Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

63 results about "Port security" patented technology

Port security is part of a broader definition concerning maritime security.It refers to the defense, law and treaty enforcement, and counterterrorism activities that fall within the port and maritime domain. It includes the protection of the seaports themselves and the protection and inspection of the cargo moving through the ports. Security risks related to ports often focus on either the physical security of the port, or security risks within the maritime supply chain.

Debugging port security interface

The present invention provides a secure JTAG interface to an application-specific integrated circuit (ASIC). In the preferred embodiment the invention operates through the combined efforts of a Security Module (SM) comprising a state machine that controls the security modes for the ASIC, and a Test Control Module (TCM) which contains the JTAG interface. The TCM operates in either a restricted mode or an unrestricted mode, depending on the state of the SM state machine. In a restricted mode, only limited access to memory content is permitted. In an unrestricted mode, full access to memory content is permitted.
Owner:BLACKBERRY LTD

Air station security information system

The invention discloses an air port security inspection information system, which comprises the following modules: a local departure module, a security inspection boarding gate verification module, a security inspection unpacking working module, an integral inquiry module, a pursuit information module, a security inspection passage verification desk module and a background management module. The system with simple and reasonable structure can be adapted to the requirements of modernization development, improve the service and management level of the security inspection, provide effective security inspection means for air port, crack down on crimes forcefully, maintain social stability, etc. The invention also provides close and effective security inspection management means to guarantee air defense security, provides a simple, convenient, standardized security inspection process, and improves efficiency as well as service quality. Furthermore, the invention which provides complete reference for security inspection management is closely integrated with other systems (such as the passenger information in the departure system data, etc.), thereby realizing data sharing, saving investment, effectively monitoring security inspection personnel and attendance states and strengthening personnel management.
Owner:成都双流国际机场空港科技有限公司

Obstacle dodging technical method based on binocular vision

According to the invention, real-time three-dimensional point cloud reconstruction of a scene in an advancing direction of a field tyre-type gantry crane is realized by means of a binocular camera. Through performing projection statistics and non-maximum value suppression on the point cloud data in different dimensions, accurate dividing of noise point cloud, ground point cloud and obstacle pointcloud is realized. Through ground repositioning, effect of vibration of the field tyre-type gantry crane in operation to detecting precision and robustness is effectively suppressed, and detecting precision of the obstacle and an obstacle detecting distance are effectively improved. Through leaning a camera gesture and detecting the number and heights of the point cloud, real-time monitoring to abnormity of the obstacle dodging system is realized, and an important meaning is realized for improving harbor automation and harbor safe production.
Owner:SHANGHAI AWARE INFORMATION TECH +1

Dangerous cargo container stockpiling early warning method and system

PendingCN110223022ARealize the visualization of the storage yardRealize dynamic storage early warning managementForecastingCo-operative working arrangementsEarly warning systemTime efficient
The invention relates to a dangerous cargo container stockpiling early warning method and system. The method comprises the steps of obtaining stockpiling site data of a container; establishing a stockpiling rule according to the container dangerous cargo stockpiling standard specification; establishing a container stockpiling model according to the stockpiling dangerous goods of the container; matching the stockpiling rules of the containers according to the container stockpiling site; substituting the stockpiling rule into the stockpiling model; and judging whether to send out early warning or not according to the stockpiling rule and the calculation result of the stockpiling model. The invention discloses a real-time analysis and early warning system for port dangerous cargo container stockpiling. Functions of container yard visualization, dynamic stockpiling early warning management, dangerous cargo information integration, information inquiry and the like are realized. Real-time efficient calculation can be achieved, early warning prompt can be conducted on containers which do not meet the stockpiling requirement in the forms of highlight, marks, pop-up windows and the like, apowerful auxiliary tool is provided for port safety management departments and port enterprises to analyze and display the stockpiling condition of the containers, and remarkable effects are achievedin the aspect of guaranteeing the operation safety of port dangerous cargos.
Owner:TIANJIN RES INST FOR WATER TRANSPORT ENG M O T

Coaxial cable port security device and method of use thereof

A coaxial cable port security device is provided, wherein the port security device comprises a one-way clutch mechanism positioned between a first body and a second body and utilized to prevent unauthorized access to a coaxial cable port unless a specific tool is used to negate the operation of the clutch mechanism and remove the port security device, thereby enabling authorized access to the port.
Owner:PPC BROADBAND INC

Computer network information security monitoring system

The invention discloses a computer network information security monitoring system comprising a central processing unit, a CPU, a network information security module, a virus real time scanning module, a timed inspection tour module and a port security control module; the central processing unit and the CPU are arranged in a computer; the network information security module, the virus real time scanning module, the timed inspection tour module and the port security control module are used for network information monitoring; an input end of the central processing unit is connected with output ends of the network information security module, an identity verification unit, an information tracking module, the virus real time scanning module and a network abnormity assessment module. Via the computer network information security monitoring system, information of a computer information security system is monitored and protected from a plurality of angles and aspects; security of use and transmission of computer information can be greatly improved; security of classified information of government departments, enterprises and the like can be improved; stable network operation can be maintained, data protection capability can be realized, and information loss can be prevented when a user is away from a computer.
Owner:XINXIANG UNIV

Method, System, and Apparatus for Categorizing and Presenting Risk Based Analytical Results

A system for computing, categorizing and presenting risk based analytical results to a human user for a cargo port security is presented. The system computes analytical results and presents that to the human user in a variety of configurable displays, allowing the user to evaluate the transaction on particular subset of data elements (also called aspect or facet) and a particular viewpoint (also called perspective or intelligence source). The system also enables the human user to compare the transaction to similar transactions (by allowing the user to define “similar”) from relevant past time periods (by allowing the user to define “relevant” periods).
Owner:ARORA AMRINDER S

Enterprise network security management method

The invention discloses an enterprise network security management method, which comprises the following steps of: constructing a DMZ firewall between an enterprise network and an extranet to realize the functions of real IP hiding and access control, and establishing an IPSecVPN between a head office and a branch company to realize security information transmission of intranets in different regions, so that the risk is reduced, and the security is improved. Port security is configured on a two-layer switch, a data packet threshold value through which the port passes is preset, or MAC addresses allowed to be connected to the switch port are recorded through an MAC address table, a specific number or specific MAC addresses are allowed to use the port for communication, illegal equipment is prevented from accessing a network, MAC address table overflow caused by MAC address flooding can also be prevented, and by dividing vlan, the broadcast storm is reduced, and the pressure of the two-layer switch is fully shared; and in addition, link binding aggregation is used, the transmission bandwidth between the switches is increased, bidirectional authentication is carried out by configuring a PPP protocol and adopting chap, connection of illegal users is prevented, and the safety is further improved.
Owner:YANCHENG INST OF TECH

Switch port security protection method and apparatus based on TCP/IP

The invention provides a switch port security protection method and apparatus based on TCP / IP. A detection request message is sent to an access device via a switch physical port based on TCP / IP, the device information of the access device is identified by whether a reply message is received and the contents of the reply message, so that a switch issues blockage, release, white list and a series of strategies. Compared with the prior art, the device of the access device does not need to be manually determined, a switch port white list does not need to be manually set neither, thereby reducing the labor cost.
Owner:HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products