CN113973355B - Wireless terminal arranged at security check point, security check system and security check method - Google Patents
Wireless terminal arranged at security check point, security check system and security check method Download PDFInfo
- Publication number
- CN113973355B CN113973355B CN202010718257.6A CN202010718257A CN113973355B CN 113973355 B CN113973355 B CN 113973355B CN 202010718257 A CN202010718257 A CN 202010718257A CN 113973355 B CN113973355 B CN 113973355B
- Authority
- CN
- China
- Prior art keywords
- security
- security inspection
- wireless terminal
- network
- security check
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 50
- 238000007689 inspection Methods 0.000 claims description 95
- 238000004891 communication Methods 0.000 claims description 26
- 238000012806 monitoring device Methods 0.000 claims description 19
- 230000006855 networking Effects 0.000 claims description 17
- 230000015654 memory Effects 0.000 claims description 11
- 230000005856 abnormality Effects 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 21
- 230000006870 function Effects 0.000 description 19
- 230000005540 biological transmission Effects 0.000 description 12
- 238000012545 processing Methods 0.000 description 9
- 230000011664 signaling Effects 0.000 description 9
- 238000004590 computer program Methods 0.000 description 8
- 238000010276 construction Methods 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/18—Selecting a network or a communication service
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V5/00—Prospecting or detecting by the use of ionising radiation, e.g. of natural or induced radioactivity
- G01V5/20—Detecting prohibited goods, e.g. weapons, explosives, hazardous substances, contraband or smuggled objects
- G01V5/22—Active interrogation, i.e. by irradiating objects or goods using external radiation sources, e.g. using gamma rays or cosmic rays
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- High Energy & Nuclear Physics (AREA)
- Life Sciences & Earth Sciences (AREA)
- General Life Sciences & Earth Sciences (AREA)
- General Physics & Mathematics (AREA)
- Geophysics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present disclosure provides a wireless terminal deployed at a security checkpoint, comprising: a control module configured to control wireless access of the wireless terminal to the telecommunications network; the sending module is configured to send security check data to a remote graph judging center through a telecommunication network; a receiving module configured to receive feedback information from the decision center via the telecommunications network.
Description
Technical Field
The present disclosure relates to the field of security inspection, and more particularly to a wireless terminal deployed at a security inspection point, a security inspection system deployed at a security inspection point, a security inspection method, an electronic device, and a computer-readable storage medium.
Background
At present, security inspection has become an important means for ensuring the safe performance of activities of people. When security support is required for conducting important activities (e.g., major events, important conferences, etc.) in a city, it is often necessary to temporarily delegate personnel and other security personnel to perform local security tasks in conjunction with a security machine. When an administrative service unit (e.g., court, prison, etc.) of a city needs to deploy security points, it is necessary to individually arrange some security personnel to the corresponding security points for security work, since no turn is performed for the security team of the administrative service unit.
For the security inspection situation of temporary delegation, the scheduling of the diagrammer is inconvenient due to the temporary property of the security inspection situation, and the cost is high; when the temporarily delegated diagrammer is not from a full-time security check team, the working level of the temporarily delegated diagrammer cannot be guaranteed, so that the security check quality cannot be guaranteed. For the security inspection situation of the administrative service units, because the image judgment requirement of the administrative service units is small in scale, the number of security inspection personnel is not required to be large (usually 1-2 persons), so that the cost of the image judgment personnel is higher than that of the hired image judgment personnel if the image judgment personnel are set in full time; in addition, the security check points are idle most of the time, and the local graph judgment staff is set under the condition of no high-flow service requirement, so that the graph judgment resource is wasted.
Although some security inspection points may have the capability of performing image judgment by using Artificial Intelligence (AI), due to the complexity of security inspection scanning images, the accuracy of the artificial intelligence in identifying details is not high, so that the identification technology of suspects is not mature enough, and therefore, professional image judgment staff still cannot be replaced. In the security industry, the professional ability of the diagnostician is an integral part.
Therefore, a wireless terminal, a security inspection system and a security inspection method capable of coping with temporary deployment and smaller-scale graph judgment requirements to replace the original local scheme, reducing cost and improving graph judgment quality and efficiency are needed.
Disclosure of Invention
In view of the above, the present invention provides a wireless terminal, a security inspection system, a security inspection method, an electronic device and a computer readable storage medium for disposing at security inspection points, so as to cope with temporary deployment and smaller-scale graph judgment requirements, replace the original local scheme, and reduce cost and improve quality and efficiency of graph judgment.
According to one aspect of exemplary embodiments of the present disclosure, there is provided a wireless terminal disposed at a security check point, including: a control module configured to control wireless access of the wireless terminal to the telecommunications network; the sending module is configured to send security check data to a remote graph judging center through a telecommunication network; a receiving module configured to receive feedback information from the decision center via the telecommunications network.
According to embodiments of the present disclosure, a telecommunications network may comprise 5G or LTE.
According to an embodiment of the present disclosure, the control module may be configured to control the wireless terminal to access the telecommunication network through the VPN.
According to embodiments of the present disclosure, the control module may be configured to control the wireless terminal to access the telecommunication network through an internet of things channel of the telecommunication network.
According to embodiments of the present disclosure, the control module may be configured to control the wireless terminal to access a cloud service node provided by a cloud facilitator via a telecommunication network.
According to an embodiment of the present disclosure, a cloud service node may be connected to a backbone network through an access network, and establish a network connection with a graph center through the backbone network.
According to embodiments of the present disclosure, a cloud service node may include a firewall associated therewith to ensure secure access to a backbone network through an access gateway.
According to one aspect of exemplary embodiments of the present disclosure, there is provided a security inspection system disposed at a security inspection point, including: the security inspection machine comprises a scanning device and a scanning device, wherein the scanning device is configured to scan a security inspection object to obtain security inspection data; and the wireless terminal.
According to an embodiment of the present disclosure, the security inspection system may further include: and a monitoring device configured to monitor whether an abnormality exists.
According to embodiments of the present disclosure, switching of the security check machine to the local mode may be prompted when the monitoring device detects an anomaly.
According to the embodiment of the disclosure, a plurality of security check machines are arranged in the security check point, and the wireless terminal corresponding to each security check machine can comprise a close-range wireless communication module for close-range networking.
According to an embodiment of the present disclosure, the communication manner of the short-range wireless communication module may be one of Wi-Fi, loRa, adhoc or wireless Mesh.
According to embodiments of the present disclosure, one of the wireless terminals corresponding to the plurality of security check machines may be configured as a control node of the local area network after networking.
According to embodiments of the present disclosure, multiple security check machines may be networked in a multi-point, multi-hop manner.
According to embodiments of the present disclosure, the plurality of security check machines may be divided into a number of substantially uniform groups.
According to embodiments of the present disclosure, a wireless terminal may be installed in a security check machine.
According to another aspect of the exemplary embodiments of the present disclosure, there is provided a security inspection method, including: the method comprises the steps that security inspection data are obtained locally through a security inspection machine, wherein the security inspection machine is connected to a wireless terminal, and the wireless terminal is wirelessly accessed to a telecommunication network; sending security check data to a remote graph judging center through a telecommunication network; and receiving feedback information from the decision center via the telecommunications network.
According to embodiments of the present disclosure, a telecommunications network may comprise 5G or LTE.
According to embodiments of the present disclosure, a wireless terminal may access a telecommunications network through a VPN.
According to embodiments of the present disclosure, a wireless terminal may access a telecommunications network through an internet of things channel of the telecommunications network.
According to embodiments of the present disclosure, a wireless terminal may access a cloud service node provided by a cloud facilitator through a telecommunications network.
According to an embodiment of the present disclosure, a cloud service node may be connected to a backbone network through an access network, and establish a network connection with a graph center through the backbone network.
According to embodiments of the present disclosure, a cloud service node may include a firewall associated therewith to ensure secure access to a backbone network through an access gateway.
According to an embodiment of the present disclosure, a wireless terminal may include:
and a monitoring device configured to monitor whether an abnormality exists.
According to embodiments of the present disclosure, switching of the security check machine to the local mode may be prompted when the monitoring device detects an anomaly.
According to the embodiment of the disclosure, the security inspection machine can be a plurality of security inspection machines, and the wireless terminal corresponding to each security inspection machine comprises a close-range wireless communication module for close-range networking.
According to an embodiment of the present disclosure, the communication manner of the short-range wireless communication module may be one of Wi-Fi, loRa, adhoc or wireless Mesh.
According to embodiments of the present disclosure, one of the wireless terminals corresponding to the plurality of security check machines may be configured as a control node of the local area network after networking.
According to embodiments of the present disclosure, multiple security check machines may be networked in a multi-point, multi-hop manner.
According to embodiments of the present disclosure, the plurality of security check machines may be divided into a number of substantially uniform groups.
According to another aspect of exemplary embodiments of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing one or more programs, wherein the one or more programs, when executed by the processor, cause the processor to implement the methods described above.
According to another aspect of exemplary embodiments of the present disclosure, a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement the above-described method is provided.
Through the wireless terminal, the security inspection system, the security inspection method, the electronic equipment and the computer readable storage medium which are arranged at the security inspection point, the invention can fully utilize the graph judgment resources of the centralized graph judgment system to solve the temporary graph judgment resource requirement and the small quantity of graph judgment resource requirement, obviously reduce the personnel cost and improve the quality and the efficiency of graph judgment.
The invention is not limited by physical space, any security check point of cities and regions covered by a telecommunication network can be accessed to the centralized graph judging system, and remote graph judging service is integrated, so that the security check service which is originally scattered in each place and is independent has networking capability.
The invention can complete the integrated transformation of the security check points without construction or with a small amount of construction, so that the security check points form network connection in a plug-and-play mode, and the security check points are connected into an integrated service system, thereby effectively controlling the construction cost.
Drawings
The foregoing and other embodiments and features of the present disclosure will become more apparent by describing in detail embodiments thereof with reference to the attached drawings in which:
fig. 1 schematically illustrates a system architecture diagram of a wireless terminal deployed at a security checkpoint in accordance with an embodiment of the present disclosure;
FIG. 2 schematically illustrates a block diagram of a wireless terminal deployed at a security checkpoint in accordance with an embodiment of the present disclosure;
FIG. 3 schematically illustrates a block diagram of a security inspection system deployed at a security inspection point in accordance with an embodiment of the present disclosure;
fig. 4 schematically illustrates a system architecture diagram of a wireless terminal in a security checkpoint implementing remote decision making by accessing a cloud service node according to an embodiment of the present disclosure;
fig. 5 schematically illustrates a system diagram for networking by multiple security check machines to access cloud service nodes with respect to fig. 4, in accordance with an embodiment of the present disclosure;
FIG. 6 schematically illustrates a process flow diagram when a network anomaly occurs with respect to FIG. 4, in accordance with an embodiment of the present disclosure;
Fig. 7 schematically illustrates a forward data flow diagram for a wireless terminal in the security checkpoint of fig. 4 implementing a remote decision by accessing a cloud service node in accordance with an embodiment of the present disclosure;
FIG. 8 schematically illustrates a flow chart of a security inspection method according to an embodiment of the disclosure; and
fig. 9 schematically illustrates a block diagram of an electronic device adapted to implement a security method according to an embodiment of the disclosure.
