Patents by Inventor Dongmei Zhang

Dongmei Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150382189
    Abstract: Embodiments of the present invention disclose a key exchange method and apparatus, which relate to the communications field, and can enable user equipments establishing a D2D link to share a set of keys, and further, information security can be achieved when a user equipment transmits service data or a signaling message through a Ud interface. A specific solution is that: a network device acquires a first key, and sends a message including the first key to a second user equipment, so that the second user equipment uses, when communicating with a first user equipment by using a D2D link, the first key to protect transmitted information. The present invention is applicable to an exchange process of keys for protecting data on a D2D link.
    Type: Application
    Filed: September 2, 2015
    Publication date: December 31, 2015
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Dongmei ZHANG, Jing CHEN
  • Patent number: 9215700
    Abstract: The present invention relates to a counter check and reconfiguration method, apparatus, and system. The method includes: sending a second identity information and a second count information to a terminal, so that the terminal compares, according to the second identity information, the second count information with third count information maintained by the terminal itself to obtain first comparison result information or second comparison result information; receiving the first comparison result information sent by the terminal, or the second identity information and second comparison result information sent by the terminal; and determining counter check result information according to the received first comparison result information, or the received second identity information and second comparison result information.
    Type: Grant
    Filed: January 22, 2015
    Date of Patent: December 15, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Tao Zhang, Bo Lin, Dongmei Zhang
  • Patent number: 9147271
    Abstract: A method for enabling graphical representation of aggregated data is provided. The method includes accessing aggregated data retrieved from a plurality of on-line sources and receiving selection of a portion of the data through a graphical user interface. The method further includes identifying attributes associated with the portion of the data and generating a graphical representation of the portion of the data.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: September 29, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yingnong Dang, Dongmei Zhang, Min Wang, Xiaohui Hou, Jian Wang
  • Publication number: 20150254369
    Abstract: Implementations are described related to users directly manipulating visual depictions of aspects of a data set displayed in a user interface to generate or modify visual representations of the data set, such as a chart. The direct manipulation may be either through a computer input device, (e.g., a keyboard or mouse), or based on other input data, such as a touch input. Aspects of a data set include dimensions, which may be used to filter the data set, and metrics, which are quantifiable elements within the data set. In various implementations, input such as drag-and-drop operations corresponding to visual depictions of aspects of a data set may be interpreted in generating or modifying charts.
    Type: Application
    Filed: March 7, 2014
    Publication date: September 10, 2015
    Applicant: Microsoft Corporation
    Inventors: Zhitao Hou, Haidong Zhang, Bryan Dove, Dongmei Zhang, Xiao Liang, He Huang
  • Patent number: 9122563
    Abstract: Described is a technology, such as implemented in a computational software program, by which a minimal polynomial is efficiently determined for a radical expression over the ring Z of integer numbers or the ring Q of rational numbers. The levels of the radical are grouped into a level permutation group that is used to find a level permutation set. An annihilation polynomial is found based upon the level permutation set. The annihilation polynomial is factored, and a selection mechanism selects the minimal polynomial based upon the annihilation polynomial's factors.
    Type: Grant
    Filed: April 13, 2009
    Date of Patent: September 1, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Xu Yang, Zhouchen Lin, Sijun Liu, Tianjun Ye, Dongmei Zhang
  • Patent number: 9110769
    Abstract: Techniques for detecting, analyzing, and/or reporting code clone are described herein. In one or more implementations, clone-code detection is performed on one or more source code bases to find true and near clones of a subject code snippet that a user (e.g., a software developer) expressly or implicitly selected. In one or more other implementations, code clone is analyzed to estimate the code-improvement-potential (such as bug-potential and code-refactoring-potential) properties of clones. One or more other implementations present the results of code clone analysis with indications (e.g., rankings) of the estimated properties of the respective the clones.
    Type: Grant
    Filed: April 1, 2010
    Date of Patent: August 18, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Dongmei Zhang, Yingnong Dang, Yingjun Qiu, Song Ge
  • Patent number: 9104525
    Abstract: Techniques for mining API method usage patterns from source code are described. These techniques include parsing the source code to generate API method call sequences that include an API method. These call sequences are clustered to obtain clusters. Based on the clusters, frequent closed sequences are determined and then clustered to obtain an API usage pattern. In addition, optimal clustering parameters may also be determined. In some instances, a graphical representation is generated based on the API usage pattern in response to a query associated with the API method.
    Type: Grant
    Filed: January 22, 2013
    Date of Patent: August 11, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Yingnong Dang, Jue Wang, Kai Chen, Hongyu Zhang, Tao Xie, Dongmei Zhang
  • Patent number: 9088616
    Abstract: A method and an apparatus for authentication are disclosed. The method includes: deciding to release a connection or continue a current service according to native information and network policy after an AKA authentication procedure fails. When the EPS AKA authentication procedure fails, the connection is not released immediately in the present invention, but the connection is released or the current service is continued according to the native information and network policy, thus avoiding unnecessary release of connections and saving resources.
    Type: Grant
    Filed: September 21, 2010
    Date of Patent: July 21, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Xiaoyu Bi, Aiqin Zhang, Dongmei Zhang
  • Publication number: 20150163678
    Abstract: A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met.
    Type: Application
    Filed: February 19, 2015
    Publication date: June 11, 2015
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Dongmei ZHANG, Jing CHEN, Lijia ZHANG, Zhuo CHEN
  • Patent number: 9049594
    Abstract: A method and a device for key generation are disclosed in embodiments of the present invention. The method for key generation is applied to a UMTS-LTE resource convergence scenario that has a base station as an anchor point, and includes: deriving, according to a root key and a count value of an LTE system, or according to a random number and an LTE system root key, a UMTS integrity key and cipher key, and sending the UMTS integrity key and cipher key to a UMTS control node. The embodiments of the present invention enable the derivation of the UMTS integrity key and cipher key in a UMTS-LTE resource convergence scenario that has a base station as an anchor point, enable a user equipment to communicate securely through a UMTS, and further improve security of data transmitted in the UMTS.
    Type: Grant
    Filed: July 29, 2013
    Date of Patent: June 2, 2015
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventors: Xinyi Chen, Dongmei Zhang, Lijia Zhang, Xiaohan Liu
  • Publication number: 20150133135
    Abstract: The present invention relates to a counter check and reconfiguration method, apparatus, and system. The method includes: sending a second identity information and a second count information to a terminal, so that the terminal compares, according to the second identity information, the second count information with third count information maintained by the terminal itself to obtain first comparison result information or second comparison result information; receiving the first comparison result information sent by the terminal, or the second identity information and second comparison result information sent by the terminal; and determining counter check result information according to the received first comparison result information, or the received second identity information and second comparison result information.
    Type: Application
    Filed: January 22, 2015
    Publication date: May 14, 2015
    Inventors: Tao Zhang, Bo Lin, Dongmei Zhang
  • Publication number: 20150132830
    Abstract: The invention relates to the field of microalgae culture and specifically relates to a trap-type carbon supplement device and carbon supplement method for cultivating microalgae in an open pond. The trap-type carbon supplement device for cultivating microalgae in an open pond, comprises a trap-type container, a partition plate and a gas distributor, wherein the gas distributor is positioned at the culture solution inlet of the trap-type carbon supplement device; the thickness of the trap-type carbon supplement device on the side of the culture solution inlet is 0.5-2 times of the depth of the culture solution in the open pond; the gap between the lower end of the partition plate and the bottom of the trap-type container is 0.5-2 times of the thickness of the trap- type carbon supplement device on the side of the culture solution inlet; the upper end of the partition plate is higher than the wall of the trap-type container; and the width of the partition plate is matched with the trap-type container.
    Type: Application
    Filed: May 7, 2012
    Publication date: May 14, 2015
    Applicant: Institute of Process Engineering, Chinese Academy of Sciences
    Inventors: Wei Cong, Zhongliang Sun, Ming Liu, Xia Wu, Dongmei Zhang, Shumei Wen
  • Publication number: 20150127990
    Abstract: Techniques for error report processing are described herein. Error reports, received by a developer due to program crashes, may be organized into a plurality of “buckets.” The buckets may be based in part on a name and a version of the application associated with a crash. Additionally, a call stack of the computer on which the crash occurred may be associated with each error report. The error reports may be “re-bucketed” into meta-buckets to provide additional information to programmers working to resolve software errors. The re-bucketing may be based in part on measuring similarity of call stacks of a plurality of error reports. The similarity of two call stacks—a measure of likelihood that two error reports were caused by a same error—may be based in part on functions in common, a distance of those functions from the crash point, and an offset distance between the common functions.
    Type: Application
    Filed: January 12, 2015
    Publication date: May 7, 2015
    Inventors: Dongmei Zhang, Yingnong Dang, Song Ge
  • Publication number: 20150125946
    Abstract: The invention relates to the field of mass cultivation of microalgae and specifically relates to a horizontal submerged cover type carbon supplement device and carbon supplement method for cultivating microalgae in an open pond. The horizontal submerged cover type carbon supplement device for cultivating microalgae in an open pond, comprises: one or more than two covers and gas distributors, wherein the gas distributor is arranged at the bottom of the open pond and the cover is arranged above the gas distributor; the cover, in form of a cylinder with openings at both ends, is arranged along the flow direction of the culture solution, the two ends of the cover being a culture solution inlet and a culture solution outlet respectively; the gas distributor is kept away from the culture solution outlet of the cover by more than 40 cm.
    Type: Application
    Filed: May 7, 2012
    Publication date: May 7, 2015
    Applicant: Institute of Process Engineering ,Chinese Academy of Sciences
    Inventors: Wei Cong, Ming Liu, Xia Wu, Shumei Wen, Dongmei Zhang, Zhongliang Sun
  • Patent number: 9027111
    Abstract: Embodiments of the present invention disclose a relay node authentication method, apparatus, and system. The method provided in an embodiment of the present invention includes: sending, by a relay node, an authentication request message to a peer node, where the authentication request message includes a certificate of the relay node, so that the peer node authenticates the relay node according to the certificate of the relay node, where the peer node is a network side node or a security gateway in a security domain where the network side node is located; and receiving, by the relay node, an authentication response message sent by the peer node, where the authentication response message includes a certificate of the peer node, and authenticating the peer node according to the certificate of the peer node.
    Type: Grant
    Filed: August 1, 2012
    Date of Patent: May 5, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Dongmei Zhang, Aiqin Zhang, Xiaoyu Bi, Jing Liu
  • Patent number: 8989381
    Abstract: A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met.
    Type: Grant
    Filed: April 26, 2013
    Date of Patent: March 24, 2015
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Dongmei Zhang, Jing Chen, Lijia Zhang, Zhuo Chen
  • Publication number: 20150043537
    Abstract: Embodiments of the present invention disclose a security processing method and system in a network handover process. The method includes: generating, by a network switching node, a target key after receiving a handover request; sending, by the network switching node, security information including the target key to a target network node, and receiving a handover response message sent by the target network node; and sending, by the network switching node, a handover command to a mobile terminal, so that the mobile terminal accesses a target network. By adopting the present invention, security processing in handover of a mobile terminal from a 3G network to an HSPA network or an LTE network may be completed in a case that the network switching node currently used in the network is not changed.
    Type: Application
    Filed: October 28, 2014
    Publication date: February 12, 2015
    Inventors: Jing CHEN, Dongmei ZHANG, Xiaoying XU
  • Patent number: 8949675
    Abstract: Techniques for error report processing are described herein. Error reports, received by a developer due to program crashes, may be organized into a plurality of “buckets.” The buckets may be based in part on a name and a version of the application associated with a crash. Additionally, a call stack of the computer on which the crash occurred may be associated with each error report. The error reports may be “re-bucketed” into meta-buckets to provide additional information to programmers working to resolve software errors. The re-bucketing may be based in part on measuring similarity of call stacks of a plurality of error reports. The similarity of two call stacks—a measure of likelihood that two error reports were caused by a same error—may be based in part on functions in common, a distance of those functions from the crash point, and an offset distance between the common functions.
    Type: Grant
    Filed: November 30, 2010
    Date of Patent: February 3, 2015
    Assignee: Microsoft Corporation
    Inventors: Dongmei Zhang, Yingnong Dang, Song Ge
  • Publication number: 20150026787
    Abstract: Disclose are an authentication method, device and system for a user equipment. The method comprises: first, a user equipment receiving a random value RAND and a cognitive code AUTN in an evolved packet system (EPS) authentication vector sent by a network side device; when an operating mode of the user equipment is a long-term evolved node LTE Hi operating mode, the user equipment performing authentication based on the RAND and the AUTN. In the authentication process, the user equipment ignores a verification result of a separation bit of an authentication management field (AMF) in the AUTN; or, the user equipment does not verify the separation bit of the AMF. The present disclosure is applicable to the field of communication systems.
    Type: Application
    Filed: October 8, 2014
    Publication date: January 22, 2015
    Inventors: Dongmei Zhang, Chunshan Xiong, Jing Chen
  • Publication number: 20150011536
    Abstract: The present invention relates to the field of pharmaceutical chemistry, and particularly to an aza-benzo[f]azulen derivative (I) and an antitumor effect thereof Pharmacological tests show that the compound of the present invention has in vitro and in vivo antitumor activities, and can be developed into clinical drugs for treating or controlling diseases such as stomach cancer, lung cancer, liver cancer, breast cancer, colon cancer, prostate cancer, and oral cancer.
    Type: Application
    Filed: January 24, 2013
    Publication date: January 8, 2015
    Inventors: Xihan Wu, Liwu Fu, Dongmei Zhang, Yurong Wang