Movatterモバイル変換


[0]ホーム

URL:


USRE49244E1 - Communication apparatus and communication system - Google Patents

Communication apparatus and communication system
Download PDF

Info

Publication number
USRE49244E1
USRE49244E1US16/295,722US201916295722AUSRE49244EUS RE49244 E1USRE49244 E1US RE49244E1US 201916295722 AUS201916295722 AUS 201916295722AUS RE49244 EUSRE49244 EUS RE49244E
Authority
US
United States
Prior art keywords
signal
section
propagation
information
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime, expires
Application number
US16/295,722
Inventor
Masayuki Orihashi
Yutaka Murakami
Katsuaki Abe
Akihiko Matsuoka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Panasonic Intellectual Property Corp of America
Original Assignee
Panasonic Intellectual Property Corp of America
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Panasonic Intellectual Property Corp of AmericafiledCriticalPanasonic Intellectual Property Corp of America
Priority to US16/295,722priorityCriticalpatent/USRE49244E1/en
Application grantedgrantedCritical
Publication of USRE49244E1publicationCriticalpatent/USRE49244E1/en
Adjusted expirationlegal-statusCritical
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A communication apparatus includes a reference signal generating section, a transmitting section, a propagation estimating section, a first data acquiring section, and a decoding section. The reference signal generating section generates a first reference signal to enable a communicating party to estimate a propagation environment. The transmitting section transmits the first reference signal. The propagation estimating section estimates a first propagation estimation value of the propagation environment using a second reference signal transmitted from the communicating party. The first data acquiring section generates first data using the first propagation estimation value. The decoding section decodes a transmission signal encoded using a second propagation estimation value that is estimated by the communicating party using the first reference signal, to obtain second data using the first data.

Description

TECHNICAL FIELD
The present invention relates to a technique used in a digital communication, and more particularly, to a security technique.
BACKGROUND ART
Digital wireless communications have occupied an important position in communication fields due to developments of the techniques. However, wireless communications use public controlled radio-signal spaces, and thus, include a fundamental problem that a third party can receive data. Therefore, there is always a risk that the communication content is intercepted by a third party and the information leaks.
In order to overcome the problems, the processing is performed currently for encrypting the communication information to prevent information from leaking when the information is intercepted.
Encryption of information is studied in various fields, and is applied in a variety of fields. This is principally based on a significant feature that security is ensured to a certain extent without varying the communication system.
However, since it is not possible to prevent encrypted communication information from being intercepted by a third party, a problem arises that the third party decrypts the encrypted communication information from the intercepted received information by consuming time.
DISCLOSURE OF INVENTION
It is an object of the present invention to ensure high security without varying the communication system greatly.
The object is achieved by acquiring, as confidential information, information of propagation environment estimated using a reference signal transmitted from a communicating party.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 1 of the present invention;
FIG. 2 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 1 of the present invention;
FIG. 3 is a sequence diagram illustrating the operation of the communication apparatus according toEmbodiment 1 of the present invention;
FIG. 4 is a block diagram illustrating configurations of a propagation estimating section and coding section in a communication apparatus according toEmbodiment 2 of the present invention;
FIG. 5 is a table illustrating a codebook;
FIG. 6 is a graph illustrating a delay profile;
FIG. 7 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 3 of the present invention;
FIG. 8 is a sequence diagram illustrating the operation of the communication apparatus according toEmbodiment 3 of the present invention;
FIG. 9 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 4 of the present invention;
FIG. 10 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 4 of the present invention;
FIG. 11 is a sequence diagram illustrating the operation of the communication apparatus according toEmbodiment 5 of the present invention;
FIGS. 12(a), 12(b) and 12(c) are views illustrating a frame structure of signal according toEmbodiment 6 of the present invention;
FIG. 13 is another view illustrating a frame structure of signal according toEmbodiment 6 of the present invention;
FIG. 14 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 7 of the present invention;
FIG. 15 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 7 of the present invention;
FIG. 16 is a block diagram illustrating a configuration of a propagation estimating section in a communication apparatus according toEmbodiment 8 of the present invention;
FIG. 17 is a graph for explaining the direction of arrival estimation result;
FIG. 18 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 9 of the present invention;
FIG. 19 is a view for explaining the polarization of signal;
FIG. 20 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 10 of the present invention;
FIG. 21 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 11 of the present invention;
FIG. 22 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 12 of the present invention;
FIG. 23 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 13 of the present invention;
FIG. 24 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 13 of the present invention;
FIG. 25 is a sequence diagram illustrating the operation of the communication apparatus according toEmbodiment 13 of the present invention;
FIG. 26 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 14 of the present invention;
FIG. 27 is a block diagram illustrating a configuration of a propagation estimating section in the communication apparatus according toEmbodiment 14 of the present invention;
FIGS. 28(a) and 28(b) are views illustrating auto-correction sequences;
FIG. 29 is a graph illustrating a delay profile;
FIG. 30 is a block diagram illustrating a configuration of a propagation estimating section in a communication apparatus according toEmbodiment 15 of the present invention;
FIG. 31 is a block diagram illustrating a configuration of a communication apparatus according to Embodiment 16 of the present invention;
FIG. 32 is a block diagram illustrating configurations of a propagation estimating section, converting section and coding section in the communication apparatus according to Embodiment 16 of the present invention;
FIG. 33 is a block diagram illustrating a system according to Embodiment 16 of the present invention;
FIG. 34 is a graph illustrating a frequency characteristic of the delay profile;
FIG. 35 is a block diagram illustrating a configuration of a communication apparatus according to Embodiment 17 of the present invention;
FIG. 36 is a block diagram illustrating another configuration of a communication apparatus according to Embodiment 17 of the present invention;
FIG. 37 is a sequence diagram illustrating the operation of the communication apparatus according to Embodiment 17 of the present invention;
FIG. 38 is a view illustrating signal processing in the communication apparatus according to Embodiment 17 of the present invention;
FIG. 39 is another view illustrating signal processing in the communication apparatus according to Embodiment 17 of the present invention;
FIG. 40 is a view illustrating power distribution;
FIG. 41 is another view illustrating power distribution;
FIG. 42 is another view illustrating power distribution;
FIG. 43 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 18 of the present invention;
FIG. 44 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 18 of the present invention;
FIG. 45 is a view illustrating signal processing in the communication apparatus according toEmbodiment 18 of the present invention;
FIG. 46 is a block diagram illustrating a configuration of a communication apparatus according to Embodiment 19 of the present invention;
FIG. 47 is a sequence diagram illustrating the operation of the communication apparatus according to Embodiment 19 of the present invention;
FIGS. 48(a) and 48(b) are views illustrating a frame structure of signal according toEmbodiment 20 of the present invention;
FIGS. 49(a), 49(b) and 49(c) are other views illustrating a frame structure of signal according toEmbodiment 20 of the present invention;
FIGS. 50(a), 50(b), and50(c) are views illustrating a frame structure of signal according toEmbodiment 21 of the present invention;
FIG. 51 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 22 of the present invention;
FIGS. 52(a), 52(b), and52(c) are views illustrating a frame structure of signal according toEmbodiment 22 of the present invention;
FIG. 53 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 23 of the present invention;
FIG. 54 is a view illustrating a frame structure of signal according toEmbodiment 23 of the present invention;
FIG. 55 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 24 of the present invention;
FIG. 56 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 24 of the present invention;
FIG. 57 is a block diagram illustrating a configuration of a communication apparatus according toEmbodiment 25 of the present invention;
FIG. 58 is a block diagram illustrating another configuration of a communication apparatus according toEmbodiment 25 of the present invention;
FIG. 59 is a block diagram illustrating a communication system using a communication apparatus according to Embodiment 27 of the present invention;
FIG. 60 is a block diagram illustrating a configuration of the communication apparatus according to Embodiment 27 of the present invention;
FIG. 61 is a sequence diagram illustrating the operation of the communication apparatus according to Embodiment 27 of the present invention;
FIG. 62 is another sequence diagram illustrating the operation of the communication apparatus according to Embodiment 27 of the present invention;
FIG. 63 is another sequence diagram illustrating the operation of the communication apparatus according to Embodiment 27 of the present invention;
FIG. 64 is a view illustrating a transmission state of signal on the time axis;
FIG. 65 is another view illustrating a transmission state of signal on the time axis;
FIG. 66 is another view illustrating a transmission state of signal on the time axis;
FIG. 67 is another view illustrating a transmission state of signal on the time axis;
FIG. 68 is a block diagram illustrating a communication system using a communication apparatus according to Embodiment 26 of the present invention;
FIG. 69 is another block diagram illustrating the communication system using the communication apparatus according to Embodiment 26 of the present invention;
FIG. 70 is another block diagram illustrating the communication system using the communication apparatus according to Embodiment 26 of the present invention;
FIG. 71 is a view illustrating power distribution;
FIG. 72 is a graph illustrating time variations in orthogonality in propagation parameter;
FIG. 73 is a graph illustrating communication quality with Bit Error Rate (BER);
FIG. 74 is another graph illustrating communication quality with Bit Error Rate (BER);
FIG. 75 is a view illustrating a transmission state of signal on the time axis;
FIG. 76 is a graph illustrating power distribution;
FIG. 77 is a block diagram illustrating a communication system using a communication apparatus according to Embodiment 28 of the present invention; and
FIG. 78 is a view illustrating reception processing in the communication apparatus according to Embodiment 28 of the present invention.
BEST MODE FOR CARRYING OUT THE INVENTION
Embodiments of the present invention will be specifically described below with reference to accompanying drawings.
Embodiment 1
The invention using propagation information as encryption key information of security will be described below with reference toFIGS. 1 to 3. With respect to communication apparatuses according toEmbodiment 1 of the present invention,FIG. 1 illustrates a specific configuration of an encryption receiving apparatus, andFIG. 2 illustrates a specific configuration of an encryption transmitting/receiving apparatus.FIG. 3 illustrates communication procedures performed between terminals. For convenience in description, it is herein assumed that a base station inFIG. 3 is the encryption transmitting/receiving apparatus as illustrated inFIG. 2, and that a terminal inFIG. 3 is the encryption receiving apparatus as illustrated inFIG. 1. However, the combination is not limited particularly, and each of the base station and terminal may be the encryption transmitting/receiving apparatus.
The apparatus inFIG. 1 hasencryption receiving section153 and transmittingsection152.Encryption receiving section153 estimates a propagation state from a received RF signal, performs decryption using the estimated state as an encryption key to output security data, and hasreception demodulation section150, encryptionkey generating section151 anddecoding section107. Transmittingsection152 outputs a reference RF signal, and has referencesignal generating section108 andtransmission modulation section109.Antenna101 receives/transmits RF signals.Reception demodulation section150 receives an RF signal, outputs the propagation information and demodulated information, and has receivingsection102,propagation estimating section103 anddemodulation section104.
Receivingsection102 receives the RF signal and propagation information, controls the RF signal to be in a suitable reception state, and outputs a received signal.Propagation estimating section103 estimates a propagation characteristic from the received signal to output the propagation information.Demodulation section104 performs appropriate demodulation using the received signal and propagation information, and outputs demodulated information. Encryptionkey generating section151 receives the propagation information, outputs encryption key information, and hascoding section105 andbuffer section106.
Coding section105 extracts a characteristic from the propagation information, and generates and outputs the encryption key (first data).Buffer section106 stores the coded encryption key, and outputs the stored encryption key information. Decodingsection107 receives the encryption key information and demodulated information, decodes the encryption of the demodulated information from the encryption key information, and outputs security data (second data). Referencesignal generating section108 generates a predetermined reference signal to output.Transmission modulation section109 receives the reference signal, and modulates the signal into an RF signal to output.
The apparatus inFIG. 2 hasantenna201,encryption receiving section253, andencryption transmitting section254.Antenna201 andencryption receiving section253 have the same functions as those in corresponding sections inFIG. 1.Encryption transmitting section254 receives the security data and encryption key information, switches between a reference signal for propagation estimation and encrypted information encrypted from the encryption key information and security data by a predetermined method to modulate and output, and hastransmission modulation section252, referencesignal generating section208, encryptingsection209, andswitch section210.
Transmission modulation section252 modulates selected communication information to output an RF signal, and hasmodulation section211 and transmittingsection212. Referencesignal generating section208 generates a predetermined reference signal to output.Encrypting section209 receives the encryption key information and security data, encrypts the security data using the encryption key information, and generates and outputs encrypted information.Switch section210 receives the reference signal and encrypted information, and selects either one to output communication information.Modulation section211 modulates the selected communication information to output a modulated signal. Transmittingsection212 converts the modulated signal into an RF signal to transmit, and outputs the RF signal.
The base station (the encryption transmitting/receiving apparatus as illustrated inFIG. 2) and terminal (the communication apparatus including the encryption receiving apparatus as illustrated inFIG. 1) each with the above-mentioned configuration perform the communication in procedures as illustrated inFIG. 3.
The operation of the apparatus as illustrated inFIG. 1 will be described below.Antenna101 receives an RF signal to output.Reception demodulation section150 receives the received RF signal, and outputs propagation information and demodulated information. Receivingsection102 receives the RF signal and propagation information, and outputs a received signal while controlling to maintain the most suitable reception state by keeping the gain constant or compensating for frequency or time shift according to the propagation information.Propagation estimating section103 receives the received signal, and detects a reception time, propagation time, state of frequency, state of polarization, reception power, multipath state, state of phase, propagation distortion, etc.
Each state is output to receivingsection102 anddemodulation section104 as propagation information for reception demodulation parameters, and also output to encryptionkey generating section151.Demodulation section104 receives the received signal and propagation information, removes a multipath component from the received signal or adjusts the phase according to the propagation information to demodulate, and outputs demodulated. Encryptionkey generating section151 extracts the characteristic of the propagation state from the propagation information output fromreception demodulation section150, and generates and stores an encryption key to output the encryption key information.
Coding section105 receives the propagation information output frompropagation estimating section103, and extracts the characteristic of the propagation state of the received signal from the propagation information. For example, using a multipath state as an example, in multipath propagation formed of a plurality of propagation paths, the multipath characteristic can be detected using the correlation function.
Among thus obtained multipath electric field information, according to a predetermined method using a delay time and power of a path component with the detected maximum power, coding is carried out, and an encryption key used in encrypting is generated and output.Buffer section106 receives and stores the generated encryption key, and outputs the encryption key information. Decodingsection107 receives the demodulated information and encryption key information, decodes the demodulated information according to a predetermined method, and outputs the security data. Transmittingsection152 generates a reference signal, and modulates the signal to output an RF signal. Referencesignal generating section108 generates the reference signal to estimate a propagation state for a communicating terminal targeted for communication to output.Transmission demodulation section109 receives the reference signal, and performs modulation and frequency conversion on the signal to output an RF signal. The output RF signal is transmitted fromantenna101.
The operation of the apparatus as illustrated inFIG. 2 will be described. Only differences are described herein from the apparatus as illustrated inFIG. 1.
Encryption receiving section253, where the RF signal input fromantenna201 is decoded indecoding section207 and the security data is output, has the same configuration as that of the corresponding section inFIG. 1.Encryption transmitting section254 receives the encryption key information and security data, and output an RF signal to transmit. Referencesignal generating section208 generates a reference signal to estimate a propagation state for a communicating terminal targeted for communication to output.Encrypting section209 receives the encryption key information and security data, and outputs encrypted information encrypted according to a predetermined method.
Switch section210 selects either the reference signal input from referencesignal generating section208 or the encrypted information input from encryptingsection209, and outputs the selected communication information.Transmission modulation section252 modulates the selected communication information, and converts the resultant signal into an RF signal to output as a transmission signal. In other words,modulation section211 receives the communication information, and performs predetermined modulation on the information to output as a modulated signal. Transmittingsection212 converts the input modulated signal into an RF signal to output. The RF signal is transmitted fromantenna201.
The above-mentioned operation will be described in terms of communication procedure with reference toFIG. 3.
(0) Base Station and Terminal: Initialization
The base station and terminal are set for the initial state immediately after the power is supplied or a specific signal is received. At the same time, the frequency, time-synchronization, etc. is set according to predetermined procedures.
A predetermined time later after finishing the initial operation, the base station transmits control information in a control signal at predetermined time intervals.
Meanwhile, the terminal starts a search for the control signal after finishing the initial operation. When receiving the control signal transmitted from the base station, the terminal detects the time, frequency, etc. for synchronization with the time, frequency, etc. that the system has (system synchronization). After the system synchronization is finished properly, the terminal transmits a registration request signal for notifying the base station of existence of the terminal. In response to the registration request from the terminal, the base station transmits a registration permission signal and thus performs registration permission of the terminal.
(1) Base Station: Transmission of First Reference Signal
The base station transmits a reference signal for propagation estimation performed in the terminal as a first reference signal. Specifically,switch section210 selects the reference signal generated in referencesignal generating section208 to output totransmission modulation section252.Transmission modulation section252 converts the selected communication information into an RF signal, and the signal is transmitted fromantenna201.
In the terminal awaiting the signal from the base station,propagation estimating section103 detects the first reference signal from the received signal, and performs propagation estimation from the received signal and the reference signal that is a known signal.Coding section105 receives the propagation information frompropagation estimating section103, extracts the characteristic of the propagation state, and converts the extracted characteristic information into an encryption key. This operation will be described specifically later. The base station and terminal are assumed to share in advance the characteristic extracted incoding section105 and a method of converting the characteristic into an encryption key. The converted encryption key is stored inbuffer section106, and encryption key information is output. The base station uses the encryption key as a first encryption key for subsequent communications.
(2) Terminal: Transmission of Second Reference Signal
The terminal transmits a reference signal for propagation estimation performed in the base station as a second reference signal in the same way as described in procedure (1).
Upon receiving a signal from the terminal, the base station detects the second reference signal, andpropagation estimating section203 performs propagation estimation from the received signal and the reference signal that is a known signal. In the same way as in (1),coding section205 converts the propagation information output frompropagation estimating section203 into an encryption key, andbuffer section206 stores the encryption key information to output. The terminal uses the encryption key as a second encryption key for subsequent communications.
(3) Base Station: Transmission of Encryption
The base station switches switchsection210 to select encrypted information output from encryptingsection209. Using the second key obtained in procedure (2), encryptingsection209 encrypts the security data according to a predetermined method, and outputs the encrypted information.Switch section210 selects the encrypted information, and outputs the communication information totransmission modulation section252.Transmission modulation section252 modulates the communication information, and the encrypted signal is transmitted fromantenna201 as an RF signal.
When the terminal receives the encrypted signal,reception demodulation section150 demodulates the received signal to demodulated information. Decodingsection107 uses the demodulated information and the first key obtained in (1), and decodes the encryption according to a predetermined method to output the security data. Subsequently, the terminal repeats the encryption communication in procedure (3) and general communication.
A propagation path formed between communication terminals is determined uniquely corresponding to relative positions of the terminals, spatial form, reflectors and so on, and it is known that the propagation state formed from the base station to the terminal is the same as the propagation state formed from the terminal to the base station due to the reverse characteristic of optical propagation. Therefore, the same result is obtained in the propagation state (for example, delay profile) obtained in (1) and the propagation state obtained in (2). Further, the base station and terminal share procedures for converting the propagation information into an encryption key in advance. In other words, the encryption key (first key) obtained in (1) is the same as the encryption key (second key) obtained in (2), and can be used as common keys between communication terminals. As a result, in the communication procedure of (3), encryption and decoding is carried out using the common keys, and the information encrypted in the base station is decoded properly in the terminal.
A case is considered that all communications are intercepted by a third party using a third terminal in this situation. As described earlier, the propagation path is determined by a propagation space formed between the base station and terminal. Therefore, when communications of procedures (1) to (3) are observed in a position physically different from the base station or terminal, the propagation characteristic obtained between the third terminal and base station, or the third terminal and the terminal is different from that obtained in (1) or (2). Further, since the base station and terminal do not provide/receive a key for encryption, the third terminal cannot know the key.
In this way, it is understood that high security can be ensured in a physical layer of communication. Further, since it is possible to perform the processing basically independently of encryption and decoding using conventional arithmetic methods, there is an advantage that high security is expected by implementing the present invention in addition to conventional techniques.
In the above description, procedure (0) that is of initialization operation is explained under the assumption that the general operation is carried out, but is not a procedure required for the present invention.
Further, the propagation state is estimated by transmitting a reference signal in (1) or (2). This is because using the reference signal that is a known signal generally improves accuracy in estimation, and it is needless to say that propagation estimation can be carried out without using a reference signal particularly. In other words, for example, it is possible to perform propagation estimation using a control signal, registration request signal and registration permission signal performed in (0).
The invention as described above has a feature of using the propagation state as an encryption key, and therefore, there is a fear of occurrence of a problem when the base station or terminal moves. In this case, by repeating transmission and reception of reference signal as indicated by (1′), (2′) and (3′) inFIG. 3, it is possible to avoid the problem.
Thus, according to the communication apparatus and communication system ofEmbodiment 1,propagation estimating section103 estimates the propagation environment based on the reference signal, and outputs an estimation value that is a propagation parameter such as a correlation function, while codingsection105 outputs data obtained from the estimation value, whereby the base station and terminal do not need to provide/receive a key for encryption, the third terminal cannot know the key, and it is possible to ensure high security in a physical layer of communication without changing the communication system greatly. Further, according to the communication apparatus and communication system ofEmbodiment 1, since it is possible to ensure the security by the processing independent from encryption and decoding using conventional arithmetic methods, extremely high security can be ensured by using the conventional encryption and decoding techniques together. Furthermore, according to the communication apparatus and communication system ofEmbodiment 1, since a coding pattern can be varied corresponding to the propagation state, it is possible to perform communications resistant to changes in environment. Still furthermore, according to the communication apparatus and communication system ofEmbodiment 1, since an encryption key can be acquired by obtaining a propagation parameter from the estimated propagation environment, it is possible to transmit/receive information using a non-modulated signal.
In addition, inEmbodiment 1,decoding section107 uses the encryption key information output frombuffer section106 as an encryption key to decode the security key, but the present invention is not limited to such a case. It may be possible to use the encryption key information output frombuffer section106 as an encryption key to decode security data other than the security data decoded indecoding section107. In this case, the need ofdecoding section107 is eliminated. Although inEmbodiment 1 the delay profile is used as a parameter indicating the propagation state, it is considered using a polarization state such as a polarization plane and circulating direction, phase information, propagation delay time, direction of arrival estimation information, reception power information, or a combination of various parameters. In this way, observation in the third terminal becomes more complicated, and it is thereby possible to ensure security to a high extent. In particular, using the polarization and phase which are varied greatly due to the propagation environment provides a feature that makes estimation by another terminal more difficult.
Further, by applying an array antenna structure comprised of a plurality of antenna elements as a plurality ofantennas201, it is possible to add the direction of arrival as a parameter for propagation estimation. It is thereby possible to construct a more flexible system.
In the foregoing, a modulation scheme and multiplexing scheme are not explained, but it is apparent that the present invention is applied to any modulation schemes principally. The present invention is applicable to PSK, QAM, Star QAM, TDMA, FDMA, SS (FH and CDMA), OFDM, spatial multiplexing (SDM and MIMO), etc.
Further, in the communication procedures, when reference signals are transmitted, the first reference signal and second reference signals are transmitted. However, it is obvious that whether to first transmit the first reference signal or the second reference signal does not affect the system of this Embodiment. Furthermore, while reference signals are transmitted separately in the communication procedures, by inserting reference signals to a data stream as in frame structures (b) and (c) inFIG. 12 described later, such an advantage is provided that procedures of (1) and (3) are carried out at the same time.
Embodiment 2
A communication apparatus according toEmbodiment 2 of the present invention is to describe a method of converting the propagation estimation into an encryption key, and has configurations ofpropagation estimating section103 andcoding section105 as illustrated inFIG. 4 incommunication apparatus100 according toEmbodiment 1 of the present invention as illustrated inFIG. 1. The configuration except thesections103 and105 is the same as inFIG. 1, and descriptions thereof are omitted.
Herein, it is assumed to use a delay profile as a representative example of parameter indicating a propagation state. The delay profile includes a delay time, power and phase of each path component. An example will be described that the delay time and power of a path component is used.
Propagation estimating section103 inFIG. 1 fetches a received signal including a reference signal, and estimates the propagation state. When the delay profile is obtained as the propagation state, it is known that the delay profile is obtained using the correlation between a signal as a reference and received signal. In this case,propagation estimating section103 uses the reference signal that is a known signal, and calculates correlation values of the signal sequence with a received signal sequence to obtain the delay profile.
Coding section105 extracts a characteristic of thus obtained propagation information. As an example of characteristic extraction, it is considered using a vector quantization method. A number of templates of representative delay profiles are prepared in a reference table as quantization vectors, and encryption keys are stored in the reference signal in association with the quantization vectors respectively.Coding section105 compares a result estimated inpropagation estimating section103 with a template in thus prepared reference table, and selects and outputs an encryption key associated with a template of a delay profile with the highest similarity.
The method is described above of estimating a propagation state to convert into an encryption key, and will be described more specifically with reference toFIG. 4.
FIG. 4 illustratespropagation estimating section103 andcoding section105 to further explain corresponding functions inFIG. 1 in detail. In descriptions aboutFIG. 1,propagation estimating section103 is assumed to estimate various states such as frequency shift, time shift and phase information, but only a method is herein described of estimating a delay profile.
Propagation estimating section103 hasbuffer401, reference signalsequence storing section402,convolver403 andbuffer404.Coding section105 hasquantizing section405, convertingsection406 andcodebook407. Buffer401 temporarily holds an input signal of a certain length. Reference signalsequence storing section402 stores predetermined reference signal sequences to output sequentially.Convolver403 calculates the convolution of the temporarily stored received signal and reference signal sequence to output the correlation value. Buffer404 temporarily stores a calculated correlation sequence.Quantizing section405 searches quantization vectors stored incodebook407 for the most similar one to an input vector string, and outputs a code. Convertingsection406 selects an encryption key (first data) corresponding to the code output from quantizingsection405 from the codebook to output.
Codebook407 stores quantization vectors and encryption keys.FIG. 5 shows an example of codebook storing quantization vectors that are templates of delay profiles and encryption keys associated with the vectors.
Next, the operations ofpropagation estimating section103 andcoding section105 will be described.
Propagation estimating section103 holds a received signal including a reference signal inbuffer401.Convolver403 outputs as a correlation sequence results obtained by performing sliding correlation between the reference signal sequence from reference signalsequence storing section402 and the received signal sequence held inbuffer401, and holds results sequentially inbuffer404. The correlation sequence held inbuffer404 has correlation values between the reference signal sequence and received signal sequence, i.e., data corresponding to the delay profile. The delay profile information is provided tocoding section105 as a series of input vector.FIG. 6 shows an example of thus obtained delay profile information.
Quantizing section405 compares an input vector frombuffer404 with each quantization vector stored incodebook407, extracts a vector with the highest similarity, and outputs a code associated with the vector. Specifically, assuming an input vector is Xin, and quantization vector of code m is Xqm (m:1˜M), Xqm that minimizes the following equation is obtained:
d=|Xin−Xqm|2  (1)
Thesection405 outputs code m associated with the thus obtained quantization vector.
Convertingsection406 outputs an encryption key associated with code m of the delay profile referring to the content of the encryption key table in the codebook. Thus determining an encryption key enables flexible setting of encryption key to be implemented in simple circuitry.
In this way, according to the communication apparatus and communication system ofEmbodiment 2, in addition to the effects ofEmbodiment 1,propagation estimating section103 generates a delay profile and obtains a correlation function with the reference signal as an estimation value, while codingsection105 reads encryption key information corresponding to the estimation value input frompropagation estimating section103 using the codebook associating the correlation function with the encryption key, and it is thereby possible to implement flexible setting of encryption key in simple circuitry.
In addition, inEmbodiment 2, the method is described of using a quantization vector technique as a coding method of delay profile incoding section105. However, various methods are considered such as a method of approximating a data string of delay profile with an evaluation equation and using coefficients of the obtained approximation equation to code, a method of dividing the delay profile into a number of blocks to perform coding according to the size or the order, or to code according to the delay time and the size of a path with the maximum power.
Embodiment 3
Communication apparatus700 according toEmbodiment 3 has the same configuration as that ofcommunication apparatus200 according toEmbodiment 1 as illustrated inFIG. 2, except thatpropagation control section701 is added,coding section703 replaces codingsection205,modulation section704 replacesmodulation section211, and transmittingsection705 replaces transmittingsection212. In addition, the same sections as inFIG. 2 are assigned the same reference numerals as inFIG. 2, and descriptions thereof are omitted.
The invention of a stable communication method by propagation control will be described below with reference toFIGS. 7 and 8.
Communication apparatus700 inFIG. 7 hasantenna201 comprised of a plurality of antenna elements,encryption receiving section706, andencryption transmitting section707.Encryption receiving section706 hasreception demodulation section708, encryptionkey generating section251, anddecoding section207, and is of the same configuration as inFIG. 1.Encryption transmitting section707 has referencesignal generating section208, encryptingsection209,switch section210 andtransmission modulation section709, and thesections208,209 and210 are the same as respective sections inFIG. 2.
Transmission modulation section709 haspropagation control section701,modulation section704, and transmittingsection705.Propagation control section701 receives propagation information output frompropagation estimating section203 and propagation characteristic information (first data) obtained bycoding section703 extracting a characteristic from the propagation information, and outputs a modulation control signal and transmission control signal so as to control the propagation state to be optimal for a terminal as a communicating party.Demodulation section704 receives the demodulation control signal output frompropagation control section701 and communication information, modulates the communication information while performing fine adjustment on a phase, output timing and amplitude based on the modulation control signal, and outputs a modulated signal for each of the antenna elements.
Transmittingsection705 receives the transmission control signal and modulated signal, converts the modulated signal into an RF signal for each of the antenna elements while controlling the frequency and output timing based on the transmission control signal, and outputs the RF signal toantenna201.
The communication apparatus with the above-mentioned configuration will be described more specifically with reference to communication procedures inFIG. 8. InFIG. 8, it is assumed that each of the base station and terminal is the communication apparatus as illustrated inFIG. 7. In addition, only differences fromEmbodiment 1 are described herein.
(0) Base Station and Terminal: Initialization
The same operation as inEmbodiment 1 is carried out.
(1) Base Station: Transmission of First Reference Signal
The base station transmits a reference signal for propagation estimation performed in the terminal as a first reference signal. Specifically,switch section210 selects the reference signal generated in referencesignal generating section208 to output totransmission modulation section709.Transmission modulation section709 receives the selected communication information, propagation information and propagation characteristic information, and outputs an RF signal while controlling the propagation state for the terminal as a communicating party, and the signal is transmitted fromantenna201. The propagation control will be described specifically later.
In the terminal awaiting the signal from the base station,propagation estimating section203 detects the first reference signal from the received signal, and performs propagation estimation from the received signal and the reference signal that is a known signal. The propagation information that is an estimation value is provided tocoding section703 andpropagation control section701.Coding section703 receives the propagation information frompropagation estimating section203, extracts the characteristic of the propagation state, outputs the propagation characteristic information topropagation control section701, and at the same time, converts the extracted propagation characteristic information to an encryption key. The converted encryption key is held inbuffer section206, and the encryption key information is output. The base station uses the encryption key as a first encryption key for subsequent communications.
(2) Terminal: Transmission of Second Reference Signal
The terminal transmits a reference signal for propagation estimation performed in the base station as a second reference signal in the same way as described in procedure (1). At this point,propagation control section701 transmits the second reference signal while controllingmodulation section704 and transmittingsection705 so that the propagation state becomes a state corresponding to the encryption key (first key) for the base station that is a communicating party, using the propagation information obtained in (1) and propagation characteristic information.
Upon receiving a signal from the terminal, the base station detects the second reference signal, andpropagation estimating section203 performs propagation estimation from the received signal and the reference signal that is a known signal. In the same way as in (1),propagation estimating section203 outputs the propagation information,coding section703 extracts the propagation characteristic information from the propagation information to output, and converts the propagation characteristic information into an encryption key, andbuffer section206 holds the encryption key information. The terminal uses the encryption key as a second encryption key for subsequent communications.
(3) Base station: Transmission of Encryption
The base station switches switchsection210 to select encrypted information output from encryptingsection209. Using the second key obtained in procedure (2), encryptingsection209 encrypts the security data according to a predetermined method, and outputs the encrypted information.Switch section210 selects the encrypted information, and outputs the selected communication information totransmission modulation section709. Intransmission modulation section709,propagation control section701controls modulation section704 and transmittingsection705 so that the propagation state becomes a state corresponding to the encryption key (second key) for the terminal that is a communicating party, using the propagation information obtained in (1) and propagation characteristic information, while the encrypted signal is transmitted fromantenna201 as an RF signal.
When the terminal receives the encrypted signal,reception demodulation section708 demodulates the received signal to demodulated information. Decodingsection207 uses the demodulated information and the first key obtained in (1), and decodes the encryption according to a predetermined method to output the security data.
(4) Terminal: Transmission of Encryption
In the same way as in (3), the terminal performs encryption using the first key, and outputs encrypted information. Intransmission modulation section709,modulation section704 and transmittingsection705 are controlled so that the propagation state becomes a state corresponding to the encryption key (first key) for the base station that is a communicating party, using the propagation information obtained in (1) and (3) and propagation characteristic information corresponding to the encryption key selected in (1), while the encrypted signal is transmitted fromantenna201 as an RF signal. In the same way as in (3), the base station uses the second key obtained in (2), decodes the encryption according to a predetermined method, and outputs the security data.
As described inEmbodiment 1, encryption keys (first key and second key) generated in the base station and terminal can be used as common keys. In other words, it is understood that encryption and decoding in (3) and (4) is processed without any problems.
Thus, according to the communication apparatus and communication system ofEmbodiment 3 of the present invention, in addition to the effects ofEmbodiment 1,propagation control section701controls modulation section704 and transmittingsection705 so that the same encryption key as that generated incoding703 can be obtained in the communicating party, and thus controls the propagation environment in transmitting a reference signal, whereby it is possible to decrease the error in propagation environment between transmitting a reference signal from the communicating party and transmitting a reference signal to the communicating party, and to decrease the error in generating common encryption keys. Further, according to the communication apparatus and communication system ofEmbodiment 3, using propagation information obtained in reception and propagation characteristic information indicative of a propagation state corresponding to an encryption key,transmission modulation section709 controls the propagation state for the terminal that is a communicating party to be of the propagation characteristic information. Thus, the error is decreased between the propagation state in reception and estimated propagation state (corresponding to the encryption key), and there provides an advantage that the communication quality is largely improved.
Further, it is possible to improve the stability of communication by performing propagation control even when the propagation state varies.
Furthermore, when a plurality of similar templates exists in templates searched by codingsection703 in selecting an encryption key, by the transmitting side explicitly controlling the propagation state, it is possible to eliminate the ambiguity.
In addition, inEmbodiment 3, in the communication procedures, when reference signals are transmitted, the first reference signal and second reference signals are transmitted. However, it is obvious that whether to fir transmit the first reference signal or the second reference signal does not affect the system of this Embodiment. Also in the procedures of encryption communication, the order in which the reference signal is transmitted does not affect the system of this Embodiment.
In the system of this Embodiment, encryption keys are provided and received through communications of reference signals, and with respect to encrypted signals subsequent to the reference signal, it is only required that an encryption key matches one that is communicated earlier. In other words, although the transmitting side performs the propagation control for the receiving side while communicating in (3) and (4), it is not required to match the propagation state indicated by the encryption key.
Further, while reference signals are transmitted separately in the communication procedures, by inserting reference signals to a data stream, such an advantage is provided that procedures of (1) and (3) or procedures of (2) and (4) are carried out at the same time.
Embodiment 4
Referring toFIGS. 4 and 9, a method will be described below of controlling the propagation state for a terminal that is a communicating party. It is herein assumed thatantenna901 of a communication terminal has four antenna elements (AN1 to AN4).
The operation inFIG. 4 is basically the same as in described inEmbodiment 2. Only differences will be described.
Convolver403 generates a delay profile for each received signal using a reference signal, and buffer404 stores four kinds of delay profiles. The delay profiles are assumed to be Ds1 to Ds4. Further, using the received signal and reception weighting coefficients (Wr1 to Wr4) delay profile (Ds0) of received signal RO expressed by the following equation is calculated and output.
R0=ΣRm·Wrm  (2)
Among these delay profiles (Ds0 to Ds4), Ds0 is input tocoding section105, and encryption key K0 and corresponding code m0 are output.
In addition, it is assumed that reception weighting coefficients Wr1 to Wr4 are set at respective initial values, for example, in the initial state.
Referring toFIG. 9, a specific method will be described below of performing propagation control using thus obtained Ds1 to Ds4, Wr1 to Wr4 and Ds0 and m0.
Antenna901 inFIG. 9 is comprised of four antenna elements.Reception demodulation section902 receives respective RF signals from the antenna elements, and outputs the received signals and reception weighting coefficients corresponding to the reception sequence.Propagation estimating section103 receives the reception weighting coefficients and received signals, and performs propagation estimation to output propagation information.Coding section105 extracts a characteristic from the propagation information, and outputs a corresponding code of an encryption key.Propagation control section909 receives the propagation information, corresponding code of the encryption key, and reception weighting coefficients, and outputs transmission weighting coefficients.Transmission modulation section910 generates transmission signals respectively for the antenna elements to output, using the communication information and transmission weighting coefficients.Propagation control section909 has coefficient calculatingsection903, codebook905 andbuffer904.Coefficient calculating section903 receives the propagation information, corresponding code of the encryption key, reception weighting coefficients and quantization vector, and outputs transmission weighting coefficients of a transmission signal corresponding to the antenna elements.
Buffer904 holds transmission weighting coefficients, and codebook905 stores corresponding codes and quantization vectors.Transmission modulation section910 hasmodulation section906,weighting sections907, and transmittingsection908.Modulation section906 receives the communication information, modulates the information in a predetermined modulation scheme, and outputs a modulated signal.Weighting sections907 multiply the modulated signal by respective weighting coefficients corresponding to the antenna elements to output weighted modulated signals. Transmittingsection908 receives the weighted modulated signals corresponding to the antenna elements, and converts the signals to RF signals corresponding to the antenna elements to output.
Receiving apparatus1000 will be described below with reference toFIG. 10.
Characteristic extractingsection1001 receives the propagation information obtained from the received signal, and extracts a characteristic from the information.
Buffer1002 temporarily stores the extracted characteristic extraction information.Buffer1002 outputs the stored characteristic extraction information as first data.
The function of each block explained inFIG. 9 is almost the same as a respective block described inFIG. 4 orFIG. 9. Only differences are described herein.
