Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about How to "No privacy involved" patented technology

Mobile malicious user identification method and system based on communication behavior rule

The invention relates to a mobile malicious user identification method and system based on a communication behavior rule, and the method comprises the steps: collecting data in desensitized mobile communication flow data based on a non-uniform sampling method, and carrying out preprocessing; analyzing and extracting call behavior characteristics, short message behavior characteristics and time distribution characteristics of the user by utilizing a behavior mode in a mobile communication behavior analysis model based on the preprocessed mobile communication sampling data; based on the preprocessed mobile communication sampling data, analyzing and extracting social attribute characteristics of the user by utilizing a communication network in a mobile communication behavior analysis model; and constructing a mobile malicious user identification model based on the extracted user behavior mode characteristics and the extracted user social attribute characteristics. The behavior rule of theuser can be analyzed based on the desensitization data, whether the user is a mobile malicious user or not is recognized, timeliness is achieved, and the mobile malicious user can be recognized withhigh accuracy under the condition that personal privacy of the user is not involved.
Owner:INST OF INFORMATION ENG CAS

Case sharing method and system based on block chain and private key storage medium

The invention discloses a case sharing method based on a block chain, and the method comprises the steps: S1, building an alliance chain: registering hospitals participating in the generation of medical data as administrator users, adding the administrator users to the block chain, and forming an alliance chain network; S2, performing user registration: all members in the alliance chain use the same client; S3, generating medical data: writing the medical data by a doctor after the patient seeks a doctor every time; S4, performing data uploading: the doctor uploads the medical data with the doctor-patient signatures Sigdoc and Sigid to a block chain network; S5, logging in by the user; S6, making a retrieval strategy: retrieving the disease code by the user to obtain all data of the disease type in the system; S7, performing online communication: the user performs online communication with interested cases after retrieving the cases. According to the invention, the data meeting the conditions is uploaded by running the smart contract, is spread to each node to form a block, and is spread to the whole network, so that a patient can anonymously obtain a real, reliable and already-generated treatment scheme, and communicates with other patients or doctors.
Owner:CENT SOUTH UNIV

Smart phone use situation recognition method based on touch behavior sequence

A smartphone use situation recognition method based on a touch behavior sequence defines nine touch operations. Nine touch operation attributes (touch starting time, touch ending time and the like) are extracted to form one touch operation by analyzing a log of a smartphone operation system, a touch operation sequence is obtained, and 32 continuous operations serve as a basic touch interaction sequence; and modeling is carried out by using a long-short-term memory network and an attention mechanism, so that judgment and statistics of the situation duration of using the mobile phone by the userare realized. According to the invention, the basic touch interaction sequence is input into the bidirectional long-short-term memory network model of the superimposed attention mechanism to carry out situation identification, so that the judgment of the situation of using the mobile phone by the user, such as shopping, social contact, browsing, learning, short videos, games and the like, is realized, and various situation subdivisions in the application of using the intelligent mobile phone by the user can be realized; and the use duration of each situation in a certain period of time is counted, so that a direct basis is provided for the user to know the use duration of each situation of a smart phone.
Owner:OCEAN UNIV OF CHINA

Vehicle-mounted terminal convergence media delivery method and vehicle-mounted convergence media interaction terminal

The invention provides a vehicle-mounted terminal convergence media delivery method and a vehicle-mounted convergence media interaction terminal, and belongs to the technical field of convergence media delivery. According to the method, fusion media delivery is triggered through user operation, after a user selects an address, the remaining browsing duration is estimated, and the remaining browsing duration, the selected address and vehicle-mounted terminal information are sent to a server in a sound code mode; a server searches for matched offline and online convergence media, screens out convergence media delivery content, segments the convergence media delivery content, converts the convergence media delivery content into acoustic code strings, and sends the acoustic code strings to the vehicle-mounted terminal; and the vehicle-mounted terminal analyzes the converged media delivery content and delivers the converged media delivery content in sequence. And the server performs convergence media content adjustment according to the frequency of the commodity types clicked by the user, and performs arrival reminding according to the address selected by the user. The converged media delivery is triggered by the user, accurate delivery of online shopping groups and old people is realized, and excessive user privacy is not involved.
Owner:上海声态圈物联网科技有限公司

Industrial wireless network non-centralized coexistence management method based on information coordination

The invention relates to an industrial wireless network coexistence management method, in particular to an industrial wireless network non-centralized coexistence management method based on information coordination. Aiming at the coexistence problem caused by mutual interference of a plurality of industrial wireless networks, the invention provides the non-centralized coexistence management method applied to industrial wireless networks for the first time, and the non-centralized coexistence management method specifically comprises two parts of incomplete information interaction and non-centralized resource coordination. For the incomplete information used for coordination, on the premise of considering privacy protection, the content of the incomplete information is definitely defined, and guidance is provided for non-centralized resource coordination; and aiming at the aspect of non-centralized resource coordination, the requirement of network transmission data packet deadline is considered, a network utility function is designed, based on coordinated incomplete information, the network utility function is designed, and a network occupied resource strategy is independently adjusted. The network gain is maximized, the time required for convergence of the algorithm is reduced, and the interference between coexisting networks is minimized.
Owner:SHENYANG INST OF AUTOMATION - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products