Abstract:
Data rate determination is provided in a system where the available power fraction and available Walsh codes in each active leg are dynamically changing over time. This method adapts the rate (modulation and coding) based on the combined resource (power & code space) levels seen at each cell. The method results in maximization of the rate supportable by each cell given their resource constrained situation while meeting the constraints of target packet or frame error rate and orthogonality. Furthermore, improved fast cell selection by the mobile results due to this approach that is based on knowledge of combined resource (power & code space) levels across the cells in the active set.
Abstract:
The capacity of a reverse link is improved by realizing a scheme to effect sharp changes in pilot channel transmit power (PCTP) and data channel to pilot power ratio (DCPR), coordinated with the start of the data channel transmission. The change in pilot power and data channel to pilot power ratio is also applicable to mobiles that use multiple pilots and/or multiple antennas at the transmitter and/or receiver.
Abstract:
Efficient data communication in wireless communication system is provided by using centralized control of data communications, such as packet switched services, over the uplink channel (mobile station (MS) to base station (BS)). A multiple access protocol is used where packet data mobile stations make requests for uplink channel resources. The request messages transmitted by the MSs inform the BS of service parameters. Examples of such service parameters are available transmit power at the MS, the amount of data to transmit and Quality of Service (QoS). The BS then processes the received request messages and performs interference management calculations to determine the portion of the BS's receive power budget that can be allocated to the data user requesting service. These calculations are used to control the amount of interference seen at the base station, to assign a data rate to the user and to aid scheduling algorithms in computing service order priorities. Any scheduling algorithm may be used; for example, scheduling may be based on the amount of data to be transmitted, the age of the data or the service priority associated with the mobile station. The interference control is used to prevent the occurrence of catastrophic levels of interference while maximizing the utilization of resources on the uplink.
Abstract:
Disclosed is a method of integrating voice and data services onto a same frequency channel using available transmit power information to determine data rates, wherein the available transmit power information indicates an amount of transmit power available for future data transmissions over one or more data channels. In a "distributed" embodiment, a transmitter or base station transmits, via a forward link, an available power message to a receiver or mobile-telephone indicating an amount of available transmit power at some future time t+z. The mobile-telephone performs signal-to-interference measurements corresponding to the received forward link and received interference, and uses such signal-to-interference measurements and the available power message to determine a data rate that can be supported by the mobile-telephone. Preferably, the determined data rate corresponds to a maximum data rate at which a minimum level of quality of service can be achieved at the mobile-telephone. In a "centralized" embodiment, the mobile-telephone transmits the signal-to-interference measurements to the base station, and the base station determines the data rate based on the available transmit power at future time t+z.
Abstract:
Disclosed is a method of integrating voice and data services onto a same frequency channel using available transmit power information to determine data rates, wherein the available transmit power information indicates an amount of transmit power available for future data transmissions over one or more data channels. In a "distributed" embodiment, a transmitter or base station transmits, via a forward link, an available power message to a receiver or mobile-telephone indicating an amount of available transmit power at some future time t+z. The mobile-telephone performs signal-to-interference measurements corresponding to the received forward link and received interference, and uses such signal-to-interference measurements and the available power message to determine a data rate that can be supported by the mobile-telephone. Preferably, the determined data rate corresponds to a maximum data rate at which a minimum level of quality of service can be achieved at the mobile-telephone. In a "centralized" embodiment, the mobile-telephone transmits the signal-to-interference measurements to the base station, and the base station determines the data rate based on the available transmit power at future time t+z.
Abstract:
The present invention is a method for outputting larger bit size pseudo-random number zi that is cryptographically secure. Since larger bit size pseudo-random numbers are being outputted, larger bit size segments of messages may be encrypted resulting in a speedier encryption process than encryption processes of the prior art. In one embodiment, the present invention is a pseudo-random number generator defined by a modular exponential function xi = g <>i-1 mod p. The output of the pseudo-random number generator being a pseudo-random number zi comprising a j-1 bit size segment of xi. The value of j being less than or equal to m-2c (i.e., j≤m-2c). In an embodiment of the present invention, the pseudo-random number zi includes the j least significant bits of xi excluding the least significant bit of xi.
Abstract:
Disclosed is a method of integrating voice and data services onto a sam e frequency channel using available transmit power information to determine da ta rates, wherein the available transmit power information indicates an amount of transmit pow er available for future data transmissions over one or more data channels. In a "distributed" embodiment, a transmitter or base station transmits. via a forward link, an available powe r message to a receiver or mobile-telephone indicating an amount of available transmit power at some future time t+z. The mobile-telephone performs signal-to-interference measurements corresponding to the received forward link and received interference, and uses such signal-to- interference measurements and the available power message to determine a data rate that c an be supported by the mobile-telephone. Preferably, the determined data rate corresponds to a maximum data rate at which a minimum level of quality of service can be achieved at the mobile- telephone. In a "centralized" embodiment, the mobile-telephone transmits the signal-to- interference measurements to the base station, and the base station determines the data rate based on the available transmit power at future time t+z.
Abstract:
The present invention provides a method for encrypting data for transmission over a wireless link. The method includes encrypting at least one block of data, at an air-interface application layer, using an encryption algorithm that receives a cryptosynch as input. The value of the cryptosynch is based on an order of the at least one block of data relative to other blocks of data. The value of the cryptosynch is recoverable by a receiver based on the ordering of the ordering of the blocks of data. The at least one encrypted block of data is transmitted to a receiver that is operable to preserve the order of the at least one block of data relative to the other blocks of data.
Abstract:
A key distribution scheme is provided, which is useful for establishing, distributing, and maintaining security associations in a Mobile IP network. An authentication server performs an initial validation of a new session and generates a root key which it delivers to the initial access gateway and to the home agent. The initial access gateway and the home agent each independently compute a derivative key available only to themselves. The initial access gateway, acting as proxy for the mobile station, uses the derivative key to sign the Mobile IP registration or binding update transactions, and sends the signed registration or binding update to the home agent for validation. Once the session is established between the mobile station and the home agent, the access gateways act as proxies on behalf of the mobile station to maintain the session mobility. In handoff, the new access gateway acquires the root key as part of the transferred session context. The new access gateway, acting as proxy for the mobile station, computes a new derivative key from the root key and uses it to sign a binding update.