Abstract:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
Abstract:
An apparatus and method is provided for dynamic range power control of a wireless downlink communication signal (100), such that target signal quality adjustments are held temporarily (102) when it is apparent that transmit power control commands will not produce the desired response at the transmitting station. Comparisons of measured received signals to thresholds are performed to determine whether the transmitting station has either reached the maximum or minimum transmit power, in which case the target signal quality adjustment is controlled accordingly. When normal transmit power is detected (121), the target signal quality adjustments are allowed to resume as usual.
Abstract:
A method and system for assigning uplink (UL) slots (36-1 - 36-15) to optimize time division duplex (TDD) UL power. In order to assure proper power control gain, UL slots (36-1 - 36-15) are judiciously allocated close to the beacon slot. The UL slots (36-1 - 36-15) may be allocated based on channel sensing. All users are sorted in the order of reducing fading losses. Sorting information is also used to allocate the UL slots (36-1 - 36-15). The UL slots (36-1 - 36-15) may also be allocated based on signal interference information, code usage availability estimates and spread signal interference values. Alternatively, block error rate (BLER) and signal to interference ratio (SIR) measurements may be used to allocate the UL slots (36-1 - 36-15).
Abstract:
A method and apparatus for channel coding and rate matching of the Physical Uplink Control Channel (PUCCH) and the Physical Downlink Control Channel (PDCCH) is disclosed that uses convolutional encoding to code the control channels. Rate matching is performed using a circular buffer based rate matching algorithm. A rate matching module may contain a single interleaver or may alternatively comprise a plurality of sub-block interleavers. Interleaved coded bits may be stored in the circular buffer in an interlaced format, or output streams from separate sub-block interleavers may be stored contiguously. When a plurality of sub-block interleavers are used, different interleaving patterns may be used. Rate matching may use bit puncturing or repetition to match the rate of the available physical channel resource. Rate matched output bits may be interleaved using a channel interleaver.
Abstract:
A combined open loop and closed loop (channel quality indicator (CQI)-based) transmit power control (TPC) scheme with interference mitigation for a long term evolution (LTE) wireless transmit/receive unit (WTRU) is disclosed. The transmit power of the WTRU is derived based on a target signal-to-interference noise ratio (SINR) and a pathloss value. The pathloss value pertains to the downlink signal from a serving evolved Node-B (eNodeB) and includes shadowing. An interference and noise value of the serving eNodeB is included in the transmit power derivation, along with an offset constant value to adjust for downlink (DL) reference signal power and actual transmit power. A weighting factor is also used based on the availability of CQI feedback.
Abstract:
A method of signal processing in a wireless transmit receive unit (WTRU) including multiple input/multiple output (MIMO) functionality. The method includes the WTRU receiving a plurality of simultaneous signals, performing a first process on at least one of the plurality of simultaneous signals, transmitting a feedback signal based on the first process, and performing a second process on at least one of the plurality of simultaneous signals. The first process is a subset of the second process.
Abstract:
A method and apparatus for implementing hybrid automatic repeat request (H-ARQ) in a multiple-input multiple-output (MIMO) wireless communication system are disclosed. A transmitter transmits at least two data packets via two or more antennas. If at least one of the data packets is not successfully transmitted, the transmitter retransmits the data packets while rearranging the data packets in an orthogonal spreading manner. Alternatively, the transmitter may retransmit only the unsuccessfully transmitted data packet along with a new data packet which replaces a successfully transmitted data packet. The unsuccessfully transmitted data packet may simply be repeated without changing its format. When only the unsuccessfully transmitted data packet is retransmitted along with the new data packet, the transmissions may be combined to recover the retransmitted data packet and the new data packet simultaneously.
Abstract:
A method and apparatus for securing wireless communications are disclosed. A watermark message is encoded to watermark message symbols. A cover message is encoded to cover message symbols. The watermark message symbols are then overlaid onto the cover message symbols to generate a watermark-embedded cover message in a physical layer. The watermark message symbols have a substantially lower amplitude than the cover message symbols. Thus, the watermark message introduces small perturbation around the constellation points of the cover message symbols. The watermark message symbol may span or spread over a plurality of cover message symbols and may be encrypted with a secret key. The watermark message is used for improving receiver performance by transmitting additional information or for security enhancement purposes. The watermarking function may be selectively turned on and off.
Abstract:
A transceiver comprising a data processing module, a security processing module, a medium access control (MAC) module, a dirty-paper-coding (DPC) module, and a smart antenna processor. The data processing module provides user data streams to the MAC module and channel state information to the smart antenna processor. The security processing module generates security data and provides the security data to the MAC module. The security module also provides security policy data to the smart antenna processor. The MAC module determines data transmission rates for the user data streams and the security data. In addition, the MAC module allocates the data streams and security data to transmission channels for transmission. The DPC module encodes the security data onto the user data streams. The smart antenna processor generates pre-coding coefficients used by the DPC module and transmits the security encoded data streams.
Abstract:
A spread spectrum method and apparatus for protecting and authenticating wirelessly transmitted digital information using numerous techniques. The apparatus may be a wireless code division multiple access (CDMA) communication system, a base station, a wireless transmit/receive unit (WTRU), a transmitter, a receiver and/or an integrated circuit (IC). The wireless CDMA communication system includes a transmitter which steganographically embeds digital information in a CDMA communication signal and wirelessly transmits the CDMA communication signal. The system further includes a receiver which receives the CDMA communication signal and extracts the steganographically embedded digital information from the received CDMA communication signal.