Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for performing security prediction based on feature information

A feature information and pre-judgment technology, applied in the field of cloud computing, can solve the problems of hidden safety hazards, undetectable hidden dangers, traffic waste, etc.

Active Publication Date: 2017-07-04
ALIBABA GRP HLDG LTD
View PDF9 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing monitoring systems for various hidden dangers, the pre-set hidden danger conditions are monitored and early-warned, and potential hidden dangers cannot be found suddenly. Often, after the accident occurs, only active alarms can be used to call for help.
[0003] It can be seen that because the hidden danger conditions of the preset monitoring cannot cover the potential dangerous factors in the surrounding environment, there will be safety hazards. Although the hidden dangers are monitored through intuitive and vivid visual carriers of spatial information such as maps, it is still impossible to monitor monitor hidden dangers that cannot be reflected in spatial information
In addition, when monitoring the target, the wireless communication is usually used to transmit data, which will cause a waste of traffic during long-term monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for performing security prediction based on feature information
  • Method, device and system for performing security prediction based on feature information
  • Method, device and system for performing security prediction based on feature information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0174] In order to better understand the above-mentioned purpose, features and advantages of the present application, the present application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0175] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementations disclosed below.

[0176] The embodiments of the present application provide a method for performing security predict...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a method and device for performing security prediction based on feature information, an electronic device, a method and device for acquiring the feature information, an electronic device, and a system for performing security prediction based on the feature information. The method for performing security prediction based on the feature information comprises the following steps: receiving the feature information of a monitored party sent by the monitored party; calculating the security state information of the monitored party according to the prestored risk occurrence probability corresponding to the feature information of the monitored party; judging whether the security state information of the monitored party exceeds a first threshold; and executing corresponding processing operations according to the judgment result. By adopting the method disclosed by the application, the problem that potential safety hazards are caused as the preset monitoring hidden conditions cannot cover the potential risk factors in the surrounding environment can be solved, the hidden dangers that cannot be reflected by the spatial information can be monitored; and through the identification and early warning of the feature information, an alert is made before the occurrence of the hidden dangers to avoid the occurrence of the hidden dangers, and the problem of traffic waste can be solved.

Description

technical field [0001] This application relates to the technical field of cloud computing, and specifically relates to a method for security prediction based on feature information, a method for acquiring feature information, and a system for security prediction based on feature information; A device for predicting safety of information, an electronic device, a device for acquiring feature information, and another electronic device. Background technique [0002] In daily life, hidden dangers are factors that are unstable in certain conditions, things and events and affect the safety and interests of individuals or others. The occurrence of hidden dangers may lead to accidents and cause personal injury or property loss. At present, various digital applications about hidden dangers have been widely used. The above-mentioned applications use mature computer, network, GPS, visualization, database and other technologies to control through tracking or monitoring. Safety hazards ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/083H04L67/025H04L67/12A61B5/0002A61B5/0008A61B5/002A61B5/0205A61B5/02055A61B5/1112A61B5/1113A61B5/1117A61B5/113G08B21/0453G08B21/12A61B2560/0412G08B31/00H04W4/14G08B21/02G08B21/182G08B25/10
Inventor 王锦华
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products