Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

60 results about "Suspicious behaviour" patented technology

Cloud server, application program verification, certification and management system and application program verification, certification and management method

ActiveCN103368987ADoes not affect the life cycle management mechanismImprove experiencePlatform integrity maintainanceTransmissionSafety controlComputer compatibility
The invention provides an application program verification, certification and management system comprising a cloud server and a mobile terminal; the cloud server is used for verifying an application program, acquiring suspicious behavior data of the application program in the verification process, recording the suspicious behavior data to obtain a verification result of the application program and generating a verification description file according to the verification result, wherein the verification description file includes certification data and the verification result of the application program; and the mobile terminal is used for downloading the verification description file of a specified application program from the cloud server and using a corresponding management strategy to carry out safety control on the specified application program according to the verification description file. The system has a reasonable multi-strategy management mechanism, can bring a better real-time safety protection effect and has good compatibility. The invention further provides a cloud server and an application program verification, certification and management method.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Standoff security and real-time vendor verification system and apparatus

A stand-off security checkpoint system and apparatus that enables security officers entrusted with protecting our nations' critical infrastructure or other high risk locations, a means of verifying in real-time, the identity of entrants to a facility. Via a communications system and apparatus that is positioned a safe, stand-off distance away from the entrance to a facility, a person entering a facility exits his vehicle or walks up to a machine housing which is equipped with cameras and sensor equipment. A close up view of the persons' identification as well a picture of the person himself is captured and readied for real-time transmission to security personnel well away from the entrants location at the machine. Via wireless transmitter and receiver equipment, and computer hardware and software arrangements incorporated into the system, the entrant and his identification card can be viewed and verified, from a safe standoff distance by on-site, as well as off-site security screening personnel. The utilization of wireless networks and internet communications networks, along with the machines' physical features and use, creates multiple opportunities to detect suspicious behavior by entrants to facility well before they reach an unsafe distance to the entrance. While in operation, and with the person a safe distance away from the entrance, the system further equipped with sensors to detect metal, chemical and biological substances can also send special alerts to the detection of harmful substances, well before the entrant reaches the entrance to the facility or security checkpoint. By design, the system and apparatus creates a new and effective means of deterring terrorists who may be trying to effect a terrorist infiltration by disguising themselves as officials or vendors. Additionally, the system is designed to be laid out so as to prompt a direct separation of a would-be suicide or truck bomber from his vehicle. This can greatly deter his desire to effect an attack at that location, as the chances for nullification and or the detection of suspicious activity by security officers operating the system, well before he reaches his location are greatly in odds against him.
Owner:TRELA RICHARD STEVEN

College student management system based on face recognition technology

InactiveCN111754669AEnsure safetyWith real-time supervision and early warning functionData processing applicationsCharacter and pattern recognitionEngineeringSuspicious behaviour
The invention discloses a college student management system based on a face recognition technology. The system comprises a student information subsystem, a data analysis subsystem, an intelligent attendance subsystem, a matching subsystem, a face-scanning payment subsystem, a safety supervision subsystem and an intelligent passage subsystem. A student information database for storage is established; the recognized image data are matched through a face recognition technology, image preprocessing, a feature face matching algorithm and the like so as to be used for face-scanning payment, intelligent passage, data analysis and the like; a safety supervision subsystem is constructed, a behavior judgment module is designed, and early warning is performed on suspicious behaviors and sudden emergency abnormal conditions by adopting a suspicious behavior recognition model based on case-based reasoning; a data analysis technology and a data analysis tool are used to carry out visual data analysis on life and various aspects of students. According to the invention, colleges and universities are helped to manage students more intelligently and conveniently, a lot of human resources are saved,the management efficiency is improved, and the safety of students is effectively guaranteed to a certain extent.
Owner:GUILIN UNIVERSITY OF TECHNOLOGY

Real-time monitoring platform based on government affair application security

InactiveCN112104659AReal-time monitoring of government application dataQuick discoveryData processing applicationsTransmissionPrivate networkSuspicious behaviour
The invention relates to the technical field of government affair application security monitoring, and discloses a government affair application security-based real-time monitoring platform, which comprises a government affair big data center, a government affair application situation awareness analysis system, log acquisition equipment and flow auditing equipment, wherein the log acquisition equipment and the traffic auditing equipment acquire data from a government affair private network in a distributed manner and are connected to the government affair big data center; the government affairapplication situation awareness analysis system analyzes, models and learns a user of a government affair application based on data stored in a government affair big data center, thereby constructingnormal states of the user in different scenes and forming a baseline, and monitoring a current behavior of the user in real time. Suspicious behaviors existing in the user, the system and the equipment are discovered in time through the constructed rule model, the statistical model, the machine learning model and the unsupervised clustering analysis. According to the invention, the problems of lack of a real-time monitoring mechanism, incapability of timely analyzing threat elements and incapability of timely discovering abnormal behaviors in the current government affair application are solved.
Owner:宋清云
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products