Method for sensing abnormal behavior of passenger by wireless technology

A wireless technology, passenger technology, applied in wireless communication, location information-based services, instruments, etc., can solve problems such as inability to predict and identify in advance, low real-time performance, time-consuming and labor-intensive problems

Inactive Publication Date: 2018-11-02
成都天佑飞天科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the invention: In view of the time-consuming and labor-intensive discovery of potential threat behaviors in the prior art, the real-time performance is not high, and it is impossible to predict and identify them in advance. The method of sensing the abnormal behavior of passengers through wireless technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for sensing abnormal behavior of passenger by wireless technology
  • Method for sensing abnormal behavior of passenger by wireless technology
  • Method for sensing abnormal behavior of passenger by wireless technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0063] Embodiment 2: When a suspicious user accesses an AP

[0064] 1. On the train, one AP is installed in each carriage, and the whole train has a central control server to manage the AP equipment in each carriage

[0065] 2. Each carriage reports the connected STA information to the central server, and the central server gathers the AP ID numbers accessed by each passenger. The change of the passenger's location will lead to the change of the accessed AP ID (roaming)

[0066] 3. The data analysis of the central server is consistent with the scheme one.

[0067] Among them such as Image 6 Three phases of wireless access process shown

[0068] Before the STA (workstation) starts initialization and begins to use the AP to transmit data frames, it needs to go through three stages before it can access (802.11MAC layer is responsible for the communication between the client and the AP, and its functions include scanning, access, authentication, encryption, features such as ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for sensing an abnormal behavior of a passenger by a wireless technology. The method comprises the following steps: a single carriage AP (Access Point) collects STA (Spanning Tree Algorithm) data; the data is summarized and stored in a control center; analyze the data and match a processing model; predefine a normal / abnormal model matched with a predefined normal / abnormal model; and alarm about the abnormal user. The method provided by the invention is based on the vehicle-mounted internet to identify and predict the theft in advance, is low in cost and high intimeliness, and saves plenty of costs of manpower and material resources.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, in particular to a method for sensing abnormal behavior of passengers through wireless technology. Background technique [0002] Thefts on existing trains are basically identified by means of police patrols, camera captures, and plainclothes police identification. Discovering potential threatening behaviors is time-consuming and labor-intensive, and the real-time performance is not high. They are all post-processing methods and cannot be predicted and identified in advance. [0003] There are three stages before the threat of security behavior occurs, during the occurrence, and after the occurrence. Post-event processing needs to filter out useful information in the threat occurrence time period from a large amount of data, and provide effective evidence for threat event processing. The entire process of event processing is processed after the event occurs, and related losses and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W4/029H04W12/02H04W12/06H04L29/12H04L29/08G08B21/02H04W12/12
CPCH04W4/029H04W12/02H04W12/06G08B21/02H04L2101/622H04L2101/69H04L67/52
Inventor 侯贵斌马馨睿李胤
Owner 成都天佑飞天科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products