Movatterモバイル変換


[0]ホーム

URL:


CN114282940A - Method and device, storage medium and electronic device for intent recognition - Google Patents

Method and device, storage medium and electronic device for intent recognition
Download PDF

Info

Publication number
CN114282940A
CN114282940ACN202111554891.1ACN202111554891ACN114282940ACN 114282940 ACN114282940 ACN 114282940ACN 202111554891 ACN202111554891 ACN 202111554891ACN 114282940 ACN114282940 ACN 114282940A
Authority
CN
China
Prior art keywords
user
data
terminal
behavior
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111554891.1A
Other languages
Chinese (zh)
Other versions
CN114282940B (en
Inventor
罗仕漳
王德志
雷勇
周洁
唐畅
孙迪
王春雷
乐奇华
张锐清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp LtdfiledCriticalChina Telecom Corp Ltd
Priority to CN202111554891.1ApriorityCriticalpatent/CN114282940B/en
Publication of CN114282940ApublicationCriticalpatent/CN114282940A/en
Application grantedgrantedCritical
Publication of CN114282940BpublicationCriticalpatent/CN114282940B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

Translated fromChinese

本公开提供了一种用于意图识别的方法、装置、电子设备及存储介质,涉及计算机技术领域。该方法包括:接收用户终端发送的待识别用户信息集;解析待识别用户信息集,获得用户终端采集的用户业务数据、用户终端数据和用户行为时间数据,以及获得接收待识别用户信息的接收时间点;根据用户业务数据、用户终端数据、用户行为时间数据和接收时间点进行针对目标意图的意图识别,获得对目标意图的识别结果值;根据识别结果值确定待识别用户信息集表征目标意图的程度。该方法可以根据从用户终端获取到的待识别用户信息集从多维度识别待识别用户信息集表征目标意图的程度。

Figure 202111554891

The present disclosure provides a method, an apparatus, an electronic device and a storage medium for intent recognition, and relates to the field of computer technology. The method includes: receiving a user information set to be identified sent by a user terminal; parsing the user information set to be identified, obtaining user service data, user terminal data and user behavior time data collected by the user terminal, and obtaining the receiving time for receiving the to-be-identified user information According to the user business data, user terminal data, user behavior time data and receiving time point, the intent recognition for the target intent is carried out, and the recognition result value of the target intent is obtained; degree. The method can identify the degree to which the user information set to be identified represents the target intention from multiple dimensions according to the user information set to be identified obtained from the user terminal.

Figure 202111554891

Description

Method and apparatus for intention recognition, storage medium, and electronic device
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for intention recognition, a storage medium, and an electronic device.
Background
In communication operation, channel agents often forge user card records in a card-supported manner to obtain profits from operators, that is, forge the illusion that users use phone cards through some technical means, for example, through some programs or card-supported devices, multiple phone cards can attach to the same terminal to generate records of sending short messages, making calls, using traffic, etc., while in reality, the phone cards are not used by normal users. The operation cost and the activity cost are increased, but the business income of the operator is reduced, thereby bringing loss to the operator. Therefore, there is a need to identify card-keeping intentions.
In the related art, whether the card-keeping intention exists is generally determined by analyzing business data of a user, and the problem that the identification is not accurate enough exists.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The invention aims to provide a method, a device, an electronic device and a storage medium for intention identification, so as to solve the problem that card-raising intention identification is not accurate enough.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the present disclosure, there is provided a method for intent recognition, including: receiving a user information set to be identified sent by a user terminal; analyzing a user information set to be identified, acquiring user service data, user terminal data and user behavior time data which are acquired by a user terminal, and acquiring a receiving time point for receiving the user information to be identified; performing intention identification aiming at the target intention according to the user service data, the user terminal data, the user behavior time data and the receiving time point to obtain an identification result value of the target intention; and determining the degree of representing the target intention by the user information set to be identified according to the identification result value.
In one embodiment of the present disclosure, the target intent is a card-maintenance intent; the method comprises the following steps of identifying the intention aiming at the target intention according to user service data, user terminal data, user behavior time data and a receiving time point, and obtaining an identification result value of the target intention, wherein the identification result value comprises the following steps: performing service characteristic identification aiming at the target intention according to the user service data to obtain a service identification result value; carrying out terminal environment identification aiming at a target intention according to user terminal data to obtain a terminal identification result value; performing data authenticity identification according to the user behavior time data and the receiving time point to obtain a data identification result value; respectively acquiring weighted values corresponding to the service identification value, the terminal identification value and the data identification value; and determining an identification result value according to the service identification value, the terminal identification value, the data identification value and each corresponding weight value.
In one embodiment of the present disclosure, the user traffic data includes at least one of: the method comprises the following steps of registering a user card number, a lowest consumption service type, a package service type, a monthly rental service type, an average income value of each user, calling time, called time, a network-accessing monthly consumption value and a user attribution channel type; the method comprises the following steps of performing service characteristic identification aiming at a target intention according to user service data, and obtaining a service identification result value, wherein the steps comprise: acquiring a card maintenance identification model, and inputting user service data into the card maintenance identification model; obtaining the card-raising intention probability output by the card-raising identification model; taking the card-raising intention probability as a business identification result value; the card-raising recognition model is obtained by training according to historical business data of card-raising users and historical business data of non-card-raising users.
In one embodiment of the present disclosure, the step of performing terminal environment identification for a target intention according to user terminal data to obtain a terminal identification result value includes: determining the number of user terminal data meeting the maintenance environment condition; determining a terminal identification result value according to the number; wherein, the environment condition of the nutrient solution comprises: the method comprises the steps that no international mobile equipment identification code exists on a terminal, no local number exists on the terminal, no user identification card number exists on the terminal, no brand type information exists on the terminal, no CPU information exists on the terminal, no Mac address information exists on the terminal, no battery quantity change information exists on the terminal, no baseband information exists on the terminal, control group information cannot be read on the terminal, process group information cannot be read on the terminal, no wlan driving information exists on the terminal, wlan driving information on the terminal is abnormal, the number of sensors on the terminal is smaller than a sensor number threshold value, and the number of pre-installed applications on the terminal is smaller than an application number threshold value.
In an embodiment of the present disclosure, before the step of receiving a set of user information to be identified collected by a user terminal, the method further includes: configuring an acquisition instruction; the acquisition command is configured with an acquisition triggering condition; and sending an acquisition instruction to the user terminal so that the user terminal acquires user service data, user terminal data and user behavior time data according to the acquisition instruction when the user terminal triggers an acquisition triggering condition, and further generating a user information set to be identified.
In one embodiment of the present disclosure, the acquisition instruction further configures a target service data type to be acquired, a target terminal data type to be acquired, and a user behavior time acquisition policy; the user service data is acquired by the user terminal according to the type of the target service data; the user terminal data is acquired by the user terminal according to the data type of the target terminal; the user behavior time data is obtained by the user terminal according to the user behavior time obtaining strategy.
In one embodiment of the present disclosure, an offset time period, a hash algorithm, and hash calculation times are configured in a user behavior time obtaining policy; and, the user behavior time data includes: the method comprises the steps of determining a target behavior occurrence time point based on an offset time period, and calculating the time period spent on iterative calculation of specified data by using a Hash algorithm according to Hash calculation times; wherein the user behavior is determined as follows: determining a first moment for triggering acquisition triggering conditions, taking the moment determined according to the offset time period before the first moment as a second moment, and determining the latest user behavior before the second moment as a target behavior; the target behaviors comprise at least one of mouse clicking behaviors, keyboard operating behaviors, gesture behaviors and gyroscope behaviors; the specifying data includes: at least one of user traffic data, user terminal data, and behavior log data of the target behavior.
In an embodiment of the present disclosure, the step of performing data authenticity identification according to the user behavior time data and the receiving time point to obtain a data identification result value includes: calculating to obtain a behavior prediction occurrence time point according to the receiving time point, the calculation time period and the offset time period; determining a difference value between the behavior prediction occurrence time point and the behavior occurrence time point, and taking the difference value as a behavior time difference; determining the real probability of the user behavior time data according to the relationship between the behavior time difference and the time difference threshold value, and taking the real probability as a data authenticity identification result; and determining a data identification result value according to the data authenticity identification result.
