Abstract:
A smart antenna is disclosed for generating nested beams. The antenna is configured to generate a cover beam and a center beam. The cover beam has a wide coverage area and the center beam, which is nested within the cover beam, has a narrow coverage area. Both the cover beam and the center beam may be independently steerable or steered jointly as if coupled together. The cover beam is preferably used for system-wide purposes, such as multicasting, broadcasting, paging, tracking, and physical measurements. The center beam is preferably used for exchanging data between a transmitter and receiver. However, the cover beam and the center beam may also be used for transmission of data and signaling traffic respectively.
Abstract:
A method and system for using watermarks in communication systems is disclosed. Watermarks are typically small amounts of auxiliary data embedded in a cover signal. The cover signal is the primary communication signal, and may be binary bits, multi valued symbols, analog waveforms, or any other type of primary communication signal. Security strength indication, location tracking, intrusion detection and transmission of non-security information using watermarks are disclosed, along with a system for managing watermarks.
Abstract:
The system and method of the present invention establishes a communication link between a user equipment (UE) and a base station in a communication system having a plurality of base stations which each transmit a common primary synchronization code (PSC) in a primary synchronization channel in conjunction with a base station specific secondary synchronization code (SSC) within a system frame, which receives with the UE an input signal including the PSC and SSC from at least one of the base stations. The UE analyzes the input signal to detect any received PSCs within a selected time period which has duration corresponding to the length of a system frame and determining a relative location of a strongest PSC within the selected time period. The input signal is then processed to remove the PSC from at least the determined PSC location. A secondary synchronization code (SSC) is then detected for the determined location from the processed signal. The communication link is then established using the detected SSCs.
Abstract:
A connection between a wireless transmit/receive unit (WTRU) and another node through a wireless network is established. The connection is used for communication. A user input is received. In response to the received user input, a communication through the connection is recoded while the WTRU still communicates the communication to a user of the WTRU. The recorded communication is retrieved and the recorded communication is communicated to the user at a later time.
Abstract:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
Abstract:
A method for adjusting the operating parameters of a wireless device for use in a wireless communication network begins by entering and storing situation settings. When a communication is received at the network for the wireless device, the presence of the wireless device is determined. The situation settings are applied based upon the presence of the wireless device. The wireless device is informed of the communication via the applied situation settings.
Abstract:
A technique for software ring tone detection is disclosed utilizing, in the preferred embodiment, a recursive algorithm. The technique provides flexibility in that a digital signal processor may be reprogrammed to detect ring tone frequencies and amplitudes present in numerous different countries.
Abstract:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
Abstract:
Systems, apparatuses and methods for bandwidth management, aggregation and internet protocol (“IP”) flow mobility (“IFOM”) across multiple-access technologies are provided. Included is a method that includes selecting, from a packet data network (“PDN”) connection formed through a plurality of access systems communicatively coupled with a wireless transmit and/or receive unit (“WTRU”), an access system over which to transport a flow of internet protocol (“IP”) traffic to and/or from the WTRU. The method may also include sending, to the WTRU, a request to associate the flow of IP traffic with the selected access system.
Abstract:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point-to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.