专利申请审查反馈

0 浏览
0 试用
0 购买
Oct 4, 2025更新

根据专利申请内容提供专业审查与反馈,精准且符合规范。

示例1

审查意见(中英文双语)

一、案件识别与适用标准
- 审查对象:标题为“一种用于边缘摄像头的稀疏事件编码与自适应加密传输方法”的专利申请(方法类)。
- 审查基准:依据一般专利审查原则,包括但不限于中国专利法第22条(新颖性、创造性、实用性)、第26条第3、4款(说明书充分公开与权利要求书清楚、简要、以说明书为依据)及第31条(单一性)。如申请人拟以他法域为目标,请明确,以便调整规范引用。

II. 技术方案与权利要求理解
- 技术要点(申请人陈述):
  S1:像素级亮度跃迁检测,形成稀疏事件流;
  S2:时空哈希聚类并打包,压缩比≥20:1;
  S3:基于设备侧TPM派生“一次性密钥”,实现前向保密的加密;并进行封包级时序混淆;
  S4:接收端使用“共享种子”再现混淆序列,解密并重建关键帧;
  S5:对人体形状特征加入差分隐私噪声(ε≤1.0),仅在边缘侧执行。
- 权利要求1:概括S1–S5,并限定“哈希桶大小随光照自适应”、“密钥由设备唯一种子派生”、“在丢包率≤10%时,重建PSNR≥30 dB。”
- 权利要求2:在弱网下采用“重发窗口≤3”的策略实现实时传输。

III. 初步结论摘要
- 新颖性:作为整体方案具备潜在新颖性,但单个技术构件分别为本领域公知常规手段。
- 创造性:基于现有技术组合的可能性较高,缺乏具体技术手段之间产生出乎意料的协同效应的证据,初步意见为创造性存疑。
- 说明书充分公开与权利要求清楚性:对关键技术特征之定义、算法细节及性能边界未充分披露,多处存在以结果限定替代技术特征的表述,导致公开不足与不清楚风险。
- 单一性与可专利性:属于技术方案,具备工业实用性;单一性基本可接受,但S5与传输链路安全目标的关联需要进一步阐明。

IV. 新颖性与创造性评述
1) 最接近现有技术(一般技术状况,非特定文献):
- 事件相机/稀疏事件编码、基于时空窗口或网格聚类的打包传输属于已知;
- 边缘设备使用TPM或安全元件保护根密钥,结合密钥派生函数进行前向保密的流量加密属于常规安全设计;包级时序混淆/流量整形以缓解元数据侧信道分析亦为安全工程中的已知对抗措施;
- 在边缘侧对可识别特征引入差分隐私噪声以降低再识别风险亦为计算机视觉与隐私保护交叉领域的常见路径。

2) 与现有技术的区别点(基于权利要求文义):
- 将“事件级编码+时空哈希自适应(受光照影响)+TPM派生一次性密钥+封包级时序混淆+仅在边缘侧加入ε≤1.0的人体形状特征差分隐私噪声”组合于单一传输方法,并主张在10%丢包率下PSNR≥30 dB、压缩比≥20:1、弱网重发窗口≤3。

3) 创造性判断(问题-解决方案路径):
- 客观技术问题可表述为:在弱网络环境下降低延迟与能耗,同时减少元数据暴露与再识别风险。
- 对于本领域普通技术人员,基于既有事件相机编码以降载、采用设备侧TPM保护密钥并进行会话/分组级前向保密、结合包级时序混淆以弱化流量侧信道、在边缘侧引入差分隐私以降低可识别性,属于相邻技术领域的常规合并,动机充分。除非申请人能够证明具体实施方式之间存在出乎意料的技术效果(例如:光照自适应哈希与密钥滚动/混淆的特定协同,导致在相同带宽与功耗约束下显著优于线性叠加效果),否则现有权利要求的抽象层级与以结果限定的撰写使得创造性不足的风险较高。
- 因此,基于当前记载与权利要求范围,初步认定:权利要求1、2的创造性存疑。

V. 说明书充分公开与支持性(专利法第26条第3、4款)
- 以结果限定的问题:
  a) “压缩比≥20:1”、“PSNR≥30 dB(丢包率≤10%)”、“实时传输”、“弱网”均属结果/性能限定,缺乏可操作性边界条件、测试方法与适用前提(如参考编码基线、事件率范围、场景类型、网络模型、缓冲与重传策略)。
  b) “一次性密钥”与“前向保密”:若仅“由设备唯一种子派生”,在缺乏会话级随机性、单调计数器/盐值与密钥更新/弃用策略的公开时,难以保证前向保密目标在密钥材料泄露情形下仍成立。需披露密钥派生函数、随机源、状态管理(例如TPM内计数器/防回滚)、加密算法与认证模式等的最小实现。
  c) “时空哈希自适应(受光照)”:缺乏对光照测度的定义、映射函数、阈值/上下限与稳定性机制,难以复现稳定的压缩效能。
  d) “封包级时序混淆/共享种子再现”:未定义序列生成方式、同步/失步恢复、序列号与乱序/抖动上界、与重传机制的相容性;在保证可解复用与可验证性的同时如何满足PSNR指标,公开不足。
  e) “关键帧重建”:未公开用于由事件流重建关键帧的具体算法类别、初始化、约束条件或至少一个可重复实施的实施例。
  f) “人体形状特征差分隐私(ε≤1.0)”:未界定特征空间、灵敏度界、噪声分布类型与参数标定流程(例如拉普拉斯/高斯机制的适配条件),不足以使本领域技术人员据以实施并评估实用保真影响与通信/重建链路的交互作用。
- 支持性与清楚性:上述术语如“稀疏事件流”“时空哈希”“关键帧”“重发窗口≤3”“实时”等未作明确定义;性能边界未与具体技术手段对应绑定。现有文字难以支撑权利要求的广度。

VI. 单一性与实用性
- 单一性:整体围绕边缘摄像头事件编码与安全传输,S5与链路安全/压缩主题之间存在一定技术关联(降低再识别风险),尚可视为同一总的发明构思。但建议阐明S5对链路与重建质量/带宽的可验证影响,以巩固单一性主张。
- 实用性:技术方案属于技术领域,具备工业适用性。

VII. 初步审查结论
- 权利要求1:以结果限定较多,公开不足且清楚性不足;作为整体组合的创造性存疑。暂不满足专利法第22条第3款与第26条第3、4款要求。
- 权利要求2:术语“弱网”“实时”“重发窗口≤3”缺乏明确定义及说明书支持,清楚性与支持性不足(第26条第4款)。其对创造性的贡献亦未见具体技术效果支撑。

VIII. 修改与意见陈述建议(避免新增实质内容的前提下)
- 清楚性与限定性改进:
  1) 对关键术语提供操作性定义与参数范围:包括“稀疏事件”“时空哈希(空间网格尺寸、时间窗口Δt、桶容量上限/下限及光照自适应映射函数)”“封包级时序混淆(序列生成、同步、最大乱序/延迟、与重传交互)”“关键帧重建(至少一个算法类别及必要参数)”“弱网(丢包/时延抖动/带宽模型)”“实时(端到端时延阈值)”。
  2) 将“压缩比≥20:1”“PSNR≥30 dB”由普适性结果限定改写为在明确测试条件下的可验证技术特征(如特定场景集/事件率区间/编解码配置/网络模型),或作为从属权利要求的性能特征,避免过宽。
  3) 对S3的安全属性作可实施披露:描述TPM内根密钥的封装与不可导出性、随机性来源、密钥滚动/一次性密钥生成规则(例如基于计数器/随机盐的KDF)、认证加密模式与关联数据(AAD)设计、抗重放/回滚策略。仅“设备唯一种子派生”难以保证前向保密,应引入会话或分组级随机材料与失效策略。
  4) 对S5的差分隐私机制,至少披露特征定义、灵敏度界定与噪声分布类型,说明其只在边缘侧实施并不影响解密/重建的可用性;可将ε范围限定为区间并说明选取依据。
  5) 将“重发窗口≤3”改写为与网络模型、目标时延上限、缓冲策略相匹配的协议参数集合,明确触发条件、窗口演算法与对乱序容忍度的上界。
- 创造性强化路径(可供考虑):
  1) 将“光照自适应哈希”与“包级混淆/密钥滚动”之间的耦合关系具体化,并提供定量对比数据,证明存在非线性协同收益(例如在相同带宽与能耗约束下的失真-时延-泄露三目标优势)。
  2) 引入在说明书已披露范围内的必不可少技术特征,缩小权利要求至具体实施形态,避免被视为公知手段的简单并列聚合。
  3) 提供可重复验证的安全与性能实验方法学,以支撑“降低元数据暴露”“前向保密”“再识别风险降低”的技术效果主张。
- 案卷答复:请在法定期限内就上述缺陷逐项答复,并提交相应修改文本。若无可据以限定的实施细节,建议删除或弱化以结果限定的用语,或改为说明书中的效果描述。

IX. 需答复的问题清单
- 请明确并界定:“稀疏事件”“时空哈希”“封包级时序混淆”“共享种子”“一次性密钥”“关键帧”“弱网”“实时”的技术含义与参数。
- 请披露实现“前向保密”的具体密钥派生与管理机制,说明为何在“设备唯一种子派生”的前提下仍可满足前向保密。
- 请给出实现“压缩比≥20:1”“丢包≤10%时PSNR≥30 dB”的必要条件、测试基线与重建算法要点。
- 请说明差分隐私噪声的类型、灵敏度界与ε选取依据,并说明其对传输与重建质量的可控影响。
- 请说明重发窗口参数与时序混淆的相互作用、乱序与重传的上界控制,以及同步/失步恢复机制。

基于以上,现阶段权利要求1–2不符合专利法第26条第3、4款及第22条第3款的规定。申请人可通过限缩权利要求并补充充分公开予以克服。

——

Examination Opinion (English)

I. Identification and Applicable Standards
- Subject: Patent application titled “Sparse Event Coding and Adaptive Encrypted Transmission Method for Edge Cameras” (method).
- Standards: General patentability criteria including novelty, inventive step, and industrial applicability (e.g., CN Patent Law Art. 22) and sufficiency/clarity/support (Art. 26(3)-(4)), unity (Art. 31). If another jurisdiction is intended, please indicate.

II. Understanding of the Disclosure and Claims
- Core steps:
  S1: Pixel-level luminance transition detection to generate a sparse event stream;
  S2: Spatio-temporal hashing for clustering/packetization; claimed compression ratio ≥20:1;
  S3: Forward-secret encryption using one-time keys derived from a device-side TPM; packet-level timing obfuscation;
  S4: Receiver reconstructs the obfuscation sequence using a shared seed, decrypts, and reconstructs key frames;
  S5: Differential privacy noise (ε≤1.0) added to human shape features at the edge only.
- Claim 1: Covers S1–S5 and recites illumination-adaptive hash bucket size, keys derived from a device-unique seed, and PSNR ≥30 dB under ≤10% packet loss.
- Claim 2: Uses retransmission window ≤3 for real-time transmission under weak networks.

III. Summary Conclusion
- Novelty: Potentially novel as a whole; individual elements are known per se.
- Inventive step: The combination appears obvious absent evidence of unexpected synergy among the elements. Inventive step is questionable.
- Sufficiency and clarity: Several key technical features are result-oriented and lack enabling details, leading to insufficiency and indefiniteness risks.
- Unity and eligibility: Technical subject matter with industrial applicability; unity is acceptable but linkage of S5 to the transmission chain should be better articulated.

IV. Novelty and Inventive Step Assessment
- Closest prior art (state of the art in general terms): Event-based encoding and spatio-temporal packetization; TPM-protected key derivation for forward secrecy; packet timing obfuscation to mitigate metadata leakage; edge-side differential privacy on identifiable features—all are known design patterns in adjacent domains.
- Differences: The claimed aggregation of illumination-adaptive spatio-temporal hashing, TPM-derived “one-time” keys, packet-level timing obfuscation, and edge-only DP noise, with performance assertions (≥20:1 compression, PSNR ≥30 dB at ≤10% loss, retransmission window ≤3).
- Problem-solution: Reducing latency/energy and metadata exposure under weak networks while lowering re-identification risk. A person skilled in the art would have motivation to combine event-based compression with TPM-backed forward secrecy, traffic obfuscation, and edge-side DP. Without specific technical interplay producing an unexpected effect, the broad, result-oriented claim language renders inventive step doubtful.

V. Sufficiency of Disclosure and Support (Art. 26(3)-(4))
- Result-oriented claiming:
  a) “Compression ratio ≥20:1,” “PSNR ≥30 dB,” “real-time,” and “weak network” are performance outcomes lacking boundary conditions, test methodologies, and baseline references.
  b) “One-time key” and “forward secrecy”: Derivation “from a device-unique seed” alone does not ensure forward secrecy without session/packet randomness, key update/retirement policy, counters/salts, and authenticated encryption details.
  c) “Illumination-adaptive spatio-temporal hashing”: Missing definitions for illumination measure, mapping function, thresholds, and stability controls.
  d) “Packet-level timing obfuscation/shared seed reproduction”: Lacks sequence generation, sync/desync recovery, sequence numbering, bounds on reordering/jitter, and compatibility with retransmission; linkage to PSNR target is not enabled.
  e) “Key-frame reconstruction”: At least one reproducible reconstruction method is not disclosed.
  f) “DP noise on human shape features (ε≤1.0)”: Lacks feature space definition, sensitivity bounds, noise distribution and calibration, and analysis of its controlled impact on transmission and reconstruction.
- Clarity and support: Terms such as “sparse event stream,” “spatio-temporal hashing,” “key frames,” “retransmission window ≤3,” “real-time,” are indefinite; claimed performance lacks binding to concrete technical means.

VI. Unity and Industrial Applicability
- Unity: The method centers on event-based encoding and secure transmission; S5 is plausibly connected to the overarching purpose. Clarify its measurable impact to consolidate unity.
- Industrial applicability: Satisfied.

VII. Preliminary Determination
- Claim 1: Fails clarity/support and sufficiency; inventive step is doubtful. Not compliant with Art. 22(3) and Art. 26(3)-(4).
- Claim 2: “Weak network,” “real-time,” and “retransmission window ≤3” are indefinite and unsupported; inventive contribution is not substantiated.

VIII. Amendments and Remarks (without adding new matter)
- Clarity and limitation:
  1) Define operational parameters for key terms: “sparse events,” “spatio-temporal hashing” (grid size, Δt, bucket bounds, illumination mapping), “packet-level timing obfuscation” (sequence generation, sync, max reordering/delay, retransmission interplay), “key-frame reconstruction,” “weak network” (loss/jitter/bandwidth model), and “real-time” (E2E latency threshold).
  2) Recast performance assertions (≥20:1, ≥30 dB at ≤10% loss) as verifiable features under specified test conditions, or move to dependent claims.
  3) For forward secrecy, disclose TPM usage, seed protection, randomness sources, KDF policy with counters/salts, authenticated encryption and AAD, anti-replay/rollback, and key retirement/rotation. A device-unique seed alone is insufficient.
  4) For DP, define feature space, sensitivity, noise type and calibration, and demonstrate edge-only processing does not impede decryption/reconstruction.
  5) Replace “retransmission window ≤3” with protocol parameters tied to a defined network model, latency target, buffering policy, and bounds on reordering.
- Strengthening inventive step:
  1) Substantiate a non-linear cooperative effect between illumination-adaptive hashing and key-rolling/obfuscation with quantitative evidence under fixed bandwidth/power.
  2) Narrow the claims to indispensable technical features present in the description to avoid characterization as an obvious aggregation.
  3) Provide reproducible methodologies evidencing reduced metadata leakage, maintained forward secrecy, and re-identification risk reduction.