According to another aspect of the present disclosure, there is provided an apparatus for intent recognition, including: the receiving module is used for receiving a user information set to be identified, which is sent by a user terminal; the analysis module is used for analyzing the user information set to be identified, acquiring user service data, user terminal data and user behavior time data which are acquired by a user terminal, and acquiring a receiving time point for receiving the user information to be identified; the identification module is used for identifying the intention aiming at the target intention according to the user service data, the user terminal data, the user behavior time data and the receiving time point to obtain an identification result value of the target intention; and the determining module is used for determining the degree of the target intention represented by the user information set to be identified according to the identification result value.
According to yet another aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the above-mentioned method for intent recognition.
According to still another aspect of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the above-described method for intent recognition via execution of the executable instructions.
The method for identifying the intention can identify the degree of representing the target intention of the user information set to be identified from multiple dimensions of user service data, user terminal data and user behavior time data according to the user information set to be identified, which is acquired from the user terminal, so that a better target intention identification effect is achieved.
Further, the method for intention identification provided by the embodiment of the disclosure can also configure a hash algorithm and hash calculation times in the acquisition instruction when acquiring the information set information of the user to be identified, so that the terminal used by a normal user is not affected and the card-holding terminal with the card-holding intention is continuously consumed, thereby achieving the effect of making the card-holding behavior generate cost.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
FIG. 1 shows a schematic diagram of an exemplary system architecture to which the methods for intent recognition of embodiments of the present disclosure may be applied;
FIG. 2 illustrates a flow chart of a method for intent recognition of one embodiment of the present disclosure;
FIG. 3 illustrates a flow chart for obtaining a recognition result value in a method for intent recognition according to an embodiment of the present disclosure;
FIG. 4 shows a schematic diagram of iterative calculations in a method for intent recognition according to one embodiment of the present disclosure;
FIG. 5 is a diagram illustrating determination of recognition result values in a method for intent recognition according to an embodiment of the present disclosure;
FIG. 6 illustrates a flow chart of a method for intent recognition of one embodiment of the present disclosure;
FIG. 7 illustrates a block diagram of an apparatus for intent recognition of one embodiment of the present disclosure; and
FIG. 8 shows a block diagram of a computer device for intent recognition in an embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present disclosure, "a plurality" means at least two, e.g., two, three, etc., unless explicitly specifically limited otherwise.
In view of the above technical problems in the related art, embodiments of the present disclosure provide a method for intent recognition to solve at least one or all of the above technical problems.
FIG. 1 shows a schematic diagram of an exemplary system architecture to which the methods for intent recognition of embodiments of the present disclosure may be applied; as shown in fig. 1:
the system architecture may include a server 101, a network 102, and a client 103. Network 102 serves as a medium for providing communication links between clients 103 and server 101. Network 102 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The server 101 may be a server that provides various services, such as a background management server that provides support for performing recognition processing on data acquired from the client 203. The background management server may send a collection instruction to the client 103, receive and analyze the user information set to be identified returned by the client 103, and identify data obtained by the analysis.
In some optional embodiments, the server 101 may receive a set of to-be-identified user information sent by a user terminal; the server 101 may analyze the user information set to be identified, obtain user service data, user terminal data and user behavior time data collected by the user terminal, and obtain a receiving time point for receiving the user information to be identified; the server 101 may perform intention recognition for the target intention according to the user service data, the user terminal data, the user behavior time data, and the reception time point, and obtain a recognition result value for the target intention; the server 101 may determine the degree to which the set of user information to be identified characterizes the intent of the object from the identification result value.
The client 103 may be a mobile terminal such as a mobile phone, a game console, a tablet computer, an electronic book reader, smart glasses, a smart home device, an AR (Augmented Reality) device, a VR (Virtual Reality) device, or the client 103 may also be a personal computer such as a laptop computer, a desktop computer, and the like.
The client 103 can receive the acquisition instruction sent by the server 101, acquire data on the terminal based on the acquisition instruction, and perform hash calculation on the terminal based on the acquisition instruction, so that when a terminal is used as a card maintenance terminal by a large number of telephone cards, the terminal is subjected to calculation power consumption, and card maintenance cost is generated.
It should be understood that the number of clients, networks and servers in fig. 1 is only illustrative, and the server 101 may be a physical server, a server cluster composed of a plurality of servers, a cloud server, and any number of clients, networks and servers according to actual needs.
Hereinafter, each step of the method for intention identification in the exemplary embodiment of the present disclosure will be described in more detail with reference to the accompanying drawings and embodiments.
FIG. 2 illustrates a flow diagram of a method for intent recognition, according to one embodiment of the present disclosure. The method provided by the embodiment of the present disclosure may be executed by a server or a client as shown in fig. 1, but the present disclosure is not limited thereto.
In the following description, the server cluster 101 is used as an execution subject for illustration.
As shown in fig. 2, a method for intention identification provided by an embodiment of the present disclosure may include the following steps:
step S201, receiving a user information set to be identified sent by a user terminal;
step S203, analyzing the user information set to be identified, obtaining user service data, user terminal data and user behavior time data collected by a user terminal, and obtaining a receiving time point for receiving the user information to be identified;
step S205, according to the user service data, the user terminal data, the user behavior time data and the receiving time point, performing intention identification aiming at the target intention to obtain an identification result value of the target intention;
and step S207, determining the degree of representing the target intention by the user information set to be identified according to the identification result value.
According to the method for identifying the intention, the user information set to be identified can be obtained from the user terminal, the user information set to be identified is analyzed to obtain the user service data, the user terminal data and the user behavior time data, and then the degree of the target intention represented by the user information set to be identified can be identified by utilizing multiple dimensions of the user service data, the user terminal data and the user behavior time data, so that a better target intention identification effect is achieved.
Next, steps S201 to S207 of the method for intention identification in the present exemplary embodiment will be described in more detail with reference to fig. 2 and the embodiment.
Step S201, receiving a user information set to be identified sent by a user terminal.
The data used for generating the user information set to be identified can be collected by the user terminal on the local computer, so that the user information set to be identified is generated according to the collected data, and then the user terminal sends the user information set to be identified to the server.
In some embodiments, before step S201, the following steps may be further included: configuring an acquisition instruction, wherein an acquisition trigger condition can be configured in the acquisition instruction in advance; and sending an acquisition instruction to the user terminal so that the user terminal acquires user service data, user terminal data and user behavior time data according to the acquisition instruction when the user terminal triggers an acquisition triggering condition, and further generating a user information set to be identified.
