Browser starting method and device as well as electronic equipment
A browser, consistent technology, applied in the field of browsers, can solve problems such as poor user experience and program conflicts, and achieve the effect of improving usage, improving user experience, and avoiding locking by default.
Active Publication Date: 2016-10-12
ZHUHAI BAOQU TECH CO LTD
5 Cites 3 Cited by
AI-Extracted Technical Summary
Problems solved by technology
[0004] At present, many browser manufacturers are using similar registry redirection technology solutions. Therefore, when users click a link to open ...
Method used
In the present embodiment, by monitoring the event of the key value in the query registry, and recording the number of times of use of the default first browser in a predetermined time period, the number of times of use of the first browser in a predetermined time period does not reach When the threshold is predetermined, use the first browser to open the link clicked by the user, and redirect the first browser to the second browser after the number of times the first browser is used within a predetermined period of time, thus avoiding differences between different browsers. The default contention between locks impr...
Abstract
Embodiments of the invention disclose a browser starting method and device as well as electronic equipment, and relates to the technical field of browsers. The method comprises the following steps: monitoring an event of querying key values in a registry; obtaining an event message of querying a default key value in a default browser registry key; querying the default key value in the default browser registry key; judging whether a default browser corresponding to the default key value is a predetermined first browser; if the default browser corresponding to the default key value is the predetermined first browser, judging whether a starting frequency of the first browser in a predetermined time period achieves a predetermined threshold value; if the starting frequency of the first browser in the predetermined time period does not achieve a predetermined threshold value, returning the default key value to start the first browser; and if the starting frequency of the first browser in the predetermined time period achieves the predetermined threshold value, redirecting the default browser corresponding to the default key value to a second browser so as to start the second browser. The browser starting method and device as well as the electronic equipment are suitable for the starting of different browsers.
Application Domain
Program loading/initiating
Technology Topic
Windows RegistryElectronic equipment +1
Image
Examples
- Experimental program(1)
Example Embodiment
[0049] Hereinafter, a method and device for starting a browser according to embodiments of the present invention will be described in detail with reference to the accompanying drawings.
[0050] It should be clear that the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.
[0051] figure 1 Is a flowchart of Embodiment 1 of the browser startup method of the present invention, such as figure 1 As shown, the method of this embodiment may include:
[0052] Step 101: Monitor the event of querying key values in the registry.
[0053] Preferably, the event of querying the key value in the registry can be monitored by pre-setting a hook function linked to the function NtQueryValueKey for querying the key value in the registry.
[0054] Step 102: Obtain an event message for querying the default key value in the registry key of the default browser; where the event message is triggered by the displayed webpage link being clicked.
[0055] In this embodiment, if the user clicks on a web page link, the system will generate an event to query the default key value in the default browser registry key. If a hook function hooking NtQueryValueKey is preset, the hook function can intercept the event message.
[0056] Step 103: Query the default key value in the default browser registry key according to the event message of querying the default key value in the default browser registry key.
[0057] Step 104: Determine whether the default browser corresponding to the default key value is the predetermined first browser, and if the default browser corresponding to the default key value is the predetermined first browser, perform step 105.
[0058] In this embodiment, if the default browser corresponding to the default key value is not the predetermined first browser, the subsequent process of the method provided by the present invention will not be executed. At this time, the system returns to the user the default browser of the default key value record. After the redirection function of each browser competes with each other, the system returns to the user to finally lock the default browser path.
[0059] Step 105: Determine whether the number of activations of the first browser within a predetermined time period reaches a predetermined threshold.
[0060] In this embodiment, the judgment step 105 judges whether the recorded number of activations of the first browser within a predetermined time period reaches a predetermined threshold, if yes, proceed to step 107; if not, proceed to step 106.
[0061] Step 106: Return to the default key value to start the first browser.
[0062] Step 107: Redirect the default browser corresponding to the default key value to the second browser to start the second browser.
[0063] In this embodiment, by monitoring the event of querying the key value in the registry, and recording the default number of times of using the first browser within a predetermined period of time, when the number of times of using the first browser within the predetermined period of time does not reach the predetermined threshold , Use the first browser to open the link clicked by the user, and redirect the first browser to the second browser after the number of times the first browser has been used within a predetermined period of time, thus avoiding the lock-up between different browsers The default contention improves the usage rate of multiple browsers within a predetermined period of time, and at the same time improves the user experience.
[0064] Preferably, when the browser startup method provided by the present invention is used for the first time, a step of determining whether the predetermined first browser has been installed may also be included between step 103 and step 104, provided that it is determined that the first browser is installed , The subsequent steps of the present invention are executed normally. Obviously, when the default browser corresponding to the default key value needs to be redirected to the second browser, the second browser also needs to coexist with the first browser in the current system. For example, if the predetermined first browser is "QQ Browser" and the second browser is "Cheetah Browser", you can read the "QQ Browser" registry installation location such as "HKEY_LOCAL_MACHINE\SOFTWARE\Tencent\QQBrowser" "To determine whether "QQ Browser" is installed, and after confirming its installation, make sure that "QQ Browser" and "Cheetah Browser" coexist.
[0065] figure 2 Is a flowchart of Embodiment 2 of the browser startup method of the present invention, such as figure 2 As shown, the method of this embodiment may include:
[0066] Step 201: Monitor the event of querying the key value in the registry.
[0067] Step 202: Obtain an event message for querying the default key value in the registry key of the default browser.
[0068] Step 203: Query the default key value in the default browser registry key according to the event message of querying the default key value in the default browser registry key.
[0069] In this embodiment, the process of steps 201-203 is similar to the steps 101-103 of the foregoing method embodiment, and will not be repeated here.
[0070] Step 204: Determine whether the default browser corresponding to the default key value is the predetermined first browser, and if the default browser corresponding to the default key value is the predetermined first browser, perform step 205.
[0071] In this embodiment, the process of step 204 is similar to step 104 of the foregoing method embodiment, and will not be repeated here.
[0072] Step 205: Determine whether the number of activations of the first browser within a predetermined time period reaches a predetermined threshold, if yes, proceed to step 207; if not, proceed to step 206.
[0073] In this embodiment, the process of step 205 is similar to step 105 of the foregoing method embodiment, and will not be repeated here.
[0074] Step 206: Return the default key value to start the first browser.
[0075] Step 207: Load the redirection rule of the first browser that locks the second browser as the default browser.
[0076] Wherein, the redirection rule of the first browser to lock the second browser as the default browser is: returning the installation path of the second browser as the default key value.
[0077] Step 208: Redirect the default browser corresponding to the default key to the second browser according to the redirection rule of the loaded first browser that locks the second browser as the default browser to start the second browser. That is, in this step, the installation path of the second browser is returned, so that the first browser is redirected to the second browser, so that the second browser is used to open the link clicked by the user.
[0078] In this embodiment, when it needs to be redirected to the second browser, the redirection driver that hooks the NtQueryValueKey function loads the preset redirection rule data of the first browser to lock the second browser as the default browser, when When you open the link, you will be redirected to the second browser and start to lock the default second browser.
[0079] As long as the redirect rule for the first browser to lock the second browser as the default browser has been loaded once within a predetermined period of time, after each step 207 needs to load the first browser to lock the second browser as the default browser When redirecting rules, you can actually determine whether the first browser’s locked second browser has been loaded as the default browser redirection rule. If it has already been loaded, just go to step 208 directly. If the first browser is loaded and the second browser is locked as the default browser, it is necessary to perform step 207 to load the rule first, and then perform step 208 to implement the redirection of the second browser.
[0080] In order to prevent the first browser loaded in the predetermined time period from locking the second browser as the default browser, the redirection rule will continue to work in the next predetermined time period (when the first browser actually needs to be started), The method provided in this embodiment, after step 207, further includes: monitoring whether the predetermined time period has expired, and if the predetermined time period has expired, clearing the locked second browser of the first browser that has been loaded It is the redirection rule of the default browser, and the number of activations of the first browser is assigned to the initial value 0 at the same time. In this way, the method provided in the embodiment of the present invention can be reused to start the browser in the next predetermined time period.
[0081] In this embodiment, when it is determined that the number of activations of the first browser within a predetermined period of time reaches a predetermined threshold, by loading the first browser redirection rule for returning to the installation path of the second browser, the default first browser Browser events are redirected to the second browser. In addition, after the redirection rule of the first browser is loaded once, the lock default of the second browser can be realized, which is simple and convenient.
[0082] image 3 Is a flowchart of Embodiment 3 of the browser startup method of the present invention, such as image 3 As shown, the method of this embodiment may include:
[0083] Step 301: Query a preset switch key value.
[0084] Step 302: It is judged whether the switch key value is a predetermined value indicating switch, then step 303 is executed, otherwise the process is ended.
[0085] In this embodiment, by pre-setting the switch key value, for example, the switch key value is stored as the registry location: HKEY_LOCAL_MACHINE\\SOFTWARE\\KINGSOFT\\ANTIVIRUS\\DBReg under the tc key value, when the value is 1, set Turn on the key value mark and exit the processing flow of this technical solution.
[0086] Step 303: Monitor the event of querying the key value in the registry, and obtain the event message of querying the default key value in the default browser registry.
[0087] Step 304: Query the default key value in the default browser registry key according to the event message of querying the default key value in the default browser registry key.
[0088] Step 305: Determine whether the default browser corresponding to the default key value is the predetermined first browser, and if the default browser corresponding to the default key value is the predetermined first browser, perform step 306.
[0089] Step 306: Determine whether the number of activations of the first browser within a predetermined time period reaches a predetermined threshold. If yes, go to step 308; if not, go to step 307.
[0090] In this embodiment, the process of steps 303-306 is similar to the steps 101-105 of the foregoing method embodiment, and will not be repeated here.
[0091] Step 307: Return the default key value to start the first browser.
[0092] Step 308: Redirect the default browser corresponding to the default key value to the second browser to start the second browser.
[0093] In this embodiment, the process of step 308 is similar to step 107 or steps 207-208 of the foregoing method embodiment, and will not be repeated here.
[0094] The process of this embodiment is similar to the first embodiment of the above method. The difference is that before monitoring the event of querying the key value in the registry, first query and determine whether the key value is on. Through the setting and judgment of the key value, it can be convenient Choose whether to use the technical solution provided by the present invention to handle the event of querying the default key value in the default browser registry key here.
[0095] Since the first browser may have a redirection function that locks itself as the default browser, preferably, in the first to third embodiments, when the first browser is launched for the last time within a predetermined time period, the browser provided by the present invention The method for starting the browser further includes: notifying the first browser to close the redirection function of the first browser that locks itself as the default browser. For example, if the predetermined period of time is 2 days and the predetermined threshold is 5, then using the method provided by the present invention, the browser opened the first 5 times within 2 days should be the first browser, and when the first browser is activated for the fifth time , The first browser needs to be notified to turn off its own redirection function that locks itself as the default browser, that is, to turn off the redirection function of the first browser redirecting to itself, so as to avoid the need to use the second browser to open at the sixth time When web pages are being used, the redirection function of the first browser that locks itself as the default browser conflicts with the redirection function of the second browser.
[0096] A specific example is used below to Figure 1 ~ Figure 3 The technical solutions of any of the method embodiments shown in the above are described in detail.
[0097] Figure 4 This is a flowchart of Embodiment 4 of the browser startup method of the present invention. This embodiment is used when the predetermined period of time is 1 day and the predetermined threshold is 1, such as Figure 4 As shown, the specific browser startup method may include:
[0098] Step 401: Query the preset switch key value.
[0099] Step 402: It is judged whether the switch key value is a predetermined value indicating switch, if yes, proceed to step 403, otherwise, the process ends.
[0100] In this embodiment, the process of steps 401-402 is similar to the steps 301-302 of the foregoing method embodiment, and will not be repeated here.
[0101] Step 403: Monitor the event of querying the key value in the registry.
[0102] Step 404: Obtain an event message for querying the default key value in the registry key of the default browser.
[0103] Step 405: Query the default key value in the default browser registry key according to the event message of querying the default key value in the default browser registry key.
[0104] In this embodiment, the process of steps 403-405 is similar to the steps 101-103 of the foregoing method embodiment, and will not be repeated here.
[0105] Step 406: Determine whether the predetermined first browser is installed. If the first browser is installed, perform step 407; otherwise, end the process.
[0106] Step 407: Determine whether the default browser corresponding to the default key value is the predetermined first browser. If the default browser corresponding to the default key value is the predetermined first browser, perform step 408; otherwise, end the process.
[0107] In this embodiment, the process of step 407 is similar to step 104 of the foregoing method embodiment, and will not be repeated here.
