CN109714636A - A kind of user identification method, device, equipment and medium - Google Patents

A kind of user identification method, device, equipment and medium Download PDF

Info

Publication number
CN109714636A
CN109714636A CN201811573563.4A CN201811573563A CN109714636A CN 109714636 A CN109714636 A CN 109714636A CN 201811573563 A CN201811573563 A CN 201811573563A CN 109714636 A CN109714636 A CN 109714636A
Authority
CN
China
Prior art keywords
user
internet behavior
behavior data
probability
standard value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811573563.4A
Other languages
Chinese (zh)
Other versions
CN109714636B (en
Inventor
王璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Ouyue Netvision Co Ltd
Original Assignee
Wuhan Ouyue Netvision Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Ouyue Netvision Co Ltd filed Critical Wuhan Ouyue Netvision Co Ltd
Priority to CN201811573563.4A priority Critical patent/CN109714636B/en
Publication of CN109714636A publication Critical patent/CN109714636A/en
Application granted granted Critical
Publication of CN109714636B publication Critical patent/CN109714636B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses a kind of user identification method, device, equipment and media, which comprises determines the internet behavior data of user;Determine that the user is the probability of target user based on the internet behavior data and preset identification model;Wherein, the target user includes the user for carrying out specific internet behavior, the internet behavior data of the determining user, comprising: counts the user and logs in the used IP address number of live streaming platform when institute in the set time period;Alternatively, count the user logs in the used number of devices of live streaming platform when institute in the set time period.By using above-mentioned technical proposal, the recognition accuracy of target user can be improved.

Description

A kind of user identification method, device, equipment and medium
Technical field
The present embodiments relate to computer field more particularly to a kind of user identification method, device, equipment and media.
Background technique
On live streaming platform, in order to acquire an advantage, in the prevalence of the work of the brushes popularities such as some false brush barrages, brush concern Disadvantage behavior.
The problems such as above-mentioned cheating will cause network blockage, live streaming Platform Server pressure is excessive, the live streaming to platform Ecological environment causes strong influence.Therefore in order to reduce above-mentioned cheating bring negative effect, using reasonable method Finding has the user of cheating suspicion significant.The existing recognition methods to cheating user generallys use strong rule, and described Strong rule is set generally according to the experience of business personnel, and there is no reasonable principles for the threshold value setting of some indexs, is existed Biggish randomness;For example, if experience thinks that the IP address number that user uses is more than or equal to 10, it is determined that the user is cheating Suspicion user, if the IP address number that some user uses is 9, it is determined that some user is not cheating suspicion user.Undoubtedly The rule of above-mentioned identification cheating user is unreasonable.
Summary of the invention
The present invention provides a kind of user identification method, device, equipment and medium, can be improved by the method to target The recognition accuracy of user.
To achieve the above object, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, the embodiment of the invention provides a kind of user identification methods, which comprises
Determine the internet behavior data of user;
Determine that the user is the probability of target user based on the internet behavior data and preset identification model;
Wherein, the target user includes the user for carrying out specific internet behavior;
The internet behavior data of the determining user, comprising:
It counts the user and logs in the used IP address number of live streaming platform when institute in the set time period;Alternatively,
It counts the user and logs in the used number of devices of live streaming platform when institute in the set time period.
Second aspect, the embodiment of the invention provides a kind of customer identification device, described device includes:
Determining module, for determining the internet behavior data of user;
Identification module, for determining that the user is target based on the internet behavior data and preset identification model The probability of user;
Wherein, the target user includes the user for carrying out specific internet behavior;
The determining module is specifically used for: counting when the user logs in live streaming platform in the set time period and used IP address number;Alternatively,
It counts the user and logs in the used number of devices of live streaming platform when institute in the set time period.
The third aspect, the embodiment of the invention provides a kind of electronic equipment, which includes:
One or more processors;
Storage device, for storing multiple programs;
When at least one of the multiple program by one or more of processors execute when so that it is one or Multiple processors realize user identification method described in above-mentioned first aspect.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program, the program realize user identification method described in above-mentioned first aspect when being executed by processor.
A kind of user identification method provided in an embodiment of the present invention, by determining the internet behavior data of user, specifically: It counts the user and logs in the used IP address number of live streaming platform when institute in the set time period;Alternatively, counting the user The used number of devices of institute and based on internet behavior data and preset when logging in live streaming platform in the set time period Identification model determines that the user is the probability of target user;Wherein, the target user includes carrying out specific internet behavior The technological means of user improves the recognition accuracy to target user.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, institute in being described below to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also implement according to the present invention The content of example and these attached drawings obtain other attached drawings.
Fig. 1 is a kind of user identification method flow diagram that the embodiment of the present invention one provides;
Fig. 2 is the method flow schematic diagram of a kind of determining constant a and b value that the embodiment of the present invention one provides;
Fig. 3 is a kind of linear partition schematic diagram of the log probability that provides of the embodiment of the present invention one than curve;
Fig. 4 is linear partition schematic diagram of another log probability that provides of the embodiment of the present invention one than curve;
Fig. 5 is a kind of customer identification device structural schematic diagram provided by Embodiment 2 of the present invention;
Fig. 6 is the structural schematic diagram for a kind of electronic equipment that the embodiment of the present invention three provides.
Specific embodiment
To keep the technical problems solved, the adopted technical scheme and the technical effect achieved by the invention clearer, below It will the technical scheme of the embodiment of the invention will be described in further detail in conjunction with attached drawing, it is clear that described embodiment is only It is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those skilled in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is a kind of user identification method flow diagram that the embodiment of the present invention one provides.The present embodiment is disclosed to be used Family recognition methods is applicable to identify the user for being engaged in certain internet behavior, for example, to direct broadcasting room carry out brush barrage, The user of brush concern behavior identifies, can be executed by customer identification device, wherein the device can be by software and/or hardware It realizes, and is typically integrated in terminal, such as smart phone or computer etc..Referring specifically to shown in Fig. 1, this method may include Following steps:
Step 110, counting user log in the used IP address number of live streaming platform when institute in the set time period;Alternatively, Counting user logs in the used number of devices of live streaming platform when institute in the set time period.