IX. Questions Requiring Reply
- Define and bound: “sparse events,” “spatio-temporal hashing,” “packet-level timing obfuscation,” “shared seed,” “one-time key,” “key frames,” “weak network,” and “real-time.”
- Disclose how forward secrecy is ensured when keys are “derived from a device-unique seed”; provide KDF/randomness/state management details.
- Provide conditions and baselines under which ≥20:1 compression and ≥30 dB PSNR at ≤10% loss are achieved, including reconstruction method essentials.
- Specify DP noise mechanism, sensitivity bounds, ε selection rationale, and controlled impact on transmission and reconstruction.
- Explain interaction between retransmission parameters and timing obfuscation, including bounds on reordering and desynchronization recovery.

On the present record, Claims 1–2 do not comply with Art. 26(3)-(4) and Art. 22(3). Applicant may overcome by narrowing the claims and providing enabling disclosure.

示例2

审查意见通知(非正式)

一、总体结论
基于申请人提交的题目、背景技术、发明内容与权利要求的现有表述,本案属于工业过程控制领域中的制造方法,原则上不属于排除客体,具备专利客体适格性(中国专利法第2条)。然而,从现有公开内容看,权利要求存在以下主要审查风险:
- 权利要求清楚性与支持性不足(专利法第26条第4款,审查指南第二部分第二章3.1/3.2):核心技术特征用语模糊,关键技术手段与参数缺乏界定,控制目标“熔深d”的在线测量或估算机理未披露,导致权利要求的技术效果无法核实。
- 说明书充分公开不足(专利法第26条第3款):未充分公开1D CNN的训练与部署方案、信号预处理、实时性实现路径、控制律等,使本领域技术人员难以在不付出创造性劳动的情况下实现“≤2 ms闭环延迟”且“将熔深维持在阈值以内”的结果。
- 新颖性/创造性存在显著挑战(专利法第22条):激光焊接过程的同轴光学与声发射传感采集、基于时序信号的深度学习质量判别、以及基于判别结果的焊接功率/能量闭环调节,均为本领域近年普遍公开与工程化趋势。申请文本未能清楚表明区别于现有技术的技术特征组合及其可验证的技术效果。

二、针对权利要求的具体意见
1. 权利要求1(方法)
- 关于C1“在焊接头同轴集成光电与声发射传感器,采集I(t)、S(t)”:
  - “同轴集成”的具体实现方式不明(透射/反射光路、分光元件、带宽与视场、抗干扰结构)。I(t)、S(t)的物理量含义不清(等离子体辐射强度?特定波段光强?声发射频带与灵敏度?)。
  - 建议限定:光学信号的波段或光学链路构成、声发射传感器类型与安装位置、采样/前端放大与抗混叠滤波参数。
- 关于C2“以轻量一维CNN…滑动窗口…熔池状态分类”:
  - “轻量”“滑动窗口”“熔池状态”均属相对性用语,边界不清。需界定:窗口时长、步长、输入通道、网络层数/核大小/参数量上限,分类标签定义(如稳定贯穿/欠熔/喷溅/孔洞先兆等),以及推理阈值。
  - 建议在从属权利要求中限定至少一组可实施的网络结构与窗口配置,以满足清楚性与支持性。
- 关于C3“自适应调节脉冲能量E与占空比D,使熔深d保持在[dmin,dmax]”:
  - 申请文件未交代在线“熔深d”的测量或估算路径。若仅凭I(t)、S(t)分类,无法直接得到d,应说明由分类结果/回归模型映射至d的算法与标定流程。
  - “自适应调节”的控制律未披露(如PID/MPC/增益调度/查表),稳定性与响应时间如何保证以满足“控制延迟≤2 ms”。建议在权利要求中至少限定控制更新周期与关键增益或决策逻辑框架。
- 关于C4“预测‘孔洞风险’时执行跳点策略并记录二维码追溯数据(包含轨迹哈希与特征向量)”:
  - “孔洞风险”的判定阈值或指标未定义;“跳点策略”含义不明(跳过当前点、重新排序路径、或延时重复焊接),与焊接节拍、热输入的关联缺失。
  - “二维码追溯数据(轨迹哈希与特征向量)”属于数据组织/展示表述,若无与过程控制、设备自检或后续闭环的因果关联,易被认定为非技术性特征。建议将追溯数据与后续工序的自动参数化或合格判定联动,体现可验证的技术效果。
- “采样频率≥200 kHz、控制延迟≤2 ms”:
  - 作为限定特征有助于区分部分现有技术,但需说明实现路径(如FPGA/ASIC或低时延DSP、DMA零拷贝、固定点推理等)。否则存在第26条第3款之风险。
2. 权利要求2(追溯数据与电芯序列号绑定)
- 该特征偏向数据管理/业务规则,缺乏直接技术效果的限定。建议将“绑定”与具体的生产过程控制或质量判定阈值自适应关联起来,以增强技术性与创造性贡献。

三、说明书充分公开与支持性之不足
根据专利法第26条第3款与审查指南第二部分第二章3.1:
- 未公开训练数据的来源、标注口径(熔深/孔洞的金相或CT验证基准)、域自适应方法(不同极耳材质与厚度)、防过拟合策略以及边界条件,从而难以复现“适配不同材料与厚度”的普遍性效果。
- 未公开信号链路(前置放大、滤波、同步、去噪、归一化)、特征工程(若有)与推理加速方法,无法保证“≤2 ms”的端到端时延。
- 未公开“熔深d”的在线估算机理与标定流程(例如以试板建立I(t)/S(t)到d的映射、在线漂移补偿),导致C3之效果缺乏可操作性支撑。
- “跳点策略”未给出确定性流程(触发条件、最小跳转间隔、恢复策略、对热累积/孔洞概率的量化收益),难以重复实施。

