Abstract:
A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.
Abstract:
A method and apparatus for wireless communication of multimedia broadcast multicast services (MBMS) data and unicast data using separate downlink carriers and are disclosed. A wireless transmit/receive unit (WTRU) having a single receiver that is switchable to receive either carrier is provided. A network station, such as a Node-B, preferably encodes K MBMS data packets to N MBMS encoded packets using erasure correction coding where N is preferably significantly greater than ( K + v ) which is a determined number of MBMS encoded packets sufficient to recover the K MBMS data packets. The Node-B preferably generates a superframe for carrying the N MBMS encoded packets for each MBMS and transmits the superframe via an MBMS carrier. The Node-B preferably schedules a unicast transmission such that the WTRU is provided with sufficient time to switch to the MBMS carrier to receive at least ( K + v ) MBMS encoded packets per superframe.
Abstract:
In a wireless communication system including at least one wireless transmit/receive unit (WTRU) and at least one Node-B (NB), an activation or deactivation state is determined for each of a plurality of HARQ processes. A signal that includes the activation or deactivation state for each of the HARQ processes is transmitted to the WTRU. In response to receiving the signal, the WTRU activates or deactivates a particular HARQ process in accordance with the activation or deactivation state for each of the HARQ processes contained in the received signal.
Abstract:
A method and apparatus for controlling transmission of a channel quality indicator (CQI) in a wireless communication system are disclosed. A wireless transmit/receive unit (WTRU) determines, at each transmission time interval (TTI), whether a CQI timer has expired. The CQI timer is reset each time a CQI is sent out by the WTRU. If the CQI timer has expired, the WTRU determines whether a CQI reporting opportunity exists in a current TTI. The WTRU sends a CQI if a CQI reporting opportunity exists in the current TTI. Otherwise, the WTRU waits for a next TTI. The CQI reporting opportunity exists when there is uplink data to be transmitted in the current TTI, when the WTRU needs to send a positive acknowledgement (ACK) or a negative acknowledgement (NACK) in the current TTI, or when a dedicated physical control channel (DPCCH) burst is scheduled to be transmitted in the current TTI.
Abstract:
The present invention is related to a method and apparatus for enhancing security of communications. The apparatus comprises a security processing unit, a data processing unit, a cross-layer watermarking unit, and optionally a smart antenna processor. The security processing unit generates a token/key to be used in watermarking and sends a node security policy to other components. The data processing unit generates user data. The cross-layer watermarking unit includes at least one of Layer-2/3, Layer-1 and Layer-0. Each layer performs a different scheme or degree of watermarking. The cross-layer watermarking unit embeds the token/key into the user data transmission on at least one of the layers selectively in accordance with a security policy.
Abstract:
Tokens/keys are produced for wireless communications. These tokens/keys are used for watermarks, signature insertion, encryption and other uses. In one embodiment, contextual information is used to generate tokens/keys. The tokens/keys may be derived directly from the contextual information. The contextual information may be used in conjunction with other information to derive the tokens/keys. Tokens/keys may be exchanged between transmit/receive units. The exchange of these tokens/keys may be encrypted.
Abstract:
Received signal characteristics of multiple concurrently received channels are determined using an analytical approach for computation in lieu of the measurement based approach of the prior art. A receiving wireless transmit receive unit (WTRU) and method are provided for processing concurrent communication signals from a plurality of transmitting WTRUs that concurrently transmit successive data blocks in a plurality of K forward channels. The receiving WTRU preferably has a receiver configured to receive successive data blocks of K concurrent transmissions transmitted from the transmitting WTRUs on the respective K forward channels. A processor is configured to compute individual channel characteristics for each forward channel k based on the characteristics of data signals received on all K forward channel. The processor is preferably configured to successively compute instantaneous Signal to Interference Ratio values for each forward channel j (iSIRj), for integers j = 1 to K, based on a cross correlation matrix of channel response characteristics of K concurrently received data blocks and to selectively compute an average value that is used for the computing the individual channel characteristics for the forward channel k. The individual channel characteristics are advantageously used for power control or for the processing of the data blocks received on the respective forward channels.
Abstract:
A plurality of communication signals is received. Each communication signal has an associated code. At least two of the communication signals has a different spreading factor. The associated codes have a scrambling code period. A total system response matrix has blocks. Each block has one dimension of a length M and another dimension of a length based on in part M and the spreading factor of each communication. M is based on the scrambling code period. Data of the received plurality of communication signals is received using the constructed system response matrix.
Abstract:
A plurality of communication signals have differing spreading codes. Each communication has an associated code comprising chips. For each chip of each communication, a vector of that chip convolved with an impulse response is produced. For each communication, support blocks comprising the chip vectors are produced (302). A number of the chip vectors in a support block is based on that communication's spreading factor. A system response matrix is assembled. The system response matrix is assembled (306). The system response matrix has symbol sub-matrices (304). Each symbol sub-matrix comprises a support block from each communication. Data of the communications is detected using the symbol response matrix.
Abstract:
A Node-B/base station receiver comprises at least one antenna for receiving signals (2811-28MN). Each finger of a pool of reconfigurable Rake fingers (320-323) recovers a multipath component of a user and is assigned a code of the user, a code phase of the multipath component and an antenna of the at least one antenna. An antenna/Rake finger pool interface (30) provides each finger of the Rake pool an output of the antenna assigned to that Rake finger. A combiner combines the recovered multipath components for a user to produce data of the user.