You are on page 1of 16

NO.

Item Category Product Name

Emergency command and


1 Application
Control system

Emergency Communication
2 Application
system

Emergency
3 Response Application
Disaster monitoring and
damage assessment system

Forest and grassland fire


4 Application
monitoring system

Intelligent Comprehensive
5 Application Security Management
System

6 Application Case investigation system

Target intelligent
7 Application
monitoring system

International call
8 Application monitoring and analysis
system

Precision positioning
9 Application
platform

Voice print recognition and


10 Application
monitoring system
Intelligence action
11 Application monitoring and analysis
system

Urban intelligent fire


12 Application
control monitoring system

Key areas video surveillance


13 Application
solution

Pubilc Traffic video surveillance


14 Application
Safety solution

15
Product Application
Facility video surveillance
solution

Prison video surveillance


16 Application
solution

Security and assurance


17 Product
solution

Communication network
18 Infrastructure
data acquisition

Video surveillance front-


19 Infrastructure
end deployment

Intelligent sensing front-end


20 Infrastructure
deployment

21 Infrastructure Data transmission

22 Infrastructure Data center solution

Command and control


23 Infrastructure
center integrated solution

24 Infrastructure Video cloud solution

25 Data service Data governance platform


Big data application service
26 Application platform
platform

27 Application Smart traffic

28 Application Smart Hospital

29 Application Smart education

Smart City
30 Application Smart facilities

31 Application Smart tourism

32 Application Smart prison

33 Application Smart taxation

34 NOC Application Network Operation System


35 Application Revenue Assurance

BSS

36 Application Billing System

Network Security
37 Application Intrusion Detection &
Control System

Network security situational


38 Application
awareness platform

Asset Safety Management


39 Application
system

SaaS cloud security service


40 Application
platform
IDC / ISP information
security management
41 Application
system

Mobile Internet Malware


42 Application
Monitoring System

Fraud and harassment call


prevention & control
43 Application
system

IoT Security Situational


44 Application
Awareness Platform

Network Information
45 Application Monitoring & Control
System

46 Application Data Security System


4A System(Identity and
47 Application
Access Management)

48 Hardware UCPE

Hardware
High precision time
49 Hardware
synchronization
Description
For dealing with emergency events such as major natural disasters, it is mainly used for
peacetime monitoring and early warning, training and exercise, wartime decision support,
command and rescue, and post-war risk assessment of emergency life-cycle management.

As for communication management administration, build a multi-level emergency


communication command system to realize ainterconnection, information sharing and safe
and unimpeded operation emergency command platform. To provide monitoring, alarm,
dispatch and decision support funcation.

Disaster monitoring and damage assessment system is geared to the needs of disaster
emergency response and rescue, disaster prevention and comprehensive decision-making
products, with satellite and remote sensing data, using the spectrum analysis, deep learning,
advanced technologies such as feature extraction, spatial analysis methods, form a real-time
disaster emergency monitoring products, and disaster loss quick assessment series products,
this product can through the cloud service or localized deployment pattern to provide disaster
monitoring and evaluation of losses
Forest and grassland fire monitoring system products use optical medium and high resolution
remote sensing images to dynamically monitor the location of forest and grassland fire, predict
the trend of fire by integrating meteorological factors, and conduct statistical analysis on the
area of fire. To provide forest fire monitoring, emergency command, early warning plan,
intelligent analysis, decision-making, and comprehensively improve the forest fire emergency
response support capacity. The product accuracy is not less than 90%.

Utilizing data from multi-sources such as MNO data, Internet data, video data, social data, etc.,
to provide solutions of intelligence monitoring and analysis for maintaining national public
stability, anti-terrorism, counterespionage, crime prevention and cases investigation.
The system can be combined with GIS visualization platform and big data processing
technology to analyze the target's time and space characteristics, and improves and builds
archival portraits of targets, and provides solutions for business units to conduct target
detection and control.
Collects target's data in the big data platform, focuses on the behaviors, trends, personnel
relations and social information of the key personnel, effectively filters out target personnel,
and adopts a scientific multi-dimensional and real-time alarm mechanism to implement
targeted classification and control measures.
Based on the monitoring of network elements in the mobile network to realize international
call identification, uses voiceprint, semantic analysis and other technologies to mine abnormal
behaviors and discover major security related content and effectively prevent major security
problems.
The platform integrates data from various data sources such as wireless measurement report
data, signaling data and Internet data. Able to utilize 10-meter precisian fingerprint database
technology, and combine with iterative learning, network structure, road regression, indoor
positioning, target’s direction and velocity, trajectory correction, and so on to form the big data
intelligent analysis algorithm for precise positioning.

Through the real-time acquisition and analysis of the voice and signaling of the
telecommunication network, combined with the artificial intelligence technology, the massive
voiceprint database and the key population voiceprint database are created, and then the
database will be further used for voice print recognition and verification for the specific
targets.
This system is designed for the scenario where senior intelligence officer will secretly meet
with the intelligent staff at the agreed time and at the agreed place, uses the operational
command platform to coordinate the relevant resources, real-time perception of relevant
situations, and realizes the adjustment and changes of the meeting when emergency happens
such as if the officers and staffs are being spied.
This platform takes the functions of urban IoT fire remote monitoring and high-rise residential
intelligent fire warning as the core. It provides fire protection and rescue, command and
decision-making, etc. to form the intelligent fire protection overall solution.
This solution makes full use of geographic information, key personnel information, dynamic
police data and case data, etc. to build an integrated platform to realize the visualized
monitoring of dynamic information, generates alarms, assists decision making and implements
prevention measures in multi-dimensions for the key locations.
Comprehensively integrates various perception sources, carries out data collection, data
fusion, data cleaning, data management, coordination and sharing based on the cloud platform
traffic big data center, and builds a comprehensive traffic management and innovation business
platform.
Builds an intelligent, safe and efficient IoT facility system through video surveillance and IoT
technology to achieve comprehensive in-depth intelligent, comprehensive cloud processing,
flexible scheduling, and flexible customized comprehensive solution for smart facilities.
Using the combination of video surveillance and prison system to provide the comprehensive
intelligent security system to realize the unified management and planning, data exchange and
application interaction, intelligent security system level, improvement of police efficiency for
monitoring prisoner's behaviors, personnel positioning, emergency command, etc.
Provide the security solutions for application security, data security, security infrastructure,
network security, terminal security, cloud platform security, mobile security and SOC
(Security Operation Center).
Provides professional data acquisition solutions for communication networks, including:
voiceprint data collection probes, DPI / DFI equipment, voice data analysis probes, signaling
data analysis probes, etc., and supports the following network system for data acquisition:
GSM, CDMA, WCDMA, etc.
Provides professional video surveillance front-end deployment solutions for various security
video monitoring, including solution design, implementation, operation and maintenance.
Provides sensor equipment to realize sensing data collection, including solution design,
solution implementation, operation and maintenance, the sensor equipment we provide
including: NB-IoT / Zigbee sensor, RFID sensing front-end, infrared sensing front-end,
navigation equipment, etc.
Provides end-to-end data security transmission solutions for data access, including
aggregation, splitting, encryption and decryption.
Provides professional services of data center design and construction, such as network
planning, IT infrastructure, system integration, security protection, operation and maintenance,
etc.
Provides complete solutions for audio and video applications and control in the command &
control centers, emergency dispatch centers and large conference centers, to meet multi-
departmental cooperated operations, handle major emergencies, and coordinate the need for
command
Provides aand daily
cloud work. solution for unified video data storage, video data fusion, intelligent
platform
analysis and security application for the construction of large-scale network video surveillance
systems.
Provides functions such as data access, data processing, data management, data services and
data sharing & exchange to realize the aggregation and governance of data resources, to form a
data resource pool, and to provide data directory services for data sharing & exchange.
Through the big data application platform, the following services are provided: Unified user
authentication, Visualized process, Geographic information services, Rights management
services, Personal portrait services, Application log audit, Search services, Unified messaging
services and Instant messaging services.
Smart traffic deeply integrates information such as people, cars, roads, events, etc., eliminates
data island, and deeply digs into the value of multidimensional data in traffic. Smart traffic
forms a closed-loop traffic management and control system that has early warnings, plans
management and deep analysis, and makes the traffic safer and smoother.
Through computer science, modern network communication technology and database
technology, to provide hospital departments with the ability of data collection, data storage,
data processing, data extraction and data exchange of patient and management information,
and to meet the functional needs of all authorized users. The purpose of smart healthcare is to
build the digitalized, networked and informatized healthcare information service.

Smart education aims on taking the students as the center, constructs and innovates an
effective smart teaching model through information technology, and achieves the personalized,
intelligent and experiential learning environment. Smart education also forms high-quality
teaching curriculum and resource allocation mechanism, which cultivates and improves
students' ability to apply information and solve problems. The goal of smart education is to
promote students' deep learning at anytime, anywhere.
Smart facilities aims on improving the business management model and business requirements
of various industrial facilities such as enterprise, schools, hospitals, financial buildings and
logistics facilities. Smart facilities is based on video coding technology, deep learning
algorithms, cloud computing capabilities, high-bandwidth network transmission, big data
research, forecasting and information integration capabilities, to achieve a comprehensive
smart facilities solution with comprehensive high-definition, deep intelligence, three-
dimensional linkage, comprehensive cloudification, flexible scheduling, and flexible
customization.
Smart tourism sets tourists' interactive experience as the core and information management as
the guarantee, through the comprehensive exploration of tourism information resources,
tourism data sharing and exchange, the tourism intelligent information system is formed
Smart prison deeply integrates information technology such as the Internet of Things, cloud
computing, and mobile internet with the supervision and prison re-education program, and
realizes real-time monitoring, integration, and analysis of various types of prison information.
It fully supports police enforcement, risk management, and re-education program, team
building, comprehensive security, etc.
Provide complete software and hardware solutions covering infrastructure, tax application
system, tax terminal. Can provide tax management system,electornic fiscal devices, big data
tax analysis system, whole solution based on cloud platform, easy to deployment
The NOC network operation center system is a new generation of network operation and
maintenance system developed based on industry standards and level protection requirements,
taking operation and maintenance safety as the concept, and following the principle of whole-
system resource monitoring, topology display, fault discovery and diagnosis.
Intelligent analysis technology and big data technology are used to automatically monitor and
manage the running status of complex IT resources and environmental facilities through real-
time monitoring of resource availability and performance, so as to complete the integrity and
availability of resources in the cyber space.
Data quality and process improvement methods that improve profits, revenues and cash flows
without influencing demand,Through the data balance check, the logical relation check of the
balance is carried out and abnormal data is found.Judging whether the current data is abnormal
through the historical data fluctuation of the index.Data from different sources are compared to
find anomalies.Revenue Assurance mainly used in accounting, comprehensive settlement.

In the new competitive situation and pattern, the business support system needs to improve the
billing capacity focusing on the integration of full service billing, online billing and offline
billing, and meanwhile, it needs to enhance the business support capacity of group business,
family business, broadband business, etc., to meet the demand of full product operation
support under the full service environment.
The main functions include online preprocessing, billing preprocessing, balance management,
billing engine, wrong order management, fusion billing control bus, billing gateway,
comprehensive management platform, unified interface platform, data service center and other
functions

The system is used to actively monitor the zombies, Trojans and worms in the Internet, and
timely detect network virus attacks, so as to enhance the ability of detecting malicious code
samples, capturing associated events, analyzing and traceability of security incidents, and
analyzing malicious code samples.
The whole system realizes the detection and analysis of daily malicious code events, the
discovery of unknown malicious code and the locking of the source of malicious code.
To realize the mining and analysis of relevant security events
The platform can deeply detect security threats, make intelligent analysis to assist security
decision-making, perceive the overall security situation, provide risk early warning, linkage
security defense, guide rapid response, and assist in traceability and evidence collection.
Through the integration of data and capabilities, data mining based on requirements and
scenarios can accurately locate known threats, deeply detect unknown threats, enrich security
event scenarios, assist security operation decisions, change the security strategy from passive
defense to active intelligence, and comprehensively guarantee the security of customers'
businesses
The object assets protected by the security mechanism include host equipment, network
equipment, security equipment, system software, application software, business system and
Internet website.Assets safety management system based on the behavior of the information
data, the detection engine based on assets and leak detection engine output, detection, asset
management, and other tasks issued by assets and management, the assets operation situation
and situation of port open and explore assets of fingerprint information collection, statistics,
the assets of state assets and dynamic monitoring, safety management, safety evaluation of
assets and assets vulnerability analysis, security check response function.Combining the
known threat or early warning with the vulnerability information of assets, calculate the
probability of occurrence and associated impact of the threat event.
SaaS platform provides a series of security services for enterprises, such as mobile security,
content security, application security, data security, network security, and so on. It truly builds
the deep defense products and services of the security-as-a-service model for customers, and
escorts the business development.
Provide operators with integration of data security management ability, the use of all-round,
the whole content, the whole process of data management and security protection technology,
through the intelligent safety analysis technology, the operating system kernel technology,
high-strength encryption algorithm and flexible security policies, provide data assets, data
monitoring, data leakage protection security policy management, data access behavior
comprehensive data security protection method such as auditing and monitoring.

The system is divided into front-end analysis equipment and back-end analysis platform. The
analysis and disposal functions of mobile Internet malicious programs are deployed in the
front-end, and the centralized management module is established in the back-end to realize the
interactive interface with CNCERT.Through the back-end issuing strategy, the analysis
module realizes the identification of malicious program, and the disposal module realizes the
function of intercepting and blocking malicious program.

The system consists of a service access subsystem and a service convergence subsystem.Call
data collection and reporting, policy reception and execution functions, through the
comprehensive judgment and analysis of the call data and strategy, to realize the release of
incoming calls, sampling, intercept, to achieve the role of fraud telephone prevention

Provides user management, role management, organization management, menu management,


log audit and other functions.It can respond to the supervision instructions issued by the
superior system, implement and track the monitoring process, and evaluate the monitoring
effect according to the instruction feedback.Supports the analysis of security situation
according to the dimensions of industry, platform, vulnerability and equipment/terminal, and
can display and analyze asset distribution, vulnerability distribution, industry distribution,
equipment type distribution and situation of incidents.IoT terminal / device identification is a
code assigned by an enterprise and can uniquely identify the IoT equipment.

system realizes the intelligent recognition and intercept of bad text, picture and video
information in IDC room, CDN cache, IP special line and P2P cache through technical means
such as bypass, crawler and file sharing, and comprehensively covers the operators'
requirements for bad information detection and monitoring on the Internet.

Monitor and prevent risk problems such as abnormal access to data, misoperation or malicious
operation and data leakage during data collection, processing, storage and exchange.And can
automatically identify and classify the sensitive and important information of customers, for
important information desensitization or encryption operation, to ensure the security of
customers' data
In view of the major enterprises and government departments still exist in the separate
construction of resource equipment, user account, password management lack, each network
equipment is relatively independent, problems, unable to trace and locate the responsible
person, in order to solve the above security management problems, started the construction of
4A(Authentication,Authorization,Account,Audit) products.Realize the unified security control
of the existing host server, network equipment, security infrastructure equipment and network
element equipment, with the ability of "managable", "controllable", "operational and
maintenance" and "auditable".In addition, it also strengthens the internal security control
process and mechanism construction, changes the traditional information operation and
maintenance work mode, changes the operation and maintenance work from passive to active,
from manual to automatic, and greatly improves the information system security prevention
capability
SD-WAN gateway, UCPE defines a set of off-the-shelf hardware and open software
technologies that bring data center cloud and virtualization capabilities to telecommunications
access networks,Intel Atom series processor, support 2 to 4 cores,Supports 10/100/1000 Link
Speed,DDR4-2133 SO-DIMM Memory
High-performance integrated time system with IEEE 1588 function. The device has rich output
interface, small transmission error, simple installation. it can be widely used in application of
time fields,GPS/BD dual-mode receiver,PTP/NTP output,A single card supports 200 clients
with 128 packets/s
Remark
2021.1.28修改
2021.1.28新增
2021.1.28新增

You might also like