Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

635 results about "Behavioral analysis" patented technology

Method and system for detecting application program behavior legality

A method for detecting the legitimacy of an application program behavior comprises the following steps: monitoring one or more system interfaces of a computer to cause the monitored system interfaces to jump to a monitoring module for execution when the monitoring system interfaces receive a call; blocking the application program of a caller and judging the validity of the caller: permitting the caller to call an interface function and continuously perform the application program of the caller if the caller is legal; and, pausing the behavior of the application program of the caller and issuing an intrusion alarm if the caller is illegal. The detection method finds out whether an executor of the application program behavior is legal or not by monitoring the system interfaces of the computer so as to intercept the program behavior executed by illegal executors and give an alarm. Compared with the existing fuzzier behavioral analysis technology, the detection method has the advantages of low false alarm rate, high recognition rate and the like, especially has good defense effect against the intrusion behavior due to overflow vulnerability, so the detection method is an effective supplement to the existing behavior analysis defense technology.
Owner:厦门市美亚柏科资讯科技有限公司

High-throughput nano-litre micro-droplet forming and fixing method based on microfluidic chip and special chip and application thereof

The invention relates to a high-throughput nano-litre micro-droplet forming and fixing method based on a microfluidic chip and a special chip and an application thereof. The method comprises the following steps: inlets of a continuous phase and a dispersed phase on the chip are respectively connected with two injection pumps through a teflon tube, the continuous phase and the dispersed phase are respectively infused into the chip under the driving action of the injection pumps, and continuous micro-droplets wrapped with single nematodes are formed in a T-shaped micro-droplet generation area; the generated micro-droplets enter in a droplet capture array and are captured in a circular droplet catcher in sequence; and after the micro-droplets are fully captured, the behaviors of the single nematodes in the droplet microenvironment are detected. The invention has the advantages that the microfluidic chip droplet technology is combined with the behavioral analysis to the single nematodes, a great amount of micro-droplets wrapped with the single nematodes are generated and fixed within the short time by using the characteristics of flexible combination and large-scale integration of various functional units on the chip, and the behavioral analysis to the high-throughput single nematodes on the microfluidic chip is realized for the first time.
Owner:DALIAN INST OF CHEM PHYSICS CHINESE ACAD OF SCI

Passenger going-out behavior analysis method based on subway card-swiping data

The invention discloses a passenger going-out behavior analysis method based on subway card-swiping data. The passenger going-out behavior analysis method is characterized in that the subway going-out behaviors can be classified, and the classification results have the obvious and easy-to-observe characteristics, and can be widely used for the intelligent traffic passenger going-out behavior analysis. The passenger going-out behavior analysis method is characterized in that S1, data pre-processing can be carried out; original data can be merged and organized, and passenger going-out records can be acquired; every passenger going-out record comprises a passenger going-out entrance station, an entrance card-swiping time, an exit station, and an exit card-swiping time; S2, characteristics can be extracted; according to the passenger going-out records, the passenger entrance temporal clustering can be carried out to acquire the fixed going-out days of every passenger, and then the passenger going-out characteristics can be acquired after the extraction of the passenger going-out characteristics; S3, passengers can be clustered; the passenger clustering can be carried out according to the passenger going-out characteristics, and the passenger clustering result can be acquired and analyzed.
Owner:BEIJING UNIV OF TECH

Transformer substation safety monitoring system and method based on video recognition technology

The invention provides a transformer substation safety monitoring system based on a video recognition technology. The transformer substation safety monitoring system comprises a video acquisition terminal, an information management module, a behavior analysis module and a monitoring host, wherein the information management module acquires and analyzes work ticket information in real time, and sends an analysis result to the behavior analysis module; the behavior analysis module acquires a monitoring video of a target substation operation region, intelligently identifies the monitoring video, judges whether an operator has an unsafe behavior or not, and sends the obtained monitoring video, the work ticket information analysis information and a moving target action identification result to the monitoring host to be displayed and stored, so that intelligent safety monitoring of the operator in the substation operation region is realized, and the substation on-site supervision working efficiency can be effectively improved. The invention further provides a transformer substation safety monitoring method based on the video recognition technology and applying the transformer substation safety monitoring system.
Owner:GUANGDONG POWER GRID CO LTD +1

User portrait grouping and behavior analysis method and system based on log data of network security equipment

The invention discloses a user portrait grouping and behavior analysis method and system based on log data of network security equipment. The method mainly comprises the following steps: 1) extractingfeatures from data such as user logs of the network security equipment; 2) carrying out preprocessing and data analysis on the features to obtain relationships between the features and relationshipsbetween the features and user behaviors; 3) constructing a clustering model of the user groups according to the user characteristics; 4) establishing a user portrait according to the clustering model,and determining whether the user has abnormal behaviors or not according to a matching result of the user characteristics and the user portrait; the method is simple to implement and low in calculation complexity; the computing resource overhead of behavior analysis in the user log can be effectively reduced. Compared with the prior art, the invention does not need any additional mark, only needsthe data automatically recorded by the network security equipment, has the advantages of practical application, provides a user grouping method and a portrait matching method with different behaviormodes, and carries out decision-making judgment on whether the user behavior is abnormal or not.
Owner:XI AN JIAOTONG UNIV

Network equipment behavior analysis method and system

The invention provides a network equipment behavior analysis method and a network equipment behavior analysis method system. The network equipment behavior analysis method comprises the steps of establishing a behavior model for network equipment and applying the behavior model to monitor abnormal behaviors of the equipment. In the step of establishing the behavior model for the network equipment, data acquisition equipment is used for collecting and recording data packets received and / or sent by user equipment in normal state within one or more time periods; and a behavior analysis engine is used for converting information content of the data packets into a feature value containing one or more attributes, and the feature value is used for establishing a user equipment behavior model. In the step of applying the behavior model to monitor abnormal behaviors of the equipment, the data acquisition equipment collects data packets related to the equipment within one or more time periods; the data packets are quantified into a feature value containing one or more attributes through the behavior analysis engine, and the feature value of the equipment is compared with the behavior model to verify whether behaviors of the equipment are abnormal; and if the verification result is abnormal, an alarm is sent to the user.
Owner:BEIJING KUANGEN NETWORK TECH

Behavior analysis and alarm embedded equipment based on specific area

The invention discloses behavior analysis and alarm embedded equipment based on a specific area and relates to the technical field of behavior analysis. The equipment comprises a camera, a video transmission module, an action capturing module, a face recognition module, an auxiliary processor, a database, a main processor, a main displayer, a second displayer and an alarm device, wherein the camera is dispersed in a to-be-monitored area and is used for monitoring the to-be-monitored area in real time and transmitting the video information to the action capturing module and the face recognitionmodule through the video transmission module. According to the behavior analysis and alarm embedded equipment based on the specific area in the invention, the camera, the face recognition module andthe action capturing module are used for carrying out video monitoring on a specific area needing to be monitored, automatically judging the person actions and the human face in the video, and judgingwhether the person has a danger coefficient or bad behaviors; and an alarm is given in time when the person is abnormal through the arrangement of the auxiliary processor; the information of a suspicious person can be displayed in time through the arrangement of the main displayer, thus bringing convenience for workers to observe.
Owner:HEFEI VRVIEW INFORMATION TECH

Internet teaching auxiliary teaching system based on key teaching point evaluation

The invention discloses an internet teaching auxiliary teaching system based on the key teaching point evaluation. The system comprises a student terminal image collection device which collects a face image of an evaluated student; an information transmission device used for transmitting the face image acquired by the student terminal image acquisition device to the classroom behavior analysis processor; a class behavior analysis processor used for classifying emotions of the students when learning a plurality of knowledge points related to the key teaching points and respectively endowing the emotions with mastering probability values; an intelligent classroom device used for realizing teaching interaction with the student terminal, and automatically judging whether the corresponding knowledge points are mastered or not according to the correct and wrong conditions of all questions in the teaching interaction; and a key teaching point evaluation device which calculates the total mastery rate of the key teaching points according to the analysis and judgment results of the classroom behavior analysis processor and the intelligent classroom device. According to the system, related videos of the key teaching points can be conveniently and quickly found according to the mastery condition of the key teaching points. The course look-back is effectively carried out based on recording and playing courses.
Owner:杭州博世数据网络有限公司

Construction site pedestrian wandering detection method, device and equipment and storage medium

The invention discloses a construction site pedestrian wandering detection method, device and equipment and a storage medium. The construction site pedestrian wandering detection method comprises thesteps: acquiring a frame image captured from a video stream collected by a camera installed on a construction site in real time; delimiting a pedestrian wandering detection area on the acquired frameimage; tracking each pedestrian in the detection area through deep learning in combination with a multi-target matching algorithm; calculating the track distance and the residence time of the trackedpedestrian, and identifying the pedestrian as wandering if the track distance is greater than a set distance threshold and the residence time is greater than a set time threshold; and after identifying that a person wanders, connecting an alarm to carry out early warning. According to the invention, deep learning is combined with a multi-target matching algorithm to carry out tracking calculationon each pedestrian in the detection area; therefore, whether the pedestrian wanders or not can be monitored in real time based on the behavior analysis of the pedestrian in the detection area, the precision of the detection result is improved, the tracking effect is improved, and the problem that in the prior art, a large number of missed recognition and false recognition situations occur in a method is solved.
Owner:品茗科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products