Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

101 results about "Process behavior" patented technology

PROCESS OF BEHAVIOUR. We assume that behaviour is caused and this assumption is true. Behaviour takes place in the form of a process. It is based on the analysis of behaviour process over the period of time.

Client simulator and method of operation for testing PSTN-to-IP network telephone services for individual & group internet clients prior to availability of the services

A client simulator for simulating client behavior in groups or individuals to telephone services in a test system for testing telephone services between subscribers in a PSTN and clients in a distributed information network, for example, the Internet (IP Network), prior to availability of the telephone services to the subscribers and clients. A processor is coupled to a TCP/IP data network linked to the PSTN via a System Control Point (SCP) and the IP Network via an application server. A storage means is coupled to the processor through input/output registers and includes stored instruction for a parent process and a pool of client processes. e storage means further includes: a) a test input data file which contains client behavior profiles of either groups or individual client processes to call data messages; b) a logger queue file which allows the parent process to write event messages indicating start or stopped client processes with time stamp; c) a client information file which contains information and data for the total number of processes identified as being part of the test; d) a stopped client file used to track client processes that have stopped. The parent process is responsible for reading the test input data file and passing the client process behavior profile to the client processes. Each client process is responsible for returning state information to the PSTN; call handling actions and providing call handling statistics. The client process includes a client behavior control functions which processes and maintains the behavior parameters passed by the parent process. The behavior function, inter alia, accepts the call message, forward the call message according to the client behavior profile. The client process further includes a send/receive function to read and write to the registers coupled to the TCP/IP data network and support voice over IP protocols. A test originated by the PSTN is passed to the test input data file by the SCP and application file. The parent processes passes the call message to the client process. The client process provides a variety of call handling options including (a) accepting the call on the client's PC; sending a voice message to the caller. The call data messages responses are sent back to the SCP through the application server. The SCP directs the PSTN on how to handle the message call response.
Owner:LINKEDIN

Kernel hook based process behavior monitoring method

The invention relates to a kernel hook based process behavior monitoring method. Firstly a monitoring program is started and whether a user loads a driving program is judged, if the user does not load the driving program, the user is prompted to load the driving program, then initialization operation is performed, and the monitoring program sends a process ID of the monitoring program to the driving program through DeviceIoControl and performs process protection; the monitoring program selects a monitored process and creates a message receiving thread for receiving a message of the driving program; the driving program monitors behaviors of the monitored process and sub-processes, and sends a monitoring result to the monitoring program; the message receiving thread of the monitoring program displays and records the received monitoring result; and when the monitored process and the sub-processes are all exited or the monitoring program selects stopping of monitoring, the monitored process and the sub-processes are ended, the message receiving thread of the monitoring program is exited, the current monitoring is ended, and the steps are repeated for performing a new round of monitoring. According to the method, the occurrence of malicious process behaviors can be effectively prevented.
Owner:FUZHOU BOKE WANGAN INFORMATION TECH CO LTD

Document leak protecting and tracking system

ActiveCN108121914AReal-time inspection and identification of stolenExamine and identify compromised behavior in real timeDigital data protectionPlatform integrity maintainanceBehavioral analyticsOperational system
The invention discloses a document leak protecting and tracking system which comprises a management module, a sensitive word matching module, a monitoring module, a behavior analysis module, a Trojansandbox module and an early warning analysis module, wherein the management module is used for setting sensitive word configuration information of the protecting and tracking system and user-defined rules as well as issuing planning tasks of document scanning and matching sensitive words for each host operating system; the sensitive word matching module is used for matching documents accessed by all processes for each host operating system as well as recognizing whether configuration key words exist in the documents or not; the monitoring module is used for monitoring local directories and files in real time and controlling access process behaviors of the local directories and files; the behavior analysis module is used for analyzing various behaviors of file access processes; the Trojan sandbox module is used for simulating and backtracking process behavior events with leak behaviors so as to recognize Trojan leak and Trojan outbreak; and the early warning analysis module is used forintercepting and early-warning all host clients when Trojan stealing behaviors are found. The system disclosed by the invention can be used for backtracking leaked and stolen sensitive files in computers as well as recognizing leaking and stealing modes.
Owner:四川神虎科技有限公司

Process behavior-based platform integrity state information measurement method

ActiveCN108399338AImprove integrity measurement efficiencyEasy to measurePlatform integrity maintainanceComputer hardwareGranularity
The invention discloses a process behavior-based platform integrity state information measurement method. The method comprises the following steps of 1, capturing a measurement request of an application layer, and extracting a measurement object from an application; 2, analyzing a running state and an executive parameter of the application, and collecting process behavior information related to the measurement object; 3, according to a behavior characteristic, judging whether a current measurement result is added to a measurement list or not, and collecting the process behavior information related to the measurement object in the measurement list; 4, storing the measurement result in a specific PCR of a trusted platform module through expansion operation, generating a measurement report and sending the measurement report to a log audit mechanism of the application layer; and 5, according to the measurement list, a measurement log and the measurement result stored in the PCR, verifyingand calculating integrity state information of the platform. According to the higher-granularity integrity state information measurement method provided by the invention, the reflected to-be-verifiedand calculated security attribute information of the platform is more accurate, so that the measurement efficiency can be improved.
Owner:NANJING UNIV OF AERONAUTICS & ASTRONAUTICS

Novel combat effectiveness simulation modeling method

The invention discloses a novel combat effectiveness simulation modeling method, and the problems that a simulation model in combat effectiveness simulation is difficult to combine, reuse, expand andevolve, and a decision behavior model lacks flexibility and problem pertinence are solved. On the one hand, the method emphasizes clear distinction between two levels of knowledge including domain commonness non-variable knowledge and application variable knowledge of the combat effectiveness simulation, and describing the two levels of the knowledge separately; the domain commonness non-variableknowledge is applicable to the entire combat effectiveness field, accordingly a field abstract model is established; the application variable knowledge depends on specific combat effectiveness assessment questions, and an application-specific model which can be instantiated and deployed is established on the basis of the field abstract model. On the other hand, the method emphasizes the distinction between physical process behaviors of weapons and cognitive decision-making behaviors of combat commanders, the cognitive decision-making behaviors compared with the physical process behaviors havegreat difference in different applications according to missions and different choices of the commanders, and dynamic flexibility of the cognitive decision-making behaviors and pertinent expression ofquestions are realized by means of a script technology and a meta-modeling technology.
Owner:NAT UNIV OF DEFENSE TECH

Service analysis based automatic test case generation system and method

ActiveCN106201899AIncrease productivityEffective Business Test Analysis ProcessSoftware testing/debuggingProcess behaviorSystem under test
The invention relates to a service analysis based automatic test case generation system and method. The service analysis based automatic test case generation system comprises a service analysis layer for determining the will of service achievement and clarifying a judgement criterion of the system, a system structure analysis layer for analyzing program elements, operating timing sequence and a detection object of a tested system and clarifying a program verification model for system testing, a testing design layer for performing test point analysis management and test data analysis management, an automatic test case generation engine for converting tested and analyzed data into test cases. By the adoption of the system and method, the problem that business personnel do not know techniques and accordingly 'demand distortion' of software design is caused, and the phenomenon that software function design does not meet the demand of service intent and accordingly frequent reworking is caused is avoided. The process behaviors of service, design and testing analysis are recorded through unified management practices and sediment to form properties of the software design process, and the service analysis based automatic test case generation system has a wide application range.
Owner:PRIMETON INFORMATION TECH

Attack chain behavior analysis based Trojan horse detection method and system

The invention relates to network safety and aims at providing an attack chain behavior analysis based Trojan horse detection method and system. The attack chain behavior analysis based Trojan horse detection system comprises a DNS domain name anomaly detection module, a Trojan horse incubation behavior anomaly detection module and a Trojan horse communication behavior anomaly detection module andcan perform anomaly detection on three behavior processes, including, a Trojan horse connection process, a Trojan horse incubation process and a Trojan horse communication process, in a Trojan horse permeation attacking process; when the anomaly detection condition of the Trojan horse connection process, the Trojan horse incubation process and the Trojan horse communication process is met, a factthat a Trojan horse is detected is confirmed and the Trojan horse detection is realized. By performing sequential associated analysis on the three Trojan horse behavior processes, including, the Trojan horse connection process, the Trojan horse incubation process and the Trojan horse communication process, the comprehensive and efficient Trojan horse detection method and system are provided respectively based on the behavior features of the three Trojan horse processes, the accuracy of Trojan horse detection is enabled to be higher, and the missing report rate is enabled to be lower.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

User mining method, apparatus and device

The invention provides a user mining method, apparatus and device. The method comprises the steps of processing historical behavior information of a user to obtain a frequent item set containing multiple groups of associated behaviors; processing behavior information in a preset time of the current user according to the frequent item set, calculating a support degree and a confidence degree corresponding to each group of the associated behaviors of the current user, and screening out at least one group of target associated behaviors meeting a condition according to a preset threshold; calculating first associated parameters and second associated parameters of the current user according to target behavior information related to the target associated behaviors and triggering parameters corresponding to the target behavior information; and processing the first associated parameters and the second associated parameters according to a preset algorithm to obtain a processing result, and determining whether the current user is a target user or not according to the processing result and a preset threshold. The target user can be accurately mined, and future possible behaviors of the user can be accurately predicted, so that commodities liked by the user are recommended, the search experience of the user is improved, and the conversion rate of a merchant is increased.
Owner:绿湾网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products