Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

50results about How to "Solve the theft" patented technology

Oil-water separator

The invention discloses an oil-water separator comprising a water inlet, a water outlet, a container, a movable filter residue bucket, a fixed filter net, an oil storage area, a vortex shallow filter, a sludge bucket, an electronic integration controller, an oil suction port, a slag suction port and a biological filter disc, wherein the fixed filter net finely filters the wastewater; an oil drop of which the diameter is 10-100 microns is separated and ascended to the oil storage area in the vortex shallow filter; the sludge bucket concentrates the waste residue; the waste residue descends to the bottom of the sludge bucket to be gathered under the effect of gravity after participating on the sludge bucket; the oil suction port is used for absorbing oil; the slag suction port is used for absorbing the slag; the biological filter disc is used for discharging the residual sewage. By adopting the oil-water separator, the environment-friendly problem of emission of restaurant waste water is solved, so that the discharged water achieves the corresponding national emission standards, the congestion problems of drainage pipelines caused by waste oil wall built-up are solved, separated excessive oil impurities are solved, and the processing link of restaurant waste oil in specified use is reduced.
Owner:CLEAR SUZHOU ENVIRONMENTAL TECH CO LTD

Automatic management and control system of Beidou electric vehicle based on terminal APP

The invention discloses an automatic management and control system of a Beidou electric vehicle based on a terminal APP. The automatic management and control system comprises an automatic management and control terminal of the Beidou electric vehicle, a communication transmission network, a background control center and the terminal APP, wherein the automatic management and control terminal of the Beidou electric vehicle is integrated in the inner part of an electric vehicle controller; the terminal APP is arranged in a mobile equipment terminal such as a cellphone and a PAD; a signal of the electric vehicle is transmitted to the background control center by the automatic management and control terminal of the Beidou electric vehicle through the communication transmission network, and then the signal is transmitted to the terminal APP by the background control center. The terminal APP can transmit an instruction through the background control center, so that daily managements such as navigating and positioning the electric vehicle, managing an electronic anti-theft fence and automatically locking the electric vehicle can be performed; the automatic management and control system of the Beidou electric vehicle based on the terminal APP, which is disclosed by the invention, can allow a vehicle owner to realize the long-distance real-time all-weather full-automatic on-line monitoring of the electric vehicle through the terminal APP.
Owner:QINGDAO ACAD FOR OPTO ELECTRONICS ENG

Threading type thief-proof closed device capable of generating identification mark during stealing

The invention discloses a device which can prevent an unauthorized person from changing a protected object for stealing without leaving traces by counterfeiting or changing a connecting part, and is applied in a device with the need of being closed by a special department. The device is characterized in that a closed loop of a metal connecting rope only extends out of a hole opened on the side wall of a housing of a base, and an end socket of the metal connecting rope and/or the curved connecting part of the metal connecting rope is retained in the housing of the base, so that the end socket of the metal connecting rope and/or the curved connecting part of the metal connecting rope can not move and be used for identifying a stealing mark for stealing from the metal connecting rope; and a closed seat enters from an opening of the housing of the base and is clamped in the position of a clamping ring on the side wall in the housing of the base by a buckle of the closed seat for limiting the separation of the closed seat, the closed seat can not rotate freely in the housing or move up and down freely in the housing, and the closed seat can be used for identifying the stealing mark forstealing from the closed seat. By adopting the device, the role of preventing criminals from damaging the closed seat for stealing from the hole opened at the bottom of the housing of the base is realized.
Owner:余炳顺

Identity authentication system and method

The invention discloses an identity authentication system and method, and aims at solving problems of user password lost and stealing in the prior art so that security of user identity can be effectively guaranteed. The identity authentication system comprises a network application server, a user perceptual information database and a perceptual authentication subsystem. After an authentication request initiated by a user to be authenticated is received, perceptual authentication questioning-and-answering is performed between the network application server and the user to be authenticated based on a preset perceptual authentication scene, and authentication answer information is transmitted. The user perceptual information database is used for storing user names of all the registered users and corresponding perceptual information including personality characteristic information, emotional activity information and behavior capability information. The perceptual authentication subsystem is used for verifying whether the authentication answer information of the user to be authenticated is simultaneously matched with the perceptual information corresponding to the user name of the user to be authenticated stored in the user perceptual information database. If the verification result is yes, the user to be authenticated passes the identity authentication through judgment, or the user to be authenticated does not pass the identity authentication through judgment.
Owner:MICRO DREAM TECHTRONIC NETWORK TECH CHINACO

Anti-counterfeiting registration method and device based on face recognition, computer equipment and medium

The invention relates to the technical field of digital medical treatment, and provides an anti-counterfeiting registration method and device based on face recognition, computer equipment and a medium. The method comprises: establishing a multi-user social relationship graph; acquiring a front face image of a registrar, and identifying the registrar identity information of the registrar accordingto the front face image; according to the identity information of the registrant and the second identity information of a doctor-seeing person, judging whether the registrant and the doctor-seeing person are the same person; when it is determined that the registered person and the doctor-seeing person are not the same person, inquiring the multi-user social relation graph according to the identityinformation of the registrar, and determining whether the registrar and the doctor-seeing person are related persons according to an inquiry result; and when it is determined that the registrar is related to the doctor-seeing person according to the query result, generating a registration list for the doctor-seeing person. According to the invention, the problem that the medical insurance card isstolen can be solved, and the registration efficiency is improved.
Owner:深圳平安智慧医健科技有限公司

Underground waterproof communication device cabin

InactiveCN103414276ALow land useSolve the impact of air pollution on electronic equipmentSupports/enclosures/casingsElectrical apparatus casings/cabinets/drawersDevice breakageEngineering
The invention relates to an underground waterproof communication device cabin which comprises a ground well and a surface cover, wherein the upper end of the surface cover is flush with or higher than the ground. A waterproof cover is arranged in a communication well at the lower end of the surface cover. The communication well is connected with a device installation room. A stair for a person to go up and down, an electronic device of the underground waterproof communication device cabin, an indoor unit of an air conditioner device and space for the person to move are arranged in the device installation room. According to the underground waterproof communication device cabin, the enough space for the person to move is arranged in the ground well, installation and maintenance of the electronic device can be carried out in the ground well, and the problem that the electronic device is damaged due to the fact that the electronic device is lifted to the ground from the underground is solved. According to the underground waterproof communication device cabin, the land use amount of a wireless communication base station is reduced to be the lowest degree, the problem that the electronic device is influenced by air pollution is solved, and meanwhile the problems that the electronic device is stolen and artificially damaged is effectively solved.
Owner:北京国润通达科技有限公司

Safety verification method, mobile terminal and server side

ActiveCN107172076AImprove securitySolve the problem of interception and information theftTransmissionExecution for user interfacesComputer hardwareSecurity validation
The invention discloses a safety verification method, a mobile terminal and a server side. The safety verification method comprises the following steps that the server side generates verification code information; the server side generates virtual SIM card verification information according to the verification code information; the mobile terminal receives the virtual SIM card verification information; the mobile terminal carries out analysis and check on the virtual SIM card verification information and generates virtual SIM card return information through analysis, wherein the virtual SIM card return information which is generated through analysis includes application identification information of receiving verification information; and the mobile terminal obtains status information of a corresponding application based on the application identification information of the receiving verification information, which is included in the virtual SIM card return information, and judges whether to return the virtual SIM card return information and the status information of the application to the server side according to the status information of the application. According to the safety verification method, the problems of information intercept and stealing can be solved and the safety for user check information is guaranteed.
Owner:新格云信科技有限公司

Illegal-moving-based positioning method, electronic equipment, and storage medium

The invention discloses an illegal-moving-based positioning method. The method comprises a receiving step and a comparison and early warning step. At the receiving step, vehicle movement information is received, wherein the vehicle movement information is vehicle movement speed and vehicle movement distance information of a vehicle in a locked state. At the comparison and early warning step, comparison with a preset threshold is carried out based on the vehicle movement information to obtain comparison result information; and early warning processing is carried out based on the comparison result information. Or the method includes a sending step and a comparison and early warning step. At the sending step, vehicle movement information is sent to a backend server, wherein the vehicle movement information is vehicle movement speed and vehicle movement distance information of a vehicle in a locked state. And at the comparison and early warning step, comparison result information is received and early warning processing is carried out based on the comparison result information, wherein the comparison result is obtained by comparing the vehicle movement information with a preset threshold by the backend server. In addition, the invention also discloses electronic equipment and a storage medium. Therefore, a problem that vehicles are stolen by some users by means of illegal movement is solved.
Owner:广州捷泰通贸易有限公司

Self-tightening bolt and nut tightening assembly

PendingCN110296139ALoose protection problemDoes not affect fatigue strengthNutsBoltsAxial pressureMechanical engineering
The invention provides a self-tightening bolt and nut tightening assembly. The assembly comprises a bolt, and an upper nut, a self-tightening nut, a lower nut, a self-locking gasket and an end nut which are in connecting fit in sequence. Long screw portions which are symmetrically arranged in the diameter direction are arranged on a screw stem. The upper nut and the lower nut are each provided with a circular truncated cone shaped hole. The self-tightening nut comprises two circular truncated cone shaped columns matched with the circular truncated cone shaped holes of the upper nut and the lower nut correspondingly, and further comprises a radial staggered through gap. The self-locking gasket comprises elastic narrow curved surface clamping spine portions symmetrically arranged in the diameter direction and end surface radial wedge-shaped oblique toothed convex grooves matched with the end nut. When under axial pressure, the clamping spine portions deform and stretch and can block thelong groove portions of the screw stem portion of the bolt; and the end nut end surface is provided with wedge-shaped oblique toothed concave grooves in the radial direction, the wedge-shaped obliquetoothed concave grooves can be engaged with the wedge-shaped oblique toothed convex grooves of the self-locking gasket mutually, the screwing-out direction of the end nut is the same as the directionof engaging between the wedge-shaped oblique toothed concave grooves of the end nut and the wedge-shaped oblique toothed convex grooves of the self-locking gasket, and damping and locking effects areachieved.
Owner:高明

A password helmet lock and its installation method

ActiveCN113404392BConvenient and reliable locking deviceSolve the theftLocks for portable objectsPuzzle locksComputer hardwareKey pressing
The invention relates to a coded helmet lock, including a lock, a lock machine, a release button, a half-moon card, a small coded gear, a large coded gear, a lock shaft, a lock cover, a large coded wheel, a small coded wheel, a lock shaft cover, a coded wheel cover, The handlebar buckle and the handlebar buckle bolt; the lock bolt passes through the lock retainer, the first lock washer, the lock buckle, the second lock washer and the connection hole of the lock in turn and fixes it; the button seat and the release button pass through the button Shaft connection, a key spring is set between the key base and the release key, and the key base and the side of the release key are connected to the locking teeth. The locking teeth, the release key, the key shaft, the key base and the key spring form the release key assembly and are loaded into the In the button groove of the lock machine; the half-moon card shaft is connected with the shaft hole of the half-moon card, and the half-moon card is connected to the half-moon card spring. The beneficial effects of the present invention are: the present invention can provide a convenient and reliable helmet locking device for electric bicycle users, and solve the problem that the helmet may be stolen when going out.
Owner:ZHEJIANG UNIV CITY COLLEGE

Intelligent paint storage rack based on Internet of Things

The invention relates to the technical field of paint storage racks, and discloses an intelligent paint storage rack based on the Internet of Things, which comprises a cabinet body, a storage cavity is formed in the cabinet body, a door is arranged on the cabinet body, a paint taking position is arranged on the cabinet body, and an annular conveying rail arranged around the paint taking position is arranged in the storage cavity; a plurality of mounting parts are rotatably mounted on the annular conveying rail, the paint bucket assembly is mounted on the mounting parts, the paint bucket assembly comprises a bucket body and a bucket cover, the bucket cover is detachably mounted on the bucket body in a sealed mode, a valve, a pressure detection sensor and an inflation nozzle are arranged on the bucket cover, and the inflation nozzle is used for being connected with an air supply mechanism; through the arrangement of the pressure detection sensor and the air supply mechanism, the pressure in the barrel is the same under the condition of different paint amounts, the constant discharge amount of the paint per unit time is achieved, the paint amount can be accurately controlled by controlling the opening time of the valve, and the problem that the paint is stolen is solved.
Owner:杭州以诺行汽车科技股份有限公司

An anti-theft and alarm computer network equipment box

The invention discloses an anti-theft and alarm computer network equipment box, which includes a box body, an isolation plate is fixedly connected to the upper right corner of the inner cavity of the box, and the front and rear sides of the inner wall of the box are located below the isolation plate. The hinge is hinged with a first box door, the inside of the first box door is fixedly connected with a lock body, the inside of the lock body is rotatably connected with a lock cylinder, and the left side of the inner surface of the lock body is fixedly connected with a first conductive sheet, and is located at A sliding plate is slidably connected to the inside of the lock body and between the first conductive sheet and the lock cylinder, and the second conductive sheet is fixedly connected to the left side of the sliding plate, which relates to the technical field of anti-theft equipment boxes. In the anti-theft and alarm computer network equipment box, the lock cylinder of the device is shorter than that of an ordinary lock, so when a general lock picking tool is inserted into the lock cylinder, it will pass through the lock cylinder and push the slide plate to slide to the left, thereby making the The second conductive sheet is in contact with the first conductive sheet to make the alarm alarm, which solves the problem of stealing internal components due to picking the lock.
Owner:台州市奥金电器股份有限公司

Threading type thief-proof closed device capable of generating identification mark during stealing

The invention discloses a device which can prevent an unauthorized person from changing a protected object for stealing without leaving traces by counterfeiting or changing a connecting part, and is applied in a device with the need of being closed by a special department. The device is characterized in that a closed loop of a metal connecting rope only extends out of a hole opened on the side wall of a housing of a base, and an end socket of the metal connecting rope and / or the curved connecting part of the metal connecting rope is retained in the housing of the base, so that the end socket of the metal connecting rope and / or the curved connecting part of the metal connecting rope can not move and be used for identifying a stealing mark for stealing from the metal connecting rope; and a closed seat enters from an opening of the housing of the base and is clamped in the position of a clamping ring on the side wall in the housing of the base by a buckle of the closed seat for limiting the separation of the closed seat, the closed seat can not rotate freely in the housing or move up and down freely in the housing, and the closed seat can be used for identifying the stealing mark forstealing from the closed seat. By adopting the device, the role of preventing criminals from damaging the closed seat for stealing from the hole opened at the bottom of the housing of the base is realized.
Owner:余炳顺

And mobile terminal and server side are used for safety verification

The invention discloses a mobile terminal for safety verification and a server side. The safety verification method comprises the steps that the server side generates verification code information; the server generates virtual SIM card verification information according to the verification code information; the mobile terminal receives the virtual SIM card verification information; the mobile terminal analyzes and verifies the virtual SIM card verification information, virtual SIM card return information is generated through analysis, and the virtual SIM card return information generated through analysis comprises application recognition information for receiving the verification information; and the mobile terminal acquires state information of the corresponding application program basedon the application recognition information for receiving the verification information contained in the virtual SIM card return information, and judges whether to return the virtual SIM card return information and the state information of the application program to the server according to the state information of the application program. According to the safety verification method, the problems ofinformation interception and stealing can be solved, and the safety of user verification information is guaranteed.
Owner:吴彬
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products