Abstract:
A receiver (fig.2) comprises a plurality of antenna elements (210) for receiving a data signal. Each antenna element (210) has a plurality of Rake fingers (200). Each Rake finger (200) processes a received multipath component of the received data signal of its antenna element (210) by applying a complex weight gain to that received multipath component. A complex weight gain generator (205) determines the complex weight gain for each Rake finger (200) for each antenna element (210) using an input from all the Rake fingers (200). A summer (225) combines an output of each Rake finger (200) to produce an estimate of the data signal.
Abstract:
A receiver which suppresses inter-cluster multipath interference by processing an impulse channel response consisting of two multipath clusters, each cluster having groups of signals with multiple delays. In one embodiment, the receiver includes a single antenna and parallel-connected delay units used to align the groups of signals before being input into respective sliding window equalizers. The outputs of the equalizers are combined at chip level via a combiner which provides a single output. In another embodiment, a Cluster Multipath Interference Suppression (CMIS) circuit is incorporated into the receiver. The CMIS circuit includes a hard decision unit and a plurality of signal regeneration units to generate replicas of the multipath clusters. The replicas are subtracted from the respective outputs of the delay units and the results are input to the respective sliding window equalizers. In another embodiment, multiple antennas are used to receive and process the clusters.
Abstract:
A channel estimation method which reduces the strain on resources of a RAKE receiver using a complex weight gain (CWG) algorithm. In one embodiment, a non-adaptive algorithm is used to average blocks of pilot symbols from several slots (320). In another embodiment, an adaptive algorithm implements sliding window averaging or a recursive filter. Using a CWG algorithm (325) reduces the memory and processor requirements of the RAKE receiver.
Abstract:
A first detector receives a received signal and extracts the data signals from the received signal. A hard decision converter converts soft symbols outputted by the first detector into hard symbols. An interference canceller extracts the voice signals from the received signal. A second detector is connected to the output of the interference canceller, and extracts the individual voice signals. The second detector is a different detector type than the first detector.
Abstract:
A method and apparatus is used for generating a perfectly random secret key between two or more transceivers in a wireless communication network. In a point- to-point system, both transceivers produce an estimate of the channel impulse response (CIR) based on the received radio signal. The CIR estimation is synchronized and may include error correction and detection. A long secret key of bits is generated from a digitized version of the CIR estimate, from which a perfectly secret encryption key is derived by privacy amplification.
Abstract:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
Abstract:
A method and apparatus for uplink transmission over a non-contentious shared feedback channel are disclosed, wherein the parameters of the uplink transmission are determined by the parameters of a downlink transmission. A new uplink channel, called a physical shared uplink feedback channel (PSUFCH) is used for uplink transmission such as feedback information in response to a downlink transmission on a fast shared data channel. The content of the feedback information may be general, e.g. an ACK/NACK or a channel quality indicator (CQI). The PSUFCH is transmitted using power ramping that terminates upon reception of a downlink ACK (DLACK) from a Node-B. No ambiguity resolution is required due to the non-contentious and deterministic mapping of the uplink channel resources.
Abstract:
The disclosed method and apparatus for allocating resources comprise scheduling a requesting wireless transmit receive unit (WTRU) for transmission using non-persistent scheduling.
Abstract:
When a wireless transmit receive unit (WTRU) is using a reduced dedicated physical control channel (DPCCH) frame, the WTRU may periodically send a normal DPCCH frame. The WTRU may periodically increase the transmit power or send a normal DPCCH frame if there is a transmit power control (TPC) error or a downlink quality is below a threshold. When the WTRU implements DPCCH transmission gating, the WTRU may set a gating period based on the number of received TPC commands. The WTRU or Node-B may restore to a normal mode, if the link quality is below a threshold. The WTRU may periodically increase a transmit power. When a reduced signal-to-interference ratio (SIR) target is used for TPC, the WTRU may increase a transmit power, if the downlink power is not responsive. The WTRU or the Node-B may restore a normal SIR target if the link quality is below a threshold.
Abstract:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit 310, a data processing unit 320, a cross-layer watermarking unit 330, and optionally a smart antenna processor 340. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token]key into the user data transmission on at least one of the layers selectively in accordance with a security policy.