Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

146 results about "Transport security" patented technology

Methods, devices and systems for establishing end-to-end secure connections and for securely communicating data packets

The invention provides methods, devices (102, 110, 124, 136) and communication systems (100) for establishing end-to-end secure connections and for securely communicating data packets. Such a communication system (100) comprises a first device (124, 136), an intermediate device (110) and a second device (102). The first device (124, 136) communications via a first network (120), which is based on a first transport protocol and a first transport security protocol with the intermediate device (110). The second device (102) communications via a second network, which is based on a second transport protocol and a second transport security protocol with the intermediate device (110). The intermediate device (110) modifies packets received via first network to packets suitable for communication via the second network, and vice versa. The first device (124, 136) is able to reconstruct a header of a received packet as if the packet was sent via the second network (108) and its transport and security protocols. Further, the first device (124) is able to verify, on basis of the reconstructed header, verification fields which are generated on basis of the second transport security protocol.
Owner:KONINKLIJKE PHILIPS ELECTRONICS NV

Systems and methods for generating modular security delegates for applications

Embodiments of the present teachings relate to systems and methods for generating modular security delegates for application instances, including, for example, applications usable on physical machines, virtualized environments, in the cloud, etc. According to embodiments, in a multiple network environment, multiple machines (or clients) can be configured, each having a defined security level. Each machine can include a plurality of application instances and corresponding security delegates for various defined security levels. For example, the defined security levels can be based on various authentication mechanisms, including, Kerberos, NT Lan Manager (NTLM) authentication protocol, secure sockets layer / transport security layer (SSL / TSL), token authentication, virtual private network (VPN), remote access security (RAS), digest authentication, etc.
Owner:RED HAT

Automated wayside asset monitoring with optical imaging and visualization

The Automated Wayside Asset Monitoring system utilizes a camera-based optical imaging device and an image database to provide intelligence, surveillance and reconnaissance of environmental geographical information pertaining to railway transportation. Various components of the Automated Wayside Asset Monitoring system can provide features and functions that can facilitate the operation and improve the safety of transportation via a railway vehicle.
Owner:WADE JACK

Method for monitoring and evaluating waterway transport security

The invention relates to a method for monitoring and evaluating waterway transport security, which is used for effectively solving the problem for monitoring and evaluating the waterway transport security. The method comprises the following steps: establishing a waterway transport security monitoring and evaluating index system; evaluating various evaluation indexes of waterway transport security in combination with ground port navigation monitoring data, remote sensing data of ship cargos and meteorological data; calculating the initial weights of the evaluation indexes by using an analytic hierarchy process; correcting the initial weights, calculating influence weights, correcting the initial weights by using a DEMATEL method, and establishing a direct influence matrix; obtaining the comprehensive weights of the indexes by using a weighted averaging summation method; and comprehensively evaluating the waterway transport security state and grade in combination with the fuzzy theory, establishing an early warning mechanism and an emergency mechanism according to the evaluation result, carrying out comprehensive evaluation based on the fuzzy theory, analyzing the transport security level, and determining the security sate and grade to monitor and evaluate the waterway transport security. The method provided by the invention is used for monitoring and evaluating the waterway transport security within a large range quickly, comprehensively and objectively, so that the economic and social benefits are huge.
Owner:NORTH CHINA UNIV OF WATER RESOURCES & ELECTRIC POWER

Railroad locomotive accurate positioning system

ActiveCN104880725AImproving transportation safety supervision capabilitiesEnsure transportation safetySatellite radio beaconingRailway signalling and safetyEngineeringPositioning system
The invention discloses a railroad locomotive accurate positioning system including a ground monitoring center host, a ground network system server, a ground communication server, a ground satellite difference reference station, a ground wired communication network, a vehicle-ground wireless communication network, a locomotive position positioning device, a ground microcomputer management terminal, a railway yard microcomputer interlocking data communication device, and an accurate railway track electronic map. The track electronic map is arranged in the ground network system server and the microcomputer management terminal to reproduce the track circuit state and the locomotive operation position in real time, and the ground monitoring center host acquires the satellite data, yard microcomputer interlocking data, and locomotive position data, and outputs the result obtained through the comprehensive solution of the data to the ground network microcomputer management terminals. Compared with the prior art, the railroad locomotive accurate positioning system realizes the locomotive remote management and accurate control, realizes the railway transportation safety supervision, optimizes the transportation efficiency, improves the travelling safety, and has the popularization and application values.
Owner:成都可益轨道技术有限公司

Transport security robot based on omnidirectional moving platform

InactiveCN102380866AFlexible storage and transportationFlexible monitoringManipulatorDrive wheelEngineering
The invention aims to provide a transport security robot based on an omnidirectional moving platform. Driving wheels and driven wheels are mounted below a base plate, a first drive motor is mounted on each driving wheel, a fixed base is mounted on the base plate, an arm base is mounted on the fixed base, a first speed reducing motor is mounted in the fixed base and connected with the arm base, a big arm plate is mounted on the arm base and connected with a forearm shell through a shoulder rotating shaft and a shoulder rear cover, a shoulder joint speed reducing motor is mounted at the position of the shoulder rotating shaft, a second speed reducing motor is mounted in the shoulder rear cover and connected with the forearm shell, a linear motor is mounted in the forearm shell and connected with a telescopic forearm, a paw is connected with the telescopic forearm through a paw base, and a miniature camera is mounted on the shoulder rear cover. The transport security robot provided with the moving platform capable of moving omnidirectionally adapts to complex situations of storage space, narrow working space, complex ground conditions and the like effectively, and can be used for cargo storage and transport flexibly.
Owner:HARBIN ENG UNIV

Content-based transport security for distributed producers

A content-producing computer system can use a locally generated key or a client-generated key to communicate with a client device during a session over a named-data network. During operation, the computer system can receive an Interest packet that includes a name for a piece of data or a service. The Interest's name can include a routable prefix, a session identifier, and an encrypted suffix. In some embodiments, the system can generating a session key based on the session identifier and a secret value, and decrypts the encrypted suffix using the session key to obtain a plaintext suffix. The system processes the plaintext suffix to obtain data requested by the Interest, and encrypts the data using the session key. In some other embodiments, the system can use a local private key to decrypt the encrypted suffix, and uses an encryption key obtained from the Interest to encrypt the Content Object.
Owner:CISCO TECH INC

Encapsulated sustained-release acid for oil-water well reconstruction and preparation method thereof

The invention discloses an encapsulated sustained-release acid for oil-water well reconstruction and a preparation method thereof. The encapsulated sustained-release acid comprises a capsule core and a sustained-release supporting layer coated on the outer layer of the capsule core, wherein the capsule core is a soluble or meltable solid acid, the sustained-release supporting layer comprises a sustained-release wall material and a supporting wall material, the sustained-release wall material is an organic fatty acid or a derivative thereof, the supporting wall material is acrylic resin or a derivative thereof, and the solid acid is solid hydrochloric acid powder or citrate. The encapsulated sustained-release acid is a spherical granule with the particle size of 0.15-0.25 mm. The encapsulated sustained-release acid also comprises an adhesive spray-coated on the capsule core, wherein the adhesive is water-soluble vegetable gum or a derivative thereof, and is specifically guar gum, hydroxypropyl guar gum or carboxymethyl hydroxypropyl guar gum. According to the invention, the control mode of the acid radical ion consumption is simple and accurate; the preparation process is simple; and the encapsulated sustained-release acid is reliable in performance, safe for transportation and carrying, and convenient for use, and can be used for reducing the probability of underground tool acid corrosion and operation personnel damage in the application.
Owner:PETROCHINA CO LTD

Wireless sensor network communication protocol method of automatic cathodic protection data collection system

The invention discloses a wireless sensor network communication protocol method of an automatic cathodic protection data collection system and relates to the technical field of digital information transmission and pipe systems. The wireless sensor network communication protocol method adopts a three-layer protocol structure which comprises a physical radio frequency layer, a network layer and an application layer from bottom to top, wherein the physical radio frequency layer encapsulates data of the bottom layer into a frame structure, and a CSMA-CA carrier monitoring conflict avoidance algorithm is planted into the frame structure; the network layer achieves formation, retrieval and input and output control of data packets in the protocol and interface function transmission and reception by calling a software interface encapsulated by the physical radio frequency layer; the application layer establishes an application program interface function capable of achieving all functions of the application layer by calling a software interface provided by the network layer. By means of the wireless sensor network communication protocol method, communication can be guaranteed greatly, work efficiency of the automatic cathodic protection data collection system is greatly increased, management cost is reduced, and transport security of petroleum pipelines is guaranteed.
Owner:PIPECHINA SOUTH CHINA CO

Can-type container having electronic monitoring device

ActiveCN1733568AMonitoring leak monitoringMonitor illegal openingLarge containersProcess moduleTank container
The invention relates to tank container with electric detection device in the valve piece protection box, wherein, the said detection device comprises a travel switch with contact head with a first and second place, a sensor used to detect the leakage of carried material in container and send corresponding data, and a data process module to communicate with the switch and sensor; wherein, on the first place, the contact head is propped by the box cap, the switch is working normally; on the second place, the contact head departs the box cap for a predetermined safe distance, and the switch is on abnormal state. This invention can detect the leakage and illegal open for the box cap globally and ensures the transposition security.
Owner:NANTONG CIMC TANK EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products