Abstract:
The present invention is a method and system for station location based neighbor determination and handover probability estimation. A serving access point determines the location and movement measurements of a station (STA). Neighboring access points report coordinates of cell fringes of the neighboring access points. The STA sends a request for system information to the current access point along with current location of the STA. The current access point provides the system information, and the STA utilizes the system information to determine best handover candidate from among neighboring access points and an estimate of the time for handover.
Abstract:
A wireless mesh network with digital rights management (DRM) interoperability is disclosed. A first DRM-capable mesh point (MP) performs a discovery procedure for detecting neighbor MPs and identifies at least one other DRM-capable MP among the detected neighbor MPs. The first DRM-capable MP then performs an association procedure only with the DRM-capable MPs. The first DRM-capable MP assigns DRM roles to the associated DRM-capable MPs. A digital content is then distributed from the first DRM-capable MP to another DRM-capable MP via the mesh network. The DRM interoperability may be based on a networked environment for media orchestration (NEMO) architecture proposed by the Coral Consortium or any DRM interoperability architectures.
Abstract:
A method and apparatus for triggering procedures to handover an ongoing communication session between a mobile station (MS) and a correspondent node (CoN) from via a first network of a first type to via a second network of a different type. Communication session continuity is maintained by transferring communication session context information when a handover is imminent from a network component in a first network path to a network component in a second network path, and by forwarding downlink and uplink signals via the network components in both the first and second network paths until the ongoing communication session can be established via the second network path. The context information includes the session communication parameters, such that the second network path can allocate resources and establish routing between the MS and the CoN.
Abstract:
This invention relates to wireless local area networks (WLANs), and the interoperability of networks of different types or conforming to different standards, and to methods and apparatus to allow a multimode wireless transmit/receive unit (WTRU), which is able to operate in more than one type of network, to handover from one network type to another without adversely affecting service, utilizing a mechanism and information flows implemented in a new protocol stack.
Abstract:
A multiple radio access technology (RAT) apparatus with mobility middleware provides a user with access to various RAT networks, such as a frequency division duplex (FDD) network and a wireless local area network (WLAN). In one embodiment, the apparatus is a dual mode FDD/WLAN converged wireless communication handset which includes a terminal equipment (TE) module having mobility middleware, an applications and protocols processor and a terminal interface (TI). The dual mode FDD/WLAN converged wireless communication handset further includes a user services identity module (USIM), a mobile termination (MT) module and a protocol stack which interface with the mobility middleware via a plurality of links. In another embodiment, the multi-RAT apparatus is terminal equipment which includes a mobility middleware core module, a mobility middleware communication module, a driver and an insertably removable wireless communication device for providing a multiple radio transport medium to applications running in the terminal equipment.
Abstract:
The present invention relates to secret key generation and authentication methods that are based on joint randomness not shared by others (JRNSO), in which unique channel response between two communication terminals generates a secret key. Multiple network access points use a unique physical location of a receiving station to increase user data security. High data rate communication data is encrypted by generating a random key and a pseudo-random bit stream. A configurable interleaving is achieved by introduction of JRNSO bits to an encoder used for error-correction codes. Databases of user data are also protected by JRNSO-based key mechanisms. Additional random qualities are induced on the joint channel using MIMO eigen-beamforming, antenna array deflection, polarization selection, pattern deformation, and path selection by beamforming or time correlation. Gesturing induces randomness according to uniquely random patterns of a human user's arm movements inflected to the user device.
Abstract:
A method and system for securing wireless communications is disclosed. In on embodiment, different security policies are used based on the distance between a receiver and a transmitter, whereby data in the wireless communications can only be demodulated if received in particular trust zones. In another embodiment, a plurality of bit stream fragments are transmitted by a plurality of transmitters to a receiver located in an area where transmission patterns radiated by the transmitters intersect. Alternatively, the receiver performs a function on packet data units (PDUs) transmitted by the transmitters. In yet another embodiment, primary modulation points of a modulation points which can be demodulated only by a receiver that is within range of the transmitter. In yet another embodiment, a main waveform is transmitted which overlays a QPSK signal with hierarchical modulation (HM) having encoded descrambling information.
Abstract:
A system for implementing a media independent handover (706) in a station (700) in a wireless communication system includes a physical sublayer management entity (702), a medium access control sublayer management entity (704), a management information base (608), and a handover policy function (606). The handover policy function (606) is capable of receiving measurements and system information from the physical sublayer management entity (702), the medium access control sublayer management entity (704), and the management information base (608). The handover policy function (606) is capable of then autonomously determining whether to execute a handover.
Abstract:
A method and system for conveying media independent handover (MIH) capability information are disclosed. A wireless communication system includes a plurality of wireless networks deployed under different wireless communication protocols. A multi-mode wireless transmit/receive unit (WTRU) may perform a handover from one wireless network to another for continuous reception of services. The wireless network sends a message to the WTRU which indicates whether the wireless network supports MIH services and a supported MIH mode. The WTRU receives the message and makes a handover decision based on the message.
Abstract:
Signals encoded with watermark information are generated and broadcast into a protected area for capture by illicit recording devices along with their intended targets. An illicit recording in which at least a portion of the broadcast watermark signals are recorded is obtained and correlated with a known position of the broadcast watermark signals to yield the location of illicit recording devices. In an alternate embodiment, a surveillance device, being image and time synchronized with a signal broadcasting device, monitors and records the protected area. Illicit recordings containing the broadcast watermark are obtained and correlated with corresponding recordings taken by the surveillance device to identify the location of illicit recording devices. In an alternate embodiment, the surveillance device further monitors the quality of the broadcast watermark signals and adjusts them accordingly to achieve a desired quality level.