ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS
First Claim
1. A computer-implemented method for order clustering in a distributed order system performed by one or more processors comprising:
- receiving, by the one or more processors over a network, order information for an order representing an electronic transaction in the distributed order system for a product or a service;
generating, by the one or more processors, a unique order identifier (ID) and order content based on the received order information;
creating, by the one or more processors, an order vector for the order based on the order content;
adding, by the one or more processors, the order to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster;
analyzing, by the one or more processors, the representative order vector corresponding to the representative order in the order cluster to determine if the representative order is malicious; and
when a determination is made that the representative order is malicious, performing, by the one or more processors, malicious order processing on the orders in the order cluster.
3 Assignments
0 Petitions
Accused Products
Abstract
Order information for an order representing an electronic transaction in the distributed order system for a product or a service is received by one or more processors over a network. A unique order ID and order content based on the received order information are generated. An order vector for the order is created based on the order content. The order is added to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster. The representative order vector corresponding to the representative order in the order cluster is analyzed to determine if the representative order is malicious. A determination is made as to whether the representative order is malicious. If the representative order is malicious, then malicious order processing is performed on the orders in the order cluster.
-
Citations
20 Claims
-
1. A computer-implemented method for order clustering in a distributed order system performed by one or more processors comprising:
-
receiving, by the one or more processors over a network, order information for an order representing an electronic transaction in the distributed order system for a product or a service; generating, by the one or more processors, a unique order identifier (ID) and order content based on the received order information; creating, by the one or more processors, an order vector for the order based on the order content; adding, by the one or more processors, the order to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster; analyzing, by the one or more processors, the representative order vector corresponding to the representative order in the order cluster to determine if the representative order is malicious; and when a determination is made that the representative order is malicious, performing, by the one or more processors, malicious order processing on the orders in the order cluster. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory, computer-readable medium storing one or more instructions executable by a computer system to perform operations comprising:
-
receiving, by the one or more processors over a network, order information for an order representing an electronic transaction in the distributed order system for a product or a service; generating, by the one or more processors, a unique order identifier (ID) and order content based on the received order information; creating, by the one or more processors, an order vector for the order based on the order content; adding, by the one or more processors, the order to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster; analyzing, by the one or more processors, the representative order vector corresponding to the representative order in the order cluster to determine if the representative order is malicious; and when a determination is made that the representative order is malicious, performing, by the one or more processors, malicious order processing on the orders in the order cluster. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-implemented system, comprising:
-
one or more computers; and one or more computer memory devices interoperably coupled with the one or more computers and having tangible, non-transitory, machine-readable media storing one or more instructions that, when executed by the one or more computers, perform one or more operations comprising; receiving, by the one or more processors over a network, order information for an order representing an electronic transaction in the distributed order system for a product or a service; generating, by the one or more processors, a unique order identifier (ID) and order content based on the received order information; creating, by the one or more processors, an order vector for the order based on the order content; adding, by the one or more processors, the order to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster; analyzing, by the one or more processors, the representative order vector corresponding to the representative order in the order cluster to determine if the representative order is malicious; and when a determination is made that the representative order is malicious, performing, by the one or more processors, malicious order processing on the orders in the order cluster. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification