Non-Orthogonal Multiple Access Transmission
    121.
    发明申请

    公开(公告)号:US20180077685A1

    公开(公告)日:2018-03-15

    申请号:US15701035

    申请日:2017-09-11

    Abstract: A method for non-orthogonal multiple access (NoMA) transmission is provided. In an embodiment, a method in a network device for transmission of a NoMA signal includes obtaining information bits. The method also includes transmitting the NoMA signal. The NoMA signal includes one or more layers. The NoMA signal is generated according to the information bits and according to a set of signal processing operations selected from a plurality of signal processing operations. At least one of the set of signal processing operations is layer-specific or UE-specific or a combination thereof.

    Data processing method, apparatus, and device

    公开(公告)号:US09900078B2

    公开(公告)日:2018-02-20

    申请号:US15620041

    申请日:2017-06-12

    CPC classification number: H04B7/0689 H04B7/0456 H04L1/02

    Abstract: A data processing method, including performing, by a transmit end device, mapping processing on L layers of information bits to generate L layers of modulation symbol sequences, where each layer of modulation symbol sequence includes U modulation symbols, the L layers of modulation symbol sequences correspond to a same time-frequency resource, and the U modulation symbols include at least one non-zero modulation symbol and at least one zero modulation symbol, performing precoding processing on each layer of modulation symbol sequence according to a precoding matrix to generate L layers of modulation symbol sequence matrixes, and performing superposition processing on the L layers of modulation symbol sequence matrixes to generate a to-be-sent symbol sequence matrix, where the to-be-sent symbol sequence matrix includes T element sequences in a first dimension, and the to-be-sent symbol sequence matrix includes U element sequences in a second dimension.

    Method and base station for power determination
    126.
    发明授权
    Method and base station for power determination 有权
    功率测定方法和基站

    公开(公告)号:US09473955B2

    公开(公告)日:2016-10-18

    申请号:US14165310

    申请日:2014-01-27

    Abstract: The present invention provides a method and a base station for power determination. The method comprises obtaining an optimal number of sub-carriers occupied by each user equipment, an optimal number of radio frequency links enabled by a base station and an optimal transmitting power of the base station by optimizing the number of the sub-carriers occupied by each user equipment, the number of the radio frequency links enabled by the base station and the transmitting power of the base station with an optimization condition that throughput of each user equipment is not smaller than a throughput threshold and an optimization goal of minimizing total power consumption of the base station; and determining the total power consumption of the base station according to the optimal number of the sub-carriers occupied by each user equipment, the optimal number of the radio frequency links enabled by the base station.

    Abstract translation: 本发明提供一种用于功率确定的方法和基站。 该方法包括:通过优化由每个用户设备所占用的子载波的数量,获得由每个用户设备占用的最佳数量的子载波,由基站使能的最佳数量的射频链路和基站的最佳发射功率 用户设备,由基站启用的射频链路的数量和基站的发射功率,每个用户设备的吞吐量不小于吞吐量阈值的优化条件和最小化总功耗的优化目标 基站; 以及根据每个用户设备所占用的最佳子载波数量确定基站的总功耗,即由基站使能的最佳数量的射频链路。

    Malicious code detection technologies
    127.
    发明授权
    Malicious code detection technologies 有权
    恶意代码检测技术

    公开(公告)号:US09213839B2

    公开(公告)日:2015-12-15

    申请号:US14207665

    申请日:2014-03-13

    CPC classification number: G06F21/563 G06F2221/033

    Abstract: An embodiment of the present application provides technologies for detecting malicious content embedded in a content downloaded from an external source. The downloaded content converted into an opcode sequence by a web browser in a computing device. The opcode sequence is compared with a pre-stored opcode signature. The opcode signature comprises multiple sentences, and each sentence has multiple clauses. Each clause may include a matching opcode, a condition, an instruction, and an identifier. When a matching opcode in a clause matches with an opcode of the opcode sequence, and the condition as specified in the clause is determined to be true, the instruction in the clause is taken and next sentence identified by the identifier is taken to match the opcode sequence. Eventually, the last taken clause in the opcode signature may instruct whether opcode sequence contains malicious code.

    Abstract translation: 本申请的实施例提供了用于检测嵌入在从外部源下载的内容中的恶意内容的技术。 下载的内容通过计算设备中的web浏览器转换成操作码序列。 操作码序列与预先存储的操作码签名进行比较。 操作码签名包含多个句子,每个句子都有多个子句。 每个子句可以包括匹配的操作码,条件,指令和标识符。 当条款中的匹配操作码与操作码序列的操作码匹配时,并且确定该条款中规定的条件为真时,将采用该条款中的指令,并将标识符识别的下一个句子与操作码匹配 序列。 最后,操作码签名中的最后一个条句可能指示操作码序列是否包含恶意代码。

    Software integrity protection method and apparatus, and software integrity verification method and apparatus

    公开(公告)号:US12294657B2

    公开(公告)日:2025-05-06

    申请号:US17711879

    申请日:2022-04-01

    Abstract: Embodiments of this application disclose a software integrity protection method and apparatus. A first device obtains a first software package, where the first software package includes a first signature made by a first party for a second software package by using a first private key; and the first device performs a signing operation on the first software package by using a second private key, to obtain a third software package including a second signature, where the first private key is controlled by the first party, and the second private key is controlled by a second party. The first device sends the third software package to a second device. The second device verifies the first signature and the second signature in the third software package respectively based on a first public key and a second public key that are prestored, to obtain a verification result.

Patent Agency Ranking