CN104766422B - Perimeter intruder monitoring system and method - Google Patents

Perimeter intruder monitoring system and method Download PDF

Info

Publication number
CN104766422B
CN104766422B CN201510185758.1A CN201510185758A CN104766422B CN 104766422 B CN104766422 B CN 104766422B CN 201510185758 A CN201510185758 A CN 201510185758A CN 104766422 B CN104766422 B CN 104766422B
Authority
CN
China
Prior art keywords
monitoring
intrusion
control
intrusion behavior
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510185758.1A
Other languages
Chinese (zh)
Other versions
CN104766422A (en
Inventor
王鹏翔
喻劼
谢伟
肖志杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Development Of Ltd By Share Ltd Of Sichuan Railway Southwest Jiaotong University
Original Assignee
Development Of Ltd By Share Ltd Of Sichuan Railway Southwest Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Development Of Ltd By Share Ltd Of Sichuan Railway Southwest Jiaotong University filed Critical Development Of Ltd By Share Ltd Of Sichuan Railway Southwest Jiaotong University
Priority to CN201510185758.1A priority Critical patent/CN104766422B/en
Publication of CN104766422A publication Critical patent/CN104766422A/en
Application granted granted Critical
Publication of CN104766422B publication Critical patent/CN104766422B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Burglar Alarm Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The invention relates to the safety technical field of perimeter intruder monitoring and discloses a perimeter intruder monitoring system and method. The system comprises multiple monitoring devices installed on a monitoring site, an alarm host in data communicated with the multiple monitoring devices, and a control host in data communication with the alarm host, wherein the alarm host comprises a signal receiver and a signal processor, the signal receiver receives information containing intrusion behaviors sent by the monitoring devices, the signal processor conducts analysis and uniform-format processing on the information containing intrusion behaviors, and the control host controls the states of the multiple monitoring devices located on the monitoring site or external controllable equipment in linkage with the system according to a processing result sent by the signal processor. By the adoption of the system and method, the technical problem of the prior art that a single monitoring device for perimeter protection only has one function, and therefore monitoring of multiple intruding modes can not be achieved is solved, and protection grade and protection comprehensiveness are improved through the integration of the multiple monitoring devices.

Description

A kind of circumference system for monitoring intrusion and method
Technical field
The present invention relates to circumference intrusion detection security technology area, more particularly to a kind of circumference system for monitoring intrusion and side Method.
Background technology
The Line for Passenger Transportation of Current Domestic operation, prevents intrusive behavior in circuit both sides, is generally separately provided infrared emission Scheme, or video surveillance scheme is separately provided, or microwave is separately provided to scheme of penetrating etc..Therefore, to being separately provided The scheme invaded is prevented, the intrusion behavior in each orientation can not be comprehensively monitored, so, cannot be to multi-faceted invasion Behavior and alarm or effective control.
Therefore, in prior art there is function phase to single in the single monitoring device of perimeter protection, it is impossible to realize it is various enter The technical problem of the monitoring invaded under pattern.
The content of the invention
The embodiment of the present invention by providing a kind of circumference system for monitoring intrusion and method, in solving prior art, prevent by circumference There is function phase to single in the single monitoring device of shield, it is impossible to realize the technical problem of the monitoring under various intrusion models, and then Various monitoring devices are integrated with, degree of protection are improved and protection is comprehensive.
Technical scheme is as follows:
The invention provides a kind of circumference system for monitoring intrusion, including:Various monitoring devices of monitoring field security protection situation, There is the alarm host machine of data communication with various monitoring devices, and have the control master of data communication with the alarm host machine Machine;
Various monitoring devices are specifically included:Multiple monitoring terminals and a monitoring main frame, the monitoring main frame is to more The security protection condition information that individual monitoring terminal is monitored judged, judges whether there is intrusion behavior in monitoring field, true When having intrusion behavior surely, transmission has the information of intrusion behavior to the alarm host machine;
Alarm host machine includes signal receiver and signal processor, and the signal receiver is to having for being sent by monitoring device The information of intrusion behavior is received, and is transmitted to message handler, and described information processor enters to the information for having intrusion behavior Row parsing, and the process of consolidation form is carried out, the information for parsing specially is spliced into the spot for including intrusion behavior Point, time of origin, occurrence type, the type of monitoring device, and the process of the control measure need to taken by the intrusion behavior As a result;
Control main frame receives the result sent by the signal processor, and according to the result, control bit In various monitoring devices of monitoring field state or control controllable set with the outside of circumference system for monitoring intrusion linkage It is standby.
Further, the plurality of monitoring terminal is specifically included:Infrared shooting device, Doppler search device, microwave pair Injection device, vibration optical fiber device, fence and photographic head.
Further, the control main frame includes control module and pushing module;
Control module needs the control measure taken to the intrusion behavior according to what is included in the result for receiving, Control is located at the outside of the state of various monitoring devices of monitoring field or control and circumference system for monitoring intrusion linkage Controllable device;
Pushing module is sent out according to the scene for having intrusion behavior included in the result for receiving, time of origin Raw type, push have the warning message of intrusion behavior to terminal unit.
On the other hand, present invention also offers a kind of circumference intrusion detection method, is applied in circumference system for monitoring intrusion, The circumference intrusion detection method is comprised the following steps that:
Whether S10, judges to the security protection condition information that various monitoring devices are monitored, judge in monitoring field There is intrusion behavior, when it is determined that there is intrusion behavior, receive that the various monitoring devices of monitoring field send has intrusion behavior Information;
S20, parses to the information for having intrusion behavior, the information for parsing is spliced into and includes intrusion behavior Scene, time of origin, occurrence type, the type of monitoring device, and the control that the intrusion behavior need to be taken is arranged The result applied.
S30, according to the result, state or control and the week of the control positioned at the monitoring device of monitoring field The outside controllable device of boundary's system for monitoring intrusion linkage.
Further, S30 is specially:
According to the control measure that need to be taken to the intrusion behavior included in the result, control is existing positioned at monitoring The outside controllable device that the state of various monitoring devices of field or control are linked with the circumference system for monitoring intrusion.
Further, after S30, also include:
According to the scene for having intrusion behavior included in the result, time of origin, occurrence type, monitoring set Standby type, transmission have the warning message of intrusion behavior to terminal unit.
One or more technical schemes provided in the embodiment of the present invention, at least have the following technical effect that or advantage:
1st, as employing arranges various monitoring devices, alarm host machine and control main frame in circumference system for monitoring intrusion, Wherein, alarm host machine includes signal receiver and signal processor, and signal receiver has invasion row to what is sent by monitoring device For information receive, signal processor to parsing after the information for having intrusion behavior parsed and consolidation form process, and Result is obtained, control main frame receives the result sent by signal processor, and is located at according to the result control The outside controllable device that the state of various monitoring devices of monitoring field or control are linked with the circumference system for monitoring intrusion, Be present function phase to single in the single monitoring device for solving perimeter protection in prior art, it is impossible to realize under various intrusion models Monitoring technical problem, and then realize integrated various monitoring devices, improve the comprehensive technology of degree of protection and protection Effect.
2nd, due to adopting the configuration information processor in alarm host machine, the information of intrusion behavior is parsed, and will solution The information of precipitation is spliced into the scene for including intrusion behavior, time of origin, occurrence type, the type of monitoring device and The result of the control measure need to taken by the intrusion behavior, and then being capable of consolidation form so that control main frame is capable of identify that These results.
3rd, due to adopting in control main frame setting control module and pushing module, control module can be according to the place for receiving What is included in reason result needs the control measure taken, shape of the control positioned at various monitoring devices of monitoring field to intrusion behavior The outside controllable device that state or control are linked with the circumference system for monitoring intrusion, pushing module is according to the process knot for receiving The scene for having intrusion behavior included in fruit, time of origin, occurrence type, push have the warning message of intrusion behavior to end The information for having intrusion behavior that monitoring field is monitored can be sent to each terminal unit, energy by control main frame by end equipment Monitoring personnel is enough enabled to recognize the situation of monitoring site in time.
Description of the drawings
Fig. 1 is the module diagram of circumference system for monitoring intrusion in the embodiment of the present invention;
Fig. 2 be the embodiment of the present invention in circumference intrusion detection method the step of flow chart.
Specific embodiment
The embodiment of the present invention by providing a kind of circumference system for monitoring intrusion and method, in solving prior art, prevent by circumference There is function phase to single in the single monitoring device of shield, it is impossible to realize the technical problem of the monitoring under various intrusion models, and then Integrated various monitoring devices are realized, the comprehensive technique effect of degree of protection and protection is lifted.
In order to solve the above-mentioned technical problem relatively low in perimeter protection safety, below in conjunction with Figure of description and tool The embodiment of body is described in detail to above-mentioned technical proposal.
The embodiment of the present invention provides a kind of circumference system for monitoring intrusion, as shown in figure 1, including:Monitoring field security protection situation Various monitoring devices 101, have the alarm host machine 102 of data communication with various monitoring devices, and with the alarm host machine 102 There is the control main frame 103 of data communication.
In a particular embodiment, various monitoring devices 101 have been specifically included:Multiple monitoring terminals 1011 and one Monitoring main frame 1012, the monitoring main frame 1012 receive the security protection situation that multiple monitoring terminals are monitored.Wherein, multiple monitoring terminals 1011 include, infrared shooting device, Doppler search device, microwave to injection device, vibration optical fiber device, fence and Shooting is first-class, is just no longer described in detail in embodiments of the present invention.
Specifically, infrared shooting device can be arranged on guard plot two ends, by monitoring object to it is ultrared stop come Monitor the intrusion behavior for passing through;Doppler search device can detect movable signal in monitored area monitored into Invade behavior;Microwave can monitor that to injection device transmitting terminal, to the change of receiving terminal microwave signal, determines intrusion behavior;Vibration light Fine device can monitor the climbing of invasion personnel, or clash into the intrusion behavior that fence attempts to cross etc.;Fence energy Enough monitor that the foreign body of circumference clashes into the behavior of the foreign body intrusions such as net-fault, suspension, short circuit;Photographic head can photograph intrusion behavior Video image etc..
Above-mentioned multiple monitoring terminals 1011 are multi-faceted to the intrusion behavior of circumference to be monitored, and realizes prison of the monitoring without dead angle Survey pattern, then sends the information for monitoring to monitoring main frame 1012, and the monitoring main frame 1012 can be according to multiple monitorings eventually End 1011 send security protection condition informations judged, judge whether there is intrusion behavior in monitoring field, it is determined that have into When invading behavior, transmission has the signal receiver 1022 in the information to alarm host machine 102 of intrusion behavior.
In a particular embodiment, by taking vibration optical fiber device as an example, optical signals transmitting terminal is led to by vibration optical fiber device Cross the vibration optical fiber to transmit to receiving terminal, when the monitoring host supervision at the receiving terminal changes to optical signal, then judge Monitoring field there occurs intrusion behavior;By taking infrared shooting device as an example, send when infrared shooting device to the signal of monitoring main frame When generation is abnormal, judge to there occurs intrusion behavior in monitoring field, the signal that other monitoring terminals send enters in monitoring main frame The process that row judges just no longer is described in detail.
Then, after monitoring main frame 1012 judges to obtain and has the information of intrusion behavior, this there is into the information of intrusion behavior Send the signal receiver into alarm host machine 102.Specifically, the alarm host machine 102 includes signal receiver 1021 and signal Processor 1022, wherein, 1021 pairs of information for having intrusion behavior sent by monitoring main frame of signal receiver are received, so Afterwards, the information for having intrusion behavior after the parsing of the signal processor 1022 pairs parsed and consolidation form process, so as to obtain Obtain result.
The signal processor 1022 is that the information for having intrusion behavior that will be received is parsed first, so that it is determined that go out being The information sent by which type of monitoring terminal.Specifically, such as, it is vibration light that parsing obtains the information for having intrusion behavior What fine device monitoring was arrived, meanwhile, the place for parsing the generation intrusion behavior is that, in the 1st section of A areas, and intrusion behavior currently occurs Time be on 20xx November 13 13:09, determine that the type of the intrusion behavior is attempt to cross fence, accordingly, it would be desirable to take The control measure to intrusion behavior be to open the photographic head in the 1st section of A areas, then, these information for parsing are spelled Connect, so as to obtain the result of consolidation form.Certainly, it is above-mentioned be for vibration optical fiber device monitoring to have intrusion behavior The processing procedure that information is carried out, the processing procedure of the information for having intrusion behavior monitored for other monitoring terminals are just no longer detailed Carefully repeat.
After above-mentioned acquisition result, these results are sent to control main frame 103, the control main frame receive by The result that signal processor 1022 sends, and according to the result, various monitoring devices of the control positioned at monitoring field The outside controllable device that state or control are linked with the circumference system for monitoring intrusion.
In a particular embodiment, the terminal platform 103 includes control module 1031 and pushing module 1032, the control Module 1031 needs the control measure taken to intrusion behavior according to what is included in the result for receiving, controls positioned at monitoring The outside controllable device that the state of various monitoring devices 101 at scene or control are linked with the circumference system for monitoring intrusion.
Specifically, such as, comprising the photographic head for needing control that the region of intrusion behavior occurs in the result for receiving Deflection angle, then according to the information, control determine region photographic head enter horizontal deflection so that after the photographic head enters horizontal deflection The process of intrusion behavior can be photographed;Can also be that control occurs the monitoring terminal in the region of intrusion behavior(Such as it is electronics Fence)Open monitoring function or close monitoring function etc..Can also be and have invasion row in monitored area by speaker For personnel send alarm, certainly, if monitoring train near the monitored area, but, have one in this region Group personnel are just crossing fence injection, at this moment, can be according to control measure control car included in result etc..To other The control of monitoring terminal is just no longer described in detail.
Pushing module 1032 according to the scene for having intrusion behavior included in the result for receiving, during generation Between, occurrence type, push have the warning message of intrusion behavior to terminal unit, and specifically, the control main frame 103 can push letter Breath, is specifically had the concrete condition of intrusion behavior information to send by network to the mobile phone or computer etc. of monitoring personnel.
Based on identical inventive concept, the embodiment of the present invention additionally provides a kind of circumference intrusion detection method, such as Fig. 2 institutes Show, including such as figure content, S10, the security protection condition information that various monitoring devices are monitored is judged, is judged in monitoring field Whether intrusion behavior is had, when it is determined that there is intrusion behavior, receive that the various monitoring devices of monitoring field send has invasion The information of behavior;S20, the information to there is intrusion behavior are parsed, and the information for parsing is spliced into and includes intrusion behavior Scene, time of origin, occurrence type, the type of monitoring device, and control measure that intrusion behavior need to be taken Result;S30, according to result, state or control and the circumference of the control positioned at the monitoring device of monitoring field The outside controllable device of system for monitoring intrusion linkage.
The S30 is specially:According to the control measure that need to be taken to intrusion behavior included in result, control is positioned at prison The outside controllable device that the state or control for surveying various monitoring devices at scene is linked with the circumference system for monitoring intrusion.
After S30, also include:According to the scene for having intrusion behavior included in result, time of origin, send out Raw type, the type of monitoring device, transmission have the warning message of intrusion behavior to terminal unit.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to include excellent Select embodiment and fall into the had altered of the scope of the invention and change.
Obviously, those skilled in the art can carry out various changes and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these modification and modification belong to the claims in the present invention and its Within the scope of equivalent technologies, then the present invention is also intended to comprising these changes and modification.

Claims (4)

1. a kind of circumference system for monitoring intrusion, it is characterised in that include:Various monitoring devices that monitoring field is installed, it is and described Various monitoring devices have the alarm host machine of data communication, and have the control main frame of data communication with the alarm host machine;
Various monitoring devices are specifically included:Multiple monitoring terminals and a monitoring main frame, the monitoring main frame is to multiple prisons Survey terminal monitoring to security protection condition information judged, judge whether there is intrusion behavior in monitoring field, it is determined that having During intrusion behavior, transmission has the information of intrusion behavior to the alarm host machine;
Alarm host machine includes signal receiver and signal processor, and the signal receiver has invasion to what is sent by monitoring device The information of behavior is received, and is transmitted to message handler, and described information processor is solved to the information for having intrusion behavior Analysis, and the process of consolidation form is carried out, the information for parsing specially is spliced into the scene for including intrusion behavior, is sent out Raw time, occurrence type, the type of monitoring device, and the result of the control measure need to taken by the intrusion behavior;
Control main frame receives the result sent by the signal processor, and according to the result, control is positioned at prison The train that the state or control for surveying various monitoring devices at scene is linked with the circumference system for monitoring intrusion;
The control main frame includes control module and pushing module;
Control module needs the control measure taken to the intrusion behavior according to what is included in the result for receiving, controls Positioned at various monitoring devices of monitoring field state or control with the circumference system for monitoring intrusion linkage outside it is controllable Equipment;
There is class according to the scene for having intrusion behavior included in the result for receiving, time of origin in pushing module Type, push have the warning message of intrusion behavior to terminal unit.
2. circumference system for monitoring intrusion according to claim 1, it is characterised in that the plurality of monitoring terminal is specifically wrapped Include:Infrared shooting device, Doppler search device, microwave is to injection device, vibration optical fiber device, fence and photographic head.
3. a kind of circumference intrusion detection method, the circumference intrusion detection being applied in claim 1-2 described in any claim In system, it is characterised in that the circumference intrusion detection method is comprised the following steps that:
S10, judges to the security protection condition information that various monitoring devices are monitored, judges whether occur in monitoring field There is intrusion behavior, when it is determined that there is intrusion behavior, receive the letter for having intrusion behavior that various monitoring devices of monitoring field send Breath;
S20, parses to the information for having intrusion behavior, the information for parsing is spliced into and includes sending out for intrusion behavior Radix Rehmanniae point, time of origin, occurrence type, the type of monitoring device, and the control measure need to taken by the intrusion behavior Result;
S30, according to the result, control is located at the state of the monitoring device of monitoring field or control is entered with the circumference The train of monitoring system linkage is invaded, according to the scene for having intrusion behavior included in the result, time of origin, is sent out Raw type, the type of monitoring device, transmission have the warning message of intrusion behavior to terminal unit.
4. circumference intrusion detection method according to claim 3, it is characterised in that S30 is specially:
According to the control measure that need to be taken to the intrusion behavior included in the result, control is positioned at monitoring field The outside controllable device that the state of various monitoring devices or control are linked with the circumference system for monitoring intrusion.
CN201510185758.1A 2015-04-20 2015-04-20 Perimeter intruder monitoring system and method Active CN104766422B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510185758.1A CN104766422B (en) 2015-04-20 2015-04-20 Perimeter intruder monitoring system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510185758.1A CN104766422B (en) 2015-04-20 2015-04-20 Perimeter intruder monitoring system and method

Publications (2)

Publication Number Publication Date
CN104766422A CN104766422A (en) 2015-07-08
CN104766422B true CN104766422B (en) 2017-05-03

Family

ID=53648222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510185758.1A Active CN104766422B (en) 2015-04-20 2015-04-20 Perimeter intruder monitoring system and method

Country Status (1)

Country Link
CN (1) CN104766422B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105931402B (en) * 2016-06-27 2018-06-05 上海波汇科技股份有限公司 Optical fiber perimeter intrusion detection method based on image identification
CN106504451B (en) * 2016-11-14 2018-08-14 中国人民解放军国防科学技术大学 A kind of demodulating algorithm of the optical fiber perimeter safety signal based on matrix theory
CN107633632A (en) * 2017-11-08 2018-01-26 长沙变化率信息技术有限公司 The anti-intrusion monitoring system and method for pipe gallery
CN111161494A (en) * 2020-01-17 2020-05-15 南京派光智慧感知信息技术有限公司 Perimeter security protection intelligent monitoring system with composite sensing function
CN113163176B (en) * 2021-05-06 2023-01-20 中铁建设集团机电安装有限公司 Intelligent guardrail system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3806907A (en) * 1972-03-23 1974-04-23 Texas Instruments Inc Perimeter intrusion detection system with common mode rejection
CN102045120A (en) * 2010-10-29 2011-05-04 成都九洲电子信息系统有限责任公司 Vibration signal identification method for optical fiber perimeter system
CN102279995A (en) * 2011-06-15 2011-12-14 新疆华讯科技开发有限公司 Security pre-warning system based on Internet of things
CN102542707A (en) * 2010-12-09 2012-07-04 北京航天长峰科技工业集团有限公司 Land electronic fence monitoring system
CN202650169U (en) * 2012-04-18 2013-01-02 北京德天泉机电设备有限公司 Intelligent vibration electronic fence and perimeter invasion-prevention alarm device
CN203444602U (en) * 2013-09-13 2014-02-19 江南大学 Perimeter intelligent security and protection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3806907A (en) * 1972-03-23 1974-04-23 Texas Instruments Inc Perimeter intrusion detection system with common mode rejection
CN102045120A (en) * 2010-10-29 2011-05-04 成都九洲电子信息系统有限责任公司 Vibration signal identification method for optical fiber perimeter system
CN102542707A (en) * 2010-12-09 2012-07-04 北京航天长峰科技工业集团有限公司 Land electronic fence monitoring system
CN102279995A (en) * 2011-06-15 2011-12-14 新疆华讯科技开发有限公司 Security pre-warning system based on Internet of things
CN202650169U (en) * 2012-04-18 2013-01-02 北京德天泉机电设备有限公司 Intelligent vibration electronic fence and perimeter invasion-prevention alarm device
CN203444602U (en) * 2013-09-13 2014-02-19 江南大学 Perimeter intelligent security and protection system

Also Published As

Publication number Publication date
CN104766422A (en) 2015-07-08

Similar Documents

Publication Publication Date Title
CN104766422B (en) Perimeter intruder monitoring system and method
CN203773681U (en) Security system for power distribution room
US9214082B2 (en) System and method for alarm system tamper detection and reporting
CN107301753A (en) Intelligent safety defense monitoring system and method
CN105894625A (en) Intelligent barrier-free channel security identification system and method
CN107067612B (en) Portable infrared alarm and wireless video monitoring system and monitoring method
KR102234402B1 (en) A system and method for detecting network anomalies of connected car
CN102547241A (en) Home anomaly detection method and home anomaly detection device as well as home anomaly detection system on basis of wireless network camera
CN108931968A (en) A kind of network security protection system and its means of defence applied in industrial control system
KR101498985B1 (en) Photographing and monitoring system based on GPS for emergency scene using IP CCTV and Photographing and monitoring method for emergency scene therefor
KR102358773B1 (en) Smart guide device for guiding objects, system and method including the device
KR20080044812A (en) The automatic guard system to prevent the crime and accident using computer video image analysis technology
CN104077868A (en) Unattended alarm prompting method and device
CN107633632A (en) The anti-intrusion monitoring system and method for pipe gallery
CN110188617A (en) Intelligent monitoring method and system for machine room
KR20110108497A (en) Automatic fire recognition and alarm systems using intelligent ip camera and method thereof
KR20180058919A (en) Detection device for virtual fense
CN201210335Y (en) Wireless video antitheft alarm system
CN104574732A (en) Vibrating-optical-fiber-technology-based perimeter intrusion monitoring system
CN103700230A (en) Transmission method and system of intrusion alarm circuit
KR101046819B1 (en) Method and system for watching an intrusion by software fence
CN205582055U (en) Accessible passageway safety identification system of intelligence
CN209505732U (en) A kind of subway platform door obstacle detection early warning system based on machine vision technique
CN112153631A (en) Method and device for identifying illegal intrusion and router
CN103208162A (en) Information identification and alarm system for monitoring equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 610000 Tianhe Road, West Zone, hi tech Zone, Sichuan, Chengdu

Applicant after: The development of Limited by Share Ltd of Sichuan railway Southwest Jiaotong University

Address before: 610000 Tianhe Road, West Zone, hi tech Zone, Sichuan, Chengdu

Applicant before: Sichuan Southwest Jiaotong University Railway Development Co., Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant