CN113973355A - Wireless terminal arranged at security check point, security check system and security check method - Google Patents

Wireless terminal arranged at security check point, security check system and security check method Download PDF

Info

Publication number
CN113973355A
CN113973355A CN202010718257.6A CN202010718257A CN113973355A CN 113973355 A CN113973355 A CN 113973355A CN 202010718257 A CN202010718257 A CN 202010718257A CN 113973355 A CN113973355 A CN 113973355A
Authority
CN
China
Prior art keywords
security
wireless terminal
security check
network
telecommunications network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010718257.6A
Other languages
Chinese (zh)
Other versions
CN113973355B (en
Inventor
吴南南
薛天泊
马艳芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Co Ltd
Original Assignee
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Co Ltd filed Critical Nuctech Co Ltd
Priority to CN202010718257.6A priority Critical patent/CN113973355B/en
Publication of CN113973355A publication Critical patent/CN113973355A/en
Application granted granted Critical
Publication of CN113973355B publication Critical patent/CN113973355B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V5/00Prospecting or detecting by the use of ionising radiation, e.g. of natural or induced radioactivity
    • G01V5/20Detecting prohibited goods, e.g. weapons, explosives, hazardous substances, contraband or smuggled objects
    • G01V5/22Active interrogation, i.e. by irradiating objects or goods using external radiation sources, e.g. using gamma rays or cosmic rays

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • High Energy & Nuclear Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Geophysics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The utility model provides a wireless terminal who lays in security check point includes: a control module configured to control wireless access of a wireless terminal to a telecommunications network; the sending module is configured to send the security check data to a remote image judging center via a telecommunication network; a receiving module configured to receive feedback information from the graph determination center via the telecommunication network.

Description

Wireless terminal arranged at security check point, security check system and security check method
Technical Field
The present disclosure relates to the field of security inspection, and more particularly, to a wireless terminal disposed at a security inspection point, a security inspection system disposed at a security inspection point, a security inspection method, an electronic device, and a computer-readable storage medium.
Background
At present, security inspection becomes an important means for ensuring the safe performance of activities of people. When a city needs security support for important activities (e.g., major events, important meetings, etc.), a temporary assignment of diagraphers and other security personnel is often required to work with the security inspection machine for local security inspection. When an administrative service unit (for example, a court, a prison, etc.) of a city needs to deploy a security check point, since there is no security check team for the administrative service unit to perform a shift, some security check personnel need to be separately arranged to the corresponding security check point to perform security check work.
For the temporarily delegated security inspection situation, due to the temporary property, the scheduling of the image judging personnel is inconvenient, and the cost is high; when the temporarily assigned diagraph is not from a full-time security check team, the working level of the diagraph cannot be guaranteed, and the security check quality cannot be guaranteed. For the security inspection situation of the administrative service unit, the requirement for the number of security inspection personnel is not large (usually 1-2 persons) because the image judgment requirement scale of the administrative service unit is small, so that the cost of the image judgment personnel is higher than that of the image judgment personnel for hiring if the image judgment personnel is arranged for full time; in addition, most of the time, these security inspection points are idle, and setting a local map judging person without high traffic service demands leads to waste of map judging resources.
Although some security inspection points may have the capability of using Artificial Intelligence (AI) for image interpretation, due to the complexity of the security inspection scanning images, the accuracy of the artificial intelligence in identifying details is not high, so that the identification technology of the suspected object is not mature enough, and thus the suspected object cannot replace professional image interpretation personnel. In the security inspection industry, the professional ability of a diagrapher is an indispensable part.
Therefore, there is a need for a wireless terminal, a security inspection system, and a security inspection method that can meet the temporary deployment and small-scale image determination requirements to replace the original local solution, and at the same time, reduce the cost and improve the image determination quality and efficiency.
Disclosure of Invention
In view of the above, the present invention provides a wireless terminal disposed at a security check point, a security check system disposed at a security check point, a security check method, an electronic device, and a computer-readable storage medium, so as to meet the requirements of temporary deployment and small-scale image determination, replace the original local solution, and reduce the cost and improve the image determination quality and efficiency.
According to an aspect of exemplary embodiments of the present disclosure, there is provided a wireless terminal disposed at a security check point, including: a control module configured to control wireless access of a wireless terminal to a telecommunications network; the sending module is configured to send the security check data to a remote image judging center via a telecommunication network; a receiving module configured to receive feedback information from the graph determination center via the telecommunication network.
According to embodiments of the present disclosure, the telecommunications network may comprise 5G or LTE.
According to an embodiment of the present disclosure, the control module may be configured to control the wireless terminal to access the telecommunications network through the VPN.
According to an embodiment of the disclosure, the control module may be configured to control the wireless terminal to access the telecommunications network through an internet of things channel of the telecommunications network.
According to an embodiment of the present disclosure, the control module may be configured to control the wireless terminal to access a cloud service node provided by a cloud service provider through a telecommunication network.
According to the embodiment of the disclosure, the cloud service node can be connected to a backbone network through an access gateway, and can establish network connection with the graph determination center through the backbone network.
According to embodiments of the present disclosure, a cloud service node may include a firewall associated therewith to ensure secure access to a backbone network through an access gateway.
According to an aspect of exemplary embodiments of the present disclosure, there is provided a security inspection system arranged at a security inspection point, including: the security inspection machine comprises a scanning device, a data acquisition device and a data processing device, wherein the scanning device is configured to scan a security inspection object to acquire security inspection data; and the wireless terminal.
According to an embodiment of the present disclosure, the security inspection system may further include: monitoring means configured to monitor whether an abnormality exists.
According to the embodiment of the disclosure, the switching of the security check machine to the local mode can be prompted when the monitoring device monitors the abnormality.
According to the embodiment of the disclosure, a plurality of security check machines are arranged in the security check point, and the wireless terminal corresponding to each security check machine can comprise a short-distance wireless communication module for short-distance networking.
According to the embodiment of the disclosure, the communication mode of the short-range wireless communication module may be one of Wi-Fi, LoRa, Adhoc or wireless Mesh.
According to the embodiment of the disclosure, one of the wireless terminals corresponding to the plurality of security check machines can be configured as a control node of the local area network after networking.
According to the embodiment of the disclosure, a plurality of security check machines can be networked in a multipoint and multihop mode.
According to embodiments of the present disclosure, a plurality of security inspection machines may be divided into a plurality of groups of substantially uniform number.
According to an embodiment of the present disclosure, a wireless terminal may be installed in a security check machine.
According to another aspect of exemplary embodiments of the present disclosure, there is provided a security inspection method including: obtaining security check data locally through a security check machine, wherein the security check machine is connected to a wireless terminal, and the wireless terminal is wirelessly accessed to a telecommunication network; sending security check data to a remote image judging center via a telecommunication network; and receiving feedback information from the mapping center via the telecommunications network.
According to embodiments of the present disclosure, the telecommunications network may comprise 5G or LTE.
According to an embodiment of the present disclosure, a wireless terminal may access a telecommunications network through a VPN.
According to an embodiment of the present disclosure, a wireless terminal may access a telecommunications network through an internet of things channel of the telecommunications network.
According to the embodiment of the disclosure, the wireless terminal can access to a cloud service node provided by a cloud service provider through a telecommunication network.
According to the embodiment of the disclosure, the cloud service node can be connected to a backbone network through an access gateway, and can establish network connection with the graph determination center through the backbone network.
According to embodiments of the present disclosure, a cloud service node may include a firewall associated therewith to ensure secure access to a backbone network through an access gateway.
According to an embodiment of the present disclosure, a wireless terminal may include:
monitoring means configured to monitor whether an abnormality exists.
According to the embodiment of the disclosure, the switching of the security check machine to the local mode can be prompted when the monitoring device monitors the abnormality.
According to the embodiment of the disclosure, the security check machine can be a plurality of security check machines, and the wireless terminal corresponding to each security check machine comprises a short-distance wireless communication module for short-distance networking.
According to the embodiment of the disclosure, the communication mode of the short-range wireless communication module may be one of Wi-Fi, LoRa, Adhoc or wireless Mesh.
According to the embodiment of the disclosure, one of the wireless terminals corresponding to the plurality of security check machines can be configured as a control node of the local area network after networking.
According to the embodiment of the disclosure, a plurality of security check machines can be networked in a multipoint and multihop mode.
According to embodiments of the present disclosure, a plurality of security inspection machines may be divided into a plurality of groups of substantially uniform number.
According to another aspect of exemplary embodiments of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing one or more programs, wherein the one or more programs, when executed by the processor, cause the processor to implement the above-described method.
According to another aspect of exemplary embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement the above-described method.
Through the wireless terminal, the security check system, the security check method, the electronic equipment and the computer readable storage medium which are arranged at the security check point, the invention can fully utilize the image judgment resources of the centralized image judgment system to solve the temporary image judgment resource requirement and a small amount of image judgment resource requirement, obviously reduce the personnel cost and improve the image judgment quality and efficiency.
The invention is not limited by physical space, any security check point in cities and regions covered by telecommunication network can be accessed into the centralized judging map system, and remote judging map service is integrated, so that the independent security check service originally dispersed in each region has networking capability.
The invention can complete the integrated transformation of the security check point without construction or with little construction, so that the security check point forms network connection in a plug-and-play manner, accesses an integrated service system and can effectively control the construction cost.
Drawings
The above and other embodiments and features of the present disclosure will become more apparent by describing in detail embodiments thereof with reference to the attached drawings in which:
FIG. 1 schematically illustrates a system architecture diagram of a wireless terminal deployed at a security checkpoint in accordance with an embodiment of the present disclosure;
FIG. 2 schematically illustrates a block diagram of a wireless terminal deployed at a security checkpoint in accordance with an embodiment of the present disclosure;
FIG. 3 schematically illustrates a block diagram of a security system deployed at a security checkpoint in accordance with an embodiment of the present disclosure;
fig. 4 schematically illustrates a system architecture diagram of a wireless terminal in a security inspection point implementing remote graph interpretation by accessing a cloud service node according to an embodiment of the present disclosure;
fig. 5 schematically illustrates a system diagram for networking by multiple security checkpoints to access a cloud service node according to an embodiment of the disclosure with respect to fig. 4;
FIG. 6 schematically illustrates a process flow diagram in the presence of a network anomaly with respect to FIG. 4 in accordance with an embodiment of the present disclosure;
fig. 7 schematically illustrates a forward data flow diagram for implementing remote mapping by accessing a cloud service node with respect to a wireless terminal in the security check point of fig. 4, according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a flow chart of a security method according to an embodiment of the present disclosure; and
fig. 9 schematically shows a block diagram of an electronic device suitable for implementing a security check method according to an embodiment of the present disclosure.
Detailed Description
Specific embodiments of the present invention will be described in detail below, and it should be noted that the embodiments described herein are only for illustration and are not intended to limit the present invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known circuits, materials, or methods have not been described in detail in order to avoid obscuring the present invention.
Throughout the specification, reference to "one embodiment," "an embodiment," "one example," or "an example" means: the particular features, structures, or characteristics described in connection with the embodiment or example are included in at least one embodiment of the invention. Thus, the appearances of the phrases "in one embodiment," "in an embodiment," "one example" or "an example" in various places throughout this specification are not necessarily all referring to the same embodiment or example. Furthermore, the particular features, structures, or characteristics may be combined in any suitable combination and/or sub-combination in one or more embodiments or examples.
It will be understood that when an element is referred to as being "coupled" or "connected" to another element, it can be directly coupled or connected to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly coupled" or "directly connected" to another element, there are no intervening elements present.
Further, as used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be understood that a noun in the singular corresponding to a term may include one or more things unless the relevant context clearly dictates otherwise. As used herein, each of the phrases such as "a or B," "at least one of a and B," "at least one of a or B," "A, B or C," "at least one of A, B and C," and "at least one of A, B or C" may include all possible combinations of the items listed together with the respective one of the plurality of phrases. As used herein, terms such as "1 st" and "2 nd" or "first" and "second" may be used to distinguish one element from another element simply and not to limit the elements in other respects (e.g., importance or order).
As used herein, the term "module" may include units implemented in hardware, software, or firmware, and may be used interchangeably with other terms (e.g., "logic," "logic block," "portion," or "circuitry"). A module may be a single integrated component adapted to perform one or more functions or a minimal unit or portion of the single integrated component. For example, according to an embodiment, the modules may be implemented in the form of Application Specific Integrated Circuits (ASICs).
It should be understood that the various embodiments of the present disclosure and the terms used therein are not intended to limit the technical features set forth herein to specific embodiments, but include various changes, equivalents, or alternatives to the respective embodiments. Unless otherwise explicitly defined herein, all terms are to be given their broadest possible interpretation, including meanings implied in the specification and meanings understood by those skilled in the art and/or defined in dictionaries, papers, etc.
Further, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale. For the description of the figures, like reference numerals may be used to refer to like or related elements. The present disclosure will be described below by way of example with reference to the accompanying drawings.
Fig. 1 schematically illustrates a system architecture diagram 1000 of a wireless terminal deployed at a security check point in accordance with an embodiment of the present disclosure.
Referring to fig. 1, a system architecture diagram 1000 of a wireless terminal may include a security check object 1020, a security check machine 1010, a wireless terminal 1040, and a mapping center 1030.
The security check object 1020 is an object to be subjected to security check, for example, baggage, a hand bag, or the like. The security check machine 1010 may include a scanning device that scans a security check object 1020 to obtain security check data.
The wireless terminal 1040 may wirelessly access a telecommunications network and communicate with the mapping center 1030 via the telecommunications network. The wireless terminal 1040 is connected to the security check machine 1010, and transmits security check data from the security check machine to the pattern determination center 1030 via a telecommunication network.
The panel determination center 1030 is a centralized panel determination system remotely located from the security check machine 1010. The switching center 1030 processes the received security check data and sends the feedback information to the wireless terminal 1040 via the telecommunication network, and the wireless terminal 1040 further transmits the feedback information to the security check machine 1010.
The telecommunications network may comprise 5G or LTE, etc.
In an example embodiment, the wireless terminal 1040 may access the telecommunications network through a VPN.
In an example embodiment, the wireless terminal 1040 may access the telecommunications network through an internet of things channel of the telecommunications network.
In an example embodiment, the wireless terminal 1040 may access a cloud service node provided by a cloud service provider through a telecommunication network. The cloud service node can be connected to a backbone network through an access gateway and establishes network connection with the graph judging center through the backbone network. The cloud service node may include a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
Fig. 2 schematically shows a block diagram of a wireless terminal 2000 arranged at a security check point according to an embodiment of the present disclosure.
Referring to fig. 2, the wireless terminal may be an example of the wireless terminal 1040 described in fig. 1. The wireless terminal 2000 may include a control module 2010, a transmitting module 2020, and a receiving module 2030, and it is understood by those skilled in the art that other components may be added to the components of the wireless terminal 2000 or some of the components of the wireless terminal 2000 may be changed according to the performance and structure of the wireless terminal 2000. For example, both the transmit module 2020 and the receive module 2030 shown in fig. 2 may be combined as a communication module.
The control module 2010 may be configured to control wireless terminal access to a telecommunications network wirelessly. The transmitting module 2020 may be configured to transmit the security check data to a remote mapping center via a telecommunications network. The receiving module 2030 may be configured to receive feedback information from a mapping center via a telecommunication network. Further, the control module 2010 may be further configured to control a transmission operation performed in the transmission module and a reception operation performed in the reception module.
In an exemplary embodiment, the control module 2010 may be configured to control access of the wireless terminal to the telecommunications network through the VPN.
In an exemplary embodiment, the control module 2010 may be configured to control the wireless terminal to access the telecommunications network through an internet of things channel of the telecommunications network.
In an exemplary embodiment, the control module 2010 may be configured to control access of the wireless terminal to a cloud service node provided by a cloud service provider through a telecommunications network.
Fig. 3 schematically shows a block diagram of a security system deployed at a security checkpoint in accordance with an embodiment of the present disclosure.
Referring to fig. 3, the security system 3000 may include a security machine 3080, a wireless terminal 3030, a display device 3020, an input device 3050, a storage device 3040, a controller 3010, and a monitoring device 3070. The security system shown in fig. 3 is only an example, and should not bring any limitation to the function and scope of use of the embodiments of the present disclosure.
The security inspection machine 3080 may include a scanning device 3060. The scanning device 3060 performs scanning in the security check machine 3080. The scanning device 3060 may scan the security check object. The scanning device 3060 may be, for example, an X-ray machine that scans with X-rays. By performing scanning on the security check object, the scanning apparatus 3060 can acquire security check data. For example, the security data may be image information related to a security subject.
Note that the security check machine 3080 is not limited to including only the scanning device 3060, and the devices shown in the above security check system, other devices not shown, or any combination thereof may be formed as part of the security check machine 3080. For example, the security check machine 3080 may also include the wireless terminal 3030, that is, the wireless terminal 3030 may be mounted within the security check machine 3080.
The wireless terminal 3030 is used in the security system 3000 to enable the security system to access a telecommunications network in order to establish wireless communication with the telecommunications network. For example, the wireless terminal 3030 may first access a base station and then access a telecommunications network through the base station.
In addition, the wireless terminal 3030 shown in fig. 3 is similar to the wireless terminals described in fig. 1 and 2, and thus additional description thereof is omitted to avoid redundancy.
The display device 3020 outputs display data in the security check system 3000. The display device 3020 may include a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, an Organic Light Emitting Diode (OLED) display, a Micro Electro Mechanical System (MEMS) display, and the like. The display data may be, for example, security check data acquired by the scanning device, result data processed on the security check data, or feedback information received from the mapping center.
The input unit 3050 generates input data in the security system 3000. The input 3050 can generate input data based on user input to the security system. In addition, the input device 3050 can include at least one input device. Input devices 3050 may include keypads, dome switches, physical buttons, touch panels, joysticks and knobs, sensors, and the like. In this case, the input device 3050 may be implemented as a touch screen by being coupled with the display unit.
Storage 3040 may store an operating program for security system 3000. In this case, the storage 3040 may store a plurality of functions. Herein, the functions may include, for example, a scanning function, a detection function, a radio access function, and an event management function. Further, the storage 3040 may store data generated when a program is executed. In this case, the storage 3040 may store security inspection data acquired by scanning, result data processed on the security inspection data, feedback information received from a chart center, or the like.
The controller 3010 controls the overall operation in the security system 3000. The controller 3010 may perform a number of functions, such as a scan function, a detect function, and an event management function. In addition, the controller 3010 may control the wireless terminal to transmit security check data to a remote mapping center via a telecommunication network and receive feedback information from the mapping center. The controller 3010 may also prompt switching of the security check machine to the local mode when the monitoring device detects an abnormality.
The monitoring device 3070 monitors the security system 3000 for the presence of an abnormality. When the monitoring device 3070 detects an abnormality, the controller 3010 prompts switching of the security check machine to the local mode based on the received abnormality information.
It should be noted that the security inspection system is not limited to the above devices, and the above devices may be single devices or any combination thereof, and the present invention is not limited thereto.
Fig. 4 schematically shows a system architecture diagram of a wireless terminal in a security inspection point implementing remote graph judgment by accessing a cloud service node according to an embodiment of the present disclosure. The system architecture 4000 may include a cloud 4010, security checkpoints 4020a-4020c, and arbitration centers 4030a-4030 b.
Each of the security checkpoints 4020a-4020c may include a plurality of security machines. In this case, the wireless terminal corresponding to each security check machine may further include a short-range wireless communication module for short-range networking. The communication mode of the short-distance wireless communication module can be one of Wi-Fi, LoRa, Adhoc or wireless Mesh. And a plurality of security check machines in each security check point can be networked through corresponding wireless terminals.
In an example embodiment, multiple security machines in each security point may be networked in a multi-hop fashion. In this way, the security check point access network is more flexible and the built local area network is easily expanded. In addition, the multi-hop network inherently has the capabilities of adaptive fault recovery and load balancing, and the anti-interference capability is stronger.
In an example embodiment, when the number of security inspection machines is large, the plurality of security inspection machines may be divided into a plurality of groups of substantially uniform number in order to keep as few long connection links as possible. The n security check machines are divided into m groups, and each group at least covers n/m security check machines. If n mod m (n/m remainder) is larger than zero, randomly distributing the security inspection machines with the remainder number into k (k < m) groups, and distributing 1 machine to each group.
In an example embodiment, one of the wireless terminals corresponding to the plurality of security check machines in each security check point may be configured as a control node of the post-networking local area network. The control nodes can be elected in a random mode, a voting mode and the like. For example, the wireless terminal 4024a corresponding to the security device 4022a may be a control node of a local network of the security site 4020a, the wireless terminal 4024b corresponding to the security device 4022b may be a control node of a local network of the security site 4020b, and the wireless terminal 4024c corresponding to the security device 4022c may be a control node of a local network of the security site 4020 c. Note that, for ease of description, the security check machine and the wireless terminal corresponding thereto are shown in the manner shown in fig. 4, but the positional relationship between the two is not limited thereto.
The security check machine in each security check point can access the telecommunication network through the wireless terminal of the control node so as to establish wireless communication with the telecommunication network. For example, a wireless terminal may access a network provided by a network operator (such as china mobile, china unicom, china telecom, etc.). In this case, the wireless terminal may further include a terminal mobile communication module and a network operator mobile data card.
In the security check point, the wireless terminal of the control node is communicated with the telecommunication network, so that a long connecting link is kept between the local area network and the telecommunication network after networking, the occupation and the flow of the link can be saved, and the advantages of the link are fully utilized.
It should be noted that the present invention does not limit the networking manner, and any networking manner that can realize network connection of a plurality of security inspection machines is applicable to the present invention.
It should be noted that fig. 4 is described for a security check point including a plurality of security check machines, however, the security check point may also include only one security check machine, and a wireless terminal corresponding to the security check machine may access the telecommunication network as a control node.
The telecommunications network may comprise 5G or LTE. Compared with a 4G network, the 5G network has the characteristics of small link fluctuation influence and low transmission delay. It should be noted that if a dedicated channel is occupied, 5G will bear the same risk of transmission delay as a 4G network. In order to cope with such a risk and prevent service interruption due to network abnormality, the network may be monitored, which will be described later.
In an example embodiment, the wireless terminal of the control node may access the telecommunications network through the VPN, thereby securing the data link and ensuring that the data is complete and non-tamperable.
In an example embodiment, the wireless terminal of the control node may access the telecommunications network through an internet of things channel of the telecommunications network. In this way, the congestion of the airspace channel (namely, the network data connection information channel provided by the network operator) can be prevented, and the access and transmission performance can be guaranteed, so that the data transmission quality which is higher in speed and more reliable than that of the common civil channel can be provided.
The security check machine in the security check point can be accessed to a cloud service node provided by a cloud service provider through a wireless terminal of the control node via a telecommunication network. The cloud service node 4012a, 4012b, or 4012c may be configured to process the security check data received from the security check machine and perform an operation on the processed security check data.
In an example embodiment, the security check point 4020a, 4020b or 4020c uses a machine room provided by a cloud service provider and closer to the security check point as a physical access node, and deploys a security check machine agent service on a machine room Virtual Machine (VM) resource. The security check point proxy service not only maps most service data of security check point transmission interaction, but also carries out a plurality of optimization on functions corresponding to the services.
Specifically, the cloud service node 4012a, 4012b, or 4012c may process (e.g., format-convert, etc. the data) the security inspection data received from the security inspection point according to the requirement of the security inspection point or the business logic requirement, etc., so as to perform subsequent operations on the security inspection data. The cloud service nodes 4012a, 4012b and 4012c serve as full-function avatars of the security check points, proxy data processing, business logic and the like of the security check points in a network system, support performance optimization from software to hardware in an all-around mode, and enable security check efficiency to be greatly improved.
After processing the security check data received from the security check point, the cloud service node performing an operation on the processed security check data includes: when the processed security inspection data meet the preset conditions, the processed security inspection data are transmitted to the figure judgment center 4030a or 4030b through the access gateway 4014; and when the processed security check data do not meet the preset conditions, blocking the processed security check data to prevent the processed security check data from further transmission. By the method, the security check data received by the cloud service node can be filtered, and lawless persons are prevented from attacking the security check data by means of springboards and the like.
In an exemplary embodiment, the preset condition may be a rule set up on a white list. The rules may be set up for certain access terminal identification, IP address, port number, and only if the rules are satisfied can data from a specified access terminal, or sent to a receiver-specified port (e.g., of an integrated services system) be allowed to pass; or the rule may be set up for the format of the data itself or the authentication information carried, and the data can be allowed to pass through the verification algorithm only if the rule is satisfied. The white list may typically be data filtered by the location of the firewall. For example, a firewall may be provided with a white list to filter data.
It should be noted that the firewall shown in fig. 4 may be set up on any one side of the cloud service node or the access gateway, or may be set up on both sides of the cloud service node or the access gateway, so as to filter the port number and the data list according to some outbound and inbound rules.
The cloud service node can be connected to a backbone network through an access gateway and establishes network connection with the graph judging center through the backbone network. In an exemplary embodiment, when the processed security inspection data meets the preset condition, the processed security inspection data is transmitted to the mapping center 4030a or 4030b through the access gateway 4014 by using a high-priority signaling of a cloud service provider on a backbone network. In an exemplary embodiment, the preset condition may be a rule set up on a white list. Specifically, the backbone network can treat different signaling differently according to the data format of the signaling and the data label carried by the signaling, so that the signaling has different transmission priorities. In this document, the high priority signaling is purchased from a public cloud manufacturer to a network operator, and the signaling with high transmission priority is owned in a backbone network, so that transmission can be completed quickly and efficiently, and a guarantee is provided for timeliness of data.
In an exemplary embodiment, after the processed security inspection data reaches the access gateway 4014, the processed security inspection data is transmitted by using a high-priority signaling tag on a backbone network of a cloud service provider, so as to reach the mapping center 4030a or 4030b at a faster speed than a normal signaling tag.
The panel centers 4030a-4030b may be an example of a centralized panel system, which may be one of the integrated business systems. The cities or regions in which the hubs 4030a-4030b are located may be different cities or regions (or may be the same cities or regions) than the cities or regions in which the security checkpoints 4020a-4020c are located. The professional map judging personnel in the map judging center can accurately and quickly give the map judging result, and the original path of the derived path returns to the security check point.
Further, in order to prevent service interruption due to network abnormality caused by phenomena such as channel occupation, signal interference, and the like, the wireless terminal corresponding to each of the security check machines in the security check points 4020a to 4020c may be provided with a monitoring device configured to monitor whether or not there is network abnormality. In addition, the monitoring device can also be used for monitoring equipment abnormality and the like.
In an exemplary embodiment, when the monitoring device monitors that there is an anomaly, an alarm may be activated to alert security check point personnel to switch to a local mode.
In an exemplary embodiment, software/hardware for a dongle function may be installed for each wireless terminal corresponding to each security check machine in the security check points 4020a to 4020c for monitoring one or more indicators of the security check points.
It should be noted that the integrated service system in this document includes, but is not limited to, a centralized graph system, and any relevant security check point networking integrated function can be realized by the present invention.
Cloud 4010 herein includes, but is not limited to, a public cloud, a hybrid cloud, a cloudy cloud, and the like. Cloud services include, but are not limited to, vendors that provide public clouds such as Aliskiu, Huashi cloud, AWS, Azure, etc.
Fig. 5 schematically illustrates a system diagram for networking by multiple security checkpoints to access a cloud service node according to an embodiment of the disclosure with respect to fig. 4.
Fig. 5 illustrates security check point 4020b in fig. 4 as an example. Security points 4020b may include security machines 5010a, 5010b, and 4022 b. The wireless terminals 5012a, 5012b and 4024b corresponding to the security check machines 5010a, 5010b and 4022b are networked in a Wi-Fi, LoRa, Adhoc or wireless Mesh manner through their respective short-range wireless communication modules, and the security check machines 5010a, 5010b and 4022b access the telecommunication network through the wireless terminal 4024b configured as a control node, and further access the cloud 4010.
Other aspects of fig. 5 are similar to those described above with reference to fig. 4, and thus additional description thereof is omitted to avoid redundancy.
Fig. 6 schematically shows a process flow diagram when a network exception occurs according to an embodiment of the present disclosure. Fig. 6 illustrates the security checkpoint 4020b in fig. 4 as an example. Within the security check point 4020b, a wireless terminal configured as a control node (i.e., the wireless terminal 4024b shown in fig. 4, 5, here covered) is equipped with monitoring means, e.g., software/hardware of a dongle function.
As shown in fig. 6, the monitoring apparatus monitors whether there is an abnormality in the network. When a network anomaly occurs (6010), the watchdog monitors to identify the anomaly (6020) and to initiate an alarm based on the identified result (6030). After receiving the alarm, the staff of the security check point switches the currently executed remote judgment chart to a local mode (6040).
Fig. 7 schematically illustrates a forward data flow diagram for implementing remote mapping by accessing a cloud service node with respect to a wireless terminal in the security check point of fig. 4 according to an embodiment of the present disclosure.
A wireless terminal 7010 (e.g., wireless terminals 4024a to 4024c corresponding to security check machines 4022a to 4022c in fig. 4) connects to a base station 7020 to establish wireless communication with a telecommunications network, and then the wireless terminal 7010 may access a cloud service node 7030 (e.g., 4012a to 4012c in fig. 4) in a cloud (e.g., 4010 in fig. 4) through the telecommunications network; the cloud service node 7030 processes the security inspection data received from the security inspection machine, and the processed security inspection data is judged whether to meet the rules set on the white list, if yes, the security inspection data is transmitted to the access gateway 7040 (for example, 4014 in fig. 4), and if no, the security inspection data is blocked 7050; finally, the security check data is transmitted from the access gateway to the decision center 7070 (e.g., 4030a, 4030b in fig. 4) using the backbone network 7060.
Fig. 8 schematically shows a flow chart of a security check method according to an embodiment of the present disclosure. As shown in fig. 8, the security inspection method includes the following steps.
At 8010, the security check data is obtained locally by a security check machine, wherein the security check machine is connected to a wireless terminal, the wireless terminal wirelessly accessing the telecommunications network;
at 8020, sending the security check data to a remote mapping center via a telecommunications network; and
in 8030, feedback information is received from a mapping center via a telecommunications network.
In an exemplary embodiment, the telecommunications network may comprise 5G or LTE.
In an exemplary embodiment, the wireless terminal may access the telecommunications network through a VPN.
In an exemplary embodiment, the wireless terminal may access the telecommunications network through an internet of things channel of the telecommunications network.
In an exemplary embodiment, the wireless terminal may access a cloud service node provided by a cloud service provider through a telecommunication network.
In an exemplary embodiment, the cloud service node may be connected to a backbone network through an access gateway and establish a network connection with the mapping center through the backbone network.
In an exemplary embodiment, the cloud service node may include a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
In an exemplary embodiment, a wireless terminal may include: monitoring means configured to monitor whether an abnormality exists.
In an exemplary embodiment, the security check machine may be prompted to switch to the local mode when the monitoring device detects an anomaly.
In an exemplary embodiment, the security check machine may be a plurality of security check machines, and the wireless terminal corresponding to each security check machine includes a short-range wireless communication module for short-range networking.
In an exemplary embodiment, the short-range wireless communication module may be one of Wi-Fi, LoRa, Adhoc, or wireless Mesh.
In an exemplary embodiment, one of the wireless terminals corresponding to the plurality of security check machines may be configured as a control node of the post-networking local area network.
In an exemplary embodiment, multiple security checkpoints may be networked in a multipoint and multihop manner.
In an exemplary embodiment, the plurality of security inspection machines may be divided into a plurality of groups of substantially uniform number.
According to the method provided by the embodiment of the disclosure, the security check machines in the security check points of different cities can be flexibly networked, and the existing network infrastructure is used for accessing the centralized graph judgment system by using the telecommunication network, so that the remote graph judgment processing is realized under the condition of ensuring the timeliness, the resource waste caused by the temporary or small quantity of graph judgment requirements is solved, the personnel cost is obviously reduced, and the quality and the efficiency of the graph judgment processing are improved.
For the sake of clarity and brevity, detailed descriptions of various embodiments of the security inspection method are not repeated herein.
Fig. 9 schematically illustrates a block diagram of an electronic device suitable for implementing the security check method described above according to an embodiment of the present disclosure. The electronic device shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 9, an electronic device 9000 according to an embodiment of the present disclosure includes a processor 9010, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)9020 or a program loaded from a storage portion 9080 into a Random Access Memory (RAM) 9030. The processor 9010 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or related chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 9010 may also include onboard memory for caching purposes. Processor 9010 may include a single processing unit or multiple processing units to perform the different actions of the method flows according to embodiments of the present disclosure.
In the RAM 9030, various programs and data necessary for the operation of the electronic device 9000 are stored. The processor 9010, the ROM 9020, and the RAM 9030 are connected to each other through a bus 9040. The processor 9010 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 9020 and/or the RAM 9030. Note that the program may also be stored in one or more memories other than the ROM 9020 and the RAM 9030. The processor 9010 may also execute various operations of the method flows according to the embodiments of the present disclosure by executing programs stored in the one or more memories.
The electronic device 9000 may also include an input/output (I/O) interface 9050, the input/output interface (I/O)9050 also being connected to the bus 9040, according to embodiments of the present disclosure. Electronic device 9000 may also include one or more of the following components connected to 1/O interface 9050: an input portion 9060 including a keyboard, a mouse, and the like; an output section 9070 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage portion 9080 including a hard disk and the like; and a communication section 9090 including a network interface card such as a LAN card, a modem, or the like. The communication section 9090 performs communication processing via a network such as the internet. A drive 9100 is also connected to the I/O interface 9050 as necessary. A removable medium 9110 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 9100 as necessary, so that a computer program read out therefrom is mounted in the storage portion 9080 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication part 9090 and/or installed from the removable medium 9110. The computer program performs the above-described functions defined in the system of the embodiment of the present disclosure when executed by the processor 9010. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include the ROM 9020 and/or the RAM 9030 described above and/or one or more memories other than the ROM 9020 and the RAM 9030.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (32)

1. A wireless terminal deployed at a security checkpoint, comprising:
a control module configured to control the wireless terminal to wirelessly access a telecommunications network;
a sending module configured to send security check data to a remote pattern determination center via the telecommunication network;
a receiving module configured to receive feedback information from a graph determination center via the telecommunication network.
2. The wireless terminal of claim 1, wherein the telecommunications network comprises 5G or LTE.
3. The wireless terminal of claim 1, wherein the control module is configured to control the wireless terminal to access the telecommunications network through a VPN.
4. The wireless terminal of claim 1, wherein the control module is configured to control the wireless terminal to access the telecommunications network through an internet of things channel of the telecommunications network.
5. The wireless terminal of claim 1, wherein the control module is configured to control access of the wireless terminal to a cloud service node provided by a cloud service provider through the telecommunications network.
6. The wireless terminal of claim 5, wherein the cloud service node is connected to a backbone network through an access gateway and establishes a network connection with the decision graph center through the backbone network.
7. The wireless terminal of claim 6, wherein the cloud service node includes a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
8. A security system deployed at a security checkpoint comprising:
the security inspection machine comprises a scanning device, a data acquisition device and a data processing device, wherein the scanning device is configured to scan a security inspection object to acquire security inspection data; and
the wireless terminal of claims 1-7.
9. The security system of claim 8, further comprising:
monitoring means configured to monitor whether an abnormality exists.
10. The security system of claim 9, wherein the security machine is prompted to switch to local mode when the monitoring device detects an anomaly.
11. The security inspection system according to claim 8, wherein a plurality of security inspection machines are arranged in the security inspection point, and the wireless terminal corresponding to each security inspection machine comprises a short-distance wireless communication module for short-distance networking.
12. The security system of claim 11, wherein the short-range wireless communication module is configured to communicate via Wi-Fi, LoRa, Adhoc, or wireless Mesh.
13. The security system of claim 11, wherein one of the wireless terminals to which the plurality of security inspection machines correspond is configured as a control node of a post-networking local area network.
14. The security system of claim 11, wherein the plurality of security inspection machines are networked in a multipoint and multihop manner.
15. The security system of claim 14, wherein the plurality of security machines are divided into a plurality of substantially uniform number of groups.
16. The security system of claim 8, wherein the wireless terminal is installed in the security check machine.
17. A security inspection method, comprising:
obtaining security check data locally by a security check machine, wherein the security check machine is connected to a wireless terminal, and the wireless terminal is wirelessly accessed to a telecommunication network;
sending the security check data to a remote image judging center via the telecommunication network; and
receiving feedback information from a mapping center via the telecommunications network.
18. The method of claim 17, wherein the telecommunications network comprises 5G or LTE.
19. The method of claim 17, wherein the wireless terminal accesses the telecommunications network through a VPN.
20. The method of claim 17, wherein the wireless terminal accesses the telecommunications network through an internet of things channel of the telecommunications network.
21. The method of claim 17, wherein the wireless terminal accesses a cloud service node provided by a cloud service provider through the telecommunications network.
22. The method of claim 21, wherein the cloud service node is connected to a backbone network through an access gateway and establishes a network connection with the predicate graph center through the backbone network.
23. The method of claim 22, wherein the cloud service node includes a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
24. The method of claim 17, wherein the wireless terminal comprises:
monitoring means configured to monitor whether an abnormality exists.
25. The method of claim 24, wherein switching the security check machine to a local mode is prompted when the monitoring device detects an anomaly.
26. The method according to claim 17, wherein the security check machine is a plurality of security check machines, and the wireless terminal corresponding to each security check machine comprises a short-range wireless communication module for short-range networking.
27. The method of claim 26, wherein the means of communication of the short-range wireless communication module comprises Wi-Fi, LoRa, Adhoc, or wireless Mesh.
28. The method of claim 26, wherein one of the wireless terminals to which the plurality of security inspection machines correspond is configured as a control node of a post-networking local area network.
29. The method of claim 26, wherein the plurality of security checkpoints are networked in a multipoint and multihop manner.
30. The method of claim 29, wherein the plurality of security inspection machines are divided into a plurality of substantially uniform numbers of groups.
31. An electronic device, comprising:
a processor; and
a memory for storing one or more programs,
wherein the one or more programs, when executed by the processor, cause the processor to implement the method of any of claims 17-30.
32. A computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement the method of any one of claims 17-30.
CN202010718257.6A 2020-07-23 2020-07-23 Wireless terminal arranged at security check point, security check system and security check method Active CN113973355B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010718257.6A CN113973355B (en) 2020-07-23 2020-07-23 Wireless terminal arranged at security check point, security check system and security check method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010718257.6A CN113973355B (en) 2020-07-23 2020-07-23 Wireless terminal arranged at security check point, security check system and security check method

Publications (2)

Publication Number Publication Date
CN113973355A true CN113973355A (en) 2022-01-25
CN113973355B CN113973355B (en) 2023-05-09

Family

ID=79585369

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010718257.6A Active CN113973355B (en) 2020-07-23 2020-07-23 Wireless terminal arranged at security check point, security check system and security check method

Country Status (1)

Country Link
CN (1) CN113973355B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115567415A (en) * 2022-12-02 2023-01-03 成都智元汇信息技术股份有限公司 Degradation state trigger centralized graph judging system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204926116U (en) * 2015-04-21 2015-12-30 同方威视技术股份有限公司 Picture system is declared in safety inspection containing video analysis
CN206725472U (en) * 2017-01-25 2017-12-08 同方威视技术股份有限公司 Safety check system
CN110749934A (en) * 2019-10-15 2020-02-04 北京中盾安民分析技术有限公司 Automatic matching remote centralized interpretation system and method for intelligent passage of travel inspection
CN210465708U (en) * 2019-08-19 2020-05-05 同方威视技术股份有限公司 Security check equipment
CN211791493U (en) * 2020-05-29 2020-10-27 同方威视技术股份有限公司 Security check system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204926116U (en) * 2015-04-21 2015-12-30 同方威视技术股份有限公司 Picture system is declared in safety inspection containing video analysis
CN206725472U (en) * 2017-01-25 2017-12-08 同方威视技术股份有限公司 Safety check system
CN210465708U (en) * 2019-08-19 2020-05-05 同方威视技术股份有限公司 Security check equipment
CN110749934A (en) * 2019-10-15 2020-02-04 北京中盾安民分析技术有限公司 Automatic matching remote centralized interpretation system and method for intelligent passage of travel inspection
CN211791493U (en) * 2020-05-29 2020-10-27 同方威视技术股份有限公司 Security check system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115567415A (en) * 2022-12-02 2023-01-03 成都智元汇信息技术股份有限公司 Degradation state trigger centralized graph judging system
CN115567415B (en) * 2022-12-02 2023-03-10 成都智元汇信息技术股份有限公司 Degradation state trigger centralized graph judging system

Also Published As

Publication number Publication date
CN113973355B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
KR102231737B1 (en) A system and method for managing connectivity in a network of moving objects
US11032395B2 (en) Systems and methods for distributed update of software in a network of moving things
KR102168569B1 (en) System and method for managing mobility in a network of moving things
CN114301784B (en) Method and device for constructing network target range training environment, electronic equipment and storage medium
CN108156231A (en) The fault car and method of server communication, vehicle and server
US11595259B2 (en) Multi-mode fixed access point for utilization in a communication network of moving things, for example including autonomous vehicles
US10110443B2 (en) Systems and methods for interfacing with a user of a network of moving things
US10327160B2 (en) Systems and methods for managing network controllers and their network interactions in a network of moving things, for example including a network of autonomous vehicles
US10993126B2 (en) Systems and methods for allocating network controllers in a network of moving things, for example including a network of autonomous vehicles
US10764736B2 (en) Methods and systems for improving reliability of critical and location-aware messages by using multiple technologies in a network of moving things
JP2018531562A6 (en) Communication network for moving objects
US20210360714A1 (en) Enhanced femtocell with on-premise private network slice controller and multi-access edge computing service
WO2019195413A1 (en) End-to-end control and management in a network of moving things that may include, for example, autonomous vehicles
CN113973355B (en) Wireless terminal arranged at security check point, security check system and security check method
EP2139275B1 (en) System and method to deterministically and dynamically prevent interference to the operation of safety critical radio equipment
US10555144B2 (en) Systems and methods for inter-node and/or inter-application communication in a network of moving things, for example including autonomous vehicles
CN109104484A (en) Student&#39;s method for managing and monitoring and device
EP3947231B1 (en) Method and system for commissioning of a communication gateway
US11871443B1 (en) Public stewardship entity wireless communication network portal
US20240113934A1 (en) Network resiliency and impact coordination
KR20230082537A (en) Device gateway apparatus
KR20240096598A (en) Resource determination methods, devices, instruments and storage media
KR20160125152A (en) Method routing sensor node of sensor network system inside ship

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant