Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

238 results about "Intercept method" patented technology

The intercept method, also known as Marcq St. Hilaire method, is an astronomical navigation method of calculating an observer's position on earth. It was originally called the azimuth intercept method because the process involves drawing a line which intercepts the azimuth line. This name was shortened to intercept method and the intercept distance was shortened to 'intercept'.

Unmanned aerial vehicle trapping interception system based on electromagnetic interference and trapping interception method thereof

InactiveCN106569511ARealize decoy interceptionRealize soft killing, trapping and interceptionControl using feedbackSatellite radio beaconingTrappingElectromagnetic interference
The invention discloses an unmanned aerial vehicle trapping interception system based on electromagnetic interference and a trapping interception method thereof. The trapping interception system comprises a control host, a target searching tracking device and a trapping jammer. The target searching tracking device is used for detecting position information of a suspicious target in a protection airspace and video information and sending to the control host. The control host is used for determining whether the suspicious target is an unmanned aerial vehicle target according to the video information. If the suspicious target is the unmanned aerial vehicle target, according to the position information of the unmanned aerial vehicle target, the trapping jammer is controlled to emit an electromagnetic interference signal to the unmanned aerial vehicle target so as to realize trapping interception to the unmanned aerial vehicle target. In the invention, through using the electromagnetic interference signal, the trapping interception to the unmanned aerial vehicle is realized and soft killing trapping interception of the unmanned aerial vehicle is realized too. New defense means are provided for relieving a security threat caused by a low, slow and small unmanned aerial vehicle. And a secondary damage caused through using a traditional interception net, a laser and other hard killing interception modes is avoided.
Owner:BEIJING INST OF RADIO MEASUREMENT

Guidance unmanned aerial vehicle net cast interception method for "low-altitude, slow-speed and small" target

The invention relates to a guidance unmanned aerial vehicle net cast interception method for a "low-altitude, slow-speed and small" target. The guidance unmanned aerial vehicle net cast interception method comprises the steps that an unmanned aerial vehicle is set as the standby state; a ground control station determines a threat target and controls photoelectric detection equipment to perform dynamic tracking on the threat target; the ground control station acquires the location of the threat target and transmits a flight instruction to the unmanned aerial vehicle; and the unmanned aerial vehicle enters the maneuvering flight mode and reaches the area near the target. When the distance between the unmanned aerial vehicle and the target is less than a first threshold, the unmanned aerial vehicle is controlled to accurately approximate the target through a visual guidance device and a distance measurement device. When the distance between the unmanned aerial vehicle and the target is less than a second threshold, a net cast device is automatically triggered to emit an interception net to wind the target to fall off and finally the unmanned aerial vehicle returns. With application of the method, the net cast device is automatically triggered to intercept the target according to the relative location information between the unmanned aerial vehicle and the target so that the interception precision and the degree of automation can be effectively enhanced.
Owner:BEIJING MECHANICAL EQUIP INST

Short message intercepting method and device and cloud server

The invention provides a short message intercepting method and device and a cloud server. The short message intercepting method comprises the steps that short messages uploaded by the short message intercepting device are received; word segmentation processing is conducted on text content of the short messages, and key words of the text content are obtained; first probability weighted values of all the key words belonging to junk short messages and second probability weighted values of all the key words belonging to normal short messages are obtained; a first joint probability of all the first probability weighted values of the key words and a second joint probability of all the second probability weighted values of the key words are obtained; whether the short messages are junk short messages or not is determined according to the first joint probability and the second joint probability; informing information is sent to the short message intercepting device, wherein the informing information comprises the information for judging whether the short messages belong to information of junk short messages or not so that the short message intercepting device can determine whether to intercept the short messages currently received or not according to the informing information. The short message intercepting method can solve the problems that in the prior art, the junk short message recognition rate and intercepting efficiency are low, and cost is high.
Owner:BEIJING QIHOO TECH CO LTD +1

Application behavior intercepting method and application behavior intercepting device

An embodiment of the invention provides an application behavior intercepting method and an application behavior intercepting device. The method comprises the following steps of transmitting corresponding inquiry information to an application after dangerous operation information of the application is intercepted by an intercepting module which is injected into a system service process in advance; popping a corresponding prompt box by using the application according to the inquiry information; receiving confirmation information of a corresponding operation inputted by a user; returning the confirmation information to the intercepting module; and allowing or stopping a dangerous operation of the system service process on the application by using the intercepting module according to the received confirmation information. By the method and the device, behaviors of the application can be intercepted effectively; after the behaviors of the application are intercepted, the corresponding operation is stopped temporarily, the temporary stopping operation is notified to the user, the corresponding operation only can be carried out after the confirmation information of the user is obtained, so that the leakage possibility of data information and individual privacy information which are stored in the application is reduced, the safety of personal data is improved, and the user experience is also improved.
Owner:BEIJING QIHOO TECH CO LTD

Initiative intercept method and initiative intercept device for malicious program and client end equipment

ActiveCN103020526AImprove accuracyAvoid the problem of low killing accuracyPlatform integrity maintainanceExecution unitData needs
The invention discloses an initiative intercept method and an initiative intercept device for a malicious program and client end equipment. The initiative intercept device for the malicious program comprises an intercept object selection unit, an intercept information setting unit, an intercept point monitoring unit and an intercept execution unit, wherein the intercept object selection unit is suitable for selecting an intercept object needs to be intercepted according to an access mode of a client end to key input data; the intercept information setting unit is suitable for arranging intercept execution information aiming at the intercept object in an application layer and/or a drive layer; the intercept point monitoring unit is suitable for acquiring information of a key input data accessing program when the key input data is monitored; the intercept execution unit is suitable for judging whether the program is safe according to the information of the program, if so, the program is allowed to call the key input data, if not, the program is intercepted, wherein the intercept point monitoring unit is suitable for judging whether the monitored key input data is data needs to be protected before the information of the key input data assessing program is acquired, if so, the information of the key data assessing program is acquired, and if not, the operation is finished.
Owner:BEIJING QIHOO TECH CO LTD

File system operation intercepting method based on event monitoring mechanism

The invention relates to a file system operation intercepting method based on an event monitoring mechanism. The method comprises the following steps: a supervisor program which is trusted by a user calls function iauth_init to start the intercept service, and the function returns a file descriptor; the supervisor program calls function iauth_add_watch to monitor the key part of a system, and when the function is called, the supervisor program is required to specify a call back function so as to judge whether an access is illegal; when other application programs try to read and write monitored files, the call back function provided by the supervisor program can be called and decides the validity of the reading and writing so as to judge whether to let the reading and writing to pass or reject the reading and writing, and the action can lead the file operation of the application program which is tried to be read and written to be successful or failed. The invention has the advantages that the method provides user-friendly system call to lead a system manager to arbitrarily add monitoring, intercepting and preventing functions to the file system operation of the computer. The function can provide convenience for the application software on the system security aspect.
Owner:INSIGMA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products