The i.e. described internet behavior data include the IP address number or the number of devices.Wherein, the set period of time It can be specific some day, a certain week or some moon.Determine that the internet behavior data of user can specifically pass through behavior Get acquisition User action log ready, the behavior get ready be the place that is needed in engineering for counting user behavior to bury a little (such as Click event, page jump) it is inserted into and buries point code, the internet behavior of user will be recorded in User action log later, be led to The user for carrying out specific internet behavior can be determined by crossing acquisition User action log and inquiring user behavior, described specific to surf the net For for example specially which user has sent barrage information for main broadcaster A.User is also recorded in User action log simultaneously Carrying out network environment information (such as IP address) and used terminal device information used in internet behavior, (such as terminal is set Standby ID).The User action log can directly can be obtained by a data acquisition interface at mobile terminal (such as smart phone) It takes.
Step 120 determines that the user is target user based on the internet behavior data and preset identification model Probability.
Wherein, the target user includes the user for carrying out specific internet behavior.
Wherein, the specific internet behavior can be the behavior of positive worth promotion, such as online contribution, can also be The behavior that passive needs resist, such as the behavior of brush barrage is carried out for identical main broadcaster by live streaming platform or passes through live streaming Platform carries out brush concern behavior for identical main broadcaster.The behavior that usually passive needs resist often brings some negative shadows It rings, it is as escribed above that the behavior of brush barrage is carried out or by live streaming platform for identical for identical main broadcaster by live streaming platform Main broadcaster carry out brush concern behavior, it will usually cause network blockage, live streaming Platform Server pressure it is excessive the problems such as.Therefore in order to It reduces negative effect brought by the behavior of brush barrage or brush concern behavior or is engaged in certain beneficial to behavior, originally to actively advocate A kind of user identification method disclosed in embodiment, the target for going out to be engaged in the behavior of brush barrage or brush concern behavior for identification are used Family, with alerted perhaps take other measures rectified or identified be engaged in contribution etc. public goods behavior group, to give To praise, healthy tendency in society etc. is built, the present embodiment is engaged in the net of the behavior of brush barrage or brush concern behavior etc. to identify It is illustrated for upper cheating user.
Further, determine that the user is target user based on the internet behavior data and preset identification model Probability, comprising:
Determine that the user is the probability of target user according to following preset recognition function:
Wherein, A (x) indicates that the user is the probability of target user, and x indicates the internet behavior data of the user, a with B is setting constant.
Identify that the accuracy of target user depends on the setting value of constant a and b by the recognition function, in view of this, this Embodiment provides the algorithm of a kind of determining constant a and b value, and shown in Figure 2, the algorithm specifically comprises the following steps:
Step 210 determines cheating suspicion user set and non-cheating suspicion user set.
Specifically, can determine that cheating suspicion user gathers, i.e., be by the user that spectators complain by way of receiving and complaining Cheating suspicion user, the user not complained by spectators are non-cheating suspicion user.It can also be stepped on by auditor to each The behavior of record direct broadcasting room user carries out auditing determining cheating suspicion user and non-cheating suspicion user, if specifically, for example examining Core finds that logging in direct broadcasting room by 10 different equipment in certain user one day pays close attention to different main broadcasters, can recognize at this time It is cheating suspicion user for the user.Cheating suspicion user and non-cheating suspicion user can be also obtained by expertise.
Each user is in setting in step 220, statistics cheating suspicion user set and non-cheating suspicion user set Between internet behavior data in section.
Wherein, the internet behavior data can include: log in the live streaming platform used IP of when institute in the set time period Number of addresses;Alternatively, logging in the used number of devices of live streaming platform when institute in the set time period.
Step 230, for each standard value in each standard value, calculate separately each user in cheating suspicion user set Internet behavior data be greater than present standard values the first combined chance and non-cheating suspicion user set in each user it is online Behavioral data is greater than the second combined chance of present standard values.
Wherein, each standard value includes the possibility value of the internet behavior data of user, such as surfing the net as user It is used IP address number when logging in live streaming platform in the set time period for data, then possible value is 1,2,3, 4 ... ... n, i.e., each standard value are as follows: the value of 1,2,3,4 ... ... n, n can be set according to business experience, be typically set at 30.When the internet behavior data of user is log in live streaming platform in the set time period, used IP address number, then right The possibility value of used IP address number when each standard value answered is logs in live streaming platform in the set time period;Work as user Internet behavior data to log in live streaming platform in the set time period when used number of devices, then corresponding each standard value The possibility value of used number of devices when to log in live streaming platform in the set time period.
Specifically, being greater than according to the internet behavior data that following formula (1) calculates each user in cheating suspicion user set First combined chance of present standard values:
Wherein, p (S, vi) indicate that the internet behavior data of each user in cheating suspicion user's set S are greater than present standard values viThe first combined chance, N (S, v > vi) indicate that internet behavior data v is greater than present standard values in cheating suspicion user's set S viNumber of users, N (S) indicate cheating suspicion user's set S in total number of users.
The internet behavior data of each user are greater than the second combined chance of present standard values in non-cheating suspicion user set Calculation, be greater than the first comprehensive of present standard values with the internet behavior data of each user in above-mentioned cheating suspicion user set The calculation for closing probability is identical.
Step 240, the log probability ratio for calculating first combined chance and second combined chance obtain corresponding every The log probability ratio of a standard value.
Specifically, calculating the log probability ratio of corresponding each standard value according to following formula (2):
Wherein, r (vi) indicate corresponding standard value viLog probability ratio, p (S, vi) indicate in cheating suspicion user's set S The internet behavior data of each user are greater than present standard values viThe first combined chance, p (N, vi) indicate non-cheating suspicion user collection The internet behavior data for closing each user in N are greater than present standard values viThe second combined chance.
Step 250, the log probability based on each standard value of correspondence compare curve than construction log probability, wherein horizontal axis table Show each standard value, the longitudinal axis indicates the log probability ratio of corresponding each standard value.
Each standard value viCorrespond to a log probability ratio r (vi), therefore available vi~r (vi) log probability Than curve, horizontal axis indicates each standard value vi, the log probability ratio r (v of the corresponding each standard value of longitudinal axis expressioni)。
Step 260 carries out linear fit than curve to the log probability, is fitted corresponding linear partition when loss reduction The endpoint value in section respectively corresponds the constant a and b.
Specifically, determining that the log probability compares point of inflexion on a curve using polygometry, it is contemplated that the problem of computation complexity, It can set and the log probability is divided into three sections according to inflection point than curve, every section uses linear fit, and digital simulation loses; By different division modes, and fitting under every kind of division mode loss is solved, finally solves a kind of fitting loss reduction Optimal dividing mode, the endpoint value in corresponding linear partition section respectively corresponds the constant a and b under optimal dividing mode.Into Linear partition schematic diagram of one step referring to Fig. 3 and log probability shown in Fig. 4 than curve, corresponding two inflection points difference in Fig. 3 For inflection point g1 and inflection point g2, log probability has been partitioned into three sections, respectively curved section 31, curved section 32 and curved section than curve 33;Corresponding two inflection points are respectively inflection point g3 and inflection point g4 in Fig. 4, and log probability has been partitioned into three sections than curve, respectively For curved section 34, curved section 35 and curved section 36;If fitting loss reduction under division mode shown in Fig. 4, then constant a Value is the corresponding horizontal axis data of inflection point g3, and the value of constant b is the corresponding horizontal axis data of inflection point g4, reference can be made to shown in Fig. 4.
Further, the loss of the fitting under certain division mode is calculated according to following formula (3):
Wherein, S represents a kind of division mode of the log probability than curve, and Q (S) indicates the fitting damage at division mode S It loses, rmThe corresponding horizontal axis region of m sections of curves divided is indicated, for example, it is assumed that the first segment curve 31 divided shown in Fig. 3 is corresponding Horizontal axis region r1=[0,1], the corresponding horizontal axis region r2=[1,3] of second segment curve 32, the corresponding cross of third section curve 33 Axis region r3=[3,4];xiIndicate region rmOn value, yiIndicate xiThe corresponding ordinate of orthogonal axes on curve;M indicates to divide Curved section sum, the present embodiment for log probability is divided into 3 sections than curve, l (x) indicate fitting loss function, Chi square function, i.e. l (x)=x are selected herein2, αmAnd βmIt indicates the parameter that m sections of curve negotiating least square methods are estimated, has Body calculation method are as follows:
All possible division mode is traversed, the minimum value of Q (S), the corresponding linear partition section of Q (S) minimum value are acquired Endpoint value respectively correspond the numerical value of the constant a and b.
A kind of user identification method provided in this embodiment, by combining cheating suspicion user set and non-cheating suspicion The internet behavior data of each user in the set time period in user's set, determine preset identification letter using specific algorithm The setting value of constant a and b in number improve recognition accuracy of the recognition function to cheating user.
Embodiment two
Fig. 5 is a kind of customer identification device structural schematic diagram provided by Embodiment 2 of the present invention.It is shown in Figure 5, it is described Device comprises determining that module 510 and identification module 520;
Wherein it is determined that module 510, for determining the internet behavior data of user;Identification module 520, for based on described Internet behavior data and preset identification model determine that the user is the probability of target user;Wherein, the target user User including carrying out specific internet behavior.
Further, determining module 510 is specifically used for: count the user log in the set time period live streaming platform when The used IP address number of institute;It used is set alternatively, counting institute when the user logs in live streaming platform in the set time period Standby number.
Further, identification module 520 is specifically used for: determining that the user is target according to following preset recognition function The probability of user:
Wherein, A (x) indicates that the user is the probability of target user, and x indicates the internet behavior data of the user, a with B is setting constant.
Further, described device further includes computing module, for determine the constant a in the preset recognition function with The numerical value of b.
Further, the computing module includes:
Determination unit, for determining cheating suspicion user set and non-cheating suspicion user set;
Statistic unit is being set for counting each user in cheating suspicion user set and non-cheating suspicion user set The internet behavior data fixed time in section;
First computing unit, for calculating separately cheating suspicion user set for each standard value in each standard value In each user internet behavior data be greater than it is each in the first combined chance and non-cheating suspicion user set of present standard values The internet behavior data of user are greater than the second combined chance of present standard values;
Second computing unit, for calculating the log probability ratio of first combined chance Yu second combined chance, Obtain corresponding to the log probability ratio of each standard value;
Structural unit compares curve than construction log probability for the log probability based on each standard value of correspondence, wherein horizontal Axis indicates each standard value, and the longitudinal axis indicates the log probability ratio of corresponding each standard value;
Fitting unit is fitted corresponding line when loss reduction for carrying out linear fit than curve to the log probability The endpoint value of property demarcation interval respectively corresponds the constant a and b;
Wherein, each standard value includes the possibility value of the internet behavior data of user.
Further, the first computing unit is specifically used for: calculating in cheating suspicion user set according to following formula and respectively uses The internet behavior data at family are greater than the first combined chance of present standard values:
Wherein, p (S, vi) indicate that the internet behavior data of each user in cheating suspicion user's set S are greater than present standard values viThe first combined chance, N (S, v > vi) indicate that internet behavior data v is greater than present standard values in cheating suspicion user's set S viNumber of users, N (S) indicate cheating suspicion user's set S in total number of users.
Further, the second computing unit is specifically used for: the logarithm for calculating corresponding each standard value according to following formula is general Rate ratio:
Wherein, r (vi) indicate corresponding standard value viLog probability ratio, p (S, vi) indicate in cheating suspicion user's set S The internet behavior data of each user are greater than present standard values viThe first combined chance, p (N, vi) indicate non-cheating suspicion user collection The internet behavior data for closing each user in N are greater than present standard values viThe second combined chance.
Customer identification device provided in this embodiment, by combining cheating suspicion user set and non-cheating suspicion user The internet behavior data of each user in the set time period, are determined in preset recognition function using specific algorithm in set Constant a and b setting value, improve the recognition function to cheating user recognition accuracy.
Embodiment three
Fig. 6 is the structural schematic diagram for a kind of electronic equipment that the embodiment of the present invention three provides.Fig. 6, which is shown, to be suitable for being used in fact The block diagram of the example electronic device 12 of existing embodiment of the present invention.The electronic equipment 12 that Fig. 6 is shown is only an example, no The function and use scope for coping with the embodiment of the present invention bring any restrictions.
As shown in fig. 6, electronic equipment 12 is showed in the form of universal computing device.The component of electronic equipment 12 may include But be not limited to: one or more processor or processing unit 16, system storage 28, connect different system components (including System storage 28 and processing unit 16) bus 18.
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Electronic equipment 12 typically comprises a variety of computer system readable media.These media can be it is any can be electric The usable medium that sub- equipment 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (RAM) 30 and/or cache memory 32.Electronic equipment 12 may further include other removable/not removable Dynamic, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for read and write can not Mobile, non-volatile magnetic media (Fig. 6 do not show, commonly referred to as " hard disk drive ").Although being not shown in Fig. 6, Ke Yiti For the disc driver for being read and write to removable non-volatile magnetic disk (such as " floppy disk "), and to moving non-volatile light The CD drive of disk (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver It can be connected by one or more data media interfaces with bus 18.Memory 28 may include that at least one program produces Product, the program product have one group of (such as determining module 510 and identification module 520 of customer identification device) program module, this A little program modules are configured to perform the function of various embodiments of the present invention.
Program with one group of (such as determining module 510 and identification module 520 of customer identification device) program module 42/ Utility 40 can store in such as memory 28, and such program module 42 includes but is not limited to operating system, one Or multiple application programs, other program modules and program data, each of these examples or certain combination in may Realization including network environment.Program module 42 usually executes function and/or method in embodiment described in the invention.
Electronic equipment 12 can also be with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 etc.) Communication, can also be enabled a user to one or more equipment interact with the electronic equipment 12 communicate, and/or with make the electricity Any equipment (such as network interface card, modem etc.) that sub- equipment 12 can be communicated with one or more of the other calculating equipment Communication.This communication can be carried out by input/output (I/O) interface 22.Also, electronic equipment 12 can also be suitable by network Orchestration 20 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) Communication.As shown, network adapter 20 is communicated by bus 18 with other modules of electronic equipment 12.Although should be understood that It is not shown in the figure, other hardware and/or software module can be used in conjunction with electronic equipment 12, including but not limited to: microcode is set Standby driver, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system System etc..
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and Data processing, such as realize user identification method provided by the embodiment of the present invention, this method comprises:
Determine the internet behavior data of user;
Determine that the user is the probability of target user based on the internet behavior data and preset identification model;
Wherein, the target user includes the user for carrying out specific internet behavior;
The internet behavior data of the determining user, comprising:
It counts the user and logs in the used IP address number of live streaming platform when institute in the set time period;Alternatively,
It counts the user and logs in the used number of devices of live streaming platform when institute in the set time period.
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and Data processing, such as realize user identification method provided by the embodiment of the present invention.
Certainly, it will be understood by those skilled in the art that processor can also realize it is provided by any embodiment of the invention The technical solution of user identification method.
Example IV
The embodiment of the present invention four additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should The user identification method as provided by the embodiment of the present invention is realized when program is executed by processor, this method comprises:
Determine the internet behavior data of user;
Determine that the user is the probability of target user based on the internet behavior data and preset identification model;
Wherein, the target user includes the user for carrying out specific internet behavior;
The internet behavior data of the determining user, comprising:
It counts the user and logs in the used IP address number of live streaming platform when institute in the set time period;Alternatively,
It counts the user and logs in the used number of devices of live streaming platform when institute in the set time period.
Certainly, a kind of computer readable storage medium provided by the embodiment of the present invention, the computer program stored thereon The method operation being not limited to the described above, can also be performed the phase in user identification method provided by any embodiment of the invention Close operation.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service It is connected for quotient by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of user identification method characterized by comprising
Determine the internet behavior data of user;
Determine that the user is the probability of target user based on the internet behavior data and preset identification model;
Wherein, the target user includes the user for carrying out specific internet behavior;The internet behavior data of the determining user, packet It includes:
It counts the user and logs in the used IP address number of live streaming platform when institute in the set time period;Alternatively,
It counts the user and logs in the used number of devices of live streaming platform when institute in the set time period.
2. the method according to claim 1, wherein being based on the internet behavior data and preset identification mould Type determines that the user is the probability of target user, comprising:
Determine that the user is the probability of target user according to following preset recognition function:
Wherein, A (x) indicates that the user is the probability of target user, and x indicates the internet behavior data of the user, and a is with b Set constant.
3. according to the method described in claim 2, it is characterized in that, the method also includes: determine the preset identification letter The numerical value of constant a and b in number.
4. according to the method described in claim 3, it is characterized in that, determining the constant a's and b in the preset recognition function Numerical value, comprising:
Determine cheating suspicion user set and non-cheating suspicion user set;
Count each user in the set time period online in cheating suspicion user set and non-cheating suspicion user set Behavioral data;
For each standard value in each standard value, the internet behavior data of each user in cheating suspicion user set are calculated separately Internet behavior data greater than each user in the first combined chance of present standard values and non-cheating suspicion user set are greater than Second combined chance of present standard values;
The log probability ratio for calculating first combined chance Yu second combined chance, obtains pair for corresponding to each standard value Number likelihood ratio;
Log probability based on each standard value of correspondence compares curve than construction log probability, wherein horizontal axis indicates each standard value, indulges Axis indicates the log probability ratio of corresponding each standard value;
Linear fit is carried out than curve to the log probability, is fitted the endpoint value in corresponding linear partition section when loss reduction Respectively correspond the constant a and b;
Wherein, each standard value includes the possibility value of the internet behavior data of user.
5. according to the method described in claim 4, it is characterized in that, being calculated separately for each standard value in each standard value The internet behavior data of each user are greater than the first combined chance of present standard values in cheating suspicion user set, comprising:
It is greater than the of present standard values according to the internet behavior data that following formula calculates each user in cheating suspicion user set One combined chance:
Wherein, p (S, vi) indicate that the internet behavior data of each user in cheating suspicion user's set S are greater than present standard values vi's First combined chance, N (S, v > vi) indicate that internet behavior data v is greater than present standard values v in cheating suspicion user's set Si's Number of users, N (S) indicate the total number of users in cheating suspicion user's set S.
6. according to the method described in claim 5, it is characterized in that, calculating first combined chance and second synthesis generally The log probability ratio of rate obtains the log probability ratio for corresponding to each standard value, comprising:
The log probability ratio of corresponding each standard value is calculated according to following formula:
Wherein, r (vi) indicate corresponding standard value viLog probability ratio, p (S, vi) indicate respectively to use in cheating suspicion user's set S The internet behavior data at family are greater than present standard values viThe first combined chance, p (N, vi) indicate non-cheating suspicion user's set N In each user internet behavior data be greater than present standard values viThe second combined chance.
7. a kind of customer identification device, which is characterized in that described device includes:
Determining module, for determining the internet behavior data of user;
Identification module, for determining that the user is target user based on the internet behavior data and preset identification model Probability;
Wherein, the target user includes the user for carrying out specific internet behavior;
The determining module is specifically used for: counting the user and logs in the live streaming platform used IP of when institute in the set time period Number of addresses;Alternatively,
It counts the user and logs in the used number of devices of live streaming platform when institute in the set time period.
8. device according to claim 7, which is characterized in that the identification module is specifically used for:
Determine that the user is the probability of target user according to following preset recognition function:
Wherein, A (x) indicates that the user is the probability of target user, and x indicates the internet behavior data of the user, and a is with b Set constant.
9. a kind of electronic equipment, which is characterized in that the electronic equipment further include:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as user identification method of any of claims 1-6.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Such as user identification method of any of claims 1-6 is realized when execution.
CN201811573563.4A 2018-12-21 2018-12-21 User identification method, device, equipment and medium Active CN109714636B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811573563.4A CN109714636B (en) 2018-12-21 2018-12-21 User identification method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811573563.4A CN109714636B (en) 2018-12-21 2018-12-21 User identification method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN109714636A true CN109714636A (en) 2019-05-03
CN109714636B CN109714636B (en) 2021-04-23

Family

ID=66256003

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811573563.4A Active CN109714636B (en) 2018-12-21 2018-12-21 User identification method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN109714636B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990729A (en) * 2019-12-05 2020-04-10 秒针信息技术有限公司 Job and live analysis method and device, electronic equipment and readable storage medium
CN112788351A (en) * 2019-11-01 2021-05-11 武汉斗鱼鱼乐网络科技有限公司 Target live broadcast room identification method, device, equipment and storage medium
CN112995686A (en) * 2021-02-03 2021-06-18 上海哔哩哔哩科技有限公司 Data processing method, live broadcast method, authentication server and live broadcast data server
CN113347497A (en) * 2021-08-02 2021-09-03 武汉斗鱼鱼乐网络科技有限公司 Target user identification method and device, electronic equipment and storage medium
CN114071196A (en) * 2020-08-03 2022-02-18 武汉斗鱼鱼乐网络科技有限公司 Method, system, medium and equipment for identifying target live broadcast room
WO2023179162A1 (en) * 2022-03-24 2023-09-28 上海哔哩哔哩科技有限公司 Data processing method and apparatus

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523126A (en) * 2011-12-29 2012-06-27 深圳市同洲视讯传媒有限公司 Method and device for sending alarm event
CN103793484A (en) * 2014-01-17 2014-05-14 五八同城信息技术有限公司 Fraudulent conduct identification system based on machine learning in classified information website
CN104424433A (en) * 2013-08-22 2015-03-18 腾讯科技(深圳)有限公司 Anti-cheating method and anti-cheating system of application program
CN104852886A (en) * 2014-02-14 2015-08-19 腾讯科技(深圳)有限公司 Protection method and device for user account
CN105100032A (en) * 2014-05-23 2015-11-25 腾讯科技(北京)有限公司 Method and apparatus for preventing resource steal
CN105808639A (en) * 2016-02-24 2016-07-27 平安科技(深圳)有限公司 Network access behavior recognizing method and device
CN106209862A (en) * 2016-07-14 2016-12-07 微梦创科网络科技(中国)有限公司 A kind of steal-number defence implementation method and device
WO2017027003A1 (en) * 2015-08-10 2017-02-16 Hewlett Packard Enterprise Development Lp Evaluating system behaviour
CN108055281A (en) * 2017-12-27 2018-05-18 百度在线网络技术(北京)有限公司 Account method for detecting abnormality, device, server and storage medium
CN108763359A (en) * 2018-05-16 2018-11-06 武汉斗鱼网络科技有限公司 A kind of usage mining method, apparatus and electronic equipment with incidence relation
US20180337937A1 (en) * 2017-05-19 2018-11-22 Salesforce.Com, Inc. Feature-Agnostic Behavior Profile Based Anomaly Detection

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523126A (en) * 2011-12-29 2012-06-27 深圳市同洲视讯传媒有限公司 Method and device for sending alarm event
CN104424433A (en) * 2013-08-22 2015-03-18 腾讯科技(深圳)有限公司 Anti-cheating method and anti-cheating system of application program
CN103793484A (en) * 2014-01-17 2014-05-14 五八同城信息技术有限公司 Fraudulent conduct identification system based on machine learning in classified information website
CN104852886A (en) * 2014-02-14 2015-08-19 腾讯科技(深圳)有限公司 Protection method and device for user account
CN105100032A (en) * 2014-05-23 2015-11-25 腾讯科技(北京)有限公司 Method and apparatus for preventing resource steal
WO2017027003A1 (en) * 2015-08-10 2017-02-16 Hewlett Packard Enterprise Development Lp Evaluating system behaviour
CN105808639A (en) * 2016-02-24 2016-07-27 平安科技(深圳)有限公司 Network access behavior recognizing method and device
CN106209862A (en) * 2016-07-14 2016-12-07 微梦创科网络科技(中国)有限公司 A kind of steal-number defence implementation method and device
US20180337937A1 (en) * 2017-05-19 2018-11-22 Salesforce.Com, Inc. Feature-Agnostic Behavior Profile Based Anomaly Detection
CN108055281A (en) * 2017-12-27 2018-05-18 百度在线网络技术(北京)有限公司 Account method for detecting abnormality, device, server and storage medium
CN108763359A (en) * 2018-05-16 2018-11-06 武汉斗鱼网络科技有限公司 A kind of usage mining method, apparatus and electronic equipment with incidence relation

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姚伟: "业务系统异常行为检测", 《邮电设计技术》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112788351A (en) * 2019-11-01 2021-05-11 武汉斗鱼鱼乐网络科技有限公司 Target live broadcast room identification method, device, equipment and storage medium
CN112788351B (en) * 2019-11-01 2022-08-05 武汉斗鱼鱼乐网络科技有限公司 Target live broadcast room identification method, device, equipment and storage medium
CN110990729A (en) * 2019-12-05 2020-04-10 秒针信息技术有限公司 Job and live analysis method and device, electronic equipment and readable storage medium
CN110990729B (en) * 2019-12-05 2023-11-03 秒针信息技术有限公司 Job analysis method, device, electronic equipment and readable storage medium
CN114071196A (en) * 2020-08-03 2022-02-18 武汉斗鱼鱼乐网络科技有限公司 Method, system, medium and equipment for identifying target live broadcast room
CN112995686A (en) * 2021-02-03 2021-06-18 上海哔哩哔哩科技有限公司 Data processing method, live broadcast method, authentication server and live broadcast data server
CN112995686B (en) * 2021-02-03 2022-04-19 上海哔哩哔哩科技有限公司 Data processing method, live broadcast method, authentication server and live broadcast data server
CN113347497A (en) * 2021-08-02 2021-09-03 武汉斗鱼鱼乐网络科技有限公司 Target user identification method and device, electronic equipment and storage medium
WO2023179162A1 (en) * 2022-03-24 2023-09-28 上海哔哩哔哩科技有限公司 Data processing method and apparatus

Also Published As

Publication number Publication date
CN109714636B (en) 2021-04-23

Similar Documents

Publication Publication Date Title
CN109714636A (en) A kind of user identification method, device, equipment and medium
CN110188262B (en) A kind of abnormal object determines method, apparatus, equipment and medium
CN108197570A (en) A kind of demographic method, device, electronic equipment and storage medium
CN109246483A (en) A kind of direct broadcasting room recommended method, device, equipment and storage medium
CN110111811A (en) Audio signal detection method, device and storage medium
CN111090729A (en) Method, device, server and storage medium for identifying fraudulent group
CN112566228A (en) Method and system for reducing equipment power consumption in network video conference
CN109670078A (en) A kind of method, apparatus, equipment and the storage medium of determining video display sequence
CN110889010A (en) Audio matching method, device, medium and electronic equipment
CN112788351B (en) Target live broadcast room identification method, device, equipment and storage medium
CN108765503B (en) Skin color detection method, device and terminal
CN109637540B (en) Bluetooth evaluation method, device, equipment and medium for intelligent voice equipment
CN116805012A (en) Quality assessment method and device for multi-mode knowledge graph, storage medium and equipment
CN109376064B (en) Method and equipment for generating interface test report
CN113347497B (en) Target user identification method and device, electronic equipment and storage medium
CN109840182A (en) A kind of resource monitoring method, device and electronic equipment
CN110675009A (en) Method and device for evaluating convenience of cell
CN115016890A (en) Virtual machine resource allocation method and device, electronic equipment and storage medium
CN110738509A (en) Method and device for quantifying association degree between users
CN115333964A (en) Data acquisition method, device and equipment and readable storage medium
CN106446821A (en) Method and device for identifying gender of user and electronic equipment
CN103561022A (en) Voice service access method, related device and voice service system
CN109348236B (en) Storage capacity evaluation method and device, server and storage medium
CN110189763B (en) Sound wave configuration method and device and terminal equipment
CN113849471A (en) Data compression method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant