A2 (en) * | 1999-08-31 | 2001-03-07 | Lucent Technologies Inc. | Method for providing fast access to dynamic content on the world wide web |
US20040122943A1 (en) * | 2002-06-28 | 2004-06-24 | Brett Error | Custom event and attribute generation for use in website traffic data collection |
CN102946319A (zh) * | 2012-09-29 | 2013-02-27 | 焦点科技股份有限公司 | 网络用户行为信息分析***及其分析方法 |
CN106156194A (zh) * | 2015-04-21 | 2016-11-23 | 阿里巴巴集团控股有限公司 | 一种形成用户操作路径的方法及装置 |
CN109558561A (zh) * | 2018-12-04 | 2019-04-02 | 深圳创维数字技术有限公司 | 一种用户行为路径采集方法、装置、设备及介质 |
CN110322250A (zh) * | 2019-05-22 | 2019-10-11 | 深圳壹账通智能科技有限公司 | 无效用户操作路径识别方法、装置、设备及存储介质 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4906581B2 (ja) * | 2007-05-09 | 2012-03-28 | 日本電信電話株式会社 | 認証システム |
CN106372472A (zh) * | 2016-08-31 | 2017-02-01 | 深圳天珑无线科技有限公司 | 应用操作方法和应用操作装置 |
CN106559487A (zh) * | 2016-11-11 | 2017-04-05 | 美通云动(北京)科技有限公司 | 一种访问应用的方法及装置 |
CN108462704B (zh) * | 2018-02-27 | 2019-08-06 | 平安科技(深圳)有限公司 | 登录验证方法、装置、计算机设备及存储介质 |
CN108874909A (zh) * | 2018-05-28 | 2018-11-23 | 深圳壹账通智能科技有限公司 | 用户访问路径获取方法、服务器及计算机存储介质 |
CN109740089A (zh) * | 2018-11-30 | 2019-05-10 | 东软集团股份有限公司 | 数据采集方法、装置、***、可读存储介质及电子设备 |
-
2019
- 2019-05-22 CN CN201910427058.7A patent/CN110322250A/zh active Pending
-
2020
- 2020-04-28 WO PCT/CN2020/087583 patent/WO2020233366A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1081607A2 (en) * | 1999-08-31 | 2001-03-07 | Lucent Technologies Inc. | Method for providing fast access to dynamic content on the world wide web |
US20040122943A1 (en) * | 2002-06-28 | 2004-06-24 | Brett Error | Custom event and attribute generation for use in website traffic data collection |
CN102946319A (zh) * | 2012-09-29 | 2013-02-27 | 焦点科技股份有限公司 | 网络用户行为信息分析***及其分析方法 |
CN106156194A (zh) * | 2015-04-21 | 2016-11-23 | 阿里巴巴集团控股有限公司 | 一种形成用户操作路径的方法及装置 |
CN109558561A (zh) * | 2018-12-04 | 2019-04-02 | 深圳创维数字技术有限公司 | 一种用户行为路径采集方法、装置、设备及介质 |
CN110322250A (zh) * | 2019-05-22 | 2019-10-11 | 深圳壹账通智能科技有限公司 | 无效用户操作路径识别方法、装置、设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN110322250A (zh) | 2019-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2748781B1 (en) | Multi-factor identity fingerprinting with user behavior | |
CN107196950B (zh) | 校验方法、装置及服务端 | |
CN110888838B (zh) | 基于对象存储的请求处理方法、装置、设备及存储介质 | |
US7512973B1 (en) | Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content | |
US8751184B2 (en) | Transaction based workload modeling for effective performance test strategies | |
WO2020233366A1 (zh) | 无效用户操作路径识别方法、装置、设备及存储介质 | |
US20100262506A1 (en) | Mobile content delivery on a mobile network | |
US11429698B2 (en) | Method and apparatus for identity authentication, server and computer readable medium | |
WO2020125074A1 (zh) | 消息到达率确定方法、装置、数据统计服务器及存储介质 | |
CN110224992B (zh) | 共享资源限制复用的方法、设备、***及计算机可读介质 | |
WO2020233009A1 (zh) | 身份验证方法、装置、计算设备和存储介质 | |
CN104899744A (zh) | 钱币邮票收藏品交易***与交易方法 | |
WO2021093369A1 (zh) | 一种信息投放方法、装置、***及电子设备 | |
WO2018080967A1 (en) | Security mechanism for multi-tiered serverimplemented applications | |
US10158650B1 (en) | Token verification from incremental inputs | |
US20150101059A1 (en) | Application License Verification | |
WO2015085735A1 (en) | Information requesting method and system | |
CN114826946A (zh) | 未授权访问接口的检测方法、装置、设备及存储介质 | |
CN105184559B (zh) | 一种支付***及方法 | |
CN111371811B (zh) | 一种资源调用方法、资源调用装置、客户端及业务服务器 | |
CN109040056B (zh) | 一种基于服务器的用户验证方法 | |
WO2023011233A1 (zh) | 流量管理方法、装置、设备及计算机可读存储介质 | |
CN108809909B (zh) | 数据处理方法及数据处理装置 | |
CN111552949B (zh) | 一种物联网设备加密方法、装置及电子设备 | |
CN110248326B (zh) | 一种数据处理方法及其装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20809482 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20809482 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18.03.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20809482 Country of ref document: EP Kind code of ref document: A1 |