Antenna901 has four antenna elements (AN1 to AN4) and outputs four received RF signals respectively from the antenna elements, and at the same time, outputs reception weighting coefficients (Wr1 to Wr4) for the elements used in reception. The received signals (R1 to R4) respectively corresponding to AN1 to AN4 are input topropagation estimating section103. As described above,propagation estimating section103 outputs propagation states (Ds1 to Ds4) corresponding to received signals (R1 to R4), and coding section outputs encryption key K0 and corresponding code m0.
Coefficient calculating section903 searches codebook905 for the code m0 corresponding to the encryption key K0, and reads a quantization vector (Xqm0) associated with the code m0 to store. Using the quantization vector (Xqm0) and input propagation information (Ds0 to Ds4), thesection903 obtains Wm (m:1 to 4) that minimizes the square error obtained by the following equation:
d=|Wm·Dsm−Xqm0|2  (3)
The least square method is famous as the method of calculating such an error.
Using thus obtained weighting coefficients (W1 to W4) and reception weighting coefficients (Wr1 to Wr4), thesection903 calculates transmission weighting coefficients (Wt1 to Wt4) given with the following equation (4):
Wtm=Wm/Wrm(m:1 to 4)  (4)
Buffer904 holds the transmission weighting coefficients.
Meanwhile,modulation section906 having received the communication information modulates the communication information according to a predetermined modulation scheme, and outputs a modulated signal. The modulated signal is branched to modulated signal strings (S1 to S4) corresponding to antenna elements (AN1 to AN4), and output toweighting sections907.Weighting sections907 multiply modulated signals (S1 to S4) corresponding to AN1 to AN4 respectively by transmission weighting coefficients (Wt1 to Wt4) frombuffer904.
Swm=Wtm·Sm(m:1 to 4)  (5)
Thesection906 outputs thus obtained weighted modulated signals (Sw1 to Sw4). Transmittingsection908 receives the weighted modulated signals, and converts the signals respectively into RF signals (Srf1 to Srf4) to output toantenna901.
Transmission modulation section910 multiplies transmission weighting coefficients while performing calculations as described above, and it is thereby possible to control the propagation characteristic indicated by Xqm0 in a terminal receiving the signals.
Then, in receivingapparatus1000 having received transmission signals transmitted fromantenna901,propagation estimating section103 estimates the propagation state from the received signals, and outputs the estimated propagation state information to characteristic extractingsection1001. Characteristic extractingsection1001 extracts a characteristic corresponding to the propagation state from the propagation state information to output as first data.
Thus, according to the communication apparatus and communication system ofEmbodiment 4, in addition to the effects ofEmbodiment 1, transmitting/receivingapparatus900 adjusts the weighting coefficients used in transmitting the communication information, based on the propagation environment estimated inpropagation estimating section103, so as to enable transmitting/receivingapparatus900 and receivingapparatus1000 to acquire the same first data, whereby it is possible to prevent occurrences of a situation that transmitting/receivingapparatus900 and receivingapparatus1000 cannot acquire the same first data due to effects of noise or the like in estimating the propagation environment, and to eliminate the ambiguity of the first data. Further, according to the communication apparatus and communication system ofEmbodiment 4, transmitting/receivingapparatus900 varies weighting coefficients in transmitting the communication information based on the propagation environment estimated inpropagation estimating section103, and thereby is capable of intentionally varying the first data that receivingapparatus1000 acquires, whereby it is possible to prevent occurrences of harmful effects such that the confidential information is interpreted caused by using the same first data for the long term. In this way, since it is possible to change an encryption key when the first data is the encryption key, it is possible to ensure high security.
In addition, whileEmbodiment 4 describes controlling the delay profile, the present invention is not limited to the foregoing. It may be possible to use a polarization state (polarization plane and/or circulating direction), phase state or propagation delay time to perform propagation estimation. Further, inEmbodiment 4codebook905 is the same as that incoding section105, and it is enough that either codebook only exists in terms of structure. Further, whileEmbodiment 4 describes the case whereantenna901 has four antenna elements, the present invention is not limited to the case, and it is needless to say that two or more antenna elements have the same effectiveness. Furthermore, each sigh indicated in the equations is applicable irrespective of a natural number or complex number. When each value is of complex number, since the signal control is performed in amplitude and phase, higher control is expected.
Embodiment 5
A communication apparatus according toEmbodiment 5 is capable of selecting an arbitrary encryption key by performing propagation control, andFIG. 11 illustrates communication procedures regarding the present invention. In addition, the communication apparatus inEmbodiment 5 has the same configuration as that ofcommunication apparatus700 as illustrated inFIG. 7, and descriptions thereof are omitted.
InEmbodiments 1 to 4 as described above, an encryption key is selected corresponding to the estimated propagation state, and therefore, when the propagation state is constant, the same encryption key is used for a long time. There arises a fear of facilitating estimation of the encryption key. Further, since the same encryption keys are used in both communication apparatuses, there is a fear that when either encryption key is determined, the other encryption key is also determined.Embodiment 5 enables a transmitter to select an encryption key, and in this respect, differs fromEmbodiments 1 to 3 where the first and second keys are the same.
FIG. 11 illustrates communication procedures regarding the present invention. In addition, procedures of (0) to (4) are the same as inFIG. 8, and descriptions thereof are omitted.
(5) Base Station: Transmission of Third Reference Signal
The base station selects a third key as an encryption key, and determines weighting coefficients from the propagation characteristic information corresponding to the encryption key and last estimated propagation information of the communication. Propagation control section701 (second data selecting means) performs propagation control on the reference signal for propagation estimation performed in the terminal using the weighting coefficients to output as a third reference signal.
In the terminal awaiting the signal from the base station,propagation estimating section203 detects the third reference signal from the received signal, and performs propagation estimation from the received signal and the reference signal that is a known signal. The propagation information that is an estimation value is provided tocoding section703 andpropagation control section701.Coding section703 receives the propagation information frompropagation estimating section203, extracts the characteristic of the propagation state, outputs the propagation characteristic information topropagation control section701, and at the same time, converts the extracted propagation characteristic information into an encryption key. The converted encryption key is held inbuffer section206, and the encryption key information is output. The base station uses the encryption key as a third key for subsequent communications.
(6) Terminal: Transmission of Fourth Reference Signal
As in procedure (5), the terminal selects a fourth key as an encryption key, and determines weighting coefficients from the propagation characteristic information corresponding to the encryption key and last estimated propagation information of the communication. Then, the terminal performs propagation control on the reference signal for propagation estimation performed in the base station using the weighting coefficients to output as a fourth reference signal.
Upon receiving a signal from the terminal, the base station detects the fourth reference signal, andpropagation estimating section203 performs propagation estimation from the received signal and the reference signal that is a known signal. In the same way as in procedure (5),propagation estimating section203 outputs the propagation information, andcoding section703 extracts the propagation characteristic information from the propagation information to output. The propagation characteristic information is converted into an encryption key, andbuffer section206 holds the encryption key information. The terminal uses the encryption key as a fourth encryption key for subsequent communications.
(7) Base Station: Transmission of Encryption
Using the third key selected in (5), the base station encrypts the security data according to a predetermined method, and transmits an encrypted signal.
When the terminal receives the encrypted signal,reception demodulation section708 demodulates the received signal into demodulated information. Using the demodulated information and the third key obtained in (5), the terminal decodes the encryption according to a predetermined method, and outputs the security data.
(8) Terminal: Transmission of Encryption
Using the fourth key selected in procedure (6), the terminal encrypts the security data, and transmits an encrypted signal.
As in procedure (7), using the fourth key obtained in (6), the base station decodes the encryption according to a predetermined method, and outputs the security data.
The aforementioned operation will be described below using equations.
Assuming propagation function indicative of a characteristic of radio-signal propagation is H, received signal is Sr and transmission signal is St, the following equation is obtained:
Sr=H·St  (6)
Assuming the number of antenna elements is N, H is a square matrix of N×N, and each of Sr and St is a matrix of 1×N. The terminal is capable of calculating using a base-station transmitted signal (first reference signal inFIG. 3), while the base station is capable of calculating using a terminal transmitted signal (second reference signal inFIG. 3). The communication of the first and second reference signals is represented using following equations:
Sr_b=Hu·St_m  (7)
Sr_m=Hd·St_b  (8)
Hu and Hd indicate uplink propagation function and downlink propagation function, respectively. St_b and Sr_b indicate transmission signal and reception signal in the base station, respectively. St_m and Sr_m indicate transmission signal and reception signal in the terminal, respectively. Since St_b and St_m are known signals (respectively first and second reference signals) the propagation functions are obtained by following equations:
Hu=Sr_b·St_m−1  (9)
Hd=Sr_m·St_m−1  (10)
Since the propagation functions are the same in transmission and reception due to the inverse characteristics of propagation, the following equation is obtained:
H≡Hu=Hd  (11)
Embodiment 1 describes using thus obtained propagation function H as an encryption key (first key (=second key)).
Meanwhile, a method will be described below of controlling the propagation state using transmission weighting coefficients Wb and Wm. When an error E exists between propagation function H′ represented by the quantization vector obtained in selecting the encryption key (first key (=second key)) and actual propagation function H, Sr is expressed by the following equation:
Sr=(H′·ϵ)·St  (12)
Therefore, the error component E is obtained by the following equation:
ϵ=H·−1(Sr·St−1)  (13)
Substituting weighting coefficients Wm and Wb, correction can be carried out as described below:
Sr_b=(H′·Wm)·St_m  (14)
Sr_m=(H′·Wm)·St_b  (15)
Embodiment 4 describes performing encrypted communication while correcting the propagation state using the weighting coefficients in this way. Extending the correction function enables an encryption key to be set on transmitting side. A case will be described below of using the third and fourth keys that are different from the first key (=second key). The base station performs control using the weight W3_b so as to obtain propagation function H3 corresponding to the third key, and transmits the third key via the third reference signal. In other words, when Sr is:
Sr_m=(H·W3_b)·St_b  (16)
H3 is:
H3=H·W3_b  (17)
Subsequently, the base station performs the encrypted communication while using the third key to encrypt.
The terminal receives the third reference signal, analyzes the propagation state, thereby obtains propagation function H3, and using the encryption key (third key) corresponding to H3, decodes subsequent encrypted information. As in the base station, the terminal selects the fourth key (that is assumed to correspond to propagation function H4), and transmits the fourth key via the fourth reference signal while performing control using the weighting coefficient W4_m.
Sr_b=(H·W4_m)·St_m  (18)
H4=H·W4_m  (19)
The terminal performs the encrypted communication while using the fourth key to encrypt. As in the terminal, the base station is capable of performing decoding using the fourth key.
Thus, according to the communication apparatus and communication system ofEmbodiment 5, in addition to the effects ofEmbodiment 1, sincepropagation control section701controls transmitting section705 andmodulation section704 in transmitting a reference signal so as to vary the propagation environment, it is possible to vary the encryption key at arbitrary timing. Therefore, the possibility is eliminated that the third party decrypts the encryption key, and high security is provided.
Embodiment 6
Frame structures explained inEmbodiments 1 to 5 are based on that inFIG. 12(a). In other words, two bursts exist separately, where one burst includes a reference signal, while the other one includes an encrypted signal. Using this scheme increases a reference signal period, and thereby provides an advantage that an error in estimation is decreased on receiving side.
FIG. 12(b) is to explain a method of inserting a reference signal into a data stream (or burst) for a predetermined period in a frame structure. Using this method makes it possible to provide/receive the encryption key concurrently with encrypted signal, and thus enables efficient transmission.
Meanwhile,FIG. 12(c) illustrates an arrangement of an encryption key indicated by the reference signal and an encryption key for use in encrypted signal. As illustrated inFIG. 12(c), a change in time (or frequency) is provided between an encryption key indicated by the reference signal and a data signal corresponding to the key, it is thereby possible to provide/receive the encryption key and encrypted signal separately, and there is an advantage of decreasing the risk of leaks of the key and signal to the third party.
Provision and receipt of the encryption key is carried out using reference signals, as explained in communication procedures in the other Embodiments, and corresponds to procedures (1) and (2) inFIG. 11. InFIG. 11, provision and receipt of the encryption key is not carried out in communications except communications of procedures of (1) and (2), which indicates that decoding operation is not affected by the propagation state of encrypted communication. In other words, the propagation control is carried out at the time of transmitting the reference signal so that characteristic propagation information can be conveyed corresponding to the propagation environment, thereby enabling stable provision and receipt of the encryption key.
The operation of the propagation control in response to communication procedures will be described with reference toFIG. 13.
The communication in the frame structure inFIG. 12(a) will be described first.
In transmitting a reference signal in (1a) inFIG. 13, the propagation control is to perform communications for provision and receipt of the encryption key as described in the other Embodiments. At this point, when propagation estimation has been carried out before, it is possible to perform control for compensating for a difference between a result of the estimation and the propagation state corresponding to the encryption key. In this way, the receiving side is capable of receiving the reference signal in an excellent propagation state, resulting in stable provision and receipt of the encryption key. Meanwhile, when performing data communications (encrypted signal) in (2a) inFIG. 13, the encryption key has arrived at the receiving side already, and the propagation information does not need to be used in reception and decoding. Therefore, data communications can be carried out stably by performing control such that the reception is carried out stably (there are known beam forming, equalization on transmitting side, and transmission diversity, for example). Thereafter, performing communications subsequent to (3a) inFIG. 13 expects significant increases in communication quality.
Communications in the frame structure (b) inFIG. 12 will be described below.
As illustrated in (1b) inFIG. 13, it is considered switching the propagation control scheme between reference signal communications and data communications. Using this system enables concurrent provisions of the encryption key and encrypted signal. It is described earlier that the transmitting side is able to select encryption, and using this feature makes it possible to flexibly vary the encryption key for each block. Further, the feature is provided that stable communications can be carried out as described above.
Meanwhile, as a matter of course, it is possible to use the same propagation control scheme in reference signal communications and data communications. In this case, it is possible to use the reference signal in decoding in data communications, and increases in communication quality are expected.
In the above descriptions, the reference signal is assumed to be a known signal. However, the reference signal does not need to be a known signal. In this case, a variation in propagation is estimated while demodulating, and an encryption key is determined. In this way, information for determining the encryption key is increased, and it is made possible to detect the encryption key with stability. Further, as the reference signal, it is possible to use a pilot signal used in QAM or the like, a synchronization signal sequence for burst synchronization used in TDMA or the like, and so on. Using such a signal provides a feature of providing communications with high security and with little changes in the conventional configuration.
As illustrated in frame structures (b) and (c) inFIG. 12, inserting reference signals into a data stream provides an advantage that procedures of (1) and (3) inFIG. 11 or of (2) and (4) inFIG. 11 are implemented at the same time.
In the above descriptions, beam forming, precoding (equalization on transmitting side) and transmission diversity is considered as the propagation control scheme in data communications. Further, it is considered using control of MIMO (Multi-Input Multi-Output) and Space Division Multiplexing. In particular, MIMO multiplexing technique and Space Division Multiplexing technique are to increase the channel capacity using the propagation characteristic actively, and are good consistent with the technique described in the present invention where the propagation characteristic is actively used. For example, after the confidential communication is performed using the technique described in one of Embodiments as described above, the propagation control is changed to the control for MIMO (or Space Division Multiplexing) to succeed, and it is thereby possible to perform MIMO or Space Division Multiplexing. In this way, without adding a specific technical constitution, it is possible to increase the confidentiality of important information, while increasing the channel capacity in data communications.
Thus, according to the communication apparatus and communication system ofEmbodiment 6, in addition to the effects ofEmbodiments 1 to 5, propagation environments are changed between the time of transmitting a signal to cause a communicating party to acquire an encryption key (first data) based on the propagation environment and the time of transmitting signals other than such a signal, whereby it is possible to transmit signals other than the signal to transmit to cause a communicating party to acquire an encryption key, in optimal control scheme corresponding to the communication environment.
In addition, inEmbodiment 6 the reference signal is assumed to be a known signal. However, the reference signal does not need to be a known signal. In this case, a change in propagation is estimated while demodulating, and an encryption key is determined. In this way, information for determining the encryption key is increased, and it is made possible to detect the encryption key with stability. Further, as the reference signal, it is possible to use a pilot signal used in QAM or the like, a synchronization signal sequence for burst synchronization used in TDMA or the like, and so on. Using such a signal provides a feature of providing communications with high security and with little changes in the conventional configuration.
Embodiment 7
FIG. 14 illustrates part of a receiving apparatus in a communication apparatus according toEmbodiment 7 of the present invention, andFIG. 15 illustrates part of a transmitting apparatus in the communication apparatus according toEmbodiment 7. In addition, the same sections as those in the communication apparatus inEmbodiment 1 are assigned the same reference numerals, and descriptions thereof are omitted.
A method is described herein of applying the present invention to a multiplexed signal. CDMA is described as an example of a multiple access system.
Reception demodulation section150 outputs a received signal of a received RF signal and demodulated information.Reception demodulation section150 has receivingsection1401,despreading section1402,propagation estimating section1405 anddemodulation section1403.
FIG. 14 illustrates part of the receiving apparatus for use in the present invention.
Receivingsection1401 receives an RF signal and propagation information, and controls the RF signal in a suitable reception state to output a received signal.Despreading section1402 calculates the convolution of the received signal and a spreading code in response to the channel, and outputs a despread signal.Demodulation section1403 performs suitable demodulation using the received signal and propagation information, and outputs demodulated information.Decoding section1404 receives the encryption key information and demodulated information, decodes the encryption of the demodulated information using the encryption key information, and outputs security data.Propagation estimating section1405 performs propagation estimation on each channel, and outputs propagation information for each channel.Demodulation section1403 performs suitable demodulation using the received signal and propagation information, and outputs demodulated information. Comparingsection1406 compares the propagation information between channels, and outputs a comparison result (first data). Encryptionkey generating section1407 receives the propagation information, and outputs the encryption key information (first data).
FIG. 15 illustrates part of the transmitting apparatus for use in the present invention.
Data supplying sections1501 and1502 hold data of respective channels.Modulation spreading sections1503 and1504 modulate data of respective channels, spread the data with respective spreading codes of the channels, and outputs spread signals.Weighting section1505 multiplies the transmission signal by each transmission weighting coefficient. Transmittingsection1506 converts the modulated signal into an RF signal to be transmitted to output.Antenna1507 transmits the transmission signal.Data supplying section1508 stores the first data.Reference propagation buffer1509 holds the reference information of propagation state.Propagation control section1510 receives an encryption key, second data and propagation information, and calculates the transmission weighting coefficient.
The operation of transmittingapparatus1500 will be described below.
In transmittingapparatus1500, data of a plurality of channels are provided fromdata supplying sections1501 and1502, modulated, and spread with respective spreading codes set in advance, thereby generating spread signals for each channel.Data supplying section1508 outputs first data, andpropagation control section1510 receives the first data, and performs propagation control in response to the first data using the transmission weighting coefficients, based on the information fromreference propagation buffer1509 that holds the propagation information estimated previously.Weighting section1505 performs weighting calculation using the transmission weighting coefficients, and the signals are transmitted throughtransmitting section1506.
For simplicity in description, it is assumed thatdata supplying section1508 does not output data. The control inpropagation control section1510 is the same as that inpropagation control section701 as illustrated inFIG. 7. For example, the case of a single channel matches a situation where a reference signal is output as described inEmbodiment 4. A case of a plurality of channels is considered. Spreading codes are set for each channel, but there is not correlation between the codes, and therefore, are considered as being processed independently in signal processing. In other words,propagation control section1510 is capable of performing propagation control for each channel using M×N transmission weighting coefficients or more when the number of channels and the number of antennas are respectively assumed to be M and N.
It is understood from the forgoing that propagation control can be carried out corresponding to the encryption key as inEmbodiment 5.
When a plurality of channels is multiplexed, it is possible to control reception power at the receiving end by performing propagation control for each channel. For example, it is possible to perform control such that which channel is set for the highest power corresponding to the state of an encryption key, and the receiving apparatus is capable of determining the encryption key from the relationship between the channel number and reception power. Further, as described above, since, for example, a delay profile is set as a propagation parameter, it is understood that more pieces of secure information can be transmitted by using, for example, the delay profile for the encryption key information and further using the first data for the relationship between the channel and reception power (or, it may be possible to use the information and data in the inverse way, or use only the encryption key information or only the second data).
Further, it is possible to set data stored in eitherdata supplying section1501 or1502 as a reference signal. In this way, the receiving apparatus is capable of performing propagation estimation using a reference signal at the same time as that of the first data and second data, and thus has a feature of enabling transmission that is remarkably high in efficiency.
The operation of the receiving apparatus will be described below.
A method of providing/receiving the encryption key information using the propagation parameter (delay profile) can be performed in the same way as described above except the despreading processing. A case is only described herein that the information is superimposed on the relationship between the multiplexed channels and reception power.
Receivingsection1401 receives an RF signal input fromantenna101, and outputs a received signal.Despreading section1402 calculates the convolution of the received signal with spreading codes predetermined for each channel, and outputs a number of despread signals the same as the number of channels.Propagation estimating section1405 receives the despread signals, and estimates the propagation state. It is assumed herein to use the reception power among propagation states. Whenpropagation estimating section1405 outputs reception power for each channel, comparingsection1406 compares the reception power with one another, and outputs the result as the encryption key information (or first data).
Using thus determined encryption key,decoding section1404 decodes subsequent demodulated information, and obtains security data.
In this way, according to the communication apparatus and communication system ofEmbodiment 7, in addition to the effects ofEmbodiment 1, comparingsection1406 is capable of providing a result of comparison of propagation parameter such as reception power of each channel signal in the multiplexed received signal, and it is thereby possible to increase the information amount in the case of transmitting a multiplexed signal. Further, according to the communication apparatus and communication system ofEmbodiment 7, in the case of multiplexing a plurality of channels, performing propagation estimation for each channel enables controlling the reception power at the receiving end. For example, it is possible to perform control such that which channel is set for the highest power corresponding to the state of an encryption key, and the receiving apparatus is capable of determining an encryption key using the relationship between the channel number and reception power, whereby it is possible to maintain the security of data of a plurality of channels. Furthermore, according to the communication apparatus and communication system ofEmbodiment 7, it is possible that the encryption key is included in a propagation parameter such as a delay profile in the first data, and is set as the second data different from the first data using the relationship between the channel and reception power, thus enabling transmission of more pieces of secure information.
In addition, inEmbodiment 7 CDMA is described as an example, it is naturally apparent using OFDM obtains the same effectiveness. In the case of OFDM, in the above descriptions, channels are replaced with subcarriers, the despreading processing inFIG. 14 is replaced with Fourier transform processing, and the spreading processing inFIG. 15 is replaced with the inverse Fourier transform processing.
Embodiment 8
FIG. 16 is a block diagram illustrating a configuration of part of a communication apparatus according toEmbodiment 8. In addition, a configuration of the entire communication apparatus is the same as that inFIG. 1, and descriptions thereof are omitted.
Embodiment 8 describes a scheme using information of the direction of arrival as the propagation information.FIG. 16 illustrates a specific block diagram ofpropagation estimating section203 inFIG. 7 in performing estimation of direction of arrival.
Propagation estimating section203 hasbuffer1601, correlationmatrix manipulation section1602,matrix manipulation section1603, anglespectrum calculating section1604 andbuffer1605.
Buffer1601 temporarily holds an input signal. Correlationmatrix manipulation section1602 obtains a correlation matrix of the input signal.Matrix manipulation section1603 receives the calculated correlation matrix, outputs a characteristic vector obtained in matrix manipulation (herein, characteristic vector). Anglespectrum calculating section1604 receives the characteristic vector, calculates the angle spectrum, and outputs the information of direction-of-arrival estimation.Buffer1605 temporarily holds the calculation result.
The aforementioned configuration uses MUSIC method knows as a method of estimating the direction of arrival. In addition to the method, there are known Fourier method and CAME method, which are sorted according to the content of manipulation inmatrix manipulation section1603.
The operation ofpropagation estimating section203 performing the direction of arrival estimation as the propagation information in the aforementioned configuration will be described specifically below.
Buffer1601 holds received signals input from a plurality of antenna elements. Correlationmatrix manipulation section1602 obtains correlation matrixes of the held received signals, and calculates the characteristic vectors. Anglespectrum calculating section1604 calculates arrival pattern information of received signal from the characteristic vectors to output.Buffer1605 holds thus obtained arrival pattern information of received signal.FIG. 17 illustrates an example of thus obtained information of the direction-of-arrival of received signal.FIG. 17 shows a result of estimation of a case where two directions of arrival of received signal exist.
Procedures as shown inFIG. 11 are explained using thus obtained arrival pattern information of received signal. In addition, the operation inEmbodiment 8 different from the operation inEmbodiment 5 is only described.
(1) Base Station: Transmission of First Reference Signal
The base station transmits a first reference signal for propagation estimation to the terminal. At this time, the base station performs beam steering using a plurality of antenna elements, and transmits the signal while varying a radiation pattern.
In the terminal, upon detecting the reference signal transmitted from the base station,propagation estimating section203 performs the direction-of-arrival estimation, and stores in a reference table data of comparison of the radiation direction that the base station controls and the arrival pattern information of received signal in the terminal. The aforementioned operation generates the reference table of the radiation pattern and the reception arrival pattern in the base station and terminal.
(2) Terminal: Transmission of Second Reference Signal
The terminal selects the encryption key (first key), and outputs the direction-of-arrival information corresponding to the key from the codebook. Using the direction-of-arrival information, the terminal detects the most similar radiation pattern stored in the reference table, and sets the arrival pattern information corresponding to the most similar one as a radiation pattern in transmission. Then, the terminal transmits the second reference signal for propagation estimation in the base station while controlling so as to obtain the set radiation pattern.
In the base station,propagation estimating section203 performs the direction-of-arrival estimation, and outputs the reception arrival pattern.Coding section703 selects an encryption key (second key) from the reception arrival pattern and codebook to output todecoding section207 viabuffer206.
(3) Base Station: Transmission of Encrypted Signal
Using the reception arrival pattern obtained in (2), the base station sets a radiation pattern such that the reception state in the terminal is excellent. Then, the base station encrypts the security data using the second key, and transmits the encrypted signal while controlling so as to obtain the set radiation pattern.
The terminal demodulates the RF signal inreception demodulation section708, decodes the demodulated signal using the first key indecoding section207, and outputs the security data.
(4) Terminal: Transmission of Encrypted Signal
Using the reception arrival pattern obtained in (1), the terminal sets a radiation pattern such that the reception state in the base station is excellent. Then, the terminal encrypts the security data using the first key, and transmits the encrypted signal while controlling so as to obtain the set radiation pattern.
The base station demodulates the RF signal inreception demodulation section708, decodes the demodulated signal using the second key indecoding section207, and outputs the security data.
Thus, according to the communication apparatus and communication system ofEmbodiment 8, in addition to the effects ofEmbodiment 1, anglespectrum calculating section1604 uses a result of the direction-of-arrival estimation of received signal as an estimation value of propagation environment, the reception arrival pattern arriving at the third party greatly changes, and it is thereby possible to ensure extremely high security.
In addition, inEmbodiment 8 the encryption key information is generated using the reception arrival pattern. However, the present invention is not limited to such a case, and has a feature of expecting higher security in a combination with a scheme using the delay profile as the propagation information. Further, inEmbodiment 8 it may be possible to superimpose information on the direction of arrival of received signal, or to multiplex communications on the direction of arrival. Further, as in other Embodiments, the communication procedures are not limited to those described in this Embodiment.
Embodiment 9
Embodiment 9 describes a security communication scheme using polarization.
FIG. 18 is a diagram illustrating a configuration of transmitting/receivingapparatus1800 that is a communication apparatus according toEmbodiment 9. In addition, inFIG. 18 the same sections as inFIG. 2 are assigned the same reference numerals as inFIG. 2, and descriptions thereof are omitted.
Antenna1812 hasvertical polarization antenna1801 andhorizontal polarization antenna1802.Propagation estimating section203 has phasedifference detecting section1803, electric fieldstrength detecting section1804 andpropagation estimating section1805.Polarization control section1813 has coefficient calculatingsection1806,codebook1807 andbuffer section1808.Transmission modulation section252 hasmodulation section1809,weighting section1810 and transmittingsection1811.
Vertical polarization antenna1801 receives a vertically polarized component.Horizontal polarization antenna1802 receives a horizontally polarized component. Phasedifference detecting section1803 detects a phase difference from the polarized received signals. Electric fieldstrength detecting section1804 detects respective electric field strengths from the vertically polarized received signal and horizontally polarized received signal.Polarization estimating section1805 estimates a polarization state from the phase difference and electric field strengths.Coefficient calculating section1806 receives the propagation information and polarization code indicated in the codebook, performs control of a phase difference and electric field strengths between/of the vertically polarized transmission signal and horizontally polarized transmission signal, and calculates coefficients to perform polarization control of transmission signal.Codebook1807 stores the relationship between the coefficient and polarization code.Buffer section1808 temporarily holds the data input fromcoefficient calculating section1806 to output toweighting section1810.
Modulation section1809 receives the communication information, modulates the information with a predetermined modulation scheme, and outputs a modulated signal.
Weighting section1810 multiplies the modulated signal by a weighting coefficient corresponding to each antenna element, and outputs weighted modulated signals.
Transmittingsection1811 receives the weighted modulated signals corresponding to the antenna elements, and converts the signals to respective RF signals corresponding to the antenna elements to output.
The operation of transmitting/receivingapparatus1800 will be described below.
Vertical polarization antenna1801 andhorizontal polarization antenna1802 select respective polarized components of received signal selectively, and output respective RF signals toreception demodulation section250.Reception modulation section250 outputs received signals corresponding to respective polarized components topropagation estimating section203. Inpropagation estimating section203,polarization estimating section1805 receives the reception phase difference information and reception electric field strength information respectively output from phasedifference detecting section1803 and electric fieldstrength detecting section1804, and outputs the polarization information of received signal.
FIG. 19 shows a specific example of polarization. Ev indicates an electric field strength of vertically polarized wave, Eh indicates an electric field strength of horizontally polarized wave, p indicates a circulating direction, and0 indicates an angle of the major axis.
Coding section205 codes thus obtained polarization information into polarization code to select an encryption key. The polarization code is input topolarization control section1813. Inpolarization control section1813,coefficient calculating section1806 retrieves the polarization state corresponding to the polarization code fromcodebook1807, calculates transmission weighting coefficients while performing the phase control and electric field strength control, and holds the weighting coefficients inbuffer section1808. Using the transmission weighting coefficients held inbuffer section1808,transmission modulation section252 performs weighting on the vertically polarized transmission signal and horizontally polarized transmission signal, and the RF signals are transmitted from corresponding antenna elements.
Operating as described above enables information such as vertically polarized wave, horizontally polarized wave, angle of the major axis, phase between polarized components, and circulating direction to be used as an encryption key.
Among propagation states, the polarization wave has a feature of being separated only by antennas.
In addition, it is assumed thatcodebook1807 stores quantization vectors corresponding to polarization states (such as polarization plane and circulating direction). Communication procedures are almost the same as in other Embodiments. Detection of delay profile or propagation control is replaced with polarization information or polarization control, respectively.
Thus, according to the communication apparatus and communication system ofEmbodiment 9, in addition to the effects ofEmbodiment 1,polarization estimating section1805 estimates the polarization state from the electric field strengths and phase difference to obtain an estimation value of propagation environment, and the polarized waves are only separated by antennas. Therefore, even if another receiving apparatus intercepts the radio signal, the apparatus needs corresponding antennas, and high security is thus expected.
In addition, inEmbodiment 9, it may possible to use information together with such as the delay profile, reception power and the direction of arrival.
Embodiment 10
In addition to the methods as described inEmbodiments 1 to 9, a method will be described of making the interception by third party impossible using a method of controlling the communication state in a reception terminal and superimposing the information on the controlled state.
Embodiment 5 describes enabling the propagation state on the receiving side to be controlled arbitrarily. Using this method enables physically confidential communications, which is explained briefly.
Embodiment 5 indicates the case that the propagation state can be controlled using weighting coefficients of transmission signal, which is equivalent to conveying an arbitrary reception state to the receiving side, i.e, which means that communications can be carried out through propagation parameters.
In other words, it is suggested that communications can be carried out through propagation parameters, by substituting the information for the content (encryption key in the figure) in the codebook as illustrated inFIG. 5.
The communication using this method uses, as a base, propagation environments formed between communicating parties as described above, and therefore has a feature of having high confidentiality in principle over apparatuses different in physical position. Further, using propagation parameters specifies a propagation path, i.e., a place of the communicating party, and is applicable to specification and authentication of a communicating party.
This method is applicable irrespective of conventionally used modulation schemes (such as ASM, FSK, PSK and QAM), and expects sheer increases in data capacity.
Further, this method has a feature of being applicable irrespective of multiplexing methods (such as TDMA, FDMA, CDMA and OFDM). The method enables the multiplexing using the spatial orthogonality. In other words, combining the multiplexing method using the spatial orthogonality and the above-mentioned multiplexing method expects the effectiveness of increasing the conventional channel capacity greatly.
It is apparent that when an apparatus does not require particularly the processing of encryption and decoding as described in either Embodiment, such functions are not essential to the apparatus, and the apparatus operates without such functions.
Further, when it is not necessary to transmit the encryption key information in procedures as described in either Embodiment, increases in communication quality are expected by performing the propagation control to be optimal in communications (for example, by removing the multipath component, or setting the reception power at a maximum value).
Furthermore, also at the time of reception, by performing the control (as in the foregoing) such that a received signal is optimal using the reception weighting coefficients, increases in communication quality are also expected.
A configuration of the receiving apparatus inEmbodiment 10 will be described with reference toFIG. 20.
FIG. 20 illustrates a configuration of receivingapparatus2000 that is the communication apparatus according toEmbodiment 10. In addition, the same sections as those inFIG. 1 are assigned the same reference numerals inFIG. 1, and descriptions thereof are omitted.
Propagation estimating section103 estimates the propagation characteristic from the received signal input from receivingsection102, and outputs the estimated propagation information as data. The propagation information output frompropagation estimating section103 is information of whether or not to discard the data output fromdemodulation section104.
In the case of the receiving apparatus that outputs the propagation characteristic as the communication information, the configuration as illustrated inFIG. 20 enables its implementation, and a transmitting section is not required necessarily. By configuring as described above, it is possible to use the propagation information as the first data that is information with high confidentiality. In this case, it is considered that a transmitting apparatus superimposes important information on the first data, and further, it is possible to use to specify a terminal that transmits a communication signal using the first data.
Thus, according to the communication apparatus and communication system ofEmbodiment 10, in addition to the effects ofEmbodiment 1, sincepropagation estimating section103 uses the estimated propagation information as data, it is possible to increase the information amount to transmit, improve the transmission efficiency, and transmit the information with high confidentiality as the propagation information, thus enabling reliable security to be ensured. Further, according to the communication apparatus and communication system ofEmbodiment 10, it is possible to transmit information with low confidentiality using the conventional communication scheme, thereby enabling a communication apparatus with versatility to be provided.
Embodiment 11
FIG. 21 is a diagram illustrating a configuration of receivingapparatus2100 that is a communication apparatus according toEmbodiment 11. In addition, the same sections as inFIG. 1 are assigned the same reference numerals as inFIG. 1, and descriptions thereof are omitted.
Coding section105 encodes the estimated propagation information input frompropagation estimating section103 as the first data. As a technique of coding the estimated propagation information, it is possible to code the information, for example, using a vector quantization method, and to output as the transmission information. In this way, such a feature is provided that coded data can be output with simplicity and with stability on inputs of various parameters.
Thus, according to the communication apparatus and communication system ofEmbodiment 11, in addition to the effects ofEmbodiments 1 and 10, since codingsection105 encodes the propagation information to extract as data, increases in communication quality are expected.
Embodiment 12
FIG. 22 is a diagram illustrating a configuration of receivingapparatus2200 that is a communication apparatus according toEmbodiment 12. In addition, the same sections as inFIG. 22 are assigned the same reference numerals as inFIG. 22, and descriptions thereof are omitted.
Despreading section2201 calculates the convolution of a received signal and a spreading code associated with the channel, and outputs a despread signal.
Comparingsection2202 encodes the propagation information for each channel, compares coded propagation information of each channel with one another, and outputs a result of comparison as the first data.
Thus, according to the communication apparatus and communication system ofEmbodiment 12, in addition to the effects ofEmbodiment 1, comparingsection2202 compares data of a plurality of channels with one another, and obtains the first data from a result of comparison, resulting in features that the confidentiality is enhanced and that more items of data can be transmitted.
In addition, inEmbodiment 12, a despreading section is provided to obtain the data using a CDMA signal. The present invention is not limited to the foregoing, and it may be possible to obtain data by receiving a signal subjected to orthogonal frequency division multiplexing and comparing each of signals assigned to subcarriers with one another. Further, the communication apparatus ofEmbodiment 12 is applicable to a case of performing communications using MIMO (Multi-Input Multi-Output) signals.
Embodiment 13
InEmbodiment 13,FIG. 23 is a diagram illustrating receivingapparatus2300, andFIG. 24 is a diagram illustrating transmitting/receiving apparatus2400. In addition, the same sections as those of receivingapparatus100 or transmitting/receivingapparatus200 inFIG. 2 are assigned the same reference numerals as inFIG. 1 or 2, and descriptions thereof are omitted.
Receiving apparatus2300 will be described first.
Reception demodulation section150 receives a received RF signal, and outputs the estimated propagation information and demodulated signal.Coding section105 receives the propagation information to extract its characteristic, and outputs propagation characteristic code (first data). Decodingsection107 receives the code indicating the characteristic of the propagation information and demodulated signal, performs deinterleaving using an interleaving pattern associated with the propagation characteristic code, adds null information (depuncturing), decodes the signal, outputs security data (second data), and hasdeinterleaver2301 that receives the demodulated signal and performs deinterleaving based on the interleaving pattern associated with the propagation characteristic code,depuncturing section2302 which receives the deinterleaved signal, and adds neutral information (in judging a code in the decoder disposed subsequently) to a signal of a portion removed based on the puncturing pattern associated with the propagation characteristic code, anddecoder2303 which receives the depuncutured signal, and decodes the signal corresponding to the convolutional code associated with the propagation characteristic signal.
Transmitting/receiving apparatus2400 will be described below.
Reception demodulation section250 receives a received RF signal, and outputs the propagation information indicative of the estimated propagation state and demodulated information. Decodingsection207 receives the code indicating the characteristic of the propagation information and demodulated signal, performs deinterleaving using an interleaving pattern associated with the propagation characteristic code, adds null information (depuncturing), decodes the signal, outputs data, and hasdeinterleaver2401 that receives the demodulated signal and performs deinterleaving based on the interleaving pattern associated with the propagation characteristic code,depuncturing section2402 which receives the deinterleaved signal, and adds neutral information (in judging a code in the decoder disposed subsequently) to a signal of a portion removed based on the puncturing pattern associated with the propagation characteristic code, anddecoder2403 which receives the depunctured signal, and decodes the signal corresponding to the convolutional code associated with the propagation characteristic signal.Coding section205 receives the propagation information to extract its characteristic, and outputs a propagation characteristic code (first data).Propagation control section2404 outputs transmission weighting coefficients to control the propagation state to be brought close to the input propagation characteristic code.Coding section2409 receives the data, encodes the data, outputs the coded information subjected to puncturing and interleaving, and hasencoder2405 that receives the data and outputs a convolutional code, puncturingsection2406 that receives the convolutional code and outputs a punctured code where part of the code is removed, andinterleaver2407 which rearranges the punctured code in a predetermined order to output coded information.Transmission modulation section2410 receives the coded information, modulates the information, performs the propagation control, outputs an RF signal to transmit, and hasmodulation section211 which receives the coded information, performs predetermined modulation on the information, and outputs a modulated signal,transmission weighing section2408 which receives the modulated signal, and performs propagation control by multiplying the signal by each of the weighting coefficients, and transmittingsection212 which receives transmission weighted signals, and outputs RF signals to transmit.
The operation of transmitting/receivingapparatus2400 will be described with reference toFIG. 25. The descriptions are given assuming that transmitting/receivingapparatus2400 is a base station or terminal inFIG. 25. In addition, inEmbodiment 13, the terminal is not limited to the configuration of transmitting/receivingapparatus2400, and may have the configuration of receivingapparatus2300.
In the operation of transmitting/receivingapparatus2400 ofEmbodiment 13, sections that have the same operations as inFIG. 3 will not be further explained.
Interleaving patterns, puncturing patterns and encoding pattern associated with propagation states re prepared in advance, and the base station and terminal share the information.
The terminal estimates the propagation state, using a reference signal transmitted from the base station, and sets various patterns based on the estimated state. Similarly, the base station estimates the propagation state, using a reference signal transmitted from the terminal, and sets various patterns based on the estimated state. At this point, among set interleaving patterns, puncturing patterns and encoding patterns, the same patters are selected in the base station and terminal, as described earlier.
As in the foregoing, when encoding patterns are set for the base station and terminal, the base station and terminal start communications. In the base station,encoder2405 performs convolutional coding on the information based on the encoding pattern.Puncturing section2406 performs puncturing on the resultant.Interleaver2407 performs interleaving on the resultant. Thus obtained coded information is provided totransmission modulation section2410.Propagation control section2404 receives the propagation characteristic code output fromcoding section205, and outputs transmission weighting coefficients. Transmittingsection212 outputs RF signals to transmit. The calculation of transmission weighting coefficients is the same as in described inEmbodiment 3.
In the terminal having received the signal from the base station,reception demodulation section250 receives the signal, performs the propagation estimation, demodulates the signal, and outputs the propagation information and demodulated signal. Based on the input propagation characteristic code, decodingsection207 selects the interleaving pattern, puncturing pattern, and encoding pattern. Decodingsection207 receives the propagation characteristic code and demodulated signal.Deinterleaver2401 performs deinterleaving corresponding to the inverse pattern of interleaving, and outputs a deinterleaved signal.Depuncturing section2402 receives the deinterleaved signal, and outputs a depunctured signal where a null signal (of a neutral value in judgment in the decoder disposed subsequently) is inserted (depancturing) to a portion corresponding to the puncturing pattern.Decoder2403 decodes the depunctured signal based on the input encoding pattern, and outputs data.
The transmitting side and receiving side share various encoding patterns as described above, and it is understood that data transmitted from the base station is provided to the terminal properly.
(0) is the Same Operation inFIG. 3.
(1) Base station: Transmission of First Reference Signal
The base station outputs a reference signal for propagation estimation performed in the terminal as a first reference signal. In the terminal awaiting the signal from the base station,propagation estimating section203 detects the first reference signal from the received signal, and performs the propagation estimation from the received signal and the reference signal that is a known signal.Coding section205 receives the propagation information frompropagation estimating section203, extracts a characteristic of the propagation state, and outputs the propagation characteristic code.Deinterleaver2401,depuncturing section2402 anddecoder2403 respectively have a table of interleaving pattern, table of puncturing pattern and a table of encoding pattern, where each table is associated with the propagation characteristic code, and select patterns (encoding patterns) corresponding to the input propagation characteristic code.
(2) Terminal: Transmission of Second Reference Signal
The terminal transmits a reference signal for propagation estimation performed in the base station as a second reference signal as in (1).
Upon receiving the signal from the terminal, the base station detects the second reference signal, andpropagation estimating section203 performs propagation estimation from the received signal and the reference signal that is a known signal. As in (1),coding section205 converts the propagation information output frompropagation estimating section203 into a propagation characteristic code, anddecoding section207 selects an encoding pattern corresponding to the propagation characteristic code.
(3) Base station: Transmission of Coded Signal
In the base station,coding section2409 outputs coded information obtained by performing encoding, puncturing and interleaving on the data using coding parameters obtained in item (2). The coded information is output totransmission modulation section2410, and the RF signal is transmitted as a coded signal viamodulation section211,transmission weighting section2408, and transmittingsection212.
In the terminal, upon receiving the coded signal,reception demodulation section250 demodulates the RF signal into the demodulated signal via receivingsection202 anddemodulation section204. Decodingsection207 performs deinterleaving, depuncturing, and decoding in this order using the demodulated signal and coding parameter obtained in (1), and outputs the data.
(4) Terminal: Transmission of Coded Signal
In the terminal,coding section2409 outputs the coded information obtained by performing encoding, puncturing and interleaving on the data using coding parameters obtained in item (1). The coded information is output totransmission modulation section2410, and the RF signal is transmitted as a coded signal viamodulation section211,transmission weighting section2408, and transmittingsection212.
In the base station, upon receiving the coded signal,reception demodulation section250 demodulates the RF signal into the demodulated signal via receivingsection202 anddemodulation section204. Decodingsection207 performs deinterleaving, depuncturing, and decoding in this order using the demodulated signal and coding parameter obtained in (2), and outputs the data. Communicating as described above enables data to be provided and received.
Thus, according to the communication apparatus and communication system ofEmbodiment 13, in addition to the effects ofEmbodiment 1,coding section205 encodes control information such as interleaving pattern and puncturing pattern from the estimation value of the propagation environment to obtain, and decodes the data using the obtained control information, whereby the optimal code (decoding) is made possible corresponding to the propagation state, and increases in communication quality are expected. Further, according to the communication apparatus and communication system ofEmbodiment 13, the conventional need is eliminated of providing and receiving the coding parameter by handshake in communication, and therefore, significant features are provided that enable a quick response to the propagation environment, as well as increased efficiency.
In addition, inEmbodiment 13, methods are described that communications are carried out by varying a coding parameter corresponding to the propagation state, and that the propagation control is carried out at the time of transmission. However, the present invention is not limited to such methods, and as described in other Embodiments, the methods are not inevitable, and an arbitrary method may be used of transmitting signals without performing the propagation control.
Further, whileEmbodiment 13 describes using convolutional code as a coding scheme, the present invention is not limited to such a coding scheme, and an arbitrary coding scheme is applicable such as block coding.
Moreover,Embodiment 13 describes the case of varying encoding pattern, puncturing pattern, and interleaving pattern as coding parameters corresponding to the propagation state. However, the present invention is not limited to such a case, and part of encoding pattern, puncturing pattern, and/or interleaving pattern may be fixed to use. It is thereby possible to simplify configurations of the coding section and decoding section. In this case, it is important to select a pattern effective in increasing the communication quality. For example, the puncturing pattern is one of important parameters that affect the data capacity and error rate greatly, and changes in the puncturing pattern are often the most effective. Further, it is apparent inEmbodiment 13 that procedures of (1) and (2) or procedures (3) and (4) inFIG. 25 can be in changed in its order.
The coded signal is provided and received after providing and receiving a reference signal. However, for example, it may be possible to dispose a reference signal and coded signal on the same format, and perform decoding (or coding) after the coding parameter is selected. Thus associating the data with a reference signal for coding parameter estimation has a feature of enabling fine selection of coding parameter.
Further, the method is described above of varying an optimal coding parameter corresponding to the propagation parameter. However, it is apparent that the modulation scheme (such as QPSK and 16QAM) or a spreading code length in CDMA can be varied as well as the coding parameter. In this way, advantages are obtained of providing communications with the same flexibility as in using the coding parameter and with higher efficiency.
Embodiment 14
The above-mentioned Embodiments describe primarily data communications using the propagation state, where accuracy in estimating the propagation state is required. Generally, the accuracy in estimation is proportional to the data amount used in calculation, and the increased data amount decreases the efficiency. Further, a result of propagation estimation is affected by auto-correlation of a reference signal used in the propagation estimation. The means for solving the aforementioned issues will be described below with reference toFIG. 26.
FIG. 26 is a diagram illustrating a configuration of receivingapparatus2600, andFIG. 27 is a diagram illustrating a configuration ofpropagation estimating section103. In addition, the same sections as inFIG. 1 or 4 are assigned the same reference numerals as inFIG. 1 or 4, and descriptions thereof are omitted.
Receiving apparatus2600 will be described first.
Reception demodulation section2604 has receivingsection102,propagation estimating section103, equalizingsection2602 anddemodulation section2603.
Equalizingdemodulation section2605 has equalizingsection2602 anddemodulation section2603.
Coding section2601 extracts a characteristic from input propagation information, and outputs a propagation characteristic code (first data).
Equalizingsection2602 receives the estimated propagation information and the propagation characteristic code indicative of the characteristic, and outputs an equalized signal obtained by removing unnecessary components from the received signal.
Demodulation section2603 receives the equalized signal to demodulate, and outputs a result of demodulation as demodulated information (second data).
Propagation estimating section103 will be described next.
Auto-correlation section2701 receives a reference signal sequence, and outputs the auto-correlation function of the sequence.Component removing section2702 receives a first delay profile and the auto-correlation function, and outputs a second delay profile obtained by removing the auto-correlation function component from the first delay profile. Average calculatingsection2703 receives the delay profile, and averages estimation results for a predetermined period.
The operation of receivingapparatus2600 will be described below.
The basic operation is the same as inFIG. 1, and only differences are explained. Receivingsection102 receives an RF signal to output a received signal.Propagation estimating section103 estimates the propagation state from the received signal. The information is input to receivingsection102, equalizingdemodulation section2605, andcoding section2601.Coding section2601 extracts a characteristic from the input propagation information, and outputs a propagation characteristic code to equalizingdemodulation section2605. Equalizingsection2602 receives the estimated propagation information and the propagation characteristic code indicative of a characteristic of information, and outputs an equalized signal obtained by removing an unnecessary component from the received signal.Demodulation section2603 demodulates the equalized signal from the propagation information and propagation characteristic code using suitable demodulation means, and outputs demodulated information.
In this way, the propagation information and propagation characteristic code is input to equalizingdemodulation section2605, and is used in equalizing or demodulation, and it is thereby possible to perform effective equalizing and demodulation using the information and code, thus resulting in a feature that increases in communication quality are expected.
In particular, when equalizingsection2602 that removes an unnecessary component (for example, multipath component) from the received signal is provided with a table of tap coefficient corresponding to the propagation characteristic code, and performs equalizing using the tap coefficient corresponding to the code, a significant feature is provided of reducing the calculation amount greatly. Then, performing equalizing on a difference between the propagation characteristic code and propagation information simplifies a configuration of the equalizing section.
The operation ofpropagation estimating section103 will be described below.
In thesection103, the input received signal is temporarily held, andconvolver403 calculates the correlation value of the received signal and reference signal sequence, and outputs a first delay profile. Auto-correlation section2701 calculates the auto-correlation of the reference signal sequence to output.
The delay profile is calculated by the following equation:
Ds(t)=Σ(Sr(t+n)R·(n))  (20)
Ds is an estimated delay profile, Sr is a received signal, and R is a reference signal sequence. The received signal is expressed using transmission signal St and propagation distortion Pd:
Sr(t)=Σ(St(t−n)·Pd(n))  (21)
=St(t)*Pd(t)
(where ‘*’ indicates the convolution)
Further, since transmission signal St is the reference signal:
Ds(t)=Σ((St(t+n)*Pd(t+n))·R(−n))  (22)
=(R(t)*Pd(t))*R(t)
=R(t)*Pd(t)*R(t)
Using the following equation:
AR(t)=R(t)*R(t)  (23)
equation (22) is transformed:
Ds(t)=AR(t)*Pd(t)  (24)
As an example, a case is considered of using maximal-length sequences (M sequences) as a reference signal. Codes of M sequences are 2{circumflex over ( )}n−1 when t=0 (0≤t<2{circumflex over ( )}n−1) in auto-correlation function AR(t) of equation (23), while being —1 except t=0 (FIG. 28(a)). It is thereby possible to regard the auto-correlation function as impulse, and to neglect it as frequency characteristics. Under some condition, the propagation characteristic (delay profile) as shown inFIG. 6 is obtained, and the frequency characteristic is assumed to be synthesized from the propagation characteristic and characteristic of the filter in the system. Meanwhile, in the case of using Gold sequences that is a kind of synthesis code for a reference signal sequence, as distinct from M sequences, Gold sequences are not constant when t≠0 in auto-correlation function AR(t) (FIG. 28(b)). Such an auto-correlation function is not impulse, and affects delay profile Ds(t) as a frequency characteristic.FIG. 29 shows estimation results in the case of using Gold sequences as the reference signal sequence. It is understood from the figure that the waveforms are affected by the auto-correlation function and differs from those inFIG. 6.
In this way, as indicated by equation (20), since the delay profile obtained herein includes the auto-correlation function of the reference signal sequence, and the function affects the characteristic of the reference signal sequence.Component removing section2702 performs calculation for removing a component of auto-correlation function (AR(t)) calculated in auto-correlation section2701 from the first delay profile. Specifically, it is known that the removal can be carried out by setting the impulse train given by the auto-correlation function as tap coefficients of IIR filter.
Further,average calculating section2703 averages results (second delay profile) of a plurality of calculations, and it is thereby possible to suppress errors caused by distortion and/or noise.
Thus, according to the communication apparatus and communication system ofEmbodiment 14, in addition to the effects ofEmbodiment 1, since equalizingsection2602 performs equalizing on the security data and then demodulates the data, it is possible to obtain the security data with high quality. Further, according to the communication apparatus and communication system ofEmbodiment 14, sincecomponent removing section2702 removes the frequency component of the reference signal, it is possible to obtain an estimation value of the propagation environment with high accuracy which is not affected by the frequency component of the reference signal.
In addition, inEmbodiment 14, it is possible to incorporatepropagation estimating section103 as illustrated inFIG. 26 andreception demodulation section2604 independently into a receiving apparatus, and it is apparent that the sections are applicable to apparatuses described in other Embodiments. In particular, implementing the section together provides significant effectiveness.
Embodiment 15
FIG. 30 is a diagram illustrating a configuration ofpropagation estimating section103 according to the communication apparatus ofEmbodiment 15. The communication apparatus usingpropagation estimating section103 has the same configuration as inFIG. 1, and descriptions thereof are omitted.
Buffer3001 temporarily stores the delay profile. Vector quantization section302 compares the stored delay profile with the content ofcodebook3008, and outputs the most similar code.Code transforming section3003 receives the vector quantized code, and obtains a code corresponding to the code fromcode storing section3007 incodebook3008. Auto-correlation section3004 receives a reference signal sequence and outputs the auto-correlation function.Convolution calculating section3005 calculates the convolution of the auto-correlation function and the content of quantization vector incodebook3008.Codebook3008 stores quantization vectors to be compared in vector quantization and codes corresponding to the quantization vectors, and has a configuration as illustrated inFIG. 5.Codebook3008 is comprised of quantizationvector storing section3006 andcode storing section3007, and configurations of thesection3006 and3007 are the same as those in other Embodiments.
The operation ofpropagation estimating section103 will be described below.
Buffer401 temporarily stores a received signal.Convolver403 receives the received signal sequence and reference signal sequence output from reference signalsequence storing section402, and performs sliding correlation calculation of the reference signal sequence and received signal sequence to obtain delay profiles. Buffer401 temporarily stores the delay profiles to output tovector quantization section3002. Meanwhile, auto-correlation section3004 calculates the auto-correlation of the reference signal sequence output from reference signalsequence storing section402, and outputs the value toconvolution calculating section3005.Vector quantization section3002 calculates a metric amount of the input delay profile and each vector in quantizationvector storing section3006 incodebook3008, and selects a vector that minimizes the amount, while performing metric calculation using the vector of which the convolution with the auto-correlation function is calculated by auto-correlation section3004.Vector quantization section3002 outputs thus selected vector code.Code transforming section3003 selects a code corresponding to the vector code output fromvector quantization section3002, fromcode storing section3007 incodebook3008, and outputs the propagation estimation information.
Thus, according to the communication apparatus and communication system ofEmbodiment 15, in addition to the effects ofEmbodiment 1, since convolution calculating3005 calculates the convolution of the auto-correlation function and the quantization vector in vector quantization, it is possible to obtain impulse response characteristics with high accuracy. Further, according to the communication apparatus and communication system ofEmbodiment 15, there is provided the effectiveness of obtaining the propagation estimation information with high accuracy. Furthermore, according to the communication apparatus and communication system ofEmbodiment 15, the auto-correlation function of a reference signal sequence undergoes the convolution with a vector in quantizationvector storing section3006, which is equivalent to giving a component of auto-correlation function AR(n) to a vector to search. Therefore, it is possible to perform a search without being affected by AR(n) in Ds(t) given by equation (20), and to set quantization vectors that are not affected by the auto-correlation function of the reference signal sequence. Moreover, according to the communication apparatus and communication system ofEmbodiment 15, since a component of the auto-correlation function is added to the quantization vector, it is only required to calculate the convolution for the auto-correlation function, and there is a significant feature of enabling implementation with ease.
Embodiment 16
FIG. 31 is a diagram illustrating a configuration of receivingapparatus3100 according to Embodiment 16.FIG. 32 is a diagram illustratingpropagation estimating section103, transformingsection3101 andcoding section105. In addition, the same sections as inFIG. 1 are assigned the same reference numerals as inFIG. 1, and descriptions thereof are omitted.
Transformingsection3101 performs Fourier transform on the delay profile, and selects primary coefficients from among coefficients obtained by Fourier transform to output.
Configurations ofpropagation estimating section103, transformingsection3101 andcoding section105 will be described below with reference toFIG. 32.FIG. 32 illustrates a method of enabling efficient coding by adding Fourier transform means.
Propagation estimating section103 will be described first.
Buffer3201 holds an input received signal of a predetermined length.
Reference signalsequence storing section3202 stores predetermined reference signal sequences to output sequentially.
Convolver3203 calculates the convolution of the temporarily held received signal and reference signal sequence to output correlation values.
Buffer3204 temporarily holds calculated correlation sequences.
Transformingsection3101 will be described below.
Fourier transform section3205 receives a delay profile to perform orthogonal transform such as Fourier transform.
Coefficient extracting section3206 receives the coefficients subjected to Fourier transform and selects only primary coefficients.
Coding section105 will be described below.
Vector quantization section3207 searches quantization vectors stored incodebook3209 for a quantization vector that is the most similar to an input vector train, and outputs the code.
Code transforming section3208 selects from codebook3209 an encryption key corresponding to the code output fromvector quantization section3207.
Codebook3209 stores quantization vectors and encryption keys as illustrated inFIG. 5.
FIG. 33 illustrates a specific situation of delay profile, where the horizontal axis indicates time (sample timing in the figure), while the vertical axis indicates signal amplitude. The correlation value is obtained from an in-phase component (I component) and quadrature component (Q component) of the received signal sequence. In the figure, the solid line represents the correlation coefficients of I component, while the dotted lines represent correlation coefficients of Q component. Hereinafter, I component and Q component respectively represent the real part and complex part of a complex number, are normalized using a complex signal with the maximum instantaneous amplitude within a predetermined time.
FIG. 33 shows a block diagram of illustration where a reference signal sequence is generated and then the delay profile is obtained. As shown inFIG. 33, in transmittingapparatus200, a reference signal sequence generated in reference signalsequence storing section3301 is output to bandlimitation filter3302, thereby forming a waveform of an output signal. The signal is transmitted over the air by transmittingsection3303. The transmitted electromagnetic wave arrives at receivingapparatus100 viapropagation space3304 formed of various reflection and refraction. In receivingapparatus100, a received signal sequence received in receivingsection3305 undergoes band limitation, channel selection and noise removal byband limitation filter3306.Correlation section3308 obtains the correlation with the band-limitation-processed received signal and reference signal sequence output from reference signalsequence storing section3307, and obtains the reference signal sequence transmitted from transmittingsection200. The aforementioned descriptions are explained with reference to equations. Since received signal Sr(t) expressed with equation (17) is processed by band limitation filter3306 (Fr(t)), Sr′ is expressed by the following equation:
Sr′(t)=Fr(t)*Sr(t)  (25)
=Fr(t)*(St(t)*Pd(t))
Since transmission signal St(t) in equation (25) results from a reference signal sequence passed through band limitation filter3302 (F(t)), Sr′ (t) is:
Sr′(t)=Fr(t)*((Ft(t)*Rs(t))*Pd(t))  (26)
Since the delay profile is obtained by calculating the convolution of the correlation sequence and reference signal sequence Rs(t) as described, Ds(t) is given as described below:
Ds(t)=Sr′(t)*Rs(t)  (27)
=Fr(t)*Ft(t)*Rs(t)*Rs(t)*Rs(t)*Pd(t)
=F(t)*ARs(t)*Pd(t)
Herein, F(t) is impulse response indicated by synthesis characteristic usingband limitation filter3302 andband limitation filter3306, and the filtering characteristic is referred to as band limitation filter. Meanwhile, ARs(t) represents the auto-correlation function of reference signal sequence Rs (t). Thus obtained equation (27) represents the characteristic obtained by performing band limitation on a signal in which propagation characteristic Pd(t) is superimposed on auto-correlation function ARs(t) using the band limitation filter. When auto-correlation function ARs(t) is impulse characteristic, the characteristic of equation (27) is equivalent to the characteristic of propagation characteristic Pd(t) subjected to the band limitation filter.
When propagation characteristic Pd(t) is considered as a frequency characteristic, it is understood that Ds (t) is obtained as the propagation characteristic given the frequency characteristic expressed by F(t). For example, when F(t) is a band limitation filter of −½fbw to +½fbw, propagation characteristic Pd−bw(t) is obtained which is subjected to band limitation of fbw. In the environment of interior propagation, since bands of 1 MHz or more are dominant in the frequency characteristic of propagation characteristic, and therefore, it is efficient particularly in communications with a symbol rate of 1 MHz or more. Meanwhile, in the case of exterior propagation, since bands of 10 kHz or more are dominant in the frequency characteristic of propagation characteristic, and therefore, it is efficient particularly in communications with a symbol rate of 10 kHz or more.
Since only propagation characteristic component limited to the frequency band given as F(t) is obtained as propagation characteristic Ds (t) calculated from the received signal, by transforming Ds(t) into the frequency domain inFourier transform section3205 in transformingsection3101, parameters condense into low frequencies. By usingcoefficient extracting section3206 for selecting and extracting low frequencies from signal sequence transformed into the frequency domain, it is possible to represent primary components of the propagation characteristic with a small number of parameters. Specifically,FIG. 29 illustrates a waveform of Ds(t) obtained as the propagation characteristic.FIG. 34 illustrates a signal sequence resulting from performing Fourier transform on the waveform. As can be seen fromFIG. 34, primary signal components are condensed into about twelve elements. In other words, it is possible to represent a signal sequence of 100 samples×2 or more as shown inFIG. 29 using approximately ten elements, thus enabling vector quantization with an extremely simple configuration.
Thus, according to the communication apparatus and communication system of Embodiment 16, in addition to the effects ofEmbodiment 1, since transformingsection3101 performs Fourier transform on the propagation estimation value and extracts only primary coefficients, it is possible to represent the propagation environment with numerals in the most obvious way. Further, according to the communication apparatus and communication system of Embodiment 16, sincevector quantization section3207 performs vector quantization on primary coefficients extracted by performing Fourier transform on the propagation estimation value in transformingsection3101, vector quantization can be implemented with an extremely simple configuration. Furthermore, according to the communication apparatus and communication system of Embodiment 16, since only primary coefficients are selected by Fourier transform and encoded, it is possible to obtain the first data efficiently with a small number of propagation parameters. Moreover, according to the communication apparatus and communication system of Embodiment 16, by inserting transformingsection3101 betweenpropagation estimating section103 andcoding section105, there is provided a remarkably significant feature of enabling great reduction in construction.
In addition, while in Embodiment 16 transformingsection3101 uses Fourier transform, the present invention is not limited to Fourier transform. It is known that the same effectiveness is obtained when using DCT (Discrete Cosine Transform), wavelet transform, and Hilbert transform.
Embodiment 17
FIG. 35 is a diagram illustrating a configuration of transmittingapparatus3500 according to Embodiment 17.FIG. 36 is a diagram illustrating a configuration of receivingapparatus3600 according to Embodiment 17.Transmitting apparatus3500 superimposes transmission data on signal power at the receiving end, as well as a modulated signal.Receiving apparatus3600 detects the information superimposed on the reception power of a received signal.
Transmitting apparatus3500 will be described first.
Modulation section3501 temporarily holds the first transmission data, and outputs channel modulated signals corresponding to the number of channels. Spreadingcode storing section3502 stores spreading codes corresponding to the number of channels to output. Spreadingsection3503 calculates the convolution of channel data with a spreading code corresponding to the channel to perform spectrum spreading.Propagation control section3504 receives the first transmission data, and calculates an antenna coefficient for each channel.Synthesis section3505 multiplies a spread signal by the antenna coefficient to output an antenna signal. Transmittingsection3506 performs frequency conversion on the weighted signal to amplify.Antenna section3507 transmits a signal of corresponding sequence.
Receiving apparatus3600 will be described below.
Antenna section3601 outputs a received RF signal. Receivingsection3602 receives the received RF signal, amplifies the power of the signal and converts the frequency of the signal. Spreadingcode storing section3603 stores spreading codes corresponding to the number of spreading codes.Despreading section3604 calculates the convolution of the received signal with the spreading code corresponding to the channel to despread, and outputs a channel signal.Demodulation section3605 receives channel signals and outputs demodulated channel signals.Power detecting section3606 detects reception power for each channel, and outputs reception power information.Buffer3607 temporarily holds demodulated channel signals and outputs the second data. Comparingsection3608 receives the reception power information, compares the power level with one another, and outputs the first data.
The operation of transmittingapparatus3500 and receivingapparatus3600 will be described with reference toFIG. 37.FIG. 37 is to explain a communication method of superimposing information on reception power obtained as propagation information.
InFIG. 37, the transmission apparatus has the same configuration as inFIG. 35, and receiving apparatus has the same configuration as inFIG. 36, for the sake of convenience. Both apparatuses may be terminals enabling transmission and reception.
(0) Initialization
The transmitting apparatus and receiving apparatus perform the predetermined initial operation, and set various parameters, etc. at predetermined values after the power is supplied to the apparatuses.
(1) Transmission of Reference Signal
The receiving apparatus transmits a reference signal to detect a propagation state. Upon detecting the reference signal, the transmitting apparatus calculates the propagation state from the receiving apparatus based on the signal.
(2) Transmission of Encryption
Using the propagation state obtained in (1), the transmitting apparatus superimposes the information on power control at the receiving end, and outputs a communication signal. The receiving apparatus receives the communication signal, detects the reception power of the signal concurrently with demodulation of the received signal, and detects the information superimposed on the reception power. Subsequently, the receiving apparatus performs similar procedures.
According to the procedures inFIG. 37, the operation of each section will be described specifically.
It is herein assumed that the number of channels is three (channel A, channel B and channel C) and that the number of antennas is four (antenna1,antenna2,antenna3 and antenna4). It is further assumed that the transmitting apparatus has calculated the propagation state from the receiving apparatus according to communication procedure (1) as described earlier.
Upon receiving the first data and second data,modulation section3501 temporarily holds the second data, and outputs modulated channel signals corresponding to three channels. Spreadingsection3503 receives the modulated channel signals, performs spectrum spreading by the convolution of the signals with respective spreading codes provided from spreadingcode storing section3502, and outputs spread channel signals.Propagation control section3504 outputs antenna coefficients such that the power at the receiving end becomes a predetermined state, using the propagation state obtained in communication procedure (1) and the first data.
Among methods of superimposing information on the power are considered a method of superimposing the information on the order of the power of channels and a method of superimposing the information on differences between the power of channels or on ratio of the power of channels.
The method of superimposing the information on the order of power is described herein.
For example, when the first data is superimposed on the order of power of channels, six pieces of information can be superimposed as described below:
Power of channel A>Power of channel B>Power of channel C
Power of channel A>Power of channel C>Power of channel B
Power of channel B>Power of channel A>Power of channel C
Power of channel B>Power of channel C>Power of channel A
Power of channel C>Power of channel A>Power of channel B
Power of channel C>Power of channel B>Power of channel A
The six patterns are respectively assigned codes, which the transmitting apparatus and receiving apparatus share in advance.
Corresponding to the power information associated with the first data,propagation control section3504 determines antenna coefficients corresponding to the modulated channel signals.
A method of controlling the power using the antenna coefficients will be described below with reference toFIG. 38.FIG. 38 illustrates the relationship between antennas provided in the transmitting apparatus and receiving apparatus, propagation coefficients determined between the transmitting and receiving antennas, and signals input and output through the antennas. A1 to A4 denote antennas provided in the transmitting apparatus. Ar denotes an antenna provided in the receiving apparatus. St1 to St4 denote transmission RF signals. Srx denotes a received RF signal. h1 to h4 denote propagation coefficients.Synthesis section3505 in the figure corresponds tosynthesis section3505 inFIG. 35, and illustrates relationships between calculations of spread channel signals Sc1 to Sc4 and antenna coefficients C11 to C34 (with the transmitting section omitted). These relationships are expressed by the following equation:
Srx(t)=ΣStn·hn  (28)
=Σ(ΣScm·Cmn)·hn
The transmitting apparatus adjusts values of C11 to C23 from h1 to h4 obtained using the reference signal in communication procedure (1), and thereby is capable of adjusting the reception power of received signal Srx received in antenna Ar for each spread channel signals Sc1 to Sc3 independently. In particular, controlling only by varying phases of C11 to C34 has such a feature that the power transmitted from each antenna does not vary.
For example, with respect to channel A (Sc1), C11 to C14 are calculated such that signals transmitted from A1 to A4 provide the maximum power in Ar by spatial synthesis. With respect to channel B (Sc2), C21 to C24 are calculated such that a notch is formed in the same way. With respect to channel C (Sc3), C31 to C34 are calculated such that the power is set at a value between channels A and B.
Synthesis section3505 receives the antenna coefficients and modulated channel signals, and synthesizes antenna signals forantennas1 to4. The antenna signals undergo the frequency conversion and power amplification in transmittingsection3506, and are transmitted inantenna section3507.
Antenna section3601 in the receiving apparatus receives thus transmitted encrypted signals, and outputs the received RF signals to receivingsection3602. Receivingsection3602 receives the received RF signal, and outputs a received signal subjected to power amplification and frequency conversion.Despreading section3604 receives the received signal, and calculates the convolution of the signal with a spreading code input from spreadingcode storing section3603. Despreading is carried out corresponding to the number of channels (herein, three channels), and a channel signal divided for each channel is output.Demodulation section3605 receives the channel signal to demodulate, and outputs the demodulated channel signal, while detecting a channel detection signal for power detection.Buffer3607 temporarily holds the demodulated channel signal input fromdemodulation section3605 to output as the first data.Power detection section3606 receives the channel detection signal, estimates the reception power for each channel, and outputs channel power information. Comparingsection3608 compares a power level given from the channel power information with one another, and transforms the result into a code assigned in advance based on the order of power of channels to output as the first data.
The first data transmitted from transmittingapparatus3500 can be used as the first data in receivingapparatus3600, and in particular, the second data is of communications using actively the propagation path formed between transmittingapparatus3500 and receiving apparatus. Therefore, such a feature is provided that another receiving apparatus cannot interpret the reception, and as a matter of course, there is provided effective communication means for information requiring high security.
In addition to aforementioned descriptions, differences between the present invention and conventional technique will be described below with reference toFIGS. 39 to 42.FIG. 39 shows an example of conventional technique, where output power of signals Sc1 to Sc3 is controlled using C1 to C3, and the directivity control is carried out using W1 to W4. While inFIG. 39 the same weighting coefficients (C1 to C3) are multiplied for all the antennas, inFIG. 38 weighting coefficients (C11 toC34) are controlled independently for each antenna with respect to Sc1 to Sc3. In the case where the same weighting coefficients are used for all the antennas as shown inFIG. 39, the radiation characteristic given by the directivity is provided with characteristics of the scale of the directivity.
FIGS. 40 to 42 illustrate power distribution of signals, where the horizontal axis indicates a position in spatial section, the vertical axis indicates reception power at the position, and ▴ indicates a location of the receiving terminal.FIG. 40 illustrates characteristics obtained by the configuration inFIG. 39. As shown inFIG. 40, all signal distributions are similar, and the distribution form indicates characteristics of the directivity control given with W1 to W4. Therefore, even when a receive position shifts from a target position, the power of the received signal does not vary relatively. Meanwhile,FIG. 41 illustrates the signal distribution subjected to the propagation control by the configuration inFIG. 38. Since transmission signals are subjected to weighting with combinations of different coefficients for each antenna (as a result, directivity characteristics are different), reception power of each signal differs from one another with the receive position. In other words, while the controlled power ratio is obtained in the target receive position (●), the power ratios are different in positions other that the target position. By using this characteristic, it is not possible to perform demodulation using the reception power in places except a target receive position for a transmission terminal.
Further, it is possible to control a null point where the reception power is 0, using weighing coefficients C11 to C34 inFIG. 38. It is known that n output antennas enable control of n−1 null points. The transmission signal (for example, Sc1) is controlled so that adequate reception power is obtained in a receive position by the directivity control, while some or all of the other transmission signals (for example, Sc1 and Sc2) are controlled to provide controllable null points at the target receive position. Thus, it is possible that n (n≥2) antenna transmit m (m≥2) or more kinds of signals under the propagation control, and the transmission of the signals is controlled so that proper power is supplied to a reception antenna, while transmission of signals that are not required to be transmitted is controlled so that maximum n−1 nulls are provided to the reception antenna. In addition, in them kinds of signals, as long as there is at least one signal to be transmitted, the number of signals to be transmitted may be two or more.FIG. 42 illustrates thus controlled state.
InFIG. 42, in the place of ▴, each signal (Sc2 and Sc3) indicated by dashed lines forms null where reception power is controlled to be low, while the signal (Sc1) indicated by solid line has adequate reception power. In this case, a transmission terminal superimposes information to transmit on Sc1, while superimposing pseudo information (or, non-important information) on Sc2 and Sc3. By communicating in this way, since a received signal is only Sc1 in the target receive position, the receiving terminal is capable of obtaining the information of Sc1 by demodulating the received signal without particular processing. Meanwhile, when these signals are received in other places, the received signals have power of Sc1 to Sc2, and therefore, are difficult to separate. Even if the separation is possible, since it is impossible to estimate which information is to be received among Sc1 to Sc3, it is not possible to perform proper demodulation.
When using the method of thus controlling a null point, since information to be received is only received in reception, the receiving terminal may have the conventional configuration. In other words, there is a significant feature that varying only a transmitting terminal enables implementation of communications with assured security.
Thus, according to the communication apparatus and communication system of Embodiment 17, in addition to the effects ofEmbodiment 1,synthesis section3505 on the transmitting side transmits the first data to a communicating party on different propagation paths using a plurality of antennas, and comparingsection3608 on the receiving side receives incoming signals passed through different propagation paths, and obtains the first data from a result of comparison of estimation values of propagation environments of the paths, whereby it is possible to make it remarkably difficult that the first data is intercepted using a communication apparatus of a third party, thus enabling high security to be provided. Further, according to the communication apparatus and communication system of Embodiment 17, transmittingapparatus3500 performs spectrum spreading on signals of a plurality of channels, multiplies the signals by antenna coefficients in multiplexing to control propagation states for each antenna, and thereby is capable of superimposing the information on the propagation states (herein, signal power, i.e., propagation loss). Further, according to the communication apparatus and communication system of Embodiment 17, as distinct from amplitude modulation typified by ASK as a method of superimposing information on signal power, propagation states are used actively. In other words, since signal power in a reception antenna end is used, propagation characteristics are different in other reception points and signals are not received properly, and in this respect, this embodiment is significantly different from conventional amplitude modulation. For example, since it is possible to vary the signal power at the receiving end without varying the output power from antennas as described above, it is impossible to demodulate the second data even when a third party intercepts communications to demodulate, resulting in the significant feature that the high security is provided. Moreover, according to the communication apparatus and communication system of Embodiment 17, since communications are carried out noting differences in signal power between carriers using multicarrier signals, there is a significant advantage that detection can be carried out from received signals at the same time. The propagation conditions are assumed to be the same because of the same time and same frequency, and it is thereby possible to provide stable communications. For example, when using a spread signal on which two channels (assumed as channel R and channel S) are multiplexed, it is considered assigning a code to whether the signal power of channel S is higher or lower than the signal power of channel R that is set as a reference. In the case of superimposing information on signal phases, it is similarly considered detecting a reference phase of channel S based on a reference signal of channel R.
In addition, Embodiment 17 describes Spectrum Spread communications as an example. However, the present invention is not limited to such communications, and is applicable to multicarrier signals such as OFDM and to singlecarrier signals. OFDM communications can be implemented with spreading, despreading and channel respectively replaced with IFFT, FFT, and subcarrier. In the case of OFDM, since propagation characteristics appear in power of subcarriers, codes may be assigned using the envelop as a parameter.
Further, while Embodiment 17 describes the scheme of superimposing information on the signal power synthesized through propagation, the present invention is not limited to such a case. It is possible to superimpose information on a phase and frequency of signal, and further it is possible to superimpose information on polarization and delay profile.
Furthermore, in Embodiment 17, by arranging antennas with different polarization planes (for example, perpendicular to one another) as an antenna configuration, it is also possible to superimpose signals on polarized waves as described earlier. In this case, although a multicarrier signal is not required particularly, it is considered superimposing information on an angle of the polarization plane of channel S using the polarization plane of channel R as a reference when the multicarrier signal is used.
Still furthermore, in the case of superimposing information on the delay profile, by using the multicarrier signal, it is considered superimposing information on a difference of the delay profile obtained from channel S from the delay profile obtained from channel R as a reference. In this way, since the consistency of propagation state for the delay profile is maintained, it is possible to expect communications with high accuracy. Moreover, in Embodiment 17, superimposing the confidential information and pseudo information at the same time in the same frequency enables communications only in a target receive position, and further enables the communication system with high confidentiality.
