CLOUD-CENTRIC DESIGN FOR ULTRA-WIDEBAND (UWB) INFRASTRUCTURE-BASED POSITIONING

    公开(公告)号:US20250056627A1

    公开(公告)日:2025-02-13

    申请号:US18717743

    申请日:2023-02-28

    Abstract: In some implementations, an ultra-wideband (UWB) management server may send a first message to a UWB anchor, wherein: the first message is indicative of a first threshold to use in a UWB positioning session, the first threshold specifying at least one trigger condition for making available one or more reserved time slots in a Contention Access Period (CAP) of the UWB positioning session. The UWB management server may determine a second threshold for identifying a UWB responder having a respective reserved time slot in the CAP. The UWB management server may send a second message to the UWB anchor, wherein the second message causes the UWB anchor to either: (i) move the respective reserved time slot in the CAP for the UWB responder to a respective one or more time slots in a Contention Free Period (CFP), or (ii) terminate the UWB positioning session with the UWB responder.

    TIME DIFFERENCE OF ARRIVAL ENHANCEMENTS FOR ULTRA-WIDEBAND

    公开(公告)号:US20250039638A1

    公开(公告)日:2025-01-30

    申请号:US18716388

    申请日:2023-02-10

    Abstract: Aspects presented herein may improve the efficiency and accuracy of ranging operations, such as ranging operations based on ultra-wideband or sidelink. In one aspect, a first wireless device receives a response message from at least one second wireless device, the response message including a clock accuracy value of the at least one second wireless device, a location confidence value of the at least one second wireless device, or a combination thereof. The first wireless device establishes a ranging session with the at least one second wireless device based on the clock accuracy value of the at least one second wireless device exceeding a clock accuracy threshold, or the location confidence value of the at least one second wireless device exceeding a location confidence threshold, or both.

    GROUPING OF ANTENNAS FOR POSITIONING OF A USER EQUIPMENT

    公开(公告)号:US20250012888A1

    公开(公告)日:2025-01-09

    申请号:US18705391

    申请日:2022-11-23

    Abstract: Various methods and apparatus for supporting positioning of a user equipment (UE) in a wireless network are disclosed. In some embodiments, a wireless network node may be configured to define one or more groups of antennas associated with a wireless network node, each of the one or more groups of antennas grouped according to at least a phase-based parameter correlated with an electromagnetic characteristic of a plurality of antennas; send, to a network entity, data identifying the defined one or more groups of antennas; receive configuration data from the network entity, the configuration data identifying at least one of the one or more groups of antennas; and based on the configuration data, send or receive reference signals with the wireless network node using the identified at least one of the one or more groups of antennas, the reference signals configured to be used in the positioning of the UE.

    SECURITY VULNERABILITY DETECTION AND PREVENTION FOR WIRELESS POSITIONING

    公开(公告)号:US20250133548A1

    公开(公告)日:2025-04-24

    申请号:US18492711

    申请日:2023-10-23

    Inventor: Varun Amar REDDY

    Abstract: A first user equipment (UE) may transmit a first ranging message. A second UE may receive the first ranging message. The second UE may calculate a carrier frequency offset (CFO) based on the ranging message. The second UE may transmit a response message comprising control information to modify a transmission protocol. The transmission of the response message may be in response to the calculated CFO being greater than or equal to a threshold value. The calculated CFO may indicate a possible security vulnerability between the first UE and the second UE. The first UE may receive the response message including control information to modify the transmission protocol after the transmission of the first ranging message. The first UE may then transmit a second ranging message based on the control information. The second ranging message may prevent, or mitigate, the detected possible security vulnerability.

Patent Agency Ranking