热门角色不仅是灵感来源,更是你的效率助手。通过精挑细选的角色提示词,你可以快速生成高质量内容、提升创作灵感,并找到最契合你需求的解决方案。让创作更轻松,让价值更直接!
我们根据不同用户需求,持续更新角色库,让你总能找到合适的灵感入口。
生成高度正式且精准的专利背景部分,适用于法律场景。
一、技术领域 本申请涉及集成电路与生物医学工程交叉技术领域,具体涉及用于可穿戴设备的低功耗多模生物电信号采集芯片及其信号处理,涵盖模拟前端电路设计、模数转换、片上数字信号处理与功耗管理,适用于心电(ECG)、脑电(EEG)、肌电(EMG)、眼电(EOG)、生物阻抗(BioZ)等生物电信号的同步/异步采集与预处理。
二、背景技术
三、现有技术存在的技术问题 在可穿戴条件下持续、可靠地实现多模态生物电信号的低功耗采集与处理,现有技术普遍存在如下不足:
四、行业与合规环境(非限定性说明)
五、与专利法相关的说明与撰写原则
六、技术问题的客观界定 基于上述技术背景与客观限制,亟需一种面向可穿戴应用、能够在严格功耗预算下实现对多种生物电信号的高质量采集与片上高效预处理的芯片级解决方案,其至少应针对以下方面提供改进:
上述内容旨在如实反映本领域的客观技术现状与存在的技术问题,不涉及对具体实施方案的限定。后续权利要求与具体实施方式将在此技术语境下,对拟保护的技术方案及其与现有技术的实质性区别作出清楚、完整的阐述。
BACKGROUND
Field of the Disclosure
This disclosure relates to industrial Internet of Things (IIoT) computing systems and, more particularly, to gateways situated at the network edge that perform machine-learning inference and device management. The subject matter concerns architectures, methods, and systems for a pluggable edge inference framework integrated with secure, policy-driven device onboarding, configuration, orchestration, update, and lifecycle management for heterogeneous industrial assets and workloads.
Related Technology
Industrial networks typically interconnect programmable logic controllers (PLCs), sensors, actuators, robotics, and supervisory control systems (SCADA/DCS) across ruggedized environments characterized by strict safety, reliability, and real-time constraints. Gateways in such environments often implement protocol translation among fieldbuses and middleware such as Modbus, PROFINET, EtherNet/IP, CAN, OPC UA (IEC 62541), MQTT (OASIS), and DDS (OMG), and may be subject to deterministic timing requirements, e.g., those addressed by time-sensitive networking profiles (e.g., IEEE 802.1AS and 802.1Qbv). In parallel, edge computing has gained traction for local analytics and inference to reduce latency, mitigate backhaul constraints, enhance privacy, and preserve operational continuity during WAN outages.
Various runtime frameworks exist for executing trained models on constrained or heterogeneous hardware accelerators (e.g., CPUs, GPUs, FPGAs, NPUs), and containerization and orchestration technologies are used in enterprise computing to deploy and operate software at scale. In the IIoT context, practitioners have also adopted device management practices such as secure boot, measured boot and attestation, certificate-based onboarding (e.g., X.509/PKI), role-based access control, over-the-air (OTA) updates with rollback, health monitoring, and audit logging, with reference to cybersecurity and safety frameworks (e.g., IEC 62443 series for industrial automation and control system security and NIST SP 800-82, Rev. 2 for industrial control system security). Notwithstanding these developments, there remains a persistent need for solutions that reconcile industrial timing and safety requirements with flexible model lifecycle controls, multi-tenant workload isolation, hardware abstraction across accelerators, and policy-governed device and model updates at scale.
Without conceding what constitutes prior art, existing approaches can be generally characterized as siloed along several dimensions: (i) inference pipelines tightly coupled to specific hardware or vendor SDKs, impeding portability and mixed-accelerator deployment; (ii) ad hoc device management mechanisms that lack formal policy enforcement, attestation, or cryptographic provenance for models, datasets, and configuration; (iii) insufficient support for fine-grained quality-of-service (QoS), admission control, or real-time scheduling for concurrent inference workloads alongside field I/O; and (iv) limited capabilities for secure, reversible, and staged rollout of models and software, including A/B testing, canary deployments, and drift-aware updates across large fleets with intermittent connectivity.
Problem Statement
Industrial operators require an IIoT gateway architecture that enables: (a) plug-and-play integration of heterogeneous inference engines and hardware accelerators through a stable, versioned abstraction; (b) deterministic and policy-driven orchestration of multiple inference pipelines in concert with mission-critical control traffic; (c) secure supply-chain verification and lifecycle governance for models, software, and configurations, including signing, attestation, provenance, and rollback; and (d) scalable device onboarding, configuration, monitoring, and update under mixed connectivity, multitenancy, and regulatory constraints. The absence of such a unified framework leads to operational risk, vendor lock-in, inefficiencies in model deployment and maintenance, and heightened cybersecurity exposure.
