Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

50results about How to "Avoid aggressive behavior" patented technology

Bluetooth communication authentication request, receiving and communication method, mobile terminal and equipment terminal

The invention discloses a Bluetooth communication authentication request, receiving and communication method, a mobile terminal and an equipment terminal, and the Bluetooth communication authentication request and communication method comprises the steps: carrying out the Bluetooth scanning with the equipment terminal, and establishing a communication link on a link layer; obtaining an equipment end public key; performing ECDH key exchange, and generating an ECDH Base AES Key symmetric key K; acquiring a user password, and sending the user password to the equipment end; after the equipment terminal passes user authentication, performing data communication with the equipment terminal, and disconnecting connection after communication is completed; in the user password sending process and thedata communication process, an AES encryption channel is adopted for encryption and decryption transmission, and a secret key of an AES encryption function is a symmetric secret key K. According to the method, the secret keys of the two communication parties are stored in the application layer, detection and verification are carried out on the application layer through the ECDH secret key exchange technology, it is guaranteed that the secret keys are stored in a protected thread, and data cannot be accessed by other malicious programs.
Owner:JINAN UNIVERSITY

User behavior recognition method and device based on slider verification code verification

The embodiment of the application discloses a method and a device for identifying user behavior based on slider authentication code verification. The method comprises the following steps: first user operation data for starting a target service is obtained, the first user operation data including first user identification information and first page operation data; A target slider verification codeis output to the user interface according to the first page operation data, and first slider operation data for user authentication based on the target slider verification code is obtained from the user interface; The user behavior identification model verified by the slider authentication code is determined according to the first user identification information, and a user behavior category corresponding to the first page operation data and the first slider operation data is determined based on the user behavior identification model; user authentication is completed or user authentication isdisconnected according to the user behavior category. By adopting the embodiment of the application, the user authentication security based on the slider authentication code authentication can be improved, the network attack of the slider authentication code authentication can be effectively prevented, and the security is higher.
Owner:PING AN TECH (SHENZHEN) CO LTD

Multi-information fusion human exoskeleton robot control protection system

The invention discloses a multi-information fusion human exoskeleton robot control protection system. The system comprises a plurality of inertia measurement assemblies, a plurality of electromyogramsensors, respiration sensors, a depth camera and machine learning processing computers, wherein the inertia measurement assemblies and the electromyogram sensors are installed at arms and legs of a human body, the respiration sensors are installed on a chest, the depth camera is worn on a head, and the machine learning processing computers are installed at any position of the human body; effectivedata acquired by all the sensors at a certain moment are used as input of an LSTM neural network based on a BPTT algorithm, the sum of time consumed by processing a machine learning algorithm throughthe computers and the maximum delay time of receiving control signals by a steering engine at each position of the robot from the moment is used as a time interval, a control signal representing a movement intention of the human body at the moment after the time interval is used as output, a nonlinear function mapping relation which is difficult to express through an analytic expression in engineering is established through neural network training, the movement intention of the human body at the next moment is judged through the action at the moment, so that a function that the correspondingcontrol signal is output is achieved.
Owner:南京师范大学镇江创新发展研究院

Psychological accompanying robot and emotion supporting method

The invention discloses a psychological accompanying robot and an emotion supporting method. The psychological accompanying robot comprises an emotion recognizing module, an emotion comforting and supporting module, an operational analysis control module and a data transmission module, wherein all the modules are integrated to a mechanical shell and are arranged in a doll cotton cover. The psychological accompanying robot acquires the information such as the expressions, actions and languages of a user through the emotion recognizing module, analyzes and judges the emotions through the operational analysis control module, generates an emotion supporting strategy and then achieves psychological accompanying through the emotion comforting and supporting module. Communication between the robot doll and a mobile phone can be achieved through the data transmission module, and integration of all the information and sharing of equipment hardware can be achieved. According to the psychologicalaccompanying robot and the emotion supporting method, the psychological accompanying robot can be carried along as a mascot or a pendant, interaction can be achieved through the modes such as the expressions, actions and sounds to carry out psychological accompanying and emotion comforting, and the psychological accompanying robot can become a most faithful friend and a companion of the user.
Owner:SOUTH CHINA UNIV OF TECH

Method for preventing illegal transferring of interruption procedures of operating system

The invention discloses a method for preventing illegal transferring of interruption procedures of an operating system, which mainly solves the problem that illegal transferring of the interruption procedures of the operating system by attackers cannot be prevented in the prior art. The method for preventing illegal transferring includes steps of modifying the interruption procedures of the operating system, transmitting specific information to a virtual machine manager when the interruption starts and stops; and modifying the virtual machine manager. When the virtual machine manager receives information of interruption starting, values of a CS (client / server) and an IP (internet protocol) register on current stacks of the operating system can be stored into an FILO (first in later out) array; when the virtual machine manager receives information of interruption stopping, the values of the CS and the IP register stored at the head of the FILO array can be extracted to be compared with the values on the current stacks of the operating system, if the values of the CS and the IP register are different from those of the current stacks of the operating system, execution of the operating system is stopped so as to prevent illegal transferring of the attackers. By the aid of the virtual machine manager, control data in interruption context are protected, so that the attackers cannot transfer the executive procedures of the operating system by distorting the control data, and the method can be used for protecting safety of the operating system.
Owner:XIDIAN UNIV

