Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

385 results about "Business value" patented technology

In management, business value is an informal term that includes all forms of value that determine the health and well-being of the firm in the long run. Business value expands concept of value of the firm beyond economic value (also known as economic profit, economic value added, and shareholder value) to include other forms of value such as employee value, customer value, supplier value, channel partner value, alliance partner value, managerial value, and societal value. Many of these forms of value are not directly measured in monetary terms.

Self-authentication of value documents using digital signatures

An encryption-free technique for enabling the self-authentication of value documents (including personal and commercial checks) presented at a point of purchase or financial institution. Certain data contained on the value document may be signed with a first digital signature and authenticated with a public key certificate issued from a trusted certificate authority. The signed data and public key certificate are stored on the value document, preferably in a two-dimensional bar code data format. In the case of certain personal value documents (such as checks, credit cards, passports, birth certificates, Social Security cards, etc.), a unique personal identification number (PIN) also may be included in the document data that is signed by a second digital signature. At a point of purchase, a merchant or teller can scan and read the data stored in the two-dimensional bar code and other magnetically recorded information, and together with the PIN the customer provides, can authenticate the value document thus presented using the second digital signature. Alternatively, if the customer is not present, if the personal value document contains the second digital signature, the document may be verified using a PIN-generating algorithm or other method that generates all permutations of PINs. The first digital signature alone may be used to authenticate selected data within the personal value document even when the PIN is not available. Similarly, in the case of a commercial value documents, authentication of pre-printed data may be based entirely upon only the first digital signature.
Owner:UNISYS CORP

Smart video monitoring system based on cloud platform

The invention relates to a smart video monitoring system based on a cloud platform, and belongs to the technical field of remote smart monitoring. The system is characterized in that a video monitoring cloud platform is developed on a server cluster established on the basis of a Hadoop cloud computing platform, and video data acquired by front-end equipment are transmitted to a server in a stream way; through adoption of a massive distributed cloud computing technology, real-time tracking, processing, analysis and outputting of video streams are realized; and a service is provided externally, so that a terminal user can perform checking and calling conveniently. In the system, the characteristics of distributed high-concurrence access storage, high availability, rapid response, easiness in management and maintenance and the like are integrated. Video acquisition, video encoding and transcoding, video data storage, a streaming media distributed server and a client are all distributed on a physical host node in an access network. Compared with a conventional video monitoring system, the smart video monitoring system has the advantages that video real-time processing and transcoding efficiency and video data storage capacity are increased greatly; the requirement of people on the video monitoring system in a big data era is met; and a relatively large commercial value is achieved.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Control structure for versatile content control

A tree structure stored in the storage medium provides control over what an entity can do even after gaining access. Each of the nodes of the tree specifies permissions by an entity who has gained entry through such node of the tree. Some trees have different levels, where the permission or permissions at a node of the tree has a predetermined relationship to permission or permissions at another node at a higher or lower or the same level in the same tree. By requiring entities to comply with the permissions so specified at each of the nodes, the tree feature of this application allows a content owner to control which entities can take action, and which actions each of the entities can take, irrespective of whether the tree has different levels. To enhance the commercial value that can be provided by the mobile storage medium, it is desirable for mobile storage devices to be capable of supporting more than one application simultaneously. When two or more applications are accessing the mobile storage device at the same time, it can be important to be able to separate the operations of the two or more applications so that they do not interfere with one another in a phenomena referred to herein as crosstalk. Two or more preferably hierarchical trees control access to the memory. Each tree comprises nodes at different levels for controlling access to data by a corresponding set of entities where a node of each tree specifies permission or permissions of the corresponding entity or entities for accessing memory data. The permission or permissions at a node of each of the trees has a predetermined relationship to permission or permissions at another node at a higher or lower level in the same tree. Preferably, there is no crosstalk between at least two of the trees.
Owner:SANDISK TECH LLC

A pointer positioning mechanism of a watch, its positioning method, and pointer zeroing and pointer correction methods

ActiveCN102289191ASmall sizeOvercome the defect of small installation spaceElectric windingSetting time indicationAutocorrectionSignal-to-noise ratio (imaging)
The invention discloses a mechanism for positioning pointers of a watch and methods for positioning, resetting and calibrating the pointers and belongs to the technical field of the watch. The invention is technically characterized in that: an ordinary reflecting photoelectric sensor is arranged on the front surface of a movement of the watch and used for capturing pointer signals which are generated during the sweeping of the pointers; a microprocessor processes the pointer signals; a filtering module of the microprocessor performs correlation filtering on the pointer signals to improve the signal to noise ratio of the pointer signals; a pointer identification module performs statistic analysis and characteristic analysis on the pointer signals to determine the position of each pointer; and a motor control module controls the pointers to move according to the position of each pointer, so that the pointers can be automatically calibrated and reset. In the scheme, an ordinary process installation requirement is only required without designing of a special detection component, so that a technology for automatically calibrating the pointers of the watch can be popularized and applied on a large scale, the cost of products can be greatly reduced, and the invention has an important technical significance and a business value.
Owner:东莞丝丽雅电子科技有限公司

Document-level sentiment analysis method based on specific domain sentiment words

ActiveCN108804417AMake up for the lack of domain specific wordsVersatilitySemantic analysisCharacter and pattern recognitionData setAlgorithm
The invention provides a document-level sentiment analysis method based on specific domain sentiment words. The method is implemented by the following steps of collecting a document data set, traininga set of prototype words by using a Skip-gram word vector model to obtain a word vector corresponding to each prototype word, recombining the word vectors by utilizing an attention mechanism, and capturing a relation between non-continuous words in the word vectors; synthesizing the words and sentences by using an asymmetric convolutional neural network and a bidirectional gate recurrent neural network based on the attention mechanism respectively, thereby forming document vector characteristics; generating sentiment eigenvectors by utilizing a domain sentiment dictionary of the Skip-gram word vector model; and finally, combining the document vector characteristics and the sentiment eigenvectors by utilizing a linear combination layer to form document characteristics beneficial to document classification. The sentiment analysis is widely applied to the product analysis, the commodity recommendation, the stock price trend prediction and the like; and the method provided by the invention can accurately and efficiently carry out sentiment analysis on documents, and has great commercial values.
Owner:SHANDONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products