Abstract:
A method and apparatus for entering a net within a group communication network provides for requesting a current list of available nets that the communication device may join from a controller and, after receiving the current list of available nets from the controller, selecting a net from the current list of available nets. The method and apparatus further allows the communication device to send a request to the controller for joining the selected net, which may be followed by receiving a response from the controller that the communication device has been added to the list of current participants in the selected net. In another aspect of the invention, a method and apparatus for exiting a net within a group communication network provides for sending a request to the controller for exiting the net, receiving a response from the controller that the communication device has been removed from the list of current participants in the net, and exiting the net.
Abstract:
A method for processing digitized speech signals by analyzing redundant features to provide more robust voice recognition. A primary transformation is applied to a source speech signal to extract primary features therefrom. Each of at least one secondary transformation is applied to the source speech signal or extracted primary features to yield at least one set of secondary features statistically dependant on the primary features. At least one predetermined function is then applied to combine the primary features with the secondary features. A recognition answer is generated by pattern matching this combination against predetermined voice recognition templates.
Abstract:
A method of authenticating anonymous users while reducing potential for “middleman” fraud includes the step of constructing a puzzle in response to information received from a software user. The puzzle includes the received information. The puzzle is sent to the user by a software provider. The user solves the puzzle and returns the solution to the provider. The puzzle includes a portion of a value derived from an encrypted “cookie” and an exponentiation of the derived value. The cookie includes information about the user.
Abstract:
An apparatus and method of serializing frequency based image data in a digital cinema system is described. At least one group of data that may be represented as a 16×16 block of data is compiled. Alternatively, a frame of data is compiled. The group of data is divided into four groups, each which may be represented as an 8×8 blocks. Each of the four 8×8 blocks of data are serialized using zig-zag scanning vertical scanning, and/or horizontal scanning.
Abstract:
The invention is a method and apparatus for providing an Alert With Information Message signal between a mobile switching center and a base station in a cellular communication system. The invention recognizes that current provisions of the IS-634 standard lack support for certain required functionality on the interface between a mobile switching center and a base station, or the A-Interface. An Alert With Information Message signal is introduced on the A-Interface to support the required functionality. Introduction of the Alert With Information Message provides support for reliable call processing on the A-Interface for the call waiting procedure, the hard handoff procedure, and the resolution of a glare condition.
Abstract:
In a communications system, a method of transforming a set of message signals representing a message comprising the steps of first encoding one of the set of message signals in accordance with a first keyed transformation, a second encoding of the one of the set of message signals in accordance with at least one additional keyed transformation, a third encoding of the one of the set of message signals in accordance with a self inverting transformation in which at least one of the set of message signals is altered, a fourth encoding of the one of the set of message signals in accordance with at least one additional inverse keyed transformation wherein each of the at least one additional inverse keyed transformation is a corresponding inverse of at least one additional keyed transformation, and fifth encoding the one of the set of message signals in accordance with first inverse keyed transformation wherein the first inverse keyed transformation is the inverse of the first keyed transformation.
Abstract:
A receive filter receives signals from a communication channel. The received signals correspond to original Walsh covered chip sequences transmitted by a transmit filter through the communication channel to the receive filter. The received signals are processed by an equalizer to generate a soft estimate of chip sequences corresponding to the original Walsh covered chip sequences. An N chip Walsh decover is then utilized to generate a soft estimate of code symbols corresponding to the soft estimate of the chip sequences. A number of symbol slicers are then used in parallel to produce a hard estimate of the code symbols corresponding to the soft estimate of code symbols generated by the N chip Walsh decover. Thereafter an N chip Walsh cover is used as part of a scheme to generate a hard estimate of chip sequences corresponding to the hard estimate of the code symbols generated by the symbol slicers. The hard estimate of the chip sequences generated with the aid of the N chip Walsh cover, and the soft estimate of the chip sequences generated by the equalizer, are used to generate a tracking mode error signal to adapt the response of the equalizer to the received signals.
Abstract:
A method and apparatus for minimizing the amount of time that a mobile station is to be out of communication with an nulloriginationnull base station while searching for a suitable system to which to perform a mobile station assisted hard handoff. After being directed to search for pilot signals in an alternate frequency band, the mobile station tunes to that alternate frequency and samples the incoming data, storing those samples in memory. When a sufficient number of samples have been stored, the mobile station retunes to the origination frequency. The forward link data is again received by the mobile station, and reverse link data can be successfully transmitted to the origination base station. After retuning to the origination frequency, a searcher in the mobile station will subsequently be employed to search for pilot signal offsets utilizing the stored data collected from the alternate frequency.
Abstract:
A method and apparatus for reducing transmission delay in a wireless communication system that carries packetized voice and data information. Interruptions in the traffic channels cause loss of synchronization between a header compressor and a header decompressor. Rather than transmitting resynchronization information on the traffic channel, the information dropped by an interruption is re-transmitted on a non-traffic channel in parallel with the traffic channel. At the remote station, information from the traffic channel and the non-traffic channel is reassembled before input into the decompressor. Alternatively, the non-traffic channel can be used to carry overflow information so that a higher average data rate can be achieved than the average data rate of the traffic channel alone.
Abstract:
A wireless telephone (302) digitizes the voice of the user in response to the depression of a push-to-talk button (110), either physical or virtual. It sends the digitized voice, in data mode, to a base station (308). The base station places the data, through the Internet, or an Intranet or Extranet, on a server (312). Other wireless phones (304)-(306) recover the data from the server through the same (308) or different (310) base station, through the Internet, Intranet, or Extranet, and convert the data back to digitized voice. The base stations transmit the digitized voice to other wireless telephones (306), which convert them back to voice in response to the recognition of voice frames on the data channel by the CODEC manager software. Networked computers (314) may be configured to emulate a combined base station and wireless telephone. The server can dynamically designate any wireless telephone (or landline emulation) as the broadcaster, and can dynamically configure any set of telephones/emulations as the receivers of the broadcast.