Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

6875 results about "Safety risk" patented technology

Safety is defined as freedom from risk and risk is the possibility of suffering harm or loss. Both controllable and uncontrollable factors affect risk. Awareness of these factors and a willingness to manage controllable risk by modifying driver behavior is essential to any safety and risk management goals.

Method and system for remotely configuring and monitoring a communication device

Methods and systems for remotely configuring and monitoring a communication device are provided, especially useful in a computer network environment such as the Internet. A communication device or network appliance compares communications entering the communication device to a list of communication types established as known security risks, for example hacker attacks, unauthorized attempted access to network resources, or similar network security threats. If the received communication corresponds to a known security risk, the communication is classified as either a high security risk or low security risk, and an alert signal is transmitted to a remote monitoring center. Upon receiving the alert signal, the remote monitoring center assigns a priority to the alert signal based upon the type of the communication that triggered the transmission of the alert signal. Based on the assigned priority, the prioritized alert signal is then forwarded to a remote monitoring agent for resolution. The remote monitoring agent may then analyze the communication, contact the end user of the communication device with an appropriate resolution, or take other appropriate action in response to the received communication. The communication device may also be remotely configured.
Owner:SECUREWORKS

[Automated system and method for providing accurate, non-invasive insurance status verification]

InactiveUS20050209892A1Limiting featureCurrent failureFinanceSpecial data processing applicationsData streamNon invasive
The present invention relates generally to automatic insurance verification, and more specifically, to a non-invasive method and system for automatically determining, by any person with computer, wireless, or telephone access and in real-time, if an insured object of value is or is not insured irrespective of insurer location, jurisdiction, language, type, time, and also the internal operations, software platform and communications protocols used by insurers and/or governmental entities. It is an insurance verification, not an insurance reporting or tracking system and because it maintains no personal data of any kind, and can modify no record, it can deliver only very limited features regarding reporting or tracking. The present invention can however, provide absolute assurance of current insurance status at all times, provides a unique method of access which resolves all current failures and is non-invasive, providing complete privacy for all parties involved, (the absence of all personal information and the access method used ensures that all access and data is inherently non-invasive). This invention further ensures that any check of status, at insurer or governmental registration, (including “e-registration”, inspection, or any other location and time when and where a jurisdiction or insurer requires such a status check, will result in an instant and totally accurate status response. This system is based upon the assignment of a unique identifier, also known in this present art as a “UC” or “Unique Code” which then provides a method of accurate data, (including status checks), without reliance on “VINs”, (vehicle identification numbers), policy number or other identifiers which are often incorrect. The UC is assigned to any combination of two or more elements that are “gleaned”, (file field extraction and related system and methods), one of which is always current status. The extraction of these selected fields from data streams may be done by a number of prior art techniques, and the three most common have been detailed. First demonstrated to government officials in 1999 as a medical version and later the same year as a vehicle version, it has been demonstrated and documented since to a great many Federal and State governmental entities. This present invention has also been demonstrated to several foreign governments but incorporates no technologies that create any possible security risk for any government, insurer, individual, and especially to the national security of the United States.
Owner:MILLER JONATHAN K

Environmentally friendly biochar-based fertilizer and application method thereof

The invention discloses an environmentally friendly biochar-based fertilizer and an application method thereof. The preparation of the biochar-based fertilizer comprises the following steps of: drying and crushing forestry and agricultural residues, then performing oxygen limited pyrolysis on the crushed materials for 1-5 hours at 300 to 700 DEG C, and sieving, thereby obtaining biochar; and after the biochar is fixed with persistent organic pollutant degrading bacteria, mixing the biochar with a fertilizer, stirring the two thoroughly, and adding a binder accounting for 1wt%-4wt% of the total weight, thus obtaining the environmentally friendly biochar-based fertilizer. For application, the prepared environmentally friendly biochar-based fertilizer is applied to soil by 100-1000 kg per hectare; the surface layer of soil, to which the biochar-based fertilizer is applied previously, is turned over by 0-20 cm, so that the biochar-based fertilizer is mixed with the soil thoroughly, and then the soil can be used for planting crops. The environmentally friendly biochar-based fertilizer provided by the invention overcomes the shortcoming that present biochar-based fertilizers contain organic pollutants such as polycyclic aromatic hydrocarbon, the influence of the fertilizer on soil and environment is alleviated, and the safety risk of agricultural products is reduced; moreover, the environmentally friendly biochar-based fertilizer has the advantages of simple and practicable preparation process, low cost and the like.
Owner:上海孚祥生态环保科技股份有限公司

Cable multimode safe operation evaluation method based on fuzzy analytic hierarchy process (FAHP)

ActiveCN102496069ATimely discovery of potential safety hazardsSolve the problem that quantitative analysis cannot be performedData processing applicationsPower cableWeight coefficient
The invention relates to a cable multimode safe operation evaluation method based on a fuzzy analytic hierarchy process (FAHP). The evaluation method comprises the following steps of: establishing a power cable safety evaluation index system, establishing a power cable safety evaluation index comment set, and establishing a judgment matrix; judging matrix consistency check, and if the matrix does not meet consistency, returning the previous step; if the matrix meets the consistency, entering the next step; calculating a weight coefficient; and carrying out fuzzy comprehensive judgment, and determining an operating mode of the cable by maximum degree of membership. Multimode parameters are utilized to do safety evaluation on the operating mode of a power cable, and can relatively comprehensive evaluate system operation, and the evaluation method is simple and safe and reliable; and a cable multimode safe operation evaluation model is established based on the fuzzy analytic hierarchy process (FAHP) and can correctly do safety evaluation on a cable system, thereby being beneficial to finding out potential safety hazard existing in the power cable for staff in time, thus having a certain practical significance and a good development prospect.
Owner:STATE GRID SHANDONG ELECTRIC POWER

Access authentication method of internet-of-things fog device at cloud platform based on blockchain

The present invention relates to an access authentication method of an internet-of-things fog device at a cloud platform based on a blockchain. An internet-of-things device initiates an agent request of accessing a cloud platform to an intelligent gateway with a blockchain module through the means of device authentication; the blockchain module of the intelligent gateway accesses a blockchain network and gives out device certificate of the internet-of-things device and the device certificate of the intelligent gateway to the blockchain network for requiring authentication, wherein the blockchain network determines whether the request link of the intelligent gateway is frequently changed in a short period or has safety risk or not, and then verifies the legality of the intelligent gateway certificate; the same mode is employed to verify the legality of the device certificate of the internet-of-things device; and if the internet-of-things device with the blockchain module also can initiate the agent request of accessing the cloud platform, the authentication access mode is the same as the authentication mode of the intelligent gateway. The dependence on the cloud platform and the usage frequency are reduced, and the risks of the cloud platform being sniffered and injected at the aspect of the device access are reduced.
Owner:FUJIAN SHIDA COMP EQUIP

Video analysis based abnormal behavior detection method and system

The invention provides a video analysis based abnormal behavior detection method and system. The video analysis based abnormal behavior detection method comprises the following steps of extracting pedestrian foreground images from video frames; performing mesh generation on the video frames to divide the video frames into a plurality of mesh areas and setting the mesh areas in which the pedestrian foreground images are arranged to be movement areas; marking the movement areas through a nearest neighbor method and correlating the movement areas of the adjacent video frames; calculating light stream characteristics of the marked movement areas; obtaining a weighting direction histogram according to the light stream characteristics; calculating entropy of the weighting direction histogram; selecting a detection threshold value through a Gaussian mixture model, detecting whether an abnormal behavior is generated or not according to the detection threshold value and the entropy of the weighting direction histogram and updating the detection threshold value. The nested state machine based deduction process control method can automatically detect the abnormal behavior in a video scene, avoid the abnormal behavior disturbing the public plate order and endangering the public security and personal safety, reduce personnel workload and avoid potential risks caused by leak detection and error detection.
Owner:CRSC COMM & INFORMATION GRP CO LTD

Single sign-on method and single sign-on system

The invention discloses a single sign-on method and a single sign-on system. The single sign-on method comprises the steps of: receiving and authenticating a primary account name and a primary account password of a user; acquiring sub account names for all applications of the user after the user passes primary account authentication; generating a corresponding sub account password according to the sub account name selected by the user, and sending the sub account name and the sub account password to an application system corresponding to the sub account; receiving the sub account name and the sub account password which are forwarded by the application system, and generating a sub account authentication password according to the sub account name to authenticate the sub account password; and when the authentication is successful, completing the signing on to the application system. In the single sign-on method and the single sign-on system of the embodiment of the invention, secondary sign on authentication is realized by automatically generating the sub account passwords of all the application systems and filling out to all the application systems in a substitute way, thereby reducing the safety risks of application systems, caused by the disclose of all the application system passwords stored in a single sign-on platform, and also reducing the operation complexity.
Owner:中国移动通信集团江西有限公司 +1

Intelligent monitoring system and on-site violation monitoring method for personnel breaking rules and regulations on working site

The invention discloses an intelligent monitoring system and an on-site violation monitoring method for personnel violating rules and regulations on a working site. The system comprises a data storagelibrary and a plurality of video acquisition units arranged on a working site. The video acquisition units are in communication connection with the data storage library. The data storage library comprises a personnel information data unit, a face detection unit, a personnel information matching unit and a violation behavior detection unit, the personnel information data unit is in communication connection with the face detection unit, the face detection unit is in communication connection with the personnel information matching unit, and the personnel information matching unit is in communication connection with the violation behavior detection unit. Also provided is an onsite violation monitoring method. Through the machine vision learning network, different violation behaviors of the operating personnel can be early warned rapidly and effectively, factors such as weak personnel safety awareness, behavior habits and difficulty in traditional video monitoring and recognition can be effectively avoided, potential safety hazards caused by the violation behaviors are effectively prevented, and the safety of site construction is improved.
Owner:CHINA PETROLEUM & CHEM CORP +1

Intersection traffic flow characteristic analysis and vehicle moving prediction method based on trajectory data

The invention discloses an intersection traffic flow characteristic analysis and vehicle moving prediction method based on trajectory data, and belongs to the technical field of intelligent traffic system and traffic flow parameter acquisition. The method starts with space transient analysis of a vehicle original trajectory, and describes and analyzes trajectory local geometrical characteristics at different angles, forms a multilevel spectral clustering processing framework based on a vehicle original rough movement track, and automatically extracts and analyzes a plurality of traffic direction modes of an intersection included in the trajectory data. With the basis, the method can acquire intersection sub-phase (signal control intersection) traffic flow and travel time of vehicles in all directions passing through the intersection, and other detailed traffic characteristic parameters, as important complement of conventional traffic data. Through tracking travelling tracks of all moving vehicles at present moment, a traffic direction trajectory mode matching method is used to predict the next behavior of the vehicles, thereby being beneficial for warning safety risks which may exist on an intersection in real time.
Owner:中天思创信息技术(广东)有限公司

Multi-step attack detection method based on multi-source abnormal event correlation analysis

ActiveCN106790186AImprove Security Analysis CapabilitiesReduce time to discoveryTransmissionFeature extractionCorrelation analysis
The invention relates to a multi-step attack detection method based on multi-source abnormal event correlation analysis. The multi-step attack detection method comprises the following steps: firstly, calculating a safety event score based on an attach chain through feature extraction and abnormal event definition and identification, identifying an abnormal host and clustering various types of events by taking an attacked host as a clue; secondly, carrying out correlated recombination on a suspected attack progress by utilizing means including intra-chain correlation, inter-chain correlation, feature clustering and the like; finally, reconstructing a multi-source attack scene and outputting a predicated attack event. According to the multi-step attack detection method provided by the invention, dispersed and isolated safety events are subjected to the correlation analysis to generate the relative complete multi-step attack scene; a safety analysis capability of safety managers can be improved and a safety view angle is expanded; distributed and scattered multi-step attack threats are effectively coped and the finding time of attack behaviors is shortened; an effective predication and defending solution is provided for high-grade attack means including APT (Advanced Persistent Threat) and the like; the safety risks of a system are reduced and the network information safety is effectively protected.
Owner:THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products