Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

433 results about "Match rule" patented technology

A reconciliation matching rule is a set of criteria that are used to filter bank statement lines and Microsoft Dynamics 365 for Finance and Operations bank transaction lines during the reconciliation process.

Systems and methods to facilitate selling of products and services

The system of the present invention provides systems and methods for selling goods and services on, over, through, and in conjunction with the Internet. The system receives session (clickstream) information on a customer's website session from the enterprise's website and may also receive customer information on the customer from the enterprise's CRM or eCRM system. The session information referred to comprises the goods or services the customer is searching and metadata about such search and the relevant products, such as the surfing pattern itself. The system determines from the received information, based on the interaction between matching rules created using the system by the enterprise and the system's matching engine, whether the customer is a candidate for assistance from a sales associate. The system creates and indexes information on available sales associates and their performance, selling capabilities and product expertise. The system further matches the customer with at least one sales associate, ideally the most appropriate sales associate, based on the customer, session, and sales profile associate information, and facilitates communication between the sales associate and the customer. Additionally, the system provides information on the customer, products or services the customer is interested in, and the collateral sales materials (both internal and external to the enterprise) and selling techniques to the sales associate based on the particular sales opportunity. The system facilitates communication between the sales associate and the customer on the basis of chat, voice over IP, email and the public switched telephone network, including the concept of bridging a chat session into a PSTN conference call during which call the sales associate and customer maintain a co-browsing session with regard to the opportunity over the Internet.
Owner:LIVEPERSON

Mapping processing system and method for solving problem of standard code control of medical data

The invention provides a mapping processing system and method for solving a problem of standard code control of medical data. The mapping processing system comprises a resource word bank, a target value range bank, a simulation semantic word segmentation unit, a fuzzy matching unit, an accurate matching unit, a matching table and a labor management unit. The mapping processing method includes steps of acquiring data from the medical data, mapping the acquired data in an accurate match manner according to standard codes stored in the target value range bank or mapping matching rule information stored in the matching table; analyzing fuzzy semantics of the data acquired from a data source; subjecting simulation semantic word segmentation results to fuzzy matching to generate a mapping matching result; mapping the medical data into the standard codes according to the mapping matching rule information in the matching table and generating a medical data mapping processing result. The mapping processing system and method build an automatic mapping matching process, and high accuracy and matching accuracy of the mapping matching results are achieved by combination of fuzzy matching, labor check, mechanical training and the like.
Owner:SHENYANG REALESOFT TECH

Systems and methods to facilitate selling of products and services

The system of the present invention provides systems and methods for selling goods and services on, over, through, and in conjunction with the Internet. The system receives session (clickstream) information on a customer's website session from the enterprise's website and may also receive customer information on the customer from the enterprise's CRM or eCRM system. The session information referred to comprises the goods or services the customer is searching and metadata about such search and the relevant products, such as the surfing pattern itself. The system determines from the received information, based on the interaction between matching rules created using the system by the enterprise and the system's matching engine, whether the customer is a candidate for assistance from a sales associate. The system creates and indexes information on available sales associates and their performance, selling capabilities and product expertise. The system further matches the customer with at least one sales associate, ideally the most appropriate sales associate, based on the customer, session, and sales profile associate information, and facilitates communication between the sales associate and the customer. Additionally, the system provides information on the customer, products or services the customer is interested in, and the collateral sales materials (both internal and external to the enterprise) and selling techniques to the sales associate based on the particular sales opportunity. The system facilitates communication between the sales associate and the customer on the basis of chat, voice over IP, email and the public switched telephone network, including the concept of bridging a chat session into a PSTN conference call during which call the sales associate and customer maintain a co-browsing session with regard to the opportunity over the Internet.
Owner:LIVEPERSON

Open flow table security enhancement method and device

ActiveCN103095701AEasy to carry outProtect against zero-day attacksTransmissionVirtualizationPrivate network
The invention discloses an open flow table security enhancement method which can enable a security control function to be separated from a security executive function. The method includes the steps of obtaining security application corresponding to each security service, extracting security strategies, security protocols and feature libraries corresponding to the various security services from the security application, analyzing the security strategies of the security services to generate a security flow table, and creating a matching rule in the security flow table, and carrying out access control to messages and inspection for a state firewall, a security virtual private network (VPN) and deep messages according to the matching rule in the security flow table. The invention simultaneously discloses an open flow table security enhancement device. The open flow table security enhancement method and the open flow table security enhancement device can enable the security execution and the security application to be independently evolved and upgraded, and bring convenience to development of new security services, and can intensively carry out security management, resist zero-day attack, and relieve distributed denial of service attack according to the security strategies, and also support a virtualization multi-tenant security mode.
Owner:ZTE CORP

Method and knowledge structures for reasoning about concepts, relations, and rules

A system and method for reasoning about concepts, relations and rules having a semantic network comprising at least one node from a predetermined set of node types, at least one link from a predetermined set of link types, and zero or more rules from a predetermined set of rule types, a subset of the rule types being matching rule types, each node and each link being associated with a set of zero or more rules; a network reasoning data structure having a reasoning type database having at least one regular expression, each of the regular expressions being a class of sequences having at least three node types and two link types, wherein the network reasoning data structure further has a context being a set of rules; and a reasoning engine having an activator for activating one or more activated paths in the semantic network, the set of activated paths having a common starting node in the semantic network, wherein the reasoning engine further has a validator for selecting a subset of the activated paths being valid paths, each rule from the set of rule matching types that is associated with one or more path elements on each valid path being matched by one or more rules in the context and wherein the reasoning engine further has a legal inferencer for selecting a subset of the set of valid paths being legal and valid paths, the legal and valid paths matching at least one of the regular expressions.
Owner:IBM CORP

Method and knowledge structures for reasoning about concepts, relations, and rules

A system and method for reasoning about concepts, relations and rules having a semantic network comprising at least one node from a predetermined set of node types, at least one link from a predetermined set of link types, and zero or more rules from a predetermined set of rule types, a subset of the rule types being matching rule types, each node and each link being associated with a set of zero or more rules; a network reasoning data structure having a reasoning type database having at least one regular expression, each of the regular expressions being a class of sequences having at least three node types and two link types, wherein the network reasoning data structure further has a context being a set of rules; and a reasoning engine having an activator for activating one or more activated paths in the semantic network, the set of activated paths having a common starting node in the semantic network, wherein the reasoning engine further has a validator for selecting a subset of the activated paths being valid paths, each rule from the set of rule matching types that is associated with one or more path elements on each valid path being matched by one or more rules in the context and wherein the reasoning engine further has a legal inferencer for selecting a subset of the set of valid paths being legal and valid paths, the legal and valid paths matching at least one of the regular expressions.
Owner:IBM CORP

Quasi-continuous laser metal 3D printing method capable of realizing regulation of nickel base alloy crystallographic texture

The invention discloses a quasi-continuous laser metal 3D printing method capable of realizing regulation of nickel base alloy crystallographic texture. Laser output is set as a quasi-continuous lasermode, and then a laser metal 3D printing technical window is preliminarily optimized. The temperature field of a molten bath under the preliminarily optimized parameter is calculated by using a finite element heat transfer model; the temperature gradient G and the cooling rate xi of the moving boundary of the molten bath during closing of laser in a single pulse period are extracted, and the growth length L of a single pulse internal columnar dendrite is worked out according to a structure growth theoretical model; the laser parameter is optimized according to the matching rule that the ratioof the scanning speed V to pulse frequency f is 0.5-0.8L, and finally 3D printing forming is conducted according to the optimized parameter, so that a formed part with the consistent crystallographicorientation height is obtained. By regulating the heat source output mode, an effective remelting mechanism for mixed crystal or isometric crystal is introduced in the scanning direction, all columnar dendrite growth is obtained, and the consistency of grain orientation is remarkably improved.
Owner:HUNAN UNIV

Method for retrieving confidential information of file and judging and marking security classification based on content correlation

A method for retrieving confidential information of a file and judging and marking the security classification based on content correlation is mainly characterized by comprising the following steps of: selecting corresponding confidential keywords and a matched rule base according to the range to which a document belongs; accurately and comprehensively searching confidential information in the document by carrying out word segmenting operation on the document contents and constructing a semantic correlation network; carrying out security classification judgment and encryption processing on each confidential information point according to a secret-level setting rule in a secret-level setting rule base; then giving out corresponding security classifications by integrating the security classifications of various confidential information points; and finally, marking related confidential information in the documents. According to the method, the confidential information in the document can be efficiently searched and the security classification of the document is accurately judged, so that the workload of manual secret-level setting is reduced, the efficiencies of secret-level setting work and the security classification appraisal work are increased, the random secret-level setting phenomenon in the secret-level setting process is effectively prevented and new confidential keywords and matching rules can be automatically learned, and further the precision of retrieval and security classification judgment is continuously improved.
Owner:徐亮 +1

Large-scale network monitoring oriented virtual deployment system and method

The invention discloses a large-scale network monitoring oriented virtual deployment system and method. The system is provided with a deployment center platform and a plurality of deployment target machines communicated with the deployment center platform via a network. The deployment center platform is responsible for uniformly planning and managing a topology structure of measurement probe deployment in an entire computer network, issuing a deployment task according to the existing measurement probe deployment condition and network congestion condition, and executing management and version control on the deployed measurement probes. The deployment target machines receive and execute commands from the deployment center platform, and automatically execute corresponding operations so as to enable the measurement probes to be usable in the network; and a software dependency detection mechanism and a process matching rule are respectively used for realizing the platform independency of deployment and verifying the achievement of deployment. The system and the method can be used for solving a plurality of problems, such as dependency detection for deployment environment of the target machines, upgrading and maintaining of a management system version, concurrent deployment, automatic installation and detection of the plurality of target machines, dynamic scheduling and the like, in the prior art, and have better promotion and application prospects.
Owner:BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products