Abstract:
A wireless communication system includes a base station that receives information regarding neighboring wireless systems and updates and stores this information for use in handover of user equipments (UEs).
Abstract:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy.
Abstract:
An electronic device receives user inputs. The user inputs indicating interactions of the user with processing of the electronic device. The device determines interaction patterns of the user with the device. The device uses the determined interaction patterns to determine adjustments for the electronic device. The electronic device is adjusted using the determined adjustments.
Abstract:
A technique for utilization of call processing resources in a call processing system is disclosed wherein echo characteristics of a telephone line ascertained and utilized by a echo canceler, and are also stored for subsequent use by a different echo canceler which processes a call on that same telephone line. The technique may also be used with call processing resources other than echo cancelers.
Abstract:
Classes of cognition models which may include: 1) Radio Environment models, 2) Mobility models and 3) Application/User Context models are utilized in a wireless communications network. Radio Environment models represent the physical aspects of the radio environment, such as shadowing losses, multi-path propagation, interference and noise levels, etc. Mobility models represent users motion, in terms of geo-coordinates and/or logical identifiers, such as street names etc. as well as speed of user terminal etc. The context model represents the present state and dynamics of each of these application processes within itself and between multiple application processes. These data are employed to optimize network performance.
Abstract:
The present invention relates to hierarchical modulation (HM) and demodulation for global system for mobile communications (GSM)/enhanced data rates for GSM evolution (EDGE) radio access network (GERAN) evolution. In one embodiment, HM symbols are generated by generating primary modulated symbols based on a first bit group, generating secondary modulated symbols based on a second bit group, and combining the primary modulated symbols and the secondary modulated symbols. In another embodiment, the HM symbols are demodulated. In yet another embodiment, a received GERAN signal is converted to baseband complex symbol values, which are processed to produce training symbols and data symbols that carry pilot symbols. Channel parameters of the radio channel are estimated based on the training symbols. An equalized signal is generated based on the estimated channel parameters and data symbol. Primary and secondary demodulated symbols are generated based on the equalized signal.
Abstract:
In a communication system comprising a plurality of transmit/receive units (TRUs), a method for embedding a watermark into data includes modifying a carrier signal containing data to embed watermark information. The modified carrier signal is transmitted. A receiver receives the modified carrier signal and extracts the watermark information from the modified carrier signal.
Abstract:
A method and system for securing wireless communications is disclosed. In one embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation constellation are split into clusters of proximate secondary modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
Abstract:
A smart antenna is disclosed for generating nested beams. The antenna is configured to generate a cover beam and a center beam. The cover beam has a wide coverage area and the center beam, which is nested within the cover beam, has a narrow coverage area. Both the cover beam and the center beam may be independently steerable or steered jointly as if coupled together. The cover beam is preferably used for system-wide purposes, such as multicasting, broadcasting, paging, tracking, and physical measurements. The center beam is preferably used for exchanging data between a transmitter and receiver. However, the cover beam and the center beam may also be used for transmission of data and signaling traffic respectively.
Abstract:
A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.