Embodiment 18
Embodiment 18 extends the invention as described in Embodiment 17, and has a feature of superimposing information on propagation parameters obtained from a plurality of received signal sequences.
FIG. 43 is a diagram illustrating receivingapparatus4300 that is a communication apparatus according toEmbodiment 18.FIG. 44 is a diagram illustrating a configuration of transmitting/receivingapparatus4400 according toEmbodiment 18. In addition, the same sections as inFIG. 9 orFIG. 36 are assigned the same reference numerals as inFIG. 9 orFIG. 36, and descriptions thereof are omitted.
Receiving apparatus4300 that is the communication apparatus according toEmbodiment 18 of the present invention has receivingsections4302a and4302b substituting for receivingsection3602,despreading sections4303a and4303b substituting fordespreading section3604, anddemodulation sections4304a and4304b substitutingdemodulation section3605 in the configuration of receivingapparatus3600 according to Embodiment 17 of the present invention as illustrated inFIG. 36.
Receiving apparatus4302 is comprised of receivingsections4302a and4302b.Despreading apparatus4303 is comprised ofdespreading sections4303a and4303b.Demodulation apparatus4304 is comprised ofdemodulation sections4304a and4304b.
Receivingsection4302a performs power amplification and frequency conversion on a received RF signal input fromantenna4301a to output todespreading section4303a.
Receivingsection4302b performs power amplification and frequency conversion on a received RF signal input fromantenna4301b to output todespreading section4303b.
Despreading section4303a calculates the convolution of the received signal input from receivingsection4302a with a spreading code corresponding to the channel to despread, and outputs the channel signal todemodulation section4304a.
Despreading section4303b calculates the convolution of the received signal input from receivingsection4302b with a spreading code corresponding to the channel to despread, and outputs the channel signal todemodulation section4304b.
Demodulation section4304a demodulates the channel signal input fromdespreading section4303a, and outputs the modulated channel signal tosynthesis selection section4305, while outputting the demodulated signal to power detectingsection3606 according to an output instruction signal fromcommunication control section4306.
Demodulation section4304b demodulates the channel signal input fromdespreading section4303b, and outputs the modulated channel signal tosynthesis selection section4305, while outputting the demodulated signal to power detectingsection3606 according to an output instruction signal fromcommunication control section4306.
Based on a selection synthesis signal input fromcommunication control section4306,synthesis selection section4305 selects (or synthesizes) a branch received signal (or branch received data) received from either antenna, and outputs a result of selection or synthesis as the second data. In this way, since the effect is obtained of switching the propagation space with time, the gain like spatial diversity is obtained.
Communication control section4306 outputs the selection synthesis signal for instructing to select/synthesize a branch received signal (or branch received data) from a predetermined antenna at predetermined time toselection synthesis section4305. Thesection4306 further outputs the output instruction signal for instructingdemodulation section4304a or4304b to output to power detectingsection3606 the demodulated signal ofantenna4301a or4301b that receives a signal including confidential information, respectively. In this way, since a third party cannot estimate the propagation space nor divide communication signals ofantennas4301a and4301b, there is provided an advantage of implementing higher security.
Comparing section3608 (propagation parameter difference calculating means) calculates a difference (propagation parameter difference) between the reception power of a received signal received inantenna element4301a and reception power of a received signal received inantenna element4301b, and outputs the calculated difference information as the first data.
FIG. 45 illustrates the relationship between antennas provided in the transmitting apparatus and receiving apparatus, propagation coefficients determined between the transmitting and receiving antennas, and signals input and output through the antennas.FIG. 45 shows two reception antennas, whileFIG. 38 shows one antenna.
In the system configured as described above, received signals in antennas Ar1 and Ar2 are given by the following equations:
Srx1(t)=ΣStn·h1n  (29)
=Σ(ΣScm·Cmn)h1n
Srx2(t)=ΣStn·h2n  (30)
=Σ(ΣScm·Cmn)·h2n
As is apparent from equations (29) and (30), since Srx1 and Srx2 are different from each other in the configuration of propagation path, propagation parameters h1n and h2n are also different from each other. The reception states of Srx1 and Srx2 are controllable by the operation of Cmn indicated in equations (29) and (30). It is considered that the receiving terminal uses a result of comparison of the propagation state obtained from Srx1 and the propagation state obtained from Srx2, as information for use in demodulation and decoding. In other words, the transmitting side superimposes information on a difference (such as a phase difference and reception power difference) of propagation parameters controlled with Srx1 and Srx2 to transmit, while the receiving side calculates the difference of propagation parameters obtained from received signals of Srx1 and Srx2, and uses the difference as part or all of the information to communicate, enabling various communications. Further, communicating in this way causes the need of estimating two-sequence propagation parameters, and thus enables high security to be provided. Naturally, increasing the number of antennas enables construction of more sophisticated system, and thus expects increases in security.
Further, it is possible to perform secure communications using a plurality of antennas Ar1 and Ar2. As descried above, antennas Ar1 and Ar2 have different propagation parameters, and receive different signals, and using this respect, controlling modulated signals for antennas Ar1 and Ar2 enables more complicated and secure communications. For example, confidential information is only transmitted to antenna Ar1, antenna Ar2, or both antennas Ar1 and Ar2, or these states are switched at predetermined time intervals.
The specific description is given below with reference toFIG. 71.FIG. 71 is similar toFIG. 42, and shows the case of two target positions. The upper and lower graphs are shown inFIG. 71, and indicate the power distribution as inFIG. 42. The upper and lower graphs indicate the same section. For example, as described in Embodiment 17, when a null point is formed at two positions and is switched with time while signals are transmitted, the power distribution is switched as in upper and lower graphs. In synchronization with the switching, the receiver side performs switching, and it is thereby possible to perform communications as in Embodiment 17. Further, as shown inFIG. 76, when communications are implemented with a null point formed at two positions, both antennas do not receive unnecessary components, and therefore, communications can be carried out similarly. Furthermore, received signals respectively received in antennas Ar1 and Ar2 can be separated, the bold line and slender line in the figure, using the propagation coefficients. When the number of antennas is n (Ar1 . . . Ar2), using Space Division Multiplex (SDM) or MIMO (Multi-Input Multi-Output) enables the communication capacity to be increased by n times that inFIG. 42. Further, using Space-Time Coding expects great improvements in characteristics. Thus, there are significant advantages in terms of communication capacity and communication quality.
Moreover, performing communications in this way increases the parameter elements constructing channels as illustrated inFIG. 45, and has a significant feature of greatly decreasing the risk that information leaks to a third party. The same effects are obtained when the confidential communication is applied to a pilot signal in space division used in MIMO or reference signal for phase or amplitude in communications.
In the foregoing, antenna coefficients (weighting coefficients) are calculated corresponding to propagation characteristics, and the calculation method will be described below. A n×m matrix H is described as an example (in other words, the number of transmission antennas is n, and the number of reception antennas is m). All the matrixes H are expressed as follows using orthogonal matrixes U (m×m) and V (n×n) and singular value matrix S (n×m):
U×S×V′=H  (31)
V′ represents Hermitian transpose.
Assuming thus decomposed orthogonal matrix U (or V) to be arranged m(n) m×1 (1×n) singular value vectors which are referred to as respectively u1 to m (v1 to n). In this case, u1 to m (v1 to n) are:
ux×H=λx(or, H×vx=λx)  (32)
λx is a singular value corresponding to ux(vx). In this case, the matrix H representative of propagation characteristics is subjected to singular value decomposition, and each element of characteristic vector ux with singular value λx of 0 (λx=0) is used as an antenna coefficient (weighting coefficient), whereby it is possible to control reception power at the reception antenna end to be 0.
More specific descriptions are given with reference toFIG. 44. Since the configuration inFIG. 44 is almost the same as that inFIG. 9 but does not perform vector quantization,coding section105 andcodebook905 are eliminated from the configuration inFIG. 9. Only differences fromFIG. 9 are described below.Propagation estimating section103 calculates propagation characteristics (propagation matrix H) between terminals from the received signal to output to coefficient calculatingsection903.Coefficient calculating section903 performs singular value decomposition on propagation matrix H, where it is assumed that singular value vectors vx (x=1, . . . , p) have the singularvalue λx≠0, and that singular value vectors vx (p+1, . . . , n) have the singular value λx=0. For convenience of description, each of the former vectors is referred to as singular value vector, while each of the latter vectors is referred to as a zero vector. All the vectors are stored inbuffer904 temporarily. Meanwhile,modulation section906 receivescommunication information1 to k to respectively output modulatedsignals1 to k.Weighting section907 receives the singular value vectors and modulated signals, and multiplies in vector a modulated signal corresponding to the communication information targeted for confidentiality (herein, assumingcommunication information1 and modulated signal1) by either of singular value vectors (v1 to vp) (for example, one having the maximum singular value or vector obtained by adding some or all the vectors). Further, in the case of increasing the confidentiality, thesection907 multiplies in vector communication information (herein, assumingcommunication information3 and modulated signal3) unnecessary for the receiving apparatus by either of zero vectors (vp+1 to vn) (some or all of the added vectors) among singular value vectors held inbuffer904. The modulated signal vectors resulting from the vector calculation are input to transmittingsection908. Transmittingsection908 adds modulated signal vectors for each antenna signal sequence to perform frequency conversion, and the resultant signals are transmitted viaantenna901.
Thus transmitted signals are received in the receiving apparatus via the propagation space, and expressed as follows using the characteristic (propagation matrix H) of the propagation space and modulated signal Smod:
H×Smod×vx=λx×Smod  (33)
As can be seen from equation (33), modulatedsignal1 multiplied by the singular value vector can arrive at the receiving apparatus. Meanwhile, modulatedsignal3 is multiplied by the vector with λx of 0 (λx=0), and therefore, cannot arrive at the receiving apparatus. In other words, the receiving apparatus is capable of demodulating only demodulatedsignal1 by demodulating the received signal without performing particular processing.
The foregoing is equivalent to performing null control as described inFIGS. 42, 71 and 76. In other words, the figures indicate that singular decomposition is carried out when implementing confidential communications with the null control, and that it is possible to implement the communication readily by using thus obtained singular value vectors.
When a third apparatus that is not the transmitting/receiving apparatus receives these signals, since the propagation matrix H′ that is the propagation characteristic shared by the transmitting apparatus is different, and equation (33) is not obtained. In other words, modulatedsignals1 and3 are given by correlation of propagation matrix H′ and the singular value vector, and it is impossible to separate modulatedsignal1 and3.
Further, with respect to a modulated signal (assuming hereincommunication information2 and modulated signal2) associated with the communication information that is not confident, as coefficients multiplied inweighting section907, coefficients except singular value vector held in buffer904 (or a constant vector such as [1,1, . . . 1]) are used. In this case, since coefficients different from the singular value vector are provided, equation (33) is not obtained, and the signals are received in the receiving apparatus.
As described above, the transmitting apparatus decomposes a modulated signal to transmit by the propagation state (or propagation parameter) formed between the transmitting apparatus and the terminal that is a communicating party, and transmits the decomposed signals from antennas, and the signals form the original modulated signal at the receiving end by spatial synthesis. At this point, the method of decomposing a modulated signal includes using coefficients (values corresponding to elements of a characteristic vector of equation (32)) introduced from propagation parameters as antenna coefficients (or weighting coefficients), and multiplying the original modulated signal by the antenna coefficients. In this way, since a result of spatial synthesis is different in the third terminal that cannot share the propagation parameters, and the third terminal cannot perform accurate demodulation, thus resulting in confidentiality.
Further, it is indicated that selective communications are available even in a receiving apparatus that does not have a particular configuration for the communication system. In other words, the present invention has a remarkably significant feature that security communication can be implemented only by changing the transmitting apparatus.
Thus, according to the communication apparatus and communication system ofEmbodiment 18, in addition to the effects ofEmbodiments 1 and 17, since a modulated signal to transmit is decomposed corresponding to the propagation state and the signals are transmitted from different antennas, a third terminal with a different propagation state has a different result in spatial synthesis, and cannot demodulate the signals properly, thereby ensuring the high security. Further, inEmbodiment 18, superimposing the confidential information and pseudo information on the same frequency at the same time enables communications only in a target receive position, and provides the communication method with high confidentiality.
In addition, whileEmbodiment 18 has the premise that antennas Ar1 and Ar1 are connected to the same terminal, the present invention is not limited to such a case. Antennas Ar1 and Ar2 may be connected to different terminals (for example,terminals1 and2). It is thereby possible to perform secure communications concurrently withterminals land2, and to construct efficient systems.
Embodiment 19
It is a feature of Embodiment 19 to specify a terminal using the propagation characteristic superimposed on a received signal.
FIG. 46 illustrates a configuration of receivingapparatus4600 according to Embodiment 19. The same sections as inFIG. 1 are assigned the same reference numerals as inFIG. 1, and descriptions thereof are omitted.
Propagationcharacteristic extracting section4606 is comprised of characteristic extractingsection4601 andbuffer section4602. Characteristic extractingsection4601 extracts a characteristic of the propagation state from the propagation estimation information input frompropagation estimating section103, and outputs the characteristic extraction information to buffer4602 andterminal determining section4603. As buffer information,buffer section4602 outputs the characteristic extraction information corresponding to the stored propagation state to terminal determiningsection4603.
Signalprocessing selecting section4607 is comprised ofbuffer section4604 andinformation processing section4605.
Characteristic extractingsection4601 receives the propagation information obtained from the received signal, and encodes the information to extract the characteristic. Examples of elements extracted as a characteristic include a phase characteristic, gain characteristic, polarization characteristic, propagation delay characteristic, delay dispersion characteristic, and angle profile by direction-of-arrival estimation. It may be possible to sample the characteristic obtained from use one or a combination of the elements as an analogue value. In this case, it is not required particularly to extract the characteristic, and determination interminal determining section4603 is obtained by comparing analogue information, enabling determination with high precision accuracy. Meanwhile, examples of the characteristic extracting method include transform typified by Fourier transform, discrete cosine transform and wavelet transform, filtering using a filter and multiband filter and coefficient extraction based on linear prediction. Further, characteristic extractingsection4601 may have the same configuration as that ofcoding section105 as shown inFIG. 1 or others. By using vector quantization as shown inFIG. 4,coding section105 is capable of representing various signal sequences as a single code, resulting in a feature of facilitating comparison in determining a terminal.
Buffer section4604 temporarily stores the extracted characteristic extraction information, and outputs the stored characteristic extraction information toterminal determining section4603 as the buffer information at predetermined timing.
Terminal determining section4603 (determining means) compares the characteristic extraction information input from characteristic extractingsection4601 with the buffer information input frombuffer section4606 to determine matching, and outputs the determination result toinformation processing section4605 as a terminal determining signal (first data). Terminal determiningsection4603 outputs a final terminal determination result as a terminal determination signal in a binary signal, using the propagation information obtained for a predetermined time. In this case, by using multi-valued signal such as 0 to 9 instead of using a binary signal such as 1 and 0, it is possible to construct a more flexible system. Further, when characteristic extractingsection4601 extracts coefficients,terminal determining section4603 obtains the Euclidean distance between obtained coefficient sequences, and when the value is less than or equal to a predetermined value, determines that a terminal is the same terminal, while determining that a terminal is a different terminal, when the value is not less than the predetermined value. When a determination is not stable due to noise or fluctuations in propagation characteristic in making a determination, a method is considered of storing determination results for a predetermined period, and making a determination after averaging the results for a fixed period. In this case, it is considered providing the determination result with a range of 0 to 9 to be a likelihood value, instead of indicating the result by binary, 0 or 1, for representing the same or difference. In particular, since making a strict terminal determination causes an erroneous determination to tend to occur, stable terminal determination is carried out by making a determination based on an average of likelihood values obtained for a predetermined period. Thus,terminal determining section4603 monitors a currently communicating terminal based on the estimated propagation environment, and observes so as to prevent the confidential information from leaking, for example, by the communicating terminal being switched maliciously before being aware.
Buffer section4604 temporarily stores received data input fromdemodulation section104.
Information processing section4605 switches the content of information processing from the received data sequence stored and input in/frombuffer section4604 and the terminal determination result input from terminal determiningsection4603. For example, among received data, the information greatly dependent on the terminal such as privacy information, charging information and confidential information may be all discarded as error processing without being processed. Further, the fact is transmitted that access from another terminal is determined from the terminal determination result, and processing for security measure is carried out.
The operation of receivingapparatus4600 will be described.
Descriptions are given herein assuming that a communication terminal targeted for terminal specification iscommunication terminal1, and the communicating party iscommunication terminal2. The case is only described thatcommunication terminal2 transmits signals, because the operation of terminal registration and terminal determination is performed on signals transmitted fromcommunication terminal2.
Communication terminal1 performs the terminal registration operation forcommunication terminal2.
Communication terminal1 receives a reference signal fromcommunication terminal2 usingantenna101, and receivingsection102 receives the RF signal and output a received signal.Propagation estimating section103 receives the received signal, and estimates the propagation characteristic from the received signal and reference signal to output the propagation information. Propagationcharacteristic extracting section4606 receives the propagation information, and characteristic extractingsection4601 outputs the characteristic extraction information. The characteristic extraction information is stored inbuffer section4604 as information for specifyingcommunication terminal2 that is a communicating party. The terminal registration operation is thus completed.
Secondly,communication terminal1 communicates information with communication terminal X, while determining whether communication terminal X is the registered terminal (communication terminal2).
Communication terminal1 receives a communication signal from communication terminal X inantenna101, and receivingsection102 receives the RF signal, and outputs a received signal.Propagation estimating section103 receives the received signal, estimates the propagation characteristic from the received signal, and outputs the propagation information. The propagation information is output to characteristic extractingsection4601, receivingsection102 anddemodulation section104. Based on the propagation information, receivingsection102 controls the RF signal to be the received signal in an optimal state, while performing frequency correction, time correction, gain correction, etc.Demodulation section104 receives the received signal, performs detection and demodulation while performing frequency/phase correction and time correction based on the propagation information, and outputs a received data sequence.
Communication procedures in the case of making a terminal determination will be described with reference toFIG. 47. It is assumed herein that a base station performs terminal specification (receiving apparatus inFIG. 47), and that a terminal (transmitting apparatus inFIG. 47) undergoes the terminal specification.
(0) Base Station and Terminal: Initialization
After the power is supplied or upon receiving a specific signal, the base station and terminal are both set for the initial state. At the same time, states such as the frequency and time-synchronization are set according to predetermined procedures.
A predetermined time later after finishing the initial operation, the receiving apparatus transmits control information in a control signal at predetermined time intervals.
Meanwhile, the base station starts a search for the control signal after finishing the initial operation. When receiving the control signal transmitted from the base station, the terminal detects the time, frequency, etc. for synchronization with the time, frequency, etc. that the system has (system synchronization). After the system synchronization is finished properly, the terminal transmits a registration request signal for notifying the base station of existence of the terminal. In response to the registration request from the terminal, the base station transmits a registration permission signal and thus performs registration permission of the terminal.
(1) Terminal: Transmission of Reference Signal
The terminal outputs a reference signal for propagation estimation performed in the base station as a reference signal. Specific operation is the same as the operation in the method as described inEmbodiment 1 or others. The base station extracts a characteristic from the propagation information obtained in the communication, and registers the characteristic information of the propagation characteristic obtained as the information for the terminal specification, together with the terminal information.
(2) Base station: Transmission of Communication Signal
The base station starts the communication and transmits a communication signal. When the encrypted communication is carried out, the base station may transmit an encrypted signal using the method as described in the other Embodiment.
When the terminal receives the communication signal,reception modulation section150 demodulates the received signal into demodulated information, and outputs demodulated data. When encryption is performed in the communication, decoding is performed using the method as described in the other Embodiment.
(3) Terminal: Transmission of Communication Signal
The terminal transmits a communication signal. The base station estimates the propagation characteristic from the received signal from receivingsection102, and extracts the characteristic information from the propagation information. At the same time, the base station demodulates the received signal, and outputs received data. By comparing the characteristic information with the characteristic information registered in (1), a determination is made on the terminal. The received data is output together with right/wrong information indicative of a final determination result having thus obtained determination. Signalprocessing selecting section4607 receives the received data and terminal determination signal, and stores the received data inbuffer section4604 for a predetermined time. Meanwhile, using the propagation information obtained for a predetermined time,terminal determining section4603 outputs the final terminal determination result as a terminal determination signal in a binary signal.Information processing section4605 switches the content of the information processing from a received data sequence stored inbuffer section4604 and terminal determination result. For example, among received data, information greatly dependent on the terminal such as privacy information, charging information and confidential information may be all discarded as error processing without being processed. Further, the fact is transmitted that access from another terminal is determined from the terminal determination result, and processing for security measure is carried out.
Subsequently, encrypted communications and general communications in (2) and (3) are repeated.
By performing communications based on the procedures as described above, it is possible to check a received signal and a terminal that outputs the signal. In particular, the method of making a terminal determination does not need procedure (2), and can be implemented only by procedures (1) and (3).
Further, it is considered changing the subsequent information processing operation based on the determination result in the operation in (3). By switching the processing based on the determination result, it is possible to maintain the safety of processing to a higher extent, and to prevent data fraud from being performed by a terminal that is not authenticated properly. Therefore, it is possible to construct an apparatus and system with distinctly high security.
The characteristic of a propagation path formed between communication terminals is determined by positions of the terminals and layout around the terminals, and it is not possible to change the characteristic to an optional one. Although the method is considered of using a plurality of antennas to control propagation, since it is impossible for a third terminal to measure the propagation path characteristic and it is difficult to predict the characteristic, it is extremely difficult to pretend as the communication terminal by operating the characteristic. Thus, the terminal specifying method using the present invention is capable of being implemented with extreme simplicity and with high accuracy.
Further, when a plurality ofantennas101 and receivingsections102 is used and a terminal is determined by obtaining characteristics of two or more propagation paths from two or more received signal sequences, the propagation information of the terminal becomes diversity, enabling the determination to be made with higher accuracy.
The aforementioned method has a possibility that an erroneous determination result causes a significant loss to occur in communications. In order to relieve such a loss to secure stable communications, it is considered performing reconfirmation when the terminal determination results in a negative determination. The procedures will be described with reference toFIG. 47.
(3′) Terminal: Transmission of Communication Signal
The base station makes a terminal determination using the propagation information obtained from the communication signal transmitted from the terminal (herein, it is assumed that a result is obtained that is different from the information registered in (1)). The base station determines that the information is from a terminal that is different from the registered terminal as a result of the determination, and outputs a negative terminal determination signal together with the received data.
(2′) Base Station: Request Signal
To reconfirm the terminal according to the result of terminal determination, the base station transmits an authentication request signal to the terminal as a request signal.
(1′) Terminal: Transmission of Reference Signal
Upon receiving the request signal, the terminal performs the operation in response to the signal. Herein, the terminal transmits the request signal again. Following procedures are the same as procedures (1) to (3). By performing the aforementioned procedures, when an erroneous determination occurs due to a variation in propagation environment, performing reconfirmation enables the stable communication to be provided.
Further, when the determination result is different, it is considered that signalprocessing selecting section4607 inFIG. 46 suspends the processing ofinformation processing section4605, and after awaiting the re-determination result of procedure (1′) and subsequent procedures, determines processing procedures. In order to cope with variations in propagation environment, it is considered that the base station updates the registered terminal specification information at predetermined intervals, independently of procedures (3′) to (1′).
Further, inserting a reference signal into part of communication signal of (3) and (3′) enables the base station to perform stable propagation estimation, and as a result, the base station is capable of obtaining a stable terminal determination result. At this point, the reference signal does not need to be the same reference signal as used in (1), and may be replaced with a pilot signal or known signal sequence is generally used in communications.
As described above, for example, in a session during a period of time the communication is started and then finished, the present invention enables the information during a period of time authentication is finished between the base station and terminal and then the session finishes to be provided with efficiency. There is a significant feature that it is possible to prevent adverse effects from being imposed on the communication, for example, when another terminal transmits a fraud signal during the session in communicating the charged information via the internet.
In aforementioned descriptions, while a reference signal is used to estimate the propagation, any signal sequence is available as long as using the sequence enables error detection under the communication environment. As such a signal sequence, there are known a pilot signal, known signal, silk word signal, synchronization signal, synchronization word, preamble signal, midamble signal, postamble signal, reference signal, and unique word signal. Alternatively, it is possible to use a signal sequence sufficiently protected in demodulation error, and examples include a PSK signal sequence included in a signal sequence communicated in M-ary modulation scheme and a signal sequence coded in a scheme with high error correcting capability.
Further, it is considered inserting ID for specifying a terminal into part of communications from the terminal to base station, and using the value and result from the propagation information.
Thus, according to the communication apparatus and communication system of Embodiment 19, in addition to the effects ofEmbodiment 1,terminal determining section4603 determines whether a terminal with which the apparatus is currently communicating is a desired communicating party from the propagation estimation value, and when the terminal is not a desired communicating party, switches the processing of received data to processing for not demodulating the received data, based on the terminal determination result. Therefore, it is possible to maintain a higher level of safety, and to prevent a terminal that is not authenticated properly from performing data fraud, enabling construction of apparatus and system with remarkably high security.
Embodiment 20
FIGS. 48 and 49 are views illustrating a specific method of setting a communication frame in a system that multiplexes information on propagation parameters. In addition, the communication apparatus inEmbodiment 20 has the same configuration as that inFIG. 7, and descriptions thereof are omitted.
For the sake of convenience,Embodiment 20 assumes an apparatus that transmits downlink signals as a base station, and that an apparatus that transmits uplink signals as a terminal to describe.FIG. 48 is a view to explain timings of uplink and downlink signals.FIG. 48(a) shows a case that secure information is communicated in one way, andFIG. 48(b) shows a case that secure information is communicated in bidirectional way. In addition, inEmbodiment 20, the base station and terminal are assumed to have transmitting/receivingapparatus700.
The case will be described first of communicating secure information in one way. In the case where the base station transmits generalcommunication signal #4801 that is not encrypted to the terminal, the base station selects an encryption key corresponding to the propagation state based onreference signal #4802 when the terminal transmitscommunication signal #4803 includingreference signal #4802 to the base station over the uplink, and transmits to the terminal encryptedcommunication signal #4804 encrypted using the selected encryption key common to the terminal. The terminal transmits a communication signal includingreference signal #4802 to the base station at predetermined intervals. Whenever receivingreference signal #4802 transmitted from the terminal, the base station checks whether or not the encryption key is changed, and after the check, transmitsencrypted signal #4805 to the terminal.
The case will be described next of performing bidirectional secure communications. The base station transmitscommunication signal #4807 includingreference signal #4806 to the terminal. The terminal transmitscommunication signal #4809 includingreference signal #4808 to the base station. The base station having receivedreference signal #4808 selects an encryption key corresponding to the propagation state based onreference signal #4806, and transmitsencrypted signal #4810 encrypted using the selected encryption key to the terminal. Meanwhile, the terminal having receivedreference signal #4806 selects an encryption key corresponding to the propagation state based onreference signal #4806, and transmitsencrypted signal #4811 encrypted using the selected encryption key to the base station. Then, the base station transmitsencrypted signal #4812 to the terminal.
Timing at which the reference signal is transmitted will be described with reference toFIG. 49.FIG. 49 shows an example of burst structure.
In a frame structure inFIG. 49(a), a burst is comprised of a communication signal and reference signal. As the reference signal, for example, a pilot signal is used. By configuring in this way, it is possible to concurrently transmit the signal to estimate the propagation characteristic and the reference signal to transmit data, and to implement the efficient frame structure. Further, by configuring part or all of the reference signal using a signal with two or more consecutive symbols, it is possible to use symbols with a small variation in propagation characteristic to estimate in estimating the propagation characteristic, and to implement propagation estimation with high accuracy. Further, by arranging reference signals at predetermined intervals over the entire burst, it is possible to compensate for fading distortion based on the reference signal even when the transmission characteristic varies greatly in a burst due to fast fading, and it is thereby possible to implement transmission with high quality. Under such fast fading environment, it is difficult to implement communications using the propagation characteristic formed between terminals as described in each Embodiment, and therefore, it is possible for each terminal to switch between whether or not to perform communications using the propagation characteristic while detecting fast fading.
In a frame structure inFIG. 49(b), part or all of reference signals in the frame structure as illustrated inFIG. 49(a) arereference signals1 and2. With the frame structured in this way, the terminal (terminal1) that transmits the burst to the terminal (terminal2) targeted for transmission performs communications under control such that the reception power ofreference signal1 is larger than the reception power ofreference signal2 in a receive point using the propagation characteristic, and it is thereby possible forterminal2 targeted for transmission to perform accurate demodulation by determiningreference signal1 as a reference of communication signal from the difference in reception power, while it is impossible for another terminal to perform accurate demodulation because reception power is different with position, thus providing an advantage. Further, in the case where terminal2 has n antennas, it is consideredmultiplexing reference signals1 to n for each antenna. In this way, superimposing the information on propagation parameters ofreference signals1 to n enables highly advanced communications. Further, when mterminals2 exist, performing spatial multiplexing on communications to the terminals enables increases in spectral efficiency. (In this case, the relationship between n and m needs n>m.) It is thereby possible to construct the system with high spectral efficiency.
In a frame structure inFIG. 49(c), part or all of communication signals in the frame structure as illustrated inFIG. 49(a) arecommunication signals1 and2. With the frame structured in this way, terminal1 communicates withterminal2 under control such that the reception power ofcommunication signal1 is larger than the reception power ofcommunication signal2 in a receive point using the propagation characteristic, and it is thereby possible forterminal2 targeted for transmission to perform demodulation by determiningcommunication signal1 from the difference in reception power, while it is impossible for another terminal to perform accurate demodulation because reception power is different with position, thus providing another advantage. The communication signal may be referred to as data, data symbol, modulated symbol, data modulated symbol, free symbol or user symbol, and indicates a symbol modulated by communication data.
Thus, according to the communication apparatus and communication system ofEmbodiment 20, in addition to the effects ofEmbodiment 1, transmission timing of reference signal is varied or a reference signal is transmitted while selecting an uplink channel or downlink channel, and it is thereby possible to transmit and receive efficiently encrypted signals.
In addition, inFIGS. 48(b) and (c), althoughEmbodiment 20 notes the difference in reception power, the reception power is only an example of propagation parameter. It is considered superimposing information on a difference in propagation parameter between communication signal1 (reference signal1) and communication signal2 (reference signal2), or calculating a difference in propagation parameter based on communication signal (reference signal1) interminal2 that receivescommunication signal1 andcommunication signal2 and obtaining the result as part or all of the demodulation result. Further,Embodiment 20 describes the case of multiplexing reference signals inFIG. 49(b) and the case of multiplexing communication signals inFIG. 49(c). However, it is apparently possible to multiplex a reference signal and communication signal.
Embodiment 21
FIG. 51 is a view illustrating a specific method of setting a communication frame in a system that multiplexing information on propagation parameters. In addition, a communication apparatus inEmbodiment 21 has the same configuration as that inFIG. 36, and descriptions thereof are omitted.
FIG. 50 shows an example of frame structure of code division multiplexing (CDM).
A frame inFIG. 50(a) is comprised of a pilot signal and data signal. The pilot signal indicates references of phase and amplitude of a data signal. The receiving apparatus uses the information of phase and amplitude obtained from the pilot signal as a reference in demodulating a data signal, and calculates propagation states such as synchronization of time and frequency and multipath state from the reference signal.Data1 to n (n is an integer of 1 or more) is multiplexed on a data signal in code division multiplexing. It is assumed herein thatdata1 to n is respectively assignedcode1 to m. Terminal1 controls the propagation parameter (herein, assumed as reception power) fordata1 to n corresponding to the estimated propagation characteristic. At this point, when weighing is performed so as to superimpose information on reception power, signals are received at the receiving end ofterminal2 under the condition that reception power of each ofdata1 to n is controlled. Since the reception power is obtained as amplitude of signals obtained by despreading withcodes1 to m, it is possible to detect the superimposed information from the amplitude information. Herein, it is assumed that the number of items of data to multiplex is n, the number of kinds of codes is m, and that n is larger than or equal tom (n>=m). Further, setting the reception power that terminal1 controls at 0 enables communications of n>m. Further, when m is 1 (m=1), it is not necessary to perform code division multiplexing.
A frame inFIG. 50(b) is different from the frame structure inFIG. 50(a), and has a feature that pilot signals are multiplexed ondata1 to n in code division multiplexing. InFIG. 50(b), it is possible to superimpose information on propagation parameters as in the frame structure inFIG. 50(a), and it is also considered controlling a phase and amplitude of a pilot signal.
In a frame inFIG. 50(c), pilot signals1 to m are multiplexed ondata1 to n by code division multiplexing. By adopting this structure, maximum m pilot signals can be controlled independently, and for example,data1 to j is modulated based on a phase and amplitude ofpilot signal1, while data j+1 to k is modulated based on a phase and amplitude ofpilot signal2, whereby it is possible to construct an intelligent communication system. In this way, it is possible to communicate with a plurality of reception terminals using respective pilot signals and data signals corresponding to the pilot signals, and the pilot signals are controlled to be proper signal references respectively at the receiving ends in reception terminals each as a communicating party. There is obtained a significant feature that the reception terminals cannot demodulate data signals of the other reception terminals even when receiving and trying to demodulate the signals. The communication signals may be referred to as data, data symbol, modulation symbol, data modulation symbol, free symbol or user symbol, and indicates a symbol modulated by communication data.
Thus, according to the communication apparatus and communication system according toEmbodiment 21, in addition to the effects ofEmbodiment 1, since a pilot signal and data are subjected to code division multiplexing, it is possible to transmit and receive encrypted signals resistant to interference.
In addition, inEmbodiment 21, a pilot signal is used to be reference for a phase and amplitude of a data signal. However, the present invention is not limited to the pilot signal, and allows any reference signal besides the pilot signal to be selected.
Embodiment 22
FIG. 51 is a diagram illustrating a configuration of transmitting/receivingapparatus5100 that is a communication apparatus according toEmbodiment 22 of the present invention. Transmitting/receiving apparatus5100 has orthogonal frequencydivision multiplexing section5101 in transmitting/receivingapparatus200 according toEmbodiment 1 as illustrated inFIG. 2. In addition, the same sections as inFIG. 2 are assigned the same reference numerals as inFIG. 2, and descriptions thereof are omitted.
Switching section210 switches between encrypted security data output from encryptingsection209 and a reference signal output from referencesignal generating section208 so that desired subcarriers are assigned to transmission signals subjected to processing of orthogonal frequency division multiplexing in orthogonal frequencydivision multiplexing section5101 described later.
Orthogonalfrequency division multiplexing5101 performs the processing of orthogonal frequency division multiplexing on a transmission signal input frommodulation section211 to output to transmittingsection212. In other words, orthogonal frequencydivision multiplexing section5101 performs inverse fast Fourier Transform on the transmission signal input frommodulation section211, thereby converts parallel data into serial data, and outputs the resultant to transmittingsection212. Transmission signals subjected to the processing of orthogonal frequency division multiplexing are assigned to subcarriers.
FIG. 52 shows an example of frame structure of orthogonal frequency division multiplexing (OFDM). The vertical axis indicates the frequency, and the horizontal axis indicates the time. A square indicates a subcarrier of a symbol.
A frame shown inFIG. 52(a) is comprised of a pilot signals for symbol synchronization, reference signal for data demodulation, and data signal for data transmission. The pilot signal for synchronization is used to acquire the synchronization in time and frequency of the OFDM symbol. There are known a null symbol, short word symbol and long word symbol. Meanwhile, the reference signal for data demodulation is inserted to correct frequency characteristics, propagation delay and phase rotation generated by propagation distortion, and to provide a reference for a phase and amplitude of a data signal to be modulated. Inserting the reference signal into the frame enables stable communications in environments where the propagation environment varies and/or the delay profile varies. According to the present invention, by transmitting the reference signal corresponding to the propagation characteristic while controlling the phase and amplitude at the receiving end, since an accurate reference signal cannot be obtained in places except the set receiving end, it is difficult to perform accurate modulation, resulting in a significant feature.
A frame inFIG. 52(b) is comprised of a pilot signal for symbol synchronization, reference signal for data demodulation and data signal, as in the frame structure inFIG. 52(a). As distinct from the frame structure inFIG. 52(a) where a reference signal in transmitted in a specific symbol, part of all the symbols are reference signals, and it is thereby possible to vary the reference signal corresponding to the symbols. In other words, control coefficients using the propagation characteristic are varied in switching symbols to vary the phase and amplitude of the reference signal every instant, and it is thereby possible to perform more complicated control, and to ensure high security in the security system. Further, the reference signal is a known signal, and therefore, can be used as a pilot signal, whereby correction can be performed for temporal variations in environment.
In a frame shown inFIG. 52(c), the reference signal in the frame structure inFIG. 52(b) is varied with time. Varying the position of the reference signal every instant has the effect of frequency hopping for the reference signal and data signal. In other words, even when power of a certain subcarrier is decreased by notch in the propagation state, since the signal pattern is switched, the effect caused by the notch is suppressed to be temporarily one. For example, when a portion of the reference signal is affected by the notch, the great effect is imposed on the data signal, and inframe structure2, the effect lasts until the propagation state changes. However, in this structure, it is possible to limit the effect of the reference signal. The communication signal may be referred to as data, data symbol, modulated symbol, data modulated symbol, free symbol or user symbol, and indicates a symbol modulated by communication data.
Thus, according to the communication apparatus and communication system according toEmbodiment 22, in addition to the effects ofEmbodiment 1, orthogonal frequencydivision multiplexing section5101 performs the processing of orthogonal frequency division multiplexing on the encrypted data and pilot signal to assign subcarriers, and it is thereby possible to improve the spectral efficiency in transmitting encrypted signals.
Embodiment 23
InEmbodiment 23, whether or not perform secure communications is determined by instructions from an upper layer.
FIG. 53 is a diagram illustrating a configuration of a transmitting/receiving apparatus according toEmbodiment 23. In addition, the same sections as inFIG. 7 are assigned the same reference numerals as inFIG. 7, and descriptions thereof are omitted.
Communication control section5301 controls switching of communication methods and synthesis corresponding to the communication time. In other words, whencommunication control section5301 receives a communication control signal to perform secure communications fromupper layer5303, thesection5301 outputs the propagation information input fromcoding section703 topropagation control section701, outputs a reception control section for performing secure communications to receivingsection202, and further outputs a transmission control signal for performing secure communications to transmittingsection705. Meanwhile, whencommunication control section5301 receives a communication control signal not to perform secure communications, thesection5301 outputs a reception control section for not performing secure communications to receivingsection202, and further outputs a transmission control signal for not performing secure communications to transmittingsection704. With respect to the propagation control method, it is considered that the propagation control as described in the other Embodiments is performed when the secure communications are performed, and that the propagation control is not performed when conventional communication methods are performed, or the directivity is controlled as the propagation control to improve the communication quality.
Buffer section5302 holds the transmission data temporarily to output to switchingsection210.
Upper layer5303 is either layer (among data link layer, network layer, transport layer, session layer, presentation layer and application layer) higher than L1 in communication layer structure. In the upper layer, received data and transmission data is input and output, and at the same time, when necessary, a communication method is selected and a control signal for the method is output as a communication control signal.
The communication method using the present invention is high in compatibility with conventional communication methods, and it is possible to switch between the communication method using the present invention and conventional communication method to use. In this way, corresponding to situations such as:
  • (1) whether a communication apparatus as a communicating party supports the security communication;
  • (2) whether the application supports the communication method of the present invention;
  • (3) whether the application needs the communication method of the present invention; and
  • (4) whether the user needs the communication method of the present invention,
    it is possible to switch between the conventional communication method and the communication method using the present invention. Further, as described in the other Embodiments, even when the security communication is required, it is possible to ensure the communication quality by protecting in security only important information to communicate.
The operation of transmitting/receiving apparatus as shown inFIG. 53 will be described below with reference toFIG. 54.
When the upper layer section outputs a communication control signal so as to implement the security communication, the communication control section outputs transmission and reception control signals so as to perform propagation control for security communications ((1) and (4) inFIG. 54)). Meanwhile, when the upper layer section outputs a communication control signal so as not to implement the security communication, the communication control section outputs transmission and reception control signals so as not to perform propagation control for security communications ((2), (3) and (5) inFIG. 54)).
Thus, according to the communication apparatus and communication system ofEmbodiment 23, in addition to the effects ofEmbodiment 1, based on instructions fromupper layer5303,communication control section5301 switches between the conventional method and the security communication method for protecting in security the important information which is the communication scheme for performing transmission and reception of the first using the propagation estimation value, thereby enabling a versatility communication apparatus to be provided.
In addition, inEmbodiment 23, using the transmission control signal and reception control signal, the propagation control in receivingsection202 and transmitting section7095 is turned ON/OFF. However, the present invention is not limited to such a method, and when either receivingsection202 or transmittingsection705 has the same configuration as that in the conventional communication apparatus, the need of a control signal eliminated for such a section. Examples of such a section include transmittingsection152 in the communication apparatus as illustrated inFIG. 1, andencryption receiving section706 in the communication apparatus corresponding to the communication apparatus as illustrated inFIG. 7.
Embodiment 24
Embodiment 24 has a feature that antenna coefficients include confidential information.
FIG. 55 is a diagram illustrating a configuration of transmittingapparatus5500 that is a communication apparatus according toEmbodiment 24.FIG. 56 is a diagram illustrating a configuration of receivingapparatus5600 that is a communication apparatus according toEmbodiment 24.
Transmitting apparatus5500 will be described first.
Modulation section5501 temporarily holds the second data, and outputs channel phase modulated signals corresponding to the number of channels to combiningsection5502.
According to modulation antenna coefficients input frompropagation modulation section5507, combiningsection5502 performs combining calculation of the modulated signals input frommodulation section5501.
Transmittingsection5503 performs frequency conversion and power amplification on the input combined signal input from combiningsection5502.
Antennas5504 transmit respective signal sequences.
Propagationcharacteristic storing section5505 stores propagation characteristics such as the propagation profile to output to antennacoefficient calculating section5506.
In order to superimpose the information on the propagation state represented by antenna coefficients, antennacoefficient calculating section5506 calculates antenna coefficients based on the propagation characteristics input from propagationcharacteristic storing section5505. Antenna coefficients are obtained using various methods, and as one of the methods, singular value decomposition is known.
Propagation modulation section5507 superimposes the first data to transmit as the confidential information on antenna coefficients input from antennacoefficient calculating section5506, performs amplitude modulation on the resultant, and outputs the obtained modulated antenna coefficients to combiningsection5502.
Receiving apparatus5600 will be described below.
Antenna5601 outputs a received RF signal to receivingsection5602.
Receivingsection5602 performs power amplification, frequency conversion, etc. on the received RF signal received and input in/fromantenna5601 to output todemodulation section5603.
Demodulation section5603 demodulates each channel signal input from receivingsection5602, and outputs a channel demodulated signal to antennacoefficient detecting section5605 andbuffer5604. In receivingapparatus5600, since a QAM signal (or phase·amplitude modulated signal) subjected to phase modulation and amplitude modulation is received,demodulation section5603 performs phase·amplitude demodulation on the received signal.
Buffer5604 temporarily holds the channel modulated signal input fromdemodulation section5603, and outputs the second data.
Antennacoefficient detecting section5605 detects an antenna coefficient for each channel from the channel demodulated signal input fromdemodulation section5603, and outputs the detected antenna coefficient information to comparingsection5606.
Comparingsection5606 encodes the antenna coefficient information input from antenna coefficient detecting5605, and outputs a result of comparison in level between encoded antenna coefficient information as received data. In addition, the operation of transmittingapparatus5500 and receivingapparatus5600 is the same as that inFIG. 37 except using antenna coefficients substituting for reception power, and descriptions thereof are omitted.
Superimposing the information on the propagation characteristic of the present invention has a significant feature that the modulation scheme of signal output from an antenna differs from the modulation scheme of signal to be demodulated in the receiving apparatus. In other words, it is possible to set the modulation scheme of signal output from an antenna to be different from a modulation scheme that the receiving apparatus supports. In this way, the modulated signal is a proper modulated signal only in the receiving apparatus targeted for transmission, and the proper modulated signal is not obtained in the other receiving apparatuses, whereby it is possible to secure high confidentiality. Further, since it is possible to add the confidential information to the information of differences between antenna coefficients of a plurality of channel signals, it is possible to transmit signals of a plurality of channels while providing security, and to improve transmission efficiency.
Thus, according to the communication apparatus and communication system ofEmbodiment 24, in addition to the effects ofEmbodiment 1, combiningsection5502 combines the first data modulated inpropagation modulation section5507 and the second data modulated inmodulation section5501 in a modulation scheme different from that inpropagation modulation section5507, and transmittingsection5503 transmits the first data and second data in a modulation scheme with phase, amplitude or frequency. Therefore, communicating parties with different modulation schemes cannot demodulate the data, and it is thereby possible to ensure high security.
In addition,Embodiment 24 describes the case where an antenna output signal is subjected to phase modulation, while the propagation modulation is amplitude modulation. However, the present invention is not limited to such a case, and the same modulation scheme may be used, and/or the modulation scheme is not limited to such modulation scheme. As each modulation scheme, there are considered frequency modulation, phase modulation, amplitude modulation, PWM, PAM, orthogonal amplitude modulation, and CCK (Complimentary Code Keying).
Embodiment 25
Embodiment 25 has a feature that antenna coefficient information is superimposed on spread signals of a plurality of channels, and the antenna coefficient information is extracted as confidential data.
FIG. 57 is a diagram illustrating a configuration of transmittingapparatus5700 that is a communication apparatus according toEmbodiment 25.FIG. 58 is a diagram illustrating a configuration of receivingapparatus5800 that is a communication apparatus according toEmbodiment 25. In addition, inFIGS. 57 and 58, the same sections as inFIGS. 55 and 56 are assigned the same reference numerals as inFIGS. 55 and 56, and descriptions thereof are omitted.
Spreadingcode storing section5701 stores spreading codes corresponding to the number of channels to output to spreadingsection5702.
Spreadingsection5702 calculates the convolution of channel data that is the first data input frommodulation section5501 and a spreading code corresponding to the channel of the data input from spreadingcode storing section5701 to perform spectral spreading, and outputs the resultant to combiningsection5502.
Spreadingcode storing section5801 stores spreading codes corresponding to the number of channels to output todespreading section5802.
Despreading section5802 calculates the convolution of the spreading code corresponding to the channel input from spreadingcode storing section5801 and a received signal input from receivingsection5602 to perform despreading, and outputs the resultant todemodulation section5800. In addition, the operation of transmittingapparatus5700 and receivingapparatus5800 is the same as that inFIG. 37 except using antenna coefficients substituting for reception power, and descriptions thereof are omitted.
Superimposing the information on the propagation characteristic of the present invention has a significant feature that the modulation scheme of signal output from an antenna differs from the modulation scheme of signal to be demodulated in the receiving apparatus. In other words, it is possible to set the modulation scheme of signal output from an antenna to be different from a modulation scheme that the receiving apparatus supports. In this way, the modulated signal is a proper modulated signal only in the receiving apparatus targeted for transmission, and the proper modulated signal is not obtained in the other receiving apparatuses, whereby it is possible to secure high confidentiality.
Thus, according to the communication apparatus and communication system ofEmbodiment 25, in addition to the effects ofEmbodiments 1 and 24, combiningsection5502 combines the first data modulated inpropagation modulation section5507 and the spread second data modulated inmodulation section5501 in a modulation scheme different from that inpropagation modulation section5507, and transmittingsection5503 transmits the first data and second data in a modulation scheme with phase, amplitude or frequency. It is thereby possible to ensure high security in data with high spectral efficiency.
In addition,Embodiment 25 describes the case where, an antenna output signal is subjected to phase modulation, while the propagation modulation is amplitude modulation. However, the present invention is not limited to such a case, and the same modulation scheme may be used, and/or the modulation scheme is not limited to such modulation scheme. As each modulation scheme, there are considered frequency modulation, phase modulation, amplitude modulation, PWM, PAM, orthogonal amplitude modulation, and CCK (Complimentary Code Keying).
Embodiment 26
Embodiment 26 has a feature that first modulation is superimposed on second modulation by controlling antenna coefficients.
FIG. 68 is a diagram illustrating a communication system according to Embodiment 26.FIG. 69 illustrates sections pertinent to transmission and reception in detail.FIG. 68 will be described first.
The system as illustrated inFIG. 68 is comprised ofcommunication terminal A6850,propagation space6852, andcommunication terminal B6851 with the same configuration as that of theterminal A6850. In addition, inFIG. 68, two terminals have the same configuration, but do not need to be the same in configuration.
Communication terminals A6850 andB6851 will be described below.
Referencesignal storing section6801 outputs a reference signal for providing references for time synchronization, frequency synchronization and phase/amplitude.
Modulation section6802 receives data2 (second data), generates a predetermined modulated signal, and outputs a modulated signal.
Channel combining section6803 receives the modulated signal, channel parameter resulting from extraction of channel component, and data1 (first data), performs weighting so as to perform channel combining through propagation, and outputs transmission RF signals.
Channel analysis section6804 receives propagation coefficients extracted from a received signal to analyze, and calculates and outputs coefficients for channel combining.
Reception demodulation section6805 receives received RF signals, and outputs propagation coefficients tochannel analysis section6804, while outputtingdemodulated data1 and2.
RF section6806 outputs transmission RF signals toantenna6805, while receiving a signal received inantenna6807 and outputting the received RF signal toreception demodulation section6805.
Antennas6807 transmit respective sequences of transmission RF signals, while outputting a received RF signal toreception demodulation section6805.
Switch6808 selects a signal from referencesignal storing section6801 and a signal frommodulation section6802, as a modulated signal to output to channel combiningsection6803.
Control section6809 receives a control signal, and performs control ofchannel combining section6803,channel analysis section6804,reception demodulation section6805, andswitch6806. Specifically, as described inEmbodiment 23,control section6809 receives a control signal from an upper layer, and sets whether or not to perform confidential communication. Further, according to communication procedures as described inEmbodiment 1 or the other Embodiment, thesection6809 outputs a propagation estimation signal, and controls the operation conforming to the specified communication frame.
FIG. 69 that illustrates transmission and reception portions specifically will be described below.FIG. 69 specifically illustrates part ofFIG. 68, and the same sections are assigned the same reference numerals. Herein, descriptions of each section are omitted, and the operation will be described specifically.
Modulation sections6802 having received data (data1 to n) respectively generate modulatedsignals1 to n corresponding data to output to channel combiningsection6802.Channel combining section6803 receives modulated signals frommodulation sections6802, while receiving channel parameters fromchannel analysis section6804 as antenna coefficients.Channel analysis section6804 receives a control signal and the received signal received inRF section6806, extracts characteristics of propagation properties such as phase, amplitude and propagation dispersion using the received signal sequence and known signal sequence such as the reference signal, and outputs the channel parameters to channel combiningsection6803.
Channel combining section6803 calculates antenna coefficients corresponding to the antenna sequence from the channel parameters and modulated signals. Further, when the propagation control is required through the control signal, thesection6803 transmits a weighted transmission signal obtained by multiplying thus calculated antenna coefficient by the modulated signal torespective RF section6806, and the signal is amplified in power in thesection6806 and transmitted fromantenna section6807.
Meanwhile, when the propagation control is not required, thesection6803 performs control suitable for communications (i.e., such that the signal has the maximum sensitivity at a receive point), and sets weighting coefficients at predetermined values or sets at least one coefficient at 0. Performing control suitable for communications provides a feature of improving the communication quality. When weighting coefficients are set at predetermined values, there arises a feature that the communication quality is improved without performing complicated control if the situation allows communication environments to be almost fixed and the directivity to be set in advance. When the directivity is not set in advance, setting all the coefficients at the same value enhances the total transmission power, and results in increases in communication quality. Setting part of weighting coefficients at 0 suppresses the transmission power and enables reduction in power consumption.
It is possible to perform the weighting operation in the configuration as illustrated inFIG. 35. Herein, it is apparent that a hierarchical information structure is capable of being implemented readily by separating a modulated signal to be weighted and a modulated signal for use in calculating antenna coefficients. (Herein, the former is referred to as first modulation, while the latter one is referred to as second modulation). When performing in this way, it is possible to set modulatedsignals1 to k for first modulation, while setting modulated signals k+1 to n for second modulation. For example, as described in Embodiment 17, in the case of the scheme of controlling power of all the signals except one modulated signal to be zero, it is possible to regard that as second modulation, modulated signals of (1,0) are applied as modulatedsignals1 to k subjected to first modulation, and that similarly as second modulation, modulated signals of (0,0) are applied as modulated signals k+1 to n subjected to first modulation. When the number of patterns of modulated signal subjected to second modulation is thus small, it is possible to implement the hierarchical information structure by preparing antenna coefficients corresponding to the number of patterns, and switching the coefficients according to the data corresponding to second modulation.
Herein, the antenna coefficient is given by equation (34):
H·W(x)=x  (34)
x is in equation (34) is a component on which information is superimposed in second modulation, and amplitude in ASK, phase in PSK or frequency in FSK.
Thus transmitted radio signal is received inantenna6807 incommunication terminal B6851 viapropagation space6852. The channel parameter is superimposed on the signal in channel combining6803, and received signal Srx is represented as in equation (35) using first modulation signal st_1, second modulation signal St_2, channel property H and antenna coefficient W:
Srx=H·W(St_2)·St_1   (35)
Using equation (34) obtains the following equation:
Srx=St_2·St_1   (36)
As indicated by equation (36), at the receiving end of communication terminal B6861, a received signal is obtained as a signal resulting from multiplication of the first modulation signal by the second modulation signal. For example, when the first modulation is PSK modulation and the second modulation is ASK modulation,reception modulation section6805 is capable of demodulatingdata2 corresponding to first modulation by detecting a phase component, anddemodulating data1 corresponding to second modulation by detecting an amplitude component.
The above explanation is described more specifically with reference toFIG. 70.
FIG. 70 illustratesFIG. 69 more specifically, and each ofreference numerals7050a to7052 denotes a signal constellation.
Weighting multiplying section7001 multiplies the first modulation signal by an antenna coefficient, and outputs a weighted transmission signal.
Coefficient storing section7002 receives channel parameters calculated inchannel analysis section6804 to hold as basic coefficients. Thesection7002 converts the held basic coefficients into antenna coefficients corresponding to the second modulation. At this point, as described above, when the number of patterns of second modulation is small, basic coefficients are prepared corresponding to the number of patterns, it is possible to implement by switching between the antenna coefficients corresponding todata1 associated with second modulation.
It is assumed herein that first modulation is QPSK and that second modulation is ASK.Signal7050a indicates a constellation of QPSK, andsignal7050b indicates a constellation of ASK.
Channel combining section6803 performs weighting of the first modulation signal using an antenna coefficient output fromcoefficient storing section7002, and outputs the weighted transmission signal to arespective antenna6807. Since antenna coefficients are different in phase and amplitude between second modulation symbol “space” and “mark”, each of weighted transmission signals has eight signal points, despite the first modulation signal having four signal points.
It is herein assumed that antenna coefficients for “space” and “mark” of second modulation signal are different in phase and amplitude. However, it is possible to fix either coefficient as a constant value. Making the amplitude constant provides an advantage that the power supplied from each antenna is equal to one another. Making the phase constant provides an advantage of simplifying the configuration ofweighting multiplying section7001.
Signal7052 indicates a signal received incommunication terminal B6851 viapropagation space6852, and as indicated in equation (36), becomes an 8-APSK signal where QPSK is multiplexed on ASK.Reception demodulation section6805 is capable of demodulatingdata2 by detecting the phase, anddemodulating data1 by detecting the amplitude.
Thus, according to Embodiment 26, first modulation is multiplexed on second modulation by controlling antenna coefficients, and the modulated signal forms a proper modulated signal only at a receive point, whereby it is possible to perform communications with high confidentiality.
Embodiment 27
Embodiment 27 describes a communication protocol for performing control of confidential communications in the physical layer in upper-layer communications.
FIG. 59 illustrates a communication system used in Embodiment 27.
In the communication system,communication terminal A5950 communicates withcommunication terminal B5951 viapropagation space5952. Herein,communication terminal A5950 has the same configuration as that ofcommunication terminal B5951.
Communication terminal A5950 will be described below.
Upper layer4750 is to provide and receive transmission information and received information to/from the application (either case is considered outside or inside the terminal) respectively, outputs transmission data to transmittingsection152, outputs a control signal tocommunication control section4701, and receives received data fromreception demodulation section150.
Reception demodulation section150 receives a received RF signal fromantenna101 to demodulate, and outputs received data.
Transmittingsection152 receives the transmission data, generates a modulated signal, and outputs a transmission RF signal toantenna101.
Communication control section4701 receives a control signal, and outputs a transmission control signal to transmittingsection152, while outputting a reception control signal toreception demodulation section150. Further, thesection4701 receives propagation parameters fromreception demodulation section150, and outputs the propagation parameters to transmittingsection152.
Antenna101 receives the transmission RF signal from transmittingsection152 to transmit, while outputting a received RF signal toreception demodulation section150.
Communication control section4701 performs communication control such as channel control and time control essential for communications, and receives a command from an upper layer through a control signal. Upon receiving the command,communication control section4701 performs a command issue of the physical layer and confidential communication control through a transmission control signal and reception control signal.
Based on the configuration as described above, communication procedures will be described specifically with reference toFIG. 61. Herein, descriptions are given based on the confidential communication as described inEmbodiment 1. However, the present invention is not limited to such communications, and is apparently applicable to confidential communications as described in the other Embodiments.
(0) Initialization
In order to set each of communication terminals A5950 andB5951 for the initial state based on predetermined procedures at the time power is supplied or of starting communication, the upper layer outputs a control signal for initialization.
(0.a), (0.b) Based on the control signal received from the upper layer,communication terminal A5950 initializes the setting state related to the physical layer.
(1) Transmission of Secure Information
(1.0) The application of the communication terminal A outputs secure information and a request for transmitting the information to the upper layer.
(1.1) Upon receiving the secure transmission request, the upper layer of the communication terminal A issues a secure transmission command to the physical layer together with the secure information.
(1.2) Upon receiving the secure transmission request command, the physical layer of the communication terminal A transmits a secure communication command to the terminal B in accordance with communication timing between the terminals A and B.
(1.3) Upon receiving the secure communication command, the physical layer of the communication terminal B transmits the secure communication request to the communication terminal A together with a propagation estimation signal in accordance with the communication timing.
(1.4) Upon receiving the secure communication request, the physical layer of the communication terminal A estimates the propagation from the propagation estimation signal, and calculates the propagation parameter. Further, the physical layer transmits the secure information input in (1.2) using the propagation parameter to the communication terminal B by using the confidential communication method.
(1.5) The physical layer of the communication terminal B receives and demodulates the secure information transmitted using the confidential communication method, and outputs the information to the upper layer.
(1.6) The upper layer of the communication terminal B outputs the secure information output from the physical layer to the application.
According to the series of operation as described above, the secure information is transmitted from the application of the communication terminal A to the application of the communication terminal B using the confidential communication of the present invention. According to the procedures, it is possible to transmit the information in the most simplified communication procedures between the applications.
In the operation as described above, a practical communication signal in the physical layer will be described with reference toFIG. 64. The shaded portion in the figure indicates a signal from the communication terminal B to the communication terminal A, while the other portions indicate signals from the communication terminal A to the communication terminal B. When the secure communication command is issued (1.2), the secure communication request is received after a lapse of predetermined interval (Tgurad) together with the propagation estimation signal. Based on the propagation parameter calculated from the propagation estimation signal, the secure communication is executed (1.4).
The time indicated in the figure will be described below.
“Tguard” is a time provided to avoid collision of communication signals, and is obtained generally from a support communication distance.
“Taccess” indicates a time taken to complete the secure communication after the secure command is issued, and it is possible for the upper layer to manage the communication condition using the value in performing the secure communication.
“Treply” is a time taken to finish the secure communication after the secure communication request (propagation estimation signal) is provided. As described in the other Embodiments, the present invention uses the propagation parameter, thereby has the premise that there are no changes in propagation environment, and results in deterioration of communication quality when the propagation environment changes. The effects will be descried with reference toFIGS. 72 to 74.
FIG. 72 indicates time variations in orthogonality of propagation parameters, and represents variations in propagation environment at predetermined time using an index referred to as orthogonality. The vertical axis indicates the scale of index, and the horizontal axis indicates the symbol time. In other words, the index indicates the degree of orthogonality between the orthogonal vector obtained from a propagation state at a specific time (t=0) by singular value decomposition and the actual propagation state, and indicates that the propagation parameter is in accordance with the propagation state when the value is 0. The value indicates the difference between the propagation parameter and propagation state, and when the value exceeds 0.3 (shown by the dotted lines), the characteristic deteriorates largely.
FIGS. 73 and 74 indicate the communication quality using Bit Error Rate (BER), and in terms of versatility of variations in communications, show the communication quality in eight fading patterns.FIG. 73 indicates the communication state with the index of approximately 0.25, andFIG. 74 indicates the communication state with the index of approximately 0.35. InFIG. 73, BER falls below 0.01 in all the communications. On the contrary, inFIG. 74, BER remains above 0.01 in almost all the communications. When it is possible to restore information by error correction when BER is 0.01 or less, the target of the index is 0.3 or less in the confidential communication of the present invention.
fd shown inFIG. 72 represents a fading pitch, and is given by the following equation:
fd=(Smax/C)*Fc/Fbaud  (37)
where Smax is maximum shift speed, C is the velocity of light, Fc is a carrier frequency, and Fbaud is a symbol rate frequency. When thus obtained values are substituted into fd=1/n, as can be seen from the figure, the index exceeds 0.3 near n/4 to n/3 (symbol time). In other words, in order to perform stable communications, it is necessary to meet Treply<n/4 (symbol time) Specifications of wireless LAN are considered herein. Assuming that the maximum shift speed in communications is 30 km/h, and that the carrier frequency is 2.45 GHz, a value meeting Treply is obtained from equation (36). (Since fd and Treply are specified in Fbraud, Fbraud is canceled.)
Treply=C/Smax/Fc/4   (38)
Substituting the above conditions enables communications with high communication quality when Treply is about 3.5 ms or less.
Thus, since the value of Treply has limitations, it is effective in prohibiting access from another communication terminal within Taccess in TDD (Time Division Duplex) communications where duplex transmission is performed using the same frequency band. In other words, it is considered that the upper layer sets Taccess at a value (for example, 10 ms) larger than Treply, and executes the control such that terminals that perform confidential communications only occupy communication resources for this period.
Further, when there is much information to transmit, it is possible to cope with the transmission of much information by repeating procedures (1.3) and (1.4). In this case, it is desired to reserve long Taccess in response to the communication charge.
Procedures of the case of requesting secure information will be described with reference toFIG. 62.
(0) Initialization
The same operation as in the initialization as described earlier is performed.
(2) Reception of Secure Information
(2.0) The application of the communication terminal A outputs a request for secure information reception to the upper layer.
(2.1) Upon receiving the secure information reception request, the upper layer of the communication terminal B issues a secure reception command to the physical layer.
(2.2) Upon receiving the secure reception command, the physical layer of the communication terminal B transmits a secure communication request to the communication terminal B in accordance with communication timing together with the propagation estimation signal.
(2.3) Upon receiving the secure communication request, the physical layer of the communication terminal B estimates the propagation from the propagation estimation signal and calculates the propagation parameter. At the same time, the physical layer issues an information request command to the upper layer. (When the information is managed in the physical layer, the command is not issued to the upper layer, and procedures (2.4) and (2.5) are eliminated. Meanwhile, when the information is managed in the upper layer, (2.4) is eliminated.)
(2.4) Upon receiving the information request command from the physical layer, the upper layer of the communication terminal B acquires the information from the application.
(2.5) The upper layer of the communication terminal B issues an information response command to the physical layer together with the set information.
(2.6) The physical layer of the communication terminal B transmits the acquired information to the communication terminal A in the confidential communication method using the propagation parameter estimated in (2.4).
(2.7) The physical layer of the communication terminal A receives and demodulates the secure information transmitted using the confidential communication method to output to the upper layer.
(2.8) The upper layer of the communication terminal A outputs the secure information output from the physical layer to the application.
According to the series of operation as described above, it is possible that the application of the communication terminal A requests secure information to the application of the communication terminal B, and that communication terminal B transmits the secure information to the communication terminal A. According to the procedures, it is possible to receive the secure information in the most simplified procedures.
In the operation as described above, practical communication signals in the physical layer will be described with reference toFIG. 65. In the figure, shaded portions indicate signals from the communication terminal A to the communication terminal B, and the other portions indicate signals from the communication terminal B to the communication terminal A.
When a secure communication request is issued together with the propagation estimation signal (2.2), the secure communication is executed based on the propagation parameter calculated using the propagation estimation signal after a lapse of a predetermined interval (Tguard) (2.6).
Descriptions of the time are the same as inFIG. 64, and are omitted.
As described earlier, when Treply has limitations in time, the case is considered that the information according to (2.3) is not obtained soon. Communication procedures effective in such a case will be described below with reference toFIG. 64.
(0) Initialization
The same operation as in the initialization as described earlier is performed.
(3) Reception of Secure Information
(3.0) The application of the communication terminal
A outputs a request for secure information reception to the upper layer.
(3.1) Upon receiving the secure information reception request, the upper layer of the communication terminal A issues a secure reception command to the physical layer.
(3.2) Upon receiving the secure reception command, the physical layer of the communication terminal A transmits an information preparation request to the communication terminal B in accordance with communication timing.
(3.3) Upon receiving the information preparation request, the physical layer of the communication terminal B issues an information request command to the upper layer. (When the information is managed in the physical layer, the command is not issued to the upper layer, and procedures (3.4) and (3.5) are eliminated. Meanwhile, when the information is managed in the upper layer, (3.4) is eliminated.)
(3.4) Upon receiving the information request command from the physical layer, the upper layer of the communication terminal B acquires the information from the application.
(3.5) The upper layer of the communication terminal B issues an information response command to the physical layer together with the set information.
(3.6) When it is notified that the information is set using the information response command, the physical layer of the communication terminal B notifies the communication terminal A of completion of the information preparation.
(3.7) Upon receiving the notification of completion of the information preparation from the communication terminal B, the physical layer of the communication terminal A transmits a secure communication request to the communication terminal B in accordance with communication timing together with the propagation estimation signal.
(3.8) Upon receiving the secure communication request, the physical layer of the communication terminal B estimates the propagation from the propagation estimation signal and calculates the propagation parameter. The acquired information is transmitted to the communication terminal A in the confidential communication method using the estimated propagation parameter.
(3.9) The physical layer of the communication terminal A receives and demodulates the secure information transmitted using the confidential communication method to output to the upper layer.
(3.10) The upper layer of the communication terminal A outputs the secure information output from the physical layer to the application.
In the above operation, practical communication signals in the physical layer are the same as in descriptions ofFIG. 65, and descriptions thereof are omitted.
According to the operation as described above, it is possible to perform confidential communications without the application needs awareness of the communication state in particular. In addition, there is a case that the application needs to provide and receive specific information in confidential communications or needs information of whether the received information is in the confidential communication. In such a case, as shown inFIG. 60, in the processing inupper layer4750, a flag is set indicative of using the confidential communication as an attribute of the information in communicating the information, for example, in steps of (1.0), (2.0), (3.0), (1.6), (2.8) and (3.10)
In this way, using Embodiment 27 enables efficient control of the confidential communication in the psychical layer from the upper layer, and provides stable communication protocols.
Embodiment 28
Embodiment 28 further extends the invention described inEmbodiments 17 and 18, enables increases in the apparent number of transmission antennas that the communication terminal has, and improves the confidentiality.
FIG. 77 illustrates a communication system used in this Embodiment.
Communication terminal A7750 communicates withcommunication terminal B7751 throughchannel7752.Communication terminal A7750 has a single transmission/reception antenna element, whilecommunication terminal B7751 has four transmission/reception antenna elements.
Communication terminal A7750 will be described first.
Modulation section7701 receives data to modulate, and outputs the modulated signal.
Buffer7702 receives the modulated signal, and outputs the held modulated signal to channel combiningsection7703.
Channel combining section7703 performs combining using the modulated signal and channel parameter, and outputs a transmission signal to transmittingsection7704.
Transmittingsection7704 performs frequency conversion and power amplification on the transmission signal, and outputs a transmission RF signal toantenna7705.
Antenna7705 transmits the transmission RF signal, while outputting a received RF signal to receivingsection7706.
Receivingsection7706 converts the received RF signal input fromantenna7705 into a baseband signal to output to channelestimation section7707.
Channel estimation section7707 estimates the characteristic ofchannel7752 from the baseband signal input from receivingsection7706, and outputs the estimated channel information.
Channel analysis section7708 receives the channel estimated information, and calculates the channel parameter using a predetermined analysis method to output.
Communication terminal B7751 will be described below.
Antennas7709 receive transmission RF signals to transmit, while outputting a received RF signal to receivingsection7710.
Receivingsection7710 converts the received RF signal into a baseband signal to output to buffer7711.
Buffer7711 temporarily holds the baseband signal, and outputs a signal delayed by a predetermined time toselection synthesis section7712.
Selection synthesis section7712 synthesizes a signal with a time difference, and outputs a synthesized signal.
Demodulation section7713 receives the synthesized signal to demodulate, and obtains the data.
Referencesignal storing section7714 stores reference signals for use in estimatingchannel7752 to output.
Antenna selecting section7715 receives a reference signal, and outputs the reference signal to a selected antenna as a transmission signal.
Transmittingsection7716 receives the transmission signal, and outputs the transmission RF signal toantenna element7709.
Channels of communication propagation path are assumed to be channel matrix H comprised of h1, h2, h3 and h4.Communication terminal A7750 estimates the propagation using the reference signal fromcommunication terminal B7751, and at this point,communication terminal B7751 transmits signals orthogonal to each other from respective antennas so thatcommunication terminal A7750 is capable of measuring a coefficient of each of the antennas ofcommunication terminal B7751. Herein, as a typified example, reference signals are transmitted in Time Division. In this way, communication terminal A is capable of measuring h1, h2, h3 and h4.
In other words,antenna selecting section7715 sequentially switches between antennas to transmit a reference signal output from referencesignal storing section7714. The transmission signal output in this way is amplified in transmittingsection7716, and transmitted from a corresponding antenna.
In the communication terminal A,antenna7705 receives the reference signal and inputs a received RF signal to receivingsection7706, and thesection7706 converts the RF signal into a baseband signal.Channel estimation section7707 receives the baseband signal, performs channel estimation using the reference signal, and outputs channel information.Channel analysis section7708 receives the channel information to analyze. The analysis will be described using singular value decomposition described inEmbodiment 18. Singular value vector V obtained in singular value decomposition is divided into singular value vector with the singular value being not 0, and zero vectors with the singular vector being 0. Herein, it is assumed that vectors are v1 to v4, vi is the singular value vector, v2 to v4 are zero vectors, and the singular value is λ. Further, a vector element is defined as vn=(vn1 t vn4) (n=1 . . . 4). The singular value vector and zero vectors are output as channel parameters.
Modulation section7701 receives four sequences of data, and generates four sequences of modulated signals in a predetermined modulation scheme to output. It is assumed that the modulated signals are d1 to d4, d1 is a communication modulated signal, and that d2 to d4 are pseudo modulated signals.Buffer section7702 receives the four sequences of modulated signals to hold.Buffer section7702 continues to hold the same signal for four time slots.
In a first time slot,channel combining section7703 receives the four sequences of modulated signals and channel parameters, and performs calculation as described below:
DS1=Σ(vn1·dn)  (39)
(n is Σ variable, the same as in the following)
Thesection7703 outputs thus obtained transmission signal to transmittingsection7704.
Subsequently, in a similar way,channel combining section7703 receives modulated signals d1 to d4 and performs calculation in a kth time slot as described below:
DSk=Σ(vnk·dn)  (40)
Transmission signals corresponding to four time slots are thus transmitted, and received incommunication terminal B7751 viapropagation path7752.FIG. 78 illustrates the specific reception processing incommunication terminal B7751. Received RF signals received in antennas are converted into baseband signals in receivingsections7710 to be output, respectively.Buffer section7711 temporarily holds the baseband signals. Sixteen buffers are described for four time slots of four antenna sequences (4 time slots×4 antenna sequences). Signals of four time slots held inbuffer section7711 in the above operation are assumed to be Srx11 to Srx44. The signals are expressed as described below, using channel elements h1 to h4, channel parameter elements v11 to v44, and modulated signals St1 to St4:
Srxjk=hj·Σ(vnk·dn)  (41)
Herein, as shown inFIG. 68, noting a signal of Srj=Srxjk (j=k, J=1 . . . 4) obtains the following equation:
Srj=hj·Σ(vnj·dn)  (42)
Further, ΣSrn is given by the following equation using V and D, where D is [d1, d2, d3, d4]T (AT is the transpose of A).
ΣSrn=H·V·D=λd1  (43)
It is understood that according to the operation as described above, modulated signal d1 is obtained whichcommunication terminal A7750 intends to transmit, and the other modulated signals are canceled.Demodulation section7713 demodulates thus obtained signal without any particular processing, and obtains the data.
Even when a third party tries to demodulate the data, as in the other Embodiments, since the channel parameter is unknown, the third party cannot separate d1 nor demodulate. In this way, there is provided a significant feature that the confidential communication is implemented without needing particular calculation in reception and demodulation.
Communication signals as described above will be described with reference toFIGS. 67 and 75.
Shaded portions in the figures indicate signals transmitted fromcommunication terminal B7751 tocommunication terminal A7750, and the other portions indicate signals transmitted fromcommunication terminal A7750 tocommunication terminal B7751.
As indicated in the figures, propagation estimation signals are transmitted together with secure communication request signals. In this Embodiment, the number of time slots provided to transmit is the number of antenna elements ofcommunication terminal B7751. However, the present invention is not limited to such a number, as long as signals transmitted from antenna elements are orthogonal to each other, as described above. P1 to P4 indicated in the figure are known signals respectively transmitted from antennas, and based on the signals,channel estimation section7707 incommunication terminal A7750 estimates the propagation path. Then,communication terminal A7750 prepares four time slots (DS1 to DS4) provided by equation (40) in performing the confidential communication to transmit, and the confidential communication is thereby performed.
In the above descriptions, it is assumed thatantenna7705 incommunication terminal A7750 has a single antenna element, andantenna7709 incommunication terminal B7751 has four antenna elements, but the present invention is not limited to such a case. The present invention provides a more sophisticated communication system when m is less than n (m<n) where m is the number of elements ofcommunication terminal A7750 and n is the number of elements ofcommunication terminal B7751. When m is two or more, it is possible to perform the confidential communication as described in the other Embodiments by performing antenna selection such that k is selected among k (k<m). However, the present invention allows the confidential communication to be performed with the maximum number of channel elements, and thereby provides the communication protection of the highest degree.
In this way, using Embodiment 28 provides a feature that a communication terminal with a less number (m) of antenna elements provides the communication protection of the highest degree to a communication terminal with a larger number (n) of antenna elements, and in particular, exhibits the significant effect when m is 1.
InEmbodiments 1 to 28, confidential information corresponding to the propagation environment is acquired by the configuration of hardware. However, the present invention is not limited to such a case, and confidential information corresponding to the propagation environment may be acquired by processing in software using a program or the like. In this case, it may be possible to use a program or the like acquired in any method such as a program or the like stored in a storage medium such as CD-ROM and a program or the like transmitted through a network.
As described above, according to the present invention, since it is possible to extract data corresponding to the propagation state, it is possible to ensure high security without a significant change in communication system.
This application is based on the Japanese Patent Applications No.2002-054064 filed on Feb. 28, 2002, No.2002-132068 filed on May 7, 2002, and No.2003-48364 filed on Feb. 25, 2003, entire contents of which are expressly incorporated by reference herein.
INDUSTRIAL APPLICABILITY
The present invention is for use in a technique used in a digital communication, and in particular, is suitable for use in a technique related to security.

Claims (8)

The invention claimed is:
1. A communication apparatus, comprising:
a reference signal generating section that generates a first reference signal to enable a communicating party to estimate a propagation environment;
a transmitting section that transmits the first reference signal;
a storing section that stores a known signal known between the apparatus and the communicating party
a propagation estimating section that obtains correlation between the known signal and a second reference signal transmitted from the communicating party, and generates a delay profile as an estimation value of propagation environment;
a first data acquiring section that reads out first data associated with the delay profile generated in the propagation estimating section, from a reference table that associates the delay profile with the first data; and
a decoding section that decodes a transmission signal encoded and transmitted using an estimation value of the propagation environment estimated by the communicating party using the first reference signal, to obtain second data using the first data read out by the first data acquiring section.
2. The communication apparatus according toclaim 1, wherein the first data acquiring section calculates convolution of correlation between the known signal and the second reference signal, and a quantization vector stored in the reference table, and selects and reads out a vector code as the first data by performing metric calculation using the delay profile and the quantization vector subjected to the convolution.
3. The communication apparatus according toclaim 1, wherein the first data acquiring section performs orthogonal conversion on the delay profile generated in the propagation estimating section to condense signal components, and reads out the first data using signal components.
4. A communication method, comprising:
generating, in a first communication apparatus, a first reference signal to enable a second communication apparatus to estimate a propagation environment;
transmitting the first reference signal from the first communication apparatus to the second communication apparatus;
storing, in the first communication apparatus, a known signal known between the first communication apparatus and the second communication apparatus;
obtaining, in the first communication apparatus, correlation between the known signal and a second reference signal transmitted from the second communication apparatus, and generating, in the first communication apparatus, a delay profile as an estimation value of the propagation environment;
reading out, in the first communication apparatus, first data associated with the generated delay profile, from a reference table that associates the delay profile with the first data; and
decoding, in the first communication apparatus, a transmission signal encoded and transmitted using an estimation value of the propagation environment estimated by the second communication apparatus using the first reference signal, to second data using the first data read out.
5. A transmission method performed by a communication apparatus, the transmission method comprising:
generating two transmission signals by dividing a data signal;
selecting a phase for each of the two transmission signals to be transmitted based on a signal from another communication apparatus;
performing a precoding process on the two transmission signals, after the phase for each of the two transmission signals is selected, based on the signal from the other communication apparatus, wherein the precoding process includes changing at least a phase of each of the two transmission signals in response to the selected phase, and wherein the phase of data of the two transmission signals is different from phases of reference signals of the two transmission signals; and
transmitting the two transmission signals subjected to the precoding process via different antennas, respectively, with a same frequency band at a same timing.
6. A communication apparatus comprising:
a transmission modulator that
generates two transmission signals by dividing a data signal,
selects a phase for each of the two transmission signals to be transmitted based on a signal from another communication apparatus, and
performs a precoding process on the two transmission signals, after the phase for each of the two transmission signals is selected, based on the signal from the other communication apparatus, wherein the precoding process includes changing at least a phase of each of the two transmission signals in response to the selected phase, and wherein the phase of data of the two transmission signals is different from phases of reference signals of the two transmission signals; and
a transmitter that transmits the two transmission signals subjected to the precoding process via different antennas, respectively, with a same frequency band at a same timing.
7. A reception method performed by a communication apparatus, the reception method comprising:
receiving two signals, transmitted with a same frequency band at a same timing, the two signals having been subjected to a precoding process,
wherein a phase is selected in each of the two signals that were transmitted based on a signal from the communication apparatus,
wherein the precoding process is performed, after the phase for each of the two signals is selected, based on the signal from the communication apparatus,
wherein the precoding process includes changing at least a phase of each of the two signals in response to the selected phase, and
wherein the phase of data of the two signals is different from phases of reference signals of the two signals; and
demodulating a data signal included in the two signals.
8. A communication apparatus comprising:
a receiver that receives two signals, transmitted with a same frequency band at a same timing, the two signals having been subjected to a precoding process; and
a transmitter, which in operation, transmits a signal used for a determination of a phase of each of the two signals,
wherein at least a phase of each of the two signals is a modified phase that is based on the determined phase, and
wherein the modified phase of data of the two signals is different from phases of reference signals of the two signals; and
a demodulator that demodulates the two signals generated by the determined phase.
US16/295,7222002-02-282019-03-07Communication apparatus and communication systemExpired - LifetimeUSRE49244E1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/295,722USRE49244E1 (en)2002-02-282019-03-07Communication apparatus and communication system

Applications Claiming Priority (11)

Application NumberPriority DateFiling DateTitle
JP2002-0540642002-02-28
JP20020540642002-02-28
JP20021320682002-05-07
JP2002-1320682002-05-07
JP2003-0483642003-02-25
JP2003048364AJP2004032679A (en)2002-02-282003-02-25 Communication device and communication system
US10/502,048US7515714B2 (en)2002-02-282003-02-27Communication apparatus and communication system
PCT/JP2003/002174WO2003073689A1 (en)2002-02-282003-02-27Communication apparatus and communication system
US201113045876A2011-03-112011-03-11
US201414571857A2014-12-162014-12-16
US16/295,722USRE49244E1 (en)2002-02-282019-03-07Communication apparatus and communication system

Related Parent Applications (2)

Application NumberTitlePriority DateFiling Date
PCT/JP2003/002174ReissueWO2003073689A1 (en)2002-02-282003-02-27Communication apparatus and communication system
US10/502,048ReissueUS20050123138A1 (en)2002-02-282003-02-27Communication apparatus and communication system

Publications (1)

Publication NumberPublication Date
USRE49244E1true USRE49244E1 (en)2022-10-11

Family

ID=27767759

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US10/502,048CeasedUS7515714B2 (en)2002-02-282003-02-27Communication apparatus and communication system
US13/045,876Expired - LifetimeUSRE45368E1 (en)2002-02-282003-02-27Communication apparatus and communication system
US10/502,048GrantedUS20050123138A1 (en)2002-02-282003-02-27Communication apparatus and communication system
US14/571,857Expired - LifetimeUSRE47356E1 (en)2002-02-282003-02-27Communication apparatus and communication system
US16/295,722Expired - LifetimeUSRE49244E1 (en)2002-02-282019-03-07Communication apparatus and communication system

Family Applications Before (4)

Application NumberTitlePriority DateFiling Date
US10/502,048CeasedUS7515714B2 (en)2002-02-282003-02-27Communication apparatus and communication system
US13/045,876Expired - LifetimeUSRE45368E1 (en)2002-02-282003-02-27Communication apparatus and communication system
US10/502,048GrantedUS20050123138A1 (en)2002-02-282003-02-27Communication apparatus and communication system
US14/571,857Expired - LifetimeUSRE47356E1 (en)2002-02-282003-02-27Communication apparatus and communication system

Country Status (6)

CountryLink
US (5)US7515714B2 (en)
EP (5)EP2276193A1 (en)
JP (1)JP2004032679A (en)
CN (2)CN101917244A (en)
AU (1)AU2003211745A1 (en)
WO (1)WO2003073689A1 (en)

Families Citing this family (95)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB0305486D0 (en)*2003-03-112003-04-16Koninkl Philips Electronics NvMulti-input multi-output system
US20040179713A1 (en)*2003-03-112004-09-16Kenji TaniImage processing method, image processing apparatus, and information processing apparatus
US7983355B2 (en)2003-07-092011-07-19Broadcom CorporationSystem and method for RF signal combining and adaptive bit loading for data rate maximization in multi-antenna communication systems
US8391322B2 (en)2003-07-092013-03-05Broadcom CorporationMethod and system for single weight (SW) antenna system for spatial multiplexing (SM) MIMO system for WCDMA/HSDPA
KR100656017B1 (en)*2003-09-042006-12-11학교법인 도시샤Radio communication system
US7421075B2 (en)*2003-12-152008-09-02Microsoft CorporationWireless online cryptographic key generation method
US7680278B2 (en)*2004-02-042010-03-16Microsoft CorporationDomino scheme for wireless cryptographic communication and communication method incorporating same
US7804912B2 (en)*2004-09-232010-09-28Motorola, Inc.Method and apparatus for encryption of over-the-air communications in a wireless communication system
GB0423567D0 (en)*2004-10-232004-11-24Koninkl Philips Electronics NvMimo system and method of operating a mimo system
GB2433815B (en)*2004-10-262009-02-25Spansion LlcNon-volatile memory device
US8077782B2 (en)*2005-01-112011-12-13Sharp Kabushiki KaishaAdaptive modulation control apparatus and wireless communication apparatus
US8280046B2 (en)2005-09-122012-10-02Interdigital Technology CorporationMethod and system for deriving an encryption key using joint randomness not shared by others
KR101253370B1 (en)*2005-01-272013-04-11인터디지탈 테크날러지 코포레이션Method and system for deriving an encryption key using joint randomness not shared by others
US7382744B2 (en)*2005-01-272008-06-03Qualcomm IncorporatedSystems and methods for optimizing the allocation of resources to serve different types of data flows in a wireless communication system
CN101288260A (en)2005-01-272008-10-15美商内数位科技公司Method and system for deriving keys using joint random derivation without sharing by others
US7797320B2 (en)*2005-03-152010-09-14Hyperion Solutions CorporationDimensionality reduction
US7684784B2 (en)*2005-03-242010-03-23Honeywell International Inc.System for secure communications
EP1891772A2 (en)*2005-06-012008-02-27Koninklijke Philips Electronics N.V.Compensating for acquisition noise in helper data systems
US8730877B2 (en)2005-06-162014-05-20Qualcomm IncorporatedPilot and data transmission in a quasi-orthogonal single-carrier frequency division multiple access system
JP4662040B2 (en)*2005-07-082011-03-30日本電気株式会社 Communication system and synchronization control method thereof
KR100810231B1 (en)*2005-09-282008-03-06삼성전자주식회사 Signal transmission method and apparatus using multiple antennas in wireless communication system
CN102281536B (en)*2005-12-202016-03-09美商内数位科技公司Method and the wireless transmitter/receiver unit of key is produced from joint randomness
US7893873B2 (en)*2005-12-202011-02-22Qualcomm IncorporatedMethods and systems for providing enhanced position location in wireless communications
JP2007288694A (en)*2006-04-192007-11-01Nec CorpSecret communication system and channel control method
WO2007137246A2 (en)*2006-05-222007-11-29Continental Automotive Systems Us, Inc.Method of operating multiple vehicles using any transmitter from a programmed group
AT504196B1 (en)*2006-09-152012-04-15Frequentis Gmbh METHOD AND SYSTEM FOR TRANSFERRING CONFIDENTIAL AND NON-CONFIDENTIAL DATA
US7899475B2 (en)*2006-10-252011-03-01Microsoft CorporationEnhanced short message service (SMS)
JP2008109466A (en)*2006-10-262008-05-08Yokohama National Univ Secret key sharing method and apparatus
US7809074B2 (en)*2007-03-162010-10-05Freescale Semiconductor, Inc.Generalized reference signaling scheme for multi-user, multiple input, multiple output (MU-MIMO) using arbitrarily precoded reference signals
US7986933B2 (en)*2007-03-192011-07-26Apple Inc.Method and system for wireless communications between base and mobile stations
JP5126651B2 (en)*2007-03-282013-01-23株式会社国際電気通信基礎技術研究所 Communication system and radio apparatus used therefor
WO2008129754A1 (en)*2007-04-132008-10-30Panasonic CorporationOfdm signal reception apparatus and ofdm signal reception method
JP5147936B2 (en)*2007-04-192013-02-20インターデイジタル テクノロジー コーポレーション Method and apparatus for performing JRNSO in FDD, TDD, and MIMO communications
KR100903697B1 (en)*2007-05-252009-06-18스펜션 엘엘씨 Non-volatile memory
EP2168297A1 (en)*2007-06-082010-03-31QUALCOMM IncorporatedHierarchical modulation for communication channels in single-carrier frequency division multiple access
KR100889936B1 (en)*2007-06-182009-03-20한국전자통신연구원System and method for managing digital videos using video features
US20090046794A1 (en)*2007-07-252009-02-19Buffalo Inc.Multi-input multi-output communication device, antenna device and communication system
JP2009055228A (en)*2007-08-242009-03-12Sony CorpWireless communication system, wireless communication apparatus, and wireless communication method
US20100278335A1 (en)*2007-11-022010-11-04Per EngeArrangements for Location-Based Security Systems and Methods Therefor
CN101505485B (en)2008-02-052014-11-05三星电子株式会社Method and apparatus for sending SRS in LTE TDD system
JP2010109631A (en)*2008-10-292010-05-13Kyocera CorpWireless communication system, transmission device, and communication signal transmission method
IL194996A0 (en)*2008-10-302011-08-01Mariana GoldhamerA method for depoying heterogeneous base stations in a wireless network
US20100146289A1 (en)*2008-10-302010-06-10Theodoros KamakarisRadio scene encryption and authentication process
US8554136B2 (en)2008-12-232013-10-08Waveconnex, Inc.Tightly-coupled near-field communication-link connector-replacement chips
KR101616873B1 (en)*2008-12-232016-05-02삼성전자주식회사apparatus and method for estimating power requirement of digital amplifier
JP5590803B2 (en)*2009-01-132014-09-17キヤノン株式会社 Communication apparatus and communication method
WO2010098078A1 (en)*2009-02-242010-09-02パナソニック株式会社Wireless transmission apparatus and precoding method
US8611288B1 (en)*2009-03-052013-12-17Marvell International LtdSystems and methods for link adaptation in wireless communication systems
US8982803B1 (en)2009-03-052015-03-17Marvell International Ltd.Systems and methods for link adaption in wireless communication systems
JP5288473B2 (en)*2009-03-132013-09-11オムロンオートモーティブエレクトロニクス株式会社 Control system and method, and portable device and communication method
JP4918580B2 (en)*2009-08-272012-04-18株式会社エヌ・ティ・ティ・ドコモ Radio base station, mobile station, mobile communication method and measurement method
JP5573053B2 (en)*2009-09-042014-08-20ソニー株式会社 Wireless communication apparatus and wireless communication method
US8902873B2 (en)*2009-10-082014-12-02Qualcomm IncorporatedEfficient signaling for closed-loop transmit diversity
JP5505178B2 (en)*2009-11-022014-05-28日本電気株式会社 RADIO COMMUNICATION DEVICE, RADIO COMMUNICATION DEVICE RECEIVER LEVEL DETERMINING METHOD AND PROGRAM
EP2343837A1 (en)*2010-01-082011-07-13Alcatel LucentChannel state information feedback using a hierarchical codebook for vector quantisation
KR101737842B1 (en)2010-04-092017-05-29엘지전자 주식회사Method of transmitting and receiving a contention based uplink channel signal
WO2011126351A2 (en)*2010-04-092011-10-13엘지전자 주식회사Method for transceiving contention-based uplink channel signal
US9088888B2 (en)*2010-12-102015-07-21Mitsubishi Electric Research Laboratories, Inc.Secure wireless communication using rate-adaptive codes
WO2012161697A1 (en)*2011-05-242012-11-29Empire Technology Development LlcEncryption using real-world objects
CN103548293A (en)*2011-07-152014-01-29富士通株式会社Power compensation method, base station, and terminal equipment
KR101269502B1 (en)*2011-12-142013-05-30한국전자통신연구원Apparatus and method for secret key generation with varying wireless channel status in wireless communication networks
CN103368583B (en)*2012-04-112016-08-17华为技术有限公司The interpretation method of polar code and code translator
CN103684477B (en)*2012-09-242017-02-01华为技术有限公司 Method and device for generating mixed polar codes
US8855303B1 (en)*2012-12-052014-10-07The Boeing CompanyCryptography using a symmetric frequency-based encryption algorithm
KR20150132459A (en)*2013-03-152015-11-25키사, 아이엔씨.Ehf secure communication device
JP6273566B2 (en)2013-04-122018-02-07パナソニックIpマネジメント株式会社 COMMUNICATION SYSTEM, IMAGE GENERATION METHOD, AND COMMUNICATION DEVICE
JP6169715B2 (en)*2013-10-092017-07-26富士機械製造株式会社 Multiplexed communication system and work robot
US10470039B2 (en)2013-10-182019-11-05Hitachi, Ltd.Highly-secure wireless communication system
US9312944B2 (en)*2013-12-262016-04-12Aruba Networks, Inc.System, apparatus and method for integrated wireless link management for a multi-polarized antenna system
CN104753576B (en)*2013-12-302018-05-25瑞昱半导体股份有限公司Beam-shaper and its wireless communications method
US9124580B1 (en)*2014-02-072015-09-01The Boeing CompanyMethod and system for securely establishing cryptographic keys for aircraft-to-aircraft communications
KR102208226B1 (en)*2014-03-252021-01-27한국전자통신연구원Method and apparatus for transmitting and receiving
CN104980187B (en)*2014-04-082017-09-19华北电力大学 Method and device for signal denoising processing
JP6280993B2 (en)*2014-11-132018-02-14株式会社日立製作所 Wireless communication system and system for using the same
US9756024B2 (en)*2015-09-182017-09-05Trillium IncorporatedComputer-implemented cryptographic method for improving a computer network, and terminal, system and computer-readable medium for the same
FR3046315B1 (en)*2015-12-292018-04-27Thales METHOD FOR UNIVALENT AND UNIVERSAL EXTRACTION OF KEYS FROM THE PROPAGATION CHANNEL
US10616184B2 (en)*2016-06-302020-04-07Intel CorporationWireless display streaming of protected content
CN110999136B (en)2017-05-312022-06-24弗劳恩霍夫应用研究促进协会 Apparatus, measurement system for testing apparatus and method of operation thereof
US10999304B2 (en)2018-04-112021-05-04Palo Alto Networks (Israel Analytics) Ltd.Bind shell attack detection
US10764285B2 (en)*2018-07-252020-09-01Honda Motor Co., Ltd.Method and system for encryption using a radio frequency fingerprint
US10778339B2 (en)2018-09-142020-09-15Viasat, Inc.Systems and methods for creating in a transmitter a stream of symbol frames configured for efficient processing in a receiver
CN109302216B (en)*2018-12-042021-03-30电子科技大学 Full-duplex communication system based on spatial modulation
WO2020142882A1 (en)*2019-01-072020-07-16Oppo广东移动通信有限公司Codebook processing method, terminal device and network device
US11184377B2 (en)2019-01-302021-11-23Palo Alto Networks (Israel Analytics) Ltd.Malicious port scan detection using source profiles
US11184376B2 (en)*2019-01-302021-11-23Palo Alto Networks (Israel Analytics) Ltd.Port scan detection using destination profiles
US11184378B2 (en)2019-01-302021-11-23Palo Alto Networks (Israel Analytics) Ltd.Scanner probe detection
TWI693419B (en)*2019-02-132020-05-11國立交通大學Signal processing method
US11395136B2 (en)2019-09-252022-07-19Qualcomm IncorporatedImpairment based physical layer fingerprint
EP4097861A1 (en)*2020-01-312022-12-07Sony Group CorporationOperating a terminal device and a network node in a wireless mimo system
WO2021167569A1 (en)*2020-02-182021-08-26İstanbul Medi̇pol Üni̇versi̇tesi̇Joint random subcarrier selection and channel-based artificial signal design aided pls
CN112491547B (en)*2020-12-032022-06-28长春理工大学Atmospheric turbulence optical channel shared random bit extraction system
US20240259799A1 (en)*2021-06-232024-08-01Qualcomm IncorporatedMethods and apparatus for maintaining transmission integrity and authenticity through channel measurements and reporting
US12039017B2 (en)2021-10-202024-07-16Palo Alto Networks (Israel Analytics) Ltd.User entity normalization and association
US11799880B2 (en)2022-01-102023-10-24Palo Alto Networks (Israel Analytics) Ltd.Network adaptive alert prioritization system
CN119171990A (en)*2024-10-142024-12-20北京理工大学 Signal generation method and device, nonlinear system noise measurement method and system

Citations (29)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3633105A (en)*1970-04-011972-01-04Gte Automatic Electric Lab IncDigital adaptive equalizer system
US3671967A (en)*1970-05-111972-06-20Boeing CoMultiple antenna instrument landing system
JPS6020660A (en)1983-07-141985-02-01Sharp Corp Randomization method for encoded information
US4514753A (en)*1982-11-031985-04-30Colorado Video, IncorporatedSpectrum conservation in encoded color TV signals
JPS637010A (en)1986-06-271988-01-12Nec CorpConvolution operating circuit
JPS63121334A (en)1986-11-111988-05-25Kenwood CorpPrivacy communication system
US5027123A (en)1989-06-261991-06-25Simon HaykinAdaptive interference canceller
JPH04220033A (en)1990-12-191992-08-11Alpine Electron IncData communication system
JPH0541607A (en)1991-08-061993-02-19Kokusai Denshin Denwa Co Ltd <Kdd> Adaptive array antenna control method
JPH0595352A (en)1991-10-021993-04-16Matsushita Electric Ind Co LtdScrambler and its descrambler
US5532706A (en)1994-12-051996-07-02Hughes ElectronicsAntenna array of radiators with plural orthogonal ports
WO1996022643A1 (en)1995-01-201996-07-25Ericsson, Inc.Establishment of cryptographic keys in radio networks
US5675648A (en)*1992-12-241997-10-07British Telecommunications Public Limited CompanySystem and method for key distribution using quantum cryptography
JP2000046939A (en)1998-07-312000-02-18Nippon Telegr & Teleph Corp <Ntt> Wireless card position detection system and method, and recording medium recording position detection program
JP2000286751A (en)1999-03-302000-10-13Matsushita Electric Ind Co Ltd Base station apparatus and transmission method
US6144339A (en)1998-07-312000-11-07Nec CorporationArray antenna
JP2001244911A (en)2000-02-292001-09-07Communication Research LaboratoryInstrument and method for measuring transmission quality and information recording medium
JP2001308761A (en)2000-04-262001-11-02Toshiba Corp Mobile wireless terminal
JP2001326630A (en)2000-03-242001-11-22Samsung Electronics Co Ltd Key Agreement Method for Secure Communication System in Multiple Access Scheme
CN1330816A (en)1998-12-152002-01-09诺基亚网络有限公司Method and radio system for digital signal transmission
US20020018483A1 (en)*2000-06-012002-02-14Masahiro KuwabaraOFDM communication system and transmitter-receiver for use in the system
US6405020B1 (en)1997-09-242002-06-11Siemens AktiengesellschaftMethod and base station system for voice transmission via a radio interface in a digital radio communication system
US6492958B2 (en)2000-08-252002-12-10Nec CorporationAdaptive antenna reception apparatus
JP2003069516A (en)2001-08-272003-03-07Kenwood CorpReceiving method and receiver
US6590532B1 (en)1999-06-232003-07-08Japan As Represented By President Of Hokkaido UniversityRadio device
JP2003258771A (en)2002-03-062003-09-12Shuichi SasaokaSecret communication method
US20080318606A1 (en)2006-02-022008-12-25Fujitsu LimitedWireless transmission method, and wireless transmitter and wireless receiver
US7929592B1 (en)1999-04-022011-04-19Ntt Docomo, Inc.Channel estimation device and method, demodulation device and method, and fading frequency decision device and method
US20120127889A1 (en)2010-06-082012-05-24Panasonic CorporationMimo receiving apparatus and receiving method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP3567983B2 (en)2000-10-302004-09-22京セラミタ株式会社 Image forming machine
JP2002054064A (en)2000-08-032002-02-19Sekisui Chem Co LtdWater-disintegrable nonwoven fabric
JP2003048364A (en)2001-08-062003-02-18Canon Aptex IncMethod for detecting end of recording medium and recorder

Patent Citations (36)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US3633105A (en)*1970-04-011972-01-04Gte Automatic Electric Lab IncDigital adaptive equalizer system
US3671967A (en)*1970-05-111972-06-20Boeing CoMultiple antenna instrument landing system
US4514753A (en)*1982-11-031985-04-30Colorado Video, IncorporatedSpectrum conservation in encoded color TV signals
JPS6020660A (en)1983-07-141985-02-01Sharp Corp Randomization method for encoded information
JPS637010A (en)1986-06-271988-01-12Nec CorpConvolution operating circuit
JPS63121334A (en)1986-11-111988-05-25Kenwood CorpPrivacy communication system
US5027123A (en)1989-06-261991-06-25Simon HaykinAdaptive interference canceller
JPH04220033A (en)1990-12-191992-08-11Alpine Electron IncData communication system
JPH0541607A (en)1991-08-061993-02-19Kokusai Denshin Denwa Co Ltd <Kdd> Adaptive array antenna control method
JPH0595352A (en)1991-10-021993-04-16Matsushita Electric Ind Co LtdScrambler and its descrambler
US5675648A (en)*1992-12-241997-10-07British Telecommunications Public Limited CompanySystem and method for key distribution using quantum cryptography
US5532706A (en)1994-12-051996-07-02Hughes ElectronicsAntenna array of radiators with plural orthogonal ports
WO1996022643A1 (en)1995-01-201996-07-25Ericsson, Inc.Establishment of cryptographic keys in radio networks
US5604806A (en)1995-01-201997-02-18Ericsson Inc.Apparatus and method for secure radio communication
CN1179249A (en)1995-01-201998-04-15艾利森公司Establishment of cryptographic keys in radio networks
US5995533A (en)1995-01-201999-11-30Ericsson Inc.Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics
US6405020B1 (en)1997-09-242002-06-11Siemens AktiengesellschaftMethod and base station system for voice transmission via a radio interface in a digital radio communication system
US6144339A (en)1998-07-312000-11-07Nec CorporationArray antenna
JP2000046939A (en)1998-07-312000-02-18Nippon Telegr & Teleph Corp <Ntt> Wireless card position detection system and method, and recording medium recording position detection program
CN1330816A (en)1998-12-152002-01-09诺基亚网络有限公司Method and radio system for digital signal transmission
US20020012380A1 (en)*1998-12-152002-01-31Ari HottinenMethod and radio system for digital signal transmission
JP2000286751A (en)1999-03-302000-10-13Matsushita Electric Ind Co Ltd Base station apparatus and transmission method
US7929592B1 (en)1999-04-022011-04-19Ntt Docomo, Inc.Channel estimation device and method, demodulation device and method, and fading frequency decision device and method
US6590532B1 (en)1999-06-232003-07-08Japan As Represented By President Of Hokkaido UniversityRadio device
JP2001244911A (en)2000-02-292001-09-07Communication Research LaboratoryInstrument and method for measuring transmission quality and information recording medium
US7349545B2 (en)2000-03-242008-03-25Samsung Electronics Co., Ltd.Key agreement method in secure communication system using multiple access method
JP2001326630A (en)2000-03-242001-11-22Samsung Electronics Co Ltd Key Agreement Method for Secure Communication System in Multiple Access Scheme
JP2001308761A (en)2000-04-262001-11-02Toshiba Corp Mobile wireless terminal
US20020018483A1 (en)*2000-06-012002-02-14Masahiro KuwabaraOFDM communication system and transmitter-receiver for use in the system
US6492958B2 (en)2000-08-252002-12-10Nec CorporationAdaptive antenna reception apparatus
JP2003069516A (en)2001-08-272003-03-07Kenwood CorpReceiving method and receiver
JP2003258771A (en)2002-03-062003-09-12Shuichi SasaokaSecret communication method
US20080318606A1 (en)2006-02-022008-12-25Fujitsu LimitedWireless transmission method, and wireless transmitter and wireless receiver
US20130148757A1 (en)2006-02-022013-06-13Fujitsu LimitedWireless transmission method, and wireless transmitter and wireless receiver
US20130156122A1 (en)2006-02-022013-06-20Fujitsu LimitedWireless transmission method, and wireless transmitter and wireless receiver
US20120127889A1 (en)2010-06-082012-05-24Panasonic CorporationMimo receiving apparatus and receiving method

Non-Patent Citations (14)

* Cited by examiner, † Cited by third party
Title
A.O. Hero, Dept. of Electrical Engineering and Computer Science, University of Michigan, Apr. 24, 2001, pp. 1-37, downloaded from http://citeseer.ist.psu/edu/cs on Feb. 17, 2005.
An article by C. Uchiyama entitled "Ryoshi Rikigaku no Kiso to Ryoshi Ango Ryoshi Tsushin Channel no Shiten" ("Basics of Quantum Mechanics and Quantum Cryptography"), published in Surikagaku (Mathematical Sciences), No. 402, Dec. 1, 1996, pp. 53-61.
An article by M. Muroya et al. entitled "Digital Communication Series Digital Musen Tsushin" ("A Compensation Technique in Digital Radio Transmission"), published in Sangyo Tosho Kabushiki Kaisha ("Digital Radio Communication"), 5th Edition, Mar. 10, 1992, pp. 103-127 and pp. 169-170.
China Office action, dated Aug. 14, 2012.
English language Abstract of CN 1179249, Apr. 15, 1998.
English Language Abstract of JP 5-41607.
European Search Report for EP 11184390.0, dated Jun. 27, 2012.
European Search Report for EP 11184395.9, dated Jun. 27, 2012.
European Search Report for EP 11184399.1, dated Jun. 27, 2012.
H. Koorapaty, IEEE Communications Letters, vol. 4, No. 2, Feb. 2000, pp. 52-55.
J. Hershey et al., IEEE Transactions on Communications, vol. 43, No. 1, Jan. 1995, pp. 3-6.
Japan (JP Appl. No. 2003-048364) Office action, dated Jun. 30, 2011.
Japan (JP Appl. No. 2006-049160) Office action, dated Jun. 30, 2011.
Official Actions, dated Nov. 16, 2012, Jan. 28, 2014, and Mar. 4, 2013, Jul. 24, 2013 in related U.S. Appl. No. 13/353,627.

Also Published As

Publication numberPublication date
CN1643842A (en)2005-07-20
USRE45368E1 (en)2015-02-10
JP2004032679A (en)2004-01-29
CN101917244A (en)2010-12-15
EP2479922A1 (en)2012-07-25
AU2003211745A1 (en)2003-09-09
EP2479923A1 (en)2012-07-25
US7515714B2 (en)2009-04-07
EP2276193A1 (en)2011-01-19
EP2461517A3 (en)2012-07-25
US20050123138A1 (en)2005-06-09
EP2461517A2 (en)2012-06-06
EP1480372A4 (en)2005-04-20
USRE47356E1 (en)2019-04-16
WO2003073689A1 (en)2003-09-04
EP1480372A1 (en)2004-11-24
CN1643842B (en)2010-11-10

Similar Documents

PublicationPublication DateTitle
USRE49244E1 (en)Communication apparatus and communication system
US11018821B2 (en)OFDM frame communication method and apparatus
KR100887909B1 (en) Method and System for Increasing Bandwidth Efficiency in Multiple Input Multiple Output Channels
KR101301191B1 (en)Method and apparatus for orthogonal pilot tone mapping in multiple-in and multiple-out (mimo) and spatial division multiple access (sdma) systems
KR100707287B1 (en)Polarization state techniques for wireless communication
JP3992489B2 (en) Wireless communication method and apparatus
US7646822B2 (en)Antenna selective diversity
US20170034835A1 (en)Sharing Resources Between Wireless Networks
EP1233547A1 (en)Data transmitting apparatus, radio communication system and radio communication method
US20020150109A1 (en)Enhancing security and efficiency of wireless communications through structural embedding
JP2006230025A (en) Communication apparatus and communication method
JP2002523969A (en) Stack carrier discrete multitone communication technology
JP4794085B2 (en) Data transmission apparatus and wireless communication system
JP2004120730A (en) Communication method and transmitting device and receiving device using the same
WO2006010030A1 (en)Method and apparatus for transmitting and receiving a data symbol stream
JPH0758727A (en)Frequency diversity transmission equipment
KR20080010036A (en) Channel Estimation Apparatus and Method for Multi-antenna Communication System

Legal Events

DateCodeTitleDescription
FEPPFee payment procedure

Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY


[8]ページ先頭

©2009-2025 Movatter.jp