Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

112results about How to "Reduce the burden of use" patented technology

Large-diameter small-bending radius medium frequency pipe bender

InactiveCN101987331AControl the amount of outer wall thinningExtended service lifeMedium frequencyBend radius
The invention discloses a large-diameter small-bending radius medium frequency pipe bender. The pipe bender comprises a Iathe bed, wherein the back end of the Iathe bed is provided with a pushing cylinder; the piston rod of the pushing cylinder is connected with a back pusher; the front end of the Iathe bed is provided with a guide roller device and a travelling mechanism supporting base; a spindle mounting base is arranged on the travelling mechanism supporting base in a sliding manner; a spindle is arranged on the spindle mounting base in a rotating manner; the spindle is provided with a rotary arm; the rotary arm is provided with a front chuck and a front chuck adjusting device; the rotary arm is supported on the spindle mounting base through a support roller arranged on the lower end of the rotary arm; and the travelling mechanism supporting base is provided with an anti-bending-moment cylinder, and the anti-bending-moment cylinder is connected with the spindle through a transmission chain. The invention has the following advantages: the thickness reduction of the outer wall of the elbow can be effectively controlled; the large-diameter small-bending radius elbow can be directly prepared without performing secondary welding to the elbow; the manufacturing cost can be reduced, the service life of the elbow can be increased, and the burden for using the elbow of the enterprise can be reduced.
Owner:JIANGSU SUNCO BOILER

Sports standard reaching testing system and method

The invention discloses a sports standard reaching testing system and method, and the system comprises a user terminal, a signal collection terminal and a server. The user terminal comprises a studentuser terminal, a parent user terminal, a teacher user terminal, and a manager user terminal. The system is characterized in that the server is provided with a health file database; when a student enrolls in a school, a basic health file is built; the student user terminal is a wristband, and is worn by a student, and transmits the collected data to the server through the signal collection terminal; the parent user terminal and the teacher user terminal visit the server to obtain the student information correlated with their own; the manager user terminal manages all data information through the access to the server, and has the set authority for access to other user terminals; and the database transmits a copy of the data to the parent user terminal while transmitting the data to the student user terminal. The system module has the flexible configuration and combination capability, and the configuration design gives full consideration to the reliability and stability problems which may be caused by the outdoor, distributed and network environment factors.
Owner:北京华创互联科技股份有限公司

One-object one-code commodity anti-counterfeiting and tracing system based on digital watermark two-dimensional code

PendingCN109754037ANo increase in anti-counterfeiting costsRobustCo-operative working arrangementsComputer generationDigital watermarking
The invention discloses a one-object one-code commodity anti-counterfeiting and tracing system based on a digital watermark two-dimensional code. The system comprises a small commodity anti-counterfeiting and tracing system based on a digital watermark two-dimensional code and a tracing and checking WeChat program, a WeChat official account based on the digital watermark two-dimensional code and the tracing and checking WeChat program, and an application program based on the digital watermark two-dimensional code and the mobile phone tracing and checking program. Aiming at the problem that a general two-dimensional code technology cannot distinguish information authenticity and prevent counterfeiting, on the basis that a server computer generates a standard two-dimensional code, a productcode with one object one code is used as digital watermark information to be hidden in the two-dimensional code to generate an anti-counterfeiting label. Consumers purchase commodities, using a sourcetracing and checking WeChat applet or a source tracing and checking WeChat official account or a mobile phone terminal source tracing and checking application program to carry out digital watermark identification and reading on the two-dimensional code on the anti-counterfeit label. Traceability checking is carried out according to the existence of digital watermark information (product codes), the anti-counterfeiting traceability capability of the two-dimensional code is improved, and the double effects of effective counterfeiting prevention, tamper prevention and accurate tracking are achieved.
Owner:CHENGDU YUFEI INFORMATION ENG

Data security controlling system and implementation method of system

The invention discloses a data security controlling system and an implementation method of the system. The data security controlling system comprises a portable electronic device, an application program and an access control management device, wherein the portable electronic device comprises a first communication module; the access control management device comprises a second communication module and a control module; the second communication module and the first communication module are used for performing data communication and reading identity information; the control module is used for receiving the identity information and comparing the identity information with preset identity information stored in the control module; if the identity information is identified by the access control management device, the control module is used for outputting instructions and controlling the access control management device to output control signals to the portable electronic device, so that the portable electronic device is used for starting the application program. According to the data security controlling system, data connecting, photographing and other functions of the portable electronic device are closed by the application program, so that the portable electronic device entering a secret area is incapable of uploading and downloading secret data, so that the security of the secret data of the company is effectively protected.
Owner:QISDA SUZHOU +1

Efficient water cooling tower

The invention relates to an efficient water cooling tower, and belongs to the technical field of cooling equipment. The efficient water cooling tower comprises a tower body with a conic opening, a cooling system and a heat radiation system. The cooling system is arranged in a surrounding manner to be closely attached to the inner wall of the tower body and is evenly distributed in the space in the tower body. A water inlet and a water outlet of the cooling system are both arranged outside the tower, and the part, in the tower, of the cooling system is in a totally closed type. The heat radiation system is arranged at the upper end and the lower end of the tower body, and the heat radiation effect of the cooling system is accelerated. According to the efficient water cooling tower, high-temperature circulating water is guided into the cooling system, the cooling system is utilized for absorbing, transmitting and treating heat in the circulating water, the heat in the circulating water is transferred to the cooling system, and the heat radiation system carries out heat radiation on the cooling system. During cooling, the circulating water is only in direct contact with the totally-closed inner wall of the cooling system, and the evaporation amount of the circulating water can be almost ignored. By means of a cooling method, the circulating water can be efficiently cooled, meanwhile, the quality of water quality generated after cooling is considered, and the cooling mode of the prior art is directly broken through.
Owner:海宁萃智智能机器人有限公司

Handheld medical infant atomizer and atomizing mask

The invention discloses a handheld medical infant atomizer and an atomizing mask. The handheld medical infant atomizer comprises a device body; the device body comprises a liquid medicine cup, an atomizer handle and a switch; one side of the liquid medicine cup is fixedly connected with one side of a fixing block; a cup cover is arranged on one side of the fixing block; the bottom of the cup cover is connected with two sets of rubber rings in a sleeved mode; the two sets of rubber rings are distributed at equal intervals; the bottom of the cup cover is clamped into the liquid medicine cup; the outer walls of the two sets of rubber rings are attached to the inner wall of the liquid medicine cup; scale marks are arranged on one side of the outer wall of the liquid medicine cup; and the bottom of the liquid medicine cup is fixedly connected with the top of a connecting block. Due to mutual combination of the various parts, the device can be used in all child hospitals, is also suitable for household use of infants needing atomization treatment, has the function that most atomizers in the market atomize liquid medicine into small particles and deposit the small particles in the lungs through inhalation to achieve the treatment purpose, and also has the functions of pacifying, preventing backflow, being ultra-silence and enabling a mask of an anatomical structure to be tightly attached to the face of a sick child.
Owner:THE WEST CHINA SECOND UNIV HOSPITAL OF SICHUAN

Trunk injecting pesticide for preventing corythucha ciliate, and preparation method and application thereof

ActiveCN106797951ARealize precise prevention and controlIncrease profitBiocideDead animal preservationSurface-active agentsSolvent
The invention discloses a trunk injecting pesticide for preventing corythucha ciliate, and a preparation method and application thereof. The trunk injecting pesticide for preventing the corythucha ciliate is long in effective time, and compared with sprayed pesticides used at present, the trunk injecting pesticide is good in effect, saves both time and labor, and avoids pollution to the environment; the preparation method is simple in process and low in costs; the application is free from the influence of weather and tree body heights, and the pesticide enters a plant body completely, does not hurt natural enemies, and can be used for a long time. The trunk injecting pesticide disclosed by the invention is durable and stable in effect; hydrolysis is difficult to happen; the defect that current trunk injections need preparing while used is effectively avoided; and the using burden of a user is relieved, so that the trunk injecting pesticide is suitable for industrial production. The trunk injecting pesticide for preventing the corythucha ciliate is prepared from the following raw materials in percentage by weight: 1 to 50 percent of thiacloprid raw powder, 0.1 to 20 percent of acephate raw powder, 1 to 10 percent of a surface active agent, and the balance is a solvent.
Owner:SHANDONG FOREST SCI RES INST

Information synchronization system and method

The invention provides an information synchronization system and method. The system comprises a data processing module, a positioning module, an information acquiring module and a notifying module. The data processing module acquires shared resource information and/or requester information of shared resources of a distributed system and transmits the information to the positioning module. The positioning module is used for acquiring an identification of a requester of the shared information and/or the identification of an occupier of the shared resources according to the requester information and transmitting the identification to the information acquiring module. The information acquiring module is used for respectively converting the identification of the requester of the shared information and/or the identification of the occupier of the shared resources into corresponding the occupier attribute information identification and/or the requester attribute information identification and transmitting the occupier attribute information identification and/or the requester attribute information identification to the notifying module. The notifying module is used for notifying sharing state of the shared resources. By the system, positioning of the shared resource occupier and sharing of state of the shared information can be achieved conveniently.
Owner:ADVANCED NEW TECH CO LTD

Cell phone matched with Bluetooth earphone through curing and using method thereof

The invention discloses a cell phone matched with a Bluetooth earphone through curing. The cell phone comprises a shell, and a main controller and a touch switch for plugging the Bluetooth earphone to trigger the main controller which are arranged at the interior of the shell, a cell phone Bluetooth module and a power supply module which are connected with the main controller; the cell phone also comprises the Bluetooth earphone; and the Bluetooth earphone comprises an earphone Bluetooth module matched with the cell phone Bluetooth module in a one-to-one manner. Meanwhile, the invention further discloses a using method of the cell phone matched with the Bluetooth earphone through curing. The cell phone is matched with the Bluetooth earphone in a one-to-one manner through curing, and the Bluetooth earphone can be charged through a cell phone power supply at any time, so that a matching flow is not required when the Bluetooth earphone is used, the cell phone is convenient to use and solves troubles of some people caused by matching flow; and moreover, the Bluetooth earphone is small in volume and lighter in weight after the capacity of a battery is reduced, the using burden of a user is reduced, the comfort is improved, and the trouble that the Bluetooth earphone is charged independently is solved.
Owner:江海

Access control verification method based on two-dimensional code

The invention relates to an access control verification method based on a two-dimensional code. The access control verification method comprises the following steps: (1) connecting an accessing terminal with an access control end through a network and generating a two-dimensional code dynamic picture at the access control end; (2) screening the code by the accessing terminal to receive the two-dimensional code dynamic picture generated by the access control end and filling user information by the accessing terminal; sending the user information to the access control end through the accessing terminal; (3) searching and matching the user information on a server by the access control end and carrying out corresponding access control actions according to a matching result; (4) generating monitoring information at the access control end, wherein the monitoring information comprises personal information, entering time and leaving time of a user of the accessing terminal; (5) when the accessing terminal leaves away, scanning the two-dimensional code of the access control end again and stopping recording the monitoring information. According to the access control verification method basedon the two-dimensional code, the utilization burdens of the user are alleviated and the user can conveniently enter an access control system; materials are saved and environment protection is facilitated; the information of people who enter and leave away can be rapidly recorded and is convenient to wholly count, so that conditions of people who enter and leave away are grasped and the safety ofthe access control system is improved.
Owner:徐下兵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products