智慧芽(PatSnap)

Access Database
Database Introduction

PatSnap provides the tools to help business leaders, analysts, researchers, engineers and IP professionals to unlock this intelligence and to make business-focused decisions.  

Patent coverage

     Our weekly updated database covers more than 118 million patents from 128 jurisdictions and 22 intellectual property office databases globally. With PatSnap's one-click translation, you have constant access to the most up-to-date information, no matter where it's from.

Keyword helper

    Capture all the relevant terms in your search with PatSnap’s keyword helper. Enter terms into the box and PatSnap will scan through millions of other patents to suggest similar or alternative words that you may want to incorporate into your search.

Semantic search

    Semantic search is a quick and easy way of searching for patents that are relevant to a portion of text that you’ve provided. Semantic patent search reviews the text and compares keywords against our patent database. Each word is ranked by its commonality across all patents and less common words are given higher importance.

Citation mapping

     Evaluate a full chain of associated technologies by following forward and backward citations for each patent. Identify the most cited patents, which are potentially more significance in a particular sector, and track these from initial concepts right the way through to latest applications. Use Citation Analysis to discover licensing opportunities, understand the competition and determine if (or when) to challenge a pending patent.

Responsible Librarian
Yu Wang (+86-755-88010809,wangy8@sustc.edu.cn)
版权公告
1. Any downloading of library-subscribed electronic resources by software or tool is prohibited.
2. Any systematically over-downloading of full-text documents from library-subscribed databases is prohibited.
3. Use of proxy server or providing VPN account to unauthorized users is prohibited.
4. Without the prior permission of the library, redistributing library-subscribed resources in bulk to unauthorized users or via proxy server is prohibited.
5. Violators of the above rules will be punished based on results of thorough investigation.