摘要:
An improved method for repeating TDM/TDMA frames in a trunked wide area network environment is disclosed that repeats a user's inbound information during the same time slot the user is assigned for transmit, yet minimizes the added bulk audio delay. According to the invention, the last portion of the inbound information received in a previously-received time slot is combined with all but the end of the currently-received slot for repeating during the currently-received time slot. The information received at the end of the current time slot is stored for repeating during the next assigned inbound time slot period. This method provides a timing technique that allows for wide area networking of TDM trunking systems, yet without incurring excess added bulk audio delay and maintaining all the features of TDM. A typical repeater embodying this method is also described.
摘要:
A method is disclosed and apparatus is described whereby plain text is modified before it is input to a binary key generator (encryptor). According to the invention, a plain text bit may be modified by a current modifying bit, which in turn, is based on a prior modifying bit, a prior plain text bit, and a prior ciphered text bit. The only data path provided to the transmitter is the encrypted key generator cipher text output. As a result, the only feed-forward path of the plain text to the channel is through the key generator, and thus the fault-immune physical barrier between the plain text and the cipher information inherent with the key generator is maintained. The invention provides a way of utilizing conventional binary key generators to digitally encrypt for radio transmission multilevel sub-band coded speech.
摘要:
A presence attribute information server and manager application, and corresponding method is provided for managing access to presence attribute information. In addition to the presence attribute information entries, access authorization entries associated with at least some of the presence attribute information entries are provided which define conditions in which access to the presence attribute information is authorized. Generally, the defined conditions can include temporal and/or spatial requirements associated with either the user requesting the presence attribute information or the person/item associated with the presence attribute information, for purposes of establishing authorization to access the presence attribute information.
摘要:
A method of operation of a cognitive radio in a hierarchical group of cognitive radios, the hierarchy of cognitive radios including at least one master cognitive radio that has a higher position in the hierarchy than another of the cognitive radios in the group, consistent with the present invention, involves establishing a first operational policy for the group of cognitive radios; determining that the operational policy is unsuitable for use by at least one member of the group; and the master cognitive radio dictating a change in the operational policy used by the group to a second operational policy for use by the group.
摘要:
Techniques are provided for allowing a node (300) in an ad hoc network to deterministically decide whether to relay broadcast information to another node in the ad hoc network. The node (300) receives broadcast information and measures received signal strength (RSS) of the broadcast information. The node (300) may determine if the measured RSS is below a low threshold, and if so, can relay the broadcast information to neighbor nodes. Otherwise, the node (300) can also determine if the measured RSS is above a high threshold, and if not, wait for a waiting period before relaying the broadcast information to the neighbor nodes. The node (300) may dynamically adjust the low threshold by decreasing the low threshold as the number of neighbor nodes increases and may dynamically adjust the high threshold by increasing the high threshold as the number of neighbor nodes decreases.
摘要:
A radiotelephone method includes detecting other mobile stations and identifying possible relay candidates among the other mobile stations. The method then includes communicating information about the candidates to a base station. Communication with a second mobile station is requested of the base station at a first mobile station. If the first mobile station and the second mobile station are physically close, the base station instructs the first mobile station and the second mobile station to establish direct communication.
摘要:
A method is provided that comprises detecting, by a first user terminal of a wireless system, a second user terminal having wireless system information. The wireless system information has timely wireless system parameters. The timely wireless system parameters are collected from the second user terminal. The first user terminal communicates with a base station based on the wireless system parameters.
摘要:
A method of operation of a cognitive radio in a hierarchical group of cognitive radios, the hierarchy of cognitive radios including at least one master cognitive radio that has a higher position in the hierarchy than another of the cognitive radios in the group, consistent with the present invention, involves establishing a first operational policy for the group of cognitive radios; determining that the operational policy is unsuitable for use by at least one member of the group; and the master cognitive radio dictating a change in the operational policy used by the group to a second operational policy for use by the group.
摘要:
A wireless mobile device (104) provides challenge/response based authentication by receiving a first portion of a challenge (132) from an external authentication unit (102), such as a network unit, and utilizes an internal partial challenge generator (114) that internally provides a second portion of the challenge (138) and provides the internally generated second portion of the challenge (138) back to the authentication unit (102). The wireless mobile device (104) also includes combiner logic (116) that combines the externally received first portion of the challenge (132) with the internally produced second portion of the challenge (138) to produce a complete challenge (144). The wireless mobile device (104) then utilizes a response generators (118) that takes the complete challenge (144) that was produced and generates a response (146) based on the complete challenge (144), and other secret information (110) if desired using a suitable cryptographic operation. The response (146) is sent back to the authentication unit (102) for verification.
摘要:
A wireless handheld communication device (102) for reducing a communication delay at a proximate wireless communication device is disclosed. The wireless handheld communication device simultaneously transmits to a remote station (106) through a base station (108), and transmits to the proximate wireless communication device (104) directly. The method includes communicating a first communication on first link (116) to a proximate wireless communication device and communicating, simultaneously with communicating the first communication, a second communication on a second link (112) to a base station, wherein the first communication and the second communication are substantially the same.