Patents by Inventor Weidong Cui

Weidong Cui has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240098517
    Abstract: A first next generation Node B (gNB) is configured to establish a first backhaul communication link with a second gNB as a parent gNB, schedule at least one of a third gNB or a UE for a UL transmission to the first gNB using UL beam management parameters and UL transmission parameters, indicate to the second gNB first beam management parameters for the second gNB to use for transmitting a DL transmission to the first gNB on the first backhaul link and first DL transmission parameters for the DL transmission so that the DL transmission will be received simultaneously with the UL transmission and when the first beam management parameters and the first DL transmission parameters are determined to be used by the second gNB, receiving the DL transmission from the second gNB simultaneously with the UL transmission from the at least one of the third gNB or the UE.
    Type: Application
    Filed: April 6, 2021
    Publication date: March 21, 2024
    Inventors: Seyed Ali Akbar FAKOORIAN, Chunhai YAO, Chunxuan YE, Dawei ZHANG, Haitong SUN, Hong HE, Jie CUI, Oghenekome OTERI, Sarma V. VANGALA, Wei ZENG, Weidong YANG, Yushu ZHANG
  • Patent number: 11936407
    Abstract: A communication system provides reliable wideband communications with reduced power consumption in a user equipment (UE) receiver. A UE may include receiver circuitry to receive a radio frequency (RF) signal from a wireless network and output an analog baseband signal. The RF signal includes M copies of a duplicated signal in a frequency domain. The analog baseband signal includes the M copies of the duplicated signal uniformly offset from one another in the frequency domain by a bandwidth F and including a gap between adjacent copies. The UE further includes an anti-aliasing analog filter an analog to digital converter (ADC). The ADC samples an output of the anti-aliasing analog filter at a sampling frequency selected to obtain a digital baseband signal comprising a combined digital copy of the M copies of the duplicated signal folded over each other.
    Type: Grant
    Filed: October 15, 2020
    Date of Patent: March 19, 2024
    Assignee: APPLE INC.
    Inventors: Weidong Yang, Chunhai Yao, Chunxuan Ye, Dawei Zhang, Haitong Sun, Hong He, Huaning Niu, Jie Cui, Manasa Raghavan, Oghenekome Oteri, Seyed Ali Akbar Fakoorian, Sigen Ye, Wei Zeng, Yang Tang, Yingqun Yu, Yushu Zhang
  • Publication number: 20240089832
    Abstract: Methods and apparatus are provided for a UE to determine a cell global identity (CGI) of a target cell.
    Type: Application
    Filed: September 27, 2023
    Publication date: March 14, 2024
    Inventors: Jie CUI, Yang TANG, Dawei ZHANG, Hong HE, Chunhai YAO, Chunxuan YE, Haitong SUN, Weidong YANG, Wei ZENG, Yuchul KIM, Yushu ZHANG, Zhibin WU, Oghenekome OTERI
  • Patent number: 11930519
    Abstract: Measurement resources are often limited in 5G and 4G-LTE communications. As a result, SMTC and CSI-RS measurement windows will occasionally be assigned to the same resource elements of a signal frame. This results in a collision that must be resolved, since both measurements cannot be performed simultaneously. The collision can be resolved using restriction, where overlapping resource elements are assigned to either the SMTC or the CSI-RS measurements, or can be resolved using measurement sharing, where overlapping resource elements are divided among the two measurements according to a measurement sharing factor. Various factors, including priority or window periodicity may be taken into account by the measurement rules that dictate collision resolution.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: March 12, 2024
    Assignee: Apple Inc.
    Inventors: Jie Cui, Chunhai Yao, Chunxuan Ye, Dawei Zhang, Haitong Sun, Hong He, Oghenekome Oteri, Wei Zeng, Weidong Yang, Yang Tang, Yuchul Kim, Yushu Zhang, Zhibin Wu
  • Patent number: 11928190
    Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.
    Type: Grant
    Filed: October 20, 2022
    Date of Patent: March 12, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xinyang Ge, Weidong Cui, Ben Niu, Ling Tony Chen
  • Publication number: 20240080169
    Abstract: Embodiments of the present disclosure relate to methods, a terminal device, a network device, and computer program products for SCell management in wireless communication. A terminal device receives from a network device configuration information for configuring a triggering mode. The triggering mode is for triggering activation of a secondary cell of the terminal device and a transmission of a temporary reference signal in the secondary cell. Based on the configured triggering mode, the terminal device receives first triggering information on the activation of the secondary cell and second triggering information on the transmission of the temporary reference signal for performing the activation of the secondary cell. In this way, it is possible to reduce the latency of activation/de-activation procedure for SCG and secondary cells.
    Type: Application
    Filed: May 31, 2021
    Publication date: March 7, 2024
    Inventors: Hong HE, Dawei ZHANG, Wei ZENG, Haitong SUN, Chunhai YAO, Yang TANG, Jie CUI, Sigen YE, Weidong YANG
  • Patent number: 11922168
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Grant
    Filed: March 23, 2022
    Date of Patent: March 5, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
  • Patent number: 11924832
    Abstract: Systems, methods, and circuitries are provided for performing sidelink communication. An example method generates SCI stage 1 and stage 2 for transmitting a transport block (TB) to a user equipment device (UE). The method includes determining the type of sidelink communication for transmitting the TB. An SCI stage 2 format is selected based on the type of sidelink communication. An SCI stage 2 payload is encoded in accordance with the selected SCI stage 2 format. The selected SCI stage 2 format value is encoded in an SCI stage 1 payload. The SCI stage 1 payload and SCI stage 2 payload are transmitted to the UE.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: March 5, 2024
    Assignee: Apple Inc.
    Inventors: Chunhai Yao, Chunxuan Ye, Wei Zeng, Yushu Zhang, Oghenekome Oteri, Weidong Yang, Hong He, Haitong Sun, Yang Tang, Jie Cui, Yuchul Kim, Dawei Zhang, Jia Tang
  • Publication number: 20240072862
    Abstract: Embodiments of the present disclosure relate to uplink transmission with repetitions. According to embodiments of the present disclosure, a user equipment (UE) comprises a transceiver configured to communicate with a network; and a processor communicatively coupled to the transceiver and configured to perform operations. The operations comprise determining first Channel State Information (CSI) and second CSI based on at least one of a previous channel and interference measurement or a latest channel and interference measurement. The operations further comprise transmitting the first CSI via the transceiver to the network with a first beam, the first CSI multiplexed with a first repetition of an uplink transmission with the first beam. The operations further comprise transmitting the second CSI via the transceiver to the network with a second beam, the second CSI multiplexed with a second repetition of the uplink transmission with the second beam.
    Type: Application
    Filed: April 6, 2021
    Publication date: February 29, 2024
    Inventors: Yushu ZHANG, Chunhai YAO, Chunxuan YE, Dawei ZHANG, Haitong SUN, Hong HE, Huaning NIU, Jie CUI, Manasa RAGHAVAN, Qiming LI, Seyed Ali Akbar FAKOORIAN, Sigen YE, Wei ZENG, Weidong YANG
  • Publication number: 20240073813
    Abstract: A user equipment is configured to receive a reference signal when secondary cell (SCell is to be activated. The UE receives a secondary cell (SCell) activation indication for activating an SCell, receives a reference signal (RS) triggering indication for triggering an RS prior to an expected SCell activation period, performs measurements on the triggered RS and activates the SCell based on the RS measurements.
    Type: Application
    Filed: November 6, 2023
    Publication date: February 29, 2024
    Inventors: Haitong SUN, Chunhai YAO, Chunxuan YE, Dawei ZHANG, Hong HE, Huaning NIU, Jie CUI, Oghenekome OTERI, Sigen YE, Wei ZENG, Weidong YANG, Yang TANG, Yushu ZHANG
  • Patent number: 11917652
    Abstract: The present application relates to devices and components including apparatus, systems, and methods to provide SCell activation. In one example, a UE may support carrier aggregation in a high speed mode, such FR1 CA in HST. Serving cells can be particularly configured for the carrier aggregation based on the UE's capability to support carrier aggregation in the high speed mode. Additionally or alternatively, an SCell activation procedure can be performed based on this capability.
    Type: Grant
    Filed: September 14, 2021
    Date of Patent: February 27, 2024
    Assignee: Apple Inc.
    Inventors: Jie Cui, Qiming Li, Yang Tang, Manasa Raghavan, Huaning Niu, Hong He, Weidong Yang, Chunxuan Ye, Dawei Zhang
  • Publication number: 20230349912
    Abstract: Provided herein are methods of processing a polypeptide or protein for analysis, e.g., peptide mapping analysis by mass spectrometry. In exemplary embodiments, the method comprises incubating a digested sample at a mildly acidic pH and/or in the presence of a chaotrope, wherein the digested sample is produced by digesting a polypeptide with a protease to produce a digested sample comprising at least two peptides. In exemplary embodiments, the method comprises digesting the polypeptide with a protease which cleaves C-terminal to tryptophan to produce a digested sample comprising at least two peptides. In exemplary embodiments, the method comprises digesting the polypeptide with trypsin at an enzyme:substrate (E:S) weight ratio of about 1:1 to about 1:15 to produce a digested sample comprising at least two peptides. In exemplary aspects, the digested sample comprises at least one or two peptides each comprising a tyrosine at the C-terminus.
    Type: Application
    Filed: September 17, 2021
    Publication date: November 2, 2023
    Applicant: AMGEN INC.
    Inventors: Gang XIAO, Pavel BONDARENKO, Liuqing SHI, Thomas M. DILLON, Da REN, Margaret Speed RICCI, Weidong CUI, John Joseph HARRAHY, Jake PAWLOWSKI, Andrew DYKSTRA, Dylan RIGGS
  • Publication number: 20230044383
    Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include an executable file having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may modify the executable file to include a separation header. The separation header may indicate that the data can be placed at an arbitrary distance in the memory from the code. The separation header may indicate that the code should be loaded into a hardware enclave and that the data should be loaded outside of the hardware enclave. The platform may encrypt the code and provide it to a computing device. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave.
    Type: Application
    Filed: October 20, 2022
    Publication date: February 9, 2023
    Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
  • Patent number: 11500969
    Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.
    Type: Grant
    Filed: January 3, 2020
    Date of Patent: November 15, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Xinyang Ge, Weidong Cui, Ben Niu, Ling Tony Chen
  • Publication number: 20220214882
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Application
    Filed: March 23, 2022
    Publication date: July 7, 2022
    Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
  • Patent number: 11294682
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Grant
    Filed: May 20, 2019
    Date of Patent: April 5, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ben Niu, Gregory John Colombo, Weidong Cui, Jason Lin, Kenneth Dean Johnson
  • Publication number: 20210209201
    Abstract: This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.
    Type: Application
    Filed: January 3, 2020
    Publication date: July 8, 2021
    Inventors: Xinyang GE, Weidong CUI, Ben NIU, Ling Tony CHEN
  • Publication number: 20200371809
    Abstract: A program is executed using a call stack and shadow stack. The call stack includes frames having respective return addresses. The frames may also store variables and/or parameters. The shadow stack stores duplicates of the return addresses in the call stack. The call stack and the shadow stack are maintained by, (i) each time a function is called, adding a corresponding stack frame to the call stack and adding a corresponding return address to the shadow stack, and (ii) each time a function is exited, removing a corresponding frame from the call stack and removing a corresponding return address from the shadow stack. A backtrace of the program's current call chain is generated by accessing the return addresses in the shadow stack. The outputted backtrace includes the return addresses from the shadow stack and/or information about the traced functions that is derived from the shadow stack's return addresses.
    Type: Application
    Filed: May 20, 2019
    Publication date: November 26, 2020
    Inventors: Ben NIU, Gregory John COLOMBO, Weidong CUI, Jason LIN, Kenneth Dean JOHNSON
  • Patent number: 10565511
    Abstract: Debugging systems are configured to resolve both memory aliasing conditions in which a write instruction is directed to an unknown destination address, and concurrency conditions in which control flow information is collected for multiple, concurrently executing threads. Recorded state values corresponding to an application's prior execution and control flow information are both obtained.
    Type: Grant
    Filed: October 1, 2018
    Date of Patent: February 18, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Weidong Cui, Xinyang Ge, Baris Can Cengiz Kasikci, Ben Niu, Ruoyu Wang, Insu Yun
  • Patent number: 10505954
    Abstract: Graph-based detection systems and techniques are provided to identify potential malicious lateral movement paths. System and security events may be used to generate a network connection graph and detect remote file executions and/or other detections, for use in tracking malicious lateral movement across a computer network, such as a compromised computer network. Lateral movement determination across a computer network may be divided into two subproblems: forensic analysis and general detection. With forensic analysis, given a malicious node, possible lateral movement leading into or out of the node is identified. General detection identifies previously unknown malicious lateral movement on a network using a remote file execution detector, and/or other detectors, and a rare path anomaly detection algorithm.
    Type: Grant
    Filed: June 14, 2017
    Date of Patent: December 10, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jack Wilson Stokes, III, Robert James Mead, Tim William Burrell, Ian Hellen, John Joseph Lambert, Weidong Cui, Andrey Marochko, Qingyun Liu