会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method for reducing inter-cell interference in communications system
    • 减少通信系统中小区间干扰的方法
    • US20080095133A1
    • 2008-04-24
    • US11584553
    • 2006-10-23
    • Shu KodoChen HongyuanKari SipilaPreben Mogensen
    • Shu KodoChen HongyuanKari SipilaPreben Mogensen
    • H04B7/216
    • H04W72/1278H04W72/1231
    • The application discloses a method for avoiding inter-cell interference in a cellular communications system. In the method, a user terminal (UE2) measures (6-3) control signalling (6-2) of a first, serving base station (BS3) and control signalling (6-1) of a second base station (BS2), the user terminal (UE2) being within the coverage area of the serving base station (BS3) and the coverage area of the second base station (BS2). Based on the measuring, the user terminal calculates (6-4) a timing difference between the signalling from the serving base station (BS3) and the signalling from the second base station (BS2). Information on the timing difference is provided (6-5) to the serving base station (BS3). Based on the timing difference, the serving base station (BS3) schedules (6-6) data transmission (6-7) to be transmitted to the user terminal (UE2) non-simultaneously with the control signalling (6-1) from the second base station (BS2).
    • 本申请公开了一种用于避免蜂窝通信系统中的小区间干扰的方法。 在该方法中,用户终端(UE 2)测量第一基站(BS 3)的控制信令(6〜2)和第二基站(BS)的控制信令(6-1) 2),用户终端(UE 2)在服务基站(BS 3)的覆盖区域内和第二基站(BS 2)的覆盖区域之间。 基于测量,用户终端计算(6-4)来自服务基站(BS 3)的信令与来自第二基站(BS 2)的信令之间的定时差。 向服务基站(BS 3)提供关于定时差异的信息(6-5)。 基于定时差异,服务基站(BS3)与控制信令(6-1)非同时地发送到用户终端(UE 2)来调度(6-6)数据传输(6-7) 来自第二基站(BS 2)。
    • 3. 发明授权
    • Forbidden tracking area optimization for private/home networks
    • 私人/家庭网络的禁止跟踪区域优化
    • US08116736B2
    • 2012-02-14
    • US12069240
    • 2008-02-08
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • H04M1/66
    • H04W48/04H04J11/0086H04W8/26H04W48/12H04W84/045
    • Access verification is adaptively done using an identifier of a first or a second length, by comparing a field of a node address that has the determined first or second length against a locally stored access list. At least the compared field of the node address is either added to a locally stored list of cell selection candidate nodes where the access list is allowed identifiers, or excluded from it where the access list is restricted identifiers. The node identifier is in three sections. The first section is service type, which the UE can use to determine whether or not it is restricted/allowed. The first length is the length of the second section, which is a service area ID of a group of network nodes. The second length is the length of the second section plus the third section, which identifies one node of the group of network nodes.
    • 通过将具有确定的第一或第二长度的节点地址的字段与本地存储的访问列表进行比较,使用第一或第二长度的标识符自适应地进行访问验证。 至少将节点地址的比较字段添加到本地存储的小区选择候选节点的列表中,其中访问列表被允许标识符,或从其中被排除在访问列表是受限标识符的情况下。 节点标识符分为三个部分。 第一部分是服务类型,UE可以使用它来确定它是否被限制/允许。 第一个长度是第二个部分的长度,它是一组网络节点的服务区域ID。 第二长度是第二部分的长度加上第三部分,其标识该组网络节点的一个节点。
    • 6. 发明申请
    • Forbidden tracking area optimization for private/home networks
    • 私人/家庭网络的禁止跟踪区域优化
    • US20080194235A1
    • 2008-08-14
    • US12069240
    • 2008-02-08
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • H04M1/66
    • H04W48/04H04J11/0086H04W8/26H04W48/12H04W84/045
    • Access verification is adaptively done using an identifier of a first or a second length, by comparing a field of a node address that has the determined first or second length against a locally stored access list. At least the compared field of the node address is either added to a locally stored list of cell selection candidate nodes where the access list is allowed identifiers, or excluded from it where the access list is restricted identifiers. The node identifier is in three sections. The first section is service type, which the UE can use to determine whether or not it is restricted/allowed. The first length is the length of the second section, which is a service area ID of a group of network nodes. The second length is the length of the second section plus the third section, which identifies one node of the group of network nodes.
    • 通过将具有确定的第一或第二长度的节点地址的字段与本地存储的访问列表进行比较,使用第一或第二长度的标识符自适应地进行访问验证。 至少将节点地址的比较字段添加到本地存储的小区选择候选节点的列表中,其中访问列表被允许标识符,或从其中被排除在访问列表是受限标识符的情况下。 节点标识符分为三个部分。 第一部分是服务类型,UE可以使用它来确定它是否被限制/允许。 第一个长度是第二个部分的长度,它是一组网络节点的服务区域ID。 第二长度是第二部分的长度加上第三部分,其标识该组网络节点的一个节点。
    • 8. 发明申请
    • Forbidden Tracking Area Optimization For Private/Home Networks
    • 私人/家庭网络的禁止跟踪区域优化
    • US20120190335A1
    • 2012-07-26
    • US13330787
    • 2011-12-20
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • Lars DalsgaardJarkko T. KoskelaIvan OreKari Sipila
    • H04W12/06
    • H04W48/04H04J11/0086H04W8/26H04W48/12H04W84/045
    • Access verification is adaptively done using an identifier of a first or a second length, by comparing a field of a node address that has the determined first or second length against a locally stored access list. At least the compared field of the node address is either added to a locally stored list of cell selection candidate nodes where the access list is allowed identifiers, or excluded from it where the access list is restricted identifiers. The node identifier is in three sections. The first section is service type, which the UE can use to determine whether or not it is restricted/allowed. The first length is the length of the second section, which is a service area ID of a group of network nodes. The second length is the length of the second section plus the third section, which identifies one node of the group of network nodes.
    • 通过将具有确定的第一或第二长度的节点地址的字段与本地存储的访问列表进行比较,使用第一或第二长度的标识符自适应地进行访问验证。 至少将节点地址的比较字段添加到本地存储的小区选择候选节点的列表中,其中访问列表被允许标识符,或从其中被排除在访问列表是受限标识符的情况下。 节点标识符分为三个部分。 第一部分是服务类型,UE可以使用它来确定它是否被限制/允许。 第一个长度是第二个部分的长度,它是一组网络节点的服务区域ID。 第二长度是第二部分的长度加上第三部分,其标识该组网络节点的一个节点。
    • 9. 发明授权
    • Measurement reporting in a telecommunication system
    • 电信系统中的测量报告
    • US06982959B1
    • 2006-01-03
    • US09622241
    • 1999-02-09
    • Oscar SalonahoKari Sipila
    • Oscar SalonahoKari Sipila
    • H04B7/212G06F11/00
    • H04W36/30
    • The present invention relates to defining triggers or threshold values for radio signal parameters that are used for determining whether or not to send a measurement report separately for the uplink and downlink direction. The triggers for the uplink and downlink are logically combined so that a measurement report may be sent when measurements in both the uplink and downlink satisfy the triggers, when either measurement does, or when only one of the uplink or downlink measurement does. Preferably, the measurement report is a mobile evaluated handover measurement report triggering a handover. It is preferably triggered in the mobile station when at least one upper threshold of the radio signal parameters for a mobile evaluated handover is exceeded or a lower threshold is gone under.
    • 本发明涉及定义用于无线电信号参数的触发或阈值,用于确定是否为上行链路和下行链路方向分别发送测量报告。 用于上行链路和下行链路的触发器被逻辑地组合,使得当上行链路和下行链路测量中的任一个测量都做到,或者当上行链路或下行链路测量中的一个都是上行链路或下行链路测量时,上行链路和下行链路中的测量都满足触 优选地,测量报告是触发切换的移动评估切换测量报告。 当超过用于移动评估的切换的无线电信号参数的至少一个上限阈值或下限阈值时,优选地在移动台中触发。