scispace - formally typeset
Search or ask a question

Showing papers on "Guard (information security) published in 2016"



Patent
06 Jul 2016
TL;DR: In this paper, an entrance guard access method based on a two-dimensional code and face identification comprises the steps that a resident applies to a background server for the visitor gate pass two-dimension code through an intelligent terminal, and uploads a face image to the server to be related with a visitor ID.
Abstract: An entrance guard access method based on a two-dimension code and face identification comprises the steps that a resident applies to a background server for the visitor gate pass two-dimension code through an entrance guard APP intelligent terminal; a visitor acquires the visitor gate pass two-dimension code from the background sever through the entrance guard APP intelligent terminal, and uploads a face image to the server to be related with a visitor ID; an entrance guard controller reads the visitor gate pass two-dimension code displayed on the entrance guard APP intelligent terminal through an input device, and takes the picture of the face image of the visitor; the entrance guard controller judges the consistency of generated decoding information and stored authentication information.Two-dimension code appointment and face identification are combined, so that the uniqueness and safety of appointment verification are guaranteed; furthermore, the whole identification process is achieved through an entrance guard identifier, cost is saved, and more importantly, time is saved, efficiency is improved, and using is quite convenient.

57 citations


Patent
Yoel Gluck1
27 Jun 2016
TL;DR: In this paper, a user session is initiated with a client device and a response is created to provide information from the remote resource to the client device, including metadata to be used to update the firewall context information.
Abstract: Context-based application firewall functionality. A user session is initiated with a client device. The user session allows access a remote resource on a server device coupled with the client device over a network. The connection between the client device and the remote resource is through an application firewall. An application firewall context setup is performed with the application firewall in response to the user session. The application firewall context comprises firewall context information to be used during the user session to perform network and application security operations with the application firewall. A response is created to provide information from the remote resource to the client device. The response includes metadata to be used to update the firewall context information. The firewall context information is updated with the application firewall based on the metadata. The response is transmitted to the client device.

41 citations


Journal ArticleDOI
Xiaofan He1, Huaiyu Dai1, Wenbo Shen1, Peng Ning1, Rudra Dutta1 
TL;DR: Various well-established channel correlation models are investigated and a set of important physical factors that have significant influence on LS security are identified, and with the obtained insights, extensive simulations are conducted to explore suitable guard zone sizes for LS in several typical indoor and outdoor environments.
Abstract: Motivated by information-theoretic security, link signature (LS)-based security mechanisms exploit the ample channel characteristics between wireless devices for security establishment. Nevertheless, LS is originated from wireless environments and hence may exhibit potential vulnerabilities that can be exploited by adversary in the vicinity. As to this, it is widely believed in existing literature on LS that, a half-wavelength guard zone is sufficient to decorrelate the adversary channel from the legitimate one and thereby secures the legitimate LS. However, such an assumption may not hold universally—in some environments, high channel correlations have been observed for much larger spatial separations. Considering this, a comprehensive understanding of channel correlation in different wireless environments is needed for more confident deployment of LS-based security mechanisms. To this end, various well-established channel correlation models are investigated in this work. A set of important physical factors that have significant influence on LS security are identified, and with the obtained insights, extensive simulations are conducted to explore suitable guard zone sizes for LS in several typical indoor and outdoor environments. Experimental results based on universal software radio peripheral (USRP) platforms and GNURadio are also presented to further support the analysis.

29 citations


Book
17 May 2016
TL;DR: For example, this paper pointed out that not all sensitive events and individuals are created equal or handled the same way by the Chinese Communist Party (CCP), and pointed out the fact that when it comes to the Tiananmen Massacre, another sensitive event, and Liu Xiaobo, another "sensitive" figure, all public and even some relatively private forms of discussion are blocked, while the CCP's aim with the Cultural Revolution and Mao, by contrast, is not to blot out but control memory, not stop but steer the direction and constrain the scope of research, discussion,
Abstract: People routinely refer to the Cultural Revolution and Mao Zedong as two subjects that are “sensitive” to write and even talk about in today’s People’s Republic of China (PRC). This is true, but not all “sensitive” events and individuals are created equal—or handled the same way by the Chinese Communist Party (CCP). When it comes to the June 4 Massacre, another “sensitive” event, and Liu Xiaobo, another “sensitive” figure, all public and even some relatively private forms of discussion are blocked. The goal is to make them both forgotten, as Louisa Lim argues in her important, aptly titled 2014 Oxford book, The People’s Republic of Amnesia: Tiananmen Revisited. The CCP’s aim with the Cultural Revolution and Mao, by contrast, is not to blot out but control memory, not stop but steer the direction and constrain the scope of research, discussion, and commemoration. Last year, when the fiftieth anniversary of the first Red Guard rallies passed, there was, tellingly, muted discussion in all parts of the PRC other than Hong Kong but, equally tellingly, not a complete June 4 anniversary style blackout. Mainland bookstores stock novels dealing with the Cultural Revolution but not June 4, and texts by and biographies of Mao but not Liu. And so on. When it comes to the Cultural Revolution, what doMao’s successors strive to do? One thing is to minimize investigation into some specific things that happened during the decade-long period, sometimes described as “ten years of turmoil,” which stretched from the 1966 forming of the Red Guards to the 1976 arrest of the Gang of Four. Another is to avoid a thorough assessment of who should be blamed for the “turmoil”—other than the demonized, scapegoated quartet made up of Mao’s widow, Jiang Qing, and three men. When it comes to Mao, the CCP would like people to focus on the things that he did before the final ten years of his life, especially during the lead up to Japan’s surrender in 1945 and the lead up to the so-called “liberation” of 1949. Taken together, the aim is to get China’s populace to think of the Cultural Revolution as a dark period that stands apart completely from two other eras: a glorious earlier one whose highlight was the founding of the PRC, and a wonderful later one of “reform and opening,” said to still be underway, that has seen the country grow richer and increase its global clout. One achievement of the recent burst of high quality international scholarship on the Cultural Revolution has been to expose the folly of treating the decade as a free-floating anomaly. Yes, it was an unusual period during which unique things happened. Nevertheless, as the best recent work shows, the Cultural Revolution should not be detached from what came before or what Journal of Chinese History 1 (2017), 365–368

28 citations


Patent
13 Apr 2016
TL;DR: In this paper, an entrance guard access control method comprising a card number acquiring step: registering owner APP/visitor APP preassembled on an owner terminal/visitors terminal in a server to acquire an owner card number orvisitor card number which is solely bonded with an owner account number/invariant account number, and a visitor access step: acquiring the authorization information from the owner APP through a server by the visitor APP based on the visitor card number.
Abstract: The invention discloses an entrance guard access control method comprising a card number acquiring step: registering owner APP/visitor APP preassembled on an owner terminal/visitor terminal in a server to acquire an owner card number/visitor card number which is solely bonded with an owner account number/visitor account number; an owner access step: recording the owner card number as an authorization card number into an entrance guard access system by an authorization terminal, and sending the owner card number to the entrance guard access system by the owner APP, judging whether the owner APP has access permission by the entrance guard access system according to the owner card number; a visitor access step: acquiring the authorization information from the owner APP through a server by the visitor APP based on the visitor card number, sending the visitor card number and the authorization information to the entrance guard access system by the visitor APP, and judging whether the visitor APP has the access permission by the entrance guard access system according to the visitor card number and the authorization information. According to the invention, all of the owners and the visitors are verified through card numbers when whether to have access permission is verified, a server system is utilized to uniformly generate unique card numbers for every owner account number/visitor account number, which are not influenced even though mobile phones of owners and visitors are changed.

28 citations


Patent
24 Jun 2016
TL;DR: In this article, a flexible propeller guard is used to protect one or more of the UAV's propellers from objects in the flight path, and the flexible guard is arranged so as to not interfere with the foldability of the arms.
Abstract: There is provided an unmanned aerial vehicle (UAV) with a flexible propeller guard. The flexible propeller guard may allow the UAV to be resiliently repelled from objects in the UAV's flight path, thereby protecting one or more of the UAV's propellers. The UAV may have foldable arms, movable between a deployed configuration and a stored configuration, and the flexible propeller guard may be used to restrain the folded arms in the stored configuration. The flexible propeller guard may be arranged so as to not interfere with the foldability of the arms.

27 citations


Patent
15 Jun 2016
TL;DR: In this article, an entrance guard manage system, an authorization method thereof and an access control terminal device, which are used for user self-service access control authorization management is presented.
Abstract: The invention provides an entrance guard manage system, an authorization method thereof and an entrance guard terminal device, which are used for user self-service access control authorization management. The invention belongs to the technical field of intelligent buildings and especially relates to the authorization method and the device for the entrance guard manage system. The authorization method includes the steps of registering an account according to personal identity information; correlating the account with at least one access control terminal device, and storing the correlated information in a server; and performing self-service access control authorization with the access control terminal devices through the correlated information. By means of the method, a manager only needs to manage users without management on entrance guard cards of the users, so that the method reduces workload of the managers. The user can add or delete the entrance guard card on the entrance guard cards on the access control terminal devices at any time, thereby bringing convenience for self-management on entrance guard authorization by the user.

22 citations


Patent
21 Apr 2016
TL;DR: In this article, a server acquires surveillance data from each of a plurality of distributed surveillance devices deployed within or adjacent to a given security sensitive facility, and then the server receives an intrusion alert from a guard, or from one or more of the plurality of surveillance devices to initiate a triggering event, if the acquired surveillance data is indicative of activity that has been detected at an indicated location.
Abstract: A method for monitoring and securing a facility without employing a manned control center, according to which a server acquires surveillance data from each of a plurality of distributed surveillance devices deployed within or adjacent to a given security sensitive facility. Then the server receives an intrusion alert from a guard, or from one or more of the plurality of surveillance devices to initiate a triggering event, if the acquired surveillance data is indicative of activity that has been detected at an indicated location. A first guard is alerted and presented with a full situational awareness image to assess the severity of the detected activity and the triggering event is terminated if found by the first guard to be of a low severity, or an interception operation initiated by self-dispatching or dispatching one or more additional guards to a close by location that holds tactical advantage relative to the indicated location if the triggering event was found by the first guard to be of a high severity.

21 citations


Patent
11 May 2016
TL;DR: In this article, an entrance guard control system consisting of a Bluetooth reader and a Bluetooth key is presented. But the system is not suitable for the use of a wireless sensor network.
Abstract: The invention discloses an entrance guard control system and an entrance guard control method The system comprises a Bluetooth reader and a Bluetooth key The entrance guard control method comprises the following steps that S1, the Bluetooth reader receives a broadcast signal sent by the Bluetooth key; S2, the Bluetooth reader determines distance information between the Bluetooth key and the Bluetooth reader according to intensity of the broadcast signal; S3, when the distance information is in accordance with predetermined information, an intention of the Bluetooth key to open an entrance guard is determined, and the Bluetooth reader and the Bluetooth key establish a Bluetooth connection; S4, the Bluetooth reader acquires and verifies an entrance guard encryption key sent by the Bluetooth key, when the entrance guard encryption key is the same as a prestored authorization encryption key, the entrance guard is controlled to be opened According to the invention, the entrance guard encryption key is sent after the Bluetooth connection is established, so that information in a point-to-point communication of the Bluetooth connection is not easily intercepted; the distance information of the Bluetooth key and the Bluetooth reader is determined according to the intensity of the broadcast signal, and when the distance information is in accordance with the predetermined information, the intention of the Bluetooth key to open the entrance guard is determined, so that misoperation of the Bluetooth key can be prevented to open the entrance guard

20 citations


01 Jan 2016
TL;DR: The standing guard protecting foreign capital in the nineteenth and twentieth centuries as discussed by the authors was one of the first books published in the US. But people have searched hundreds of times for their chosen novels like this one, but end up in malicious downloads, and instead cope with some infectious bugs inside their laptop.
Abstract: Thank you for reading standing guard protecting foreign capital in the nineteenth and twentieth centuries. As you may know, people have search hundreds times for their chosen novels like this standing guard protecting foreign capital in the nineteenth and twentieth centuries, but end up in malicious downloads. Rather than reading a good book with a cup of tea in the afternoon, instead they cope with some infectious bugs inside their laptop.

Journal ArticleDOI
TL;DR: In this paper, the authors explored the use of a learning algorithm in the "guarding a territory" game, where a single learning invader tries to get as close as possible to a territory before being captured by a guard.
Abstract: This paper explores the use of a learning algorithm in the "guarding a territory" game. The game occurs in continuous time, where a single learning invader tries to get as close as possible to a territory before being captured by a guard. Previous research has approached the problem by letting only the guard learn. We will examine the other possibility of the game, in which only the invader is going to learn. Furthermore, in our case the guard is superior (faster) to the invader. We will also consider using models with non-holonomic constraints. A control system is designed and optimized for the invader to play the game and reach Nash Equilibrium. The paper shows how the learning system is able to adapt itself. The system's performance is evaluated through different simulations and compared to the Nash Equilibrium. Experiments with real robots were conducted and verified our simulations in a real-life environment. Our results show that our learning invader behaved rationally in different circumstances.

Patent
23 Mar 2016
TL;DR: In this article, an entrance guard control method based on face recognition is proposed, which comprises the three steps of image information collecting, data processing and entrance guard operating, wherein core data processing comprises the steps that analysis is performed on the basis of returned video images, face images are automatically captured, compared and matched with existing photos in a database, and the faces are recognized.
Abstract: The invention discloses an entrance guard control method based on face recognition. The entrance guard control method comprises the three steps of image information collecting, data processing and entrance guard operating, wherein core data processing comprises the steps that analysis is performed on the basis of returned video images, face images are automatically captured, compared and matched with existing photos in a database, and the faces are recognized. Particularly, means such as a face detection optimization data structure, picture preprocessing and feature extracting are integrated in data processing, and therefore high-speed high-accuracy face verification and recognition are achieved. According to the entrance guard control method, the defect that traditional face monitor and recognition are poor in light change, attitude angle and time span stability is overcome, the detection rate larger than 99% and the recognition rate larger than 80% within 5 meters are achieved, and the utilization rate of traditional hardware resources is increased and the application range of network monitor is widened except that intelligent control over entrance guard and attendance is effectively achieved.

Patent
07 Dec 2016
TL;DR: In this article, a control method of a Bluetooth entrance guard consisting of a mobile terminal for supporting a Bluetooth gateway, a Bluetooth controller module, and an electric control lock is presented, where the mobile terminal starts a series of calculating and judging operation, resource occupation due to mis-determination is reduced, and power consumption is reduced.
Abstract: The invention provides a control method of a Bluetooth entrance guard. The entrance guard comprises the following components: a mobile terminal for supporting a Bluetooth entrance guard function module, a Bluetooth entrance guard control module and an electric control lock which are installed at a gateway; after the mobile terminal Bluetooth entrance guard function module searches a matched Bluetooth signal, an operation for calculating the distance between the mobile terminal and the Bluetooth entrance guard control module is not started at once, simple judgment is carried out for acquired Bluetooth signal intensity, and the operation for calculating the distance between the mobile terminal and the Bluetooth entrance guard control module is started till the signal is near enough; only if a user really wants to open the entrance guard, the mobile terminal starts a series of calculating and judging operation, resource occupation due to mis-determination is reduced, and power consumption of the mobile terminal is reduced; further, a one-key opening function for door is additionally installed for the mobile terminal, if after a user opens the door, the user wants to open the entrance door again, the operation for opening the door can be triggered nearby, and the user does not need to keep away from the door and keep close to the entrance guard again for triggering and opening the door.

Proceedings ArticleDOI
18 Apr 2016
TL;DR: The results show that the learning invader behaved rationally in different circumstances, and how the learning system is able to adapt itself is shown.
Abstract: This paper explores the use of a learning algorithm in the "guarding a territory" game. The game occurs in continuous time, where a single learning invader tries to get as close as possible to a territory before being captured by a guard. Previous research has approached the problem by letting only the guard learn. We will examine the other possibility of the game, in which only the invader is going to learn. Furthermore, in our case the guard is superior to the invader. We will also consider using models with non-holonomic constraints. A control system is designed and optimized for the invader to play the game and reach Nash-Equilibrium. The paper finally shows how the learning system is able to adapt itself. The system's performance is evaluated through different simulations and compared to the Nash-Equilibrium. Experiments with real robots were conducted and verified our simulations in a real-life environment. Our results show that our learning invader behaved rationally in different circumstances.

Proceedings ArticleDOI
01 Aug 2016
TL;DR: The main content is to complete the function of firewall which is based on the Linux operating system, using Netfliter as firewall architecture, and the IPtable as a user space module tool.
Abstract: With the constant development of network technology today, network not only brings us a convenient and efficient life, and is accompanied by a variety of network security problems. Firewall, as a main way to prevent network attacks, is often used to prevent illegal connection and separates the internal network from the insecure networks, to protect the safety of the Linux systems which used in small and medium-sized enterprise. In this paper, the main content is to complete the function of firewall which is based on the Linux operating system, using Netfliter as firewall architecture, and the IPtable as a user space module tool. Firstly, this paper briefly analyzes the Netfilter/IPtable architecture and princIPle and working process of state detection technology, then, configure the firewall. At the last, the firewall experiment verified the effectiveness and safety of the design of the firewall.

Patent
Dejian Li1
30 Jun 2016
TL;DR: In this article, a network controller includes an acquiring unit, configured to acquire scheduling information of an adjacent network controller of a first network controller; a determining unit, configurable to determine a status of time and frequency overlapping between another access period and a first controller.
Abstract: A network controller includes: an acquiring unit, configured to acquire scheduling information of an adjacent network controller of a first network controller; a determining unit, configured to determine a status of time and frequency overlapping between another access period and a first SP; a scheduling unit, configured to set guard period configuration information of the first SP according to an interfered status of the first SP and the overlapping status determined by the determining unit; and a first sending unit, configured to send the guard period configuration information of the first SP to a station

Patent
11 May 2016
TL;DR: A valve assembly for use with a surgical instrument is disclosed in this article, where the valve assembly includes a housing and a seal assembly disposed within the housing, the seal assembly including a septum seal including an orifice configured to sealingly engage the surgical instrument inserted therethrough.
Abstract: A valve assembly for use with a surgical instrument is disclosed. The valve assembly includes a housing and a seal assembly disposed within the housing, the seal assembly including a septum seal including an orifice configured to sealingly engage a surgical instrument inserted therethrough, at least a portion of the septum seal defining a seal curvature, a first guard member including a plurality of curved first guard portions defining slits therebetween, and a second guard member including a plurality of curved second guard portions defining slits therebetween. The first and second guard members may be positioned in an overlapping relationship with the plurality of first guard portions rotationally offset with respect to the second guard portions. The wide, triangular shaped slits of the guard members may improve flexibility of the guard portions.

Patent
04 May 2016
TL;DR: In this article, a wireless transmission way is used to replace the wire transmission way, such that the construction difficulty is reduced, and the transforming of the manager on the entrance guard system in the future is easily achieved.
Abstract: The invention relates to an intelligent entrance guard system, and belongs to the field of entrance guard systems. The intelligent entrance guard system is characterized by comprising main control equipment, a card reading module, a wireless receiving and transmitting module, a display circuit module, a signal conditioning module, a communication module, a monitoring module, a control module and a PC machine, wherein the card reading module is connected to the signal conditioning module, a power supply module, the signal conditioning module, the display circuit module, the wireless signal receiving and transmitting module, the monitoring module and the main control equipment are connected to the control module, the communication module and the PC machine are connected, and the communication module is connected to the control module through an wireless signal. According to the present invention, the wireless transmission way is used to replace the wire transmission way, such that the construction difficulty is reduced, and the transforming of the manager on the entrance guard system in the future is easily achieved; and the system has characteristics of simple structure and easy use, is the intelligent residential district entrance guard scheme capable of being popularized, has broad market application prospects, and is suitable for large range promotion use.

Patent
02 Nov 2016
TL;DR: In this article, the utility model discloses a with student's study, life and teacher's teaching implementation network interconnection, realize through an intelligent network deployment platform that do benefit to the intelligent management of school, this intellectuality network deployment structure accessible mobile terminal realizes the interconnection.
Abstract: The utility model discloses a colleges and universities remove wisdom campus system, including well accuse platform, well accuse platform by the server farm with calculate unit component, it still includes supervisory equipment group, entrance guard's device, attendance detection device, environment collection system, classroom impart knowledge to students projection arrangement, scoring table scanning device, environment control device and mobile terminal, well accuse platform passes through the network and links to each other with supervisory equipment group, entrance guard's device, attendance detection device, environment collection system, classroom teaching projection arrangement, scoring table scanning device and environment control device respectively, well accuse platform still links to each other with mobile terminal through wireless network. The utility model discloses a with student's study, life and teacher's teaching implementation network interconnection, realize through an intelligent network deployment platform that do benefit to the intelligent management of school, this intellectuality network deployment structure accessible mobile terminal realizes the interconnection, simple structure, it is convenient to realize, but the wide application is in all kinds of, during the campus of primary school and universities manages.

Patent
09 Mar 2016
TL;DR: In this paper, an entrance guard management method and system is presented, which comprises the steps that a back-end processing center receives a registration request instruction of a creator and allocates a cluster for the creator after registration conditions are met.
Abstract: The invention discloses an entrance guard management method and system. The method comprises the steps that a back-end processing center receives a registration request instruction of a creator and allocates a cluster for the creator after registration conditions are met; the back-end processing center adds corresponding members to the cluster according to a received member addition instruction; the back-end processing center allocates corresponding characters to the members in the cluster according to a received character setting instruction; the back-end processing center sets entrance guard use permissions for the corresponding members in the cluster according to a received entrance guard use permission setting instruction, and each entrance guard use permission comprises virtual entrance guard serial number information and effective time information corresponding to the virtual entrance guard serial number information. According to the entrance guard management method and system, mobile management and character hierarchical management of an entrance guard are achieved, an administrator can conveniently conduct permission control on the members in the cluster, each member in the cluster can online generate a virtual key within the entrance guard use permission, the virtual keys can be shared, and great flexibility and real-time performance are achieved.

Patent
21 Dec 2016
TL;DR: In this paper, an entrance guard system based on the internet of things is presented, which consists of a mobile device, an internet server, and an internet-of-things module.
Abstract: The invention discloses an entrance guard system based on the internet of things. The system comprises entrance guard electronic locks, electronic lock two-dimensional codes printed on the electronic locks, a mobile device, an internet server and an internet-of-things module. The entrance guard electronic locks are used for controlling opening and closing of a door. The internet-of-things module is used for data interaction of the entrance guard electronic locks and the internet server and controls the entrance guard electronic locks. The internet server is used for saving feature information data of the mobile device corresponding to the entrance guard electronic locks, receiving unlocking requests of the mobile device, authenticating request data and feeding back execution commands to the internet-of-things module. The entrance guard system based on the internet of things and an entrance guard control method are combined with modern technology development and are very valuable, authentication of a traditional entrance guard system is moved from the electronic locks to the internet server, and a lot of manpower and materials can be saved; a user only needs the mobile device to scan the two-dimensional codes printed on the electronic locks and conduct unlocking, no marks are left, and unlocking is convenient and quick.

Journal ArticleDOI
TL;DR: In this paper, an anatomy of power relations and policymaking within the ranks of the former liberation movement South West African People's Organization (SWAPO) in Namibia is presented.
Abstract: This article presents an anatomy of power relations and policymaking within the ranks of the former liberation movement South West African People's Organization (SWAPO) in Namibia. It summarizes th ...

Patent
03 Jun 2016
TL;DR: In this paper, the authors describe a flexible guard for a handheld controller having a thumbstick or other pivotal control member, which can move relative to the skirt when pivoting the control member relative to body.
Abstract: Handheld controllers having flexible thumbstick guards are disclosed herein for use with a handheld controller having a thumbstick or other pivotal control member. A representative guard has a tubular neck that sealably connects to a shaft portion of the thumbstick, and a skirt that sealably connects to an interior portion of the handheld controller around the control opening. The guard has a flexible joint portion interconnecting the neck and the skirt to allow the neck to move relative to the skirt upon pivoting the control member relative to the body.

Patent
30 Mar 2016
TL;DR: In this article, a method and device of a terminal guard against theft is presented, which consists of: when a preset event is triggered, first physiological feature information of a current user of the terminal is acquired; the first physiological features are sent to a cloud server; a comparison result returned by a network is received, wherein the comparison result is the result that whether the first feature information accords with a second feature information or not through the cloud server.
Abstract: The present invention discloses a method and device of a terminal guard against theft. The method comprises: when a preset event is triggered, first physiological feature information of a current user of the terminal is acquired; the first physiological feature information is sent to a cloud server; a comparison result returned by a network is received, wherein the comparison result is the result that whether the first physiological feature information accords with a second accord physiological feature information or not through the cloud server; when it is determined that the first physiological feature information does not accord with the second physiological feature information according to the comparison result, a preset operation of guard against theft is executed. According to the invention, human physiological feature information is employed to realize terminal guard against theft.

Patent
16 Nov 2016
TL;DR: In this article, a rental housing management system is described, and the system comprises a management platform, wherein the management platform stores rental housing data, tenant information data and rent data, is coupled to an external public security system, and is also coupled with an external map service system; user terminals which comprises a landlord terminal and a tenant terminal; and a plurality of entrance guard devices which are respectively disposed on the door of each rented house, and communicates with the landlord and the tenant terminal.
Abstract: The invention discloses a rental housing management system, and the system comprises a management platform, wherein the management platform stores rental housing data, tenant information data and rent data, is coupled to an external public security system, and is also coupled to an external map service system; user terminals which comprises a landlord terminal and a tenant terminal; and a plurality of entrance guard devices which are respectively disposed on the door of each rented house, and communicates with the landlord terminal and the tenant terminal. The system can cooperate with the public security system through the setting of the management platform, so as to judge whether a tenant is a criminal offender or not. The system also can achieve the automation of payment through the setting of the landlord terminal and the tenant terminal, and solves a problem in the prior art.

Patent
21 Dec 2016
TL;DR: In this paper, a football training device consisting of a training field, a scoring rail, a guard bar, a plurality of pitching devices and a control console is presented, where the scoring rail is encircled on the periphery of the training field.
Abstract: The invention relates to a football training device which comprises a training field, a scoring rail, a guard bar, a plurality of pitching devices and a control console, wherein the scoring rail is encircled on the periphery of the training field; the guard bar is encircled on the exterior of the scoring rail; the pitching devices are arranged between the scoring rail and the guard bar; the control console is arranged on the outer side of the guard bar; the scoring rail comprises a plurality of target ball frames; a sensor and an indicator are respectively arranged on each of the target ball frames; a recycling conveyor belt is arranged on the inner side of the guard rail; the recycling conveyor belt is connected with the pitching devices; a display screen is arranged on the guard bar; shooting openings of the pitching devices are faced to the training field; each of the pitching devices is electrically connected with the control console and is equipped with a prompt tone player Meanwhile, the invention also provides a control method for the football training device The football training device and control method have the beneficial effects that the athletes can make various football training plans according to self-training requirements, such as, shooting training, throwing training, and the like; various functions are provided; the urgent and various game scenes can be truly simulated; the football training device is beneficial to the promotion of the quick reaction capability and physical power of the players

Patent
08 Jun 2016
TL;DR: In this article, the utility model discloses a shop with unmanned on duty management system, including shop and monitor, the shop includes an entry and an export, first entrance guard's floodgate machine is installed to the entrance, still include exit channel, exit channel's one end is provided with self-service checkout device, and exit channel is including not having shopping passageway.
Abstract: The utility model discloses a shop with unmanned on duty management system, including shop and monitor, the shop includes an entry and an export, first entrance guard's floodgate machine is installed to the entrance, still include exit channel, exit channel's one end is provided with self -service checkout device, exit channel is including not having shopping passageway and shopping passageway, the exit of not having the shopping passageway is provided with second entrance guard floodgate machine, the exit of shopping passageway is provided with third entrance guard floodgate machine, include still that three two -dimensional code sweeps a yard system, yard system configuration is swept in first entrance guard's floodgate machine department to first two -dimensional code, and yard system configuration is swept in second entrance guard floodgate machine department to the second two -dimensional code, and yard system configuration is swept in third entrance guard floodgate machine department to the third two -dimensional code. The utility model discloses can realize shop unmanned on duty, reduction shop human cost that can be very big improves shop profit level. And the utility model discloses a self -service checkout device, without the cashier, do not change, efficient.

Patent
31 May 2016
TL;DR: In this paper, a computer-implemented method, including a gateway implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in the private network, is described.
Abstract: A computer-implemented method, including: upon a request from a client device, establishing, by a computer system implementing a gateway to a private network, a network tunnel between the client device and the gateway; the gateway further implementing a firewall including firewall rules for selectively blocking and allowing network traffic between the client device and one or more network devices in the private network; upon a triggering of a firewall rule by a request for access to the private network by the client device and before applying the firewall rule, checking, by the computer system, if a corresponding condition is met; and if the condition is not met, then, by the computer system, sending to the client device an action to be performed by the client device.

Patent
09 Nov 2016
TL;DR: In this article, an entrance guard access control method and a system for zero-operation opening of the door by a user is described. But the method and the system does not increase cost and facilitates zero operation opening of a door by users.
Abstract: The invention discloses an entrance guard access control method and an entrance guard system. The method comprises that an entrance guard APP preset on a smartphone submits a login request to a remote server, and the remote server generates a private key and a public key and distributes to the entrance guard APP and a management server; the management server adds or deletes user authorization data in a user database; an entrance guard box periodically broadcasts a data packet, when the smartphone enters the broadcast scope of the entrance guard box, the entrance guard APP sends the private key to the entrance guard box through the broadcast packet or in a connectionless mode after receiving the broadcast packet; the entrance guard box transmits the private key to the management server after receiving the private key from the entrance guard APP; and the management server matches the private key with the user authorization data in the user database, sends a door opening signal to the entrance guard box for opening the door if match is successful, and does not respond if match is unsuccessful. The method and the system does not increase cost and facilitates zero-operation opening of the door by a user.