scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2015"


Proceedings ArticleDOI
17 May 2015
TL;DR: Geno Guard addresses the open problem of applying HE techniques to the highly non-uniform probability distributions that characterize sequences of genetic data and proves that decryption under any key will yield a plausible genome sequence, and offers an information-theoretic security guarantee against message-recovery attacks.
Abstract: Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been aggravating the potential consequences of data breaches. The prevalent use of passwords to generate encryption keys thus poses an especially serious problem when applied to genetic data. Weak passwords can jeopardize genetic data in the short term, but given the multi-decade lifespan of genetic data, even the use of strong passwords with conventional encryption can lead to compromise. We present a tool, called Geno Guard, for providing strong protection for genomic data both today and in the long term. Geno Guard incorporates a new theoretical framework for encryption called honey encryption (HE): it can provide information-theoretic confidentiality guarantees for encrypted data. Previously proposed HE schemes, however, can be applied to messages from, unfortunately, a very restricted set of probability distributions. Therefore, Geno Guard addresses the open problem of applying HE techniques to the highly non-uniform probability distributions that characterize sequences of genetic data. In Geno Guard, a potential adversary can attempt exhaustively to guess keys or passwords and decrypt via a brute-force attack. We prove that decryption under any key will yield a plausible genome sequence, and that Geno Guard offers an information-theoretic security guarantee against message-recovery attacks. We also explore attacks that use side information. Finally, we present an efficient and parallelized software implementation of Geno Guard.

82 citations


Journal ArticleDOI
TL;DR: It is recommended that carefully calibrating sentry and guard processes will help vendor development teams enhance project outcomes and highlight complex curvilinear associations among sentryand guard activities, and knowledge integration, which are further impacted by the level of uncertainty that the project team faces.
Abstract: We examine the role of sentry and guard activities in outsourced software development. Sentry activities are designed to regulate the inflow of external information to the project teams and guard activities are designed to manage the outflow of teams’ information and resources to external sources. The use of sentry and guard activities has been examined in teams in other contexts such as new product development, but their role and relationship to performance in software development teams is not well understood. We hypothesize and test curvilinear relationships between these activities and knowledge integration in vendor development teams. We also examine how these effects vary under conditions of greater project uncertainty. We tested the hypotheses using data from 139 vendor development teams drawn from sixteen Indian software companies. Results highlight complex curvilinear associations among sentry and guard activities, and knowledge integration, which are further impacted by the level of uncer...

33 citations


Patent
09 Jan 2015
TL;DR: A hand guard installation mechanism for securing a hand guard over the barrel of a firearm includes a tapered locking element that extends at least partially through the hand guard and interfaces with a surface of the barrel nut of the firearm as discussed by the authors.
Abstract: A hand guard installation mechanism for securing a hand guard over the barrel of a firearm includes a tapered locking element that extends at least partially through the hand guard and interfaces with a surface of the barrel nut of the firearm. A fastener mates with the locking element, drawing the locking element at least farther into the hand guard and against the surface of the barrel nut. As the locking element is drawn against the barrel nut, the hand guard is tightened against the barrel nut such that the hand guard is secured in place against the receiver of the firearm.

29 citations


Patent
02 Dec 2015
TL;DR: In this paper, an entrance guard and air conditioner linkage system for realizing linkage control of the entrance guard equipment and the air conditioning system is presented, which consists of an identity information acquisition device, an identity recognition device and a control device.
Abstract: The invention discloses an entrance guard and air conditioner linkage system for realizing linkage control of entrance guard equipment and an air conditioner. The entrance guard and air conditioner linkage system comprises an identity information acquisition device, an identity information recognition device and a control device, wherein the identity information acquisition device is used for acquiring the information of a user wanting to enter a room through the entrance guard equipment; the identity information recognition device is used for recognizing the identity of the information of the user to obtain the identify information of the user; and the control device is used for judging whether the air conditioner is controlled to operate according to an air conditioner operating parameter corresponding to the identify information on the basis of the identify information. The invention also discloses a control method of the entrance guard and air conditioner linkage system. According to the entrance guard and air conditioner linkage system, the air conditioner can work individually and regularly, so that the link of operating a remote controller is omitted, and the intelligent level and comfort level for applying the air conditioner are improved.

25 citations


Patent
15 Jul 2015
TL;DR: In this paper, a mobile phone, an entrance guard module and a cloud platform is used for storing mobile phone identification information and a secret key, and sending an unlocking command containing the secret key according to the operation of a user, so that the identity of the user can be effectively identified; the system has the advantages of being convenient to carry, high in safety factor and simple in system structure.
Abstract: The invention relates to a system and method for controlling entrance guard by a mobile phone, belonging to the field of a technology of electronics. The system comprises a mobile phone, an entrance guard module and a cloud platform, wherein the mobile phone is used for storing mobile phone identification information and a secret key, and sending an unlocking command containing the secret key according to the operation of a user; the entrance guard module comprises a door lock and a control unit used for controlling the action of the door lock; the control unit is used for storing entrance guard identification information, receiving the unlocking command and controlling the action of the door lock according to the secret key in the unlocking command; the cloud platform is used for generating a corresponding secret key according to the mobile phone identification information and the entrance guard identification information and sending the generated secret key into the mobile phone. After the system and the method are adopted, the action of the corresponding entrance guard system is controlled by the secret key of the mobile phone, so that the identity of the user can be effectively identified; the system has the advantages of being convenient to carry, high in safety factor and simple in system structure; the method is convenient in using way and low in use cost.

22 citations


Patent
29 Oct 2015
TL;DR: In this paper, a user equipment, apparatus, and method are provided for wireless communication using an interleaved guard OFDM (IG-OFDM) structure, which includes at least one of the sub-band bandwidth or number of independently decodable sub-bands that can be dynamically turned on or off by the at least UE.
Abstract: A user equipment, apparatus, and method are provided for wireless communication using an IG-OFDM structure. An apparatus is configured to transmit a known reference signal. The apparatus is configured to receive, in response to the reference signal and from at least one user equipment (UE), capability information that includes at least one of the sub-band bandwidth or number of independently decodable sub-bands that can be dynamically turned on or off by the at least one UE. The apparatus is configured to define an interleaved guard OFDM (IG-OFDM) structure according to the received capability information, the IG-OFDM structure including guard tones distributed within an OFDM symbol where there is no signal transmission on these guard tones. The apparatus is configured to communicate with the at least one UE using a transmitted waveform that is shaped according to the IG-OFDM structure.

22 citations


Journal ArticleDOI
TL;DR: In this article, the authors evaluated the effectiveness of the village guard system as a counter-terror strategy in Turkey and concluded that the village guards in Turkey proved their effectiveness as a deterrence-based and territory-focused counterterror strategy between 1985 and 1999.
Abstract: There are currently more than 60,000 Kurdish village guards in a system that has been fighting against the PKK in Turkey for almost three decades. This article offers the first evaluation of the effectiveness of the village guard system as a counterterror strategy. I argue that the village guards in Turkey proved their effectiveness as a deterrence-based and territory-focused counter-terror strategy between 1985 and 1999. From 1999 onwards, however, when the nature of the conflict changed, the costs of the village guard system in the political and socio-psychological domain have exceeded its value in the security domain. Evaluation of the village guard system in Turkey provides insights which may be useful in considering the formation of local militias in conflict zones such as Iraq and Afghanistan.

21 citations


Patent
18 Nov 2015
TL;DR: In this article, an entrance guard system based on two-dimensional code was proposed. But the two-dimension code was not used for the identification of personnel access information, but instead it was used to record personnel's access information simply, rapidly and comprehensively.
Abstract: The invention provides an entrance guard system based on two dimension code. The entrance guard comprises a mobile terminal and a door security system, the mobile terminal comprises a household terminal. The doorcontrol system comprises a door control system two dimension code, a system server and a door control system switch, and the gate inhibition switch and the system server are connected by network; besides, the mobile terminal also comprises a visitor terminal and a security terminal.The household terminal comprises anaccount generation request sending unit and an access request responding unit. The visitor mobile terminal comprises a visitor two dimension code reception unit and a visitor two dimension code display unit. And the security terminal comprises a two dimension code scanning and access request sending unit.The invention has the beneficial effects that the two dimension code is used for entrance guard identification, thereby ensuring the entrance guard to record personnel access information simply, rapidly and comprehensively.Access control and alarm can be performed concerning to two dimension codes that cannot be identified, and access information of visitors can be rapidly generated and recorded. Therefore, residential community security control effect can be improved and workload of security personnel can be reduced.

20 citations


Journal ArticleDOI
TL;DR: In this paper, the authors investigated the mechanism of the crosstalk cancellation with a grounded guard trace ring and discussed and analyzed several grounding patterns based on a lumped circuit model, and found that the best grounding pattern for the guard traces is to ground its two ends instead of using multipoint grounding within the concerned frequency range from 10 to 200 MHz.
Abstract: The grounded guard trace ring is usually utilized to suppress the interference in high-speed printed circuit boards or IC packages. Although the guard ring can reduce crosstalk, its performance is greatly affected by the effectiveness of its design. This paper first investigates the mechanism of the crosstalk cancelation with a grounded guard ring. The paper then discusses and analyzes several grounding patterns based on a lumped circuit model. The analysis applies to the applications where the dimensions of PCB traces are smaller than 5% of the wavelength at the highest frequency. It is found that the best grounding patterns for the guard trace ring is to ground its two ends instead of using multipoint grounding within the concerned frequency range from 10 to 200 MHz in this paper. The theoretical analysis and the developed technique are verified by electromagnetic field distribution plots and the four-ports scattering parameters that are simulated in ANSYS HFSS 3-D electromagnetic simulation software. Experiments were finally conducted to validate the analysis and the proposed technique.

20 citations


Proceedings ArticleDOI
08 Jun 2015
TL;DR: This paper proposes a simple guard-zone based mode selection scheme as an efficient and scalable mechanism to manage the interference in D2D underlaid cellular systems and indicates the existence of an optimal guard zone radius that maximizes the total system throughput.
Abstract: With the emergence of new applications, e.g., video gaming, file sharing and proximity aware social networks, high data-rate traffics will be likely to occur between devices in the vicinity of each other. Enabling Device to Device (D2D) communication between such devices can efficiently offload these traffics from the base station. Meanwhile, by reusing the cellular spectrum, D2D has the potential to significantly improve the spectral efficiency. However, if not controlled carefully, the interference caused by D2D communication may severely degrade the performance of regular cellular services. To resolve this issue, this paper proposes a simple guard-zone based mode selection scheme as an efficient and scalable mechanism to manage the interference in D2D underlaid cellular systems. With the help of stochastic geometry, we rigorously analyze the interference and throughput of such system. The results indicate the existence of an optimal guard zone radius that maximizes the total system throughput. Thanks to the tractability of our analysis, the optimal guard zone radius can be efficiently obtained. Through extensive numerical analysis, we show that the success probability and aggregate throughput obtained at the optimal guard zone radius are significantly greater than those without guard zone.

19 citations


Patent
24 Jun 2015
TL;DR: In this article, an entrance guard authorization management method for the technical field of the communication is presented, and the method comprises the following steps: acquiring at least one key from a server by virtue of a first client; generating temporary entrance guard information according to the entrance guard card information of the first client and the key; transmitting the temporary guard information to a second client; controlling the opening and closing of a guard according to this temporary information.
Abstract: The invention is applicable to the technical field of the communication, and provides an entrance guard authorization management method. The method comprises the following steps: acquiring at least one key from a server by virtue of a first client; generating temporary entrance guard information according to the entrance guard card information of the first client and the key; transmitting the temporary entrance guard information to a second client; controlling the opening and closing of an entrance guard according to the temporary entrance guard information. The invention also correspondingly provides an entrance guard authorization management system. By adopting the entrance guard authorization management method and the entrance guard authorization management system, the entrance guard authorization management for visiting customers can be conveniently realized, and the convenience of the customer can be improved.

Patent
15 Apr 2015
TL;DR: In this paper, a mobile internet based cloud entrance guard system and a realization method of its realization is presented. But the method comprises the steps of: letting a user access cloud gate app application software; making the software automatically search and connect the network; at the end of connection, making the cloud gate application software come to a wireless unlocking function interface; clicking the unlocking request, receiving the unlocking requests by the entrance guard module and performing authority determination, and carrying out corresponding entrance guard operation according to the determination result.
Abstract: The invention discloses a mobile internet based cloud entrance guard system and a realization method thereof. The method comprises the steps of: letting a user access cloud entrance guard app application software; making the software automatically search and connect the network; at the end of connection, making the cloud entrance guard app application software come to a wireless unlocking function interface; clicking the unlocking request, receiving the unlocking request by the entrance guard module and performing authority determination, and carrying out corresponding entrance guard operation according to the determination result, thus finishing short distance wireless unlocking or long-distance wireless unlocking. According to the invention, a wireless local area network or wireless wide area network can be selected according to the network environment in which a mobile terminal is located to send an unlocking request to the entrance guard system; if in a wireless local area network environment, local WIFI wireless network unlocking can be realized directly, thus effectively accelerating the unlocking speed; and if in a wireless wide area network environment, the long-distance WIFI, 3G and 4G wireless network environment cloud gate entrance guard unlocking function can be realized.

Proceedings ArticleDOI
07 Dec 2015
TL;DR: The classic ACCAT Guard concept is adapted to the protection of programmable logic controllers (PLCs), which are an essential ingredient of existing cyber-physical systems.
Abstract: Modern societies critically depend on cyberphysical systems that control most production processes and utility distribution networks. Unfortunately, many of these systems are vulnerable to attacks, particularly advanced ones. While researchers are investigating sophisticated techniques in order to counter these risks, there is a need for solutions that are practical and readily deployable. In this paper, we adapt the classic ACCAT Guard concept to the protection of programmable logic controllers (PLCs), which are an essential ingredient of existing cyber-physical systems. A PLC Guard intercepts traffic between a, potentially compromised, engineering workstation and a PLC. Whenever code is transferred to a PLC, the guard intercepts the transfer and gives the engineer an opportunity to compare that code with a previous version. The guard supports the comparison through various levels of graphical abstraction and summarization. By operating a simple and familiar interface, engineers can approve or reject the transfer using a trusted device that is significantly harder to subvert by attackers. We developed a PLC Guard prototype in order to reify our ideas on how it should be designed. In this paper, we describe the guard's design and its implementation. In order to arrive at realistic PLC code examples, we implemented a miniature packaging plant as well as attacks on it.

Patent
07 Oct 2015
TL;DR: In this article, a security entrance guard system based on a video is presented, which can automatically open the entrance guard after identifying that a face in a video region belongs to a face database; furthermore, if the face does not belong to the face database, a monitor makes a conversation with the system and judges whether to open the gate or not according to a real-time transmitted monitored picture, so that contactless automatic door opening and security are really realized simultaneously.
Abstract: The invention discloses a security entrance guard system based on a video, and relates to the field of intelligent entrance guard systems. The system comprises a wireless camera which is mounted outside an entrance guard and is provided with a loudspeaker, wherein the wireless camera is connected with a monitoring computer through a wireless network; a Bluetooth microphone is also arranged at the entrance guard. The system can automatically open the entrance guard after identifying that a face in a video region belongs to a face database; furthermore, if the face does not belong to the face database, a monitor makes a conversation with the system and judges whether to open the entrance guard or not according to a real-time transmitted monitored picture, so that contactless automatic door opening and security are really realized simultaneously. The system is high in applicability and can be widely applied to entrance guard systems for the government, a mechanism, a company and the like, and the labor cost can be reduced.

Patent
29 Jul 2015
TL;DR: In this paper, the authors present an entrance guard control method, a control apparatus, and a system for detecting the identity of a temporary visitor, which can cause poor real-time property and poor safety.
Abstract: The present invention discloses an entrance guard control method, an entrance guard control apparatus, and an entrance guard system. In the prior art, the entrance guard system can not automatically recognize the identity of a temporary visitor so as to cause poor real-time property and poor safety. A purpose of the present invention is to solve the problem in the prior art. The entrance guard control method comprises that: the entrance guard system receives a visiting request sent by a visiting user terminal, wherein the visiting request comprises the terminal information of the visiting user terminal, the visiting time, and the visiting place; when the entrance guard system determines that the visiting user terminal has the admission qualification of the visited place, the temporary cipher key of the visiting user terminal is generated according to the visiting request; and the entrance guard system sends the temporary cipher key to the visiting user terminal, such that the visiting user terminal can have the admission qualification of the visited place at the visiting time according to the temporary cipher key.

Patent
13 May 2015
TL;DR: In this article, a mobile phone alarming method was proposed for case handling in public security systems, where audio and video alarm information is uploaded to a PC (Personal Computer) end of a command center of a public security bureau and mobile phone ends of police on duty and police on standby guard 2 kilometers around the alarm person.
Abstract: The invention discloses a mobile phone alarming method. The method includes the steps that an alarm person trigger the alarm and audio and video alarm information is uploaded to a PC (Personal Computer) end of a command center of a public security bureau and mobile phone ends of police on duty and police on standby guard 2 kilometers around the alarm person; handling police arrive at the scene of a case for handling the case; the command center of the public security bureau arranges the number of police on duty and police on standby guard according to the average number of daily alarming and alarm tasks; the command center of the public security bureau enters all data of public resources for future use. According to the mobile phone alarming method, the need of police on duty at all levels is omitted, the command center of the municipal public security bureau directly receives and handles all kinds of cases, and case information is directly assigned to police, so that the case handling rate is high; the position of the alarm person is directly showed for facilitating case handling, police cooperation and support and the grasp of police strength by the superior.

Patent
11 Nov 2015
TL;DR: In this paper, a high-safety intelligent entrance guard device consisting of a face recognition camera, a human body proximity sensor, a central processing unit, a portable terminal and a door lock is presented.
Abstract: The invention discloses a high-safety intelligent entrance guard device and a control method thereof. The problems that an existing entrance guard device in the prior art needs a real object for door opening, if the real object is lost, a door can not be opened, potential safety hazards exist, the door cannot be opened remotely, parts of functions capable of remotely opening the door are imperfect and cause potential safety hazards, and the existing entrance guard device is inconvenient to use when breaking down as the single entrance guard recognition mode is adopted are mainly solved. The high-safety intelligent entrance guard device comprises a face recognition camera, a human body proximity sensor, a central processing unit, a portable terminal and a door lock, wherein the face recognition camera and the human body proximity sensor are electrically connected with the central processing unit, and the central processing unit is electrically connected with the portable terminal, the door lock and a fingerprint recognition instrument. By means of the scheme, the high-safety intelligent entrance guard device does not need the real object for door opening, adopts the dual modes for door opening and has high practical and popularization value.

Patent
20 May 2015
TL;DR: In this paper, a method and a device for realizing remotely controlling an entrance guard through a mobile terminal is presented, which consists of the entrance guard equipment, the cloud entrance guard server and the mobile terminal.
Abstract: The invention discloses a method and a device for realizing remotely controlling entrance guard through a mobile terminal. The method comprises the following steps: requesting connection to a cloud entrance guard server according to the IP (Internet Protocol) address and MAC (Media Access Control) address of entrance guard equipment, and keeping the entrance guard equipment in a standby state after identity encryption and decryption authentication; starting an APP on the mobile terminal, connecting to the cloud entrance guard server, and keeping in a call waiting state after identity authentication, wherein the cloud entrance guard server is constantly in the monitoring state; once the entrance guard equipment transmits a command request, realizing communication between the entrance guard equipment the mobile terminal by taking the cloud entrance guard server as a P2P (Peer-to-Peer) handshake server. The device comprises the entrance guard equipment, the cloud entrance guard server and the mobile terminal. The method and the device have the advantages of remote control, no need of specific passwords, no need of memory, high security, low cost and easiness in popularization.

Journal ArticleDOI
TL;DR: In this article, the authors argue that IGOs have incentives to guard against admitting new members that pose significant security risks, and they find clear evidence of screening: as security risk increases, the probability of IGO membership declines.
Abstract: Do intergovernmental organizations (IGOs) screen out conflict-prone states? We argue that IGOs have incentives to guard against admitting new members that pose significant security risks. Using a data set based on state–IGO pairings, we find clear evidence of screening: As security risk increases, the probability of IGO membership declines. Our findings underscore the importance of accounting for possible selection bias when studying the effects of IGO membership on conflict. Indeed, the types of IGOs sometimes found to be most effective at promoting peace—namely highly institutionalized organizations and those with a security mandate—also prove particularly selective and sensitive to risk.

Book ChapterDOI
20 Aug 2015
TL;DR: This paper demonstrates the use of machine learning with Lasso Least Absolute Shrinkage and Selection Operator both to two-class binary and multi-class security classification and explores the ability of Lasso to create sparse solutions that are easy for humans to analyze and interpret, in contrast to many other machine learning techniques that do not possess an explanatory nature.
Abstract: With an increasing amount of generated information, also within security domains, there is a growing need for tools that can assist with automatic security classification. The state-of-the art today is the use of simple classification lists "dirty word lists" for reactive content checking. In the future, however, we expect there will be both proactive tools for security classification assisting humans when creating the information object and reactive tools i.e. double-checking the content in a guard. This paper demonstrates the use of machine learning with Lasso Least Absolute Shrinkage and Selection Operator [1, 2] both to two-class binary and multi-class security classification. We also explore the ability of Lasso to create sparse solutions that are easy for humans to analyze and interpret, in contrast to many other machine learning techniques that do not possess an explanatory nature.

Patent
18 Nov 2015
TL;DR: In this article, a fusion communication based method and system for controlling an entrance guard by a mobile terminal is presented, which comprises steps as follows: the mobile terminal acquires attribute information of a to-be-opened entrance guard terminal system by scanning a two-dimensional code or preloading an entrance-guard service menu; the mobile terminals acquires current geographical position information through a built-in geographical positioning system and acquires a client account through the input at a client by a user.
Abstract: The invention relates to a fusion communication based method and system for controlling an entrance guard by a mobile terminal. The method comprises steps as follows: the mobile terminal acquires attribute information of a to-be-opened entrance guard terminal system by scanning a two-dimensional code or preloading an entrance guard service menu; the mobile terminal acquires current geographical position information through a built-in geographical positioning system and acquires a client account through the input at a client by a user; the mobile terminal sends the attribute information, the client account and the current geographical position information to a cloud server; the cloud server verifies the attribute information, the client account and the current geographical position information and sends a verification result to the entrance guard terminal system; the entrance guard terminal system opens or does not open the entrance guard according to the verification result and sends opening success information or opening failure information back to the cloud server; the cloud server forwards entrance guard opening state information to the mobile terminal, and the mobile terminal displays the opening success information or the opening failure information.

Patent
18 Nov 2015
TL;DR: In this paper, a mobile internet voiceprint entrance guard system and an implementation method thereof is presented, which belongs to the identity authentication technical field and is divided into a mobile terminal, a service terminal and a terminal.
Abstract: The invention proposes a mobile internet voiceprint entrance guard system and an implementation method thereof, and belongs to the identity authentication technical field. The system is divided into a mobile terminal, a service terminal and a terminal. The mobile terminal displays an entrance guard list of users having permission, receives voiceprint input and generates and verifies a local voiceprint model; a Socket connection is established between a mobile device and the service terminal; the service terminal manages users, entrance guard and door opening recorders, and remotely registers and verifies the voiceprint model; the terminal includes an entrance guard controller and an entrance guard lock, the entrance guard controller initiatively requests a server to establish the Socket connection after networking and listens for door opening commands. The mobile internet voiceprint entrance guard system enables the users to perform local or remote door opening operation via the mobile device and sounds, and has the advantages of being difficult to counterfeit, being unable to steal, not involving privacy, being low in cost, being prone to remote verification and the like.

Journal ArticleDOI
01 Jun 2015
TL;DR: This work proposes and analyzes an alternative guard selection scheme by way of grouping guards together to form shared guard sets, and shows guard sets do provide increased resistance to a number of attacks, while foreseeing no significant degradation in performance or bandwidth utilization.
Abstract: “Entry” guards protect the Tor onion routing system from variants of the “predecessor” attack, that would allow an adversary with control of a fraction of routers to eventually de-anonymize some users. Research has however shown the three guard scheme has drawbacks and Dingledine et al. proposed in 2014 for each user to have a single long-term guard. We first show that such a guard selection strategy would be optimal if the Tor network was failure-free and static. However under realistic failure conditions the one guard proposal still suffers from the classic fingerprinting attacks, uniquely identifying users. Furthermore, under dynamic network conditions using single guards offer smaller anonymity sets to users of fresh guards. We propose and analyze an alternative guard selection scheme by way of grouping guards together to form shared guard sets. We compare the security and performance of guard sets with the three guard scheme and the one guard proposal. We show guard sets do provide increased resistance to a number of attacks, while foreseeing no significant degradation in performance or bandwidth utilization.

Patent
09 Dec 2015
TL;DR: Wang et al. as mentioned in this paper proposed a WeChat-based control method for an entrance guard system, which includes the following steps: receiving scanning information obtained through scanning an information two-dimensional code by a first client side; according to the scanning information, judging whether the first client-side is authorized by a second client side, sending an opening instruction to an entrance-guard controller to control the entrance guard controller to open an entranceguard system.
Abstract: The invention discloses a WeChat-based control method including the following steps: receiving scanning information obtained through scanning an entrance guard information two-dimension code by a first client side; according to the scanning information, judging whether the first client side is authorized by a second client side; and when determining that the first client side is authorized by the second client side, sending an opening instruction to an entrance guard controller to control the entrance guard controller to open an entrance guard system. The invention also discloses a cloud server and a system. Based on the WeChat online authentication way, the security and usability of the entrance guard system can be improved.

Patent
09 Sep 2015
TL;DR: In this article, an intelligent household monitoring and antitheft system and a monitoring method for the purpose of realizing household theft prevention is presented, where the system and the method record crime evidence of a criminal and enable a user to discover an alarm condition timely and give an alarm rapidly.
Abstract: The invention brings forward an intelligent household monitoring and antitheft system and a monitoring method thereof for the purpose of realizing household theft prevention. The system and the method record crime evidence of a criminal and enable a user to discover an alarm condition timely and give an alarm rapidly. The intelligent household monitoring and antitheft system comprises an intelligent gateway, a camera and an electronic entrance guard, wherein the intelligent gateway is provided with a processor, a first communication module for connection with a local area network and a second communication module for connection with a wide area network, the first communication module is at least connected with the one camera and the electronic entrance guard, and the second communication module is connected with a cloud server; the camera is provided with a third communication module interconnected with the first communication module for communication and is controlled by the intelligent gateway for sending real-time recording data thereto; and the electronic entrance guard is provided with a light perception module or an infrared intrusion detection module and a fourth communication module interconnected with the first communication module for communication and has the effect of sending warning signals to the intelligent gateway after it is detected that a door is open.

Patent
05 Mar 2015

Patent
13 Jan 2015
TL;DR: A semi-automatic or automatic firearm comprising a hand guard that includes a three dimensional end profile can depict subject matter related to sporting, outdoors, military, and hunting-related interests, such as the head and face of a warthog or peccary as discussed by the authors.
Abstract: A semi-automatic or automatic firearm comprising a hand guard that includes a three dimensional end profile. The three dimensional end profile can depict subject matter related to sporting, outdoors, military, and hunting-related interests, such as the head and face of a warthog or peccary. The firearm can also include a bipod which includes feet configured and shaped to resemble animal feet, such as the hooves of a warthog or peccary.

Patent
26 Aug 2015
TL;DR: In this article, an entrance guard system based linked control method for the intelligent household electrical appliance and performance thereof according to human body information detection is presented. But the method is not suitable for the Intelligent Household Electrical Appliances (IH appliances).
Abstract: The invention relates to control for intelligent household electrical appliance, especially to especially to an entrance guard system based linked control method for the intelligent household electrical appliance and performance thereof according to human body information detection, and aims at solving the problem that in the prior art, the intelligent household electrical appliance is combined with the entrance guard system, and linked control is not realized. The method comprises the steps that communication of the entrance guard system and the intelligent household electrical appliance with a cloud platform is established; a detection unit of the entrance guard system detects human body information and transmits the detected human body information to the cloud platform; and the cloud platform determines whether a human enters or exists from a door according to the human body information sent from the entrance guard information, and according to a determination result, a door opening/closing instruction is sent to the entrance guard system while a linkage control command is sent to the intelligent household electrical appliance. The control method is suitable for the intelligent household electrical appliance.

Patent
02 Dec 2015
TL;DR: In this article, a mobile video system based on building entrance guard visual voice intercom is presented, which includes a mobile intelligent terminal with an APP application program, an entrance guard host device, and a data server.
Abstract: The invention provides a mobile video system based on building entrance guard visual voice intercom. The mobile video system includes a mobile intelligent terminal with an APP application program, an entrance guard host device, and a data server, the mobile intelligent terminal and the data server are in bidirectional communication via network, the server and the entrance guard host device are in long connection and in bidirectional communication via network, and the mobile intelligent terminal is connected with the entrance guard host device. The invention further provides a mobile video method based on building entrance guard visual voice intercom. Through the adoption of Bluetooth/NFC wireless communication, a lot of materials, time, and manpower cost are saved, and later maintenance and system update are convenient and simple. The system and method provided are energysaving and environmentally friendly, a user can know that he/she has visitors and opens his/her door for the visitors at any time and places only with his/her mobile intelligent terminal instead of a conventional IC or ID card, so that the convenience is facilitated.

Patent
07 Dec 2015
TL;DR: A hand guard mount assembly and method of securing a hand guard to a firearm in a manner that resists rotation and/or longitudinal translation of the hand guard relative to the underlying firearm is described in this article.
Abstract: A hand guard mount assembly and method of securing a hand guard to a firearm in a manner that resists rotation and/or longitudinal translation of the hand guard relative to the underlying firearm. The hand guard mount assembly includes a mount clip that is defined by a body having a first portion and a second portion. The first portion of the clip is constructed to be received in a slot defined by a hand guard and defines a smallest diameter associated with a receiver end of the hand guard. The second portion of the clip radially and/or longitudinally indexes the mount clip, and a hand guard associated therewith, relative to at least one of a barrel nut, a barrel, and a receiver associated with the underlying firearm.