Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

66 results about "Security industry" patented technology

Security industry camera core assembly based automatic assembly system and method

The invention relates to automatic assembly systems, particularly to a security industry camera core assembly based automatic assembly system and method. The security industry camera core assembly based automatic assembly system comprises an operation area; an operation frame is arranged in the operation area; an operation disk is arranged above the operation frame, wherein the operation disk and the operation frame are fixed; the rotation of the operation disk is controlled by an indexer; a controller is arranged in the operation frame; the edge of the operation disk is provided with at least six operation position assemblies which are distributed uniformly; the operation area comprises a turnover positioning fixture, a lens feeding robot assembly, a base feeding robot assembly, a lateral side nailing assembly, a PCB (Printed Circuit Board) feeding robot assembly, a rotary table fixture calibration assembly, a PCB nailing assembly, a bolt detection assembly, a discharging assembly and a screw feeding and distribution assembly. According to the security industry camera core assembly based automatic assembly system and method, the assembly efficiency is improved, the degree of automation is high, the product quality is improved, and the labor cost is reduced.
Owner:SIASUN ROBOT & AUTOMATION LIMITED BY SHARE

Digital electronic detonator chip based on double-wire bus and control method

ActiveCN109696097AImprove Clock Frequency AccuracyStandardize the control processBlastingDetonatorCommunications security
The invention relates to a digital electronic detonator chip based on a double-wire bus and a control method. The chip adopts the non-polar and one-leader-multiple-follower half-duplex type double-wire bus with communication and power supply functions, and communication of an amplitude and pulse width modulation modes is supported; during pulse width modulation communication, a downlink communication standard pulse width value can be configured according to needs, and a uplink communication standard pulse width value is fixed; the chip comprises all the function modules for completing the detonation operation and a communication instruction set, a charging voltage value can be externally configured; the chip control method is composed of 'detonator chip information injection and detonatorchip on-site detonation'; and through the mode, the digital electronic detonator chip and the control method can meet requirements and practical application demands of the latest Chinese public security industry standard, namely the 'Industrial Electronic Detonator Information Management General Rule(GA1531-2018) ', the anti-interference performance and the communication safety reliability are improved, the application scene is expanded, the configurability and the detonation safety of the chip are improved, the control process is standardized, improper operation is avoided, and the comprehensive cost is reduced.
Owner:华夏世昌(北京)科技有限公司

Ventilation and air-drying system for grain store of grain depot

The invention relates to a grain air-drying and ventilation system for a grain store of a grain depot in the grain storage security industry, which aims to solve the problems of high cost of grain storage, air-drying, ventilation and the like, difficulties in the gathering and warehousing of grains in cloudy and rainy days, high labor intensity and waste of time. The scheme is that: a cylindrical hoisting device is arranged on the outer wall of the grain store of the grain depot; the lower part of the grain store of the grain depot forms an inverted prismatoid; an axial screw is arranged on the lowest part of the inverted prismatoid; an inclined air-drying surface is formed on the grain store of the grain depot; the upper part of the grain store of the grain depot realizes the ventilation and air-drying of the grains by utilizing natural wind and sunshine; and the axial screw is arranged at the wall bottom of the grain store of the grain depot to convey the grains of the inverted prismatoid to the cylindrical hoisting device, and the hoisting device hoists the grains at the bottom onto the inclined air-drying surface on the grain store, so the grains are air-dried on the inclined air-drying surface, slide down by self weight and are ventilated for mould prevention, corrosion prevention and temperature reduction by the natural wind. The system has a simple, novel and unique structure, is simple and convenient to use and operate, ensures low labor intensity and remarkable economic efficiency and social effects, can realize the mechanization and automation of a grain air-drying system and greatly improve the labor efficiency, and is a great innovation in the grain storage industry.
Owner:HENAN POLYTECHNIC UNIV

Search method of real-time vertical search engine for security industry

The invention relates to a search method of a real-time vertical search engine for a security industry. The search method comprises performing high-frequency directional fetching on news web pages through a server; performing formatting processing on news content of the fetched news web pages; performing evaluation calculation on the relevance of the formatted news content and relevant keywords and the influence on the public of the news content; storing results into a database and calculating weights of the search results according to multiple parameters and sorting and displaying the search results through a system when users search data. Accordingly, the passive synchronization of the search engine information and an information source can be achieved and the problems that the general search engine by the traditional search method is poor in timeliness and repeated in information are solved; the directional collection is only performed on an industry representative financial news release source of the Internet and accordingly the efficiency is high and the search results are timely and accurate; in addition, the search method is combined with a public opinion analysis technology and accordingly the search results can be sorted in multiple modes and the display effect is humanized.
Owner:ZHUHAI FOXX NETWORK TECH

Security industry data collecting method and system implemented on basis of XMPP

InactiveCN104243477AGuaranteed data collection needsEnsure safetyTransmissionData streamData management
The invention discloses a security industry data collecting method and system implemented on the basis of an XMPP. The method includes the following steps that a client-side is connected to an XMPP server, the XMPP server verifies a real name or a police number submitted by the client-side, connection succeeds if the real name or the police number passes verification, and connection fails if the real name or the police number does not pass verification; the client-side carries out initialization on information collecting equipment, stores the collected information to be data flow, carries out format conversion and compression on the data flow, and packages the data flow by the utilization of the XMPP, the packaged data flow is inserted into XML data flow, and the XML data flow is encrypted according to a DES and then transmitted to the XMPP server; the XMPP server receives the encrypted data, decrypts the data to be the XML data flow for analysis, and restores the XML data flow to be a resource file; the analyzed resource file is stored to a data management server so that other client-sides of a security system can search for the file. People in the security industry can apply the method with the fixed and mobile client-sides utilized for collecting data whenever and wherever conveniently, and working efficiency is improved.
Owner:MASSCLOUDS

Security information duplicate checking method and system based on semantic analysis

PendingCN110321466ASolve the problem of original detectionHigh precisionFinanceWeb data indexingWeb pageData mining
The invention discloses a security information duplicate checking method and system based on semantic analysis. The method comprises the steps of collecting latest to-be-detected information data in real time from an information writing service system; blocking the to-be-detected information data by adopting a text segmentation algorithm to obtain a plurality of information blocks; conducting crawler processing on each information block, conducting cleaning and splicing through a webpage blocking method and a webpage information structured extraction method after corresponding associated texts are obtained, and obtaining final crawler data; and sequentially performing neighborhood retrieval and semantic similarity calculation on the information data to be detected and the final crawler data by adopting a simhash neighborhood algorithm and a maximum text fragment algorithm to finally obtain a semantic similarity calculation result. According to the method, a simhash algorithm and a maximum text fragment algorithm are provided and organically combined with a crawler system, the problem of original detection of security industry information is solved on the premise that a text library does not need to be established, and duplicate checking accuracy and efficiency are improved.
Owner:GF SECURITIES CO LTD

Security industry oriented intelligent public opinion monitoring method and system

The invention discloses a security industry-oriented intelligent public opinion monitoring method and system, and the method comprises the steps: collecting news public opinion data for issuing a maindimension in the security industry, carrying out the data duplication removal, and obtaining news public opinion information; carrying out abstract extraction and sentiment classification on the newspublic opinion information, generating a chapter abstract and a chapter sentiment label, and carrying out main body identification on the news public opinion data to obtain corresponding main body information, a main body industry label and a main body area label; performing main event identification on the main body information according to the event tag system and an event classification algorithm to obtain a main body event tag and a corresponding emotion tag; and forming a triple according to the main body information, the main body event tags and the emotion tags, and summarizing the triple corresponding to all the main bodies to generate a chapter-level triple. The public opinion information can be extracted in multiple dimensions, the accuracy and efficiency of system classification are improved through the event label system and the fusion algorithm, and the effect of accurate and efficient public opinion monitoring is achieved.
Owner:GF SECURITIES CO LTD +1

Vocational and technical training system for security industry application technology

The invention relates to a vocational and technical training system for security industry application technology, comprising subsystems of video surveillance, anti-theft alarm, building intercom, access control, night watching, park management and the like, wherein the video surveillance subsystem comprises a 22X infrared all-in-one machine, a high-sensitivity day and night type camera, an IP type network camera, a wide dynamic camera, an integrated camera, an intelligent high speed sphere, an infrared small hemisphere, a spiral small hemisphere, an IP type network video server, and a digit hard disk video recorder; the anti-theft alarm subsystem comprises a front-end alarm detector which comprises an infrared alarm detector, a door magnetic, an infrared shooting detector, and a vibration alarm detector; the access control subsystem comprises an entrance guard controller, a card reader, an electric control lock and an access control card; the night watching subsystem comprises a night watching rod, a communication base, night watching spots, personnel spots, an event log, and management software; and the park management subsystem comprises vehicle identity judgment, access control, automatic license plate identification, parking plot search, parking plot guidance, meeting reminding, image display, vehicle type checking, time calculation, fee collection and checking, voice intercom, and automatic card acquisition.
Owner:刘赵峰

Instruction front-end system and corresponding instruction front-end interactive method

The invention relates to the field of computer instruction front-end interaction, and provides an instruction front-end system and a corresponding instruction front-end interactive method. The instruction front-end system is achieved by utilizing the JavaScript language, a multi-window frame is adopted, and the multi-window frame comprises a tool bar, a window bar and a status bar. The instruction front-end system is compiled by completely adopting the JavaScript language, the good browser compatibility is achieved, the system can operate in various mainstream browsers, an operation system is not limited and required, and user use convenience and user experience are improved. Meanwhile, two main instruction types on a host system are achieved through the system, that is, a common command line interactive instruction and a full-screen gap filling type instruction are fully supported. The system is used as an instruction interactive terminal of civil aviation CRS, ICS and DCS hosts, and can fully support the civil aviation air ticket distribution business and the airline flight control and departure business. The system can be suitable for other industries with instruction interaction as the main operation mode, such as the banking industry, the insurance industry and the securities industry.
Owner:TRAVELSKY

Securities industry performance evaluation method, system and device, and storage medium

InactiveCN108537436AHigh reference valueConducive to business allocationFinanceResourcesEvaluation resultEntropy weight method
The present invention discloses a securities industry performance evaluation method, system and device, and a storage medium, belonging to the technical field of securities industry business type evaluation. The method comprises the steps of: determining a securities industry performance evaluation system based on a balanced scorecard; performing data collection and processing; employing an analytic hierarchy process to perform subjective weight of a criterion layer and an index layer; employing an entropy weight method to perform objective weight for the criterion layer and the index layer; performing comprehensive weight of subjective and objective combination to the index layer, and obtaining a comprehensive weight of the index layer; performing normalization processing of the comprehensive weight to obtain an improved index comprehensive weight; and according to the improved index layer comprehensive weight, obtaining a securities industry performance evaluation result, and performing output. According to the technical scheme, the securities industry performance evaluation method, system and device, and the storage medium are suitable for performance evaluation of various businesses of securities, are high in accuracy and are close to actual situations.
Owner:宿州学院

IMSI privacy protection method in 5G high-security terminal

The invention discloses an IMSI privacy protection method in a 5G high-security terminal. An anonymization algorithm module and a privacy configuration module are additionally provided in the terminal, wherein the main function of the anonymization algorithm module is to perform anonymous processing on IMSI information, and the main function of the privacy configuration module is to selectively activate or close the anonymization algorithm module for application programs of different security levels. According to the IMSI privacy protection method provided by the invention, the privacy of theIMSI is ensured in the high-security terminal by using the anonymization algorithm so as to reduce the possibility of an attacker of capturing the IMSI information through the application programs ofthe terminal, so that the identity privacy of a user of the high-security terminal is protected. The application range of the method is wide, the method is not only suitable for the high-security terminals in the current 4G network, but also is suitable for the high-security terminals in the future 5G network. The requirements of identity privacy protection of users in the high-security industriescan be satisfied. The anonymization algorithm can also be extended to protect the identity information of other terminals.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1

Intelligent zipper and processing device thereof

The invention discloses an intelligent zipper. The intelligent zipper comprises a zipper body, wherein the zipper body is provided with a zipper head and a pull-tab, the zipper head is provided with a meshing opening and a guiding opening, and the pull-tab is arranged on the upper end of the zipper head and is in clearance fit with the zipper head. The intelligent zipper is characterized in that the pull-tab is connected with a pull ring, a PCBA board is arranged in the pull ring, a chip into which terminal client information can be implanted is built in the PCBA board, and the chip is provided with a GSM / GPRS module with a positioning function. According to the intelligent zipper, the latest single chip MT6260 is adopted, the quadruple-frequency universal subminiature GSM / GPRS module with low power consumption and the positioning function is developed and implanted into the chip of the zipper, and then the terminal client information according to the zipper selling is implanted into the chip, and the intelligent zipper has the functions of remote prevention of burglary, and position monitoring, and can be widely applied to the fields including the smart home, the medical terminal, the security industry, the mobile communication transmission, the remote monitoring, the personal positioning and checking attendance, personnel management, terminal data transmission and the like.
Owner:王丽华

Parallel automated testing system for test case in futures and security industry

The invention discloses a parallel automated testing system for a test case in the futures and security industry. The system comprises a testing queue, a distribution machine, a plurality of actuating machines and a resource database, wherein the testing system calls test data from the resource database for supporting the operation of the test case after a testing check command, transmitted by the actuating machines, of the test case is received by the testing system, and a testing result is generated; the actuating machines monitor the operation condition of the test case, and a testing result is obtained and returned to the distribution machine; after the test is completed, the occupied testing data resources are released and marked into an available state again; and the state of the operated test case is changed, the test case is deleted from the testing queue, and parallel testing of a plurality of test cases are completed after all test cases in the testing sequence are successfully tested, that is, the testing queue is empty. The parallel automated testing system for the test case in the future and security industry has the advantages that the utilization ratio of a tested system is increased, various testing resources are sufficiently used, and the actuating efficiency is obviously improved.
Owner:大商所飞泰测试技术有限公司

System, method and device for realizing suspicious transaction scene model identification processing based on combination construction, processor and storage medium thereof

The invention relates to a system for realizing identification processing of an anti-money laundering suspicious transaction scene model in the securities industry based on combination construction, and the system comprises: a data feature collection module, which is used for collecting various data needed by the suspicious transaction scene model for behavior identification processing; a monitoring scene construction module, which is used for constructing a monitoring scene model according to a system preset rule by using the collected data; and a suspicious transaction behavior identification module, which is used for carrying out identification processing on suspicious transaction behaviors according to the combined triggering result of the monitoring scene model. The invention further relates to a corresponding method and device, a processor and a storage medium thereof. By adopting the system, the method, the device, the processor and the storage medium of the invention, the diversity of monitoring data is broadened comprehensively, new monitoring rules are continuously added, threshold values constructed by combination are continuously optimized and corrected, anti-money laundering suspicious transaction clients are screened in a multi-view manner, and the system, the method, the device, the processor and the storage medium have important significance for the identification work of an actual anti-money laundering suspicious model.
Owner:GUOTAI JUNAN SECURITIES

Source tracing method of same source code

The invention relates to a source tracing method of a same source code, which comprises the following steps of: establishing a standardized vulnerability knowledge base in a crawler mode, obtaining open source codes meeting specifications, preprocessing open source code results, and storing the preprocessed open source code results; constructing a Neo4j graph database; and carrying out business processing. Therefore, the detection speed can be improved based on the graph library association relationship between the content hash value of the source code and the directory hash value. The problem of full detection of collision between binary files and files is solved, and the speed is increased by more than 10 times, so that engine support is further provided for open source software supply chain security detection. Through multi-dimensional clustering, whether a certain module or a subclass of the module is adopted can be distinguished according to a calculated result score, and the problem that a detection result of a supply chain is inaccurate due to an inclusion relation between open source project modules is solved. More accurate open source items and versions can be provided, so that vulnerability detection in the security industry of the software industry is more accurate.
Owner:苏州棱镜七彩信息科技有限公司

Device integrating various back-end functions of high-definition video monitoring system

InactiveCN102082949ASolve the problem that only a single brand camera can be connectedSolve the problem that only a few brands of cameras are supportedClosed circuit television systemsDigital video signal modificationDigital videoComputer module
The invention discloses a device integrating various back-end functions of a high-definition video monitoring system, which comprises a control management module, a decoder, an encoder and a hard disk array, wherein a digital video source is inputted to the control management module, outputted to the decoder through the control management module, outputted to display equipment for displaying after being decoded by the decoder, and simultaneously outputted to the control management module, the control management module outputs input information of the decoded digital video source to a network client side and simultaneously outputs the input information of the digital video source to the encoder, and then the input information of the digital video source is inputted to the hard disk array to be stored after being encoded by the encoder. The device thoroughly solves the problem that all high-definition video monitoring end-back equipment in a security industry can only be connected with a single brand of cameras or only support several brands of cameras; simultaneously the device integrates the main application functions of the back end of the high-definition video monitoring system and can also be applied together with vehicle snapping systems, such as an electronic police, a security mount and the like, thereby realizing data exchange visit and interexchange.
Owner:武汉经纬视通科技股份有限公司

A clip-type commodity anti-theft device applied to the electronic commodity anti-theft industry

The invention provides a clamping type commodity anti-theft device applied to an electronic commodity security industry, comprising a first rotatable clamp arm and a second clamping match component, wherein the first rotatable clamp arm and the second clamping match component are matched for clamping a commodity; the anti-theft device is provided with an eccentric wheel for driving the first clamp arm to rotate so as to match with the second clamping match component or separate the clamping match from the second clamping match component; the anti-theft device is further provided with a handlefor operating the eccentric wheel to rotate; and the anti-theft device is further provided with a lock for locking the handle at a current position when the anti-theft device is in a clamping state, wherein the lock is a magnetic lock. The clamping type commodity anti-theft device applied to the electronic commodity security industry is simple in structure and operation, capable of being fixed onsurfaces of leather commodities, such as uppers of shoes, boots and any part of leather garments by clamping, without damaging the leather commodities. Furthermore, the clamping type commodity anti-theft device applied to the electronic commodity security industry can be widely applied to various kinds of commodities with parts capable of being clamped for fixing the anti-theft device.
Owner:HANGZHOU CENTURY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products