CN111105262A - User identification method and device, electronic equipment and storage medium - Google Patents

User identification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN111105262A
CN111105262A CN201811271805.4A CN201811271805A CN111105262A CN 111105262 A CN111105262 A CN 111105262A CN 201811271805 A CN201811271805 A CN 201811271805A CN 111105262 A CN111105262 A CN 111105262A
Authority
CN
China
Prior art keywords
user
user behavior
behavior data
information
target user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811271805.4A
Other languages
Chinese (zh)
Inventor
贾伟
徐梦迪
李婧夕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811271805.4A priority Critical patent/CN111105262A/en
Publication of CN111105262A publication Critical patent/CN111105262A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements

Abstract

The invention discloses a user identification method, a user identification device, electronic equipment and a storage medium. The method comprises the following steps: acquiring user behavior data of a target user; extracting equipment information corresponding to the user behavior from the user behavior data; and identifying whether the target user is a user of a specified type according to a preset device judgment rule and the extracted device information. According to the technical scheme, user identification is carried out from the dimension of the equipment information, the method and the device are suitable for identifying users who are generated in modes of cheating and the like under scenes such as user registration and the like, and loss of popularization of products is reduced conveniently.

Description

User identification method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a user identification method, a user identification device, electronic equipment and a storage medium.
Background
In all trades and industries, products cannot be supported by users. In order to absorb more users (also called "customers"), products are often promoted through different channels, for example, the products are promoted by means of advertisements, and in the internet era, users can conveniently jump to a registration page of the products by clicking advertisements to register as users of the products.
Products often select a plurality of content channels to be popularized, and payment is usually carried out according to the popularization effect. For example, the number of users registered through an advertising channel is a factor to be considered. Part of advertisement channel providers cheat in order to make profit, so that part of registered users actually exist. There is therefore a need for a method that can identify specific types of users, such as cheats.
Disclosure of Invention
In view of the above, the present invention has been made to provide a user identification method, apparatus, electronic device and storage medium that overcome or at least partially solve the above-mentioned problems.
According to an aspect of the present invention, there is provided a user identification method, including:
acquiring user behavior data of a target user;
extracting equipment information corresponding to the user behavior from the user behavior data;
and identifying whether the target user is a user of a specified type according to a preset device judgment rule and the extracted device information.
Optionally, the acquiring the user behavior data of the target user includes:
and extracting and sorting the user behavior data of the target user according to the user identification from the user behavior dotting log.
Optionally, the method further comprises:
providing a front-end page comprising a plurality of embedded points, and collecting the user behavior dotting logs according to the embedded points;
the front end page includes: a registration page and/or a product page.
Optionally, the user behavior data of the target user is user behavior data related to user registration.
Optionally, the device information includes operating system information and device vendor information.
Optionally, the identifying, according to a preset device determination rule and the extracted device information, whether the target user is a user of a specified type includes:
and if the operating system information does not match the equipment manufacturer information, marking the target user as a user of a specified type.
Optionally, the identifying, according to a preset device determination rule and the extracted device information, whether the target user is a user of a specified type includes:
and removing the duplicate of the operating system information, and if the quantity of the removed operating system information is more than 1, marking the target user as a user of a specified type.
Optionally, the method further comprises:
counting the proportion of users of a specified type in users registered according to each content channel within a preset time period;
and evaluating the quality of each content channel according to the proportion.
According to another aspect of the present invention, there is provided a user identification apparatus including:
the acquisition unit is suitable for acquiring user behavior data of a target user;
the extraction unit is suitable for extracting equipment information corresponding to the user behavior from the user behavior data;
and the identification unit is suitable for identifying whether the target user is the user of the specified type according to the preset equipment judgment rule and the extracted equipment information.
Optionally, the obtaining unit is adapted to extract and sort user behavior data of the target user from the user behavior dotting log according to the user identifier.
Optionally, the obtaining unit is adapted to provide a front-end page including a plurality of embedded points, and collect the user behavior dotting log according to the embedded points; the front end page includes: a registration page and/or a product page.
Optionally, the user behavior data of the target user is user behavior data related to user registration.
Optionally, the device information includes operating system information and device vendor information.
Optionally, the identification unit is adapted to mark the target user as a user of a specified type if the operating system information does not match the device vendor information.
Optionally, the identifying unit is adapted to perform deduplication on the operating system information, and if the number of the operating system information subjected to deduplication is greater than 1, mark the target user as a user of a specified type.
Optionally, the apparatus further comprises:
the content channel evaluation unit is suitable for counting the proportion of users of the specified type in the users registered according to each content channel within the preset time period; and evaluating the quality of each content channel according to the proportion.
In accordance with still another aspect of the present invention, there is provided an electronic apparatus including: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as any one of the above.
According to a further aspect of the invention, there is provided a computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement a method as any one of the above.
According to the technical scheme, the user behavior data of the target user are obtained, the equipment information corresponding to the user behavior is extracted from the user behavior data, and whether the target user is the user of the specified type is identified according to the preset equipment judgment rule and the extracted equipment information. According to the technical scheme, user identification is carried out from the dimension of the equipment information, the method and the device are suitable for identifying users who are generated in modes of cheating and the like under scenes such as user registration and the like, and loss of popularization of products is reduced conveniently.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow diagram illustrating a user identification method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a user identification device according to an embodiment of the present invention;
FIG. 3 shows a schematic structural diagram of an electronic device according to one embodiment of the invention;
fig. 4 shows a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 is a flow chart illustrating a user identification method according to an embodiment of the present invention. As shown in fig. 1, the method includes:
step S110, user behavior data of the target user is obtained.
In the actual data collection process, the user behavior data may include the type of the user behavior, the time when the user behavior occurs, the device information when the user behavior occurs, the network environment information corresponding to the user behavior, and the like. In the embodiment of the invention, only the device information corresponding to the user behavior can be selected for utilization.
Step S120 is to extract device information corresponding to the user behavior from the user behavior data.
When a user registers, browses and other behaviors through a page, the user knows the devices on which the user behaviors occur, and further identifies whether the user is a user of a specified type.
Step S130, identifying whether the target user is a user of a specified type according to a preset device determination rule and the extracted device information.
As can be seen, in the method shown in fig. 1, the user behavior data of the target user is obtained, the device information corresponding to the user behavior is extracted from the user behavior data, and whether the target user is a user of a specified type is identified according to the preset device judgment rule and the extracted device information. According to the technical scheme, user identification is carried out from the dimension of the equipment information, the method and the device are suitable for identifying users who are generated in modes of cheating and the like under scenes such as user registration and the like, and loss of popularization of products is reduced conveniently.
In an embodiment of the present invention, the obtaining user behavior data of the target user in the method includes: and extracting and sorting the user behavior data of the target user according to the user identification from the user behavior dotting log.
The method for collecting the specified information by pre-embedding points is a convenient method for internet related products, and in this embodiment, the user behavior dotting logs can be collected in this way, specifically, in an embodiment of the present invention, the method further includes: providing a front-end page comprising a plurality of embedded points, and collecting user behavior dotting logs according to the embedded points; the front end page includes: a registration page and/or a product page.
For example, the input mobile phone number and the input verification code of the registered page are subjected to point burying, and after the user inputs the mobile phone number, the point burying is triggered, the user behavior is reported, and the record is carried out in a user behavior dotting log.
It can be seen that, because of more points, records related to each user and various user behaviors are collected in the user behavior dotting log. In the above embodiment, a user identifier may be determined according to device information and the like. Therefore, when user behavior data of a certain specified user is needed, the user behavior dotting logs can be processed and integrated according to the user identification, and the user behavior data of the same user can be obtained. Taking a registration scene as an example, complete behavior chain data of a registered user before and after registration can be obtained.
It should be noted that, in the embodiment of the present invention, not only the user behavior occurring on the registration page but also the user behavior occurring on the product page may be focused. Because many content channels cheat by registering users in bulk, and these users do not log in the product after registration, and cannot create revenue for the product, many product operators choose to pay for promotion based on the users who have action after registration. Therefore, the cheating is not limited to the registration but also exists after the registration. Therefore, the embodiment of the invention can also collect the user behavior data on the product page. As described in the background art, one of the promotion forms of the content is an advertisement, the content in the embodiment of the present invention may be an advertisement, and the corresponding content channel is an advertisement channel.
In an embodiment of the present invention, in the method, the user behavior data of the target user is user behavior data related to user registration.
As can be seen from the foregoing description, in order to obtain user behavior data related to user registration, user behavior data of content in a certain time period may be obtained according to a time point of occurrence of a user registration event, and the user behavior data is used as user behavior data related to user registration, or user behavior data of a user behavior of a specified type such as inputting an authentication code and inputting a mobile phone number is obtained.
In an embodiment of the present invention, in the method, the device information includes operating system information and device vendor information.
For example, the device information may include whether the operating system is an iOS system or an Android system, whether the device manufacturer is hua ye, apple, samsung, or millet, and so on. Two examples of the determination using the device information are given below.
In an embodiment of the present invention, the identifying, according to a preset device determination rule and the extracted device information, whether the target user is a user of a specified type includes: if the operating system information does not match the device vendor information, the target user is marked as a user of the specified type.
For example, if the operating system information shows that the user is using the Android system, but the device vendor information shows that the device is an apple phone, this will hardly happen in the normal user's registration scenario. On the contrary, this situation may occur in some cheating scenarios, which may occur in a cheating content channel through batch operations using a simulator.
In an embodiment of the present invention, the identifying, according to a preset device determination rule and the extracted device information, whether the target user is a user of a specified type includes: and removing the duplicate of the operating system information, and if the quantity of the removed operating system information is more than 1, marking the target user as a user of a specified type.
In a registration process, the operating system used by normal users should be single, so if the number of the operating system information after de-duplication is greater than 1, and the operating system information may also be generated by a cheating mode, and the corresponding user can be marked as a user of a specified type, such as a false user or a cheating user.
In the prior art, the identification of false users or cheating users can be performed by various ways such as determining whether cheating is performed through feature engineering and a decision tree classification model. The disadvantages of these approaches are generally: 1) the interpretability is poor, multidimensional data support is needed, the data quality is required to be high, but the high quality of the data may not be ensured in an actual business scene, and the model identification quality is influenced; 2) the query is carried out by means of a historical database, a large amount of historical data is accumulated, or a three-party database is purchased, so that the operation cost is increased; 3) data abnormal distribution on a relatively long-time dimension needs to be observed, identification based on user granularity is not available, short-term or real-time identification cannot be carried out, and timeliness is poor.
In combination with the above embodiments, it can be seen that the technical scheme of the present invention adopted to identify false users or cheating users has the advantages that: 1) the native user behavior data is utilized, the judgment logic is popular and easy to understand, the interpretability is strong, the acceptance is easy, and initiative is strived for when the business is settled and negotiated; 2) the judgment is carried out by only utilizing the user behavior data related to the user registration event (such as the current day), long-term data accumulation is not needed, the abnormity judgment timeliness is T +1 day, the timeliness is greatly improved, the timely recovery is facilitated, and the loss of a product operator is reduced; 3) and a third-party library is not required to be additionally used, so that the operation cost is saved.
In an embodiment of the present invention, the method further includes: counting the proportion of users of a specified type in users registered according to each content channel within a preset time period; and evaluating the quality of each content channel according to the proportion.
For example, the identified user is a cheating user or a fake user, and when such a user is highly occupied, it is apparent that the quality of the content channel is poor, otherwise it is high.
Fig. 2 is a schematic structural diagram of a user identification device according to an embodiment of the present invention. As shown in fig. 2, the user identification apparatus 200 includes:
the obtaining unit 210 is adapted to obtain user behavior data of the target user.
In the actual data collection process, the user behavior data may include the type of the user behavior, the time when the user behavior occurs, the device information when the user behavior occurs, the network environment information corresponding to the user behavior, and the like. In the embodiment of the invention, only the device information corresponding to the user behavior can be selected for utilization.
The extracting unit 220 is adapted to extract device information corresponding to the user behavior from the user behavior data.
When a user registers, browses and other behaviors through a page, the user knows the devices on which the user behaviors occur, and further identifies whether the user is a user of a specified type.
The identifying unit 230 is adapted to identify whether the target user is a user of a specified type according to a preset device judgment rule and the extracted device information.
As can be seen, the apparatus shown in fig. 2 acquires user behavior data of a target user through mutual cooperation of the units, extracts device information corresponding to the user behavior from the user behavior data, and identifies whether the target user is a user of a specified type according to a preset device determination rule and the extracted device information. According to the technical scheme, user identification is carried out from the dimension of the equipment information, the method and the device are suitable for identifying users who are generated in modes of cheating and the like under scenes such as user registration and the like, and loss of popularization of products is reduced conveniently.
In an embodiment of the present invention, in the above apparatus, the obtaining unit 210 is adapted to extract and sort user behavior data of the target user from the user behavior dotting log according to the user identifier.
Collecting the designated information by burying points in advance is a convenient method for internet related products, and in this embodiment, the user behavior dotting logs can be collected in this way, specifically, in an embodiment of the present invention, in the apparatus, the obtaining unit 210 is adapted to provide a front-end page including a plurality of buried points, and collect the user behavior dotting logs according to the buried points; the front end page includes: a registration page and/or a product page.
For example, the input mobile phone number and the input verification code of the registered page are subjected to point burying, and after the user inputs the mobile phone number, the point burying is triggered, the user behavior is reported, and the record is carried out in a user behavior dotting log.
It can be seen that, because of more points, records related to each user and various user behaviors are collected in the user behavior dotting log. In the above embodiment, a user identifier may be determined according to device information and the like. Therefore, when user behavior data of a certain specified user is needed, the user behavior dotting logs can be processed and integrated according to the user identification, and the user behavior data of the same user can be obtained. Taking a registration scene as an example, complete behavior chain data of a registered user before and after registration can be obtained.
It should be noted that, in the embodiment of the present invention, not only the user behavior occurring on the registration page but also the user behavior occurring on the product page may be focused. Because many content channels cheat by registering users in bulk, and these users do not log in the product after registration, and cannot create revenue for the product, many product operators choose to pay for promotion based on the users who have action after registration. Therefore, the cheating is not limited to the registration but also exists after the registration. Therefore, the embodiment of the invention can also collect the user behavior data on the product page. As described in the background art, one of the promotion forms of the content is an advertisement, the content in the embodiment of the present invention may be an advertisement, and the corresponding content channel is an advertisement channel.
In an embodiment of the present invention, in the above apparatus, the user behavior data of the target user is user behavior data related to user registration.
As can be seen from the foregoing description, in order to obtain user behavior data related to user registration, user behavior data of content in a certain time period may be obtained according to a time point of occurrence of a user registration event, and the user behavior data is used as user behavior data related to user registration, or user behavior data of a user behavior of a specified type such as inputting an authentication code and inputting a mobile phone number is obtained.
In an embodiment of the present invention, in the apparatus, the device information includes operating system information and device vendor information.
For example, the device information may include whether the operating system is an iOS system or an Android system, whether the device manufacturer is hua ye, apple, samsung, or millet, and so on. Two examples of the determination using the device information are given below.
In an embodiment of the present invention, in the above apparatus, the identifying unit 230 is adapted to mark the target user as a user of a specified type if the operating system information does not match the device vendor information.
For example, if the operating system information shows that the user is using the Android system, but the device vendor information shows that the device is an apple phone, this will hardly happen in the normal user's registration scenario. On the contrary, this situation may occur in some cheating scenarios, which may occur in a cheating content channel through batch operations using a simulator.
In an embodiment of the present invention, in the above apparatus, the identifying unit 230 is adapted to perform deduplication on the operating system information, and if the number of the operating system information after deduplication is greater than 1, mark the target user as a user of a specified type.
In a registration process, the operating system used by normal users should be single, so if the number of the operating system information after de-duplication is greater than 1, and the operating system information may also be generated by a cheating mode, and the corresponding user can be marked as a user of a specified type, such as a false user or a cheating user.
In the prior art, the identification of false users or cheating users can be performed by various ways such as determining whether cheating is performed through feature engineering and a decision tree classification model. The disadvantages of these approaches are generally: 1) the interpretability is poor, multidimensional data support is needed, the data quality is required to be high, but the high quality of the data may not be ensured in an actual business scene, and the model identification quality is influenced; 2) the query is carried out by means of a historical database, a large amount of historical data is accumulated, or a three-party database is purchased, so that the operation cost is increased; 3) data abnormal distribution on a relatively long-time dimension needs to be observed, identification based on user granularity is not available, short-term or real-time identification cannot be carried out, and timeliness is poor.
In combination with the above embodiments, it can be seen that the technical scheme of the present invention adopted to identify false users or cheating users has the advantages that: 1) the native user behavior data is utilized, the judgment logic is popular and easy to understand, the interpretability is strong, the acceptance is easy, and initiative is strived for when the business is settled and negotiated; 2) the judgment is carried out by only utilizing the user behavior data related to the user registration event (such as the current day), long-term data accumulation is not needed, the abnormity judgment timeliness is T +1 day, the timeliness is greatly improved, the timely recovery is facilitated, and the loss of a product operator is reduced; 3) and a third-party library is not required to be additionally used, so that the operation cost is saved.
In an embodiment of the present invention, the apparatus further includes: a content channel evaluation unit (not shown in fig. 2) adapted to count a proportion of users of a specified type among users registered according to each content channel within a preset time period; and evaluating the quality of each content channel according to the proportion.
For example, the identified user is a cheating user or a fake user, and when such a user is highly occupied, it is apparent that the quality of the content channel is poor, otherwise it is high.
In summary, according to the technical solution of the present invention, user behavior data of a target user is obtained through mutual cooperation of the units, device information corresponding to a user behavior is extracted from the user behavior data, and whether the target user is a user of a specified type is identified according to a preset device determination rule and the extracted device information. According to the technical scheme, user identification is carried out from the dimension of the equipment information, the method and the device are suitable for identifying users who are generated in modes of cheating and the like under scenes such as user registration and the like, and loss of popularization of products is reduced conveniently.
It should be noted that:
the algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose devices may be used with the teachings herein. The required structure for constructing such a device will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of a subscriber identity device according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
For example, fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the invention. The electronic device comprises a processor 310 and a memory 320 arranged to store computer executable instructions (computer readable program code). The memory 320 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. The memory 320 has a storage space 330 storing computer readable program code 331 for performing any of the method steps described above. For example, the storage space 330 for storing the computer readable program code may comprise respective computer readable program codes 331 for respectively implementing various steps in the above method. The computer readable program code 331 may be read from or written to one or more computer program products. These computer program products comprise a program code carrier such as a hard disk, a Compact Disc (CD), a memory card or a floppy disk. Such a computer program product is typically a computer readable storage medium such as described in fig. 4. Fig. 4 shows a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention. The computer readable storage medium 400 has stored thereon a computer readable program code 331 for performing the steps of the method according to the invention, readable by a processor 310 of the electronic device 300, which computer readable program code 331, when executed by the electronic device 300, causes the electronic device 300 to perform the steps of the method described above, in particular the computer readable program code 331 stored on the computer readable storage medium may perform the method shown in any of the embodiments described above. The computer readable program code 331 may be compressed in a suitable form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses a1 and a user identification method, which comprises the following steps:
acquiring user behavior data of a target user;
extracting equipment information corresponding to the user behavior from the user behavior data;
and identifying whether the target user is a user of a specified type according to a preset device judgment rule and the extracted device information.
A2, the method of A1, wherein the obtaining user behavior data of the target user comprises:
and extracting and sorting the user behavior data of the target user according to the user identification from the user behavior dotting log.
A3, the method of a2, wherein the method further comprises:
providing a front-end page comprising a plurality of embedded points, and collecting the user behavior dotting logs according to the embedded points;
the front end page includes: a registration page and/or a product page.
A4, the method of A1, wherein the user behavior data of the target user is user behavior data related to user registration.
A5, the method as in A1, wherein the device information includes operating system information and device vendor information.
A6, the method as in a5, wherein the identifying whether the target user is a user of a specified type according to the preset device judgment rule and the extracted device information includes:
and if the operating system information does not match the equipment manufacturer information, marking the target user as a user of a specified type.
A7, the method as in a5, wherein the identifying whether the target user is a user of a specified type according to the preset device judgment rule and the extracted device information includes:
and removing the duplicate of the operating system information, and if the quantity of the removed operating system information is more than 1, marking the target user as a user of a specified type.
A8, the method of a1, wherein the method further comprises:
counting the proportion of users of a specified type in users registered according to each content channel within a preset time period;
and evaluating the quality of each content channel according to the proportion.
The invention also discloses B9, a user identification device, comprising:
the acquisition unit is suitable for acquiring user behavior data of a target user;
the extraction unit is suitable for extracting equipment information corresponding to the user behavior from the user behavior data;
and the identification unit is suitable for identifying whether the target user is the user of the specified type according to the preset equipment judgment rule and the extracted equipment information.
B10, the device of B9, wherein,
the acquisition unit is suitable for extracting and sorting the user behavior data of the target user from the user behavior dotting log according to the user identification.
B11, the device of B10, wherein,
the acquisition unit is suitable for providing a front-end page comprising a plurality of embedded points and collecting the user behavior dotting logs according to the embedded points; the front end page includes: a registration page and/or a product page.
B12, the apparatus as in B9, wherein the user behavior data of the target user is the user behavior data related to user registration.
B13, the apparatus as in B9, wherein the device information includes operating system information and device vendor information.
B14, the device of B13, wherein,
the identification unit is suitable for marking the target user as the user of the specified type if the operating system information is not matched with the equipment manufacturer information.
B15, the device of B13, wherein,
the identification unit is suitable for removing the duplicate of the operating system information, and if the quantity of the operating system information after the duplicate removal is larger than 1, the target user is marked as the user of the specified type.
B16, the apparatus of B9, wherein the apparatus further comprises:
the content channel evaluation unit is suitable for counting the proportion of users of the specified type in the users registered according to each content channel within the preset time period; and evaluating the quality of each content channel according to the proportion.
The invention also discloses C17 and an electronic device, wherein the electronic device comprises: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any one of a 1-A8.
The invention also discloses D18, a computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method as described in any of a1-a 8.

Claims (10)

1. A user identification method, comprising:
acquiring user behavior data of a target user;
extracting equipment information corresponding to the user behavior from the user behavior data;
and identifying whether the target user is a user of a specified type according to a preset device judgment rule and the extracted device information.
2. The method of claim 1, wherein the obtaining user behavior data for a target user comprises:
and extracting and sorting the user behavior data of the target user according to the user identification from the user behavior dotting log.
3. The method of claim 2, wherein the method further comprises:
providing a front-end page comprising a plurality of embedded points, and collecting the user behavior dotting logs according to the embedded points;
the front end page includes: a registration page and/or a product page.
4. The method of claim 1, wherein the user behavior data of the target user is user behavior data related to user registration.
5. The method of claim 1, wherein the device information comprises operating system information and device vendor information.
6. The method of claim 5, wherein the identifying whether the target user is a user of a specified type according to the preset device judgment rule and the extracted device information comprises:
and if the operating system information does not match the equipment manufacturer information, marking the target user as a user of a specified type.
7. The method of claim 5, wherein the identifying whether the target user is a user of a specified type according to the preset device judgment rule and the extracted device information comprises:
and removing the duplicate of the operating system information, and if the quantity of the removed operating system information is more than 1, marking the target user as a user of a specified type.
8. A user identification device comprising:
the acquisition unit is suitable for acquiring user behavior data of a target user;
the extraction unit is suitable for extracting equipment information corresponding to the user behavior from the user behavior data;
and the identification unit is suitable for identifying whether the target user is the user of the specified type according to the preset equipment judgment rule and the extracted equipment information.
9. An electronic device, wherein the electronic device comprises: a processor; and a memory arranged to store computer-executable instructions that, when executed, cause the processor to perform the method of any one of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-7.
CN201811271805.4A 2018-10-29 2018-10-29 User identification method and device, electronic equipment and storage medium Pending CN111105262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811271805.4A CN111105262A (en) 2018-10-29 2018-10-29 User identification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811271805.4A CN111105262A (en) 2018-10-29 2018-10-29 User identification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111105262A true CN111105262A (en) 2020-05-05

Family

ID=70419836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811271805.4A Pending CN111105262A (en) 2018-10-29 2018-10-29 User identification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111105262A (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104966002A (en) * 2015-07-03 2015-10-07 北京数字联盟网络科技有限公司 False mobile terminal identification method and apparatus
US20150310201A1 (en) * 2014-04-23 2015-10-29 DeNA Co., Ltd. User authentication system
CN106022834A (en) * 2016-05-24 2016-10-12 腾讯科技(深圳)有限公司 Advertisement against cheating method and device
CN106156173A (en) * 2015-04-16 2016-11-23 北京金山安全软件有限公司 Cheating identification method and device and terminal
CN106294105A (en) * 2015-05-22 2017-01-04 深圳市腾讯计算机系统有限公司 Brush amount tool detection method and apparatus
WO2017071551A1 (en) * 2015-10-30 2017-05-04 北京奇虎科技有限公司 Method and device for preventing malicious access to login/registration interface
CN107153971A (en) * 2017-05-05 2017-09-12 北京京东尚科信息技术有限公司 Method and device for recognizing equipment cheating in APP popularizations
CN107274212A (en) * 2017-05-26 2017-10-20 北京小度信息科技有限公司 Cheating recognition methods and device
CN107493302A (en) * 2017-09-28 2017-12-19 北京云衢科技有限公司 A kind of user information acquiring method and device
US9870465B1 (en) * 2013-12-04 2018-01-16 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US20180034852A1 (en) * 2014-11-26 2018-02-01 Isityou Ltd. Anti-spoofing system and methods useful in conjunction therewith
CN108109011A (en) * 2017-12-28 2018-06-01 北京皮尔布莱尼软件有限公司 A kind of anti-cheat method of advertisement and computing device
CN108512682A (en) * 2017-02-28 2018-09-07 腾讯科技(深圳)有限公司 A kind of method and apparatus of determining false terminal iidentification
US20180276709A1 (en) * 2016-06-02 2018-09-27 Tencent Technology (Shenzhen) Company Limited Information processing method, server, and non-volatile storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9870465B1 (en) * 2013-12-04 2018-01-16 Plentyoffish Media Ulc Apparatus, method and article to facilitate automatic detection and removal of fraudulent user information in a network environment
US20150310201A1 (en) * 2014-04-23 2015-10-29 DeNA Co., Ltd. User authentication system
US20180034852A1 (en) * 2014-11-26 2018-02-01 Isityou Ltd. Anti-spoofing system and methods useful in conjunction therewith
CN106156173A (en) * 2015-04-16 2016-11-23 北京金山安全软件有限公司 Cheating identification method and device and terminal
CN106294105A (en) * 2015-05-22 2017-01-04 深圳市腾讯计算机系统有限公司 Brush amount tool detection method and apparatus
CN104966002A (en) * 2015-07-03 2015-10-07 北京数字联盟网络科技有限公司 False mobile terminal identification method and apparatus
WO2017071551A1 (en) * 2015-10-30 2017-05-04 北京奇虎科技有限公司 Method and device for preventing malicious access to login/registration interface
CN106022834A (en) * 2016-05-24 2016-10-12 腾讯科技(深圳)有限公司 Advertisement against cheating method and device
US20180276709A1 (en) * 2016-06-02 2018-09-27 Tencent Technology (Shenzhen) Company Limited Information processing method, server, and non-volatile storage medium
CN108512682A (en) * 2017-02-28 2018-09-07 腾讯科技(深圳)有限公司 A kind of method and apparatus of determining false terminal iidentification
CN107153971A (en) * 2017-05-05 2017-09-12 北京京东尚科信息技术有限公司 Method and device for recognizing equipment cheating in APP popularizations
CN107274212A (en) * 2017-05-26 2017-10-20 北京小度信息科技有限公司 Cheating recognition methods and device
CN107493302A (en) * 2017-09-28 2017-12-19 北京云衢科技有限公司 A kind of user information acquiring method and device
CN108109011A (en) * 2017-12-28 2018-06-01 北京皮尔布莱尼软件有限公司 A kind of anti-cheat method of advertisement and computing device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
SARA KERETNA,等: "Recognising User Identity in Twitter Social Networks via Text Mining", 《IEEE XPLORE》, vol. 1, 27 January 2014 (2014-01-27), pages 3079 - 3082 *
方勇,等: "基于层次聚类的虚假用户检测", 《清华大学学报(自然科学版)》, vol. 57, no. 6, 31 December 2017 (2017-12-31), pages 620 - 624 *
苏海海编著: "《互联网产品运营教程》", vol. 1, 中国铁道出版社, pages: 156 - 157 *

Similar Documents

Publication Publication Date Title
CN110198310B (en) Network behavior anti-cheating method and device and storage medium
KR101999471B1 (en) Information recommendation methods and devices
CN109756760B (en) Video tag generation method and device and server
CN109034583A (en) Abnormal transaction identification method, apparatus and electronic equipment
CN104731816A (en) Method and device for processing abnormal business data
CN107633433B (en) Advertisement auditing method and device
CN104462397A (en) Promotion information processing method and promotion information processing device
WO2019085095A1 (en) Intelligent voice prompting method and apparatus, electronic device, and medium
CN111104628A (en) User identification method and device, electronic equipment and storage medium
CN110851339A (en) Method and device for reporting buried point data, storage medium and terminal equipment
CN112783749A (en) Static code scanning optimization method and device, electronic equipment and storage medium
CN110942312A (en) POS machine cash register identification method, system, equipment and storage medium
CN111127050A (en) Content channel evaluation method and device, electronic equipment and storage medium
CN111105259B (en) User identification method, device, electronic equipment and storage medium
CN110827049A (en) Data pushing method and device
CN110796178B (en) Decision model training method, sample feature selection method, device and electronic equipment
CN111105263A (en) User identification method and device, electronic equipment and storage medium
CN111105261B (en) User identification method, device, electronic equipment and storage medium
CN112445787A (en) Data auditing method and system based on real-time service
CN111105262A (en) User identification method and device, electronic equipment and storage medium
CN108108467B (en) Data deleting method and device
CN107193721B (en) Method and device for generating log
CN111105260A (en) User identification method and device, electronic equipment and storage medium
CN104394435A (en) Digital set top box startup detecting method and device
CN111263351B (en) Service processing method, service processing device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination