CN104766422B - Perimeter intruder monitoring system and method - Google Patents
Perimeter intruder monitoring system and method Download PDFInfo
- Publication number
- CN104766422B CN104766422B CN201510185758.1A CN201510185758A CN104766422B CN 104766422 B CN104766422 B CN 104766422B CN 201510185758 A CN201510185758 A CN 201510185758A CN 104766422 B CN104766422 B CN 104766422B
- Authority
- CN
- China
- Prior art keywords
- monitoring
- intrusion
- control
- intrusion behavior
- behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
Abstract
The invention relates to the safety technical field of perimeter intruder monitoring and discloses a perimeter intruder monitoring system and method. The system comprises multiple monitoring devices installed on a monitoring site, an alarm host in data communicated with the multiple monitoring devices, and a control host in data communication with the alarm host, wherein the alarm host comprises a signal receiver and a signal processor, the signal receiver receives information containing intrusion behaviors sent by the monitoring devices, the signal processor conducts analysis and uniform-format processing on the information containing intrusion behaviors, and the control host controls the states of the multiple monitoring devices located on the monitoring site or external controllable equipment in linkage with the system according to a processing result sent by the signal processor. By the adoption of the system and method, the technical problem of the prior art that a single monitoring device for perimeter protection only has one function, and therefore monitoring of multiple intruding modes can not be achieved is solved, and protection grade and protection comprehensiveness are improved through the integration of the multiple monitoring devices.
Description
Technical field
The present invention relates to circumference intrusion detection security technology area, more particularly to a kind of circumference system for monitoring intrusion and side
Method.
Background technology
The Line for Passenger Transportation of Current Domestic operation, prevents intrusive behavior in circuit both sides, is generally separately provided infrared emission
Scheme, or video surveillance scheme is separately provided, or microwave is separately provided to scheme of penetrating etc..Therefore, to being separately provided
The scheme invaded is prevented, the intrusion behavior in each orientation can not be comprehensively monitored, so, cannot be to multi-faceted invasion
Behavior and alarm or effective control.
Therefore, in prior art there is function phase to single in the single monitoring device of perimeter protection, it is impossible to realize it is various enter
The technical problem of the monitoring invaded under pattern.
The content of the invention
The embodiment of the present invention by providing a kind of circumference system for monitoring intrusion and method, in solving prior art, prevent by circumference
There is function phase to single in the single monitoring device of shield, it is impossible to realize the technical problem of the monitoring under various intrusion models, and then
Various monitoring devices are integrated with, degree of protection are improved and protection is comprehensive.
Technical scheme is as follows:
The invention provides a kind of circumference system for monitoring intrusion, including:Various monitoring devices of monitoring field security protection situation,
There is the alarm host machine of data communication with various monitoring devices, and have the control master of data communication with the alarm host machine
Machine;
Various monitoring devices are specifically included:Multiple monitoring terminals and a monitoring main frame, the monitoring main frame is to more
The security protection condition information that individual monitoring terminal is monitored judged, judges whether there is intrusion behavior in monitoring field, true
When having intrusion behavior surely, transmission has the information of intrusion behavior to the alarm host machine;
Alarm host machine includes signal receiver and signal processor, and the signal receiver is to having for being sent by monitoring device
The information of intrusion behavior is received, and is transmitted to message handler, and described information processor enters to the information for having intrusion behavior
Row parsing, and the process of consolidation form is carried out, the information for parsing specially is spliced into the spot for including intrusion behavior
Point, time of origin, occurrence type, the type of monitoring device, and the process of the control measure need to taken by the intrusion behavior
As a result;
Control main frame receives the result sent by the signal processor, and according to the result, control bit
In various monitoring devices of monitoring field state or control controllable set with the outside of circumference system for monitoring intrusion linkage
It is standby.
Further, the plurality of monitoring terminal is specifically included:Infrared shooting device, Doppler search device, microwave pair
Injection device, vibration optical fiber device, fence and photographic head.
Further, the control main frame includes control module and pushing module;
Control module needs the control measure taken to the intrusion behavior according to what is included in the result for receiving,
Control is located at the outside of the state of various monitoring devices of monitoring field or control and circumference system for monitoring intrusion linkage
Controllable device;
Pushing module is sent out according to the scene for having intrusion behavior included in the result for receiving, time of origin
Raw type, push have the warning message of intrusion behavior to terminal unit.
On the other hand, present invention also offers a kind of circumference intrusion detection method, is applied in circumference system for monitoring intrusion,
The circumference intrusion detection method is comprised the following steps that:
Whether S10, judges to the security protection condition information that various monitoring devices are monitored, judge in monitoring field
There is intrusion behavior, when it is determined that there is intrusion behavior, receive that the various monitoring devices of monitoring field send has intrusion behavior
Information;
S20, parses to the information for having intrusion behavior, the information for parsing is spliced into and includes intrusion behavior
Scene, time of origin, occurrence type, the type of monitoring device, and the control that the intrusion behavior need to be taken is arranged
The result applied.
S30, according to the result, state or control and the week of the control positioned at the monitoring device of monitoring field
The outside controllable device of boundary's system for monitoring intrusion linkage.
Further, S30 is specially:
According to the control measure that need to be taken to the intrusion behavior included in the result, control is existing positioned at monitoring
The outside controllable device that the state of various monitoring devices of field or control are linked with the circumference system for monitoring intrusion.
Further, after S30, also include:
According to the scene for having intrusion behavior included in the result, time of origin, occurrence type, monitoring set
Standby type, transmission have the warning message of intrusion behavior to terminal unit.
One or more technical schemes provided in the embodiment of the present invention, at least have the following technical effect that or advantage:
1st, as employing arranges various monitoring devices, alarm host machine and control main frame in circumference system for monitoring intrusion,
Wherein, alarm host machine includes signal receiver and signal processor, and signal receiver has invasion row to what is sent by monitoring device
For information receive, signal processor to parsing after the information for having intrusion behavior parsed and consolidation form process, and
Result is obtained, control main frame receives the result sent by signal processor, and is located at according to the result control
The outside controllable device that the state of various monitoring devices of monitoring field or control are linked with the circumference system for monitoring intrusion,
Be present function phase to single in the single monitoring device for solving perimeter protection in prior art, it is impossible to realize under various intrusion models
Monitoring technical problem, and then realize integrated various monitoring devices, improve the comprehensive technology of degree of protection and protection
Effect.
2nd, due to adopting the configuration information processor in alarm host machine, the information of intrusion behavior is parsed, and will solution
The information of precipitation is spliced into the scene for including intrusion behavior, time of origin, occurrence type, the type of monitoring device and
The result of the control measure need to taken by the intrusion behavior, and then being capable of consolidation form so that control main frame is capable of identify that
These results.
3rd, due to adopting in control main frame setting control module and pushing module, control module can be according to the place for receiving
What is included in reason result needs the control measure taken, shape of the control positioned at various monitoring devices of monitoring field to intrusion behavior
The outside controllable device that state or control are linked with the circumference system for monitoring intrusion, pushing module is according to the process knot for receiving
The scene for having intrusion behavior included in fruit, time of origin, occurrence type, push have the warning message of intrusion behavior to end
The information for having intrusion behavior that monitoring field is monitored can be sent to each terminal unit, energy by control main frame by end equipment
Monitoring personnel is enough enabled to recognize the situation of monitoring site in time.
Description of the drawings
Fig. 1 is the module diagram of circumference system for monitoring intrusion in the embodiment of the present invention;
Fig. 2 be the embodiment of the present invention in circumference intrusion detection method the step of flow chart.
Specific embodiment
The embodiment of the present invention by providing a kind of circumference system for monitoring intrusion and method, in solving prior art, prevent by circumference
There is function phase to single in the single monitoring device of shield, it is impossible to realize the technical problem of the monitoring under various intrusion models, and then
Integrated various monitoring devices are realized, the comprehensive technique effect of degree of protection and protection is lifted.
In order to solve the above-mentioned technical problem relatively low in perimeter protection safety, below in conjunction with Figure of description and tool
The embodiment of body is described in detail to above-mentioned technical proposal.
The embodiment of the present invention provides a kind of circumference system for monitoring intrusion, as shown in figure 1, including:Monitoring field security protection situation
Various monitoring devices 101, have the alarm host machine 102 of data communication with various monitoring devices, and with the alarm host machine 102
There is the control main frame 103 of data communication.
In a particular embodiment, various monitoring devices 101 have been specifically included:Multiple monitoring terminals 1011 and one
Monitoring main frame 1012, the monitoring main frame 1012 receive the security protection situation that multiple monitoring terminals are monitored.Wherein, multiple monitoring terminals
1011 include, infrared shooting device, Doppler search device, microwave to injection device, vibration optical fiber device, fence and
Shooting is first-class, is just no longer described in detail in embodiments of the present invention.
Specifically, infrared shooting device can be arranged on guard plot two ends, by monitoring object to it is ultrared stop come
Monitor the intrusion behavior for passing through;Doppler search device can detect movable signal in monitored area monitored into
Invade behavior;Microwave can monitor that to injection device transmitting terminal, to the change of receiving terminal microwave signal, determines intrusion behavior;Vibration light
Fine device can monitor the climbing of invasion personnel, or clash into the intrusion behavior that fence attempts to cross etc.;Fence energy
Enough monitor that the foreign body of circumference clashes into the behavior of the foreign body intrusions such as net-fault, suspension, short circuit;Photographic head can photograph intrusion behavior
Video image etc..
Above-mentioned multiple monitoring terminals 1011 are multi-faceted to the intrusion behavior of circumference to be monitored, and realizes prison of the monitoring without dead angle
Survey pattern, then sends the information for monitoring to monitoring main frame 1012, and the monitoring main frame 1012 can be according to multiple monitorings eventually
End 1011 send security protection condition informations judged, judge whether there is intrusion behavior in monitoring field, it is determined that have into
When invading behavior, transmission has the signal receiver 1022 in the information to alarm host machine 102 of intrusion behavior.
In a particular embodiment, by taking vibration optical fiber device as an example, optical signals transmitting terminal is led to by vibration optical fiber device
Cross the vibration optical fiber to transmit to receiving terminal, when the monitoring host supervision at the receiving terminal changes to optical signal, then judge
Monitoring field there occurs intrusion behavior;By taking infrared shooting device as an example, send when infrared shooting device to the signal of monitoring main frame
When generation is abnormal, judge to there occurs intrusion behavior in monitoring field, the signal that other monitoring terminals send enters in monitoring main frame
The process that row judges just no longer is described in detail.
Then, after monitoring main frame 1012 judges to obtain and has the information of intrusion behavior, this there is into the information of intrusion behavior
Send the signal receiver into alarm host machine 102.Specifically, the alarm host machine 102 includes signal receiver 1021 and signal
Processor 1022, wherein, 1021 pairs of information for having intrusion behavior sent by monitoring main frame of signal receiver are received, so
Afterwards, the information for having intrusion behavior after the parsing of the signal processor 1022 pairs parsed and consolidation form process, so as to obtain
Obtain result.
The signal processor 1022 is that the information for having intrusion behavior that will be received is parsed first, so that it is determined that go out being
The information sent by which type of monitoring terminal.Specifically, such as, it is vibration light that parsing obtains the information for having intrusion behavior
What fine device monitoring was arrived, meanwhile, the place for parsing the generation intrusion behavior is that, in the 1st section of A areas, and intrusion behavior currently occurs
Time be on 20xx November 13 13:09, determine that the type of the intrusion behavior is attempt to cross fence, accordingly, it would be desirable to take
The control measure to intrusion behavior be to open the photographic head in the 1st section of A areas, then, these information for parsing are spelled
Connect, so as to obtain the result of consolidation form.Certainly, it is above-mentioned be for vibration optical fiber device monitoring to have intrusion behavior
The processing procedure that information is carried out, the processing procedure of the information for having intrusion behavior monitored for other monitoring terminals are just no longer detailed
Carefully repeat.
After above-mentioned acquisition result, these results are sent to control main frame 103, the control main frame receive by
The result that signal processor 1022 sends, and according to the result, various monitoring devices of the control positioned at monitoring field
The outside controllable device that state or control are linked with the circumference system for monitoring intrusion.
In a particular embodiment, the terminal platform 103 includes control module 1031 and pushing module 1032, the control
Module 1031 needs the control measure taken to intrusion behavior according to what is included in the result for receiving, controls positioned at monitoring
The outside controllable device that the state of various monitoring devices 101 at scene or control are linked with the circumference system for monitoring intrusion.
Specifically, such as, comprising the photographic head for needing control that the region of intrusion behavior occurs in the result for receiving
Deflection angle, then according to the information, control determine region photographic head enter horizontal deflection so that after the photographic head enters horizontal deflection
The process of intrusion behavior can be photographed;Can also be that control occurs the monitoring terminal in the region of intrusion behavior(Such as it is electronics
Fence)Open monitoring function or close monitoring function etc..Can also be and have invasion row in monitored area by speaker
For personnel send alarm, certainly, if monitoring train near the monitored area, but, have one in this region
Group personnel are just crossing fence injection, at this moment, can be according to control measure control car included in result etc..To other
The control of monitoring terminal is just no longer described in detail.
Pushing module 1032 according to the scene for having intrusion behavior included in the result for receiving, during generation
Between, occurrence type, push have the warning message of intrusion behavior to terminal unit, and specifically, the control main frame 103 can push letter
Breath, is specifically had the concrete condition of intrusion behavior information to send by network to the mobile phone or computer etc. of monitoring personnel.
Based on identical inventive concept, the embodiment of the present invention additionally provides a kind of circumference intrusion detection method, such as Fig. 2 institutes
Show, including such as figure content, S10, the security protection condition information that various monitoring devices are monitored is judged, is judged in monitoring field
Whether intrusion behavior is had, when it is determined that there is intrusion behavior, receive that the various monitoring devices of monitoring field send has invasion
The information of behavior;S20, the information to there is intrusion behavior are parsed, and the information for parsing is spliced into and includes intrusion behavior
Scene, time of origin, occurrence type, the type of monitoring device, and control measure that intrusion behavior need to be taken
Result;S30, according to result, state or control and the circumference of the control positioned at the monitoring device of monitoring field
The outside controllable device of system for monitoring intrusion linkage.
The S30 is specially:According to the control measure that need to be taken to intrusion behavior included in result, control is positioned at prison
The outside controllable device that the state or control for surveying various monitoring devices at scene is linked with the circumference system for monitoring intrusion.
After S30, also include:According to the scene for having intrusion behavior included in result, time of origin, send out
Raw type, the type of monitoring device, transmission have the warning message of intrusion behavior to terminal unit.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described
Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to include excellent
Select embodiment and fall into the had altered of the scope of the invention and change.
Obviously, those skilled in the art can carry out various changes and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these modification and modification belong to the claims in the present invention and its
Within the scope of equivalent technologies, then the present invention is also intended to comprising these changes and modification.
Claims (4)
1. a kind of circumference system for monitoring intrusion, it is characterised in that include:Various monitoring devices that monitoring field is installed, it is and described
Various monitoring devices have the alarm host machine of data communication, and have the control main frame of data communication with the alarm host machine;
Various monitoring devices are specifically included:Multiple monitoring terminals and a monitoring main frame, the monitoring main frame is to multiple prisons
Survey terminal monitoring to security protection condition information judged, judge whether there is intrusion behavior in monitoring field, it is determined that having
During intrusion behavior, transmission has the information of intrusion behavior to the alarm host machine;
Alarm host machine includes signal receiver and signal processor, and the signal receiver has invasion to what is sent by monitoring device
The information of behavior is received, and is transmitted to message handler, and described information processor is solved to the information for having intrusion behavior
Analysis, and the process of consolidation form is carried out, the information for parsing specially is spliced into the scene for including intrusion behavior, is sent out
Raw time, occurrence type, the type of monitoring device, and the result of the control measure need to taken by the intrusion behavior;
Control main frame receives the result sent by the signal processor, and according to the result, control is positioned at prison
The train that the state or control for surveying various monitoring devices at scene is linked with the circumference system for monitoring intrusion;
The control main frame includes control module and pushing module;
Control module needs the control measure taken to the intrusion behavior according to what is included in the result for receiving, controls
Positioned at various monitoring devices of monitoring field state or control with the circumference system for monitoring intrusion linkage outside it is controllable
Equipment;
There is class according to the scene for having intrusion behavior included in the result for receiving, time of origin in pushing module
Type, push have the warning message of intrusion behavior to terminal unit.
2. circumference system for monitoring intrusion according to claim 1, it is characterised in that the plurality of monitoring terminal is specifically wrapped
Include:Infrared shooting device, Doppler search device, microwave is to injection device, vibration optical fiber device, fence and photographic head.
3. a kind of circumference intrusion detection method, the circumference intrusion detection being applied in claim 1-2 described in any claim
In system, it is characterised in that the circumference intrusion detection method is comprised the following steps that:
S10, judges to the security protection condition information that various monitoring devices are monitored, judges whether occur in monitoring field
There is intrusion behavior, when it is determined that there is intrusion behavior, receive the letter for having intrusion behavior that various monitoring devices of monitoring field send
Breath;
S20, parses to the information for having intrusion behavior, the information for parsing is spliced into and includes sending out for intrusion behavior
Radix Rehmanniae point, time of origin, occurrence type, the type of monitoring device, and the control measure need to taken by the intrusion behavior
Result;
S30, according to the result, control is located at the state of the monitoring device of monitoring field or control is entered with the circumference
The train of monitoring system linkage is invaded, according to the scene for having intrusion behavior included in the result, time of origin, is sent out
Raw type, the type of monitoring device, transmission have the warning message of intrusion behavior to terminal unit.
4. circumference intrusion detection method according to claim 3, it is characterised in that S30 is specially:
According to the control measure that need to be taken to the intrusion behavior included in the result, control is positioned at monitoring field
The outside controllable device that the state of various monitoring devices or control are linked with the circumference system for monitoring intrusion.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510185758.1A CN104766422B (en) | 2015-04-20 | 2015-04-20 | Perimeter intruder monitoring system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510185758.1A CN104766422B (en) | 2015-04-20 | 2015-04-20 | Perimeter intruder monitoring system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104766422A CN104766422A (en) | 2015-07-08 |
CN104766422B true CN104766422B (en) | 2017-05-03 |
Family
ID=53648222
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510185758.1A Active CN104766422B (en) | 2015-04-20 | 2015-04-20 | Perimeter intruder monitoring system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104766422B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105931402B (en) * | 2016-06-27 | 2018-06-05 | 上海波汇科技股份有限公司 | Optical fiber perimeter intrusion detection method based on image identification |
CN106504451B (en) * | 2016-11-14 | 2018-08-14 | 中国人民解放军国防科学技术大学 | A kind of demodulating algorithm of the optical fiber perimeter safety signal based on matrix theory |
CN107633632A (en) * | 2017-11-08 | 2018-01-26 | 长沙变化率信息技术有限公司 | The anti-intrusion monitoring system and method for pipe gallery |
CN111161494A (en) * | 2020-01-17 | 2020-05-15 | 南京派光智慧感知信息技术有限公司 | Perimeter security protection intelligent monitoring system with composite sensing function |
CN113163176B (en) * | 2021-05-06 | 2023-01-20 | 中铁建设集团机电安装有限公司 | Intelligent guardrail system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3806907A (en) * | 1972-03-23 | 1974-04-23 | Texas Instruments Inc | Perimeter intrusion detection system with common mode rejection |
CN102045120A (en) * | 2010-10-29 | 2011-05-04 | 成都九洲电子信息系统有限责任公司 | Vibration signal identification method for optical fiber perimeter system |
CN102279995A (en) * | 2011-06-15 | 2011-12-14 | 新疆华讯科技开发有限公司 | Security pre-warning system based on Internet of things |
CN102542707A (en) * | 2010-12-09 | 2012-07-04 | 北京航天长峰科技工业集团有限公司 | Land electronic fence monitoring system |