Specifically, the acquisition trigger condition may be a specific trigger action, such as a "dialing action", or a specific time, such as "3 pm of each day", so that when the terminal detects that the acquisition trigger condition is satisfied, the terminal executes the acquisition instruction.
In some embodiments, the acquisition instruction further configures a target service data type to be acquired, a target terminal data type to be acquired, and a user behavior time acquisition strategy; the user service data is acquired by the user terminal according to the type of the target service data; the user terminal data is acquired by the user terminal according to the data type of the target terminal; the user behavior time data is obtained by the user terminal according to the user behavior time obtaining strategy.
Specifically, the user service data may be, for example, service information such as a user card number registration place, a minimum consumption service type, and a package service type, and the user terminal data may be, for example, power change information, application quantity information, and terminal category information on the terminal. The user service data and the user terminal data can be searched and obtained from the local storage space of the terminal.
Step S203, analyzing the user information set to be identified, obtaining user service data, user terminal data and user behavior time data collected by the user terminal, and obtaining a receiving time point for receiving the user information to be identified. After receiving the user information set to be identified sent by the terminal, the server can directly analyze and obtain the data acquired by the terminal, and can record the receiving time point of receiving the user information to be identified for the subsequent identification step.
Step S205, according to the user service data, the user terminal data, the user behavior time data and the receiving time point, the intention identification aiming at the target intention is carried out, and the identification result value of the target intention is obtained. In the embodiment of the disclosure, the target intention can be a card-keeping intention.
Fig. 3 shows a flowchart of obtaining a recognition result value in the method for intention recognition according to an embodiment of the disclosure, and as shown in fig. 3, step S205 in the embodiment of fig. 2 may further include the following steps S301 to S309 in some embodiments:
step S301, according to the user service data, performing service characteristic identification aiming at the target intention to obtain a service identification result value. In this embodiment, the identification may be performed from the service feature dimension.
In some embodiments, the user traffic data comprises at least one of: the method comprises the following steps of registering a user card number, a lowest consumption service type, a package service type, a monthly rental service type, an average income value of each user, calling time, called time, a network-accessing monthly consumption value and a user attribution channel type; step S301 may include: acquiring a card maintenance identification model, and inputting user service data into the card maintenance identification model; obtaining the card-raising intention probability output by the card-raising identification model; taking the card-raising intention probability as a business identification result value; the card-raising recognition model is obtained by training according to historical business data of card-raising users and historical business data of non-card-raising users.
The user service data can represent the service use state or condition of the telephone card user, and each information in the user service data can be used for judging whether the user normally uses the telephone card; in some practical applications, user service data of a large number of users can be obtained as training samples, a neural network model is trained according to the training samples, and then the trained neural network model is used for service feature recognition.
Step S303, carrying out terminal environment identification aiming at the target intention according to the user terminal data, and obtaining a terminal identification result value. In this embodiment, the identification may be performed from the terminal environment dimension.
In some embodiments, step S303 may include: determining the number of user terminal data meeting the maintenance environment condition; determining a terminal identification result value according to the number; wherein, the environment condition of the nutrient solution comprises: the method comprises the steps that no international mobile equipment identification code exists on a terminal, no local number exists on the terminal, no user identification card number exists on the terminal, no brand type information exists on the terminal, no CPU information exists on the terminal, no Mac address information exists on the terminal, no battery quantity change information exists on the terminal, no baseband information exists on the terminal, control group information cannot be read on the terminal, process group information cannot be read on the terminal, no wlan driving information exists on the terminal, wlan driving information on the terminal is abnormal, the number of sensors on the terminal is smaller than a sensor number threshold value, and the number of pre-installed applications on the terminal is smaller than an application number threshold value.
The user terminal data can be used for representing the environment of the terminal, and as the terminal of a normal user does not meet the environment condition of the card when using the phone card, for example, the terminal used by the normal user usually has international mobile equipment identification codes and electric quantity change. Therefore, the terminal identification result value can be determined by determining whether the user terminal data satisfies the maintenance environment condition and the number of the maintenance environment conditions satisfied in the case of the satisfaction.
For example, the terminal identification result value may be set to 0 and 1, where 0 may indicate that there is no card-holding intention, and 1 may indicate that there is a card-holding intention; if the number of the maintenance environment conditions is 0, the corresponding terminal identification result value is 0, and if the number of the maintenance environment conditions is 1 or more, the corresponding terminal identification result value is 1. For example, the terminal identification result values may be set to 0, 0.2, 0.4, 0.6, 0.8, and 1, the corresponding terminal identification result value may be set to 0 if the number satisfying the maintenance environment condition is 0, the corresponding terminal identification result value may be set to 0.2 if the number satisfying the maintenance environment condition is 1 or more and 2 or less, and the corresponding terminal identification result value may be set to 0.4 if the number satisfying the maintenance environment condition is 3 or more and 4 or less.
And step S305, performing data authenticity identification according to the user behavior time data and the receiving time point to obtain a data identification result value.
In some embodiments, for the aforementioned acquisition instruction, an offset time period, a hash algorithm, and a hash calculation number may also be configured in the user behavior time acquisition policy of the acquisition instruction, so that the terminal may obtain the user behavior time data according to the user behavior time acquisition policy configured with the offset time period, the hash algorithm, and the hash calculation number. The user behavior time data may include: the method comprises the steps of determining a target behavior according to the target behavior, determining an offset time period, determining a behavior occurrence time point of the target behavior based on the offset time period, and calculating a calculation time period which is taken for performing iterative calculation on the designated data according to the hash calculation times by using a hash algorithm.
The user behavior can be determined as follows: the method comprises the steps of determining a first moment for triggering acquisition triggering conditions, taking a moment determined according to an offset time period before the first moment as a second moment, and further determining the latest user behavior before the second moment as a target behavior. Further, the target behavior may include at least one of a behavior of clicking a mouse, a behavior of operating a keyboard, a gesture behavior, and a gyroscope behavior; the specifying data may include: at least one of user traffic data, user terminal data, and behavior log data of the target behavior.
