Interactive tracking and positioning pre-judgment system
A tracking and positioning and interactive technology, applied in the field of network security, can solve problems such as consuming a lot of manpower and material resources, long-term staring, and difficulty in determining, so as to achieve the effect of improving social security, reducing crime rate, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0023] A fugitive suspect named Li carried out a house robbery in a certain place on a certain day, month and day, robbed some cash, and then absconded. At the time node of a certain year, month, and day, you can search and capture Li’s activity track through all online monitoring equipment and camera equipment in the network monitoring module, and after displaying the activity range at the latest time point on the network map, the network monitoring module The information is directly transmitted to the analysis and alarm module, and the analysis and alarm module is used to analyze the nearest public security organ within the range of Li's activities for arrest.
Embodiment 2
[0025] During the arrest process, the perpetrators escaped during the arrest process
[0026] When the police are in the process of chasing suspects, the suspects often resist arrest by escaping. However, the suspects escape due to concerns about the safety of the people and society during the pursuit of the police officers.
[0027] However, based on the high coverage of the existing network and surveillance camera equipment, after the police capture the suspect’s dynamic escape route, the network monitoring module transmits the suspect’s movement route information to the data analysis module and activates the data analysis module. The personal information of the suspect in the analysis module directly simulates the habitual characteristics of the suspect through the data analysis module and then simulates the most likely escape route. After determining the most likely escape route, the data analysis module will It is transmitted to the analysis and alarm module, and the most...
Embodiment 3
[0030] Automatic detection of abnormal behavior
[0031] With the increasing crackdown on pyramid selling activities, the development of pyramid selling activities has become more and more difficult. However, pyramid selling activities have not been completely eliminated.
[0032]Since the personnel involved in pyramid schemes generally gather a lot of people in a specific area, and these people usually live in secluded places, their behavior deviates from normal life and study to a large extent. Abnormal behaviors that cannot be found through short-term human contact are under the monitoring of the network monitoring module. The abnormality is obvious, and then the data analysis module is assisted to comprehensively analyze the characteristic information of the abnormal behavior object, which can intuitively and accurately identify and analyze whether it is abnormal behavior. Through the interactive tracking and positioning prediction system, 99.9% of the abnormal behavior can...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com