Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

122results about How to "Accurate interception" patented technology

Longitudinal minimal-invasion bone cutter for tubular bones

InactiveCN102860860AFor lateral tractionFacilitates longitudinal osteotomySurgeryTraction TreatmentPeriosteum
A longitudinal minimal-invasion bone cutter for tubular bones comprises a bone cutting end bone cutting device and far end positioning devices. The bone cutting end bone cutting device is slidingly sleeved on a positioning adjusting guide rail which is in a long-strip shape, a sliding groove is arranged in the middle of the positioning adjusting guide rail along the length direction, and scales of the positioning adjusting guide rail are arranged along the sliding groove. The far end positioning devices are symmetrically sleeved at two ends of the positioning adjusting guide rail slidingly. By means of the longitudinal minimal-invasion bone cutter, medical workers can perform longitudinal bone cutting operations on the tubular bones according to treatment needs, and the longitudinal minimal-invasion bone cutter is convenient to operate. When the operations are performed, the longitudinal minimal-invasion bone cutter provides convenience for transverse traction of bone blocks and meets needs of angiitis treatment. The bone cutting operations performed by the aid of the longitudinal minimal-invasion bone cutter belong to minimal-invasion operations, do not damage nerves, blood vessels, soft tissues and periostea, have small invasion, facilitate reconstruction and union of bones, and meet needs of longitudinal traction treatment of the tubular bones. By means of the longitudinal minimal-invasion bone cutter, safety and accuracy of the longitudinal bone cutting operations of the tubular bones are improved, medical workers can conveniently perform the operations, and the operation effect is guaranteed.
Owner:JIANGSU GUANGJI MEDICAL TECH

Vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system

A vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system comprises a searching cradle head, an early warning detector, a launch canister and bullet ammunition, wherein the early warning detector and the launch canister are arranged on the searching cradle head, and the bullet ammunition is arranged in the launch canister. According to the vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system, the technical problem that an interception method provided by the prior art only applies to propeller-type unmanned aerial vehicles made from metal, is difficult to apply to high-speed maneuverable unmanned aerial vehicle targets and is prone to causing secondary damage to ground surface personnel or other targets are solved. According to the vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system, unmanned aerial vehicle distance and speed information is obtained through a millimeter wave one-emitting-and-double-receiving early warning frequency-modulated radar, the unmanned aerial vehicles are searched, traced and automatically targeted through the searching cradle head, and a net bullet is launched; the net bullet is equipped with a close sensing fuse, timely ignition is conducted with the miss distance serving as the base point, small rockets are launched so as to enable the net bullet to obtain best cooperating of the net setting speed and the flight speed, and the time for approaching the targets are shortened to the greatest extent; and interception and capturing efficiency of the net bullet interception system are improved, and the vehicle-mounted anti-unmanned-aerial-vehicle net bullet interception system is suitable for accurate interception and capturing of the high-speed maneuverable unmanned aerial vehicles.
Owner:芜湖博高光电科技股份有限公司

Longitudinal minimal-invasion bone cutter for tubular bones

InactiveCN102860860BFor lateral tractionFacilitates longitudinal osteotomySurgeryLess invasive surgeryEngineering
A longitudinal minimal-invasion bone cutter for tubular bones comprises a bone cutting end bone cutting device and far end positioning devices. The bone cutting end bone cutting device is slidingly sleeved on a positioning adjusting guide rail which is in a long-strip shape, a sliding groove is arranged in the middle of the positioning adjusting guide rail along the length direction, and scales of the positioning adjusting guide rail are arranged along the sliding groove. The far end positioning devices are symmetrically sleeved at two ends of the positioning adjusting guide rail slidingly. By means of the longitudinal minimal-invasion bone cutter, medical workers can perform longitudinal bone cutting operations on the tubular bones according to treatment needs, and the longitudinal minimal-invasion bone cutter is convenient to operate. When the operations are performed, the longitudinal minimal-invasion bone cutter provides convenience for transverse traction of bone blocks and meets needs of angiitis treatment. The bone cutting operations performed by the aid of the longitudinal minimal-invasion bone cutter belong to minimal-invasion operations, do not damage nerves, blood vessels, soft tissues and periostea, have small invasion, facilitate reconstruction and union of bones, and meet needs of longitudinal traction treatment of the tubular bones. By means of the longitudinal minimal-invasion bone cutter, safety and accuracy of the longitudinal bone cutting operations of the tubular bones are improved, medical workers can conveniently perform the operations, and the operation effect is guaranteed.
Owner:JIANGSU GUANGJI MEDICAL TECH

Audio generating method and device

The present invention relates to an audio generating method. The method comprises the following steps: performing theme extraction on comparison audio to obtain a comparison note sequence, wherein the comparison note sequence comprises a comparison note position, a comparison note pitch and a comparison note duration; obtaining original audio matched with the comparison audio by audio retrieval, and obtaining an original note sequence corresponding to the original audio, wherein the original note sequence is obtained by performing theme extraction on the original audio and comprises an original note position, an original note pitch and an original note duration; calculating a theme distance between segments of the comparison audio and the original audio according to the comparison note sequence and the original note sequence; and intercepting the segments of the original audio with the minimum theme distance as the generated audio. The segments of the original audio require no manual pickup, a user only needs to upload the comparison audio, so that the operation is convenient, and the intercepted segments are accurate. In addition, the invention further provides an audio generating device.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Advanced Lawful Interception of Sms

The present invention relates to methods and arrangements to intercept Short Message Services (SMS) in a telecommunication system (TS). The telecommunication system comprises a telecommunication Network (PLMN-A) that comprises a Short Message Service Centre (SMSC; ICE, IAP) responsible for relaying Short Messages (SMs) to / from all subscribers belonging to the telecommunication network. The method comprises the following steps: Receiving in the Short Message Service Centre (SMSC), a request to monitor Short Messages (SMs) related to a subscriber (A, Al, B, C, D, E, F) in the telecommunication system (TS). Registering in the Short Message Service Centre (SMSC) a Short Message (SM) related to the monitored subscriber (A, Al, B, C, D, E, F). Delivering from the Short Message Service Centre (SMSC), information related to the registered Short Message.
Owner:TELEFON AB LM ERICSSON (PUBL)

Device and method for data interception and time sequence drifting detection of interface of synchronous dynamic random access memory

InactiveCN101989466AAccurate interceptionSolve the problem that the correct data cannot be interceptedDigital storageDifferential signalingSynchronous dynamic random-access memory
The invention discloses a device and a method for the data interception and the time sequence drifting detection of an interface of a synchronous dynamic random access memory. The device comprises a differential signal to single-ended signal converting circuit, a first phase delay circuit and a data interception circuit, wherein the differential signal to single-ended signal converting circuit isconnected to a synchronous transmission interface to receive a differential data interception signal transmitted by the synchronous transmission interface and convert the differential data interception signal into a single-ended data interception signal; the first phase delay circuit is connected to the differential signal to single-ended signal converting circuit and regulates the phase of the single-ended data interception signal to generate a single-ended data interception signal subjected to phase delay; and the data interception circuit is connected to the first phase delay circuit to intercept synchronous data transmitted by the synchronous transmission interface according to the single-ended data interception signal subjected to the phase delay.
Owner:SUNPLUS TECH CO LTD

Method and device for intercepting page elements

The embodiment of the invention discloses a method and device for intercepting page elements. The method comprises the steps that a hidden rule file is received; a uniform resource locator (URL) in a current browser is detected, and a current domain name is determined according to the URL; the page elements corresponding to the current domain name and needing to be hidden are obtained from the hidden rule file according to the current domain name; an instruction is sent to the browser, and the browser is indicated to hide the page elements corresponding to the current domain name and needing to be hidden. The page elements needing to be hidden are carried in the hidden rule file, and the page elements corresponding to the current domain name and needing to be hidden are obtained from the hidden rule file by determining the current domain name and according to the current domain name; the page elements need to be hidden are then hidden, and thus the effect that the page elements irrelevant to text are comprehensively and accurately intercepted is achieved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Traffic roads charging station charge-escape prevention intercepting system

InactiveCN101114389AImprove recognition rateShielding from external signal interferenceTicket-issuing apparatusAnalytical controlCharging station
The invention discloses an interception system preventing from fee evasion for traffic toll collection stations. The system comprises a photoelectric detecting system used for detecting vehicle passing, an analysis and control system connected with the photoelectric detecting system which transfers collection information to the analysis and control system, and an interceptor connected with the analysis and control system which transfers control information to the interceptor. The system has intelligence, high recognition rate compared with the present brain judgment and hand control; rapidity: once the vehicles of fee evasion act rashly passes the card, the system only spends one to two second in analyzing the situation and ejecting the interceptor so that the vehicles of fee evasion cannot pass the card; and reliability: the system adopts an advanced infrared photoelectric vehicle separator, which can discriminate accurately whether the vehicles are those of fee evasion or not, and shield effectively the interference from external signals by light transmitting. The system is a comparatively ideal and rapid interception system preventing from fee evasion.
Owner:中誉通信有限公司

Method and system for realizing filtering of malicious calls through real-time algorithm

ActiveCN106506769ARelieve the stress of analyzing interceptsHigh efficiency in filtering malicious callsSubstation equipmentAutomatic exchangesReal time algorithmReal time analysis
The invention belongs to the technical field of mobile telephone communication, and particularly relates to a method for realizing filtering of malicious calls through a real-time algorithm. The method comprises the following steps that: a calling number initiates a call to a called number already applying for malicious call protection; the calling number and the called number are transmitted to a real-time malicious call analyzing and filtering platform; the real-time malicious call analyzing and filtering platform matches the calling number and the called number with a number library, and judges whether to intercept the calling number or not by using the real-time algorithm; and if the calling number is not intercepted, the calling number is put through. The invention also discloses a malicious call filtering system. The malicious call filtering system comprises a malicious call intercepting assembly module, a support platform module, an algorithm model module and an external connection interface module. In the method, the malicious call protection is applied through the called number, the calling number and the called number are transmitted to the real-time malicious call analyzing and filtering platform, the calling number and the called number are matched with the number library for interception, and whether to intercept the non-intercepted calling number or not is judged by the real-time algorithm, so that filtering of the malicious calls is realized, and the trouble of a called user is avoided.
Owner:ZHEJIANG PONSHINE INFORMATION TECH CO LTD

Method and device for preventing HTTP proxy attack

InactiveCN105959313APreventing HTTP Proxy AttacksAccurate interceptionTransmissionClient-sideDistributed computing
A method and device for preventing HTTP proxy attacks provided by the present application, the method is applied to a network security device, and the method includes: the network security device receives an HTTP request message, and parses out the message of the HTTP request message header; inquire whether there is a proxy field in the message header; if there is a proxy field in the message header, obtain the ip of the original client in the proxy field; update the quantity of the ip, and judge Whether the updated ip number conforms to the preset rule; if the updated ip number meets the preset rule, intercept the message corresponding to the ip. By applying the embodiment of the present application, the real attacker can be identified, so as to accurately intercept the HTTP request message sent by the attacker.
Owner:HANGZHOU DPTECH TECH

User request intercepting method and device

ActiveCN107241300AComprehensive interceptionAccurate interceptionTransmissionIp addressIntercept method
The invention discloses a user request intercepting method and device. One specific implementation manner of the method comprises the steps of acquiring an activity ID of a user request, and determining whether a cache server has data corresponding to the activity ID; if the cache server does not have data corresponding to the activity ID, determining whether a user IP address of the user request is included in a preset IP address set; if the user IP address is included in the IP address set, marking the user request; if the user IP address is not included in the IP address set, determining whether the value of the activity ID is greater than a preset maximum activity ID value stored in the cache server; recording user requests with activity ID value greater than the maximum activity ID value; and intercepting the marked user requests. Through adoption of the user request intercepting method and device, illegal user requests are intercepted accurately and comprehensively.
Owner:BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1

Sizing intercepting rock core drilling tool

The invention discloses a sizing intercepting rock core drilling tool, which belongs to the field of drilling, boring and manufacturing circular stone pillars. An inner core screw thread of a drilling tool key slot is connected with a screw thread at the upper part of a drill bit; a drilling tool upper sleeve screw thread is connected with a long core tube; a small section of long core tube is equivalently added in drilling; and the drilling tool is lifted within a set size, an embedded tool bit is enabled to act through the conversion of the resistance force, the friction force and the elastic force so as to transversely cut a rock core so as to extract the rock core. The drilling tool can be made into an independent part, a key slot inner core is connected with an upper sleeve spline, the lower plane of the upper sleeve is overlapped with the upper plane of the drill bit, and the drilling pressure and the torsion are transferred to implement the drilling. A retainer ring and the upper sleeve screw thread are connected with each other to lock a longitudinal gap, top cutter bodies are overlapped and rotated inside an insert, and the transverse cutting depth of the tool bit can be controlled. The drill bit is lifted, and precipitated sand and stone resist the drill bit, so that the spline slides, the insert and the top cutter bodies slide, two overlapped oblique surfaces are staggered so as to push the tool bit to transversely cut the rock core, and when the tool bit is continuously lifted, the broken rock core is lifted out of the ground.
Owner:禹畅
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products