四、新颖性与创造性初步评价
- 同轴多传感(光学/声发射)采集、以时序深度学习进行焊接质量判别、并基于判别结果闭环调节激光功率/脉冲参数的技术思想,为激光焊接质量控制领域的常见路线。业界已有将光学发射、等离子体辐射或声学信号用于缺陷预测与功率闭环的公开,亦有采用一维CNN或其他深度网络进行实时分类的报道。基于此,C1+C2+C3的简单并列组合存在显著的创造性挑战。
- 可能的可专利性切入点:
  - 将“孔洞风险预测”与“跳点(轨迹重排序/时间间隔重分配)”形成紧耦合控制,并给出可验证的热管理/缺陷概率下降的量化规则,若现有技术多停留在功率调节而非轨迹在线重排,则有机会形成区别性技术效果。
  - 对“≤2 ms”低时延闭环在设备级实现的具体技术手段(传感器硬件耦合、光路设计、数据通路、模型量化与流水线并行、控制器设计)的限定,若能证明相较已知系统实现更高的闭环频宽且显著降低虚焊/孔洞率,亦可能支撑创造性。
  - “轨迹哈希+特征向量”的追溯若与在线自检、防篡改、以及后续重焊参数的自动决策闭环形成可验证的工艺质量改进链路,可提升技术性并弱化“呈现信息”之评价风险。
- 建议在检索与比对后,围绕上述差异化特征收窄权利要求范围,并提供对比试验数据或统计显著性,支撑技术效果。

五、权利要求修改与补充建议
为提升清楚性、支持性与创造性,建议:
- 对独立权利要求(方法):
  - 明确I(t)为特定波段(例如400–900 nm)等离子体辐射/反射光强,S(t)为X–Y kHz带宽的声发射信号;限定同轴集成的分光/滤光组件与传感器安装几何。
  - 限定滑动窗口长度、步长、CNN层级/卷积核大小上限、参数量或运算预算(MACs),以及分类标签集合与决策阈值。
  - 增加“熔深估算模块”,限定经标定得到的d̂=f(I,S)或分类到d区间的映射方法;给出标定流程的必要技术特征(试样、厚度范围、拟合误差上限)。
  - 明确控制律(例如:以d̂与[dmin,dmax]的偏差,经增益受限的PI调节E与D;更新周期≤1 ms;输出变化率限幅),并限定执行器与通信延迟预算以满足“≤2 ms”。
  - 对“跳点策略”进行过程性限定:风险评分超过阈值θ时,跳过当前N个焊点并插入冷却间隔Δt,或重排至空间距离≥L的下一点;并在回程时采用降能预热/多脉冲策略复焊。
  - 将追溯数据的技术用途写入方法流程:用于在线参数自适应或终检自动放行/拦截逻辑,而非单纯存储/展示。
- 设置关键从属权利要求:
  - 具体网络结构与量化/蒸馏/剪枝方案;窗口长度与频域增强(STFT或小波)的可选实施例。
  - 传感硬件频响/灵敏度与抗干扰手段;I与S的多模态融合策略(早期融合/后期融合)。
  - 轨迹重排序的约束(热累积模型、相邻点最小间距、产线节拍影响上限)。
  - 设备权利要求:焊接头、同轴光路、前端采集、边缘计算单元与执行控制器的结构与连接关系,保证方法权利要求与装置权利要求相互支撑。
- 删除或限定容易被认为为非技术性的要素表述(例如“二维码”本身),改以“以机器可读标识写入并用于制造执行系统触发控制策略”的技术性描述。

六、说明书应补充的技术内容
- 传感链路:光路结构图、带宽与滤光、声发射安装位置、标定与抗噪策略。
- 数据处理:采样同步、时钟精度、ADC位宽、前端滤波、数据打包与DMA。
- 模型训练:数据规模、标注方法(熔深/孔洞的检测基准)、训练/验证/测试集划分、域适配(不同材料/厚度/设备)、实时推理加速方法(定点化、流水线、批量=1)。
- 控制律与稳定性:离散化控制模型、参数范围、相位裕度/增益裕度或仿真/实测响应,确保在2 ms内完成“采集-推理-决策-执行”闭环。
- 性能数据:对比无闭环/仅功率闭环/加入跳点策略的缺陷率、返修率、熔深偏差统计及显著性检验。
- 适用边界:材料(铝/铜/镍等)与厚度范围、表面状态、激光器类型(脉冲/连续、光斑直径)、不可用场景与失效模式。

七、国内外可专利性与策略提示
- 中国(CN):制造过程控制方法具备客体适格性。应避免以“数据呈现/业务规则”为核心的从属项。建议以设备+方法双独立权利要求,同步提交对比实验数据以支撑创造性与技术效果。
- 欧洲(EP):EPO对混合发明中非技术特征的贡献不计入创造性评估。建议将“跳点策略引发的热管理改善”和“低时延闭环实现细节”作为解题手段,避免追溯数据的非技术性权利要求。权利要求需满足Art.84清楚性、Art.83实施可行性。
- 美国(US):制造方法通常可通过§101审查,但与“数据记录/二维码/绑定序列号”相关的抽象要素应与具体机器控制步骤紧密耦合。§112对“轻量”“自适应”等术语要求明确界定与实施例支撑。
- 日本(JP):对工业过程控制与AI应用较为友好,但同样强调具体技术手段与可验证效果。建议将“跳点策略+闭环功率调节”的协同效应以实验数据支撑。

八、检索与对比建议(方向性)
为论证创造性,建议重点检索并区分以下技术路线:
- 激光焊接同轴传感(光学/声学/光学同轴测量)+功率闭环的商用系统与文献;
- 使用一维CNN/时序深度网络进行焊接质量在线判别的研究/专利;
- 电池极耳焊接过程的“缺陷预测后路径/节拍在线重排(跳点/延时)”相关公开(该点或为本案差异化来源)。

九、结论与办理意见
- 请对权利要求进行实质性收窄与术语明确化,补充说明书以满足第26条第3、4款要求。
- 在补充分明技术手段、可复现实施条件及性能数据后,再行评估创造性。当前文本下,权利要求1存在清楚性与支持性瑕疵,且创造性尚未得到充分证明;权利要求2存在非技术性风险。建议在国内首次申请递交前完成上述补正与数据准备,以利后续PCT及各局审查阶段的稳定性与可授权性。

示例3

Examiner’s evaluation of patentability and formal compliance

Application title: Heterogeneous database incremental synchronization using graph-based schema mapping and lock-free conflict resolution

Technical field: Data synchronization for OLTP-to-analytics pipelines

Summary of independent claim 1 (as understood)
- G1: Construct a property graph where nodes represent source/target fields and edges encode mapping functions with version tags.
- G2: Capture change streams via CDC and assign vector clocks per key.
- G3: Resolve conflicts without locks by using CRDT-style merges for commutative fields and per-key deterministic replay for non-commutative transactions.
- G4: Preserve ACID at the target by micro-batching idempotent upserts with write-ahead checksums and deduplication indices.
- Additional limitation: Vector clocks are compacted using probabilistic sketches to bound metadata size per partition.

Claim 2 adds schema drift detection with automatic mapping update proposals and human-in-the-loop approval.

1) Subject-matter eligibility

United States (35 U.S.C. § 101; MPEP § 2106)
- The claims are directed to a “process,” a statutory category. The core concept involves data synchronization and conflict resolution, which, in the abstract, can be characterized as information processing. However, there are specific recitations of technical data structures and execution mechanisms (CDC streams, vector clocks, CRDT merges, write-ahead checksums, deduplication indices, and probabilistic sketches).
- Step 2A(Prong Two): The recited elements, if sufficiently specified, appear integrated into a practical application that improves computer functionality in distributed data consistency, throughput, and metadata overhead. The probabilistic compaction of vector clocks, if concretely taught to preserve causal comparison with bounded error and defined fallbacks, weighs in favor of eligibility.
- Step 2B: If the specification demonstrates that the combination yields a specific technical improvement (e.g., bounded metadata per partition while maintaining correct causal/conflict decisions with defined error handling) beyond generic computer implementation, the claims are likely patent-eligible. As drafted, functional language (e.g., “preserve ACID,” “lock-free conflict resolution”) risks being characterized as results-oriented. Amendments providing concrete algorithms and data structure interactions are recommended to avoid § 101 vulnerabilities.

Europe (Art. 52(1) EPC)
- The claims address a technical problem (consistent and efficient synchronization among heterogeneous databases) and recite technical means. Provided the specification discloses concrete algorithmic details for the vector-clock compaction and conflict resolution mechanisms, the claimed subject-matter would likely have technical character and be eligible under Art. 52 EPC. Section 2 below addresses inventive step.

2) Novelty and inventive step

General observations (without a prior art search)
- Elements similar to G1–G4 are commonly found in distributed systems: graph-based schema mappings with versioning, CDC pipelines, vector clocks for causality, CRDT-based resolution for commutative updates, deterministic replay for non-commutative operations, idempotent upserts with deduplication, and WAL-based durability are widely known and used.
- The distinguishing feature appears to be the compaction of vector clocks using probabilistic sketches to bound metadata size per partition. The integration of a versioned property-graph schema mapping with CDC and conflict resolution may also be asserted as a cohesive architecture, but absent evidence of a synergistic effect, such aggregation can be found obvious where each component is used for its known purpose.

Risk of obviousness (35 U.S.C. § 103; Art. 56 EPC)
- Absent specific algorithmic detail, “vector clock compaction using probabilistic sketches” risks being viewed as a routine application of known sketching techniques (e.g., Bloom filters, count-min) to a known metadata-scaling problem. Moreover, if the compaction does not preserve the partial order properties necessary for causality determination—or if it does so only with unspecified error properties—it may be deemed an obvious, and possibly defective, approximation. The inventive step hinges on:
  - A concrete compaction method that enables sound or bounded-error causality comparisons;
  - A defined decision procedure for concurrency vs. causality under the sketch, with quantifiable false positive/negative trade-offs and a specified fallback mechanism;
  - Integration that yields an unexpected technical effect (e.g., strictly bounded per-partition overhead with maintained correctness at specified confidence, leading to improved throughput under bursty loads without locking).
- Claim 2’s schema-drift detection and update proposals are, in general, known in ETL tooling and data integration systems. Without specific detection algorithms (e.g., constraint-based or statistical schema inference) and a concrete feedback/control loop tied to the property graph and CDC pipeline, this feature is likely obvious.

Recommendation: To support novelty and non-obviousness, include detailed algorithms, complexity bounds, probabilistic guarantees, and empirical evidence showing a counterintuitive or non-linear improvement over conventional techniques (e.g., dotted version vectors, interval tree clocks, or metadata sharding). Provide clear reasons why a skilled person would not straightforwardly apply generic sketches to vector clocks due to causality-comparison challenges, and how your approach overcomes these challenges.

3) Clarity and definiteness

United States (35 U.S.C. § 112(b); MPEP § 2173)
- Indefinite or result-oriented terms needing definition or algorithmic specificity:
  - “Property graph” (define node/edge schema, allowed properties, and mapping function semantics).
  - “Edges encode mapping functions with version tags” (specify function types, invertibility, versioning and compatibility rules).
  - “Vector clocks are compacted using probabilistic sketches” (identify sketch type(s), update rules, comparison procedure, error bounds, and fallback).
  - “Lock-free conflict resolution” (specify the concurrency progress guarantee, scope—per-key or global—and the non-blocking algorithm used).
  - “CRDT-style merges for commutative fields” (identify CRDT types supported, semilattice definitions, and merge laws).
  - “Per-key deterministic replay for non-commutative transactions” (define the ordering rule, e.g., vector-clock partial order with deterministic tie-breakers).
  - “Preserve ACID at target by micro-batching idempotent upserts with write-ahead checksums and deduplication indices” (define the micro-batch commit protocol, isolation model, dedup key structure, WAL checksum algorithm, and recovery procedure).
  - “Bound metadata size per partition” (quantify bound).
- The current claim language is heavily functional, asserting outcomes without reciting the technical means with sufficient precision. This may give rise to § 112(b) indefiniteness and, in Europe, an Art. 84 EPC clarity objection.

Europe (Art. 84 EPC; Guidelines F‑IV)
- Similar clarity issues arise, particularly with open-ended functional terms and absence of algorithmic parameters essential for understanding the scope.

4) Enablement and written description

United States (35 U.S.C. § 112(a); MPEP § 2164, § 2163)
- Enablement risk: The application must teach how to implement the probabilistic-sketch compaction of vector clocks such that causality and concurrency decisions are made correctly or within specified error tolerances, including remediation steps. Without a concrete algorithm, a skilled person cannot practice the full scope without undue experimentation.
- Written description: Generic references to “CRDT-style merges,” “lock-free conflict resolution,” and “idempotent upserts” do not demonstrate possession of a specific implementation across the breadth of “heterogeneous databases.” The specification should provide exemplars and generalization principles.
- Scope vs. enablement: Claim 1 is not limited to particular databases, CRDTs, or sketch types. If only certain combinations are practicable, claims should be commensurate with the embodiments.

Europe (Guidelines F‑III, C‑II)
- The same concerns apply regarding sufficiency of disclosure, particularly for the compaction of vector clocks and ensuring ACID semantics at the target with micro-batching.

5) Unity of invention
- The claims appear to share a single general inventive concept (incremental synchronization with the particular compaction/conflict resolution scheme). Unity is likely satisfied.

6) Suggested amendments and additions

To address §§ 101/112 and Art. 84/56 issues, consider amending as follows:

- Define the property-graph mapping:
  - Nodes: typed fields with unique identifiers; edges: typed mapping functions f: S → T with invertibility flags; version tags include semantic version and compatibility metadata; a constraint that evaluation of mappings is referentially transparent for CDC events.
- Specify CDC and vector clocks:
  - Per-partition logical time base; per-key vector clock maintained as a sparse map keyed by partition identifiers.
- Probabilistic compaction of vector clocks:
  - Identify the sketch (e.g., count-min sketch with conservative update or a Bloom filter vector plus per-partition counters).
  - Describe update rule for increments, and a compare(a, b) procedure that decides causality, concurrency, or indeterminate with bounded false rates ε.
  - Provide fallback to a materialized vector for indeterminate cases, with cache TTL and eviction policy, thereby preserving correctness.
  - State explicit bounds on metadata per partition (e.g., O(1) words) and quantify error probabilities and their effect on conflict resolution.
- Lock-free conflict resolution:
  - Restrict to per-key lock-free CAS loops with retry, or wait-free bounded retries, and state progress guarantees.
- CRDT merges and deterministic replay:
  - Enumerate supported CRDT types (e.g., LWW-register with hybrid logical clocks; G-Counter; PN-Counter; OR-Set; delta-state CRDTs) and provide algebraic merge functions.
  - For non-commutative ops, define deterministic ordering: primary key; then causal order; ties broken by a total order on (partition-id, sequence, hash).
- ACID preservation at target:
  - Define micro-batch boundaries; idempotency keys (e.g., H(key || op-payload || clock-digest)); dedup index structure (e.g., LSM-tree keyed by idempotency key with tombstones).
  - WAL checksum computation and recovery workflow; isolation mode (e.g., snapshot isolation with write-write conflict detection at commit).
  - Commit protocol with pre-commit verification of dedup entries and atomic publish of batch.
- Schema drift detection and mapping update (claim 2):
  - Define automatic detection rules (e.g., structural diffs, constraint violations, statistical type inference).
  - Generate update proposals by graph rewrite rules with version bump and compatibility proof obligations; deploy via staged shadow evaluation and human approval; roll-back policy.

7) Possible dependent claims to strengthen patentability

- The sketch is a count-min sketch with conservative update and width/ depth parameters chosen to bound comparison error below ε; include a theorem or lemma on causality decision error.
- A fallback cache of exact vector clocks is maintained for keys whose sketch comparison is indeterminate, with TTL τ and adaptive resizing based on observed drift rate.
- The deduplication index is keyed by a digest of (entity-id, canonicalized operation descriptor, compacted-clock digest) and is implemented as a lock-free concurrent hash-trie.
- The CRDT merge function for OR-Set uses delta-state encoding with causal context derived from the compacted clock plus fallback reconciliation.
- The micro-batch commit uses a two-phase barrier ensuring all idempotent upserts are durable in WAL with checksums before visibility switch under snapshot isolation.

8) Evidence and technical effects

- Include experimental data showing:
  - Bounded metadata per partition independent of key cardinality.
  - Throughput/latency improvements under bursty loads vs. a baseline without compaction.
  - Observed rates of sketch-induced indeterminacy and the effectiveness of the fallback cache.
  - Preservation of ACID at the target (no lost updates, correct isolation) verified by fault-injection tests.

9) Conclusion

- Eligibility: Likely patent-eligible if claims are amended to recite concrete technical means and improvements.
- Novelty/inventive step: As drafted, each of G1–G4 aligns with well-known techniques; novelty likely resides in the probabilistic compaction of vector clocks and its integration with conflict resolution and micro-batched ACID upserts. Without concrete algorithms, error bounds, and a proven technical advantage, an obviousness rejection is likely.
- Clarity/enablement: Present claims are predominantly results-oriented and lack algorithmic detail, creating substantial § 112(a)/(b) and Art. 84/EPC risks.

Actionable guidance: Amend independent claim 1 to recite specific data structures, algorithms, parameters, comparison procedures, and commit protocols. Limit claim scope to the disclosed embodiments that demonstrably achieve the asserted technical effects. Enhance the specification to provide enabling detail for the probabilistic compaction of vector clocks, the lock-free conflict resolution mechanism, and the ACID-preserving micro-batch commit protocol.

适用用户

初创公司创始人与CTO

在融资或路演前验证技术可专利性;获得可实施的回避设计建议;用中英双语摘要清晰阐述技术壁垒。

企业法务与知识产权主管

评估专利组合授权概率与风险;制定各国递交与优先级策略;快速审阅代理稿并给出修改清单。

专利代理人与代理所合伙人

高效完成预审与修改建议;批量生成高质量答复草稿;统一团队措辞与合规清单,缩短交付周期。

科研人员与技术转移办公室

将论文成果提炼为可授权权利要求;生成实施例补强建议;明确与现有技术的差异与价值。

产品经理与解决方案架构师

在路线评审中识别侵权风险;形成落地的规避方案;为市场材料提炼可保护的技术卖点。

跨境申请负责人与本地化译者

按目标法域生成法律风格文本;统一术语与格式;提升多国同时递交的准确性与效率。

投资机构尽调分析师

快速扫描标的专利质量;输出稳定性与可执行性摘要;识别潜在无效风险与诉讼暴露点。

解决的问题

以“一键专利审查官”为核心,面向创新团队、法务与代理人,快速完成对申请文本的专业级预审:聚焦新颖性、创造性、实用性、充分公开与清晰性等关键维度;提前模拟可能的审查意见与驳回理由,给出可执行的修改路径与论证要点;生成符合法律写作规范、结构清晰、可直接用于沟通与决策的报告,支持指定语言输出;将提交前自查、OA 答复预演与同族一致性校对标准化、可复用,降低外部成本、提升授权概率并缩短审查周期。

特征总结

针对申请文本一键预审新颖性与创造性,快速指出被现有技术覆盖的风险点
自动梳理权利要求逻辑结构,提出可行修改方案,减少不必要的从属与歧义
生成符合专利局格式的审查意见答复草稿,模板化填充理由与证据路径
智能比对说明书与权利要求一致性,定位缺失支撑与实施例薄弱环节
按目标国家规则给出合规清单与措辞建议,降低因格式与术语导致的驳回
提供近似方案回避思路与专利布局建议,帮助产品快速落地并构建壁垒
支持多语言法律风格输出,一键生成中英双语版本,适配国际递交场景
根据技术亮点自动提炼可专利点清单,辅助撰写发明点与独立权利要求
面向管理层生成风险与成功率摘要报告,量化评估投入与时间窗口
结合竞品公开文献给出差异化论证要点,提升授权说服力与抗审能力

如何使用购买的提示词模板

1. 直接在外部 Chat 应用中使用

将模板生成的提示词复制粘贴到您常用的 Chat 应用(如 ChatGPT、Claude 等),即可直接对话使用,无需额外开发。适合个人快速体验和轻量使用场景。

2. 发布为 API 接口调用

把提示词模板转化为 API,您的程序可任意修改模板参数,通过接口直接调用,轻松实现自动化与批量处理。适合开发者集成与业务系统嵌入。

3. 在 MCP Client 中配置使用

在 MCP client 中配置对应的 server 地址,让您的 AI 应用自动调用提示词模板。适合高级用户和团队协作,让提示词在不同 AI 工具间无缝衔接。

¥10.00元
平台提供免费试用机制,
确保效果符合预期,再付费购买!

您购买后可以获得什么

获得完整提示词模板
- 共 241 tokens
- 2 个可调节参数
{ 专利申请内容 } { 输出语言 }
自动加入"我的提示词库"
- 获得提示词优化器支持
- 版本化管理支持
获得社区共享的应用案例
限时免费

不要错过!

免费获取高级提示词-优惠即将到期

17
:
23
小时
:
59
分钟
:
59