[0108] Step 408: Read the time when the first browser was last started, and obtain the date corresponding to the time when the first browser was last started according to the time when the first browser was last started.
[0109] Step 409: Obtain the current system date. For example, when the system used in this method is a Windows operating system, the current system date can be obtained through GetLocalTime.
[0110] Step 410: Determine whether the date corresponding to the time when the first browser was launched last time is consistent with the current system date. If it is inconsistent, it means that the first browser has not been activated in the current day, and proceed to step 411; Once the browser has been activated, step 412 is entered.
[0111] Step 411: Return to the default key value, start the first browser, and record the time when the first browser is started this time, and at the same time notify the first browser to close its own redirection function of the default browser.
[0112] For example, if the first browser is the existing QQ browser, every time the QQ browser is started, it will write the registry: SOFTWARE\\Tencent\\QQPCMgr\\IEStartPage location, and write the current startup time into the ActiveTime key Value, the ActiveTime key value is an overwrite record, that is, the record is always the time of the last launch of the QQ browser. Then, in step 408, the date corresponding to the time when the QQ browser was last started can be obtained by reading the ActiveTime key value.
[0113] Step 412: Load the redirection rule of the first browser that locks the second browser as the default browser.
[0114] Step 413: According to the redirect rule of the first browser to lock the second browser as the default browser, redirect the default browser corresponding to the default key to the second browser, and start the second browser.
[0115] In this embodiment, the process of steps 412-413 is similar to steps 207-208 of the foregoing method embodiment, and will not be repeated here.
[0116] Figure 4 The method shown also includes: real-time monitoring whether the system time reaches 24:00 (that is, whether the predetermined time period expires), if the system time reaches 24:00, clear the locked second browser of the loaded first browser as the default browser Redirection rules of the server.
[0117] The browser startup method provided in this embodiment records the use time of the default first browser within one day, and when the first browser is not used within one day, the first browser is used to open the link clicked by the user and After the first browser on the day has been enabled, turn off the redirection function of the first browser itself, and redirect the first browser to the second browser through the preset redirection rule of the first browser to realize the second browser afterwards The device is locked by default. The lock default contention between different browsers is avoided, the usage rate, traffic, and navigation volume of multiple browsers within a predetermined time period are improved, and the user experience is improved.
[0118] Figure 5 It is a schematic structural diagram of Embodiment 1 of the browser activation device of the present invention, such as Figure 5 As shown, the device of this embodiment may include: a monitoring module 11, a query module 12, a first judgment module 13, a second judgment module 14, and a return module 15; among them,
[0119] The monitoring module 11 is used to monitor the event of querying the key value in the registry, obtain the event message of querying the default key value in the default browser registry key, and send query instructions to the query module 12 according to the acquired event message;
[0120] The query module 12 is used to query the default key value in the registry entry of the default browser according to the query instruction, and send the first judgment instruction to the first judgment module 13 and the default key value to the return module 15; wherein, the first judgment The command includes the default key value found;
[0121] The first judgment module 13 is configured to judge whether the default browser corresponding to the default key value is the predetermined first browser according to the first judgment instruction, and if the default browser corresponding to the default key value is the predetermined first browser, then Send a second judgment instruction to the second judgment module 14;
[0122] The second judgment module 14 is used for judging whether the number of activations of the first browser within the predetermined time period reaches a predetermined threshold according to the received second judgment instruction, if the number of activations of the first browser within the predetermined time period does not reach If the predetermined threshold is set, the first return instruction is sent to the return module 15, and if the number of activations of the first browser in the predetermined time period reaches the predetermined threshold, the second return instruction is sent to the return module 15;
[0123] The return module 15 is configured to return the default key value provided by the query module 12 according to the first return instruction to start the first browser; or according to the second return instruction, redirect the default browser corresponding to the default key value to the second browser To start the second browser.
[0124] The device of this embodiment can be used to execute figure 1 The implementation principles and technical effects of the technical solutions of the illustrated method embodiments are similar, and will not be repeated here.
[0125] Image 6 It is a schematic structural diagram of Embodiment 2 of the browser activation device of the present invention, such as Image 6 As shown, the device of this embodiment is Figure 5 Based on the shown device structure, further, the first judgment module 13 may include:
[0126] The installation determining submodule 21 is used to determine whether the predetermined first browser has been installed according to the first judgment instruction, and if it is determined that the first browser is installed, it sends a default including the default key value to the default browser judgment submodule 22 Browser judgment instruction;
[0127] The default browser judgment sub-module 22 is used to judge whether the default browser corresponding to the default key value is the predetermined first browser according to the default browser judgment instruction, and if the default browser corresponding to the default key value is the predetermined first browser Then, the second judgment instruction is sent to the second judgment module 14.
[0128] Figure 7 It is a schematic structural diagram of Embodiment 3 of the browser activation device of the present invention, such as Figure 7 As shown, the device of this embodiment is Figure 5 On the basis of the device structure shown, further, the browser activation device may further include a setting module 16 for presetting the hook function linked to the function NtQueryValueKey for querying the key value in the registry and providing it to the monitoring module 11; 11 Monitor the event of querying the key value in the registry through the hook function, and obtain the event message of querying the default key value in the registry key of the default browser.
[0129] Preferably, in the above-mentioned embodiment, the return module 15 loads the redirect rule of the first browser to lock the second browser as the default browser according to the second return instruction, and according to the first browser to lock the second browser as The redirection rule of the default browser redirects the default browser corresponding to the default key to the second browser to start the second browser.
[0130] The device of this embodiment can be used to execute figure 2 The implementation principles and technical effects of the technical solutions of the illustrated method embodiments are similar, and will not be repeated here.
[0131] Preferably, the redirection rule of the first browser for locking the second browser as the default browser is: returning the installation path of the second browser as the default key value. That is, the return module 15 returns the installation path of the second browser as the default key value according to the second return instruction to start the second browser.
[0132] Preferably, in the above-mentioned embodiment, when the second judgment module 14 judges that the number of activations of the first browser in a predetermined period of time is less than a predetermined threshold, it is also used to send the return module 15 to close the first browser redirect Instruction; the return module 15 is also used to notify the first browser to close the redirection function of the default browser according to the redirection instruction of closing the first browser.
[0133] Figure 8 It is a schematic structural diagram of Embodiment 4 of the browser activation device of the present invention, such as Figure 8 As shown, the device of this embodiment may further include a timing module 17 for monitoring whether the predetermined time period has expired, and if the predetermined time period has expired, send a clearing instruction to the return module 15 and the second judgment module 14; return module 15, It is also used for clearing the redirection rules of the loaded first browser and the locked second browser as the default browser according to the clearing instruction; the second judgment module 14 is also used for the clearing instruction to change the first browser's The number of activations is assigned an initial value of 0.
[0134] The device of this embodiment can be used to execute figure 1 or figure 2 The implementation principles and technical effects of the technical solutions of the illustrated method embodiments are similar, and will not be repeated here.
[0135] Picture 9 It is a schematic structural diagram of Embodiment 5 of the browser activation device of the present invention, such as Picture 9 As shown, the device of this embodiment is Figure 5 On the basis of the device structure shown, further, the second judgment module 14 includes: a recording sub-module 31 for recording the time when the first browser is started this time when the first browser is started; a reading sub-module 32, It is used to read the last startup time of the first browser recorded by the recording submodule 31 according to the second judgment instruction, and obtain the date corresponding to the last startup time of the first browser according to the last startup time of the first browser , Sending the date corresponding to the time when the first browser was last started to the comparison submodule 33; the comparison submodule 33 is used to obtain the current system date when the date corresponding to the time when the first browser was last started is received, And it is judged whether the date corresponding to the time when the first browser was last started is consistent with the current system date, if it is consistent, the second return instruction is sent to the return module 15, if not, the first return instruction is sent to the return module 15.
[0136] The device of this embodiment can be used to execute Figure 4 The implementation principles and technical effects of the technical solutions of the illustrated method embodiments are similar, and will not be repeated here.
[0137] Picture 10 It is a schematic structural diagram of Embodiment 6 of the browser activation device of the present invention, such as Picture 10 As shown, the device of this embodiment is Figure 5 On the basis of the structure of the device shown, the device further includes a switch key value judgment module 18 for querying a preset switch key value, and if the switch key value represents a predetermined value that is switched on, it sends a start to the monitoring module 11 Monitoring notification, if the on-off key value is a predetermined value indicating off, then the monitoring module 11 is sent a notification of ending monitoring. The monitoring module 11 is used to start monitoring the event of querying the key value in the registry according to the start monitoring notification; it is also used to end the monitoring of the event querying the key value in the registry according to the end monitoring notification.
[0138] The device of this embodiment can be used to execute image 3 The implementation principles and technical effects of the technical solutions of the illustrated method embodiments are similar, and will not be repeated here.
[0139] The embodiment of the present invention also provides an electronic device. Picture 11 It is a schematic structural diagram of an embodiment of an electronic device of the present invention, which can implement the present invention figure 1 or figure 2 The flow of the illustrated embodiment, such as Picture 11 As shown, the above-mentioned electronic equipment may include: a housing 41, a processor 42, a memory 43, a circuit board 44, and a power circuit 45, wherein the circuit board 44 is arranged inside the space enclosed by the housing 41, the processor 42 and the memory 43 Is set on the circuit board 44; the power supply circuit 45 is used to supply power to the various circuits or devices of the above electronic equipment; the memory 43 is used to store executable program codes; the processor 42 reads the executable program codes stored in the memory 43 Run a program corresponding to the executable program code to execute the browser startup method described in any of the foregoing embodiments.
[0140] The electronic device exists in many forms, including but not limited to:
[0141] (1) Mobile communication equipment: This type of equipment is characterized by mobile communication functions, and its main goal is to provide voice and data communications. Such terminals include: smart phones (such as iPhone), multimedia phones, functional phones, and low-end phones.
[0142] (2) Ultra-mobile personal computer equipment: This type of equipment belongs to the category of personal computers, has calculation and processing functions, and generally also has mobile Internet features. Such terminals include: PDA, MID and UMPC devices, such as iPad.
[0143] (3) Portable entertainment equipment: This type of equipment can display and play multimedia content. Such devices include: audio and video playback modules (such as iPod), handheld game consoles, e-books, as well as smart toys and portable car navigation devices.
[0144] (4) Server: A device that provides computing services. The composition of a server includes a processor, hard disk, memory, system bus, etc. The server is similar to a general computer architecture, but because it needs to provide highly reliable services, it is in terms of processing capacity and stability. , Reliability, security, scalability, and manageability.
[0145] (5) Other electronic equipment with data interaction function.
[0146] It should be noted that in this article, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply one of these entities or operations. There is any such actual relationship or order between. Moreover, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements, but also includes those that are not explicitly listed Other elements of, or also include elements inherent to this process, method, article or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other same elements in the process, method, article, or equipment including the element.
[0147] The various embodiments in this specification are described in a related manner, and the same or similar parts between the various embodiments can be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and for related parts, please refer to the part of the description of the method embodiment.
[0148] For the convenience of description, the above devices are described in terms of functions divided into various units/modules. Of course, when implementing the present invention, the functions of each unit/module can be implemented in the same one or more software and/or hardware.
[0149] A person of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiments can be implemented by instructing relevant hardware through a computer program. The program can be stored in a computer readable storage medium. During execution, it may include the procedures of the above-mentioned method embodiments. Wherein, the storage medium may be a magnetic disk, an optical disc, a read-only memory (Read-Only Memory, ROM) or a random access memory (Random Access Memory, RAM), etc.
[0150] The above are only specific embodiments of the present invention, but the scope of protection of the present invention is not limited thereto. Any person skilled in the art can easily think of changes or substitutions within the technical scope disclosed by the present invention. All should be covered within the protection scope of the present invention. Therefore, the protection scope of the present invention should be subject to the protection scope of the claims.
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Process for preparing methyl methacrylate according to aldol condensation method
Owner:PUJING CHEM IND SHA +1
Parking lot dynamic partition parking method and parking lot server
Owner:SHENZHEN GENVICT TECH
Circuit structure for conducting least square equation solving according to positive definite symmetric matrices
Owner:FUDAN UNIV
Networked system fault-tolerant control method based on dynamic event triggering mechanism
Owner:HARBIN UNIV OF SCI & TECH
Classification and recommendation of technical efficacy words
- increase usage
Mobile communication terminal and wireless communication system
Owner:KYOCERA CORP
Memo method and communication terminal
Owner:YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Serial Peripheral Interface (SPI) controller and communication method
Owner:SUZHOU ZHONGKE ADVANCED TECH RES INST CO LTD