Legal and Regulatory Context
Industrial deployments often implicate safety, cybersecurity, and data governance obligations. While these obligations vary by jurisdiction and sector, several widely referenced frameworks guide system design:
IEC 62443 (series): Provides requirements and processes for securing industrial automation and control systems, including asset identification, segmentation, access control, and secure update practices. A gateway’s ability to enforce least privilege, verify software integrity, and maintain auditable change histories aligns with this series’ defense-in-depth principles.
NIST SP 800-82, Rev. 2: Offers guidance for securing industrial control systems, including recommendations for secure remote access, configuration management, and patch/update processes that are resilient to operational constraints.
OPC UA (IEC 62541): Specifies secure sessions, user authentication, and certificate management for interoperable industrial communication; device and model management mechanisms benefit from congruence with these security services.
Time-sensitive networking (e.g., IEEE 802.1AS and 802.1Qbv): Establishes primitives for time synchronization and scheduled traffic. An edge inference platform that accounts for TSN scheduling can mitigate interference with time-critical control traffic.
Data protection: Although IIoT telemetry generally concerns equipment, facilities processing personal data may also be subject to data protection laws (e.g., principles of lawfulness, purpose limitation, and data minimization under applicable regimes). Architectural support for local processing, minimization, and access control reduces exposure.
These frameworks do not themselves confer intellectual property rights; however, technical features that implement or improve compliance and security (e.g., secure boot, measured boot, attestation, and trustworthy update mechanisms) may be relevant to patentability analyses, as discussed below.
Patent Law Considerations
Patent-Eligibility in the United States (35 U.S.C. § 101). Under Alice Corp. v. CLS Bank, 573 U.S. 208 (2014), courts apply a two-step framework: (1) determine whether claims are directed to a judicial exception (e.g., an abstract idea); and, if so, (2) determine whether additional elements transform the nature of the claim into a patent-eligible application. Computer-implemented inventions improving the functioning of a computer or networked system have been held eligible when they present a specific, technological improvement rather than an abstract result. See, e.g.:
Enfish, LLC v. Microsoft Corp., 822 F.3d 1327 (Fed. Cir. 2016) (claims directed to a self-referential data table improved computer functionality).
McRO, Inc. v. Bandai Namco Games Am. Inc., 837 F.3d 1299 (Fed. Cir. 2016) (claims using specific rules for automated animation were not directed to an abstract idea).
DDR Holdings, LLC v. Hotels.com, L.P., 773 F.3d 1245 (Fed. Cir. 2014) (solution rooted in computer technology to address an Internet-centric problem).
Ancora Techs., Inc. v. HTC Am., Inc., 908 F.3d 1343 (Fed. Cir. 2018) (improving computer security via a specific technique for license verification).
Thales Visionix Inc. v. U.S., 850 F.3d 1343 (Fed. Cir. 2017) (specific configuration for tracking motion in a system was patent-eligible).
Factual determinations as to whether elements are “well-understood, routine, and conventional” may preclude early disposition. Berkheimer v. HP Inc., 881 F.3d 1360, 1368–69 (Fed. Cir. 2018). In the context of IIoT gateways, claims that recite specific, concrete architectures for pluggable inference across heterogeneous accelerators; deterministic, TSN-aware scheduling; cryptographic provenance and measured-boot-based attestation for model and device state; and policy-driven OTA with rollback and auditability may be framed as technological solutions that improve the functioning of edge computing systems operating under industrial constraints.
Novelty, Nonobviousness, and Disclosure (35 U.S.C. §§ 102, 103, 112). Patentability further depends on novelty and nonobviousness over the prior art, as well as adequate written description, enablement, and definiteness. See, e.g., KSR Int’l Co. v. Teleflex Inc., 550 U.S. 398 (2007) (obviousness inquiry is expansive and flexible); Nautilus, Inc. v. Biosig Instruments, Inc., 572 U.S. 898 (2014) (claims must inform, with reasonable certainty, the scope of the invention). Enablement must be commensurate with claim scope and teach skilled artisans to make and use the full scope without undue experimentation. See Amgen Inc. v. Sanofi, 598 U.S. 594 (2023) (reaffirming enablement standards). In this technical area, detailed disclosure of interfaces for plug-in inference engines, scheduling primitives respecting industrial QoS, secure onboarding and attestation workflows, cryptographic signing and provenance tracking for models and configurations, and failure-safe update mechanisms (e.g., A/B partitioning and transactional rollback) may be pertinent to compliance with § 112.
European Patent Convention (EPC). Under Article 52 EPC and the established “COMVIK” approach (T 641/00), inventive step is assessed by considering only features contributing to technical character; non-technical aspects may form part of the problem to be solved. Computer-implemented inventions are patentable when they provide a further technical effect beyond the normal interactions of software and hardware. See T 258/03 (Hitachi); T 1173/97 (Computer program product/IBM). Technical contributions in this domain may include, for example, improved real-time scheduling on constrained hardware, enhanced security through hardware-rooted trust and remote attestation, and resource isolation that reduces jitter in control loops.
Summary of Technical Need
In view of the foregoing, there is a need for an integrated IIoT gateway framework that: (1) exposes a stable, pluggable abstraction permitting dynamic selection and safe hot-swapping of inference engines across heterogeneous accelerators while preserving determinism; (2) orchestrates multiple concurrent inference workloads with explicit QoS and scheduling semantics compatible with industrial timing (including TSN co-existence) and safety constraints; (3) enforces cryptographic identity, measured boot, and remote attestation for both device and model artifacts, coupled with verifiable provenance, policy-compliant deployment, and immutable audit trails; and (4) provides robust, fleet-scale device management including secure zero-touch onboarding, configuration versioning, OTA updates with transactional rollback, and resilience to intermittent connectivity—all while maintaining interoperability with industrial protocols and cybersecurity frameworks.
Disclaimer
Any discussion of standards, frameworks, and “conventional” systems is provided solely to facilitate understanding of the technical context. No admission is made that any referenced material constitutes prior art under applicable statutes or that any feature described herein is known, conventional, or routine. The scope of the claims should be determined by their language and permissible equivalents, not by this background.
一、技术领域 本申请涉及光伏技术领域,具体涉及钙钛矿/硅(Perovskite/Si)叠层太阳能电池的制备方法及界面调控技术,属于高效光伏器件的材料工程与结构工程交叉领域,涵盖薄膜成膜工艺、界面化学与能带工程、载流子选择性接触构筑以及器件互联与封装等内容。
二、背景技术
叠层器件总体技术态势 为突破单结硅太阳能电池的肖克利-奎瑟极限,双结及多结叠层结构成为主流技术路径。其中,以上下电池带隙互补为特征的钙钛矿/硅两端口(2T)单片式叠层因具备较高的理论效率上限、兼容晶硅成熟产线、材料与工艺成本可控而受到广泛关注。公开的学术与专利文献已证实:单结钙钛矿电池的第三方认证效率已超过25%,钙钛矿/硅叠层电池的第三方认证效率已超过30%。叠层结构通常包括:下电池硅基底(如SHJ、TOPCon或PERC升级方案)、中间复合/复合-隧穿互联层(Recombination Layer/Interconnection)、上电池钙钛矿吸收层及其选择性载流子传输与电极/透明导电层体系。
现有叠层器件结构与关键工艺
三、现有技术存在的主要技术问题
四、法律与审查背景(与本领域专利布局的相关法律框架)
五、代表性现有技术概述(非穷尽)
六、现有技术的不足与本申请拟解决的技术问题 综合上述,现有技术普遍存在以下不足:
据此,在遵循专利法第二十二条与第二十六条之要求下,本申请拟针对以下技术问题提出具体、可实施的技术方案与界面调控路径:
七、产业应用与合规性考量 在产业化场景中,上述界面调控与工艺路径应与量产设备和检测标准对接,包括但不限于:连续成膜与在线溅射设备兼容性、片内/片间均匀性控制、以及依据IEC 61215、IEC 61730等标准的湿热、热循环、紫外与机械载荷测试要求。通过在说明书中明确材料体系、工艺窗口与可靠性验证方案,可提高方案的可实施性与可执行性,降低无效风险与侵权判断中的不确定性。
本背景部分旨在客观界定技术领域的通用知识与现有技术状况,指出尚待解决的技术问题,并据以奠定权利要求的技术定位与法律审查基础,符合我国专利法及审查指南关于背景技术陈述的规范性要求。
以一条即插即用的高转化提示词,帮助法务、专利代理人与研发团队在数分钟内产出可直接用于申请文件的“专利背景说明”。核心目标:以专业法律文书风格,清晰呈现现有技术、技术痛点与改进空间,严格把控措辞与论证逻辑,支持多语成文,显著降低返工与审稿轮次,提升立项—撰写—递交的整体效率;同时打造“试用即见效”的体验路径,促进个人与团队从试用到长期订阅的付费转化。
快速生成合规背景节初稿;按不同法域习惯调整术语与结构;为审查意见答复准备补充叙述;批量处理多个案件,保持风格统一。
为新申请搭建标准化背景框架;把研发要点转为法律化陈述;同步推进多语版本以支持海外布局;减少外包往返沟通与时间成本。
将论文与科研成果转化为专利背景;清晰界定现有技术与技术空白;建立模板库指导学生撰写;提升转化效率与合规性。
将模板生成的提示词复制粘贴到您常用的 Chat 应用(如 ChatGPT、Claude 等),即可直接对话使用,无需额外开发。适合个人快速体验和轻量使用场景。
把提示词模板转化为 API,您的程序可任意修改模板参数,通过接口直接调用,轻松实现自动化与批量处理。适合开发者集成与业务系统嵌入。
在 MCP client 中配置对应的 server 地址,让您的 AI 应用自动调用提示词模板。适合高级用户和团队协作,让提示词在不同 AI 工具间无缝衔接。
免费获取高级提示词-优惠即将到期