CN106331362A - Mobile phone theft prevention method based on built-in acceleration sensor - Google Patents

Mobile phone theft prevention method based on built-in acceleration sensor Download PDF

Info

Publication number
CN106331362A
CN106331362A CN201610813949.2A CN201610813949A CN106331362A CN 106331362 A CN106331362 A CN 106331362A CN 201610813949 A CN201610813949 A CN 201610813949A CN 106331362 A CN106331362 A CN 106331362A
Authority
CN
China
Prior art keywords
mobile phone
stolen
data
user
acceleration sensor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610813949.2A
Other languages
Chinese (zh)
Inventor
郇战
李晨
万彩艳
朱乾龙
耿宏杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou University
Original Assignee
Changzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou University filed Critical Changzhou University
Priority to CN201610813949.2A priority Critical patent/CN106331362A/en
Publication of CN106331362A publication Critical patent/CN106331362A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Abstract

The invention discloses a mobile phone theft prevention method based on a built-in acceleration sensor, which belongs to the technical field of safety. Firstly, the intelligent mobile phone of a user is trained, the user puts the mobile phone in a pocket or other place, after a period of time of movement, the mobile phone acceleration sensor acquires personal feature information, and the mobile phone can recognize the identity of the owner through the feature information; and if the mobile phone is stolen, an illegal person carries the mobile phone to move, the mobile phone can recognize the mobile phone is stolen, an alarm is given instantly, the user is reminded that the mobile phone is stolen, and the mobile phone sends the geographical position of the stolen mobile phone to a bound mobile phone. Thus, when the mobile phone is stolen, an alarm can be given for positioning, and a great role is played in subsequent mobile phone tracking.

Description

A kind of anti-theft method of mobile phone based on built-in acceleration sensor
Technical field
The invention belongs to technical field of burglary prevention, be specifically related to a kind of antitheft mobile phone side based on built-in acceleration sensor Method.
Background technology
Along with the development of mobile Internet, mobile phone has become as that people are daily just live in a requisite part, with Time hands also store substantial amounts of individual privacy data, such as note, photo etc..Along with the population in city increases, many public arenas Crowded to capacity, hand-set from stolen also happens occasionally, and once mobile phone private data leak, and brings sternly to the Working Life of client Ghost image rings.
For this social reality, the various electronic products of all kinds of antitheft mobile phones and theft preventing method arise at the historic moment, wherein A part is the portable security alarm device being associated with mobile phone, although this anti-theft device has instantaneity, but not very convenient, Because when mobile phone is away from the certain scope of device, and device will be reported to the police.Device is once omitted, and does not just have antitheft effect, and And buy the expense that device needs are extra.Another part is that mobile phone self arranges password, and once code error will be reported to the police, to association Mobile phone sends positional information, although can recover mobile phone, but be a lack of ageing, when mobile phone is recovered, information may be let out already Dew.
Along with the progress in epoch, the development of science and technology, smart mobile phone increasingly " intelligent ".Interior of mobile phone of today is self-contained Various sensors, such as acceleration transducer, gyroscope, Magnetic Sensor etc..It is engraved in during these sensors and records cellphone subscriber Individual behavior, everyone individual behavior is unique, can carry out the identification of personnel according to these data.
Summary of the invention
For this social phenomenon of hand-set from stolen, the present invention utilizes smart mobile phone that cellphone subscriber is carried out the identification of identity, Can identify immediately when the carrier of mobile phone changes, and send alarm.Additionally smart mobile phone itself can containing GPS module To position accurately, it is possible to send the position of stolen mobile phone in real time to association mobile phone.
Realize technical scheme as follows:
A kind of anti-theft method of mobile phone based on built-in acceleration sensor, is first trained the smart mobile phone of user, Mobile phone is placed on pocket, or other positions by user, and a period of time of moving allows mobile phone acceleration sensor obtain individual Characteristic information so that mobile phone can identify mastership by these characteristic informations;If hand-set from stolen is stolen, lawbreaker takes Band mobile phone is walked about, and mobile phone i.e. may recognize that hand-set from stolen, sends alarm immediately, reminds user mobile phone stolen, and mobile phone starts to tying up Determine mobile phone and send the geographical position of stolen mobile phone.
Further, the concrete steps of described method include:
(1) firstly the need of user's carrying mobile phone segment distance that moves as slowly walked, record what acceleration transducer recorded The data of user;
(2) user data utilizing Kalman filtering to obtain step (1) processes;Filtering relational expression is as follows:
X (k | k-1)=A*X (k-1 | k-1)+B*U (k)
P (k | k-1)=A*P (k-1 | k-1) * A'+Q
Kg (k)=P (k | k-1) * H'/(H*P (k | k-1) H'+R)
X (k | k-1)=X (k | k-1)+Kg (k) * (Z (k)-H*X (k | k-1))
P (k | k)=(I-Kg (k) * H) * P (k | k-1)
Wherein, X (k | k-1) is the result utilizing laststate to predict, X (k-1 | k-1) is the result that laststate is optimum, U (k) be the controlled quentity controlled variable controlled quentity controlled variable here of status praesens be 0;A, B are the parameter of Multi-model System.
P (k | k-1) is the covariance that X (k | k-1) is corresponding, and P (k-1 | k-1) is the covariance that X (k-1 | k-1) is corresponding, A ' Representing the transposed matrix of A, Q is the covariance of systematic procedure.
KgK () is the gain of Kalman, R, for measuring variance, reacts the certainty of measurement of acceleration transducer;
Z (k) represents the measured value in k moment;
(3) utilizing temporal signatures to be identified, the parameter of use includes cycle maximum averageDegree of bias S, quartile Away from IQR, correlation coefficient C, concrete calculation expression is as follows.
The meansigma methods of cycle maximumExpression formula:
X ‾ = Σ 1 n I m a x n
Wherein ImaxFor the peak value in single cycle, n is the number of peak value;
Degree of bias S is data skew direction and degree, its expression formula:
S = 1 N Σ 1 N ( a i - a σ ) 3
aiThe data that sensor records, i=1,2,3 ..., N, N are data amount check;A is the meansigma methods of N number of data measured; σ is the standard deviation of data measured;
Interquartile-range IQR IQR expression formula:
Q j = b k j + ( b k j + 1 - b k j ) r j
IQR=Q3-Q1
Data aj are descending is ordered as bj, j=1,2 ..., N;The position of quartile is Pj=1+ (N-1) j/4, j (=1,2,3) are a point position number, kjFor PjInteger part, rj is fractional part;
Cross-correlation coefficient C expression formula:
Cxyz=COV (x, y, z)/(σxσyσz)
In formula: (x, y, z) be x to COV, y, the covariance of z-axis acceleration;σxy, σzFor x, y, the standard of z-axis acceleration Difference.
(4) use decision tree that eigenvalue carries out classification to judge;After decision tree T builds, estimate predictive value, identify user Identity;
(5) if hand-set from stolen is stolen, lawbreaker's carrying mobile phone is walked about, and mobile phone i.e. may recognize that the identity letter of lawbreaker Ceasing inconsistent with mobile phone mastership information, it is judged that hand-set from stolen, mobile phone starts to send the ground of stolen mobile phone to binding mobile phone Reason position, and send alarm, remind user mobile phone stolen.
Further, decision tree described in described step (4) is to be built by calculating entropy, and described entropy expression formula is:
E n t r o y = - Σ i = 1 n p ( i ) * log 2 p ( i )
Wherein p (i)=the i-th class number/total number.
Further, described step (4) being estimated, predictive value is by estimating that the normal distribution of an accuracy rate is interval, it is thus achieved that Data are reasonably classified behind interval by normal distribution, distinguish mobile phone carrier identity information.
Further, the confidence interval of described normal distribution solves as follows:
1) by acc standardization, i.e.Acc=X/N;N is just predicting for record data, X True record number;
2) select confidence level a, obtain statistic Z of accurate normal distribution corresponding for a/2 with 1-a/2a/2,Z1-a/2Take off Face, about the inequality of p, obtains the confidence interval of p:
- Z a / 2 ≤ ( a c c - p ) / p * ( 1 - p ) / N ≤ Z 1 - a / 2 .
Beneficial effects of the present invention:
1, the present invention is cheap need not extra sensor device, it is only necessary to the acceleration sensing that smart mobile phone is built-in Device just can complete above function.
2, the present invention combines the identification of identity mobile phone can be allowed to have the function of autonomous entity identification, antitheft relative to other Measure has certain instantaneity, and once mobile phone carrier is changed, and mobile phone sends alarm immediately, and positions, to follow-up Effect greatly is played in the tracking of mobile phone.
Accompanying drawing explanation
Fig. 1 is the original user data schema that the present invention extracts;
The user data that Fig. 2 is original be filtered after figure.
Detailed description of the invention
General user can be placed on mobile phone in pocket, the acceleration number of degrees of the user that mobile phone acceleration sensor collects According to, obtain the data of user, then logarithm carries out the extraction of feature, if average, maximum, variance etc. are as the characteristic point of user, By decision tree, characteristic is sorted out, to identify user identity.Then the GPS module utilizing smart mobile phone integrated is entered Row location.
First being trained the smart mobile phone of user, mobile phone can be placed on pocket, or other positions by user Put, and a period of time that needs to move can allow mobile phone acceleration sensor obtain enough personal characteristic information so that hands Machine can identify mastership by these characteristic informations, if stolen, lawbreaker's carrying mobile phone is walked about, mobile phone Identifying hand-set from stolen, send alarm immediately, remind user mobile phone stolen, mobile phone starts to send stolen mobile phone to binding mobile phone Geographical position.Specifically comprise the following steps that
(1) firstly the need of user's carrying mobile phone segment distance that moves as slowly walked, record what acceleration transducer recorded The data of user.
(2) obtaining data from previous step is primary data, and the interference of data is more, and there is substantial amounts of burr, such as Fig. 1 institute Showing, needing after filtering, filtered signal is rounder and more smooth, effect such as Fig. 2.
The filtering method that the present invention uses is Kalman filtering.Filtering relational expression is as follows:
X (k | k-1)=A*X (k-1 | k-1)+B*U (k) (1)
P (k | k-1)=A*P (k-1 | k-1) * A'+Q (2)
Kg (k)=P (k | k-1) * H'/(H*P (k | k-1) H'+R) (3)
X (k | k-1)=X (k | k-1)+Kg (k) * (Z (k)-H*X (k | k-1)) (4)
P (k | k)=(I-Kg (k) * H) * P (k | k-1) (5)
In formula (1), X (k | k-1) is the result utilizing laststate to predict, X (k-1 | k-1) is the knot that laststate is optimum Really, U (k) be the controlled quentity controlled variable controlled quentity controlled variable here of status praesens be 0;A and B is Multi-model System parameter.
In formula (2), P (k | k-1) is the covariance that X (k | k-1) is corresponding, and P (k-1 | k-1) is the association that X (k-1 | k-1) is corresponding Variance, A ' represents the transposed matrix of A, and Q is the covariance of systematic procedure.
In formula (3), Kg(k): for the gain of Kalman, R, for measuring variance, reacts the certainty of measurement of acceleration transducer.
In formula (4), Z (k) expression is the measured value in k moment.
Formula (1), (2) are the first two in the middle of 5 formula of Kalman filter, the namely prediction to system.Formula (3) (4) in (5), I, H are the matrix of 1.
(3) filtered figure has the obvious cycle, and the present invention runs in view of cell phone processor computing energy at interior of mobile phone Power is more weak, so mainly using temporal signatures to be identified, has used cycle maximum averageDegree of bias S, interquartile-range IQR IQR, correlation coefficient C, concrete calculation expression is as follows.
The meansigma methods of cycle maximumExpression formula:
X ‾ = Σ 1 n I m a x n
Wherein ImaxFor the peak value in single cycle, n is the number of peak value.
Degree of bias S is data skew direction and degree, its expression formula:
S = 1 N Σ 1 N ( a i - a σ ) 3
aiThe data that sensor records, i=1,2,3 ..., N, N are data amount check;A is the meansigma methods of N number of data measured; σ is the standard deviation of data measured.
Interquartile-range IQR IQR expression formula:
Q j = b k j + ( b k j + 1 - b k j ) r j
IQR=Q3-Q1
Data ajDescending it is ordered as bj, j=1,2 ..., N.The position of quartile is Pj=1+ (N-1) j/4, j (=1,2,3) are a point position number, kjFor PjInteger part, rj is fractional part.
Cross-correlation coefficient C expression formula:
Cxyz=COV (x, y, z)/(σxσyσz)
In formula: (x, y, z) be x to COV, y, the covariance of z-axis acceleration;σxy, σzFor x, y, the standard of z-axis acceleration Difference.
(4) use decision tree that eigenvalue carries out classification to judge, identify identity.Decision tree builds according to " purity ", this Invent and built by calculating entropy, entropy expression formula:
E n t r o y = - Σ i = 1 n p ( i ) * log 2 p ( i )
Wherein p (i)=the i-th class number/total number.
After decision tree T builds, estimation predictive value, the accuracy rate estimated by sample, but the deviation of there will be likely some, So the present invention uses the method comparing science, it is the interval estimating an accuracy rate, it is thus achieved that just data are closed behind interval The classification of reason.
The confidence interval being distributed the most very much solves as follows:
1) by acc standardization, i.e.Acc=X/N.N is just predicting for record data, X True record number
2) select confidence level a, obtain statistic Z of accurate normal distribution corresponding for a/2 with 1-a/2a/2,Z1-a/2Take off Face, about the inequality of p, obtains the confidence interval of p.
- Z a / 2 ≤ ( a c c - p ) / p * 1 - p / N ≤ Z 1 - a / 2
After obtaining interval, it is possible to reasonably classify data, the classification results of last synthetic data, differentiation is sold Machine carrier identity information.
(5) if hand-set from stolen is stolen, lawbreaker's carrying mobile phone is walked about, and mobile phone i.e. may recognize that the identity letter of lawbreaker Ceasing inconsistent with mobile phone mastership information, it is judged that hand-set from stolen, mobile phone starts to send the ground of stolen mobile phone to binding mobile phone Reason position, and send alarm, remind user mobile phone stolen.
The a series of detailed description of those listed above is only for the feasibility embodiment of the present invention specifically Bright, they also are not used to limit the scope of the invention, all equivalent implementations made without departing from skill of the present invention spirit Or change should be included within the scope of the present invention.

Claims (5)

1. an anti-theft method of mobile phone based on built-in acceleration sensor, it is characterised in that the first smart mobile phone to user Being trained, mobile phone is placed on pocket, or other positions by user, and a period of time of moving allows mobile phone acceleration sensor Obtain personal characteristic information so that mobile phone can identify mastership by these characteristic informations;If hand-set from stolen is stolen, disobey Legal person person's carrying mobile phone is walked about, and mobile phone i.e. may recognize that hand-set from stolen, sends alarm immediately, reminds user mobile phone stolen, mobile phone Start to send the geographical position of stolen mobile phone to binding mobile phone.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 1, it is characterised in that institute The concrete steps stating method include:
(1) firstly the need of user's carrying mobile phone segment distance that moves as slowly walked, the user that acceleration transducer records is recorded Data;
(2) user data utilizing Kalman filtering to obtain step (1) processes;Filtering relational expression is as follows:
X (k | k-1)=A*X (k-1 | k-1)+B*U (k)
P (k | k-1)=A*P (k-1 | k-1) * A'+Q
Kg (k)=P (k | k-1) * H'/(H*P (k | k-1) H'+R)
X (k | k-1)=X (k | k-1)+Kg (k) * (Z (k)-H*X (k | k-1))
P (k | k)=(I-Kg (k) * H) * P (k | k-1)
Wherein, X (k | k-1) is the result utilizing laststate to predict, X (k-1 | k-1) is the result that laststate is optimum, U (k) Controlled quentity controlled variable controlled quentity controlled variable here for status praesens is 0;A, B are the parameter of Multi-model System.
P (k | k-1) is the covariance that X (k | k-1) is corresponding, and P (k-1 | k-1) is the covariance that X (k-1 | k-1) is corresponding, and A ' represents A Transposed matrix, Q is the covariance of systematic procedure.
KgK () is the gain of Kalman, R, for measuring variance, reacts the certainty of measurement of acceleration transducer;
Z (k) represents the measured value in k moment;
(3) utilizing temporal signatures to be identified, the parameter of use includes cycle maximum averageDegree of bias S, interquartile-range IQR IQR, correlation coefficient C, concrete calculation expression is as follows.
The meansigma methods of cycle maximumExpression formula:
X ‾ = Σ 1 n I m a x n
Wherein ImaxFor the peak value in single cycle, n is the number of peak value;
Degree of bias S is data skew direction and degree, its expression formula:
S = 1 N Σ 1 N ( a i - a σ ) 3
aiThe data that sensor records, i=1,2,3 ..., N, N are data amount check;A is the meansigma methods of N number of data measured;σ is for surveying Obtain the standard deviation of data;
Interquartile-range IQR IQR expression formula:
Qj=bkj+(bkj+1-bkj)rj
IQR=Q3-Q1
Data ajDescending it is ordered as bj, j=1,2 ..., N;The position of quartile is Pj=1+ (N-1) j/4, j (=1, 2,3) for a point position number, kjFor PjInteger part, rjFor fractional part;
Cross-correlation coefficient C expression formula:
Cxyz=COV (x, y, z)/(σxσyσz)
In formula: (x, y, z) be x to COV, y, the covariance of z-axis acceleration;σxyzFor x, y, the standard deviation of z-axis acceleration.
(4) use decision tree that eigenvalue carries out classification to judge;After decision tree T builds, estimate predictive value, identify user's body Part;
(5) if hand-set from stolen is stolen, lawbreaker's carrying mobile phone is walked about, mobile phone i.e. may recognize that the identity information of lawbreaker with Mobile phone mastership information is inconsistent, it is judged that hand-set from stolen, and mobile phone starts to send the geographical position of stolen mobile phone to binding mobile phone Put, and send alarm, remind user mobile phone stolen.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 2, it is characterised in that institute Stating decision tree described in step (4) is to be built by calculating entropy, and described entropy expression formula is:
E n t r o y = - Σ i = 1 n p ( i ) * log 2 p ( i )
Wherein p (i)=the i-th class number/total number.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 2, it is characterised in that institute State and step (4) being estimated, predictive value is by estimating that the normal distribution of an accuracy rate is interval, it is thus achieved that be right behind normal distribution interval Data are reasonably classified, and distinguish mobile phone carrier identity information.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 4, it is characterised in that institute The confidence interval stating normal distribution solves as follows:
1) by acc standardization, i.e.Acc=X/N;N is record data, and X prediction is correct Record number;
2) select confidence level a, obtain statistic Z of accurate normal distribution corresponding for a/2 with 1-a/2a/2,Z1-a/2Solve and close below In the inequality of p, obtain the confidence interval of p:
- Z a / 2 ≤ ( a c c - p ) / p * ( 1 - p ) / N ≤ Z 1 - a / 2 .
CN201610813949.2A 2016-09-09 2016-09-09 Mobile phone theft prevention method based on built-in acceleration sensor Pending CN106331362A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610813949.2A CN106331362A (en) 2016-09-09 2016-09-09 Mobile phone theft prevention method based on built-in acceleration sensor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610813949.2A CN106331362A (en) 2016-09-09 2016-09-09 Mobile phone theft prevention method based on built-in acceleration sensor

Publications (1)

Publication Number Publication Date
CN106331362A true CN106331362A (en) 2017-01-11

Family

ID=57787084

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610813949.2A Pending CN106331362A (en) 2016-09-09 2016-09-09 Mobile phone theft prevention method based on built-in acceleration sensor

Country Status (1)

Country Link
CN (1) CN106331362A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111479060A (en) * 2020-04-15 2020-07-31 Oppo广东移动通信有限公司 Image acquisition method and device, storage medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6741851B1 (en) * 1999-10-30 2004-05-25 Samsung Electronics Co., Ltd. Method for protecting data stored in lost mobile terminal and recording medium therefor
CN1753524A (en) * 2004-09-24 2006-03-29 华为技术有限公司 Intelligent alarming method of personal mobile terminal
CN101719955A (en) * 2009-11-26 2010-06-02 中山大学 Intelligent terminal system with fingerprint identification and information processing method
CN202121665U (en) * 2011-05-24 2012-01-18 深圳辉烨通讯技术有限公司 Automatic antitheft mobile phone
CN202196477U (en) * 2011-08-09 2012-04-18 叶斌 Anti-theft alarm device with behavioural analysis ability
CN202503577U (en) * 2012-03-30 2012-10-24 上海华勤通讯技术有限公司 Face recognition anti-theft mobile phone
CN103218889A (en) * 2012-01-18 2013-07-24 联想(北京)有限公司 Body-separating alarm terminal and realization method thereof
CN105279411A (en) * 2015-09-22 2016-01-27 电子科技大学 Gait bio-feature based mobile device identity recognition method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6741851B1 (en) * 1999-10-30 2004-05-25 Samsung Electronics Co., Ltd. Method for protecting data stored in lost mobile terminal and recording medium therefor
CN1753524A (en) * 2004-09-24 2006-03-29 华为技术有限公司 Intelligent alarming method of personal mobile terminal
CN101719955A (en) * 2009-11-26 2010-06-02 中山大学 Intelligent terminal system with fingerprint identification and information processing method
CN202121665U (en) * 2011-05-24 2012-01-18 深圳辉烨通讯技术有限公司 Automatic antitheft mobile phone
CN202196477U (en) * 2011-08-09 2012-04-18 叶斌 Anti-theft alarm device with behavioural analysis ability
CN103218889A (en) * 2012-01-18 2013-07-24 联想(北京)有限公司 Body-separating alarm terminal and realization method thereof
CN202503577U (en) * 2012-03-30 2012-10-24 上海华勤通讯技术有限公司 Face recognition anti-theft mobile phone
CN105279411A (en) * 2015-09-22 2016-01-27 电子科技大学 Gait bio-feature based mobile device identity recognition method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐川龙: "《基于三维加速度传感器的人体行为识别》", 《中国学术期刊(光盘版)电子杂志社》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111479060A (en) * 2020-04-15 2020-07-31 Oppo广东移动通信有限公司 Image acquisition method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US9961489B2 (en) System and method for tracking individuals
Rossi et al. Spatio-temporal techniques for user identification by means of GPS mobility data
Sohn et al. Mobility detection using everyday gsm traces
Li et al. A reliable and accurate indoor localization method using phone inertial sensors
US9292936B2 (en) Method and apparatus for determining location
CN205193283U (en) Prison is detected and personnel positioning system with human vital sign
US10708778B2 (en) Method and system for authenticating an individual's geo-location via a communication network and applications using the same
EP3152594B1 (en) Asset tracking device configured to selectively retain information during loss of communication
US20110121965A1 (en) Sensory Enhancement Systems and Methods in Personal Electronic Devices
US20110022443A1 (en) Employment inference from mobile device data
CN105190345A (en) Systems and methods for using three-dimensional location information to improve location services
US20130041623A1 (en) Theft detection nodes and servers, methods of estimating an angle of a turn, methods of estimating a distance traveled between successive stops, and methods and servers for determining a path traveled by a node
Tandon et al. Detection of radioactive sources in urban scenes using Bayesian Aggregation of data from mobile spectrometers
EP2664999A1 (en) Action pattern analysis device, action pattern analysis method, and action pattern analysis program
CN102980572A (en) Positioning of device through evaluation of data sensed by device
Mahbub et al. PATH: person authentication using trace histories
CN106454723A (en) Mobile phone accelerometer based child custody method
Leung et al. Effective classification of ground transportation modes for urban data mining in smart cities
US20160241993A1 (en) Marker Based Activity Transition Models
CN106331362A (en) Mobile phone theft prevention method based on built-in acceleration sensor
Ahn et al. Personalized behavior pattern recognition and unusual event detection for mobile users
KR101609813B1 (en) Apparatus and method for counting step in smartphone
Panchal et al. Flooding level classification by gait analysis of smartphone sensor data
Guo et al. Indoor pedestrian trajectory tracking based on activity recognition
KR102115773B1 (en) A method for verifying user of the handy terminal by treating moving and usage pattern of the owner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170111