摘要:
A telecommunications device is provided. The telecommunications device comprises a processor configured such that the device sends a first message to a database management component, the first message containing a communications key encrypted by a database management component key. The processor is further configured such that the device receives a second message from the database management component, the second message encrypted by the communications key. The processor is further configured such that, when the device is able to decrypt the second message, the device considers the database management component to be legitimate.
摘要:
Devices and methods are provided for determining the proximity of client nodes within a wireless-enabled communication environment. A first client node comprises a database containing identification data associated with a plurality of wireless network access nodes and fingerprint data associated with the client node and a plurality of second client nodes. As the fingerprint information is updated, it is processed by the first client node to identify second client nodes that have matching, or similar, fingerprint information. Those that do are determined to be within a viable device-to-device (D2D) communication range.
摘要:
Devices and methods are provided for determining the proximity of client nodes within a wireless-enabled communication environment. A first client node comprises a database containing identification data associated with a plurality of wireless network access nodes and fingerprint data associated with the client node and a plurality of second client nodes. As the fingerprint information is updated, it is processed by the first client node to identify second client nodes that have matching, or similar, fingerprint information. Those that do are determined to be within a viable device-to-device (D2D) communication range.
摘要:
A device and method are provided for concurrently using a plurality of radio access technologies (RATs) to support a wireless-enabled communications session. A set of data is processed at a client node to identify a subset of priority data. The set of data and the subset of priority data are respectively provided to a first and second protocol stack, which correspond to a first and second RAT. The first and second protocol stacks are then used to control the transmission of a first and second set of transmitted data, which in turn respectively comprise the set of data and the subset of priority data. The first and second sets of transmitted data are received by an access node, which uses corresponding first and second protocol stacks to control their reception. The first and second sets of transmitted data are then processed to generate a set of received data.
摘要:
Devices and methods are provided for automating client node access of a wireless network access node. A client node comprises a database containing identification data and access procedure data associated with a plurality of wireless network access nodes and credentials data associated with the client node. The client node receives identification data associated with a wireless network access node. The client node then processes the identification data to locate access procedure data in the database corresponding to the wireless network access node. Once identified, the client node then uses the access procedure data to provide its credential data to the wireless network access node. In response, the wireless network access node processes the credential data for approval, and once it is approved, grants the client node access.
摘要:
The present invention employs hierarchical modulation to simultaneously transmit data over different modulation layers using a carrier RF signal. Each modulation layer may be of a higher or lower order than the other modulation layers. Certain embodiments of the present invention may transmit different information on the different modulation layers. Other embodiments of the present invention may use the different layers for processing information differently.
摘要:
The present invention employs hierarchical modulation to simultaneously transmit data over different modulation layers using a carrier RF signal. Each modulation layer may be of a higher or lower order than the other modulation layers. Certain embodiments of the present invention may transmit different information on the different modulation layers. Other embodiments of the present invention may use the different layers for processing information differently.
摘要:
The present invention employs hierarchical modulation to simultaneously transmit data over different modulation layers using a carrier RF signal. Each modulation layer may be of a higher or lower order than the other modulation layers. Certain embodiments of the present invention may transmit different information on the different modulation layers. Other embodiments of the present invention may use the different layers for processing different information streams.
摘要:
One or more relay stations may be employed along a wireless communication access path between an ingress station and an egress station. A logical communication tunnel is established between the ingress and egress stations through any number of intermediate relay stations to handle session flows of PDUs. As PDUs arrive, the ingress station may determine and add scheduling information to the PDUs before they are delivered to the downstream intermediate relay stations or egress stations. The scheduling information is used by the downstream stations to schedule the PDUs for further delivery. The scheduling information may also be used by the egress station to schedule the PDUs for delivery. The scheduling information added to the PDU by the ingress station bears on a QoS class associated with the PDU, a deadline for the egress station to deliver the PDU, or a combination thereof.
摘要:
A problem with mobile radio systems is the potentially harmful interference they may cause to other electronic equipment. Such interference can be dangerous and even life-threatening in hospitals and aircraft. The present invention provides a method to protect against improper operation of mobile radios, e.g. cellular phones, by making use of a “location technique” and knowledge of the mobile's location to determine if the mobile is inside a protected region and thus needs to constrain its operation. Two modes of operation are possible: one utilising a location technique that is part of the mobile radio system, and the second utilising a location service that is independent of the mobile radio system (such as the satellite based GPS system). The present invention includes control of operation, such as no audible ringing, or outgoing calls only, as well as possible control of transmitter power to protect against interference. This allows for the safe operation of mobile radios in regions where interference could cause serious problems and also provides a method for maintaining social etiquette. Protected region boundaries and conditions of restricted operation are broadcast by base stations on the broadcast control channels. If the location of a mobile is determined to be within a protected region defined by the broadcast message, its operation is limited to the conditions specified.