US Patent Application 18031620. DETERMINATION DEVICE, DETERMINATION METHOD, AND DETERMINATION PROGRAM simplified abstract

From WikiPatents
Revision as of 10:06, 4 December 2023 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

DETERMINATION DEVICE, DETERMINATION METHOD, AND DETERMINATION PROGRAM

Organization Name

NIPPON TELEGRAPH AND TELEPHONE CORPORATION

Inventor(s)

Hiroki Nakano of Musashino-shi, Tokyo (JP)

Daiki Chiba of Musashino-shi, Tokyo (JP)

DETERMINATION DEVICE, DETERMINATION METHOD, AND DETERMINATION PROGRAM - A simplified explanation of the abstract

This abstract first appeared for US patent application 18031620 titled 'DETERMINATION DEVICE, DETERMINATION METHOD, AND DETERMINATION PROGRAM

Simplified Explanation

The patent application describes a device that can determine if user-generated content is generated by a malicious user or a legitimate user.

  • The device calculates a characteristic amount of user-generated content produced by a user within a specific time period.
  • It then uses this calculated characteristic amount, along with the characteristic amount of content generated by a known malicious user, to perform a learning process.
  • The learning process helps the device create a model that can distinguish between content generated by a legitimate user and content generated by a malicious user.
  • Finally, the device uses the learned model to determine whether the user-generated content is generated by a malicious user or not.


Original Abstract Submitted

A determination device includes processing circuitry configured to calculate a characteristic amount of user-generated content generated by a user in a predetermined period, perform learning by using the calculated characteristic amount of the user-generated content generated by a legitimate user and a characteristic amount of content generated by a malicious user, and determine whether the user-generated content is generated by the malicious user using a learned model.