Abstract:
Various embodiments provide a method and apparatus for determining non-line of sight (NLOS) bias estimation based on estimated NLOS bias distributions at a number of anchors and the time of arrival (ToA) of a number of tag messages received at the anchors. In particular, using anchor redundancy, tag locations corresponding to the tag messages are estimated based on the NLOS bias distributions and the ToA and then the tag locations are used to update the NLOS bias distributions. The process of determining tag locations and updating the NLOS bias distributions is repeated until the NLOS bias distributions converge.
Abstract:
Various embodiments provide a method and apparatus for determining tag location by using one or more estimated channel responses (CR) that characterize the wireless channel between the tag and one or more respective anchors. In particular, a tracking server in communication with the anchor(s) determines the tag's location based on a comparison of the estimated CR(s) with a set of stored CRs associated with the anchor(s).
Abstract:
A method of enabling a plurality of user equipments (UEs) to transmit on random access channel (RACH). The method including transmitting, by an access point (AP), beacons to activate sets of UEs of the plurality of UEs based on a protocol, each of the sets of UEs containing UEs that are spatially co-located and each beacon associated with a different one of the sets of UEs.
Abstract:
Various embodiments provide a method and apparatus for determining tag location by using one or more estimated channel responses (CR) that characterize the wireless channel between the tag and one or more respective anchors. In particular, a tracking server in communication with the anchor(s) determines the tag's location based on a comparison of the estimated CR(s) with a set of stored CRs associated with the anchor(s).
Abstract:
A capability for secure communication of data from a source device to a destination device is presented. The source device has a device identifier associated therewith. The source device stores an encrypted version of the device identifier that is encrypted based on a master key of the destination device. The source device stores an encryption key. The source device communicates data to the destination device in a secure manner by encrypting the data using the encryption key and propagating the encrypted version of the device identifier and the encrypted data to the destination device. The destination device recovers the data sent by the source device by decrypting the encrypted version of the device identifier based on the master key to determine the device identifier, determining a decryption key based on the device identifier, and decrypting the encrypted data based on the decryption key to recover the data sent by the source device.