Wheelchair special for prisoners

The present invention relates to a wheelchair special for prisoners. An ejection rod motor is longitudinally fixedly arranged on one side of the part, below a chair seat and chair back portion, of a frame; a rotating rod is laterally mounted on the middle part of the frame; the two ends of the rotating rod sleeve inside sleeves fixedly arranged on the frame; foot ring rods are fixedly arranged on the parts, on both sides of the frame front part, of the frame in a longitudinally symmetric manner, and a foot ring is arranged at the front end of each foot ring rod; a pair of mounting clamping plates are fixedly arranged on the parts, corresponding to the end parts of an ejection rod of the ejection rod motor, at the lower part of the rotating rod, and the mounting clamping plates are fixedly arranged on the ejection rod ends of the ejection rod motor by bolts; and vertical plates are fixedly arranged on the upper parts of the both sides of the rotating rod, each of the two vertical plates is fixedly provided with a longitudinal pull rod by bolts, and the front ends of the pull rods are fixedly arranged on the foot rings. The wheelchair is simple in structure, scientific in design and clever in conception, and can control the action of upper and lower limbs of the prisoners in the wheelchair and avoid the occurrence of malignant accidents, thus belonging to one of indispensable facilities in prison.
Owner:TIANJIN XINCHENG NEW SCI TRADE

Psychological intervention rehabilitation assistive device based on VR technology

The invention relates to the technical field of psychological intervention rehabilitation assistive devices, in particular to a psychological intervention rehabilitation assistive device based on VR technology, which comprises a seat, a fixing rod is fixedly connected to the upper side of the rear end of the seat, a universal pipe is fixedly connected to the outer surface of the front end of the fixing rod, and VR glasses are fixedly connected to one side, away from the fixing rod, of the universal pipe. The VR glasses and the universal pipe are connected through a connecting mechanism; the connecting mechanism comprises a connector. By arranging the universal pipe, the position of the VR glasses can be freely adjusted according to the height condition of a user, the VR glasses do not need to be worn on the head through a bandage, the use comfort of a patient is improved, the VR glasses and the universal pipe are connected through the connecting mechanism, the VR glasses are convenient to mount and dismount, and the use is convenient. And the hand binding mechanism is arranged to bind the hands of the patient, so that overexertion during mood excitation of the patient is prevented, and the personal safety of the patient is guaranteed.
Owner:安徽阳光心健科技发展有限公司

Protective isolation fence and processing method thereof

The protective separation fence comprises an outer frame, a plurality of transverse reinforcing steel bars and a plurality of longitudinal reinforcing steel bars, the transverse reinforcing steel bars and the longitudinal reinforcing steel bars are arranged in a crossed mode, and a first flat part and a second flat part are correspondingly formed at the crossed position of each transverse reinforcing steel bar and each longitudinal reinforcing steel bar through stamping. The first flat part and the second flat part are provided with through holes which are communicated with each other, barbed nails penetrate through the through holes and extend out, and the first flat part and the second flat part are pressed together through riveting, so that the transverse steel bars and the longitudinal steel bars are fixedly connected. The mesh is formed in a steel bar stamping and barbed nail riveting mode, a traditional steel wire welding mode is replaced, pollution of electric welding to the environment and damage to human health are avoided, the strength of the separation fence is enhanced, the service life is long, and the separation fence is not prone to damage; in addition, after the mesh is formed, barbed nails on the mesh can play a good protection role, and attack behaviors of animals can be effectively avoided.
Owner:北京市中凯路达交通技术有限责任公司

Illegal TCP data stream detection method and device, and computer equipment

PendingCN114070572AAccurate detection statusAvoid aggressive behaviorSecuring communicationData streamAttack
The invention discloses an illegal TCP data stream detection method and device, and computer equipment. The method comprises the following steps of: receiving a to-be-detected TCP data stream sent by a detected end; acquiring a first confirmation serial number of any one data message in a plurality of data messages and a second confirmation serial number of a previous data message of the any one data message in the to-be-detected TCP data stream, and acquiring a target confirmation serial number between the first confirmation serial number and the second confirmation serial number according to the first confirmation serial number and the second confirmation serial number; sending a confirmation message comprising the target confirmation serial number to the detected end; receiving a data message sent by the detected end, wherein the data message comprises a data message after the target confirmation serial number in the to-be-detected TCP data stream; and determining whether the to-be-detected TCP data stream is an illegal TCP data stream or not according to a receiving result of the data message. By implementing the illegal TCP data stream detection method, the state of the whole TCP data stream can be accurately detected, and attack behaviors of illegal TCP data streams on an industrial control system and a military system are avoided.
Owner:北京威努特技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products