Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

63 results about "Port security" patented technology

Port security is part of a broader definition concerning maritime security.It refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves and the protection and inspection of the cargo moving through the ports. Security risks related to ports often focus on either the physical security of the port, or security risks within the maritime supply chain.

Air station security information system

The invention discloses an air port security inspection information system, which comprises the following modules: a local departure module, a security inspection boarding gate verification module, a security inspection unpacking working module, an integral inquiry module, a pursuit information module, a security inspection passage verification desk module and a background management module. The system with simple and reasonable structure can be adapted to the requirements of modernization development, improve the service and management level of the security inspection, provide effective security inspection means for air port, crack down on crimes forcefully, maintain social stability, etc. The invention also provides close and effective security inspection management means to guarantee air defense security, provides a simple, convenient, standardized security inspection process, and improves efficiency as well as service quality. Furthermore, the invention which provides complete reference for security inspection management is closely integrated with other systems (such as the passenger information in the departure system data, etc.), thereby realizing data sharing, saving investment, effectively monitoring security inspection personnel and attendance states and strengthening personnel management.
Owner:成都双流国际机场空港科技有限公司

Dangerous cargo container stockpiling early warning method and system

PendingCN110223022ARealize the visualization of the storage yardRealize dynamic storage early warning managementForecastingCo-operative working arrangementsEarly warning systemTime efficient
The invention relates to a dangerous cargo container stockpiling early warning method and system. The method comprises the steps of obtaining stockpiling site data of a container; establishing a stockpiling rule according to the container dangerous cargo stockpiling standard specification; establishing a container stockpiling model according to the stockpiling dangerous goods of the container; matching the stockpiling rules of the containers according to the container stockpiling site; substituting the stockpiling rule into the stockpiling model; and judging whether to send out early warning or not according to the stockpiling rule and the calculation result of the stockpiling model. The invention discloses a real-time analysis and early warning system for port dangerous cargo container stockpiling. Functions of container yard visualization, dynamic stockpiling early warning management, dangerous cargo information integration, information inquiry and the like are realized. Real-time efficient calculation can be achieved, early warning prompt can be conducted on containers which do not meet the stockpiling requirement in the forms of highlight, marks, pop-up windows and the like, apowerful auxiliary tool is provided for port safety management departments and port enterprises to analyze and display the stockpiling condition of the containers, and remarkable effects are achievedin the aspect of guaranteeing the operation safety of port dangerous cargos.
Owner:TIANJIN RES INST FOR WATER TRANSPORT ENG M O T

Computer network information security monitoring system

The invention discloses a computer network information security monitoring system comprising a central processing unit, a CPU, a network information security module, a virus real time scanning module, a timed inspection tour module and a port security control module; the central processing unit and the CPU are arranged in a computer; the network information security module, the virus real time scanning module, the timed inspection tour module and the port security control module are used for network information monitoring; an input end of the central processing unit is connected with output ends of the network information security module, an identity verification unit, an information tracking module, the virus real time scanning module and a network abnormity assessment module. Via the computer network information security monitoring system, information of a computer information security system is monitored and protected from a plurality of angles and aspects; security of use and transmission of computer information can be greatly improved; security of classified information of government departments, enterprises and the like can be improved; stable network operation can be maintained, data protection capability can be realized, and information loss can be prevented when a user is away from a computer.
Owner:XINXIANG UNIV

Enterprise network security management method

The invention discloses an enterprise network security management method, which comprises the following steps of: constructing a DMZ firewall between an enterprise network and an extranet to realize the functions of real IP hiding and access control, and establishing an IPSecVPN between a head office and a branch company to realize security information transmission of intranets in different regions, so that the risk is reduced, and the security is improved. Port security is configured on a two-layer switch, a data packet threshold value through which the port passes is preset, or MAC addresses allowed to be connected to the switch port are recorded through an MAC address table, a specific number or specific MAC addresses are allowed to use the port for communication, illegal equipment is prevented from accessing a network, MAC address table overflow caused by MAC address flooding can also be prevented, and by dividing vlan, the broadcast storm is reduced, and the pressure of the two-layer switch is fully shared; and in addition, link binding aggregation is used, the transmission bandwidth between the switches is increased, bidirectional authentication is carried out by configuring a PPP protocol and adopting chap, connection of illegal users is prevented, and the safety is further improved.
Owner:YANCHENG INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products