Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

96results about How to "Change habits" patented technology

Day-ahead load reduction system based on customer baseline load

Provided is a day-ahead load reduction system based on a customer baseline load for inducing a user to efficiently manage energy consumption by applying an incentive (user compensation according to load reduction) to achieve load reduction and load decentralization. The day-ahead load reduction system based on a customer baseline load operates in connection with a provider terminal and a user terminal through a network to induce a reduction in the load of a user and includes an AMI/AMR translator collecting load profile data of the user in real time, converting the load profile data and storing the load profile data in a meter data warehouse; a meter data management system monitoring and analyzing the load profile data stored in the meter data warehouse in real time; a demand response operation system managing the demand of the user by using the load profile data and performing overall management, analysis and verification of a day-ahead load reduction event; a customer energy management system operating in connection with the demand response operation system and providing information on the load to the user through the user terminal in real time to allow the user to control the load; and an account system operating in connection with the demand response operation system and the customer energy management system, calculating an incentive for the day-ahead load reduction event and notifying a provider and the user of the incentive through the provider terminal and the user terminal.
Owner:KOREA ELECTRIC POWER CORP

Technical method for intelligently recommending data

The invention mainly provides a solving method, and discloses a technical method for intelligently recommending data. The technical method includes firstly, acquiring a large quantity of information by the aid of crawlers, and then creating massive information sources by the aid of a keyword extracting algorithm and a theme algorithm; secondly, creating data models of users, acquiring behavioral data of browsing information and clicking information of the users, basic conditions and usage behavior of intelligent equipment, tracks of position change and the like according to the data models; thirdly, continuously improving feature images of the users by the aid of a model algorithm. The technical method has the advantages that by the aid of the solving method, the terminal users can quickly acquire information, and the problem of inconvenience due to the fact that users in the prior art need to search a large quantity of information to find favorable or required information in internet application procedures can be solved; modes in which the users passively acquire the information and spend time in searching the information can be changed by the solving method with a technology, and accordingly living habits of human can be truly changed by the internet; a server can judge information required by one of the users at the moment according to the feature images of the user when the user uses the intelligent equipment again, and the required information can be recommended to the user.
Owner:SHENZHEN INVENO TECH

Multi-language hybrid input method used on embedded touch screen virtual keyboard

The invention discloses a multi-language hybrid input method used on an embedded touch screen virtual keyboard. Each key on the virtual keyboard maps three to four characters respectively; a display region of a touch screen is provided with a virtual keyboard region, an editing region and a candidate region; the touch screen also comprises a pop-up amplifying and selecting region; the method particularly comprises the following steps of: performing keystroke operation; dynamically displaying Chinese information, numerical information and foreign information related to the key at the candidate region; selecting the candidate region where a target item is positioned, popping up the amplifying and selecting region, and amplifying the row in which the target item is positioned in the candidate region by the amplifying and selecting region; and clicking or downwardly sliding the target item and selecting and displaying input Chinese information, numerical information or foreign information at the editing region in real time to finish the input. By the method, rapid hybrid input of Chinese, number, English and other foreign languages is realized, the efficiency of inputting written information is greatly improved, and the operation is intuitive and the compatibility of the method is good.
Owner:GUANGZHOU JIUBANG DIGITAL TECH

Method for acquiring specific reference Gaussian plane rectangular coordinate based on continuous operational reference system (CORS) in real time

The invention provides a method for acquiring coordinates based on a continuous operational reference system (CORS) in real time, and relates to a method for acquiring a specific reference Gaussian plane rectangular coordinate based on the CORS by using general packet radio service (GPRS) (or code division multiple access (CDMA)) communication technologies in real time. According to the invention, a middle server is arranged between a mobile station and a server for bi-directionally communicating with the mobile station and the server respectively, decoding virtual reference station (VRS) difference information which is generated by the server, and appropriately changing the coordinates (X, Y, Z) so that a user of the mobile station cannot acquire the real world geodetic system (WGS) 84 coordinate; corresponding false parameters are set on a holding book of the mobile station so as to acquire the specific reference Gaussian plane rectangular coordinate and avoid real parameters issuing. By the system, software, hardware and use habit of the user are not changed; the specific reference Gaussian plane rectangular coordinate is acquired; and elevation of the measured position is directly acquired by using ground level precise models, so that the working efficiency of the user is greatly improved; and the method is widely applied in fields such as surveying and mapping controlling, precise navigating and the like.
Owner:CHONGQING GEOMATICS & REMOTE SENSING CENT

Liquid-stopping tank-type automatic exhaust liquid-stopping infusion apparatus

The invention discloses a liquid-stopping tank-type automatic exhaust liquid-stopping infusion apparatus. A dropping funnel cover (2a), an exhaust hole (2b), an exhaust filtering hole (2c) and an air filtering hole (2d) are in injection molding on a bottle stopper puncture device (2), an air filtering membrane (4) is installed inside the air filtering hole (2d) and sealed by an air filtering cap (3), an automatic exhaust device (5) is installed on the dropping funnel cover (2a), a dropping funnel (6) is connected at the bottom of the dropping funnel cover (2a), an automatic liquid-stopping device (7) is installed on the bottom face (6a) inside the dropping funnel, a liquid dropping opening (6b) is formed in the bottom of the dropping funnel (6) in an injection molding mode, one end of a long infusion catheter (9) is connected with the liquid dropping opening (6b), the other end of the long infusion catheter (9) penetrates through a flow regulator (10) to be connected with a medicine liquid injection part (11), a flareless fitting (12) and a vein needle (13), and the safe infusion apparatus is integrally formed. According to the liquid-stopping tank-type automatic exhaust liquid-stopping infusion apparatus, automatic exhaust is achieved, liquid medicine automatically stops flowing, the exhaust operation steps are simplified, working intensity is relieved, the structure is simple, and the liquid-stopping tank-type automatic exhaust liquid-stopping infusion apparatus is safe and reliable.
Owner:HUAIAN CITY HENGCHUN MEDICAL PROD

Dynamic transparent isolation protection based enterprise data asset protection method

The invention discloses a dynamic transparent isolation protection based enterprise data asset protection method. The dynamic transparent isolation protection based enterprise data asset protection method comprises the steps that user mainframe groups are into a risk mainframe group and a trusted mainframe group, wherein the trusted mainframe group is provided with a safety protection terminal, and enterprise core data asset can be accessed; the risk mainframe group cannot be accessed; progresses of mainframes of the trusted mainframe group are divided into risk progress domains and trusted progress domains, and the risk progress domains are converted into trusted progresses when sensitive data asset is accessed on purpose; transparent isolation protection processing is conducted on storage resources depended by the progresses to run, local OS environments and the like in the trusted processes, meanwhile a network and external access are under the control of a safety management strategy, and the risk progresses cannot access any data of a transparent isolation protection environment. By means of the dynamic transparent isolation protection based enterprise data asset protection method, the trusted processes and the risk progresses coexist, data leakage is avoided, local computing resources are applied to the maximum extent, and dependency on the network is reduced. The dynamic transparent isolation protection based enterprise data asset protection method has good adaptability and robustness.
Owner:南京盛泰惠智能科技有限公司

Security management system and method used for mobile terminal file

The invention relates to the field of mobile terminal data security protection, and provides a security management system used for a mobile terminal file. The security management system comprises a USB equipment monitoring unit, a USB equipment verifying unit, a security kernel driving unit and a filtering driving unit. The invention further provides a security management method used for the mobile terminal file. The method includes the following steps that S1, a PC end is started, a client side program is run, and all the units are initialized; S2, the USB equipment monitoring units is adopted for detecting whether USB equipment is connected into the PC end; S3, the USB equipment verifying unit verifies whether the identity of the USB equipment is matched with the mobile terminal or not;S4, the security kernel driving unit is adopted for selecting to load the security kernel function of a virtual disk for the equipment, wherein the identity of the equipment is verified by the USB equipment verifying unit; S5, the filtering driving unit is adopted for scanning and filtering data operation in the virtual disk, and selecting to encrypt or decrypt the data in the virtual disk. The security management system and method are high in security and convenient and rapid to implement, and will not change the using habit of a user.
Owner:武汉华工安鼎信息技术有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products