CN202650169U (en) * | 2012-04-18 | 2013-01-02 | 北京德天泉机电设备有限公司 | Intelligent vibration electronic fence and perimeter invasion-prevention alarm device |
CN203444602U (en) * | 2013-09-13 | 2014-02-19 | 江南大学 | Perimeter intelligent security and protection system |
-
2015
- 2015-04-20 CN CN201510185758.1A patent/CN104766422B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3806907A (en) * | 1972-03-23 | 1974-04-23 | Texas Instruments Inc | Perimeter intrusion detection system with common mode rejection |
CN102045120A (en) * | 2010-10-29 | 2011-05-04 | 成都九洲电子信息系统有限责任公司 | Vibration signal identification method for optical fiber perimeter system |
CN102542707A (en) * | 2010-12-09 | 2012-07-04 | 北京航天长峰科技工业集团有限公司 | Land electronic fence monitoring system |
CN102279995A (en) * | 2011-06-15 | 2011-12-14 | 新疆华讯科技开发有限公司 | Security pre-warning system based on Internet of things |
CN202650169U (en) * | 2012-04-18 | 2013-01-02 | 北京德天泉机电设备有限公司 | Intelligent vibration electronic fence and perimeter invasion-prevention alarm device |
CN203444602U (en) * | 2013-09-13 | 2014-02-19 | 江南大学 | Perimeter intelligent security and protection system |
Also Published As
Publication number | Publication date |
---|---|
CN104766422A (en) | 2015-07-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104766422B (en) | Perimeter intruder monitoring system and method | |
CN203773681U (en) | Security system for power distribution room | |
US9214082B2 (en) | System and method for alarm system tamper detection and reporting | |
CN107301753A (en) | Intelligent safety defense monitoring system and method | |
CN105894625A (en) | Intelligent barrier-free channel security identification system and method | |
CN107067612B (en) | Portable infrared alarm and wireless video monitoring system and monitoring method | |
KR102234402B1 (en) | A system and method for detecting network anomalies of connected car | |
CN102547241A (en) | Home anomaly detection method and home anomaly detection device as well as home anomaly detection system on basis of wireless network camera | |
CN108931968A (en) | A kind of network security protection system and its means of defence applied in industrial control system | |
KR101498985B1 (en) | Photographing and monitoring system based on GPS for emergency scene using IP CCTV and Photographing and monitoring method for emergency scene therefor | |
KR102358773B1 (en) | Smart guide device for guiding objects, system and method including the device | |
KR20080044812A (en) | The automatic guard system to prevent the crime and accident using computer video image analysis technology | |
CN104077868A (en) | Unattended alarm prompting method and device | |
CN107633632A (en) | The anti-intrusion monitoring system and method for pipe gallery | |
CN110188617A (en) | Intelligent monitoring method and system for machine room | |
KR20110108497A (en) | Automatic fire recognition and alarm systems using intelligent ip camera and method thereof | |
KR20180058919A (en) | Detection device for virtual fense | |
CN201210335Y (en) | Wireless video antitheft alarm system | |
CN104574732A (en) | Vibrating-optical-fiber-technology-based perimeter intrusion monitoring system | |
CN103700230A (en) | Transmission method and system of intrusion alarm circuit | |
KR101046819B1 (en) | Method and system for watching an intrusion by software fence | |
CN205582055U (en) | Accessible passageway safety identification system of intelligence | |
CN209505732U (en) | A kind of subway platform door obstacle detection early warning system based on machine vision technique | |
CN112153631A (en) | Method and device for identifying illegal intrusion and router | |
CN103208162A (en) | Information identification and alarm system for monitoring equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 610000 Tianhe Road, West Zone, hi tech Zone, Sichuan, Chengdu Applicant after: The development of Limited by Share Ltd of Sichuan railway Southwest Jiaotong University Address before: 610000 Tianhe Road, West Zone, hi tech Zone, Sichuan, Chengdu Applicant before: Sichuan Southwest Jiaotong University Railway Development Co., Ltd. |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant |