41
Rishi Mohindra: Methods to relax the second order intercept point of transceivers. Maxim Integrated Products, Blakely Sokoloff Taylor & Zafman, April 3, 2012: US08149902 (4 worldwide citation)

Methods to relax the second order intercept point of transceivers for multi-carrier and OFDM (such as IEEE 802.11a/g and 802.16) based zero IF wireless receivers that need to work in an environment with strong jamming signals, such as, for example, WLAN modules in Smart Phones. Due to the poor IP2 o ...


42
Dale A Branlund, Matthew C Bromberg: AAS direct signaling framing methodologies to support high capacity wireless links. The DIRECTV Group, Pillsbury Winthrop Shaw Pittman, August 30, 2011: US08009552 (4 worldwide citation)

A new frame structure applicable to the IEEE 802.16 OFDMA wireless waveform is described, for the purposes of increasing base station capacity, increasing subscriber link rates and extending base station range. The frame structure provides the necessary constructs so that advance signal processing t ...


43
Kenji Saito, Shoji Kaneko, Haruki Izumikawa: Method and relay station for aggregating service connection identifiers in IEEE 802.16. KDDI Corporation, Westerman Hattori Daniels & Adrian, January 18, 2011: US07872999 (4 worldwide citation)

In a method and a RS (Relay Station) for aggregating service connection identifiers in IEEE 802.16, the RS receives a 1st QoS (Quality of Service) from a 1st MS (Mobile subscriber Station), and stores a 1st SFID/CID (Service Flow Identifier)/CID (Connection Identifier) between a BS (Base Station)-RS ...


44
Esmael Hejazi Dinan: Almost blank subframe in carrier aggregation. Ofinno Technologies, Esmael Dinan, David Grossman, January 17, 2017: US09549382 (4 worldwide citation)

A base station transmits a message to a plurality of wireless devices in connected mode. The message comprises a subframe allocation bitmap indicating a plurality of subframes. The plurality of subframes comprises a plurality of almost blank subframes. During majority of symbols of an almost blank s ...


45
Faccin Stefano M, Jokela Jari: A mechanism to enable optimized provision of beacon information in wlan networks. Nokia Corporation, Nokia, Faccin Stefano M, Jokela Jari, BARBER Willliam J, November 16, 2006: WO/2006/120555 (4 worldwide citation)

A method and apparatus are set forth for providing a beacon in a network, including a Wireless Local Area Network (WLAN), such as that defined in IEEE 802.11 Standard Protocol, or one or more other networks, including a 3GPP, 3GPP2 or IEEE 802.16), featuring a technique for layering beacons so as to ...


46
Zhang Hang, Fong Mo Han, Zhu Peiying, Tong Wen: Systems and methods for use with orthogonal frequency division multiplexing. Nortel Networks, Zhang Hang, Fong Mo Han, Zhu Peiying, Tong Wen, SMART PO Box 2999 Station D 900 55 Metcalfe Street Ottawa Ontario K2C 3P5, May 11, 2006: WO/2006/047851 (4 worldwide citation)

Systems and methods are provided for enabling H-ARQ communication between a base station and one or more wireless terminals. Methods for enabling incremental redundancy (IR) based H-ARQ, Chase based H-ARQ and Space-Time Code combining (STC) based H-ARQ between devices for down-link and up-link direc ...


47
Gregory G Raleigh, Alireza Raissinia, James Lavine: Device-assisted services for protecting network capacity. Headwater Research, James E Harris, March 28, 2017: US09609544 (3 worldwide citation)

A system comprising a processor of a communications device configured to monitor a network service usage activity of the communications device in network communication, classify the network service usage activity for differential network access control for protecting network capacity, and associate ...


48
Chandan CP, Srinivasan Narasimhan: Agent assisted malicious application blocking in a network environment. McAfee, Patent Capital Group, February 21, 2017: US09578052 (3 worldwide citation)

Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat i ...


49
Ishay Sivan: System and method for controlling a camera based on processing an image captured by other camera. SNAPAID, May Patents c o Dorit Shem Tov, May 23, 2017: US09661215 (3 worldwide citation)

A device comprises a first digital camera having a first center line of sight and a second digital camera having a second center line of sight that is parallel and opposing the first camera. A method for controlling the first camera based on estimating the angular deviation between a person gaze dir ...


50
Paul A Lambert: Systems and methods for scheduling discovery-related communication in a wireless network. Marvell International, January 10, 2017: US09544754 (3 worldwide citation)

A first wireless device including a timing module and a scheduling module. The timing module is configured to determine a timing of a plurality of discovery windows in a network. A discovery window is a time period in which (i) the first wireless device and (ii) one or more second wireless devices i ...



Click the thumbnails below to visualize the patent trend.