Patent application number | Description | Published |
20080240570 | SYMBOL GRAPH GENERATION IN HANDWRITTEN MATHEMATICAL EXPRESSION RECOGNITION - A forward pass through a sequence of strokes representing a handwritten equation is performed from the first stroke to the last stroke in the sequence. At each stroke, a path score is determined for a plurality of symbol-relation pairs that each represents a symbol and its spatial relation to a predecessor symbol. A symbol graph having nodes and links is constructed by backtracking through the strokes from the last stroke to the first stroke and assigning scores to the links based on the path scores for the symbol-relation pairs. The symbol graph is used to recognize a mathematical expression based in part on the scores for the links and the mathematical expression is stored. | 10-02-2008 |
20080243503 | MINIMUM DIVERGENCE BASED DISCRIMINATIVE TRAINING FOR PATTERN RECOGNITION - A method of providing discriminative training of a speech recognition unit is discussed. The method includes receiving an acoustic indication of an utterance having a hypothesis space and comparing the hypothesis space against a reference. The method measures the Kullback-Leibler Divergence (KLD) between the reference and the hypothesis space to adjust the reference and stores the adjusted reference on a tangible storage medium. | 10-02-2008 |
20090118020 | METHOD AND DEVICE FOR SENDING AND RECEIVING GAME CONTENT INCLUDING DOWNLOAD THEREOF - The present invention generally relates to methods and devices as well as handheld stations and computer program products for sending video game content to handheld mobile terminals, comprising broadcasting common video game content to handheld mobile communication terminals via a digital video broadcast handheld channel, to enable said handheld mobile terminals to execute video game applications. | 05-07-2009 |
20120088457 | Method and Device for Minimizing Drive Test Logging Measurement - Embodiments of the present invention provide a Minimizing Drive Test (MDT) logging measurement method and device. The method includes: generating MDT logging measurement configuration information; and sending the MDT logging measurement configuration information to an active User Equipment (UE) and/or an idle UE according to a predetermined rule. Through the solutions provided in the embodiments of the present invention, a commercial UE in an existing network may be utilized to assist in locating a network problem, thus reducing a Drive Test (DT) overhead. | 04-12-2012 |
20120182929 | METHOD, APPARATUS, AND SYSTEM FOR DATA TRANSMISSION - Embodiments of the present invention disclose a method, an apparatus, and a system for data transmission. The method for data transmission includes: determining that data to be transmitted is control plane signaling related to a user equipment that camps on a relay node; and transmitting the data through a first user data bearer established between the relay node and a donor base station, where the first user data bearer provides integrity protection for the data. According to the embodiments of the present invention, when the control plane signaling related to the user equipment that camps on the relay node is transmitted between the relay node and the donor base station, integrity protection is provided for the control plane signaling, and therefore attacks such as the denial of a service attack are prevented. | 07-19-2012 |
20120213372 | METHOD AND DEVICE FOR OBTAINING SECURITY KEY IN RELAY SYSTEM - A method and a device for obtaining a security key in a relay system are disclosed in the embodiment of the present invention. A node in the relay system obtains an initial key, according to the initial key, the node obtains a root key of an air interface protection key between the node and another node that is directly adjacent to the node, and according to the root key, the node obtains the air interface protection key between the node and said another node that is directly adjacent to the node. Therefore, according to the initial key, each lower-level node obtains a root key of an air interface protection key between each lower-level node, so that data of a UE on a Un interface link may be respectively protected, that is, each active UE has a set of security parameters on the Un interface link, and effective security protection is performed on data on each segment of an air interface. | 08-23-2012 |
20120297474 | RELAY NODE AUTHENTICATION METHOD, APPARATUS, AND SYSTEM - Embodiments of the present invention disclose a relay node authentication method, apparatus, and system. The method provided in an embodiment of the present invention includes: sending, by a relay node, an authentication request message to a peer node, where the authentication request message includes a certificate of the relay node, so that the peer node authenticates the relay node according to the certificate of the relay node, where the peer node is a network side node or a security gateway in a security domain where the network side node is located; and receiving, by the relay node, an authentication response message sent by the peer node, where the authentication response message includes a certificate of the peer node, and authenticating the peer node according to the certificate of the peer node. | 11-22-2012 |
20130236016 | METHOD, APPARATUS, AND SYSTEM FOR DATA PROTECTION ON INTERFACE IN COMMUNICATIONS SYSTEM - A method and an apparatus for protecting data carried on an Un interface between a eNB and a relay node are disclosed. Three types of radio bearers (RBs) are defined over the Un interface: signaling radio bearers (SRBs) for carrying control plane signaling data, signaling-data radio bearers (s-DRBs) for carrying control plane signaling date; and data-data radio bearers (d-DRBs) for carrying user plane data. An integrity protection algorithm and an encryption algorithm are negotiated for control plane signaling data on an SRB, control plane signaling data carried on an s-DRB, and user plane data carried on a d-DRB. With the respective integrity protection algorithm and encryption algorithm, the data over the Un interface can be protected respectively. Therefore, the security protection on the Un interface is more comprehensive, and the security protection requirements of data borne over different RBs can be met. | 09-12-2013 |
20130310006 | METHOD AND DEVICE FOR KEY GENERATION - A method and a device for key generation are disclosed in embodiments of the present invention. The method for key generation is applied to a UMTS-LTE resource convergence scenario that has a base station as an anchor point, and includes: deriving, according to a root key and a count value of an LTE system, or according to a random number and an LTE system root key, a UMTS integrity key and cipher key, and sending the UMTS integrity key and cipher key to a UMTS control node. The embodiments of the present invention enable the derivation of the UMTS integrity key and cipher key in a UMTS-LTE resource convergence scenario that has a base station as an anchor point, enable a user equipment to communicate securely through a UMTS, and further improve security of data transmitted in the UMTS. | 11-21-2013 |
20140185585 | METHOD FOR TRANSFERRING CONTEXT AND MOBILITY MANAGEMENT ENTITY - The present invention discloses a method for transferring a context and a mobility management entity. When S | 07-03-2014 |
20140208296 | API Usage Pattern Mining - Techniques for mining API method usage patterns from source code are described. These techniques include parsing the source code to generate API method call sequences that include an API method. These call sequences are clustered to obtain clusters. Based on the clusters, frequent closed sequences are determined and then clustered to obtain an API usage pattern. In addition, optimal clustering parameters may also be determined. In some instances, a graphical representation is generated based on the API usage pattern in response to a query associated with the API method. | 07-24-2014 |
20140317688 | METHOD AND DEVICE FOR GENERATING ACCESS STRATUM KEY IN COMMUNICATIONS SYSTEM - In the communications system, a user equipment UE accesses a core network via a first network-side device by using a first air interface and connects to the first network-side device via a second network-side device by using a second air interface to access the core network. The method includes: acquiring, by the network-side device, an input parameter; calculating, by the network-side device, an access stratum root key KeNB* according to the input parameter and an access stratum root key KeNB on the first air interface, or using, by the network-side device, the KeNB as the KeNB*; and generating, by the second network-side device, an access stratum key on the second air interface according to the KeNB*, or sending, by the first network-side device, the KeNB* to the second network-side device. | 10-23-2014 |
20140355762 | METHOD, APPARATUS, AND SYSTEM FOR ESTABLISHING SECURITY CONTEXT - Embodiments of the present invention discloses a method, an apparatus, and a system for establishing a security context and relates to the communications field, so as to comprehensively protect UE data. The method includes: acquiring an encryption algorithm of an access node; acquiring a root key and deriving, according to the root key and the encryption algorithm, an encryption key of the access node; sending the encryption key and the encryption algorithm to the access node, so that the access node starts downlink encryption and uplink decryption; sending the encryption algorithm of the access node to the UE so as to negotiate the encryption algorithm with the UE; and instructing the access node to start downlink encryption and uplink decryption and instructing, during algorithm negotiation, the UE to start downlink decryption and uplink encryption. The present invention mainly applies to SCC security protection. | 12-04-2014 |