Invisible orthodontic treatment method designing integral movement of teeth based on morphology of alveolar bones
A technology of invisible correction and overall movement, which is applied in the field of malocclusion correction, can solve problems such as neglected crown arrangement, falling off, bone cracking, etc., and achieve the effect of ensuring personal safety and ensuring safety
Inactive Publication Date: 2016-08-10
边专
6 Cites 22 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention provides an invisible orthodontic treatment method designing integral movement of teeth based on the morphology of alveolar bones. The method comprises the following steps: S1, acquiring CBCT data; S2, acquiring STL data; S3, acquiring combining data of integral teeth; S4, reconstructing and restoring an original occlusion form in the mouth of a patient; S5, adjusting three-dimensional positions of the teeth; S6, carrying out simulated orthodontic treatment according to the adjustment data of the three-dimensional positions of the teeth; S7, generating a dentition model adjusting sequence; and S8, producing an invisible appliance meeting requirements. According to the invention, accurate morphological data of a dental crown is acquired through the digital dentition model, three-dimensional morphological data of teeth roots and alveolar bones are acquired through CBCT, and the morphological data of the dental crown and the three-dimensional morphological data are combined and matched; thus, the positional relationship between the teeth roots and the alveolar bones can be clearly seen in real time in designing of an invisible orthodontic treatment scheme and in generation of the dentition model sequence capable of simulating movement of teeth, and the problems of periodontal fenestration defects, periodontal cracks and obvious absorption of teeth roots caused by close collision between the teeth roots and the alveolar bones are overcome.
Application Domain
Technology Topic
DentitionBite registration +3
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Distributed cryptograph full-text retrieval system
InactiveCN101561815AEnsure safetyImprove securitySpecial data processing applicationsRights managementAuthorization
Owner:HUAZHONG UNIV OF SCI & TECH
Scalable architecture for enterprise extension in a cloud topology
Owner:ALCATEL LUCENT SAS
Application information push method, system and network element
ActiveCN102388632ATwo-way information exchangeEnsure safetyInformation formatContent conversionApplication serverService provider
Owner:HUAWEI TECH CO LTD
Method and test circuit for preventing data encryption algorithm (DES) attack based on power analysis
InactiveCN103067155AEnsure safetyEncryption apparatus with shift registers/memoriesPower attackComputer hardware
Owner:SOUTHEAST UNIV
Classification and recommendation of technical efficacy words
- Ensure safety
- Guarantee personal safety
Remote vehicle control method, TSP (telematics service provider) backstage system and vehicular terminal
ActiveCN104363266AAvoid being illegally controlledEnsure safetyUser identity/authority verificationTelephonic communicationWork statusService provider
Owner:北斗星通智联科技有限责任公司
Unlocking method for electronic door lock, electronic door lock and electronic door lock system
InactiveCN102426715AEnsure safetyAvoid unlocking costsKey distribution for secure communicationIndividual entry/exit registersElectronic communicationEngineering
Owner:HUAWEI TECH CO LTD
Transaction verification method and system based on block chain
ActiveCN106548330APrevent balance leakageEnsure safetyPayment protocolsPayment circuitsVerification systemComposite number
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN
Method for realizing the intelligent tour-inspection of power tower based on miniature multi-rotor unmanned helicopter
InactiveCN102510011AGood securityEnsure safetyActuated automaticallySwitchgearDecision-makingTransmission line
Owner:NORTH CHINA ELECTRIC POWER UNIV (BAODING)