For example, if the first time may be 8: 00, and with the offset period set to two hours, 8: if the time of two hours before 00 is 6:00, the second time can be determined to be 6:00, then query is carried out in the local storage space of the terminal to find out the target behavior recorded last time before 6:00, and further the occurrence time of the target behavior is 5:00, then the occurrence time point of the behavior can be determined to be 5: 00. The log data of the target behavior may also be used as the specified data, the hash algorithm is used to perform iterative computation on the specified data according to the hash computation times, and then the time taken by the iterative computation is recorded, for example, 2 seconds, and further 2 seconds may be used as the computation time period. Thus, "the offset period is two hours", "the action occurrence time point is 5: 00", "the calculation period is 2 seconds" can be taken as the user action time data.
In some practical applications, the hash algorithm and the hash calculation times can be adjusted and set according to practical situations; the hash algorithm may be regarded as an algorithm capable of consuming the terminal computing power, for example, the hash algorithm may be an SHA256 algorithm, an SHA512 algorithm, or the like, and the hash calculation number may be, for example, 5 times, 1000 times, 5000 times, or the like. The determination method of the calculation time period may be: and recording the time of one-time Hash calculation, and obtaining a calculation time period according to the product of the time of one-time Hash calculation and the Hash calculation times.
Fig. 4 is a schematic diagram illustrating iterative computation in a method for intent recognition according to an embodiment of the present disclosure, and as shown in fig. 4, a schematic diagram illustrating 5 hash iterative computations includes:
the specified data may be obtained first;
the first calculation is as follows: acquiring current acquisition time, processing the specified data and the current acquisition time by using an SHA256 Hash algorithm to obtain a Hash value 1 of a Hash calculation for the first time, and recording the time spent in the calculation, namely a time slice t;
and (3) calculating for the second time: acquiring current acquisition time, processing the specified data, the current acquisition time and Hash1 by using an SHA256 Hash algorithm to obtain a Hash value Hash2 of the second Hash calculation, and recording the time spent in the calculation, namely a time slice t;
the third calculation: acquiring current acquisition time, processing the designated data, the current acquisition time and Hash2 through an SHA256 Hash algorithm to obtain a Hash value Hash3 of the third Hash calculation, and recording the time spent in the calculation, namely time slice t;
the fourth calculation: acquiring current acquisition time, processing the designated data, the current acquisition time and Hash3 through an SHA256 Hash algorithm to obtain a Hash value Hash4 of the fourth Hash calculation, and recording the time spent in the calculation, namely time slice t;
the fifth calculation: acquiring current acquisition time, processing the designated data, the current acquisition time and Hash4 through an SHA256 Hash algorithm to obtain a Hash value Hash5 of a fifth Hash calculation, and recording the time spent in the calculation, namely a time slice t;
at this point, the iterative computation is complete.
It can be seen that by implementing the method shown in fig. 4, the previous hash calculation result is used as an input parameter of the next SHA-256 algorithm to participate in the calculation, and the calculation result can be generated only by performing certain hash calculation after the behavior occurs, so that the method increases the counterfeiting cost.
Because a great number of telephone cards are usually applied to one card maintenance terminal in the card maintenance behavior, the calculation power of the card maintenance terminal can be consumed when each telephone card enables the card maintenance terminal to perform a great number of hash calculations. Therefore, when the information of the user information set to be identified is collected, the terminal used by a normal user is not affected and the card-holding terminal with the card-holding intention is continuously consumed by calculation through configuring a Hash algorithm and Hash calculation times in the collection instruction, so that the effect of generating cost in card-holding behavior is achieved.
In step S305, in an embodiment, it may be identified whether the acquired data is a forged dimension. The steps in this embodiment may be used to determine whether the data used for identification in steps S301 and S303 is terminal-forged, so as to avoid that the terminal uses forged data to cause an inaccurate identification result.
In some embodiments, step S305 may include: calculating to obtain a behavior prediction occurrence time point according to the receiving time point, the calculation time period and the offset time period; determining a difference value between the behavior prediction occurrence time point and the behavior occurrence time point, and taking the difference value as a behavior time difference; determining the real probability of the user behavior time data according to the relationship between the behavior time difference and the time difference threshold value, and taking the real probability as a data authenticity identification result; and determining a data identification result value according to the data authenticity identification result. The time difference threshold may be adjusted and set according to actual conditions, for example, the minimum threshold may be set to 0, and the maximum threshold may be set to 2 hours.
Specifically, for example, if it is determined that the deviation time period T1 is two hours, the behavior occurrence time point T1 is 5:00, the calculation time period T2 is 1 minute, and the receiving time point T2 is 8:05, the behavior predicted occurrence time point T3 may be obtained by calculation according to the receiving time point, the calculation time period, and the deviation time period, for example, a formula (T3 ═ T2-T2-T1) may be used, and the behavior predicted occurrence time point T3 is 6: 04; determining the difference value between the behavior prediction occurrence time point and the behavior occurrence time point, namely the value of (t3-t1), obtaining that the behavior time difference is 1 hour and 4 minutes, further acquiring a time difference threshold value, and determining the real probability of the user behavior time data according to the relationship between the behavior time difference and the time difference threshold value; specifically, a probability mapping table corresponding to the time difference threshold may be obtained, where the probability mapping table may include a correspondence between the behavior time difference and the real probability, so that the real probability corresponding to the behavior time difference may be found.
Step S307, obtaining the weight values corresponding to the service identification value, the terminal identification value, and the data identification value, respectively. The weight values corresponding to the service identification value, the terminal identification value and the data identification value can be preset, and the weight values can be adjusted and set according to actual conditions.
It should be noted that, in the present disclosure, the specific implementation sequence of steps S301 to S307 is not limited, and steps S301 to S307 only need to be completed before step S309; specifically, the steps in steps S301 to S307 may be executed simultaneously or sequentially, and may be adjusted according to actual situations.
Step S309, determining an identification result value according to the service identification value, the terminal identification value, the data identification value and each corresponding weight value.
Fig. 5 is a schematic diagram illustrating the determination of the recognition result value in the method for intention recognition according to an embodiment of the disclosure, and as shown in fig. 5, the processes of steps S301 to S309 may be:
firstly, a corresponding quantization value (namely, a service identification value) P1 is obtained through card-raising feature identification Y1 (namely, service feature identification), a corresponding quantization value (namely, a terminal identification value) P2 is obtained through simulator Y2 (namely, terminal environment identification), a corresponding quantization value (data identification value) P3 is obtained through anti-counterfeiting identification Y3 (namely, data authenticity identification), then weights W1, W2 and W3 corresponding to all the quantization values are respectively obtained, and then weighting calculation is carried out (P1W 1+ P2W 2+ P3W 3) to obtain an identification result value. The higher the identification result value is, the larger the card-raising intention represented by the user information set to be identified can be considered.
And step S207, determining the degree of representing the target intention by the user information set to be identified according to the identification result value.
The preset grade mapping table can be obtained, and whether the user information set to be identified represents the target intention and the degree of representing the target intention are judged according to the corresponding relation between the identification result value and the grade of the card-keeping intention in the grade mapping table.
Fig. 6 shows a flowchart of a method for intent recognition of one embodiment of the present disclosure, as shown in fig. 6, including:
step (1), a user side triggers user behavior data and terminal environment data acquisition; recording the time of each behavior point and each environmental parameter; time offsets for each behavior data are calculated.
The user behavior can comprise any one of a behavior of clicking a mouse, a behavior of operating a keyboard, a gesture behavior and a gyroscope behavior and a combination of the behaviors; the environment data refers to software and hardware information of the user terminal, and may include an IMEI number (international mobile equipment identity), a local number, a serial number of a SIM card (subscriber identity card number), a brand of a mobile phone, a manufacturer, a model, CPU information, a Mac address, battery information, baseband information, a number of sensors, a number of app pre-installed by a user, and the like.
And (2) performing n SHA-256 hash calculations (for example, 5) by the user terminal, wherein the hash calculation time of each SHA-256 hash is a time slice t.
And (3) forming a result set by the results obtained in the step (3), the step (1) and the step (2), and sending the result set to a server.
And (4) the server receives the result set and performs: 1. identifying the card raising characteristics: modeling by adopting clustered big data; 2. the simulator identifies: judging by adopting an environmental parameter rule; 3. anti-counterfeiting identification: and calculating the difference between the user behavior calculating time and the user behavior collecting time, and judging whether the difference exceeds a preset time difference threshold value.
For the card-raising feature identification (namely business feature identification), big data modeling can be adopted, and data mining can be carried out according to features; specifically, a big data clustering algorithm (according to characteristics of location, low consumption, package type, monthly rental, monthly ARPU value, calling duration, online monthly consumption, developed channel, activated IMEI, and the like) can be adopted to judge whether to support the card.
For simulator identification (namely terminal environment identification), whether the simulator is identified or not can be judged according to the acquired software and hardware parameters of the user terminal; specifically, the user behavior is determined to be running on the simulator if one of the following conditions is met: (1) acquiring an IMEI number of the mobile phone, a local number and a serial number of an SIM card, if the serial number is null; (2) reading the brand information of the mobile phone, including the brand, the manufacturer and the model, if the brand information is null; (3) checking CPU information, such as null; (4) checking the Mac address, if empty; (5) checking whether the battery information is changed, if not; (6) checking whether the baseband information is null, if so; (7) judging whether the control group information can be read or not, if not, judging whether the control group information can be read or not; (8) judging whether process group information can be read or not, if not, judging whether process group information can be read or not; (9) judging whether the wlan driving is unknown or abnormal, if yes; (10) judging whether the number of the sensors is 1, if so; (12) it is determined whether the user-preloaded app is less than 5, if so.
For anti-counterfeiting identification (namely data authenticity identification), a user can be prevented from forging action data such as a mouse, a keyboard, a gesture, a gyroscope and the like, equipment data such as IP, UA, equipment fingerprints and the like, a machine is prevented from sending a sticker, brushing a bill and sending an advertisement sticker, and the machine is prevented from being killed in seconds; specifically, a behavior prediction occurrence time point may be calculated by the acquired receiving time point, the calculation time period, and the offset time period, and then the behavior prediction occurrence time point and the behavior occurrence time point are compared, so that on one hand, the behavior prediction occurrence time point should be later than the behavior occurrence time point, and on the other hand, the time period in which the behavior occurrence time point is earlier than the behavior prediction occurrence time point may not exceed the preset time difference threshold, and thus, the recognition result may be determined according to the comparison result.
And (5) calculating a model according to the weight scores to obtain a score (namely a recognition result value).
The scoring formula may be (P1 × W1+ P2 × W2+ P3 × W3), and the same contents in this step as those in the embodiment shown in fig. 5 may refer to the text description of the embodiment shown in fig. 5, and the disclosure is not repeated herein.
It is to be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the method according to an exemplary embodiment of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Fig. 7 shows a block diagram of an apparatus 700 for intent recognition in a fifth embodiment of the present disclosure; as shown in fig. 7, includes:
a receiving module 701, configured to receive a user information set to be identified, where the user information set is sent by a user terminal;
the analysis module 702 is configured to analyze a user information set to be identified, obtain user service data, user terminal data, and user behavior time data collected by a user terminal, and obtain a receiving time point for receiving the user information to be identified;
the identification module 703 is configured to perform intention identification for the target intention according to the user service data, the user terminal data, the user behavior time data, and the receiving time point, and obtain an identification result value for the target intention;
and a determining module 704, configured to determine, according to the recognition result value, a degree to which the user information set to be recognized represents the target intention.
Other aspects of the embodiment of fig. 7 may be found in relation to other embodiments described above.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
FIG. 8 shows a block diagram of a computer device for intent recognition in an embodiment of the present disclosure. It should be noted that the illustrated electronic device is only an example, and should not bring any limitation to the functions and the scope of the embodiments of the present invention.
Anelectronic device 800 according to this embodiment of the invention is described below with reference to fig. 8. Theelectronic device 800 shown in fig. 8 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present invention.
As shown in fig. 8,electronic device 800 is in the form of a general purpose computing device. The components of theelectronic device 800 may include, but are not limited to: the at least oneprocessing unit 810, the at least onememory unit 820, and abus 830 that couples the various system components including thememory unit 820 and theprocessing unit 810.
Wherein the storage unit stores program code that is executable by theprocessing unit 810 to cause theprocessing unit 810 to perform steps according to various exemplary embodiments of the present invention as described in the above section "exemplary methods" of the present specification. For example, theprocessing unit 810 may perform a method as shown in fig. 2.
Thestorage unit 820 may include readable media in the form of volatile memory units such as a random access memory unit (RAM)8201 and/or acache memory unit 8202, and may further include a read only memory unit (ROM) 8203.
Thestorage unit 820 may also include a program/utility 8204 having a set (at least one) ofprogram modules 8205,such program modules 8205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 830 may be any of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
Theelectronic device 800 may also communicate with one or more external devices 900 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with theelectronic device 800, and/or with any devices (e.g., router, modem, etc.) that enable theelectronic device 800 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 850. Also, theelectronic device 800 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via thenetwork adapter 860. As shown, thenetwork adapter 860 communicates with the other modules of theelectronic device 800 via thebus 830. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with theelectronic device 800, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above section "exemplary methods" of the present description, when said program product is run on the terminal device.
According to the program product for implementing the method, the portable compact disc read only memory (CD-ROM) can be adopted, the program code is included, and the program product can be operated on terminal equipment, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (11)

Translated fromChinese
1.一种用于意图识别的方法,其特征在于,包括:1. a method for intention recognition, is characterized in that, comprises:接收用户终端发送的待识别用户信息集;Receive the user information set to be identified sent by the user terminal;解析所述待识别用户信息集,获得所述用户终端采集的用户业务数据、用户终端数据和用户行为时间数据,以及获得接收所述待识别用户信息的接收时间点;Parsing the user information set to be identified, obtaining user service data, user terminal data and user behavior time data collected by the user terminal, and obtaining the receiving time point for receiving the user information to be identified;根据所述用户业务数据、所述用户终端数据、所述用户行为时间数据和所述接收时间点进行针对目标意图的意图识别,获得对所述目标意图的识别结果值;According to the user service data, the user terminal data, the user behavior time data and the receiving time point, the intent recognition for the target intent is performed, and the recognition result value of the target intent is obtained;根据所述识别结果值确定所述待识别用户信息集表征所述目标意图的程度。The degree to which the user information set to be recognized represents the target intention is determined according to the recognition result value.2.根据权利要求1所述的方法,其特征在于,所述目标意图为养卡意图;所述根据所述用户业务数据、所述用户终端数据、所述用户行为时间数据和所述接收时间点进行针对目标意图的意图识别,获得对所述目标意图的识别结果值的步骤,包括:2 . The method according to claim 1 , wherein the target intention is an intention to maintain a card; the user service data, the user terminal data, the user behavior time data and the receiving time are based on the target intention. 3 . The steps of performing the intent recognition for the target intent and obtaining the recognition result value of the target intent include:根据所述用户业务数据进行针对所述目标意图的业务特征识别,获得业务识别结果值;Carry out service feature identification for the target intent according to the user service data, and obtain a service identification result value;根据所述用户终端数据进行针对所述目标意图的终端环境识别,获得终端识别结果值;Perform terminal environment identification for the target intent according to the user terminal data, and obtain a terminal identification result value;根据所述用户行为时间数据和所述接收时间点进行数据真伪识别,获得数据识别结果值;Perform data authenticity identification according to the user behavior time data and the receiving time point, and obtain a data identification result value;分别获取所述业务识别值、所述终端识别值和所述数据识别值对应的各权重值;Obtaining respective weight values corresponding to the service identification value, the terminal identification value and the data identification value;根据所述业务识别值、所述终端识别值、所述数据识别值以及对应的各权重值确定所述识别结果值。The identification result value is determined according to the service identification value, the terminal identification value, the data identification value and each corresponding weight value.3.根据权利要求2所述的方法,其特征在于,所述用户业务数据包括以下至少之一:用户卡号注册地、最低消费业务类型、套餐业务类型、月租业务类型、每用户平均收入值、主叫时长、被叫时长、入网当月消费值、入网次月消费值、用户归属渠道类型;3. The method according to claim 2, wherein the user service data comprises at least one of the following: user card number registration place, minimum consumption service type, package service type, monthly rental service type, average income value per user , calling duration, called duration, consumption value of the current month of access to the network, consumption value of the next month of access to the network, and type of user's attribution channel;所述根据所述用户业务数据进行针对所述目标意图的业务特征识别,获得业务识别结果值的步骤包括:The step of performing service feature identification for the target intent according to the user service data, and obtaining a service identification result value includes:获取养卡识别模型,将所述用户业务数据输入所述养卡识别模型;Obtain a maintenance card identification model, and input the user business data into the maintenance card identification model;获得所述养卡识别模型输出的养卡意图概率;obtaining the intention probability of raising a card output by the card-raising identification model;将所述养卡意图概率作为所述业务识别结果值;其中,所述养卡识别模型是根据养卡用户的历史业务数据和非养卡用户的历史业务数据训练获得的。The card-keeping intention probability is used as the service identification result value; wherein, the card-raising identification model is obtained by training based on the historical business data of card-raising users and the historical service data of non-card-raising users.4.根据权利要求2所述的方法,其特征在于,所述根据所述用户终端数据进行针对所述目标意图的终端环境识别,获得终端识别结果值的步骤,包括:4. The method according to claim 2, wherein the step of performing terminal environment identification for the target intention according to the user terminal data, and obtaining a terminal identification result value, comprises:确定所述用户终端数据满足养卡环境条件的个数;Determine the number of the user terminal data that satisfies the environmental conditions for raising the card;根据所述个数确定所述终端识别结果值;Determine the terminal identification result value according to the number;其中,所述养卡环境条件包括:终端上无国际移动设备识别码、终端上无本机号码、终端上无用户识别卡号码、终端上无品牌类型信息、终端上无CPU信息、终端上无Mac地址信息、终端上无电池量变化信息、终端上无基带信息、终端上无法读取控制组信息、终端上无法读取进程组信息、终端上无wlan驱动信息、终端上wlan驱动信息异常、终端上传感器数量小于传感器数量阈值,以及终端上预装应用数量小于应用数量阈值。Wherein, the environmental conditions for maintaining the card include: no international mobile equipment identification code on the terminal, no local number on the terminal, no user identification card number on the terminal, no brand type information on the terminal, no CPU information on the terminal, and no information on the terminal. Mac address information, no battery change information on the terminal, no baseband information on the terminal, control group information cannot be read on the terminal, process group information cannot be read on the terminal, no wlan driver information on the terminal, abnormal wlan driver information on the terminal, The number of sensors on the terminal is less than the threshold of the number of sensors, and the number of pre-installed applications on the terminal is less than the threshold of the number of applications.5.根据权利要求2所述的方法,其特征在于,在所述接收通过用户终端采集的待识别用户信息集的步骤之前,所述方法还包括:5. The method according to claim 2, wherein before the step of receiving the user information set to be identified collected by the user terminal, the method further comprises:配置采集指令;所述采集指令中配置了采集触发条件;configure a collection instruction; the collection instruction is configured with a collection trigger condition;向所述用户终端发送所述采集指令,以使所述用户终端在触发所述采集触发条件时,根据所述采集指令采集所述用户业务数据、所述用户终端数据和所述用户行为时间数据,进而生成所述待识别用户信息集。Send the collection instruction to the user terminal, so that when the user terminal triggers the collection trigger condition, collect the user service data, the user terminal data and the user behavior time data according to the collection instruction , and then generate the to-be-identified user information set.6.根据权利要求5所述的方法,其特征在于,所述采集指令还配置了待采集的目标业务数据类型、待采集的目标终端数据类型、用户行为时间获取策略;以及,6. The method according to claim 5, wherein the collection instruction is further configured with a target service data type to be collected, a target terminal data type to be collected, and a user behavior time acquisition strategy; and,所述用户业务数据是通过所述用户终端根据所述目标业务数据类型采集获得的;所述用户终端数据是通过所述用户终端根据所述目标终端数据类型采集获得的;所述用户行为时间数据是通过所述用户终端根据所述用户行为时间获取策略获得的。The user service data is collected and obtained by the user terminal according to the target service data type; the user terminal data is collected and obtained by the user terminal according to the target terminal data type; the user behavior time data is obtained by the user terminal according to the user behavior time acquisition policy.7.根据权利要求6所述的方法,其特征在于,所述用户行为时间获取策略中配置了偏移时间段、哈希算法和哈希计算次数;以及,7. The method according to claim 6, wherein an offset time period, a hash algorithm and a number of hash calculations are configured in the user behavior time acquisition strategy; and,所述用户行为时间数据包括:所述偏移时间段、基于所述偏移时间段确定的目标行为所发生的行为发生时间点、使用所述哈希算法按照所述哈希计算次数对指定数据进行迭代计算所花费的计算时间段;The user behavior time data includes: the offset time period, the behavior occurrence time point when the target behavior determined based on the offset time period occurs, and the hash algorithm is used for the specified data according to the hash calculation times. The calculation time period it takes to perform the iterative calculation;其中,所述用户行为是按如下方式确定的:确定触发所述采集触发条件的第一时刻,将根据所述第一时刻之前所述偏移时间段确定的时刻作为第二时刻,将所述第二时刻之前的最近一次用户行为确定为所述目标行为;所述目标行为包括点击鼠标的行为、操作键盘的行为、手势行为和陀螺仪行为中的至少一种;所述指定数据包括:所述用户业务数据、所述用户终端数据和所述目标行为的行为日志数据中的至少一种。The user behavior is determined as follows: determining the first moment when the acquisition trigger condition is triggered, taking the moment determined according to the offset time period before the first moment as the second moment, and using the The most recent user behavior before the second moment is determined as the target behavior; the target behavior includes at least one of the behavior of clicking the mouse, the behavior of operating the keyboard, the gesture behavior and the gyroscope behavior; the specified data includes: all at least one of the user service data, the user terminal data, and the behavior log data of the target behavior.8.根据权利要求7所述的方法,其特征在于,所述根据所述用户行为时间数据和所述接收时间点进行数据真伪识别,获得数据识别结果值的步骤,包括:8. The method according to claim 7, wherein the step of performing data authenticity identification according to the user behavior time data and the receiving time point, and obtaining a data identification result value, comprises:根据所述接收时间点、所述计算时间段、所述偏移时间段计算得到行为预测发生时间点;The behavior prediction occurrence time point is obtained by calculating according to the reception time point, the calculation time period, and the offset time period;确定所述行为预测发生时间点与所述行为发生时间点的差值,以所述差值作为行为时间差;determining the difference between the behavior prediction time point and the behavior occurrence time point, and using the difference as the behavior time difference;根据所述行为时间差与时间差阈值的关系,确定所述用户行为时间数据的真实概率,以作为数据真伪识别结果;According to the relationship between the behavior time difference and the time difference threshold, determine the true probability of the user behavior time data as a result of data authenticity identification;根据所述数据真伪识别结果确定所述数据识别结果值。The data identification result value is determined according to the data authenticity identification result.9.一种用于意图识别的装置,其特征在于,包括:9. A device for intention recognition, comprising:接收模块,用于接收用户终端发送的待识别用户信息集;a receiving module, configured to receive the user information set to be identified sent by the user terminal;解析模块,用于解析所述待识别用户信息集,获得所述用户终端采集的用户业务数据、用户终端数据和用户行为时间数据,以及获得接收所述待识别用户信息的接收时间点;a parsing module, configured to parse the to-be-identified user information set, obtain user service data, user terminal data and user behavior time data collected by the user terminal, and obtain a reception time point for receiving the to-be-identified user information;识别模块,用于根据所述用户业务数据、所述用户终端数据、所述用户行为时间数据和所述接收时间点进行针对目标意图的意图识别,获得对所述目标意图的识别结果值;an identification module, configured to perform intention identification for the target intention according to the user service data, the user terminal data, the user behavior time data and the receiving time point, and obtain a recognition result value of the target intention;确定模块,用于根据所述识别结果值确定所述待识别用户信息集表征所述目标意图的程度。A determination module, configured to determine, according to the recognition result value, the degree to which the user information set to be recognized represents the target intention.10.一种计算机可读存储介质,其上存储有计算机程序,所述程序被处理器执行时实现如权利要求1至8任一项所述的用于意图识别的方法。10. A computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method for intent recognition according to any one of claims 1 to 8.11.一种电子设备,其特征在于,包括:11. An electronic device, characterized in that, comprising:一个或多个处理器;one or more processors;存储装置,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如权利要求1至8任一项所述的用于意图识别的方法。A storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement any one of claims 1 to 8 The method described in item for intent recognition.
CN202111554891.1A2021-12-172021-12-17 Method and device for intention recognition, storage medium and electronic deviceActiveCN114282940B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202111554891.1ACN114282940B (en)2021-12-172021-12-17 Method and device for intention recognition, storage medium and electronic device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202111554891.1ACN114282940B (en)2021-12-172021-12-17 Method and device for intention recognition, storage medium and electronic device

