CN106331362A - Mobile phone theft prevention method based on built-in acceleration sensor - Google Patents
Mobile phone theft prevention method based on built-in acceleration sensor Download PDFInfo
- Publication number
- CN106331362A CN106331362A CN201610813949.2A CN201610813949A CN106331362A CN 106331362 A CN106331362 A CN 106331362A CN 201610813949 A CN201610813949 A CN 201610813949A CN 106331362 A CN106331362 A CN 106331362A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- stolen
- data
- user
- acceleration sensor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Abstract
The invention discloses a mobile phone theft prevention method based on a built-in acceleration sensor, which belongs to the technical field of safety. Firstly, the intelligent mobile phone of a user is trained, the user puts the mobile phone in a pocket or other place, after a period of time of movement, the mobile phone acceleration sensor acquires personal feature information, and the mobile phone can recognize the identity of the owner through the feature information; and if the mobile phone is stolen, an illegal person carries the mobile phone to move, the mobile phone can recognize the mobile phone is stolen, an alarm is given instantly, the user is reminded that the mobile phone is stolen, and the mobile phone sends the geographical position of the stolen mobile phone to a bound mobile phone. Thus, when the mobile phone is stolen, an alarm can be given for positioning, and a great role is played in subsequent mobile phone tracking.
Description
Technical field
The invention belongs to technical field of burglary prevention, be specifically related to a kind of antitheft mobile phone side based on built-in acceleration sensor
Method.
Background technology
Along with the development of mobile Internet, mobile phone has become as that people are daily just live in a requisite part, with
Time hands also store substantial amounts of individual privacy data, such as note, photo etc..Along with the population in city increases, many public arenas
Crowded to capacity, hand-set from stolen also happens occasionally, and once mobile phone private data leak, and brings sternly to the Working Life of client
Ghost image rings.
For this social reality, the various electronic products of all kinds of antitheft mobile phones and theft preventing method arise at the historic moment, wherein
A part is the portable security alarm device being associated with mobile phone, although this anti-theft device has instantaneity, but not very convenient,
Because when mobile phone is away from the certain scope of device, and device will be reported to the police.Device is once omitted, and does not just have antitheft effect, and
And buy the expense that device needs are extra.Another part is that mobile phone self arranges password, and once code error will be reported to the police, to association
Mobile phone sends positional information, although can recover mobile phone, but be a lack of ageing, when mobile phone is recovered, information may be let out already
Dew.
Along with the progress in epoch, the development of science and technology, smart mobile phone increasingly " intelligent ".Interior of mobile phone of today is self-contained
Various sensors, such as acceleration transducer, gyroscope, Magnetic Sensor etc..It is engraved in during these sensors and records cellphone subscriber
Individual behavior, everyone individual behavior is unique, can carry out the identification of personnel according to these data.
Summary of the invention
For this social phenomenon of hand-set from stolen, the present invention utilizes smart mobile phone that cellphone subscriber is carried out the identification of identity,
Can identify immediately when the carrier of mobile phone changes, and send alarm.Additionally smart mobile phone itself can containing GPS module
To position accurately, it is possible to send the position of stolen mobile phone in real time to association mobile phone.
Realize technical scheme as follows:
A kind of anti-theft method of mobile phone based on built-in acceleration sensor, is first trained the smart mobile phone of user,
Mobile phone is placed on pocket, or other positions by user, and a period of time of moving allows mobile phone acceleration sensor obtain individual
Characteristic information so that mobile phone can identify mastership by these characteristic informations;If hand-set from stolen is stolen, lawbreaker takes
Band mobile phone is walked about, and mobile phone i.e. may recognize that hand-set from stolen, sends alarm immediately, reminds user mobile phone stolen, and mobile phone starts to tying up
Determine mobile phone and send the geographical position of stolen mobile phone.
Further, the concrete steps of described method include:
(1) firstly the need of user's carrying mobile phone segment distance that moves as slowly walked, record what acceleration transducer recorded
The data of user;
(2) user data utilizing Kalman filtering to obtain step (1) processes;Filtering relational expression is as follows:
X (k | k-1)=A*X (k-1 | k-1)+B*U (k)
P (k | k-1)=A*P (k-1 | k-1) * A'+Q
Kg (k)=P (k | k-1) * H'/(H*P (k | k-1) H'+R)
X (k | k-1)=X (k | k-1)+Kg (k) * (Z (k)-H*X (k | k-1))
P (k | k)=(I-Kg (k) * H) * P (k | k-1)
Wherein, X (k | k-1) is the result utilizing laststate to predict, X (k-1 | k-1) is the result that laststate is optimum,
U (k) be the controlled quentity controlled variable controlled quentity controlled variable here of status praesens be 0;A, B are the parameter of Multi-model System.
P (k | k-1) is the covariance that X (k | k-1) is corresponding, and P (k-1 | k-1) is the covariance that X (k-1 | k-1) is corresponding, A '
Representing the transposed matrix of A, Q is the covariance of systematic procedure.
KgK () is the gain of Kalman, R, for measuring variance, reacts the certainty of measurement of acceleration transducer;
Z (k) represents the measured value in k moment;
(3) utilizing temporal signatures to be identified, the parameter of use includes cycle maximum averageDegree of bias S, quartile
Away from IQR, correlation coefficient C, concrete calculation expression is as follows.
The meansigma methods of cycle maximumExpression formula:
Wherein ImaxFor the peak value in single cycle, n is the number of peak value;
Degree of bias S is data skew direction and degree, its expression formula:
aiThe data that sensor records, i=1,2,3 ..., N, N are data amount check;A is the meansigma methods of N number of data measured;
σ is the standard deviation of data measured;
Interquartile-range IQR IQR expression formula:
IQR=Q3-Q1
Data aj are descending is ordered as bj, j=1,2 ..., N;The position of quartile is Pj=1+ (N-1) j/4, j
(=1,2,3) are a point position number, kjFor PjInteger part, rj is fractional part;
Cross-correlation coefficient C expression formula:
Cxyz=COV (x, y, z)/(σxσyσz)
In formula: (x, y, z) be x to COV, y, the covariance of z-axis acceleration;σx,σy, σzFor x, y, the standard of z-axis acceleration
Difference.
(4) use decision tree that eigenvalue carries out classification to judge;After decision tree T builds, estimate predictive value, identify user
Identity;
(5) if hand-set from stolen is stolen, lawbreaker's carrying mobile phone is walked about, and mobile phone i.e. may recognize that the identity letter of lawbreaker
Ceasing inconsistent with mobile phone mastership information, it is judged that hand-set from stolen, mobile phone starts to send the ground of stolen mobile phone to binding mobile phone
Reason position, and send alarm, remind user mobile phone stolen.
Further, decision tree described in described step (4) is to be built by calculating entropy, and described entropy expression formula is:
Wherein p (i)=the i-th class number/total number.
Further, described step (4) being estimated, predictive value is by estimating that the normal distribution of an accuracy rate is interval, it is thus achieved that
Data are reasonably classified behind interval by normal distribution, distinguish mobile phone carrier identity information.
Further, the confidence interval of described normal distribution solves as follows:
1) by acc standardization, i.e.Acc=X/N;N is just predicting for record data, X
True record number;
2) select confidence level a, obtain statistic Z of accurate normal distribution corresponding for a/2 with 1-a/2a/2,Z1-a/2Take off
Face, about the inequality of p, obtains the confidence interval of p:
Beneficial effects of the present invention:
1, the present invention is cheap need not extra sensor device, it is only necessary to the acceleration sensing that smart mobile phone is built-in
Device just can complete above function.
2, the present invention combines the identification of identity mobile phone can be allowed to have the function of autonomous entity identification, antitheft relative to other
Measure has certain instantaneity, and once mobile phone carrier is changed, and mobile phone sends alarm immediately, and positions, to follow-up
Effect greatly is played in the tracking of mobile phone.
Accompanying drawing explanation
Fig. 1 is the original user data schema that the present invention extracts;
The user data that Fig. 2 is original be filtered after figure.
Detailed description of the invention
General user can be placed on mobile phone in pocket, the acceleration number of degrees of the user that mobile phone acceleration sensor collects
According to, obtain the data of user, then logarithm carries out the extraction of feature, if average, maximum, variance etc. are as the characteristic point of user,
By decision tree, characteristic is sorted out, to identify user identity.Then the GPS module utilizing smart mobile phone integrated is entered
Row location.
First being trained the smart mobile phone of user, mobile phone can be placed on pocket, or other positions by user
Put, and a period of time that needs to move can allow mobile phone acceleration sensor obtain enough personal characteristic information so that hands
Machine can identify mastership by these characteristic informations, if stolen, lawbreaker's carrying mobile phone is walked about, mobile phone
Identifying hand-set from stolen, send alarm immediately, remind user mobile phone stolen, mobile phone starts to send stolen mobile phone to binding mobile phone
Geographical position.Specifically comprise the following steps that
(1) firstly the need of user's carrying mobile phone segment distance that moves as slowly walked, record what acceleration transducer recorded
The data of user.
(2) obtaining data from previous step is primary data, and the interference of data is more, and there is substantial amounts of burr, such as Fig. 1 institute
Showing, needing after filtering, filtered signal is rounder and more smooth, effect such as Fig. 2.
The filtering method that the present invention uses is Kalman filtering.Filtering relational expression is as follows:
X (k | k-1)=A*X (k-1 | k-1)+B*U (k) (1)
P (k | k-1)=A*P (k-1 | k-1) * A'+Q (2)
Kg (k)=P (k | k-1) * H'/(H*P (k | k-1) H'+R) (3)
X (k | k-1)=X (k | k-1)+Kg (k) * (Z (k)-H*X (k | k-1)) (4)
P (k | k)=(I-Kg (k) * H) * P (k | k-1) (5)
In formula (1), X (k | k-1) is the result utilizing laststate to predict, X (k-1 | k-1) is the knot that laststate is optimum
Really, U (k) be the controlled quentity controlled variable controlled quentity controlled variable here of status praesens be 0;A and B is Multi-model System parameter.
In formula (2), P (k | k-1) is the covariance that X (k | k-1) is corresponding, and P (k-1 | k-1) is the association that X (k-1 | k-1) is corresponding
Variance, A ' represents the transposed matrix of A, and Q is the covariance of systematic procedure.
In formula (3), Kg(k): for the gain of Kalman, R, for measuring variance, reacts the certainty of measurement of acceleration transducer.
In formula (4), Z (k) expression is the measured value in k moment.
Formula (1), (2) are the first two in the middle of 5 formula of Kalman filter, the namely prediction to system.Formula (3)
(4) in (5), I, H are the matrix of 1.
(3) filtered figure has the obvious cycle, and the present invention runs in view of cell phone processor computing energy at interior of mobile phone
Power is more weak, so mainly using temporal signatures to be identified, has used cycle maximum averageDegree of bias S, interquartile-range IQR
IQR, correlation coefficient C, concrete calculation expression is as follows.
The meansigma methods of cycle maximumExpression formula:
Wherein ImaxFor the peak value in single cycle, n is the number of peak value.
Degree of bias S is data skew direction and degree, its expression formula:
aiThe data that sensor records, i=1,2,3 ..., N, N are data amount check;A is the meansigma methods of N number of data measured;
σ is the standard deviation of data measured.
Interquartile-range IQR IQR expression formula:
IQR=Q3-Q1
Data ajDescending it is ordered as bj, j=1,2 ..., N.The position of quartile is Pj=1+ (N-1) j/4, j
(=1,2,3) are a point position number, kjFor PjInteger part, rj is fractional part.
Cross-correlation coefficient C expression formula:
Cxyz=COV (x, y, z)/(σxσyσz)
In formula: (x, y, z) be x to COV, y, the covariance of z-axis acceleration;σx,σy, σzFor x, y, the standard of z-axis acceleration
Difference.
(4) use decision tree that eigenvalue carries out classification to judge, identify identity.Decision tree builds according to " purity ", this
Invent and built by calculating entropy, entropy expression formula:
Wherein p (i)=the i-th class number/total number.
After decision tree T builds, estimation predictive value, the accuracy rate estimated by sample, but the deviation of there will be likely some,
So the present invention uses the method comparing science, it is the interval estimating an accuracy rate, it is thus achieved that just data are closed behind interval
The classification of reason.
The confidence interval being distributed the most very much solves as follows:
1) by acc standardization, i.e.Acc=X/N.N is just predicting for record data, X
True record number
2) select confidence level a, obtain statistic Z of accurate normal distribution corresponding for a/2 with 1-a/2a/2,Z1-a/2Take off
Face, about the inequality of p, obtains the confidence interval of p.
After obtaining interval, it is possible to reasonably classify data, the classification results of last synthetic data, differentiation is sold
Machine carrier identity information.
(5) if hand-set from stolen is stolen, lawbreaker's carrying mobile phone is walked about, and mobile phone i.e. may recognize that the identity letter of lawbreaker
Ceasing inconsistent with mobile phone mastership information, it is judged that hand-set from stolen, mobile phone starts to send the ground of stolen mobile phone to binding mobile phone
Reason position, and send alarm, remind user mobile phone stolen.
The a series of detailed description of those listed above is only for the feasibility embodiment of the present invention specifically
Bright, they also are not used to limit the scope of the invention, all equivalent implementations made without departing from skill of the present invention spirit
Or change should be included within the scope of the present invention.
Claims (5)
1. an anti-theft method of mobile phone based on built-in acceleration sensor, it is characterised in that the first smart mobile phone to user
Being trained, mobile phone is placed on pocket, or other positions by user, and a period of time of moving allows mobile phone acceleration sensor
Obtain personal characteristic information so that mobile phone can identify mastership by these characteristic informations;If hand-set from stolen is stolen, disobey
Legal person person's carrying mobile phone is walked about, and mobile phone i.e. may recognize that hand-set from stolen, sends alarm immediately, reminds user mobile phone stolen, mobile phone
Start to send the geographical position of stolen mobile phone to binding mobile phone.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 1, it is characterised in that institute
The concrete steps stating method include:
(1) firstly the need of user's carrying mobile phone segment distance that moves as slowly walked, the user that acceleration transducer records is recorded
Data;
(2) user data utilizing Kalman filtering to obtain step (1) processes;Filtering relational expression is as follows:
X (k | k-1)=A*X (k-1 | k-1)+B*U (k)
P (k | k-1)=A*P (k-1 | k-1) * A'+Q
Kg (k)=P (k | k-1) * H'/(H*P (k | k-1) H'+R)
X (k | k-1)=X (k | k-1)+Kg (k) * (Z (k)-H*X (k | k-1))
P (k | k)=(I-Kg (k) * H) * P (k | k-1)
Wherein, X (k | k-1) is the result utilizing laststate to predict, X (k-1 | k-1) is the result that laststate is optimum, U (k)
Controlled quentity controlled variable controlled quentity controlled variable here for status praesens is 0;A, B are the parameter of Multi-model System.
P (k | k-1) is the covariance that X (k | k-1) is corresponding, and P (k-1 | k-1) is the covariance that X (k-1 | k-1) is corresponding, and A ' represents A
Transposed matrix, Q is the covariance of systematic procedure.
KgK () is the gain of Kalman, R, for measuring variance, reacts the certainty of measurement of acceleration transducer;
Z (k) represents the measured value in k moment;
(3) utilizing temporal signatures to be identified, the parameter of use includes cycle maximum averageDegree of bias S, interquartile-range IQR
IQR, correlation coefficient C, concrete calculation expression is as follows.
The meansigma methods of cycle maximumExpression formula:
Wherein ImaxFor the peak value in single cycle, n is the number of peak value;
Degree of bias S is data skew direction and degree, its expression formula:
aiThe data that sensor records, i=1,2,3 ..., N, N are data amount check;A is the meansigma methods of N number of data measured;σ is for surveying
Obtain the standard deviation of data;
Interquartile-range IQR IQR expression formula:
Qj=bkj+(bkj+1-bkj)rj
IQR=Q3-Q1
Data ajDescending it is ordered as bj, j=1,2 ..., N;The position of quartile is Pj=1+ (N-1) j/4, j (=1,
2,3) for a point position number, kjFor PjInteger part, rjFor fractional part;
Cross-correlation coefficient C expression formula:
Cxyz=COV (x, y, z)/(σxσyσz)
In formula: (x, y, z) be x to COV, y, the covariance of z-axis acceleration;σx,σy,σzFor x, y, the standard deviation of z-axis acceleration.
(4) use decision tree that eigenvalue carries out classification to judge;After decision tree T builds, estimate predictive value, identify user's body
Part;
(5) if hand-set from stolen is stolen, lawbreaker's carrying mobile phone is walked about, mobile phone i.e. may recognize that the identity information of lawbreaker with
Mobile phone mastership information is inconsistent, it is judged that hand-set from stolen, and mobile phone starts to send the geographical position of stolen mobile phone to binding mobile phone
Put, and send alarm, remind user mobile phone stolen.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 2, it is characterised in that institute
Stating decision tree described in step (4) is to be built by calculating entropy, and described entropy expression formula is:
Wherein p (i)=the i-th class number/total number.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 2, it is characterised in that institute
State and step (4) being estimated, predictive value is by estimating that the normal distribution of an accuracy rate is interval, it is thus achieved that be right behind normal distribution interval
Data are reasonably classified, and distinguish mobile phone carrier identity information.
A kind of anti-theft method of mobile phone based on built-in acceleration sensor the most according to claim 4, it is characterised in that institute
The confidence interval stating normal distribution solves as follows:
1) by acc standardization, i.e.Acc=X/N;N is record data, and X prediction is correct
Record number;
2) select confidence level a, obtain statistic Z of accurate normal distribution corresponding for a/2 with 1-a/2a/2,Z1-a/2Solve and close below
In the inequality of p, obtain the confidence interval of p:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610813949.2A CN106331362A (en) | 2016-09-09 | 2016-09-09 | Mobile phone theft prevention method based on built-in acceleration sensor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610813949.2A CN106331362A (en) | 2016-09-09 | 2016-09-09 | Mobile phone theft prevention method based on built-in acceleration sensor |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106331362A true CN106331362A (en) | 2017-01-11 |
Family
ID=57787084
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610813949.2A Pending CN106331362A (en) | 2016-09-09 | 2016-09-09 | Mobile phone theft prevention method based on built-in acceleration sensor |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106331362A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111479060A (en) * | 2020-04-15 | 2020-07-31 | Oppo广东移动通信有限公司 | Image acquisition method and device, storage medium and electronic equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6741851B1 (en) * | 1999-10-30 | 2004-05-25 | Samsung Electronics Co., Ltd. | Method for protecting data stored in lost mobile terminal and recording medium therefor |
CN1753524A (en) * | 2004-09-24 | 2006-03-29 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
CN202121665U (en) * | 2011-05-24 | 2012-01-18 | 深圳辉烨通讯技术有限公司 | Automatic antitheft mobile phone |
CN202196477U (en) * | 2011-08-09 | 2012-04-18 | 叶斌 | Anti-theft alarm device with behavioural analysis ability |
CN202503577U (en) * | 2012-03-30 | 2012-10-24 | 上海华勤通讯技术有限公司 | Face recognition anti-theft mobile phone |
CN103218889A (en) * | 2012-01-18 | 2013-07-24 | 联想(北京)有限公司 | Body-separating alarm terminal and realization method thereof |
CN105279411A (en) * | 2015-09-22 | 2016-01-27 | 电子科技大学 | Gait bio-feature based mobile device identity recognition method |
-
2016
- 2016-09-09 CN CN201610813949.2A patent/CN106331362A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6741851B1 (en) * | 1999-10-30 | 2004-05-25 | Samsung Electronics Co., Ltd. | Method for protecting data stored in lost mobile terminal and recording medium therefor |
CN1753524A (en) * | 2004-09-24 | 2006-03-29 | 华为技术有限公司 | Intelligent alarming method of personal mobile terminal |
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
CN202121665U (en) * | 2011-05-24 | 2012-01-18 | 深圳辉烨通讯技术有限公司 | Automatic antitheft mobile phone |
CN202196477U (en) * | 2011-08-09 | 2012-04-18 | 叶斌 | Anti-theft alarm device with behavioural analysis ability |
CN103218889A (en) * | 2012-01-18 | 2013-07-24 | 联想(北京)有限公司 | Body-separating alarm terminal and realization method thereof |
CN202503577U (en) * | 2012-03-30 | 2012-10-24 | 上海华勤通讯技术有限公司 | Face recognition anti-theft mobile phone |
CN105279411A (en) * | 2015-09-22 | 2016-01-27 | 电子科技大学 | Gait bio-feature based mobile device identity recognition method |
Non-Patent Citations (1)
Title |
---|
徐川龙: "《基于三维加速度传感器的人体行为识别》", 《中国学术期刊(光盘版)电子杂志社》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111479060A (en) * | 2020-04-15 | 2020-07-31 | Oppo广东移动通信有限公司 | Image acquisition method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9961489B2 (en) | System and method for tracking individuals | |
Rossi et al. | Spatio-temporal techniques for user identification by means of GPS mobility data | |
Sohn et al. | Mobility detection using everyday gsm traces | |
Li et al. | A reliable and accurate indoor localization method using phone inertial sensors | |
US9292936B2 (en) | Method and apparatus for determining location | |
CN205193283U (en) | Prison is detected and personnel positioning system with human vital sign | |
US10708778B2 (en) | Method and system for authenticating an individual's geo-location via a communication network and applications using the same | |
EP3152594B1 (en) | Asset tracking device configured to selectively retain information during loss of communication | |
US20110121965A1 (en) | Sensory Enhancement Systems and Methods in Personal Electronic Devices | |
US20110022443A1 (en) | Employment inference from mobile device data | |
CN105190345A (en) | Systems and methods for using three-dimensional location information to improve location services | |
US20130041623A1 (en) | Theft detection nodes and servers, methods of estimating an angle of a turn, methods of estimating a distance traveled between successive stops, and methods and servers for determining a path traveled by a node | |
Tandon et al. | Detection of radioactive sources in urban scenes using Bayesian Aggregation of data from mobile spectrometers | |
EP2664999A1 (en) | Action pattern analysis device, action pattern analysis method, and action pattern analysis program | |
CN102980572A (en) | Positioning of device through evaluation of data sensed by device | |
Mahbub et al. | PATH: person authentication using trace histories | |
CN106454723A (en) | Mobile phone accelerometer based child custody method | |
Leung et al. | Effective classification of ground transportation modes for urban data mining in smart cities | |
US20160241993A1 (en) | Marker Based Activity Transition Models | |
CN106331362A (en) | Mobile phone theft prevention method based on built-in acceleration sensor | |
Ahn et al. | Personalized behavior pattern recognition and unusual event detection for mobile users | |
KR101609813B1 (en) | Apparatus and method for counting step in smartphone | |
Panchal et al. | Flooding level classification by gait analysis of smartphone sensor data | |
Guo et al. | Indoor pedestrian trajectory tracking based on activity recognition | |
KR102115773B1 (en) | A method for verifying user of the handy terminal by treating moving and usage pattern of the owner |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170111 |