Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

34 results about "Demand creation" patented technology

Demand creation is the process of increasing the demand for a product or service using marketing techniques. The term is typically applied to unsought products that have little demand because it's they are unknown to customers.

Anti-counterfeiting method of print pictures based on CCD detection

The invention discloses an anti-counterfeiting method of print pictures based on CCD detection and belongs to the field of presswork forgery prevention. The method includes: establishing an anti-counterfeiting information database, embedding anti-counterfeiting information, and detecting the anti-counterfeiting information. Recording in the anti-counterfeiting information database can be established according the need of a unit. The anti-counterfeiting information is embedded by embedding mesh points different in area rate into a half-tone picture, and the mesh points different in area rate are used to express character information. A detection method of the anti-counterfeiting information includes: using CCD equipment to acquire a print picture with embedded anti-counterfeiting information and a print picture with no embedded anti-counterfeiting information, extracting the embedded anti-counterfeiting information by a feature extraction method, determining a printed matter is true if the data matching with that in the database, and determining the printed matter is counterfeited if the data matching with that in the database is not obtained. The method has the advantages that forgery prevention for printed matters such as package and certificates in practical production can be achieved and copying difficulty is increased greatly.
Owner:TIANJIN UNIVERSITY OF SCIENCE AND TECHNOLOGY

Method and device for supporting multi-tenancy network transmission

The invention provides a method and device for supporting multi-tenancy network transmission. The method comprises the following steps: creating a primary-level inter-network transmission container, and creating at least one secondary-level inter-network transmission container based on a tenant demand; receiving network packets and classifying the network packets by the primary-level inter-network transmission container, and sending network packets conforming to classification processing to the corresponding secondary-level inter-network transmission container for packet processing; and based on an interface equipment type, sending the processed network packets by the secondary-level inter-network transmission container. According to the invention, functions of boarder routing devices of different virtual networks are integrated and abstracted into one, the workload of operation management is reduced, and the workload of subsequent development testing is decreased. Besides, through only virtualization of network functions, only network packets are forwarded, forwarding protocol stacks are optimized, it is unnecessary to configure such virtual functions of a CPU, a memory, a hard disk and the like which are similar to a virtual machine, and therefore, the performance and capacity advantages are remarkable.
Owner:ALIBABA GRP HLDG LTD

Multi-protocol acquiring and scheduling method for comprehensive network management

The invention relates to a multi-protocol acquiring and scheduling method for comprehensive network management. An acquiring and scheduling service is a bridge for connecting a data presentation layer to an acquiring adapter, and is responsible for operating a task and feeding back a result; an acquirer of the acquiring and scheduling service is a program developed according to different interface protocols; by means of the acquirer, acquisition of all data described by the interface protocols is realized; the task to be operated comes from the presentation layer; users can see all kinds of operations supported by an interface in an interface configuration interface and create all kinds of acquisition tasks according to practical requirements in a task management interface; the acquiring and scheduling service operates the configured task in a timed manner; an acquisition service is adapted according to information described by the task; then, the acquisition service is invoked through a standard inlet; operation of the acquisition service is monitored; and an operation result is fed back to the presentation layer or directly written in a data storage layer. According to the invention, uniform invoking of multi-protocol and multi-language processes is realized; the various interface protocols are thoroughly isolated from the presentation layer; and thus, qualification requirements of constructors and maintainers are greatly reduced.
Owner:BEIJING ENOVELL TECH

Intelligent lock control method, device and system, and computer readable storage medium

InactiveCN110246255AImprove industrial application securityIndividual entry/exit registersIndustrial areaApplication areas
The invention discloses an intelligent lock control method, which comprises the following steps that: when an intelligent lock control requirement is received, confirming a corresponding target intelligent lock application area based on the intelligent lock control requirement; analyzing the received intelligent lock control requirement, and according to an analysis result, confirming the control contents of the target intelligent lock application area; by a preset format, according to the control contents, generating an intelligent lock control process; and issuing the generated intelligent lock control process to the target intelligent lock application area. The invention also discloses a device, a computer readable storage medium and a system. The intelligent lock control method is constructed in an industrial area where the intelligent lock is deployed, and on the basis of the intelligent lock control requirement, an intelligent lock control process based on the current intelligent lock industrial application area is configured. Since the intelligent lock control process is created on the basis of the current control requirement, the method comprises intelligent lock control logic and a control sequence to realize a beneficial effect that the industrial application safety of the intelligent lock is improved.
Owner:SHENZHEN SHENG YU MIN PHOTOELECTRIC TECH CO LTD

Honeycomb architecture application implementation method based on data encryption processing technology

The invention discloses a honeycomb architecture application implementation method based on a data encryption processing technology, and the method comprises the following steps: 1, setting a root platform and a cache platform based on the data encryption processing technology, building a honeycomb group layer structure by using the root platform, and building a plurality of nodes in the honeycomb group layer structure; 2, determining the fields to which the root platforms and the cache platforms belong according to commercial requirements, and then setting the number of the root platforms and the cache platforms in the field; 3, determining a structure framework and platform group division of the honeycomb type group layer structure according to commercial requirements; 4, creating nodes according to commercial requirements, and defining nodes, classification nodes and group attribution of the nodes and the classification nodes; and 5, defining an encryption algorithm and authorization thereof according to commercial requirements. The honeycomb architecture application realization method can meet the business requirements of scientific and technological upgrading and daily extraordinary business, the solution after information integration is accurate, and the method can control the cost cause of the operation project on the platform timely and accurately.
Owner:郑勇

A multi-protocol acquisition and scheduling method for integrated network management

The invention relates to a multi-protocol acquiring and scheduling method for comprehensive network management. An acquiring and scheduling service is a bridge for connecting a data presentation layer to an acquiring adapter, and is responsible for operating a task and feeding back a result; an acquirer of the acquiring and scheduling service is a program developed according to different interface protocols; by means of the acquirer, acquisition of all data described by the interface protocols is realized; the task to be operated comes from the presentation layer; users can see all kinds of operations supported by an interface in an interface configuration interface and create all kinds of acquisition tasks according to practical requirements in a task management interface; the acquiring and scheduling service operates the configured task in a timed manner; an acquisition service is adapted according to information described by the task; then, the acquisition service is invoked through a standard inlet; operation of the acquisition service is monitored; and an operation result is fed back to the presentation layer or directly written in a data storage layer. According to the invention, uniform invoking of multi-protocol and multi-language processes is realized; the various interface protocols are thoroughly isolated from the presentation layer; and thus, qualification requirements of constructors and maintainers are greatly reduced.
Owner:BEIJING ENOVELL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products