CN110164086A - Pass through the shared security monitoring and Emergency Assistance method realized of data grant - Google Patents
Pass through the shared security monitoring and Emergency Assistance method realized of data grant Download PDFInfo
- Publication number
- CN110164086A CN110164086A CN201910391184.1A CN201910391184A CN110164086A CN 110164086 A CN110164086 A CN 110164086A CN 201910391184 A CN201910391184 A CN 201910391184A CN 110164086 A CN110164086 A CN 110164086A
- Authority
- CN
- China
- Prior art keywords
- user
- shared
- emergency assistance
- security monitoring
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012544 monitoring process Methods 0.000 title claims abstract description 34
- 206010039203 Road traffic accident Diseases 0.000 claims description 4
- 238000011156 evaluation Methods 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 3
- 230000036449 good health Effects 0.000 claims description 2
- 230000007170 pathology Effects 0.000 claims description 2
- 230000001932 seasonal effect Effects 0.000 claims description 2
- 230000001360 synchronised effect Effects 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 claims 1
- 230000009885 systemic effect Effects 0.000 claims 1
- 238000013475 authorization Methods 0.000 abstract description 12
- 238000011161 development Methods 0.000 description 3
- 241001269238 Data Species 0.000 description 1
- 208000027418 Wounds and injury Diseases 0.000 description 1
- 230000006378 damage Effects 0.000 description 1
- 208000014674 injury Diseases 0.000 description 1
- 150000002632 lipids Chemical class 0.000 description 1
- 231100000279 safety data Toxicity 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0205—Specific application combined with child monitoring using a transmitter-receiver system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0236—Threshold setting
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0269—System arrangements wherein the object is to detect the exact location of child or item using a navigation satellite system, e.g. GPS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
- G08B21/0272—System arrangements wherein the object is to detect exact location of child or item using triangulation other than GPS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
Landscapes
- Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Emergency Management (AREA)
- Engineering & Computer Science (AREA)
- Radar, Positioning & Navigation (AREA)
- Tourism & Hospitality (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
Of the invention passes through the shared security monitoring and Emergency Assistance method realized of data grant, authorization by authorization location trip data to authorized end, other side is allowed to synchronize the trip state for grasping user, the timely safety alarm of acquisition system is realized and provides safe emergency relief to the authorized user to want help.It is further advanced by the acquisition to road safety big data parameter, the degree of safety threshold value of building user's trip provides the intelligent alarm and the quick salvage service of third party of trip safe condition for user.
Description
Technical field
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, belongs to security monitoring application
Field is to the monitoring method of user's safety state, and authorization by authorization location trip data to authorized end makes other side same
Step grasps the trip state of user, obtains the timely safety alarm of system, realizes and provides safety to the authorized user to want help
Emergency Assistance.
Background technique
With the development of development of Mobile Internet technology and intelligent information technology, provide more efficient more intelligent safer to go out
Row service is the necessity of social development.But the existing preferred recommendation service of trip, such as Baidu map, Amap, drop drop
The trip service of the releases such as trip, also rests on a preliminary service for whole man's concept and provides the stage, and there are no progress to arrive
The customization trip route preferred service based on individual need can be provided for the people of each individual.On the other hand these are existing
Trip route recommendation service, merely provide congestion in road it is real-time prompting and path recommend, but based on to more roads pacify
The control of total factor, the acquisition to more road safety data, and the personal safety matching demand for meeting everyone is provided, do not have
It is provided with richer and more intelligent solution, this is the safe trip mode of the following intelligent information technical support,
It must technical problems to be solved.
In terms of third party monitors safety, existing technical application is only the simple position realized to monitored side
Tracking, the application stage in the field lowermost level.How the Emergency Assistance of third party monitoring is realized by authorization how
It realizes and is realized by big data to the evaluation and test of trip route risk, and the matching to personal safety threshold value, realization pair
The intelligence warning for risk of going on a journey and Emergency Assistance, these are all the technology mesh that the following intelligent safety trip service needs to realize
's.In addition the reverse authorization with secret protection is also the application technology problem that the prior art does not solve.
Especially everybody takes charge of user to hiring a car since its security system building is not perfect at widely applied service of cars on hire
Machine all causes injury, this is to have to solve the problems, such as.How in the links of service of cars on hire security mechanism is set up, is
There are the key points of security risk in solution service of cars on hire.
Summary of the invention
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, goes out line number by authorization location
According to the authorization to authorized end, other side is allowed to synchronize the trip state for grasping user, obtains the timely safety alarm of system, realization pair
The authorized user to want help provides safe emergency relief.It is further advanced by the acquisition to road safety big data parameter, structure
The degree of safety threshold value of user's trip is built, the intelligent alarm of trip safe condition is provided for user and third party quickly succours clothes
Business.
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, compared to existing trip
Safety monitoring system, main innovative technology main points include:
1, the reverse authorization mode for establishing safety monitoring, to need safe aid provide real-time safe condition monitoring and
Quick salvage service.
2, by setting alarm relief rule, allow alarm and relief control in the range of egoistic needs.
3, richer road safety big data is acquired, relies on the offer of these big datas is more precisely more personalized to evade wind
Danger hire a car or safety service.
4, it is matched by road safety degree with personal security's degree threshold value, the third party that providing can more avoid risk, which goes on a journey, to be pacified
Complete trails selection service.
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, by being authorized altogether to other side
The position data for enjoying family allows other side to know the present position information and shift in position state of user in real time, when user anticipates
When outer situation, other side is facilitated to initiate inquiry and Emergency Assistance in time;Including following technology implementation process:
S1, user client setting system alarm trigger rule after, launch position data sharing concern request.
S2, system issue request other side in authorized client and receive shared concern prompt.
S3, when system feedback does not receive shared concern by other side, user is initiated again to other one or more other side
The shared concern request of the position data of account, is authorized after having reciprocal account to receive shared concern.
S4 or authorized user are during trip, its degree of safety threshold value of system Auto-matching, and logical in authorized client
Cross the note display of dynamic trajectory icon.
S5, when other side judges that the trip state of authorized user exception or path occurs and mismatches, actively initiate inquiry.
S6, when unexpected security incident occurs during trip for user, system is automatically in the triggering relief of authorized client
Request alarm.
S7, receive other side's initiation inquiry or relief after alarm;Or other side initiates according to the specific alert content of system trigger
Inquiry or relief.
S8, when precarious position release or privacy secrecy need, user release partly or entirely to the position of authorized client
Set data sharing concern authorization.
Of the invention passes through the shared security monitoring and Emergency Assistance method realized of data grant, the system alarm triggering
Rule, the general rule including system identification such as: traffic accident, safety accident, the criminal case of public security has occurred in the path immediately
Part and natural calamity event and location data are surprisingly lost can not synchronized tracking and location data when being more than setting
Long each parameter of regularity setting without generating variation.
Of the invention passes through the shared security monitoring and Emergency Assistance method realized of data grant, the system alarm triggering
Rule, or further include self establishment rule such as: with setting path mismatch, visiting site setting residence time be more than threshold
Value is contacted with the active message of setting time point and is not triggered, actively the code word matching error of message triggering.
It is of the invention by the shared security monitoring and Emergency Assistance method realized of data grant, client or pass through binding
Other common platform account clients are as authorized client and/or authorized client.
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, the degree of safety threshold value,
Be the safe angle value based on the path, match the personal safety evaluating characteristic value of user, system by automatically generate user i.e.
When position degree of safety threshold value.
Of the invention passes through the shared security monitoring and Emergency Assistance method realized of data grant, the degree of safety in the path
Value is the seasonal climate type accumulated for the section based on category of roads, pavement behavior, wagon flow stream of people situation, big data,
Natural calamity event, traffic accident and public security criminal case carry out parameter acquisition;By the default peace of collected parameter Compare System
After whole step comparison value, statistics obtains the safe angle value in the section.
Of the invention passes through the shared security monitoring and Emergency Assistance method realized of data grant, the individual peace of the user
Full evaluation is that submit the user be children, pregnant woman, invalids, the elderly, Young Female, Lipid on Young-middle Male basic people
Group character sorting item and the specific setting tagsort item of individual, obtain user's personal safety evaluating characteristic value of system.
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, user's individual are specific
Tagsort item is set, refers to that user is based on own physiological pathology healthiness condition and psychological wish feature, the row independently set
His property position or Path selection.
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, permits other side to user's
Degree of safety threshold value carries out ratio adjustment, improves the level of interest to user.
Of the invention passes through the shared security monitoring and Emergency Assistance method realized of data grant, the tool of the system trigger
Body alert content is that the operation flow prompt of relief operation is informed and/or requested to the alarm events of system automatically generated.
Detailed description of the invention
Fig. 1 is service implementation flow chart of the invention.
Specific embodiment
Specific embodiments of the present invention are illustrated below in conjunction with attached drawing.It should be appreciated that embodiment described herein
Only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Security monitoring and Emergency Assistance method by the shared realization of data grant of the invention, by being authorized altogether to other people
The shift in position state for enjoying family allows other side to know the present position information and shift in position state of user in real time, when user goes out
When existing fortuitous event, other people is facilitated to initiate inquiry and Emergency Assistance in time;Including following technology implementation process:
S1, user client setting system alarm trigger rule after, launch position data sharing concern request.
S2, system issue request other side in authorized client and receive shared concern prompt.
S3, when system feedback does not receive shared concern by other side, user is initiated again to other one or more other side
The shared concern request of the position data of account, is authorized after having reciprocal account to receive shared concern.
S4 or authorized user are during trip, its degree of safety threshold value of system Auto-matching, and logical in authorized client
Cross the note display of dynamic trajectory icon.
S5, when other side judges that the trip state of authorized user exception or path occurs and mismatches, actively initiate inquiry.
S6, when unexpected security incident occurs during trip for user, system is automatically in the triggering relief of authorized client
Request alarm.
S7, receive other side's initiation inquiry or relief after alarm;Or other side initiates according to the specific alert content of system trigger
Inquiry or relief.
S8, when precarious position release or privacy secrecy need, user release partly or entirely to the position of authorized client
Set data sharing concern authorization.
In conclusion it is of the invention by the shared security monitoring and Emergency Assistance method realized of data grant, by awarding
Authorization of the end trip data to authorized end is weighed, allows other side to synchronize the trip state for grasping user, obtains the timely safety of system
Alarm is realized and provides safe emergency relief to the authorized user to want help.It is further advanced by and road safety big data is joined
Several acquisitions, the degree of safety threshold value of building user's trip provide intelligent alarm and the third party of trip safe condition for user
Quick salvage service.
Claims (10)
1. being characterized in that shared by authorizing to other side by the shared security monitoring and Emergency Assistance method realized of data grant
The position data of user allows other side to know the present position information and shift in position state of user in real time, when user occurs surprisingly
When situation, facilitates other side to initiate inquiry in time and Emergency Assistance is provided;Including following technology implementation process:
S1, user client setting system alarm trigger rule after, launch position data sharing concern request;
S2, system issue request other side in authorized client and receive shared concern prompt;
S3, when system feedback does not receive shared concern by other side, user is initiated again to other one or more other side's accounts
The shared concern request of position data, authorized after thering is reciprocal account to receive shared concern;
S4 or authorized user are during trip, its degree of safety threshold value of system Auto-matching, and in authorized client by moving
The label display of state trajectory diagram;
S5, when other side judges that the trip state of authorized user exception or path occurs and mismatches, actively initiate inquiry;
S6, when unexpected security incident occurs during trip for user, system is automatically in authorized client triggering assistance requests
Alarm;
S7, receive other side's initiation inquiry or relief after alarm;Or other side initiates inquiry according to the specific alert content of system trigger
Or relief;
S8, when precarious position release or privacy secrecy need, user release partly or entirely to the positional number of authorized client
It is authorized according to shared concern.
2. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 1
System alarm triggering rule, the general rule including system identification such as: traffic accident, safe thing has occurred in the path immediately
Therefore surprisingly lose can not synchronized tracking and user location for public security criminal case and natural calamity event and location data
Data are more than each parameter of regularity setting that setting duration does not generate variation.
3. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 2
System alarm triggering rule, or further include the rule of self establishment such as: mismatched with setting path, the setting of visiting site it is resident
Time is more than threshold value, contacts with the active message of setting time point and is not triggered, actively the code word matching error of message triggering.
4. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 1
Client, or by binding other common platform account clients as authorized client and/or authorized client.
5. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 1
Degree of safety threshold value is the safe angle value based on the path, matches the personal safety evaluating characteristic value of user, and system will give birth to automatically
At the degree of safety threshold value of the present position of user.
6. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 5
The safe angle value in path is that the section is accumulated based on category of roads, pavement behavior, wagon flow stream of people situation, big data
Seasonal climate type, natural calamity event, traffic accident and public security criminal case carry out parameter acquisition;By collected parameter ratio
After systemic presupposition degree of safety comparison value, statistics obtains the safe angle value in the section.
7. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 5
The personal safety of user is evaluated, and is to submit the user for children, pregnant woman, invalids, the elderly, Young Female, the young and the middle aged
The basic crowd characteristic sorting item and the specific setting tagsort item of individual of male show that user's personal safety evaluation of system is special
Value indicative.
8. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 7
The specific setting tagsort item of user's individual refers to that user is based on own physiological pathology healthiness condition and psychological wish feature,
The exclusiveness position independently set or Path selection.
9. being characterized in that permitting by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 1
Other side carries out ratio adjustment to the degree of safety threshold value of user, improves the level of interest to user.
10. being characterized in that described by the shared security monitoring and Emergency Assistance method realized of data grant according to claim 1
The specific alert content of system trigger is that the industry of relief operation is informed and/or requested to the alarm events of system automatically generated
Process of being engaged in prompt.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910391184.1A CN110164086B (en) | 2019-05-11 | 2019-05-11 | Safety monitoring and emergency rescue method realized through data authorization sharing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910391184.1A CN110164086B (en) | 2019-05-11 | 2019-05-11 | Safety monitoring and emergency rescue method realized through data authorization sharing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110164086A true CN110164086A (en) | 2019-08-23 |
CN110164086B CN110164086B (en) | 2021-11-16 |
Family
ID=67634509
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910391184.1A Expired - Fee Related CN110164086B (en) | 2019-05-11 | 2019-05-11 | Safety monitoring and emergency rescue method realized through data authorization sharing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110164086B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070244633A1 (en) * | 2005-05-27 | 2007-10-18 | Alan Phillips | Location-based services |
CN104375412A (en) * | 2014-11-25 | 2015-02-25 | 中国石油大学(华东) | Security smart watch special for student |
CN106816035A (en) * | 2015-12-02 | 2017-06-09 | 中国移动通信集团公司 | A kind of alarm method and device towards pedestrian |
CN107093157A (en) * | 2017-03-29 | 2017-08-25 | 广东巴拿赫大数据科技有限公司 | A kind of flash appeal based on mobile terminal, Risk-warning and key emergency platform |
CN108346259A (en) * | 2018-02-07 | 2018-07-31 | 广东小天才科技有限公司 | Motion state monitoring method, mobile terminal and storage medium |
CN108670202A (en) * | 2012-12-31 | 2018-10-19 | 德克斯康公司 | The long-range monitoring of analysis measurement |
CN109087478A (en) * | 2018-08-22 | 2018-12-25 | 徐自远 | A kind of early warning of the anti-swarm and jostlement of intelligence and method of river diversion and system |
CN109195113A (en) * | 2018-09-27 | 2019-01-11 | 北京奇虎科技有限公司 | The method, apparatus and computer equipment of a kind of trip of user for identification track |
CN109191782A (en) * | 2018-10-31 | 2019-01-11 | 广东小天才科技有限公司 | Children safety early warning system and method |
CN109191779A (en) * | 2018-09-26 | 2019-01-11 | 广东小天才科技有限公司 | Safety prompting method based on intelligent wearable device and intelligent wearable device |
-
2019
- 2019-05-11 CN CN201910391184.1A patent/CN110164086B/en not_active Expired - Fee Related
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070244633A1 (en) * | 2005-05-27 | 2007-10-18 | Alan Phillips | Location-based services |
CN108670202A (en) * | 2012-12-31 | 2018-10-19 | 德克斯康公司 | The long-range monitoring of analysis measurement |
CN104375412A (en) * | 2014-11-25 | 2015-02-25 | 中国石油大学(华东) | Security smart watch special for student |
CN106816035A (en) * | 2015-12-02 | 2017-06-09 | 中国移动通信集团公司 | A kind of alarm method and device towards pedestrian |
CN107093157A (en) * | 2017-03-29 | 2017-08-25 | 广东巴拿赫大数据科技有限公司 | A kind of flash appeal based on mobile terminal, Risk-warning and key emergency platform |
CN108346259A (en) * | 2018-02-07 | 2018-07-31 | 广东小天才科技有限公司 | Motion state monitoring method, mobile terminal and storage medium |
CN109087478A (en) * | 2018-08-22 | 2018-12-25 | 徐自远 | A kind of early warning of the anti-swarm and jostlement of intelligence and method of river diversion and system |
CN109191779A (en) * | 2018-09-26 | 2019-01-11 | 广东小天才科技有限公司 | Safety prompting method based on intelligent wearable device and intelligent wearable device |
CN109195113A (en) * | 2018-09-27 | 2019-01-11 | 北京奇虎科技有限公司 | The method, apparatus and computer equipment of a kind of trip of user for identification track |
CN109191782A (en) * | 2018-10-31 | 2019-01-11 | 广东小天才科技有限公司 | Children safety early warning system and method |
Also Published As
Publication number | Publication date |
---|---|
CN110164086B (en) | 2021-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Howell | Youth gang programs and strategies: Summary | |
Bostock et al. | Domestic violence against women: Understanding social processes and women's experiences | |
Dinisman et al. | Understanding victims of crime | |
Sbriccoli et al. | The Case of S: Elaborating the ‘Right'Narrative to Fit Normative/Political Expectations in Asylum Procedure in Italy | |
Doherty et al. | Head injury in asylum seekers and refugees referred with psychological trauma | |
Zhong | Bystander intervention and fear of crime: Evidence from two Chinese communities | |
CN110164086A (en) | Pass through the shared security monitoring and Emergency Assistance method realized of data grant | |
Hamid et al. | Safety and security needs of commuter rail services-travellers' perceptions | |
Moore | A descriptive analysis of incidents of absconding and escape from the English high-security hospitals, 1989–94 | |
CN110164087B (en) | Real-time monitoring method for realizing trip safety of monitored person | |
EP1760678A2 (en) | Security system | |
Santry | Can You Find Me Now-Amanda's Bill: A Case Study in the Use of GPS in Tracking Pretrial Domestic Violence Offenders | |
de Santis Feltran | The Management of Violence on the São Paulo Periphery: the repertoire of normative apparatus in the “PCC era | |
Epstein | Liberty, Equality, and Privacy: Choosing a Legal Foundation for Gay Rights | |
Gray et al. | Serious youth violence and its relationship with adverse childhood experiences | |
Newburn | The prospect of an international sex offender registry: Why an international system modeled after United States sex offender laws is not an effective solution to stop child sexual abuse | |
WO2022007997A1 (en) | System for monitoring the operation of a ship | |
Otu | Patterns and modus operandi of crime and disorderly conduct on the public transport system in Abakaliki, Nigeria: A descriptive analysis | |
Poudel et al. | Reducing poverty and upholding human rights: A pragmatic approach | |
Astrauskienė et al. | The prevalence of problem drug use in Lithuania | |
DE102016108013B3 (en) | Method for a system for safely opening a door and system for safely opening a door | |
Artingstall | FDP Behavior as Defense Application | |
Boon-Kuo et al. | Covid-19 policing in the pandemic: analysis of reports submitted to the Covid-19 Policing in Australia Coalition | |
DE102017219802A1 (en) | Method and device for assisting a user of a mobile device, in particular for the security of the user | |
Richards | Is it Time for Australia to adopt Circles of Support and Accountability (COSA)? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20211116 |