Abstract: The present invention supports a protection path in a radio access network in order to continue communication between terminating nodes of the radio access network if a failure occurs with a communications path between the terminating nodes. A node may assume the functionality of a router, a base transceiver station, or a base station gateway. The establishment of the protection path utilizes the redundancy of connectivity in the radio access network when routing the protection path in accordance with a service protection model. The protection path may be configured with a service protection model that is based on a quality of service model or on a separate protection model. With a quality of service being associated with a traffic class, the service profile indicates the quality of service for different types of services for a user as well as the quality of service that is provided by the protection path if a failure occurs with the communications path.
Abstract: The present invention relates to a method for determining the position of an electronic device (1) by means of satellites in a positioning system. In the method, satellite orbit data and a default position for the electronic device (1) are determined. In the method, at least the following steps are taken: a determination step for determining a first time data estimate by using said default position, a computing step for computing an estimate of the code phase of the satellite signal on the basis of said time data estimate, the default position and the satellite orbit data, and a searching step, in which a code-modulated signal transmitted by satellites of a positioning system is received for searching the signal of at least one satellite and for acquiring the signal by using said estimate of the code phase. The invention also relates to a system, in which the method is applied, as well as to an electronic device (1).
Abstract: A method and system for preventing stack buffer overflow attacks in a computer system are disclosed. A computer system can prevent stack buffer overflow attacks by encrypting return addresses prior to pushing them onto the runtime stack. When an encrypted return address is popped off the runtime stack, the computer system decrypts the encrypted return address to determine the actual return address. A random encryption key can be used, which can be generated from the CPU's clock cycle counter. Multitasking environments can add a seed register to the task state so that each task can use a unique seed to encrypt the return addresses.
Abstract: The invention relates to a method for synchronizing a receiver (1) with a transmitted code-modulated spread spectrum signal. In the method, at least one reference code (r(x)) is used, which corresponds to a code used in the modulation, and the frequency shift of the transmitted signal and the code phase of the code used in the modulation are determined. In the method, a correlation step is taken to form a correlation function matrix on the basis of the received signal and said reference code. A non-coherent search matrix is formed of said correlation function matrix. In the method, elements in said non-coherent search matrix are modified on the basis of at least one statistical property of the elements in said non-coherent search matrix, and/or high-pass filtering is performed before the formation of said correlation function matrix. The invention also relates to a system and a receiver in which the method is applied.
Type:
Application
Filed:
May 16, 2003
Publication date:
November 20, 2003
Applicant:
Nokia Corporation
Inventors:
Ilkka Kontola, Samuli Pietila, Harri Valio
Abstract: A method and apparatus by which a user of two or more client devices (10 11) each hosting a data store (10c 11c) can have the data stores kept synchronized by a server (12) (in some cases operated as a synchronizing service) in a way acceptable to the user even though at least one of the two data stores (10c) includes a data component (such as a field of a record) that is not in the other data store (11c) (or for which a correspondence from the one data store (10c) to the other data store (11c) in respect to the data component has not yet been set, including possibly a null correspondence). Any such so-called problem field is monitored by a sync field scanner (12g) usually hosted by the server, which alerts the user that a data component is a problem field only when the user first provides a value for the data component.
Abstract: An N-clock system, for use for example in a ranging receiver using a Kalman filter. The clock system uses N clocks (to save power by using some clocks that consume less power) with a schedule for switching from one clock to another (so that only one clock is on at any instant of time). It uses an N-clock model that, in case of an application using clock 1 for time interval &Dgr;t1, clock 2 for time interval &Dgr;t2, . . . , and clock N for time interval &Dgr;tN, provides a state update equation for updating the N-clock system state (the state components being typically time and fractional frequency). The state update equation results from propagating the state of the assembly of N clocks (providing a single output, i.e. acting as a single clock) forward from interval to interval until the entire interval of &Dgr;t1+&Dgr;t2+ . . . +&Dgr;tN is covered.
Abstract: A radio antenna comprising a tuning component, such as a transmission line, coupled to the radiating element for providing a frequency shift from the resonant frequency, and an adjustment mechanism for adjusting the frequency shift by effectively changing the length of the transmission line. The adjustment mechanism comprises one or more extension lines, and a switching mechanism, which can be closed to couple one or more of the extension lines to the transmission line. The tuning component can also be one or more lumped reactive elements.
Type:
Grant
Filed:
January 28, 2002
Date of Patent:
November 18, 2003
Assignee:
Nokia Corporation
Inventors:
Jani Ollikainen, Outi Kivekäs, Pertti Vainikainen
Abstract: The indication given by SSDT in soft handover as to whether a cell is primary or not is used by base stations whether or not the base stations actually use it to configure DSCH transmission power with the principle that if the cell is primary, DSCH power is set based on DCH and, if not then a fixed power level or an offset with respect to DCH is used.
Abstract: The idea of the invention is the allocation of transmission resources in several separate steps. In the first step, the available transmission resources are dynamically divided between the different networks. In the second step, the networks divide the resources that have been allocated for their use among their users by their own channel allocation methods. In one embodiment, a given minimum capacity wherewith the network achieves a predetermined minimum quality of service is permanently allocated to some or all of the networks. As the capacity requirement increases, the necessary amount of additional capacity is allocated to the operator in excess of this minimum capacity. The additional capacity is then allocated either from resources separately reserved for this purpose that are common to the networks, or by borrowing it from capacity that is allocated to another network but falls outside the minimum capacity of said network.
Type:
Grant
Filed:
March 27, 2000
Date of Patent:
November 18, 2003
Assignee:
Nokia Corporation
Inventors:
Antero Alvesalo, Mika Rinne, Hannu Hakkinen, Oscar Salonaho
Abstract: The present invention provides a relocation of an application-specific functionality for an application that a mobile terminal (mobile node) is executing. Entities that may provide application-specific functionalities that assist the application include a location-based server (that may be associated with a supplementary service provider functionality), a transcoder proxy, and a security gateway. The relocation of the application-specific functionality with a network layer-level handoff enables the mobile terminal to seamlessly execute an application that utilizes the media content from a content source that is supporting the mobile terminal before the handoff Subsequent to the handoff, the mobile terminal registers with a current access router in order to inform the current access router about application context information.
Type:
Application
Filed:
May 10, 2002
Publication date:
November 13, 2003
Applicant:
Nokia Corporation
Inventors:
Dirk Trossen, Hemant M. Chaskar, Govind Krishnamurthi
Abstract: The present invention provides a method and apparatus for connecting terminal equipment to a wireless network with a mobile terminal, wherein the mobile terminal is assigned proxy functions that control access of the terminal equipment to an internet protocol multimedia subsystem (IMS) in the wireless network. The proxy control functions include identification or authentication functions, as well as call control functions. The terminal equipment performs protocol stream processing functions for communicating with the internet protocol multimedia subsystem (IMS). The protocol stream processing functions include real-time transport protocol (RTP) and real-time transport control protocol (RTCP) functions. The wireless network includes a universal mobile telecommunications system (UMTS) network coupled to the internet protocol multimedia subsystem (IMS).
Abstract: SyncML allows synchronization to take place between a terminal device and a server device. To be able to understand each other the data transferred between a SyncML client and a SyncML server must be coded as a SyncML document. The coding or decoding/parsing of the SyncML document is done by the separate application components, respectively, that other end-user applications (e.g. a UI application) can use. It is not always wanted, advantageous or even possible to employ the SyncML coding/decoding feature, since it is subjected to several disadvantages. The present disclosure provides a concept to still use the synchronization related components for communicating synchronization data between the participating devices but without employing the coding/decoding component feature. The response of coding and decoding the synchronization data is transferred to corresponding end-user applications.
Type:
Application
Filed:
April 9, 2003
Publication date:
November 13, 2003
Applicant:
Nokia Corporation
Inventors:
Jouni Rapakko, Mika Martikainen, Sami Pajusaari
Abstract: A system and method for facilitating interactive presentations using messaging technologies to import solicited information into the presentation or demonstration from mobile terminals of the presentation participants. A request to respond to a presentation query is presented to presentation recipients. An address is provided to the presentation recipients, where the address identifies where the presentation recipients may submit a message response via a network message service operable on the presentation recipients' mobile communication devices. The message responses submitted by the presentation recipients and received via the network message service are collected, and the vote results obtained from the presentation recipients' message responses are introduced as input parameters to the interactive presentation. The vote results can then be presented as an integral part of the interactive presentation.