Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

790results about How to "Reduce resource overhead" patented technology

Method, user equipment and base station for transmitting uplink control information

The invention discloses a method, user equipment and a base station for transmitting uplink control information. The method comprises receiving a physical downlink control channel sent from the base station, wherein the physical downlink control channel comprises indication information used for indicating physical uplink control channel resources used for transmitting the uplink control information; acquiring the physical uplink control channel resources used for transmitting the uplink control information in a first resource group and or a second resource group which are configured in a semi-static state according to whether period channel state information included in the indication information and the uplink control information or not; and sending the uplink control information to the base station on a physical uplink control channel corresponding to the physical uplink control channel resources. The method, the user equipment and the base station for transmitting the uplink control information can transmit the uplink control information, reduce resource expenses of the physical uplink control channel in transmission of the uplink control information and improve the resource utilization rate.
Owner:HUAWEI TECH CO LTD

Multistage authority management method for cloud storage enciphered data sharing

The invention relates to a multistage authority management method for cloud storage enciphered data sharing. The methods such as attribute based encryption, access control and authority management are used for providing a reliable method for access and multistage authority management of a shared cipher text in the cloud storage environment. Through mixing encrypt system, the multistage authority management method for cloud storage enciphered data sharing comprises steps: firstly applying a symmetric encryption algorithm to encrypt data, and generating a content cipher text; then adopting the attribute based encryption to encrypt according to different authority information, and generating an authority cipher text; adopting the attribute based encryption scheme to encrypt a symmetric key and the authority cipher text, regarding the symmetric key and the authority cipher text as a file header of the content cipher text, and generating a final cipher text. The multistage authority management method for cloud storage enciphered data sharing has the advantages of being convenient to achieve, strong in user information protectiveness, fine in authority control grit and the like. Under the premise that a server is not credible, the flexible and extensible authority management to the shared enciphered data is supported, the privacy and the security of the user data and authority information are effectively ensured, and the multistage authority management method for cloud storage enciphered data sharing has good practical value and wide application prospect in the cloud storage field.
Owner:HANGZHOU YUANTIAO TECH CO LTD

A measurement and control communication method for a deep space probe and a measurement and control communication system for a deep space probe

The invention provides a measurement and control communication method for a deep space probe and a measurement and control communication system for a deep space probe. The method is used for achieving information interaction between an earth station and a deep space probe and measurement of a probe track. The method comprises following steps. Four microwave radio signal channels are disposed between the deep space probe and the earth station by using an uplink carrier frequency and a downlink carrier frequency and comprise a telecontrol instruction channel, a telemetry data channel, a scientific data channel, and a VLBI track measurement beacon channel. Three channel signals including engineering telemetry data, scientific probing data, and VLBI track measurement beacon are combined into a downlink transmission signal. Finally, a transmitter is used to complete a transmitting function of all downlink transmission signals. A track measurement beacon is generated by using a frequency standard signal of a high-stability frequency source and is transmitted to an earth VLBI measuring network. Using a Doppler frequency speed measurement and signal interference angle measurement manner, the earth VLBI measuring network completes the track measurement tack of the deep space probe.
Owner:NAT SPACE SCI CENT CAS

Demodulating method for multi-stream data and system thereof

The invention provides a demodulating method for multi-stream data and a system thereof. The demodulating method comprises the steps as follows: a pilot frequency symbol sequence is generated; for double-stream and four-stream data demodulation, two rows of pilot frequency symbols are equidistantly inserted in time domain correspondingly to each data stream in a pair of resource blocks; for eight-stream demodulation, one row of pilot frequency symbols are inserted in time domain while one pilot frequency symbol is inserted in every four sub-carrier-waves correspondingly to each data stream ina resource block, wherein, the pilot frequency and the data employ the same pre-coding mode; signals are sent to a receiver by an antenna; composite channel of resource particles, which is occupied by the pilot frequency, is estimated according to the inserted pilot frequency symbols when the signals are received by the receiver; the composite channel of resource particles, which is occupied by the data signals, is acquired by interpolation algorithm, thereby obtaining the data signals by demodulating. The special pilot frequency designed by the invention considers influence of factors, such as performance, spending and the like, thus having excellent compatibility with LTE Release 8.
Owner:BEIJING UNIV OF POSTS & TELECOMM

Method and system for configuring discontinuous reception (DRX) parameters in long term evolution system

The invention discloses a method and system for configuring discontinuous reception (DRX) parameters in a long term evolution system. The method comprises: a base station sending a configuration message of a DRX configuration parameter, wherein the configuration message comprises indexes of a group of DRX configuration parameters in a DRX configuration parameter set, the DRX configuration parameter set comprises at least one group of DRX configuration parameters, the indexes are corresponding to one group of DRX configuration parameters in the DRX configuration parameter seat, and the group of DRX configuration parameters comprise parameter values of multiple DRX configuration parameters; and a user terminal, in response to the configuration message, selecting the group of DRX configuration parameters corresponding to the indexes from a prestored DRX configuration parameter set, and executing DRX operation by use of the parameter values of the selected group of DRX configuration parameters. By using the technical scheme provided by the invention, the cost of occupied signalings after the base station carries out DRX parameter configuration on the user terminal is reduced, and the resource utilization rate is improved.
Owner:CHINA TELECOM CORP LTD

Negotiation control method based on SIP security policy grade in IMS network

A negotiation control method based on SIP security strategy level in an IMS network provides a negotiation control mechanism based on session initiation protocol (SIP) security strategy level in the IMS network of an IP multimedia subsystem. The method belongs to the field of network safety protection and access control technology, which is characterized in that two aspects are included: 1) According to IMS technical specification, different safety mechanisms are combined to select safety protection strategies from weak to strong, so as to provide a set of integral and unified IMS safety strategy combination for IMS and user equipment (UE) to carry out safety negotiation and strategy selection. 2) Through the newly defined SIP message domain and negotiation process, the method provides negotiation process and SIP message field format for terminals users and IMS operators, so as to allow the IMS operators and the terminal users to negotiate and determine the method of business safety strategy. Eventually, the operators can provide the safety strategies with different safety levels according to different business types and different user types, thus realizing personalized user service quality assurance, reducing resource costs brought by network safety, and realizing the optimal selection strategy for network safety protection and service quality assurance.
Owner:TSINGHUA UNIV

Method for detecting network video quality by network injury tolerance

The invention relates to a method of detecting the quality of a network video through network damage degree, wherein the method reflects the influence degree of network damage effecting the quality of the video according to specific frame sequence type, frame rate, packing condition, frame packet loss rate, namely a rate of a single-frame losing a qualified pockets which obtained according to the network video and corresponding impairment grade of the frame pocket loss rate, and obtains the quality of network video according to an original video quality Q0 and the relation of the influence degree of damaging network and the network video quality (Q); the original video quality and the network video quality are both adopt the same quantification evaluation criteria measurement. Compared with the prior art, the invention has the advantages of considering the different type of frame packet loss has different effect to the video quality and the condition of different impairment grade of the video quality which effects by the different number pocket of a frame losing, thereby the invention has the advantages of low cost of resource develop, good real-time performance, higher estimation accuracy and which can be especially applied for internet service providers or operation businesses to estimate the quality of real-time transmission video.
Owner:SHANGHAI BROADBAND TECH

Door opening and closing detection method based on monitoring videos

The invention discloses a door opening and closing detection method based on monitoring videos. A corresponding image frame when a detected room door is closed serves as a reference frame, a background model of the detected room door is obtained according to the reference frame, background subtraction is carried out on a room door area in a detected video frame through the background model to work out a foreground image, and the opening and closing state of the detected door is determined by extracting a feature straight line of the foreground image and then using the horizontal position of the feature straight line and a door crack in the background model. The door opening and closing detection method based on monitoring videos achieves the function of automatically detecting the opening and closing state of the room door through the simple combined technologies such as motion foreground detection and digital image processing, and is simple, low in resource expense and suitable for the application of an embedded type system like video monitoring. The whole room door area is directly detected, the opening and closing state is determined according to the door crack position, the inference generated when a person or an object shields the room door is effectively avoided, the detection accuracy is high, universality is high, no monitoring blind spot exits, and the safety coefficient of monitoring is improved.
Owner:HANGZHOU TOPZEN INFORMATION TECH

Non-handshake-type JTAG debugging link compatible to AHB protocol and debugging method thereof

The invention discloses a non-handshake-type JTAG debugging link compatible to an AHB protocol and a debugging method thereof. The link comprises a deserializing unit which is provided with an external JTAG standard interface on one side and an AHB standard host interface on the other side, and the deserializing unit utilizes a user-defined TAP controller instruction of an IEEE 1149.1 protocol toachieve seamless connection with the AHB protocol through an extension instruction; on the basis of mutual parsing of information, a high-speed serial debugging command sent by an upper computer is mapped onto communication channels of the interior of a chip, an access command is sent to the whole system of the chip to simulate the behaviors of a host, and then the key status information about system running is converted into serial data again and sent back to the upper computer. Compared with traditional debugging approaches, the method has the advantages of being higher in speed and better in stability, since the JTAG interface of standard DFT is repeatedly used, pin resources of the chip are saved, and by establishing a conversion channel between the standard JTAG interface and an on-chip AMBA bus, the method has high practical value and universality.
Owner:XIAN MICROELECTRONICS TECH INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products