Patents by Inventor Dongmei Zhang

Dongmei Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160080339
    Abstract: The present invention relates to base stations, and a terminal. The primary base station execute the following steps, receiving, by a primary base station, security parameter update request information that is sent by a secondary base station and carries an encryption algorithm, wherein the security parameter update request information comprises the encryption algorithm; adding, by the primary base station, the encryption algorithm in the received security parameter update request information to reconfiguration information; sending, by the primary base station, the reconfiguration information carrying the encryption algorithm to a terminal; and receiving, by the primary base station, reconfiguration complete information sent by the terminal. Thereby, the present invention implements a reconfiguration process in a network architecture in which a primary base station is separated from a secondary base station.
    Type: Application
    Filed: November 19, 2015
    Publication date: March 17, 2016
    Inventors: Tao Zhang, Bo Lin, Dongmei Zhang
  • Publication number: 20160068552
    Abstract: The present invention provides a new kind of vinca alkaloid derivatives, new applications thereof and preparation methods therefor. The vinca alkaloid derivatives comprise hydrazinolyzed vinca alkaloids and vinca alkaloid dipeptide derivative. The hydrazinolyzed vinca alkaloids are the compounds obtained from the reaction of vinca alkaloids or salts thereof with hydrazinolyzed hydrate; and the vinca alkaloid dipeptide derivatives are the compounds obtained from the condensation of hydrazinolyzed vinca alkaloids with N-benzyloxycarbonylglycyl proline. The present invention provides the uses of the vinca alkaloids derivatives or the pharmaceutical compositions thereof in anti-tumor, preventing or treating diabetic retinopathy, rheumatoid arthritis and serving as angiogenesis inhibitors or vascular disrupting agents.
    Type: Application
    Filed: March 3, 2014
    Publication date: March 10, 2016
    Inventors: Wencai YE, Heru CHEN, Dongmei ZHANG, Minfeng CHEN, Nanhui XU
  • Patent number: 9232404
    Abstract: Embodiments of the present invention disclose a method, an apparatus, and a system for data transmission. The method for data transmission includes: determining that data to be transmitted is control plane signaling related to a user equipment that camps on a relay node; and transmitting the data through a first user data bearer established between the relay node and a donor base station, where the first user data bearer provides integrity protection for the data. According to the embodiments of the present invention, when the control plane signaling related to the user equipment that camps on the relay node is transmitted between the relay node and the donor base station, integrity protection is provided for the control plane signaling, and therefore attacks such as the denial of a service attack are prevented.
    Type: Grant
    Filed: March 28, 2012
    Date of Patent: January 5, 2016
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Jing Chen, Ke Wang, Hui Ma, Bo Lin, Aiqing Zhang, Dongmei Zhang, Xiaoyu Bi
  • Publication number: 20150378692
    Abstract: The disclosure generally relates to code recommendation. In one embodiment, code snippets may be extracted using an invocation-centered code slicing process and then grouped according to the method usages. For each method usage, a representative code snippet may be selected and stored in the knowledge base in association with metadata. In operation, the programming context may be obtained and used to query the knowledge base to retrieve one or more code snippets for recommendation. In one embodiment, the recommended code snippets may be ranked to improve the utility and user friendliness, and the metadata may be used to provide variation points and possibly other auxiliary information to improve the operation efficiency and user experience.
    Type: Application
    Filed: September 16, 2014
    Publication date: December 31, 2015
    Inventors: Yingnong Dang, Chenglin Zhong, Qian Wu, Han Yin, Niko Schwarz, Dongmei Zhang
  • Publication number: 20150382189
    Abstract: Embodiments of the present invention disclose a key exchange method and apparatus, which relate to the communications field, and can enable user equipments establishing a D2D link to share a set of keys, and further, information security can be achieved when a user equipment transmits service data or a signaling message through a Ud interface. A specific solution is that: a network device acquires a first key, and sends a message including the first key to a second user equipment, so that the second user equipment uses, when communicating with a first user equipment by using a D2D link, the first key to protect transmitted information. The present invention is applicable to an exchange process of keys for protecting data on a D2D link.
    Type: Application
    Filed: September 2, 2015
    Publication date: December 31, 2015
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Dongmei ZHANG, Jing CHEN
  • Patent number: 9215700
    Abstract: The present invention relates to a counter check and reconfiguration method, apparatus, and system. The method includes: sending a second identity information and a second count information to a terminal, so that the terminal compares, according to the second identity information, the second count information with third count information maintained by the terminal itself to obtain first comparison result information or second comparison result information; receiving the first comparison result information sent by the terminal, or the second identity information and second comparison result information sent by the terminal; and determining counter check result information according to the received first comparison result information, or the received second identity information and second comparison result information.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: December 15, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Tao Zhang, Bo Lin, Dongmei Zhang
  • Patent number: 9147271
    Abstract: A method for enabling graphical representation of aggregated data is provided. The method includes accessing aggregated data retrieved from a plurality of on-line sources and receiving selection of a portion of the data through a graphical user interface. The method further includes identifying attributes associated with the portion of the data and generating a graphical representation of the portion of the data.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: September 29, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yingnong Dang, Dongmei Zhang, Min Wang, Xiaohui Hou, Jian Wang
  • Publication number: 20150254369
    Abstract: Implementations are described related to users directly manipulating visual depictions of aspects of a data set displayed in a user interface to generate or modify visual representations of the data set, such as a chart. The direct manipulation may be either through a computer input device, (e.g., a keyboard or mouse), or based on other input data, such as a touch input. Aspects of a data set include dimensions, which may be used to filter the data set, and metrics, which are quantifiable elements within the data set. In various implementations, input such as drag-and-drop operations corresponding to visual depictions of aspects of a data set may be interpreted in generating or modifying charts.
    Type: Application
    Filed: March 7, 2014
    Publication date: September 10, 2015
    Applicant: Microsoft Corporation
    Inventors: Zhitao Hou, Haidong Zhang, Bryan Dove, Dongmei Zhang, Xiao Liang, He Huang
  • Patent number: 9122563
    Abstract: Described is a technology, such as implemented in a computational software program, by which a minimal polynomial is efficiently determined for a radical expression over the ring Z of integer numbers or the ring Q of rational numbers. The levels of the radical are grouped into a level permutation group that is used to find a level permutation set. An annihilation polynomial is found based upon the level permutation set. The annihilation polynomial is factored, and a selection mechanism selects the minimal polynomial based upon the annihilation polynomial's factors.
    Type: Grant
    Filed: April 13, 2009
    Date of Patent: September 1, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Xu Yang, Zhouchen Lin, Sijun Liu, Tianjun Ye, Dongmei Zhang
  • Patent number: 9110769
    Abstract: Techniques for detecting, analyzing, and/or reporting code clone are described herein. In one or more implementations, clone-code detection is performed on one or more source code bases to find true and near clones of a subject code snippet that a user (e.g., a software developer) expressly or implicitly selected. In one or more other implementations, code clone is analyzed to estimate the code-improvement-potential (such as bug-potential and code-refactoring-potential) properties of clones. One or more other implementations present the results of code clone analysis with indications (e.g., rankings) of the estimated properties of the respective the clones.
    Type: Grant
    Filed: April 1, 2010
    Date of Patent: August 18, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Dongmei Zhang, Yingnong Dang, Yingjun Qiu, Song Ge
  • Patent number: 9104525
    Abstract: Techniques for mining API method usage patterns from source code are described. These techniques include parsing the source code to generate API method call sequences that include an API method. These call sequences are clustered to obtain clusters. Based on the clusters, frequent closed sequences are determined and then clustered to obtain an API usage pattern. In addition, optimal clustering parameters may also be determined. In some instances, a graphical representation is generated based on the API usage pattern in response to a query associated with the API method.
    Type: Grant
    Filed: January 22, 2013
    Date of Patent: August 11, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yingnong Dang, Jue Wang, Kai Chen, Hongyu Zhang, Tao Xie, Dongmei Zhang
  • Patent number: 9088616
    Abstract: A method and an apparatus for authentication are disclosed. The method includes: deciding to release a connection or continue a current service according to native information and network policy after an AKA authentication procedure fails. When the EPS AKA authentication procedure fails, the connection is not released immediately in the present invention, but the connection is released or the current service is continued according to the native information and network policy, thus avoiding unnecessary release of connections and saving resources.
    Type: Grant
    Filed: September 21, 2010
    Date of Patent: July 21, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xiaoyu Bi, Aiqin Zhang, Dongmei Zhang
  • Publication number: 20150163678
    Abstract: A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met.
    Type: Application
    Filed: February 19, 2015
    Publication date: June 11, 2015
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Dongmei ZHANG, Jing CHEN, Lijia ZHANG, Zhuo CHEN
  • Patent number: 9049594
    Abstract: A method and a device for key generation are disclosed in embodiments of the present invention. The method for key generation is applied to a UMTS-LTE resource convergence scenario that has a base station as an anchor point, and includes: deriving, according to a root key and a count value of an LTE system, or according to a random number and an LTE system root key, a UMTS integrity key and cipher key, and sending the UMTS integrity key and cipher key to a UMTS control node. The embodiments of the present invention enable the derivation of the UMTS integrity key and cipher key in a UMTS-LTE resource convergence scenario that has a base station as an anchor point, enable a user equipment to communicate securely through a UMTS, and further improve security of data transmitted in the UMTS.
    Type: Grant
    Filed: July 29, 2013
    Date of Patent: June 2, 2015
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Xinyi Chen, Dongmei Zhang, Lijia Zhang, Xiaohan Liu
  • Publication number: 20150132830
    Abstract: The invention relates to the field of microalgae culture and specifically relates to a trap-type carbon supplement device and carbon supplement method for cultivating microalgae in an open pond. The trap-type carbon supplement device for cultivating microalgae in an open pond, comprises a trap-type container, a partition plate and a gas distributor, wherein the gas distributor is positioned at the culture solution inlet of the trap-type carbon supplement device; the thickness of the trap-type carbon supplement device on the side of the culture solution inlet is 0.5-2 times of the depth of the culture solution in the open pond; the gap between the lower end of the partition plate and the bottom of the trap-type container is 0.5-2 times of the thickness of the trap- type carbon supplement device on the side of the culture solution inlet; the upper end of the partition plate is higher than the wall of the trap-type container; and the width of the partition plate is matched with the trap-type container.
    Type: Application
    Filed: May 7, 2012
    Publication date: May 14, 2015
    Applicant: Institute of Process Engineering, Chinese Academy of Sciences
    Inventors: Wei Cong, Zhongliang Sun, Ming Liu, Xia Wu, Dongmei Zhang, Shumei Wen
  • Publication number: 20150133135
    Abstract: The present invention relates to a counter check and reconfiguration method, apparatus, and system. The method includes: sending a second identity information and a second count information to a terminal, so that the terminal compares, according to the second identity information, the second count information with third count information maintained by the terminal itself to obtain first comparison result information or second comparison result information; receiving the first comparison result information sent by the terminal, or the second identity information and second comparison result information sent by the terminal; and determining counter check result information according to the received first comparison result information, or the received second identity information and second comparison result information.
    Type: Application
    Filed: January 22, 2015
    Publication date: May 14, 2015
    Inventors: Tao Zhang, Bo Lin, Dongmei Zhang
  • Publication number: 20150125946
    Abstract: The invention relates to the field of mass cultivation of microalgae and specifically relates to a horizontal submerged cover type carbon supplement device and carbon supplement method for cultivating microalgae in an open pond. The horizontal submerged cover type carbon supplement device for cultivating microalgae in an open pond, comprises: one or more than two covers and gas distributors, wherein the gas distributor is arranged at the bottom of the open pond and the cover is arranged above the gas distributor; the cover, in form of a cylinder with openings at both ends, is arranged along the flow direction of the culture solution, the two ends of the cover being a culture solution inlet and a culture solution outlet respectively; the gas distributor is kept away from the culture solution outlet of the cover by more than 40 cm.
    Type: Application
    Filed: May 7, 2012
    Publication date: May 7, 2015
    Applicant: Institute of Process Engineering ,Chinese Academy of Sciences
    Inventors: Wei Cong, Ming Liu, Xia Wu, Shumei Wen, Dongmei Zhang, Zhongliang Sun
  • Publication number: 20150127990
    Abstract: Techniques for error report processing are described herein. Error reports, received by a developer due to program crashes, may be organized into a plurality of “buckets.” The buckets may be based in part on a name and a version of the application associated with a crash. Additionally, a call stack of the computer on which the crash occurred may be associated with each error report. The error reports may be “re-bucketed” into meta-buckets to provide additional information to programmers working to resolve software errors. The re-bucketing may be based in part on measuring similarity of call stacks of a plurality of error reports. The similarity of two call stacks—a measure of likelihood that two error reports were caused by a same error—may be based in part on functions in common, a distance of those functions from the crash point, and an offset distance between the common functions.
    Type: Application
    Filed: January 12, 2015
    Publication date: May 7, 2015
    Inventors: Dongmei Zhang, Yingnong Dang, Song Ge
  • Patent number: 9027111
    Abstract: Embodiments of the present invention disclose a relay node authentication method, apparatus, and system. The method provided in an embodiment of the present invention includes: sending, by a relay node, an authentication request message to a peer node, where the authentication request message includes a certificate of the relay node, so that the peer node authenticates the relay node according to the certificate of the relay node, where the peer node is a network side node or a security gateway in a security domain where the network side node is located; and receiving, by the relay node, an authentication response message sent by the peer node, where the authentication response message includes a certificate of the peer node, and authenticating the peer node according to the certificate of the peer node.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: May 5, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Dongmei Zhang, Aiqin Zhang, Xiaoyu Bi, Jing Liu
  • Patent number: 8989381
    Abstract: A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met.
    Type: Grant
    Filed: April 26, 2013
    Date of Patent: March 24, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Dongmei Zhang, Jing Chen, Lijia Zhang, Zhuo Chen