Detailed Description
Specific embodiments of the invention will be described in detail below, it being noted that the embodiments described herein are for illustration only and are not intended to limit the invention. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: no such specific details are necessary to practice the invention. In other instances, well-known circuits, materials, or methods have not been described in detail in order not to obscure the invention.
Throughout the specification, references to "one embodiment," "an embodiment," "one example," or "an example" mean: a particular feature, structure, or characteristic described in connection with the embodiment or example is included within at least one embodiment of the invention. Thus, the appearances of the phrases "in one embodiment," "in an embodiment," "one example," or "an example" in various places throughout this specification are not necessarily all referring to the same embodiment or example. Furthermore, the particular features, structures, or characteristics may be combined in any suitable combination and/or sub-combination in one or more embodiments or examples.
It will be understood that when an element is referred to as being "coupled" or "connected" to another element, it can be directly coupled or connected to the other element or intervening elements may be present. In contrast, when an element is referred to as being "directly coupled to" or "directly connected to" another element, there are no intervening elements present.
Furthermore, the term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
It will be understood that a noun in the singular, corresponding to a term, may include one or more things, unless the context clearly indicates otherwise. As used herein, each of the phrases such as "a or B", "at least one of a and B", "at least one of a or B", "A, B or C", "at least one of A, B and C", and "at least one of A, B or C" may include all possible combinations of items listed with a corresponding one of the plurality of phrases. As used herein, terms such as "1 st" and "2 nd" or "first" and "second" may be used to simply distinguish one element from another element and not to limit the element in other respects (e.g., importance or order).
As used herein, the term "module" may include units implemented in hardware, software, or firmware, and may be used interchangeably with other terms (e.g., "logic," "logic block," "portion" or "circuitry"). A module may be a single integrated component adapted to perform one or more functions or a minimal unit or portion of the single integrated component. For example, according to an embodiment, a module may be implemented in the form of an Application Specific Integrated Circuit (ASIC).
It should be understood that the various embodiments of the disclosure and the terminology used therein are not intended to limit the technical features set forth herein to the particular embodiments, but rather include various modifications, equivalents or alternatives to the respective embodiments. Unless otherwise specifically defined herein, all terms are to be given their broadest possible interpretation, including the meanings implied in the specification as well as the meanings understood by those skilled in the art and/or defined in dictionaries, papers, and the like.
Moreover, those of ordinary skill in the art will appreciate that the drawings are provided herein for illustrative purposes and that the drawings are not necessarily drawn to scale. For the description of the drawings, like reference numerals may be used to refer to like or related elements. The present disclosure will be exemplarily described below with reference to the accompanying drawings.
Fig. 1 schematically illustrates a system architecture diagram 1000 of a wireless terminal deployed at a security checkpoint in accordance with an embodiment of the present disclosure.
Referring to fig. 1, a system architecture diagram 1000 of a wireless terminal may include a security check object 1020, a security check machine 1010, a wireless terminal 1040, and a decision center 1030.
The wireless terminal 1040 may access the telecommunications network wirelessly and communicate with the decision center 1030 via the telecommunications network. The wireless terminal 1040 is connected to the security inspection machine 1010, and transmits security inspection data from the security inspection machine to the decision center 1030 via a telecommunication network.
The decision center 1030 is a centralized decision system that is remotely located with respect to the security check machine 1010. The graph judging center 1030 processes the received security check data and sends feedback information to the wireless terminal 1040 via the telecommunication network, and the wireless terminal 1040 further transmits the feedback information to the security check machine 1010.
The telecommunications network may comprise 5G or LTE or the like.
In an example embodiment, wireless terminal 1040 may access a telecommunications network through a VPN.
In an example embodiment, wireless terminal 1040 may access the telecommunications network through an internet of things channel of the telecommunications network.
In an example embodiment, wireless terminal 1040 may access a cloud service node provided by a cloud facilitator via a telecommunications network. The cloud service node can be connected to a backbone network through an access network, and establishes network connection with a graph judging center through the backbone network. The cloud service node may include a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
Fig. 2 schematically illustrates a block diagram of a wireless terminal 2000 deployed at a security checkpoint in accordance with an embodiment of the present disclosure.
Referring to fig. 2, a wireless terminal may be an example of wireless terminal 1040 described in fig. 1. The wireless terminal 2000 may include a control module 2010, a transmission module 2020, and a reception module 2030, as will be appreciated by those skilled in the art, other components may be added to the components of the wireless terminal 2000 or some of the components of the wireless terminal 2000 may be changed depending on the performance and structure of the wireless terminal 2000. For example, both the transmission module 2020 and the reception module 2030 shown in fig. 2 may be combined into a communication module.
The control module 2010 may be configured to control wireless access of the wireless terminal to the telecommunications network wirelessly. The transmission module 2020 may be configured to transmit the security check data to a remote decision center via a telecommunications network. The receiving module 2030 may be configured to receive feedback information from the decision center via a telecommunications network. Further, the control module 2010 may be further configured to control a transmitting operation performed in the transmitting module and a receiving operation performed in the receiving module.
In an exemplary embodiment, the control module 2010 may be configured to control the wireless terminal to access the telecommunications network through the VPN.
In an exemplary embodiment, the control module 2010 may be configured to control access of the wireless terminal to the telecommunications network through an internet of things channel of the telecommunications network.
In an exemplary embodiment, the control module 2010 may be configured to control the wireless terminal to access a cloud service node provided by a cloud service provider through a telecommunication network.
Fig. 3 schematically illustrates a block diagram of a security inspection system deployed at a security inspection point in accordance with an embodiment of the present disclosure.
Referring to fig. 3, the security inspection system 3000 may include a security inspection machine 3080, a wireless terminal 3030, a display device 3020, an input device 3050, a storage device 3040, a controller 3010, and a monitoring device 3070. The security system illustrated in fig. 3 is only one example and should not be construed as limiting the functionality and scope of use of the disclosed embodiments.
The security check machine 3080 may include a scanning device 3060. The scanning device 3060 performs scanning in the security check machine 3080. Scanning device 3060 may scan a security check object. The scanning device 3060 may be, for example, an X-ray machine that scans with X-rays. By performing a scan of the security check object, the scanning device 3060 may acquire security check data. For example, the security data may be image information related to the security object.
Note that the security inspection machine 3080 is not limited to include only the scanning device 3060, and the devices shown in the above security inspection system, other devices not shown, or any combination thereof may be formed as part of the security inspection machine 3080. For example, the security check machine 3080 may also include a wireless terminal 3030, that is, the wireless terminal 3030 may be installed within the security check machine 3080.
A wireless terminal 3030 is used in security system 3000 to enable the security system to access a telecommunications network in order to establish wireless communication with the telecommunications network. For example, the wireless terminal 3030 may access the base station first and then the telecommunications network through the base station.
In addition, the wireless terminal 3030 shown in fig. 3 is similar to the wireless terminal described in fig. 1, 2, and thus additional description thereof is omitted to avoid redundancy.
The display device 3020 outputs display data in the security inspection system 3000. The display device 3020 may include a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, an Organic Light Emitting Diode (OLED) display, a microelectromechanical system (MEMS) display, and the like. The display data may be, for example, security check data acquired by the scanning device, result data after processing the security check data, feedback information received from a graph judging center, or the like.
The input device 3050 generates input data in the security inspection system 3000. Input device 3050 may generate input data from user input of the security system. In addition, the input device 3050 may include at least one input device. The input device 3050 may include a keypad, dome switch, physical button, touch panel, joystick and knob, sensor, and the like. In this case, the input device 3050 may be implemented as a touch screen by being coupled with a display unit.
The storage device 3040 may store an operation program of the security inspection system 3000. In this case, the storage device 3040 may store a plurality of functions. Herein, the functions may include, for example, a scanning function, a detection function, a radio access function, and an event management function. Further, the storage device 3040 may store data generated when the program is executed. In this case, the storage device 3040 may store security check data acquired by scanning, result data after processing the security check data, feedback information received from a judgment center, or the like.
The controller 3010 controls overall operation in the security system 3000. The controller 3010 may perform a plurality of functions, such as a scan function, a detection function, and an event management function. In addition, the controller 3010 may control the wireless terminal to transmit security check data to a remote graph judging center via a telecommunication network and receive feedback information from the graph judging center. The controller 3010 may also prompt to switch the security check machine to a local mode when the monitoring device detects an anomaly.
It should be noted that the security inspection system is not limited to the above-mentioned device, and the above-mentioned device may be a single device or any combination thereof, which is not limited by the present invention.
Fig. 4 schematically illustrates a system architecture diagram of a wireless terminal in a security checkpoint implementing remote decision making by accessing a cloud service node according to an embodiment of the present disclosure. The system architecture 4000 may include a cloud 4010, security checkpoints 4020a-4020c, and decision centers 4030a-4030b.
Each of the security checkpoints 4020a-4020c may include a plurality of security check machines. In this case, the wireless terminal corresponding to each security check machine may further include a short-range wireless communication module for short-range networking. The communication mode of the short-range wireless communication module can be one of Wi-Fi, loRa, adhoc or wireless Mesh. A plurality of security check machines in each security check point can be networked through the corresponding wireless terminals.
In an example embodiment, multiple security check machines in each security check point may be networked in a multi-hop manner. In this way, the security check point access network is more flexible and the established local area network is easily expanded. In addition, the multi-hop network has the capability of adapting fault recovery and load balancing, and has stronger anti-interference capability.
In an example embodiment, when the number of security check machines is large, to maintain as few long connection links as possible, the plurality of security check machines may be divided into a number of substantially uniform groups. The n security check machines are divided into m groups, and each group at least covers n/m security check machines. If n mod m (n/m remainder) is greater than zero, the security check machines with remainder numbers are randomly dispersed into k (k < m) groups, and each group is allocated with 1.
In an example embodiment, one of the wireless terminals corresponding to the plurality of security check machines in each security check point may be configured as a control node of the local area network after networking. The control nodes can be elected by means of random, voting and the like. For example, the wireless terminal 4024a corresponding to the security check machine 4022a may be used as a control node of the lan of the security check point 4020a, the wireless terminal 4024b corresponding to the security check machine 4022b may be used as a control node of the lan of the security check point 4020b, and the wireless terminal 4024c corresponding to the security check machine 4022c may be used as a control node of the lan of the security check point 4020 c. For ease of description, the security inspection machine and its corresponding wireless terminal are shown in the manner shown in fig. 4, but the positional relationship between the two is not limited thereto.
The security check machine in each security check point can access the telecommunications network through the wireless terminal of the control node to establish wireless communication with the telecommunications network. For example, a wireless terminal may access a network provided by a network operator (such as china mobile, china corporation, china telecommunications, etc.). In this case, the wireless terminal may further include a terminal mobile communication module and a network operator mobile data card.
In the security point, the wireless terminal of the control node communicates with the telecommunication network, so that the local area network after networking and the telecommunication network keep a long connection link, the occupation and the flow of the link can be saved, and the advantage of the link is fully utilized.
It should be noted that the present invention is not limited to the networking mode, and any networking mode that can realize network connection of a plurality of security check machines is suitable for the present invention.
It should be noted that fig. 4 describes a security check point including a plurality of security check machines, however, the security check point may also include only one security check machine, and a wireless terminal corresponding to the security check machine may be used as a control node to access the telecommunication network.
The telecommunications network may comprise 5G or LTE. Compared with the 4G network, the 5G network has the characteristics of small influence of link fluctuation and low transmission delay. It should be noted that if a dedicated channel is occupied, the 5G will take the risk of transmission delay as in the 4G network. To cope with this risk, the network may be monitored to prevent traffic interruption due to network anomalies, as will be described below.
In an example embodiment, the wireless terminal of the control node may access the telecommunications network through the VPN, thereby securing the data link, ensuring that the data is complete and non-tamperable.
In an example embodiment, the wireless terminal of the control node may access the telecommunications network through an internet of things channel of the telecommunications network. In this way, congestion of the air space channel (i.e., the network data connection information channel provided by the network operator) can be prevented, access and transmission performance can be ensured, and thus, higher-speed and reliable data transmission quality than that of a common civil channel can be provided.
The security check machine in the security check point can access to a cloud service node provided by a cloud service provider through a wireless terminal of the control node via a telecommunication network. The cloud service node 4012a, 4012b, or 4012c may be configured to process security data received from the security check machine and perform an operation on the processed security check data.
In an example embodiment, the security check point 4020a, 4020b or 4020c connects a security check agent service deployed on a Virtual Machine (VM) resource of a machine room through the machine room provided by the cloud service and closer to the security check point as a physical access node. The security check point proxy service not only maps most of service data of security check point transmission interaction, but also performs a lot of optimization on functions corresponding to the services.
Specifically, the cloud service node 4012a, 4012b, or 4012c may process (e.g., format convert, etc.) the security check data received from the security check point according to a requirement of the security check point or a business logic requirement, etc., so as to perform a subsequent operation on the security check data. The cloud service node 4012a, 4012b or 4012c is used as a full-function avatar of the security inspection point, and the agent security inspection point supports the comprehensive performance optimization from software to hardware in the network system through data processing, business logic and the like, so that the security inspection efficiency is greatly improved.
After processing security data received from the security point, the cloud service node performs operations on the processed security data including: when the processed security data accords with the preset condition, the processed security data is transmitted to the graph judging center 4030a or 4030b through the access gateway 4014; and when the processed security check data does not accord with the preset condition, blocking the processed security check data so as not to further transmit the security check data. By the method, security check data received by the cloud service node can be filtered, and the attack of lawless persons by means of springboards and the like is avoided.
In an exemplary embodiment, the preset condition may be a rule set up on a white list. The rules may be established for certain access terminal identification identities, IP addresses, port numbers, and only data from a given access terminal, or sent to a given port of a receiving end (e.g., of an integrated service system), can be allowed to pass if the rules are satisfied; or the rule may be established for the format of the data itself or the authentication information carried, and the data is allowed to pass only if the rule is satisfied. The whitelist may typically be data filtered by the location of the firewall. For example, a firewall may be provided with a whitelist to filter data.
It should be noted that, the firewall shown in fig. 4 may be set up on any side of the cloud service node or the access gateway, or may be set up on both sides, and the port number and the data list are filtered corresponding to some outbound and inbound rules.
The cloud service node can be connected to a backbone network through an access network, and establishes network connection with a graph judging center through the backbone network. In an exemplary embodiment, when the processed security data meets a preset condition, the processed security data is transmitted to the graph judging center 4030a or 4030b through the access gateway 4014 by using a high-priority signaling of the cloud service provider on the backbone network. In an exemplary embodiment, the preset condition may be a rule set up on a white list. Specifically, the backbone network can treat different signaling differently according to the data format of the signaling and the data tag carried by the signaling, so that the signaling has different transmission priorities. In this context, the high priority signaling is purchased by public cloud manufacturers to network operators, and the signaling with high transmission priority is owned in the backbone network, so that the transmission can be completed quickly and efficiently, and the data timeliness is guaranteed.
In an exemplary embodiment, after the processed security check data reaches the access gateway 4014, the high priority signaling labels of the cloud service provider on the backbone network are utilized for transmission to reach the graph judging center 4030a or 4030b at a faster speed than the normal signaling labels.
The graph centers 4030a-4030b may be examples of a centralized graph system, which may be one of the integrated business systems. The cities or regions in which the decision centers 4030a-4030b are located may be different cities or regions (or may be the same cities or regions) than the cities or regions in which the security check points 4020a-4020c are located. The professional diagramming staff of the diagramming center can accurately and rapidly give the diagramming result, and the original path of the path when the path comes from returns to the security check point.
In addition, in order to prevent interruption of service due to network abnormality caused by phenomena such as channel occupation, signal interference, and the like, the wireless terminal corresponding to each of the security check machines within the security check points 4020a to 4020c may be provided with a monitoring device configured to monitor whether or not there is a network abnormality. In addition, the monitoring device may also be used to monitor for equipment anomalies, and the like.
In an exemplary embodiment, when the monitoring device detects the presence of an anomaly, an alarm may be activated to alert the security checkpoint operator to switch to the local mode.
In an exemplary embodiment, software/hardware for encrypting the watchdog function may be installed for each wireless terminal corresponding to each security check machine within security check points 4020a-4020c for monitoring one or more indicators of the security check points.
It should be noted that, the integrated service system herein includes, but is not limited to, a centralized graph judging system, and any relevant security check point networking integrated function can be realized by the present invention.
Fig. 5 schematically illustrates a system diagram of the networking by multiple security check machines to access cloud service nodes of fig. 4, in accordance with an embodiment of the present disclosure.
Fig. 5 depicts a security check point 4020b in fig. 4 as an example. The security check point 4020b may include security check machines 5010a, 5010b, and 4022b. The wireless terminals 5012a, 5012b and 4024b corresponding to the security check machines 5010a, 5010b and 4022b are networked in a Wi-Fi, loRa, adhoc or wireless Mesh mode through respective short-range wireless communication modules, and the security check machines 5010a, 5010b and 4022b are connected to a telecommunication network through the wireless terminal 4024b configured as a control node, and then connected to the cloud 4010.
Other aspects of fig. 5 are similar to the description above with reference to fig. 4, so additional description thereof is omitted to avoid redundancy.
Fig. 6 schematically illustrates a process flow diagram when a network anomaly occurs, according to an embodiment of the present disclosure. Fig. 6 illustrates the security check point 4020b in fig. 4 as an example. Within the security check point 4020b, a wireless terminal configured as a control node (i.e., wireless terminal 4024b shown in fig. 4, 5, here covered) is equipped with a monitoring device, e.g., software/hardware that encrypts the watchdog function.
As shown in fig. 6, the monitoring device monitors whether there is an abnormality in the network. When a network anomaly occurs (6010), the watchdog monitoring identifies the anomaly (6020), and an alarm is started according to the identified result (6030). After receiving the alarm, the personnel at the security checkpoint switches the currently executing remote decision graph to local mode (6040).
Fig. 7 schematically illustrates a forward data flow diagram for a wireless terminal in the security checkpoint of fig. 4 to implement a remote decision graph by accessing a cloud service node in accordance with an embodiment of the present disclosure.
The wireless terminal 7010 (e.g., wireless terminals 4024a-4024c corresponding to security check machines 4022a-4022c in fig. 4) connects to the base station 7020 to establish wireless communication with the telecommunications network, and then the wireless terminal 7010 can access cloud service nodes 7030 (e.g., 4012a-4012c in fig. 4) in the cloud (e.g., 4010 in fig. 4) through the telecommunications network; the cloud service node 7030 processes the security data received from the security check machine, and the processed security check data is judged whether to conform to the rule set on the white list, if yes, the security check data is transmitted to the access gateway 7040 (for example, 4014 in fig. 4), and if no, the security check data is blocked 7050; finally, the security data is transmitted from the access gateway to a decision center 7070 (e.g., 4030a, 4030b in fig. 4) using a backbone 7060.
Fig. 8 schematically illustrates a flow chart of a security inspection method according to an embodiment of the disclosure. As shown in fig. 8, the security inspection method includes the following steps.
In 8010, security data is obtained locally through a security check machine, wherein the security check machine is connected to a wireless terminal, and the wireless terminal is wirelessly accessed to a telecommunication network;
in 8020, sending security data to a remote graph center via a telecommunications network; and
in 8030, feedback information is received from the decision center via the telecommunications network.
In an exemplary embodiment, the telecommunications network may comprise 5G or LTE.
In an exemplary embodiment, the wireless terminal may access the telecommunications network through a VPN.
In an exemplary embodiment, the wireless terminal may access the telecommunications network through an internet of things channel of the telecommunications network.
In an exemplary embodiment, the wireless terminal may access a cloud service node provided by a cloud facilitator through a telecommunications network.
In an exemplary embodiment, the cloud service node may be connected to a backbone network through an access network and establish a network connection with a graph center through the backbone network.
In an exemplary embodiment, the cloud service node may include a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
In an exemplary embodiment, a wireless terminal may include: and a monitoring device configured to monitor whether an abnormality exists.
In an exemplary embodiment, the security check machine may be prompted to switch to the local mode when the monitoring device detects an anomaly.
In an exemplary embodiment, the security check machine may be a plurality of security check machines, and the wireless terminal corresponding to each security check machine includes a close-range wireless communication module for close-range networking.
In an exemplary embodiment, the short-range wireless communication module may be one of Wi-Fi, loRa, adhoc or wireless Mesh.
In an exemplary embodiment, one of the wireless terminals corresponding to the plurality of security check machines may be configured as a control node of the local area network after networking.
In an exemplary embodiment, multiple security check machines may be networked in a multi-point, multi-hop manner.
In an exemplary embodiment, the plurality of security check machines may be divided into a number of substantially uniform groups.
According to the method provided by the embodiment of the disclosure, the security inspection machines in the security inspection points of different cities can be flexibly networked, and the existing network infrastructure is used for accessing the centralized graph judging system by using the telecommunication network, so that remote graph judging processing is realized under the condition of ensuring timeliness, the resource waste caused by temporary or small quantity of graph judging requirements is solved, the personnel cost is obviously reduced, and the quality and the efficiency of graph judging processing are improved.
For clarity and brevity, detailed descriptions of various embodiments of security methods are not repeated herein.
Fig. 9 schematically illustrates a block diagram of an electronic device adapted to implement the above-described security method according to an embodiment of the present disclosure. The electronic device shown in fig. 9 is merely an example, and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 9, an electronic device 9000 according to an embodiment of the present disclosure includes a processor 9010, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 9020 or a program loaded from a storage portion 9080 into a Random Access Memory (RAM) 9030. The processor 9010 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 9010 may also include on-board memory for caching purposes. The processor 9010 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flow according to embodiments of the present disclosure.
In the RAM 9030, various programs and data required for the operation of the electronic device 9000 are stored. The processor 9010, the ROM 9020, and the RAM 9030 are connected to each other through a bus 9040. The processor 9010 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 9020 and/or the RAM 9030. It is to be noted that the program may be stored in one or more memories other than the ROM 9020 and the RAM 9030. The processor 9010 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the disclosure, the electronic device 9000 may further comprise an input/output (I/O) interface 9050, the input/output interface (I/O) 9050 also being connected to the bus 9040. The electronic device 9000 may further comprise one or more of the following components connected to the 1/O interface 9050: an input portion 9060 including a keyboard, a mouse, and the like; an output portion 9070 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 9080 including a hard disk or the like; and a communication section 9090 including a network interface card such as a LAN card, a modem, or the like. The communication section 9090 performs communication processing via a network such as the internet. The drive 9100 is also connected to the I/O interface 9050 as needed. A removable medium 9110 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 9100 as needed, so that a computer program read out therefrom is mounted into the storage portion 9080 as needed.
According to embodiments of the present disclosure, the method flow according to embodiments of the present disclosure may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 9090, and/or installed from the removable medium 9110. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 9010. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 9020 and/or RAM 9030 described above and/or one or more memories other than ROM 9020 and RAM 9030.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.
Claims (28)
1. A wireless terminal deployed at a security checkpoint, comprising:
a control module configured to control the wireless terminal to wirelessly access a telecommunications network;
a sending module configured to send security check data to a remote graph judging center via the telecommunication network;
a receiving module configured to receive feedback information from a decision center via the telecommunications network,
wherein the control module is configured to control the wireless terminal to access a cloud service node provided by a cloud service provider through the telecommunication network,
wherein the cloud service node is connected to a backbone network through an access network connection, and establishes network connection with the graph judging center through the backbone network,
And the cloud service node is used as a full-function avatar of the security inspection point to process the security inspection data, and when the processed security inspection data accords with preset conditions, the processed security inspection data is transmitted to the graph judging center.
2. The wireless terminal of claim 1, wherein the telecommunications network comprises 5G or LTE.
3. The wireless terminal of claim 1, wherein the control module is configured to control the wireless terminal to access the telecommunications network over a VPN.
4. The wireless terminal of claim 1, wherein the control module is configured to control the wireless terminal to access the telecommunications network through an internet of things channel of the telecommunications network.
5. The wireless terminal of claim 1, wherein the cloud service node includes a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
6. A security inspection system deployed at a security inspection point, comprising:
the security inspection machine comprises a scanning device and a scanning device, wherein the scanning device is configured to scan a security inspection object to obtain security inspection data; and
the wireless terminal according to any of claims 1-5.
7. The security inspection system of claim 6, further comprising:
and a monitoring device configured to monitor whether an abnormality exists.
8. The security inspection system of claim 7, wherein switching the security inspection machine to a local mode is prompted when the monitoring device detects an anomaly.
9. The security inspection system according to claim 6, wherein a plurality of security inspection machines are arranged in the security inspection point, and the wireless terminal corresponding to each security inspection machine comprises a short-distance wireless communication module for short-distance networking.
10. The security inspection system of claim 9, wherein the communication mode of the close-range wireless communication module comprises Wi-Fi, loRa, adhoc or wireless Mesh.
11. The security inspection system of claim 9, wherein one of the wireless terminals to which the plurality of security inspection machines correspond is configured as a control node of a post-networking local area network.
12. The security inspection system of claim 9, wherein the plurality of security inspection machines are networked in a multi-point, multi-hop manner.
13. The security inspection system of claim 12, wherein the plurality of security inspection machines are divided into a number of substantially uniform groups.
14. The security inspection system of claim 6, wherein the wireless terminal is installed in the security inspection machine.
15. A security inspection method comprising:
the method comprises the steps that security inspection data are obtained locally through a security inspection machine, wherein the security inspection machine is connected to a wireless terminal, and the wireless terminal is wirelessly accessed to a telecommunication network;
transmitting the security check data to a remote graph judging center via the telecommunication network; and
receiving feedback information from a decision center via the telecommunications network,
wherein the wireless terminal accesses to a cloud service node provided by a cloud service provider through the telecommunication network,
wherein the cloud service node is connected to a backbone network through an access network connection, and establishes network connection with the graph judging center through the backbone network,
the cloud service node is used as a full-function avatar of the security inspection point to process the security inspection data, and when the processed security inspection data meets preset conditions, the processed security inspection data is transmitted to the graph judging center.
16. The method of claim 15, wherein the telecommunications network comprises 5G or LTE.
17. The method of claim 15, wherein the wireless terminal accesses the telecommunications network through a VPN.
18. The method of claim 15, wherein the wireless terminal accesses the telecommunications network through an internet of things channel of the telecommunications network.
19. The method of claim 15, wherein the cloud service node includes a firewall associated therewith to ensure secure access to the backbone network through the access gateway.
20. The method of claim 15, wherein the wireless terminal comprises:
and a monitoring device configured to monitor whether an abnormality exists.
21. The method of claim 20, wherein switching the security check machine to a local mode is prompted when the monitoring device detects an anomaly.
22. The method of claim 15, wherein the security check machine is a plurality of security check machines, and the wireless terminal corresponding to each security check machine comprises a short-range wireless communication module for short-range networking.
23. The method of claim 22, wherein the communication means of the short-range wireless communication module comprises Wi-Fi, loRa, adhoc or wireless Mesh.
24. The method of claim 22, wherein one of the wireless terminals to which the plurality of security check machines corresponds is configured as a control node of a post-networking local area network.
25. The method of claim 22, wherein the plurality of security check machines are networked in a multi-point, multi-hop manner.
26. The method of claim 25, wherein the plurality of security machines are divided into a plurality of substantially uniform sets.
27. An electronic device, comprising:
a processor; and
a memory for storing one or more programs,
wherein the one or more programs, when executed by the processor, cause the processor to perform the method of any of claims 15-26.
28. A computer readable storage medium having stored thereon executable instructions which when executed by a processor cause the processor to implement the method of any of claims 15-26.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010718257.6A CN113973355B (en) | 2020-07-23 | 2020-07-23 | Wireless terminal arranged at security check point, security check system and security check method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010718257.6A CN113973355B (en) | 2020-07-23 | 2020-07-23 | Wireless terminal arranged at security check point, security check system and security check method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113973355A CN113973355A (en) | 2022-01-25 |
CN113973355B true CN113973355B (en) | 2023-05-09 |
Family
ID=79585369
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010718257.6A Active CN113973355B (en) | 2020-07-23 | 2020-07-23 | Wireless terminal arranged at security check point, security check system and security check method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113973355B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115567415B (en) * | 2022-12-02 | 2023-03-10 | 成都智元汇信息技术股份有限公司 | Degradation state trigger centralized graph judging system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204926116U (en) * | 2015-04-21 | 2015-12-30 | 同方威视技术股份有限公司 | Picture system is declared in safety inspection containing video analysis |
CN206725472U (en) * | 2017-01-25 | 2017-12-08 | 同方威视技术股份有限公司 | Safety check system |
CN110749934A (en) * | 2019-10-15 | 2020-02-04 | 北京中盾安民分析技术有限公司 | Automatic matching remote centralized interpretation system and method for intelligent passage of travel inspection |
CN210465708U (en) * | 2019-08-19 | 2020-05-05 | 同方威视技术股份有限公司 | Security check equipment |
CN211791493U (en) * | 2020-05-29 | 2020-10-27 | 同方威视技术股份有限公司 | Security check system |
-
2020
- 2020-07-23 CN CN202010718257.6A patent/CN113973355B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN204926116U (en) * | 2015-04-21 | 2015-12-30 | 同方威视技术股份有限公司 | Picture system is declared in safety inspection containing video analysis |
CN206725472U (en) * | 2017-01-25 | 2017-12-08 | 同方威视技术股份有限公司 | Safety check system |
CN210465708U (en) * | 2019-08-19 | 2020-05-05 | 同方威视技术股份有限公司 | Security check equipment |
CN110749934A (en) * | 2019-10-15 | 2020-02-04 | 北京中盾安民分析技术有限公司 | Automatic matching remote centralized interpretation system and method for intelligent passage of travel inspection |
CN211791493U (en) * | 2020-05-29 | 2020-10-27 | 同方威视技术股份有限公司 | Security check system |
Also Published As
Publication number | Publication date |
---|---|
CN113973355A (en) | 2022-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3542566B1 (en) | Methods and apparatus for capturing and/or using packets to facilitate fault detection | |
US9509628B2 (en) | Managing devices in a heterogeneouus network | |
CN111031080B (en) | Message transmission method and device | |
CN111148105B (en) | Method and device for determining category information | |
CN111279742B (en) | Frequency spectrum sharing system for telecommunication network traffic | |
US9313773B2 (en) | Aircraft communications switching system | |
CN114301784B (en) | Method and device for constructing network target range training environment, electronic equipment and storage medium | |
CN108696424A (en) | Vehicle communication system | |
EP3148138B1 (en) | Communication apparatus, communication method, and communication system | |
CN112788060B (en) | Data packet transmission method and device, storage medium and electronic equipment | |
US20210360714A1 (en) | Enhanced femtocell with on-premise private network slice controller and multi-access edge computing service | |
US11228514B2 (en) | Network diagnosis method, cloud intelligent robot, network device and private network | |
JP2023502393A (en) | Systems and methods for multi-operator distributed antenna systems | |
US11665549B2 (en) | Dynamic cellular network spectrum sharing | |
US20180139099A1 (en) | Virtualized Networking Application and Infrastructure | |
US11381478B2 (en) | Intent based application fabric | |
CN113973355B (en) | Wireless terminal arranged at security check point, security check system and security check method | |
CN114401502B (en) | Configuration method, configuration device, electronic equipment and storage medium | |
US10236953B2 (en) | Packet capture grouping for MU-MIMO (multi-user / multiple input—multiple output) access points | |
CN112449377B (en) | Network data reporting method and device | |
CN112748704B (en) | Factory system and method | |
KR101695850B1 (en) | Sdn-based autonomic control and management system and method for large-scale virtual networks | |
KR20230082537A (en) | Device gateway apparatus | |
WO2022125200A2 (en) | Secondary operator integration with a cellular network | |
CN118741522A (en) | Communication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |