CN116542818A - Trademark monitoring and analyzing method based on big data technology - Google Patents

Trademark monitoring and analyzing method based on big data technology Download PDF

Info

Publication number
CN116542818A
CN116542818A CN202310823004.9A CN202310823004A CN116542818A CN 116542818 A CN116542818 A CN 116542818A CN 202310823004 A CN202310823004 A CN 202310823004A CN 116542818 A CN116542818 A CN 116542818A
Authority
CN
China
Prior art keywords
trademark
monitoring
key image
image features
features
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310823004.9A
Other languages
Chinese (zh)
Inventor
谭雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tulin Technology Shenzhen Co ltd
Original Assignee
Tulin Technology Shenzhen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tulin Technology Shenzhen Co ltd filed Critical Tulin Technology Shenzhen Co ltd
Priority to CN202310823004.9A priority Critical patent/CN116542818A/en
Publication of CN116542818A publication Critical patent/CN116542818A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/70Denoising; Smoothing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/761Proximity, similarity or dissimilarity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/764Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Evolutionary Computation (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Tourism & Hospitality (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Medical Informatics (AREA)
  • Economics (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Primary Health Care (AREA)
  • Quality & Reliability (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a trademark monitoring and analyzing method based on big data technology, which relates to the field of trademark monitoring and comprises the following steps: step 1: acquiring trademark information data source points, acquiring access rights of all acquired data source points, establishing a reading interface, reading trademark image data, transferring to a block chain, distributing independent hash values, and periodically detecting updating conditions; step 2: establishing a database, preprocessing the acquired trademark image data, extracting key image features, establishing a dedicated file for the extracted key image features, and adding trademark auxiliary information data in a correlated manner in the file; through the measure of similarity comparison to the trademark, the trademark to be registered or the trademark in question can be directly audited, the difference is intuitively displayed, reasonable and effective analysis is performed, the risk coefficient of the audited trademark is further predicted and prompted, and the risk is further avoided for registered trademark groups.

Description

Trademark monitoring and analyzing method based on big data technology
Technical Field
The invention relates to the technical field of trademark monitoring, in particular to a trademark monitoring and analyzing method based on big data technology.
Background
The trademark monitoring means that a trademark rights man searches for the trademark identical or similar to the registered trademark in the trademark bulletin through continuous searching, through the trademark monitoring, the trademark rights man can prevent the robbing behavior of others in time and also can effectively prevent the counterfeiting behavior of others so as to maintain the influence of the trademark of the enterprise, the trademark is taken as an intangible asset of the enterprise, the trademark owner has attracted high importance, in the using process of the trademark, the problems of disputed trademark, revoked trademark, infringed trademark and the like are layered endangered, the trademark of the enterprise cannot be normally put into the market, the normal operation of the enterprise can be influenced by carelessness, and accordingly the overall income of the enterprise is reduced;
however, the existing monitoring and analyzing method for trademark has defects, including:
1. in the trademark monitoring process, as the trademarks with high similarity have a considerable quantity, great difficulty is brought to the monitoring process, visual display and risk prediction of the similar trademarks are difficult, and counterfeited merchants are difficult to timely conduct right maintenance and new merchants avoid trademark identical events;
2. the method is difficult to effectively detect trademark infringement, lacks reliable trademark protection and traceability, and has the risks of tampering and losing registered trademark information, so that the rights and interests of merchants are easily threatened, and the safety is not high.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides the trademark monitoring and analyzing method based on the big data technology, which can effectively solve the problems that in the trademark monitoring process of the trademark monitoring and analyzing method in the prior art, as the trademarks with high similarity have a considerable quantity, great difficulty is brought to the monitoring process, visual display and risk prediction are difficult to be carried out on the similar trademarks, counterfeited traders are difficult to be helped to timely carry out right maintenance and new traders avoid trademark equivalent events, trademark infringement behaviors are difficult to be effectively detected, reliable trademark protection and traceability are lacked, registered trademark information has risks of being tampered and lost, the rights of the traders are easy to be threatened, and the safety is low.
In order to achieve the above object, the present invention is realized by the following technical scheme,
the invention discloses a trademark monitoring and analyzing method based on big data technology, which comprises the following steps:
step 1: acquiring trademark information data source points, acquiring access rights of all acquired data source points, establishing a reading interface, reading trademark image data, transferring to a block chain, distributing independent hash values, and periodically detecting updating conditions;
step 2: establishing a database, preprocessing the acquired trademark image data, extracting key image features, establishing a dedicated file for the extracted key image features, and adding trademark auxiliary information data in a correlated manner in the file;
step 3: acquiring image information to be verified, preprocessing, extracting key image features, matching the currently acquired key image features with the key image features existing in a database, calculating and acquiring similarity scores, and marking difference positions;
step 4: classifying the similar trademark images into different categories according to the similarity score;
step 5: verifying whether the hash value of the similar trademark image and the data stored on the blockchain are consistent;
step 6: if yes, confirming the integrity and the authenticity of the trademark image, and predicting the infringement risk of the current trademark image;
step 7: if not, sending a problem report to a management end;
step 8: and generating a trademark detection report, submitting the trademark detection report to the management end and then forwarding the trademark detection report to the user end.
Further, the process of periodically detecting the update status in the step 1 is as follows:
and the user sets a time period by self definition, and when the current period arrives, information indexes are carried out on all trademark information data source points, new added data are input, and changed data are replaced.
Still further, the items preprocessed in step 2 include: picture size unification and gaussian filtering remove noise.
Still further, the key image features in step 2 include: color histogram, texture features, and shape descriptors.
Further, in the process of performing the key image feature on the obtained trademark image data in the step 2 and the step 3, the features are given different weights according to the correlation between each feature and the category, the features with the weights smaller than the preset threshold are removed, and the calculation formulas of the correlation between the features and the category are as follows:
where n represents the number of samples,represents->Wherein>The larger the value the higher the attribute classification capability,representing individual features in a feature set, +.>Represents a single sample in the sample set, +.>Representing and->Nearest neighbor of the same category->Representing and->Nearest neighbors of non-congruent categories.
Further, in the process of matching the currently acquired key image features in the step 3 with the existing key image features in the database, the scoring process of the specific feature points is performed, and the similar matching is performed, so that a calculation formula for calculating the score of the specific feature points is as follows:
where k represents the score of a particular feature point, r represents the blur radius of the gaussian kernel, σ represents the deviation value of the positive too much distribution,representing the coordinates of a feature point->Representing the coordinates of another feature point, Q represents the set of all feature points, and e represents the base of the power.
Further, the process of marking the difference in the step 3 is as follows:
and obtaining similarity scores of the current key image features and the existing key image features, comprehensively analyzing, calculating a difference value, performing superposition marking, and displaying the non-anastomosis positions.
Still further, the presentation of the non-anastomosis comprises: differentiated presentation and text direction elucidation at the differences.
Further, the similarity classification in the step 4 is as follows: high similarity, medium similarity, and low similarity.
Further, the attribute of the trademark detection report in the step 8 includes: auxiliary information data of similar trademark images and predicted infringement risk prompts.
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
1. through the measure of similarity comparison to the trademark, the trademark to be registered or the questionable trademark can be directly audited, the difference is intuitively displayed, reasonable and effective analysis is performed, and then the risk coefficient of the audited trademark is predicted and prompted, so that the registered trademark crowd is helped to avoid risks, and the right and interests of the merchant of the original trademark are effectively protected from being infringed.
2. By introducing the blockchain technology, the database established under big data has the advantages of public and transparent information, and can effectively prevent malicious tampering events, thereby effectively protecting the legitimacy of registered trademarks and protecting the rights and interests of merchants.
3. The acquired trademark image features are filtered in the monitoring process, so that the purity of the extracted features is guaranteed, the higher comparison value is achieved, the analysis process is optimized, and the error generation is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present invention and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a schematic flow chart of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more clear, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. It will be apparent that the described embodiments are some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The invention is further described below with reference to examples.
Example 1: a trademark monitoring and analyzing method based on big data technology in this embodiment, as shown in FIG. 1, includes the following steps:
step 1: acquiring trademark information data source points, acquiring access rights of all acquired data source points, establishing a reading interface, reading trademark image data, transferring to a block chain, distributing independent hash values, and periodically detecting updating conditions;
step 2: establishing a database, preprocessing the acquired trademark image data, extracting key image features, establishing a dedicated file for the extracted key image features, and simultaneously adding trademark auxiliary information data into the file in a correlated manner, wherein the preprocessing items in the step 2 comprise: picture size unification and Gaussian filtering to remove noise, wherein the key image features in the step 2 comprise: color histogram, texture features, and shape descriptors;
step 3: acquiring image information to be verified, preprocessing, extracting key image features, matching the currently acquired key image features with the key image features existing in a database, calculating and acquiring similarity scores, and marking difference positions;
step 4: according to the similarity score, classifying the similar trademark images into different categories according to the similarity, wherein the similarity classification categories in the step 4 are as follows: high similarity, medium similarity, and low similarity;
step 5: verifying whether the hash value of the similar trademark image and the data stored on the blockchain are consistent;
step 6: if yes, confirming the integrity and the authenticity of the trademark image, and predicting the infringement risk of the current trademark image;
step 7: if not, sending a problem report to a management end;
step 8: and generating a trademark detection report, submitting the trademark detection report to the management end and then forwarding the trademark detection report to the user end.
As a preferred implementation manner in this embodiment, the process of periodically detecting the update status in step 1 is:
and the user sets a time period by self definition, and when the current period arrives, information indexes are carried out on all trademark information data source points, new added data are input, and changed data are replaced.
In the process of performing key image features on the obtained trademark image data in the step 2 and the step 3, the features are given different weights according to the relevance of each feature and category, the features with the weights smaller than a preset threshold are removed, and the calculation formulas of the relevance of the features and category are as follows:
where n represents the number of samples,represents->Wherein>The larger the value the higher the attribute classification capability,representing individual features in a feature set, +.>Represents a single sample in the sample set, +.>Representing and->Nearest neighbor of the same category->Representing and->The most heterogeneousAnd (5) adjacent.
Compared with the prior art, the database established under big data is disclosed and transparent by introducing the blockchain technology, the occurrence of malicious tampering events can be effectively prevented, the measures of similarity comparison of trademarks can be used for directly auditing the trademarks to be registered or the trademarks in question, visual display is carried out on the difference, reasonable and effective analysis is carried out, and the risk coefficient of the audited trademarks is further predicted and prompted.
Example 2: in other aspects, the present embodiment also provides a process of marking differences:
and obtaining similarity scores of the current key image features and the existing key image features, comprehensively analyzing, calculating a difference value, performing superposition marking, and displaying the non-anastomosis positions.
The presentation of the non-anastomosis comprises: differentiated presentation and text direction elucidation at the differences.
Example 3: in this embodiment, the process of matching the currently acquired key image features in step 3 with the existing key image features in the database, by calculating the scoring process of the specific feature points, and performing similar matching, the calculation formula for calculating the score of the specific feature points is as follows:
where k represents the score of a particular feature point, r represents the blur radius of the gaussian kernel, σ represents the deviation value of the positive too much distribution,representing the coordinates of a feature point->Representing the coordinates of another feature point, Q represents the set of all feature points, and e represents the base of the power.
Working principle: according to the invention, through similarity comparison of trademarks, direct auditing is carried out on the trademarks to be registered or the trademarks in question, visual display is carried out on the difference, reasonable and effective analysis is carried out, and then the risk coefficient of the audited trademarks is predicted and prompted, so that registered trademark crowds are helped to avoid risks, the interests of merchants of the original trademarks are effectively protected from being infringed, a blockchain technology is introduced, and a database established under big data has the advantages of open and transparent information, and can effectively prevent malicious tampering events from happening, so that the legitimacy of the registered trademarks is effectively protected;
in the monitoring process, the obtained trademark image features are filtered, so that the purity of the extracted features is guaranteed, the higher comparison value is achieved, the analysis process is optimized, and the error generation is reduced.
The above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; while the invention has been described in detail with reference to the foregoing embodiments, it will be appreciated by those skilled in the art that variations may be made in the techniques described in the foregoing embodiments, or equivalents may be substituted for elements thereof; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A trademark monitoring and analyzing method based on big data technology is characterized by comprising the following steps:
step 1: acquiring trademark information data source points, acquiring access rights of all acquired data source points, establishing a reading interface, reading trademark image data, transferring to a block chain, distributing independent hash values, and periodically detecting updating conditions;
step 2: establishing a database, preprocessing the acquired trademark image data, extracting key image features, establishing a dedicated file for the extracted key image features, and adding trademark auxiliary information data in a correlated manner in the file;
step 3: acquiring image information to be verified, preprocessing, extracting key image features, matching the currently acquired key image features with the key image features existing in a database, calculating and acquiring similarity scores, and marking difference positions;
step 4: classifying the similar trademark images into different categories according to the similarity score;
step 5: verifying whether the hash value of the similar trademark image and the data stored on the blockchain are consistent;
step 6: if yes, confirming the integrity and the authenticity of the trademark image, and predicting the infringement risk of the current trademark image;
step 7: if not, sending a problem report to a management end;
step 8: and generating a trademark detection report, submitting the trademark detection report to the management end and then forwarding the trademark detection report to the user end.
2. The trademark monitoring and analyzing method based on big data technology according to claim 1, wherein the process of periodically detecting the update status in step 1 is as follows:
and the user sets a time period by self definition, and when the current period arrives, information indexes are carried out on all trademark information data source points, new added data are input, and changed data are replaced.
3. The trademark monitoring and analyzing method based on big data technology according to claim 1, wherein the items preprocessed in the step 2 include: picture size unification and gaussian filtering remove noise.
4. The trademark monitoring and analyzing method based on big data technology of claim 1, wherein the key image features in the step 2 include: color histogram, texture features, and shape descriptors.
5. The trademark monitoring and analyzing method based on big data technology according to claim 1, wherein in the process of performing key image features on the obtained trademark image data in the step 2 and the step 3, features with weights smaller than a preset threshold are removed according to different weights given to the features according to the correlation between each feature and each category, and a calculation formula of the correlation between the features and the category is as follows:
where n represents the number of samples,represents->Wherein>The larger the value, the higher the property classification ability, +.>Representing individual features in a feature set, +.>Represents a single sample in the sample set, +.>Representing and->The nearest neighbors of the same class are selected,representing and->Nearest neighbors of non-congruent categories.
6. The trademark monitoring and analyzing method based on big data technology according to claim 1, wherein the process of matching the currently acquired key image features in the step 3 with the existing key image features in the database is performed by calculating a score of a specific feature point, and performing similar matching, and a calculation formula of calculating a score of the specific feature point is as follows:
where k represents the score of a particular feature point, r represents the blur radius of the gaussian kernel, σ represents the deviation value of the positive too much distribution,representing the coordinates of a feature point->Representing the coordinates of another feature point, Q represents the set of all feature points, and e represents the base of the power.
7. The trademark monitoring and analyzing method based on big data technology according to claim 1, wherein the process of marking the difference in the step 3 is:
and obtaining similarity scores of the current key image features and the existing key image features, comprehensively analyzing, calculating a difference value, performing superposition marking, and displaying the non-anastomosis positions.
8. The method for monitoring and analyzing trademarks based on big data technology according to claim 7, wherein the displaying of the non-anastomotic site comprises: differentiated presentation and text direction elucidation at the differences.
9. The trademark monitoring and analyzing method based on big data technology according to claim 1, wherein the similarity classification in the step 4 is as follows: high similarity, medium similarity, and low similarity.
10. The method for monitoring and analyzing trademark based on big data technology of claim 1, wherein the attribute of the trademark detection report in the step 8 includes: auxiliary information data of similar trademark images and predicted infringement risk prompts.
CN202310823004.9A 2023-07-06 2023-07-06 Trademark monitoring and analyzing method based on big data technology Pending CN116542818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310823004.9A CN116542818A (en) 2023-07-06 2023-07-06 Trademark monitoring and analyzing method based on big data technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310823004.9A CN116542818A (en) 2023-07-06 2023-07-06 Trademark monitoring and analyzing method based on big data technology

Publications (1)

Publication Number Publication Date
CN116542818A true CN116542818A (en) 2023-08-04

Family

ID=87456416

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310823004.9A Pending CN116542818A (en) 2023-07-06 2023-07-06 Trademark monitoring and analyzing method based on big data technology

Country Status (1)

Country Link
CN (1) CN116542818A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107622397A (en) * 2017-08-07 2018-01-23 深圳益强信息科技有限公司 Trade mark monitoring method and system
CN108763262A (en) * 2018-04-03 2018-11-06 南昌奇眸科技有限公司 A kind of brand logo search method
CN109299307A (en) * 2018-08-30 2019-02-01 广州企图腾科技有限公司 A kind of trade mark retrieval method for early warning and device based on structural analysis
CN110110116A (en) * 2019-04-02 2019-08-09 浙江工业大学 A kind of trademark image retrieval method for integrating depth convolutional network and semantic analysis
CN111489215A (en) * 2019-01-27 2020-08-04 上海与腾科技有限公司 Trademark infringement evidence obtaining method and system
CN112215732A (en) * 2020-09-07 2021-01-12 深圳市安络科技有限公司 Intellectual property protection method and device based on block chain
CN114996500A (en) * 2021-03-02 2022-09-02 贵州凌恒科技有限公司 Trademark graph retrieval method
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method
CN115408667A (en) * 2022-09-02 2022-11-29 支付宝(杭州)信息技术有限公司 Method and system for detecting infringement of application program content

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107622397A (en) * 2017-08-07 2018-01-23 深圳益强信息科技有限公司 Trade mark monitoring method and system
CN108763262A (en) * 2018-04-03 2018-11-06 南昌奇眸科技有限公司 A kind of brand logo search method
CN109299307A (en) * 2018-08-30 2019-02-01 广州企图腾科技有限公司 A kind of trade mark retrieval method for early warning and device based on structural analysis
CN111489215A (en) * 2019-01-27 2020-08-04 上海与腾科技有限公司 Trademark infringement evidence obtaining method and system
CN110110116A (en) * 2019-04-02 2019-08-09 浙江工业大学 A kind of trademark image retrieval method for integrating depth convolutional network and semantic analysis
CN112215732A (en) * 2020-09-07 2021-01-12 深圳市安络科技有限公司 Intellectual property protection method and device based on block chain
CN114996500A (en) * 2021-03-02 2022-09-02 贵州凌恒科技有限公司 Trademark graph retrieval method
CN115408667A (en) * 2022-09-02 2022-11-29 支付宝(杭州)信息技术有限公司 Method and system for detecting infringement of application program content
CN115391751A (en) * 2022-10-31 2022-11-25 知安视娱(北京)科技有限公司 Infringement determination method

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
张善文等: "图像模式识别", vol. 1, 31 May 2020, 西安:西安电子科技大学出版社, pages: 224 - 225 *
曾向阳: "智能水中目标识别", vol. 1, 31 March 2016, 北京:国防工业出版社, pages: 12 *
曾峦等: "侦察图像获取与融合技术", vol. 1, 31 May 2015, 北京:国防工业出版社, pages: 142 *
李万武等: "海洋地理信息系统(下)", vol. 1, 30 June 2021, 徐州:中国矿业大学出版社, pages: 13 *

Similar Documents

Publication Publication Date Title
Sun et al. Detecting anomalous user behavior using an extended isolation forest algorithm: an enterprise case study
CN111953697B (en) APT attack recognition and defense method
CN109190657A (en) Sample homogeneous assays method based on data slicer and image hash combination
CN107016298B (en) Webpage tampering monitoring method and device
CN108875727A (en) The detection method and device of graph-text identification, storage medium, processor
CN113360566A (en) Information content monitoring method and system
Beltzung et al. Real-time detection of fake-shops through machine learning
Rhee Detection of spliced image forensics using texture analysis of median filter residual
Liu et al. Video content analysis for compliance audit in finance and security industry
CN111242075A (en) Method for recognizing sleeping behavior through police supervision
Ahvanooey et al. Misinformation detection on social media: Challenges and the road ahead
CN113434575B (en) Data attribution processing method, device and storage medium based on data warehouse
CN112948897B (en) Webpage tamper-proofing detection method based on combination of DRAE and SVM
An et al. Benchmarking the Robustness of Image Watermarks
Abdulqader et al. Detection of tamper forgery image in security digital mage
CN116389148B (en) Network security situation prediction system based on artificial intelligence
CN116542818A (en) Trademark monitoring and analyzing method based on big data technology
Teoh et al. Analyst intuition inspired high velocity big data analysis using PCA ranked fuzzy k-means clustering with multi-layer perceptron (MLP) to obviate cyber security risk
CN115134159B (en) Safety alarm analysis optimization method
Shrestha et al. High-performance classification of phishing URLs using a multi-modal approach with MapReduce
CN109324985A (en) A kind of SQL injection recognition methods of the automatic adaptation scene based on machine learning
CN113361585A (en) Method for optimizing and screening clues based on supervised learning algorithm
Chen et al. Applying a random forest approach to imbalanced dataset on network monitoring analysis
CN113688650A (en) Method and device for identifying picture
Detroz et al. Fraud detection in water meters using pattern recognition techniques

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination