Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

642 results about "Users perceptions" patented technology

Method for evaluating QoE (Quality of Experience) of mobile streaming media service perception experience by simulating user behaviors

InactiveCN102685790AEasy to manage centrallyParameter standard objectiveSelective content distributionWireless communicationPsychological ModelsComputation complexity
The invention discloses a method for evaluating QoE (Quality of Experience) of mobile streaming media service perception experience by simulating user behaviors. The method comprises the following steps of: firstly, setting a mobile streaming media service QoE evaluation index system in which the user perception experience of mobile streaming media services are divided into parameters in three aspects of service access, service continuance and service completion; secondly, simulating the whole process of a user using the mobile streaming media services by a test terminal, and acquiring, respectively calculating key performance indexes (KPI) of the mobile streaming media services, calculating key quality indexes (KQI) of corresponding services of the mobile streaming media services, and performing comprehensive operation on the KQIs by means of a psychological model to obtain key experience indexes (KEI) of the corresponding services; and finally, comprehensively analyzing the KEI indexes to obtain a streaming media service QoE value which is in a five-grade marking system and equivalent to international standard MOS (Mean Opinion Score). The method disclosed by the invention is objective and practicable in evaluation parameter standard, simple in operation step, low in calculation complexity and easy to integrate, and is capable of obtaining relatively objective, just user experience perception quality by simulating the mobile streaming media service user.
Owner:北京东方文骏软件科技有限责任公司 +1

Embedded browser and implement method thereof

The invention discloses an embedded browser and an implement method of the embedded browser. The embedded browser comprises a main program module, a communication interface module, a browser plug-in module, a browser application module and a browser kernel module. The main program module is composed of browser initialization, socket event cycling and a program quit submodule. The communication interface module carries out data interaction through a communication server process and other processes. The browser plug-in module is composed of a java script object (JS-Object) plug-in and a Flash plug-in submodule. The browser application module comprises kernel parameter configuration, browser key value configuration, virtual event management and a window and page control management submodule. The browser kernel module is composed of cookie management and a kernel key value submodule. The embedded browser achieves that a browser socket event process function monitors information periodically, has the functions of requesting information reports, displaying a progress window and cookie management according to a page loading progress, supports java script (JS) object extension and a soft keyboard, and is convenient to use, low in development cost, convenient to upgrade and maintain and good in user perception.
Owner:CHENGDU SANLING KAITIAN COMM IND

Efficient and safe data deduplication method and efficient and safe data deduplication system based on user perception

The invention provides an efficient and safe data deduplication method based on user perception, which comprises the steps that a client adopts key server assisted Hash-based convergence encryption to carry out file-level data deduplication across users; if duplication does not exists in files, user assisted convergence encryption is adopted to carry out block-level deduplication inside the users; and multilevel key management is adopted, a file-level secret key is used to encrypt a block-level secret key, the file-level secret key is segmented into fragment-level secret keys by using secret sharing, and the fragment-level secret keys are stored in a distributed key server. The invention further provides an efficient and safe data deduplication system based on user perception. According to the invention, random information is added through adopting key server assisted Hash-based convergence encryption in a file level and adopting user assisted convergence encryption in a block level, thereby enabling file-level secret keys and block-level secret keys of users to be randomized, being capable of effectively resisting brute force attacks of opponents, and ensuring the data confidentiality and the safety of the users; and the multilevel key management scheme is adopted to ensure the safety of secret keys, and the secret key space overhead is reduced.
Owner:HUAZHONG UNIV OF SCI & TECH

Method for collecting abnormal data of TD-SCDMA (Time Division-Synchronization Code Division Multiple Access) wireless communication network user terminal

The invention discloses a method for collecting abnormal data of a TD-SCDMA (Time Division-Synchronization Code Division Multiple Access) wireless communication network user terminal. The method comprises the following steps: firstly, collecting key information of a wireless communication network at real time when a wireless communication network service is used by a user, thereby generating a data log file; comparing the collected network information with a built-in database so as to judge the network state; if the fact that the network is abnormal is detected, judging a reason and writing an abnormal reason and abnormal mobile phone signaling information into the data log file; automatically giving an uploading prompt and automatically uploading the log data onto an appointed back-stage management platform after being agreed by the user; and lastly managing and automatically analyzing the log data in the back-stage management platform. The method can be used for finding out abnormal phenomenon in daily service process based on a commercial terminal, more approaching to network use perception of an ordinary user, efficiently ensuring the consistency of user action and testing result as well as user perception, and more comprehensively estimating the property and the service quality of the whole network.
Owner:DINGLI COMM

Initiative claim settlement service system for flight delay insurance

The invention relates to an initiative claim settlement service system for the flight delay insurance. The initiative claim settlement service system comprises a service processing core module, a product management module, an insurance policy data management module, a flight dynamic database module, a user information management module, a user information collecting addition module and a payment processing module. The initiative claim settlement service system is connected with an external marketing system, an external flight dynamic database server and a third-party payment platform through ports, so that when the dynamic states of a flight guaranteed by the flight delay insurance change, relevant information can be rapidly and accurately obtained, whether insurance policies are given out or not and whether claim settlement conditions are met or not can be automatically judged, settlement can be rapidly carried out on the insurance policies meeting the claim settlement conditions, and complex procedures for automatically searching delay proofs by travelers and inconvenience caused by automatically searching the delay proofs by the travelers are saved; in other words, the insurance claim settlement service cost is reduced, and the service time length is shortened; meanwhile, the user perception and the user satisfaction are improved, and the healthy development of the market of the flight delay insurance is facilitated.
Owner:SHANGHAI BAOCHUN COMM TECH

Sweep frequency and propagation model coverage prediction-based frequency optimization method

The invention belongs to the technical field of mobile communication technology, in particular to a sweep frequency and propagation model coverage prediction-based frequency optimization method, which is characterized by comprising the following steps of: testing main roads through a sweep generator to acquire sweep frequency data; establishing an interference model based on the sweep frequency and the coverage prediction and fusing a sweep frequency data rasterized road damage matrix and a coverage prediction road damage matrix; establishing a dynamic evaluation function based on the interference model; and searching a frequency optimization scheme according to the dynamic evaluation function and continuously repeating the searching to obtain an optimized frequency optimization scheme. In the sweep frequency and propagation model coverage prediction-based frequency optimization method, the sweep frequency which is measured data consistent with user perception is fully utilized; meanwhile, the propagation model coverage prediction is integrated; and the interference model is established by fusing the sweep frequency and the propagation model coverage prediction, and the dynamic evaluation function is established based on the accurate model so as to effectively search the frequency optimization scheme which meets the requirement.
Owner:SHANGHAI BYNEAR TELESOFT

Method and system for speech quality perception evaluation based on speech semantic recognition technology

ActiveCN108877839AGood repeatabilitySolve problems that cannot restore the thinking paradigm of the human brainNatural language data processingSpeech recognitionUser perceptionUsers perceptions
The invention discloses a method and system for speech quality perception evaluation based on the speech semantic recognition technology. According to a text of a sender after user speech conversion and a text of a receiver after user speech conversion, text similarity evaluation is carried out based on a text similarity fitting algorithm; network parameters and event information of communicationunit connection networks of the sender and the receiver are displayed in real time and are stored; a user speech perception evaluation model is established by using speech information according to a telecom psychology algorithm and speech perception evaluation is carried out on a user; and then user perception evaluation is formed by means of text similarity evaluation , network information and voice perception evaluation. With the method disclosed by the invention, problems of poor repeatability of the subjective evaluation method and the human brain thinking paradigm can not be restored by the objective issues can be solved; the method is close to the human brain thinking mode and the perception of the network conversation speech quality of the user; and on the basis of the time-positionmapping, a network issue can be located precisely by combining the network parameter information and events.
Owner:NANJING HOWSO TECH

Encryption method and equipment applied to key security

The invention aims at providing an encryption method and encryption equipment applied to key security. The method comprises the steps of acquiring a unique identification character string of a mobile application from service equipment, and generating a data key of the mobile application; and then statically encrypting the data key according to an encryption algorithm and macro definition, and dynamically encrypting the data key according to a preset hash function and acquired MAC addresses and user passwords of user equipment. According to the method and the equipment provided by the invention, the data key of the mobile application is statically encrypted, which ensures that the data key of the mobile application can be only acquired the application including a macro definition encryption process, and thus application binding of the data key is achieved; the data key of the mobile application is dynamically encrypted, so that user equipment binding of the data key is achieved, even the MAC addresses of the user equipment are tampered to be two pieces of consistent user equipment with the inconsistent user passwords, the data key can still be not cracked and thus business data in the mobile application canoe be acquired, and user perception of the data key can be achieved.
Owner:上海艾讯云计算有限公司

An embedded browser and its implementation method

The invention discloses an embedded browser and an implement method of the embedded browser. The embedded browser comprises a main program module, a communication interface module, a browser plug-in module, a browser application module and a browser kernel module. The main program module is composed of browser initialization, socket event cycling and a program quit submodule. The communication interface module carries out data interaction through a communication server process and other processes. The browser plug-in module is composed of a java script object (JS-Object) plug-in and a Flash plug-in submodule. The browser application module comprises kernel parameter configuration, browser key value configuration, virtual event management and a window and page control management submodule. The browser kernel module is composed of cookie management and a kernel key value submodule. The embedded browser achieves that a browser socket event process function monitors information periodically, has the functions of requesting information reports, displaying a progress window and cookie management according to a page loading progress, supports java script (JS) object extension and a soft keyboard, and is convenient to use, low in development cost, convenient to upgrade and maintain and good in user perception.
Owner:CHENGDU SANLING KAITIAN COMM IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products