Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

45 results about "Information behaviour" patented technology

Information behaviour is traditionally associated with information seeking and narrower, system specific, information search techniques. Beyond information seeking, we can envisage a more general information behaviour (Wilson 2000), which itself can be sited within a still wider framework of information communication.

SDK processing method suitable for application client end payment

The invention relates to an SDK processing method suitable for application client end payment. The SDK processing method is characterized by comprising the following steps: an SDK is started along with an application client end, and necessary initialization is realized in starting processes; when a user clicks on charging, the SDK communicates with a cloud server; the cloud server choose among charging channels; an application client end conducts charging operation, a charging result is fed back to the cloud server, a final charging result is displayed via the application client end, charging channels matching with three major mobile operators in china can be used, and great convenience can be realized; an SDK integration pack can be automatically updated. A mobile application provider does not need to check development documents provided by all platforms in a one-by-one manner; via use of cloud computing technologies, an optimal charging channel which conforms to conditions of the user can be automatically chosen, and a unified user platform can be built; the user only needs to check integrated and unified details at background, instead of checking user charging information, behavior information and the like of all the platforms in a one-by-one manner.
Owner:苏州云清伟业网络科技有限公司

Close contact person tracking method, device, storage medium and electronic equipment

The invention provides a close contact person tracking method, a device, a storage medium and electronic equipment. The method comprises the steps: storing a close contact record data table comprisingan encryption identification code of a first user and an encryption identification code corresponding to a close contact person in a blockchain node in advance, and carrying out the intelligent contract technology when the state of a user changes; and executing decryption of the encryption identification code, obtaining the encryption identification code of the close contact person on the block chain, extracting the public key and the private key of the close contact person according to the key number of the close contact person, decrypting the encryption identification code corresponding tothe close contact person to obtain personal information of the close contact person, and sending notification information to the corresponding close contact person. The tracking of a close contact person is realized. In the tracking process of the close contact person, encryption protection is provided for personal information of the user, and the tracking function of the close contact person is achieved on the premise that personal privacy information (behavior data or position data and the like) of the user does not need to be provided.
Owner:BEIJING PRECISION MEDTECH CO LTD

Method for complementing personal lost memory information with communication, and communication system, and information recording medium thereof

The present invention enables appropriate behavior of an individual who has problems with memory, and behavior support thereof with certainty. The individual who has problems with memory always carries the portable communication terminal and loads and collects various types of information along with an ID through the communication network as behavior monitoring information. Also various types of provided information (e.g. map information) are collected. When a specific status information (e.g. forgetting the road to take) of the individual who carries the portable communication terminal is loaded, memory support information (behavior support information) is generated by conversation, text and image, so that the specific status where the individual who lost memory cannot take an action to be performed next can be individually dispelled on the spot based on the information collected in the past and various types of provided information, and this memory support information is transferred to the individual carrying the portable communication terminal. In this way, information for dispelling a specific status where an individual who lost memory cannot take an action to be performed next on the spot can be implemented by inference, personally and instantaneously.
Owner:NAT INST OF INFORMATION & COMM TECH

Data privacy protection method and system based on block chain and authority contract

The invention discloses a data privacy protection method and system based on a block chain and an permission contract, and relates to the technical field of block chains. The method comprises the following steps of: 1) storing encrypted private data on a block chain to form a private data directory; 2) querying required data, and proposing a data use application to an owner through a private data application contract; 3) after obtaining the application, enabling the owner to authorize the use permission of the data to the user or reject the application through the authorization smart contract, and record the authorization information behavior on the block chain. 4) when a private data access request of the user is obtained, judging whether the user has the access authority or not through the authorization code and the access rule. and 5) after the privilege control contract verification is passed, decrypting the privacy data to obtain the original data, encrypting the original data by using the public key of the requester, and returning the encrypted privacy data. According to the method and system, the security of the privacy data can be remarkably improved, and the ownership of the privacy data can be ensured to facilitate sharing of the privacy data.
Owner:TSINGHUA TONGFANG CO LTD

Government affair reservation service recommendation method based on machine learning

PendingCN114595850AEasy to useReduce time spent on search queriesReservationsMachine learningPersonalizationInformation behaviour
According to the government affair reservation service recommendation method based on machine learning disclosed by the invention, recommendation is carried out in various scenes, the scene I carries out data linkage, data sources are enriched, and items needing to be handled can be recommended according to personal records of all government affair departments, and the scene II constructs a user portrait and constructs user features in combination with basic information and behavior data of a user, so that the user experience is improved. According to information such as properties of services and appointment items, article features are constructed, article scores are calculated based on an article similarity model and user portraits, users are divided by adopting a clustering mode, and personalized customization and possible affair handling items can be recommended for both new and old users; in the third scene, the geographic position coordinates of the user and the geographic position coordinates of all the to-do sites are utilized, the coordinate positions are classified through a classification algorithm and then weighted calculation is carried out to give a suggested recent service site, item recommendation for different types of users in different scenes is achieved, the user can use the appointment service module more conveniently, and the user experience is improved. And the working efficiency is improved.
Owner:厦门市民数据服务股份有限公司

Entity article recommendation method and device, server and storage medium

The invention discloses an entity article recommendation method and device, a server and a storage medium, and belongs to the technical field of artificial intelligence. The entity article recommendation method includes: obtaining user characteristic information of the to-be-recommended user by utilizing the entity article recommendation date; obtaining a to-be-recommended entity article by utilizing the user feature information; and performing entity article screening in the to-be-recommended entity articles by utilizing the attribute information of the entity articles to obtain target entityarticles. The feature information of the user at least comprises the operation information behavior feature information of the user in the target application and the operation behavior feature information of the to-be-recommended user on the entity article; therefore, the analysis of the preference degree of the user to the physical object is more accurate; and screening is carried out in combination with the attribute information of the entity articles, so that the recommended entity articles better meet the requirements of the current recommended user, the occupation of server processing resources in the recommendation process is reduced, and the accuracy of entity article recommendation for different users is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method and system for determining information similarity

The invention provides a method and a system for determining information similarity, and the method comprises the steps: sorting the consumed information of each user based on the consumed time of the information, and obtaining a corresponding first information behavior sequence; integrating the first information behavior sequences corresponding to all the users to obtain a second information behavior sequence; calculating a first similarity between each pair of information with a co-occurrence relationship in the second information behavior sequence; constructing a topological graph among the information based on the second information behavior sequence; calculating a second similarity between each pair of nodes in the topological graph by using a graph convolution algorithm; and on the basis of the first similarity between each pair of information with the co-occurrence relationship and in combination with the second similarity between each pair of nodes in the topological graph, determining the final similarity between each pair of information in the second information behavior sequence. The final similarity between the information is calculated in combination with the two modes, the number of information covered by the mode of calculating the similarity is increased, and then the accuracy of information recommendation is improved.
Owner:BEIJING SOHU NEW MEDIA INFORMATION TECH

Data processing method based on big data and advertisement pushing and big data platform

According to the data processing method based on big data and advertisement pushing and the big data platform, the user label information, the behavior label information and the time sequence label information of the current user behavior data can be analyzed, and the first user behavior track is determined in combination with the reference user data, so as to determine third user behavior tracks,corresponding advertisement pushing information and advertisement clicking information of all key user behavior data in a preset database according to different user behavior data, and finally generate advertisement pushing guidance data for guiding the big data platform to carry out personalized customization of an advertisement pushing target. The advertisement pushing guidance data covers advertisement pushing contents, advertisement pushing time periods, advertisement pushing forms and the like, and deep user behavior data analysis can be performed for each user, so that the advertisementpushing guidance data corresponding to different users in different time periods can be customized in a personalized manner, the pertinence and timeliness of advertisement pushing can be ensured, andaccurate advertisement pushing is realized.
Owner:上海东方财富金融数据服务有限公司

Content recommendation method and device, electronic equipment and storage medium

The embodiment of the invention provides a content recommendation method and device, electronic equipment and a storage medium, and relates to the field of data analysis. The method comprises the following steps: acquiring basic information and behavior information of a user and attribute information of a plurality of contents; determining the similarity among the contents according to the attribute information of the contents, and generating a plurality of recall sets according to the similarity, each recall set comprising a plurality of contents of which the similarity is greater than a preset threshold; generating a label and a label weight of the user according to the basic information and the behavior information; screening out at least one target recall set from the plurality of recall sets according to the labels of the users; and screening contents in the target recall set according to the label weight of the user, and generating and outputting a content recommendation result according to a screening result. According to the content recommendation method provided by the embodiment of the invention, the accuracy of recommending the content to the users without clear requirements can be improved, and the retention time of the part of users can be prolonged.
Owner:西安力传智能技术有限公司

Community personnel management and control system

The invention discloses a community personnel management and control system, and particularly relates to the field of community management, the community personnel management and control system comprises a community micro-brain system, a terminal of the community micro-brain system is connected with an information storage cloud, and a terminal of the information storage cloud is connected with a community management system; the community management system comprises an information collection system, an information recognition system and an information judgment early warning system, and a terminal of the information collection system is connected with a terminal of the information recognition system. Compared with the prior art, face information and behavior track information of residents are collected through an access control system and an applet client, the resident information is recognized through the information recognition system, when the recognized resident information is suspicious, the information judgment early warning system gives out early warning and transmits early warning information to a monitoring management platform, so that monitoring and management of a community are conveniently realized, therefore, the convenience of community management is effectively improved, and the community management effect is effectively improved.
Owner:HANGZHOU GUANGMAI TECH

A method and system for determining information similarity

The present invention provides a method and system for determining information similarity. Based on the time when information is consumed, the information consumed by each user is sorted to obtain the corresponding first information behavior sequence; the first information behavior sequence corresponding to all users is The sequence is integrated to obtain the second information behavior sequence; calculate the first similarity between each pair of information with a co-occurrence relationship in the second information behavior sequence; based on the second information behavior sequence, construct a topological map between information; use The graph convolution algorithm calculates the second similarity between each pair of nodes in the topological graph; based on the first similarity between each pair of information with a co-occurrence relationship, combined with the second similarity between each pair of nodes in the topological graph The second similarity is to determine the final similarity between each pair of information in the second information behavior sequence. Combine the two methods to calculate the final similarity between information, increase the amount of information covered by the method of calculating similarity, and then improve the accuracy of information recommendation.
Owner:BEIJING SOHU NEW MEDIA INFORMATION TECH

Key information infrastructure abnormity monitoring method and device

PendingCN113515400AGet abnormal status in timeFault responseInformation behaviourOperational system
The embodiment of the invention discloses a key information infrastructure abnormity monitoring method and device, electronic equipment and a storage medium, and the method comprises the steps: judging whether a target operating system is a loadable operating system or not according to a loadable operating system list, wherein the target operating system comprises an operating system accessing a key information infrastructure of a local machine and/or a local operating system; if yes, monitoring the dynamic operation information of the target operation system in real time, wherein the dynamic operation information comprises subject information, object information, behavior information and/or environment information; and if it is monitored that the dynamic operation information of the target operating system is abnormal, sending a dynamic operation alarm to a supervision server of a supervision mechanism. According to the technical scheme provided by the embodiment of the invention, the dynamic operation information in the key information infrastructure is effectively monitored, and meanwhile, the communication connection with the supervision server of the supervision mechanism is established, so that the supervision mechanism can obtain the abnormal state of each key information infrastructure in time.
Owner:EVERSEC BEIJING TECH

Campus Management System and Method

The invention discloses a campus management system and method, comprising: an image acquisition device for acquiring image information of school personnel; a server comprising: an identity identification module storing a trained first artificial intelligence model for identifying the image information, Obtain the identity information of the school personnel; the behavior recognition module identifies the behavior data of the school personnel according to the image information and the identity information of the school personnel; the classification module stores the trained second artificial intelligence model, and uses the school personnel identity information and the school personnel The personnel behavior data classifies the school personnel; the output module outputs the corresponding management strategy according to the classification results. Through the combination of artificial intelligence technology, the real, reliable, real-time and efficient acquisition of the behavior data of school personnel is carried out; the situation of students in school is classified through artificial intelligence technology, and data support is provided for the improvement of teaching quality and campus security, so that the campus management strategy is aimed at School staff to formulate and implement reasonably and accurately.
Owner:北京华三通信技术有限公司

Identity authentication anti-fraud method and system based on intelligent voice

The invention provides an identity authentication anti-fraud method and system based on intelligent voice. The method comprises the steps of: collecting basic information and behavior data of a user with a to-be-confirmed identity; constructing a user portrait label set; collecting voice interaction call information; performing question feature screening to obtain an answer question set of the user with the to-be-confirmed identity; generating a first comparison result; generating a second comparison result; judging whether the first comparison result and the second comparison result are successfully compared or not; and if the first comparison result and/or the second comparison result are/is not successfully compared, uploading call voiceprint information to a blacklist voiceprint library for voiceprint comparison and screening, and determining the actual identity information of the user with the to-be-confirmed identity. The identity authentication anti-fraud method and system solve the technical problems that in the prior art, identity authentication depends on manpower and a single AI technology, the subjectivity of manual judgment is too high, the fraud confirmation accuracy of the single AI technology is not high, and scientificity is poor.
Owner:百融至信(北京)征信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products