会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 62. 发明申请
    • Method and apparatus for a high-capacity cellular network by improved sectorization and interleaved channel assignment
    • 通过改进的扇区化和交织的信道分配,高容量蜂窝网络的方法和装置
    • US20020019233A1
    • 2002-02-14
    • US09948816
    • 2001-09-10
    • AT&T Corp., New York, New York
    • Kin K. LeungLi-Chun Wang
    • H04Q007/20
    • H04W16/12H04W16/02H04W16/24H04W28/16
    • A method and apparatus for a high-capacity cellular network by improved sectorization and interleaved channel assignment is presented. Data transmission over a cellular network is carried out by implementation of a sectorization scheme, called the Narrow-Beam Quad-sector Cell (NBQC) sectorization scheme, and the corresponding Interleaved Channel Assignments (ICA). The NBQC sectorization scheme calls for each cell of a cellular network to be divided into four sectors, with each sector covered by a 60 degree antenna. Use of the NBQC sectorization scheme allows for implementation of the corresponding ICA, in which assignment of transmission channels to each cell is based on a re-use factor of Nnull2. Accordingly, the interleaved channel assignments allow for the use of the transmission channels in cells which are adjacent in the cellular network.
    • 提出了一种通过改进的扇区化和交织的信道分配来实现高容量蜂窝网络的方法和装置。 通过实现称为窄波束四分区小区(NBQC)扇区化方案和相应的交织信道分配(ICA)的扇区化方案来实现蜂窝网络上的数据传输。 NBQC扇区化方案要求将蜂窝网络的每个小区划分为四个扇区,每个扇区由60度天线覆盖。 使用NBQC扇区化方案允许实现相应的ICA,其中对每个小区的传输信道的分配基于N = 2的重用因子。 因此,交织的信道分配允许在蜂窝网络中相邻的小区中使用传输信道。
    • 63. 发明授权
    • Z-coder: a fast adaptive binary arithmetic coder
    • US6281817B2
    • 2001-08-28
    • US79539501
    • 2001-02-28
    • AT & T CORP
    • BENGIO YOSHUABOTTOU LEONHOWARD PAUL G
    • H03M7/40H03M9/00H03M7/34
    • H03M7/4006
    • A binary arithmetic coder and decoder provides improved coding accuracy due to improved probability estimation and adaptation. They also provide improved decoding speed through a "fast path" design wherein decoding of a most probable symbol requires few computational steps. Coded data represents data that is populated by more probable symbols ("MPS") and less probable symbols ("LPS"). In an embodiment, a decoder receives a segment of the coded data as a binary fraction C. It defines a coding interval of possible values of C, the interval extending from a variable lower bound A to a constant upper bound 1. For each position in the decoded symbol string, the decoder computes a test value Z that subdivides the coding interval into sub-intervals according to the relative probabilities that an MPS or an LPS occurs in the position. A first sub-interval extends from the lower bound A to the test value Z; the second sub-interval extending from the test value Z to 1. If C is greater than Z, the decoder emits an MPS for the current position in the decoded symbol string and sets the lower bound A to the test variable Z for use during decoding of the next position in the decoded symbol string. If C is less than Z, the decoder emits an LPS and computes a new lower bound A and a new binary fraction C for use during decoding of the next position in the decoded symbol string. The encoder operates according to analogous techniques to compose coded data from original data.
    • 68. 发明申请
    • NETWORK SECURITY DEVICE AND METHOD
    • 网络安全设备和方法
    • US20130125207A1
    • 2013-05-16
    • US13711424
    • 2012-12-11
    • AT&T Corp.
    • Sandra Lynn CarricoPhilippe Hebrais
    • H04L29/06
    • H04L63/08H04L63/0272H04L63/04H04L63/164
    • The invention describes a method for hardening a security mechanism against physical intrusion and substitution attacks. A user establishes a connection between a network peripheral device and a network via a security mechanism. The security mechanism includes read only memory (ROM) that contains code that initiates operation of the mechanism and performs authentication functions. A persistent memory contains configuration information. A volatile memory stores user and device identification information that remains valid only for a given session and is erased thereafter to prevent a future security breach. A tamper-evident enclosure surrounds the memory elements, which if breached, becomes readily apparent to the user.
    • 本发明描述了一种用于硬化安全机制以抵御物理入侵和替代攻击的方法。 用户通过安全机制建立网络外围设备与网络之间的连接。 安全机制包括只读存储器(ROM),其包含启动机制的操作并执行认证功能的代码。 持久性内存包含配置信息。 易失性存储器存储用户和设备识别信息,其仅在给定会话中保持有效,并且之后被擦除以防止将来的安全漏洞。 一个防拆封装围绕着存储器元件,如果被破坏的话,对于用户来说变得容易显现。