Publications (2)

Publication NumberPublication Date
CN114282940Atrue CN114282940A (en)2022-04-05
CN114282940B CN114282940B (en)2025-02-21

Family

ID=80872959

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202111554891.1AActiveCN114282940B (en)2021-12-172021-12-17 Method and device for intention recognition, storage medium and electronic device

Country Status (1)

CountryLink
CN (1)CN114282940B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN116320019A (en)*2023-05-162023-06-23荣耀终端有限公司 Data acquisition method, medium and electronic device
WO2024221859A1 (en)*2023-04-242024-10-31中兴通讯股份有限公司Intent recognition method, device, and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101945006A (en)*2010-09-032011-01-12电子科技大学Detection method of abnormal call
CN109636433A (en)*2018-10-162019-04-16深圳壹账通智能科技有限公司Feeding card identification method, device, equipment and storage medium based on big data analysis
CN109903058A (en)*2019-02-212019-06-18中国联合网络通信集团有限公司 A method and device for identification of maintenance card based on blockchain
CN110536302A (en)*2018-05-252019-12-03中国移动通信集团广东有限公司Telecommunication fraud based reminding method and device
CN111144430A (en)*2018-11-052020-05-12中国移动通信集团广东有限公司Genetic algorithm-based card number identification method and device
CN111353138A (en)*2018-12-242020-06-30中移(杭州)信息技术有限公司 A method, device, electronic device and storage medium for abnormal user identification
CN111626754A (en)*2020-05-282020-09-04中国联合网络通信集团有限公司Card maintenance user identification method and device
KR20200106435A (en)*2019-09-252020-09-14넷마블 주식회사Method and apparatus for authenticating user
CN112950231A (en)*2021-03-192021-06-11广州瀚信通信科技股份有限公司XGboost algorithm-based abnormal user identification method, device and computer-readable storage medium
CN113132991A (en)*2019-12-312021-07-16中国移动通信集团贵州有限公司Card raising identification method, system and device
CN113422836A (en)*2021-07-012021-09-21中国联合网络通信集团有限公司Card-holding user identification method, device, equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101945006A (en)*2010-09-032011-01-12电子科技大学Detection method of abnormal call
CN110536302A (en)*2018-05-252019-12-03中国移动通信集团广东有限公司Telecommunication fraud based reminding method and device
CN109636433A (en)*2018-10-162019-04-16深圳壹账通智能科技有限公司Feeding card identification method, device, equipment and storage medium based on big data analysis
CN111144430A (en)*2018-11-052020-05-12中国移动通信集团广东有限公司Genetic algorithm-based card number identification method and device
CN111353138A (en)*2018-12-242020-06-30中移(杭州)信息技术有限公司 A method, device, electronic device and storage medium for abnormal user identification
CN109903058A (en)*2019-02-212019-06-18中国联合网络通信集团有限公司 A method and device for identification of maintenance card based on blockchain
KR20200106435A (en)*2019-09-252020-09-14넷마블 주식회사Method and apparatus for authenticating user
CN113132991A (en)*2019-12-312021-07-16中国移动通信集团贵州有限公司Card raising identification method, system and device
CN111626754A (en)*2020-05-282020-09-04中国联合网络通信集团有限公司Card maintenance user identification method and device
CN112950231A (en)*2021-03-192021-06-11广州瀚信通信科技股份有限公司XGboost algorithm-based abnormal user identification method, device and computer-readable storage medium
CN113422836A (en)*2021-07-012021-09-21中国联合网络通信集团有限公司Card-holding user identification method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭怡: ""基于云计算环境的持续审计探讨——以中国联通河北省分公司为例"", 《财会通讯》, no. 16, 31 August 2024 (2024-08-31), pages 92 - 96*

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2024221859A1 (en)*2023-04-242024-10-31中兴通讯股份有限公司Intent recognition method, device, and storage medium
CN116320019A (en)*2023-05-162023-06-23荣耀终端有限公司 Data acquisition method, medium and electronic device
CN116320019B (en)*2023-05-162023-10-27荣耀终端有限公司Data acquisition method, medium and electronic equipment

Also Published As

Publication numberPublication date
CN114282940B (en)2025-02-21

Similar Documents

PublicationPublication DateTitle
US11687396B2 (en)Determining server error types
US11032422B1 (en)Heuristic sales agent training assistant
CN109450771B (en)Method and device for adding friends, computer equipment and storage medium
US20200273570A1 (en)Predictive analysis platform
US20200265119A1 (en)Site-specific anomaly detection
CN110442712B (en)Risk determination method, risk determination device, server and text examination system
CN111405030B (en)Message pushing method and device, electronic equipment and storage medium
CN108363811A (en)Device identification method and device, electronic equipment, storage medium
US12019945B2 (en)Application replication platform
CN110162518B (en)Data grouping method, device, electronic equipment and storage medium
CN114282940B (en) Method and device for intention recognition, storage medium and electronic device
CN112035638A (en)Information processing method, device, storage medium and equipment
CN110474899B (en)Service data processing method, device, equipment and medium
CN113505272B (en)Control method and device based on behavior habit, electronic equipment and storage medium
CN113412607A (en)Content pushing method and device, mobile terminal and storage medium
CN106998336B (en)Method and device for detecting user in channel
CN112347457A (en)Abnormal account detection method and device, computer equipment and storage medium
CN111177536B (en)Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device
CN111126071A (en) Method for determining question text data, device and data processing method for customer service group
CN110428342A (en)Data recovery method, server, customer side and storage medium
CN110705637A (en)User classification method and device based on application installation list information and electronic equipment
CN119106750A (en) Task processing method based on large model, device, equipment and medium
CN111078972B (en)Questioning behavior data acquisition method, questioning behavior data acquisition device and server
CN110796379B (en)Risk assessment method, device and equipment of business channel and storage medium
CN113297358A (en)Data processing method, device, server and computer readable storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp