Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

42 results about "Exception rule" patented technology

Exceptions to the Rule. In personnel or disciplinary proceedings as long as you are unpaid. You can represent your immediate family members or any other person if you are serving as their guardian, executor, administrator, trustee or other personal fiduciary, provided: Your appointing authority approves.

Monitoring method, device and system as well as monitoring equipment

The embodiment of the invention discloses a monitoring method, device and system as well as monitoring equipment. The method is applied to second monitoring equipment in the monitoring system. The monitoring system further comprises first monitoring equipment. The method comprises the following steps: acquiring first position information transmitted by the first monitoring equipment, wherein the first position information is position information corresponding to a first target in a scene, and the first target is a target which is recognized by the first monitoring equipment and triggers a first exception rule; performing zoom-in monitoring on the first target according to the first position information; acquiring an auxiliary image including the first target, wherein the auxiliary image isan image acquired when the second monitoring equipment performs zoom-in monitoring on the first target; and judging whether the first target in the auxiliary image triggers a second exception rule ornot, and if so, determining the first target as an exceptional target. Through the technical scheme provided by the embodiment of the invention, the target included in the auxiliary image acquired bythe second monitoring equipment has relatively abundant detailed information, so that the recognition accuracy of the exceptional target can be improved.
Owner:HANGZHOU HIKVISION DIGITAL TECH

Abnormal file restoration method, device and equipment, and storage medium

The invention discloses an abnormal file restoration method, device and equipment and a storage medium, and the method comprises the steps: obtaining the file structure information corresponding to a to-be-detected file, and searching a preset abnormal rule library for whether there is a target abnormal rule matched with the file structure information or not; and when the target exception rule exists, judging that the to-be-detected file is an exception file, obtaining a file repair algorithm corresponding to the target exception rule, and repairing the to-be-detected file according to the file repair algorithm. Compared with the existing mode of identifying or detecting the abnormal file through the feature code and repairing the file by searching the corresponding health file or the address information of the health file in the file database, the method, device and equipment have the advantages that whether the to-be-detected file triggers the abnormal rule or not is judged through the file structure information, and if yes, the to-be-detected file is judged to be abnormal; and the corresponding file repair algorithm is obtained according to the triggered exception rule to repair the file, so that the accuracy of exception identification is ensured, and the file repair rate is also improved.
Owner:三六零数字安全科技集团有限公司

Method for processing identity card authentication information processing request

The invention provides a method for processing an identity card authentication information processing request, and the method comprises the steps: receiving the identity card authentication information processing request, obtaining a blacklist, and obtaining an access frequency management and control list if a serial number of an identity card and a serial number of a card reader are not in the blacklist; obtaining an exception rule if the access frequency management and control list does not contain storage record of the serial number of the identity card in a first preset time interval before the moment when the access frequency management and control list is obtained and the access frequency management and control list does not contain the storage record of the serial number of the card reader in a second preset time interval before the moment when the access frequency management and control list is obtained; carrying out the processing of the identity card authentication information processing request if the serial number of the identity card and the serial number of the card reader do not accord with the exception rule, thereby achieving the triple dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.
Owner:TENDYRON CORP

Access frequency management and control device for identity card authentication information

The invention provides an access frequency management and control device for identity card authentication information, and the device comprises a fourth communication module which is used for obtaining an access frequency management and control list; a second judgment module which is used for judging whether the access frequency management and control list contains the storage record of the serial number of an identity card in a first preset time interval before the moment when the access frequency management and control list is obtained or not, or judging whether the access frequency management and control list contains the storage record of the serial number of a card reader in a second preset time interval before the moment when the access frequency management and control list is obtained or not; a fifth communication module which is used for obtaining an except rule; a third judgment module which is used for judging whether the serial number of the identity card or the serial number of the card reader accords with the exception rule or not; and a processing module which is used for processing an identity card authentication information processing request, thereby achieving the dual dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.
Owner:TENDYRON CORP

Exception handling system for identity card authentication information processing request

ActiveCN106027468AFreeze for a short timeImprove securityTransmissionAccess frequencyHandling system
The invention provides an exception handling system for an identity card authentication information processing request. A dispatch server receives the identity card authentication information processing request, obtains a blacklist, and obtains an access frequency management and control list if a serial number of an identity card and a serial number of a card reader are not in the blacklist. An exception rule is obtained if the access frequency management and control list does not contain storage record of the serial number of the identity card in a first preset time interval before the moment when the access frequency management and control list is obtained and the access frequency management and control list does not contain the storage record of the serial number of the card reader in a second preset time interval before the moment when the access frequency management and control list is obtained. The identity card authentication information processing request is processed if the serial number of the identity card and the serial number of the card reader do not accord with the exception rule, thereby achieving the triple dynamic verification of the identity card and the identity card reader, and improving the processing safety and reliability of the identity card authentication information processing request.
Owner:TENDYRON CORP

Dynamic processing method and system for identity card authentication information processing request

The invention provides a dynamic processing method and system for an identity card authentication information processing request. The method comprises the steps: enabling a dispatch server to receive the identity card authentication information processing request and to obtain a blacklist; obtaining an access frequency management and control list if a serial number of an identity card and a serial number of a card reader are not in the blacklist; judging whether the number of times that the serial number of the identity card and/or the serial number of the card reader appear or appears in the access frequency management and control list in a preset time interval before the obtaining of the access frequency management and control list is greater than a preset value or not; adding the serial number of the identity card and/or the serial number of the card reader to the blacklist if the number of times is greater than the preset value; obtaining an exception rule if the number of times is zero; judging whether the serial number of the identity card and/or the serial number of the card reader accord or accords with the exception rule; and adding the serial number of the identity card and/or the serial number of the card reader to the access frequency management and control list if the serial number of the identity card and/or the serial number of the card reader accord or accords with the exception rule. Therefore, the method achieves the triple dynamic verification of the identity card and the card reader, and improves the processing safety and reliability of the identity card authentication information processing request.
Owner:TENDYRON CORP

An information security detection method, device, electronic equipment and storage medium

The application discloses an information security detection method, device, electronic equipment, and storage medium; the method relates to protection in the field of computer security, can obtain target transaction information, and perform characteristic analysis on the transaction information in each dimension of the target transaction information Statistical analysis and processing to obtain characteristic information of the target transaction information; through the abnormality recognition model, the abnormality score of the target transaction information is obtained based on the characteristic information, the abnormality recognition model includes at least one recognition sub-model, and each recognition sub-model corresponds to at least one abnormality recognition rule; When the abnormal score is greater than the preset first threshold, an abnormal rule set is obtained, and the abnormal rule set includes at least one abnormal rule; when the target transaction information matches the abnormal rule, it is determined that the target transaction information is an abnormal transaction. The application can combine the prediction results of the abnormality recognition model and the abnormality rule set to detect the security of the transaction information, which improves the detection efficiency and accuracy of the transaction information.
Owner:TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products