throbber
|||||||||||||||
`USOO5353352A
`11
`Patent Number:
`5,353,352
`45
`Date of Patent:
`Oct. 4, 1994
`
`United States Patent 19
`Dent et al.
`
`54)
`
`(75)
`
`MULTIPLE ACCESS CODNG FOR RADIO
`COMMUNICATIONS
`Paul W. Dent, Stehag, Sweden;
`Gregory E. Bottomley, Cary, N.C.
`
`Inventors:
`
`(73)
`
`Assignee:
`
`Ericsson GE Mobile Communications
`Inc., Research Triangle Park, N.C.
`866,865
`Apr. 10, 1992
`
`Appl. No.:
`Filed:
`
`Int. Cl. ............................................... H04K 1/00
`U.S. C. .......................................... 380/37; 37.5/1;
`380/34
`Field of Search ................. 375/1; 380/34, 37, 36,
`380/49, 50
`
`21
`22)
`(51
`(52)
`58)
`
`56)
`
`a
`
`OTHER PUBLICATIONS
`Tzannes, N. S., Communication and Radar Systems,
`N.J.: Prentice-Hall, Inc., 1985, pp. 227-239.
`Stremler, F. G., Introduction to Communication Systems,
`Mass.: Addison-Wesley Publishing Co., 1982, pp.
`406-48.
`"Introduction to Spread-Spectrum Antimultipath
`Techniques and Their Application to Urban Digital
`Radio', G. Turin, Proceedings of the IEEE, vol. 68,
`No. 3, Mar. 1980.
`(List continued on next page.)
`Primary Examiner-Tod R. Swann
`Attorney, Agent, or Firm-Burns, Doane, Swecker &
`Mathis
`ABSTRACT
`57
`Individual information signals encoded with a common
`block error-correction code are assigned a unique
`scrambling mask, or signature sequence, taken from a
`set of scrambling masks having selected correlation
`properties. The set of scrambling masks is selected such
`that the correlation between the modulo-2 sum of two
`masks with any codeword in the block code is a con
`stant magnitude, independent of the mask set and the
`individual masks being compared. In one embodiment,
`when any two masks are summed using modulo-2 arith
`metic, the Walsh transformation of that sum results in a
`maximally flat Walsh spectrum. For cellular radio tele
`phone systems using subtractive CDMA demodulation
`techniques, a two-tier ciphering system ensures security
`at the cellular system level by using a pseudorandomly
`generated code key to select one of the scrambling
`masks common to all of the mobile stations in a particu
`lar cell. Also, privacy at the individual mobile sub
`scriber level is ensured by using a pseudorandomly
`generated ciphering key to encipher individual informa
`tion signals before the scrambling operation.
`
`67 Claims, 9 Drawing Sheets
`
`88
`92
`A/FESF
`Alia
`f D JSElit
`p
`Altai
`
`96
`
`References Cited
`U.S. PATENT DOCUMENTS
`Baxter et al. .
`10/1977
`4,052,565
`Ohnsorge .
`1/1979
`4,134,071
`10/1981
`Gutleber .
`4,293,953
`Gutleber .
`6/1984
`4,455,662
`Gutleber .
`9/1984
`4,470,138
`Gutleber .
`2/1986
`4,568,915
`Torre et al. .
`2/1987
`4,644,560
`Gilhousen et al. .
`2/1990
`4,901,307
`Cripps et al. .
`5/1990
`4,930,140
`Albrieux et al. .
`6/1990
`4,933,952
`Kaufmann et al. .
`1/1991
`4,984,247
`Abrahamson et al. .
`6/1991
`5,022,049
`Saleh et al. ....................... 380/34 X
`9/1991
`5,048,057
`Dent .
`9/1991
`5,048,059
`Gilhousen et al. .
`10/1991
`5,056,109
`Dent ...................................... 380/49
`10/1991
`5,060,266
`Dent .
`2/1992
`5,091,942
`Gilhousen et al. .
`3/1992
`5,101,501
`Gilhousen et al. .
`4/1992
`5,103,459
`Gilhousen et al. .
`4/1992
`5,109,390
`Bi ............................................ 375/1
`8/1992
`5,136,612
`Dent ........................................ 375/1
`9/1992
`5,151,919
`Falconer et al. ........................ 375/1
`10/1992
`5,159,608
`FOREIGN PATENT DOCUMENTS
`336832 10/1989 European Pat. Off. .
`2172777 9/1986 United Kingdom .
`80
`
`82
`
`86
`Offiti
`All
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ISHIIEP
`Staff
`Gill
`
`f
`SAIG
`S.
`So
`
`alpha,
`Aer ,
`
`Af AESSAA
`Aer A
`
`Aecess an
`
`40),
`Aff a
`
`(IPHF
`AEYA,
`
`AEP
`Sil/
`
`Att
`SEFE
`FAIOP
`
`F-SPA
`witHPIAEA
`
`
`
`till
`Al
`tape?
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 1
`
`

`

`5,353,352
`Page 2
`
`OTHER PUBLICATIONS
`“A Communication Technique for Multipath Chan
`nels', R. Price et al., Proceedings of the IRE, Mar.
`1958, pp. 555-570.
`"Fading Channel Communications", P. Monsen, IEEE
`Communications Magazine, Jan. 1980, pp. 16-25.
`Proakis, J. G., Digital Communications,
`McGraw-Hill 1989, pp. 728-739.
`“Origins of Spread-Spectrum Communications',
`Scholtz, IEEE Transactions on Communications, vol.
`COM-30, No. 5, May 1982, pp. 18-21.
`“Very Low Rate Convolutional Codes for Maximum
`Theoretical Performance of Spread-Spectrum Multi
`ple-Access Channels' A Viterbi, IEEE Journal on
`Selected Areas in Communications, vol. 8, No. 4, May
`1990.
`MacWilliams, F., The Theory of Error-Correcting Codes,
`Part I and II, N.Y.: North-Holland, 1988, pp. 93-124,
`451-465.
`
`“A Class of Low-Rate Nonlinear Binary Codes”, A.
`Kerdock, Information and Control, vol. 20, pp. 182-187
`(1972).
`Tatsuro Masamura, "Spread Spectrum Multiple Access
`System with Intrasystem Interference Cancellation,'
`Transactions on the Institute of Electronics, Information d8.
`Communication Engineers, vol. E 71, No. 3, Mar. 1988,
`pp. 224-231.
`Mahesh K. Varanasi et al., “An Iterative Detector for
`Asynchronous Spread-Spectrum Multiple-Access Sys
`tems,' Proceedings of the IEEE Global Telecommunica
`tions Conference, vol. 1, Nov. 28-Dec. 1, 1988, pp.
`556-560.
`Ryuji Kohno et al., "Adaptive Cancellation of Interfer
`ence in Direct-Sequence Spread-Spectrum Multiple
`Access Systems,” Proceedings of the IEEE/IEICE
`Global Telecommunications Conference, vol. 1, Nov.
`15-18, 1987, pp. 630-634.
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 2
`
`

`

`U.S. Patent
`
`Oct. 4, 1994
`
`Sheet 1 of 9
`
`5,353,352
`
`AAAAAY
`
`AWAAAY
`
`AAA
`
`
`
`A/WAY
`
`WOWA
`
`AWAGY
`
`
`
`WWF
`
`AAA (WFWCY
`
`4.
`
`
`
`
`
`
`
`17A 423 &S
`S4 ;SS&
`{ZYZYZYZYZYU),
`Sf ZZZZZZZZZZZZZZZZ
`Af27.7
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 3
`
`

`

`U.S. Patent
`
`Oct. 4, 1994
`
`Sheet 2 of 9
`
`5,353,352
`
`
`
`
`
`
`
`|- ||- |? wywffffffff (º)
`
`| || | || | | | | | |
`
`
`
`/ 7W9/9 3/0/0/00%/
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 4
`
`

`

`US. Patent
`
`Oct. 4, 1994
`
`Sheet 3 of 9
`
`5,353,352
`
`
`
`2..r.-..._2.2-.-.7.I.-.II._-__-
`
`g\5%»é§§¢
`
`23%.}.
`
`
`
`.-.-.-..-T.-.T....T.T...T.-..77.-.-.....NN§§“§§V\Q\gNV‘Exwasx§§§x
`
`
`
`~-~-N.N:N-«-m-N-cwewwmooccooNeccccococcamecc
`
`..N§§Vxhw~§§fi\h\
`§N§§VK§§§M
`
`
`
`
`
`T...T.....T..77.-..-..n.-...T.-..-.-.-.T..T..-gg3.5%§5.5%\E
`
`o
`
`Z-M4
`«cuN«Nooocowowmoccoocoocmwccmcwoo
`
`
`
`..“5%“3.Vita\3SS$5駧m
`
`-mU.N
`
`mm.H.35....m...u35......ou.35.....u“3......
`
`+.2298..+n2228..a.“2228..+.2228..
`
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 5
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 5
`
`

`

`US. Patent
`
`Oct. 4, 1994
`
`Sheet 4 of 9
`
`5,353,352
`
`
`
`N-N-N-N.N-N-N-N-cNoNNNcooccNNcacccccocchNcc
`
`33¢,Eaé55xS
`
`.N§<N
`
`I-_-I-__-_T._T.__3....___T.-.I-.-__.._._v
`
`.NNx‘gxwk?N§u\Q\
`
`:3;oNNNNZNONN-N-:N-N:oNNNONNNNNNNN
`
`mufi§hmNVER.\.3SS3%.u$x§§§
`
`
`
`m:uSSE:noumoémfim3.35:23.0..5553.
`
`
`
`+.2228:+N2228:+a2228:lug—mama
`
`
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 6
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 6
`
`

`

`US. Patent
`
`49914,
`
`mS
`
`9
`
`253.,
`
`a................................
`og..NNxéa$§ENNNNSES\3
`
`E:._NNENeNNNN3. .Am5%.:NE\ENESENN
`NNNNNNNNEENNN
`
`
`
`
`.....-.--5.mN§§E§ENNENQNE\3a._.__-.m.-.-.-.....-....
`
`
`
`.._.._..___.__._.-..._.__.__._._.$3Nita$3éNNEEN
`
`fl_Illiiiiiliilillil.
`
`
`
`
`
`12...”...+1.lTmM,..23......2223...!..W-"w223...
`
`.-.-.-.-.-.-.-.-.-.-.
`
`
`I!!!NNENENMbeN§§N
`
`
`......._......_........NNNSZNENENENRENNI.
`
`
`
`..N-N-..N-221-1-....occococN-N-....ow:NNNNNN.
`
`
`
`.ESQ33NNN§§ENEENN
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 7
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 7
`
`
`

`

`US. Patent
`
`Oct. 4, 1994
`
`Sheet 6 0f 9
`
`5,353,352
`
`huwmqfi
`
`>§x§¢§§
`wu§a
`
`“Emmfiaufi
`
`§$Q
`
`§§§u§§u
`
`E§E§
`
`§\v.SQSFS
`
`Eiwfik
`
`Ne
`
`8
`
`3,
`
`mm
`
`>§§mEmw§u
`
`kwiwumk
`
`
`
`.QSQ.»gfifimfim
`
`§xSixth
`
`om
`
`§K§§m§§x
`
`«SVS§§
`
`\\§h§§\
`
`w§u§§§§m
`
`k3§§§
`
`cm
`
`\StE§§
`
`Emma
`
`NN
`
`
`
`§$Q
`
`§R§Emm§u
`
`w§$§m
`
`5%.»
`
`$535
`
`\EEE§§§§
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 8
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 8
`
`
`
`
`
`
`
`
`
`
`

`

`US. Patent'
`
`Oct. 4, 1994
`
`Sheet 7 of 9
`
`5,353,352
`
`i-____’7
`
`55.5%
`
`“EQQQx§%V§§§x§
`
`§Q§$§u
`
`
`
`“Qua.“
`
`on
`
`ud§§w§Q§§u§
`
`u§§§
`
`\‘qumwww§§k§$§
`
`.§§Q§$hfik
`3%\Ex‘
`A.§§§
`_55$“:
`Efiudmk
`
`S
`
`$5553u§§§w§§§~§u§
`
`35.3
`
`S
`
`
`
` EI11L...:1:
`
`J
`
`om
`
`.__
`
`_
`
`gEVN§§EVVEQM
`
`%SVV§§m€
`
`No
`
`E.
`
`EQQQFQm<§§§E§§x§hamen§D§¥
`
`
`
`
`
`kw§.§~\Ex‘xxa,
`
`cc
`
`§Q§¥
`
`8
`
`§§$§$
`
`
`
`§§.§\\E§§uw
`
`h§$§w
`
`xxstuwma.33<3§§§§x§
`
`KSMSS
`
`@Vm‘fiw
`
`5
`
`Exam“,
`
`.34
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 9
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 9
`
`
`
`
`
`
`

`

`US. Patent
`
`Oct. 4, 1994
`
`Sheet 8 of 9
`
`5,353,352
`
`3
`
`$§§E§§§$§L§
`
`$3
`
`k3V§§§w§
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 10
`
`§§$§§§E‘EwfiauAB5%:
`§§§.53
`EE§¥
`
`R¥it#3wVK§VMI§
`
`m.NV§§EN335.
`
`
`
`§t§§36%anmo<2§\§§§m§ES¥
`
`mm
`
`mimfiw.
`
`m3§§§Qw
`
`
`
`mmwkfiw\xwx‘
`
`5
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 10
`
`
`
`

`

`U.S
`
`Patent
`
`Oct. 4, 1994
`
`Sheet 9 0f 9
`
`5,353,352
`
`o:
`
`uxka,SNVNwvfié
`
`S5,
`
`§.\v.S§§
`
`NMSKQ
`
`§\
`
`\\
`
`SSR¥v§§
`
`Ei‘
`
`~43wa
`
`VV§§S§
`
`EQE
`
`EQR»
`
`EE$¥§Q
`
`mgmsfim
`
`§K§N§§
`
`.Vx‘xwk
`
`EK§§
`
`“$355EE.»
`
`8
`
`\EJQfixfi§§ke$§u
`
`m§§m$55qu
`
`
`
`humwkw
`
`N*_
`
`mfiémfiux
`
`«SSSEM
`
`§xVfifim
`
`EEmeu‘
`
`$3§§§w
`
`*3».
`
`.QESM
`
`sE$3
`
`QEm§
`
`
`
`.HSQ.»www.muw
`
`$3“56%
`Q3$3$$u§
`
`@Q
`
`w§$§w
`
`$4§§S
`
`
`
`§QEN§§§u§
`
`Eamuufi
`
`$<itVE‘mE§§4‘
`
`.5fifimfim‘
`
`§xVS§$S
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 11
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 11
`
`
`
`
`
`
`
`
`
`
`

`

`1.
`
`MULTIPLE ACCESS COOING FOR RADIO
`COMMUNICATIONS
`
`The present invention relates to the use of Code Divi
`sion Multiple Access (CDMA) communications tech
`niques in radio telephone communication systems, and
`more particularly, to an enhanced CDMA encoding
`scheme involving scrambling sequences for distinguish
`ing and protecting information signals in a spread spec
`10
`trum environment.
`BACKGROUND
`The cellular telephone industry has made phenome
`nal strides in commercial operations in the United States
`15
`as well as the rest of the world. Growth in major metro
`politan areas has far exceeded expectations and is out
`stripping system capacity. If this trend continues, the
`effects of rapid growth will soon reach even the small
`est markets. Innovative solutions are required to meet
`20
`these increasing capacity needs as well as maintain high
`quality service and avoid rising prices.
`Throughout the world, one important step in cellular
`systems is to change from analog to digital transmission.
`Equally important is the choice of an effective digital
`25
`transmission scheme for implementing the next genera
`tion of cellular technology. Furthermore, it is widely
`believed that the first generation of Personal Communi
`cation Networks (PCNs) employing low cost, pocket
`size, cordless telephones that can be carried comfort
`30
`ably and used to make or receive calls in the home,
`office, street, car, etc. would be provided by cellular
`carriers using the next generation of digital cellular
`system infrastructure and cellular frequencies. The key
`feature demanded of these new systems is increased
`35
`traffic capacity.
`Currently, channel access is achieved using Fre
`quency Division Multiple Access (FDMA) and Time
`Division Multiple Access (TDMA) methods. As illus
`trated in FIG. 1(a), in FDMA, a communication chan
`nel is a single radio frequency band into which a signal's
`transmission power is concentrated. Interference with
`adjacent channels is limited by the use of bandpass fil
`ters that only pass signal energy within the filters' speci
`fied frequency bands. Thus, with each channel being
`45
`assigned a different frequency, system capacity is lim
`ited by the available frequencies as well as by limitations
`imposed by channel reuse.
`In TDMA systems, as shown in FIG. 1(b), a channel
`consists of a time slot in a periodic train of time intervals
`over the same frequency. Each period of time slots is
`called a frame. A given signal's energy is confined to
`one of these time slots. Adjacent channel interference is
`limited by the use of a time gate or other synchroniza
`tion element that only passes signal energy received at
`55
`the propertime. Thus, the problem of interference from
`different relative signal strength levels is reduced.
`Capacity in a TDMA system is increased by com
`pressing the transmission signal into a shorter time slot.
`As a result, the information must be transmitted at a
`correspondingly faster burst rate that increases the
`amount of occupied spectrum proportionally. The fre
`quency bandwidths occupied are thus larger in FIG.
`1(b) than in FIG. 1(a).
`With FDMA or TDMA systems or hybrid
`65
`FDMA/TDMA systems, the goal is to ensure that two
`potentially interfering signals do not occupy the same
`frequency at the same time. In contrast, Code Division
`
`5,353,352
`2
`Multiple Access (CDMA) allows signals to overlap in
`both time and frequency, as illustrated in FIG. 1(c).
`Thus, all CDMA signals share the same frequency spec
`trum. In both the frequency and the time domain, the
`multiple access signals overlap. Various aspects of
`CDMA communications are described in "On the Ca
`pacity of a Cellular CDMA System,' by Gilhousen,
`Jacobs, Viterbi, Weaver and Wheatley, IEEE Trans, on
`Vehicular Technology, May 1991.
`In a typical CDMA system, the informational datas
`tream to be transmitted is impressed upon a much
`higher bit rate datastream generated by a pseudoran
`dom code generator. The informational datastream and
`the high bit rate datastream are typically multiplied
`together. This combination of higher bit rate signal with
`the lower bit rate datastream is called coding or spread
`ing the informational datastream signal. Each informa
`tional datastream or channel is allocated a unique
`spreading code. A plurality of coded information sig
`nals are transmitted on radio frequency carrier waves
`and jointly received as a composite signal at a receiver.
`Each of the coded signals overlaps all of the other
`coded signals, as well as noise-related signals, in both
`frequency and time. By correlating the composite signal
`with one of the unique spreading codes, the correspond
`ing information signal is isolated and decoded.
`There are a number of advantages associated with
`CDMA communication techniques. The capacity limits
`of CDMA-based cellular systems are projected to be up
`to twenty times that of existing analog technology as a
`result of the wideband CDMA system's properties such
`as improved coding gain/modulation density, voice
`activity gating, sectorization and reuse of the same spec
`trum in every cell. CDMA is virtually immune to multi
`path interference, and eliminates fading and static to
`enhance performance in urban areas. CDMA transmis
`sion of voice by a high bit rate encoder ensures superior,
`realistic voice quality. CDMA also provides for vari
`able data rates allowing many different grades of voice
`quality to be offered. The scrambled signal format of
`CDMA completely eliminates cross-talk and makes it
`very difficult and costly to eavesdrop or track calls,
`insuring greater privacy for callers and greater immu
`nity from air time fraud.
`Despite the numerous advantages afforded by
`CDMA systems, the capacity of conventional CDMA
`systems is limited by the decoding process. Because so
`many different user communications overlap in time
`and frequency, the task of correlating the correct infor
`mation signal with the appropriate user is complex. In
`practical implementations of CDMA communications,
`capacity is limited by the signal-to-noise ratio, which is
`essentially a measure of the interference caused by other
`overlapping signals as well as background noise. The
`general problem to be solved, therefore, is how to in
`crease system capacity and still maintain system integ
`rity and a reasonable signal-to-noise ratio. A specific
`aspect of that problem is how to optimize the process of
`distinguishing each coded information signal from all of
`the other information signals and noise-related interfer
`eCe.
`Another issue to be resolved in CDMA systems is
`system security and individual subscriber privacy. Since
`all of the coded subscriber signals overlap, CDMA
`decoding techniques typically require that the specific
`codes used to distinguish each information signal be
`generally known. This public knowledge of the actual
`codes used in a particular cell invites eavesdropping.
`
`SO
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 12
`
`

`

`20
`
`35
`
`10
`
`15
`
`3
`SUMMARY
`The encoding of individual information signals is
`simplified by encoding each signal with a common
`block error-correction code, which may be readily
`decoded using a correlation device such as a Fast Walsh
`Transform circuit. Each coded information signal is
`then assigned a unique scrambling mask, or signature
`sequence, taken from a set of scrambling masks having
`certain selected auto- and cross-correlation properties.
`These scrambling masks are ordered based on the signal
`strength of their respectively assigned coded informa
`tion signals. To enhance the decoding process, the high
`est ordered scrambling masks are initially selected in
`sequence to descramble the received composite signal.
`In general terms, the scrambling mask set is selected
`such that the sum of any two scrambling masks, using
`modulo-2 arithmetic, is equally correlated in magnitude
`to all codewords of the common block error-correction
`code. For the case where the block error-correction
`code is a Walsh-Hadamard code, if any two scrambling
`masks are summed using modulo-2 arithmetic, and the
`binary values of the product are represented with +1
`and -1 values, then the Walsh transform of that sum
`results in a maximally flat Walsh spectrum. Sequences
`25
`with such a spectrum are sometimes referred to as
`“bent' sequences.
`In the context of cellular radio telephone systems
`using subtractive CDMA demodulation techniques, the
`present invention incorporates a two-tier ciphering
`30
`system to ensure security at the cellular system level
`and privacy at the individual mobile subscriber level. At
`the system level, a pseudorandomly generated code key
`is used to select one of the scrambling masks common to
`all of the mobile stations in a particular cell. At the
`subscriber level, a pseudorandomly generated ciphering
`key enciphers individual information signals before the
`scrambling operation.
`BRIEF DESCRIPTION OF THE DRAWINGS
`The present invention will now be described in more
`detail with reference to preferred embodiments of the
`invention, given only by way of example, and illustrated
`in the accompanying drawings, in which:
`FIGS. 1(a)-(c) are plots of access channels using
`45
`different multiple access techniques;
`FIG. 2 shows a series of graphs illustrating how
`CDMA signals are generated;
`FIGS. 3 and 4 show a series of graphs for illustratin
`how CDMA signals are decoded;
`50
`FIG. 5 shows a series of graphs illustrating a subtrac
`tive CDMA demodulation technique;
`FIG. 6 is a generalized schematic showing a spread
`spectrum communications system;
`FIG. 7 is a functional block diagram of a system that
`55
`may be used to implement one of the preferred embodi
`ments of the present invention;
`FIG. 8 is a block diagram of another receiver in ac
`cordance with the present invention; and
`FIG. 9 is a functional block diagram of a system that
`may be used to implement another of the preferred
`embodiments of the present invention.
`DETAILED DESCRIPTION
`While the following description is in the context of 65
`cellular communications systems involving portable or
`mobile radio telephones and/or Personal Communica
`tion Networks (PCNs), it will be understood by those
`
`5,353,352
`4
`skilled in the art that the present invention may be ap
`plied to other communications applications. Moreover,
`while the present invention may be used in a subtractive
`CDMA demodulation system, it also may be used in
`applications of other types of spread spectrum commu
`nication systems.
`CDMA demodulation techniques will now be de
`scribed in conjunction with the signal graphs shown in
`FIGS. 2-4 which set forth example waveforms in the
`coding and decoding processes involved in traditional
`CDMA systems. Using the waveform examples from
`FIGS. 2-4, the improved performance of a subtractive
`CDMA demodulation technique is illustrated in FIG. 5.
`Additional descriptions of conventional and subtractive
`CDMA demodulation techniques may be found in co
`pending, commonly assigned U.S. patent application
`Ser. No. 07/628,359 filed on Dec. 17, 1990, which is
`incorporated herein by reference, and in co-pending,
`commonly assigned U.S. patent application Ser. No.
`07/739,446 filed on Aug. 2, 1991, which is also incorpo
`rated herein by reference.
`Two different datastreams, shown in FIG.2 as signal
`graphs (a) and (d), represent digitized information to be
`communicated over two separate communication chan
`nels. Information signal 1 is modulated using a high bit
`rate, digital code that is unique to signal 1 and that is
`shown in signal graph (b). For purposes of this descrip
`tion, the term “bit” refers to a binary digit or symbol of
`the information signal. The term "bit period' refers to
`the time period between the start and the finish of one
`bit of the information signal. The term "chip” refers to
`a binary digit of the high rate code signal. Accordingly,
`the term "chip period' refers to the time period be
`tween the start and the finish of one chip of the code
`signal. Naturally, the bit period is much greater than the
`chip period. The result of this modulation, which is
`essentially the product of the two signal waveforms, is
`shown in the signal graph (c). In Boolean notation, the
`modulation of two binary waveforms is essentially an
`exclusive-OR operation. A similar series of operations is
`carried out for information signal 2 as shown in signal
`graphs (d)-(f). In practice, of course, many more than
`two coded information signals are spread across the
`frequency spectrum available for cellular telephone
`communications.
`Each coded signal is used to modulate a radio fre
`quency (RF) carrier using any one of a number of mod
`ulation techniques, such as Binary Phase Shift Keying
`(BPSK) or Quadrature Phase Shift Keying (QPSK). In
`a cellular telephone system, each modulated carrier is
`transmitted over an air interface. At a radio receiver,
`such as a cellular base station, all of the signals that
`overlap in the allocated frequency bandwidth are re
`ceived together. The individually coded signals are
`added, as represented in the signal graphs (a)-(c) of
`FIG. 3, to form a composite signal waveform (graph
`(c)).
`After demodulation of the received signal to the ap
`propriate baseband frequency, the decoding of the com
`posite signal takes place. Information signal 1 may be
`decoded or despread by multiplying the received com
`posite signal shown in FIG. 3(c) with the unique code
`used originally to modulate signal 1 that is shown in
`signal graph (d). The resulting signal is analyzed to
`decide the polarity (high or low, +1 or -1, “1” or "0")
`of each information bit period of the signal. The details
`of how the receiver's code generator becomes time
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 13
`
`

`

`5,353,352
`5
`6
`synchronized to the transmitted code are known in the
`lation technique, “noise' includes both hostile and
`friendly signals, and may be defined as any signals other
`art.
`These decisions may be made by taking an average or
`than the signal of interest, i.e., the signal to be decoded.
`majority vote of the chip polarities during each bit
`Expanding the example described above, if a signal-to
`period. Such "hard' decision making processes are
`interference ratio of 10:1 is required and the processing
`acceptable as long as there is no signal ambiguity. For
`gain is 1000:1, conventional CDMA systems have the
`example, during the first bit period in the signal graph
`capacity to allow up to 101 signals of equal energy to
`(f), the average chip value is -- 1.00 which readily indi
`share the same channel. During decoding, 100 of the
`cates a bit polarity +1. Similarly, during the third bit
`101 signals are suppressed to 1/1000th of their original
`period, the average chip value is -0.75, and the bit
`interfering power. The total interference energy is thus
`polarity is also most likely a -1. However, in the sec
`100/1000, or 1/10, as compared to the desired informa
`ond bit period, the average chip value is zero, and the
`tion energy of unity. With the information signal energy
`majority vote or average test fails to provide an accept
`ten times greater than the interference energy, the infor
`able polarity value.
`nation signal may be correlated accurately.
`Together with the required signal-to-interference
`In such ambiguous situations, a "soft' decision mak
`15
`ing process must be used to determine the bit polarity.
`ratio, the processing gain determines the number of
`For example, an analog voltage proportional to the
`allowed overlapping signals in the same channel. That
`received signal after despreading may be integrated
`this is still the conventional view of the capacity limits
`over the number of chip periods corresponding to a
`of CDMA systems may be recognized by reading, for
`single information bit. The sign or polarity of the net
`example, the above-cited paper by Gilhousen et al.
`20
`integration result indicates that the bit value is a +1 or
`In contrast to conventional CDMA, an important
`“1.
`aspect of the subtractive CDMA demodulation tech
`The decoding of signal 2, similar to that of signal 1, is
`nique is the recognition that the suppression of friendly
`illustrated in the signal graphs (a)-(d) of FIG. 4. How
`CDMA signals is not limited by the processing gain of
`ever, after decoding, there are no ambiguous bit polar
`the spread spectrum demodulator as is the case with the
`25
`suppression of military type jamming signals. A large
`ity situations.
`Theoretically, this decoding scheme can be used to
`percentage of the other signals included in a received,
`decode every signal that makes up the composite signal.
`composite signal are not unknown jamming signals or
`Ideally, the contribution of unwanted interfering signals
`environmental noise that cannot be correlated. Instead,
`is minimized when the digital spreading codes are or
`most of the noise, as defined above, is known and is used
`30
`thogonal to the unwanted signals. (Two binary sequen
`to facilitate decoding the signal of interest. The fact that
`ces are orthogonal if they differ in exactly one half of
`the characteristics of most of these noise signals are
`their bit positions.) Unfortunately, only a certain num
`known, including their corresponding spreading codes,
`ber of orthogonal codes exist for a given word length.
`is used in the subtractive CDMA demodulation tech
`nique to improve system capacity and the accuracy of
`Another problem is that orthogonality can be main
`35
`tained only when the relative time alignment between
`the signal decoding process. Rather than simply decode
`two signals is strictly maintained. In communications
`each information signal from the composite signal, the
`environments where portable radio units are moving
`subtractive CDMA demodulation technique also re
`constantly, such as in cellular systems, precise time
`moves each information signal from the composite sig
`alignment is difficult to achieve. When code orthogo
`nal after it has been decoded. Those signals that remain
`nality cannot be guaranteed, noise-based signals may
`are decoded only from the residual of the composite
`interfere with the actual bit sequences produced by
`signal. Consequently, the already decoded signals do
`different code generators, e.g., the mobile telephones.
`not interfere with the decoding of the remaining signals.
`In comparison with the originally coded signal energies,
`For example, in FIG. 5, if signal 2 has already been
`however, the energy of the noise signals is usually small.
`decoded as shown in the signal graph (a), the coded
`45
`"Processing gain is a parameter of spread spectrum
`form of signal 2 can be reconstructed as shown in the
`systems, and for a direct spreading system it is defined
`signal graphs (b) and (c) (with the start of the first bit
`as the ratio of the spreading or coding bit rate to the
`period of the reconstructed datastream for signal 2
`underlying information bit rate, i.e., the number of chips
`aligned with the start of the fourth chip of the code for
`per information bit or symbol. Thus, the processing gain
`signal 2 as shown in FIG. 2 signal graphs (d) and (e)),
`is essentially the bandwidth spreading ratio, i.e., the
`and subtracted from the composite signal in the signal
`ratio of the bandwidths of the spreading code and infor
`graph (d) (again with the first chip of the reconstructed
`mation signal. The higher the code bit rate, the wider
`coded signal 2 aligned with the fourth chip of the re
`the information is spread and the greater the spreading
`ceived composite signal) to leave coded signal 1 in the
`ratio. For example, a one kilobit per second information
`signal graph (e). This is easily verified by comparing
`55
`signal graph (e) in FIG. 5 with signal graph (c) in FIG.
`rate used to modulate a one megabit per second code
`signal has processing gain of 1000:1. The processing
`2 (truncated by removing the first three and the very
`last chip). Signal 1 is recaptured easily by multiplying
`gain shown in FIG. 2, for example, is 8:1, the ratio of the
`code chip rate to the information datastream bit rate.
`the coded signal 1 with code 1 to reconstruct signal 1.
`Large processing gains reduce the chance of decod
`Note that because the bit periods of datastreams for
`ing noise signals modulated using uncorrelated codes.
`signals 1 and 2 are shifted relative to one another by 2
`For example, processing gain is used in military con
`chips there are only six + 1 chips in the first bit period
`texts to measure the suppression of hostile jamming
`of the recaptured signal 1 shown in FIG. 5 signal graph
`signals. In other environments, such as cellular systems,
`(f). It is significant that while the conventional CDMA
`processing gain helps suppress other, friendly signals
`decoding method was unable to determine whether the
`that are present on the same communications channel
`polarity of the information bit in the second bit period
`of signal 1 was a +1 or a -1 in signal graph (f) of FIG.
`but use codes that are uncorrelated with the desired
`code. In the context of the subtractive CDMA demodu
`3, the decoding method of the subtractive CDMA de
`
`65
`
`O
`
`50
`
`Petitioner Sirius XM Radio Inc. - Ex. 1011, p. 14
`
`

`

`O
`
`5,353,352
`7
`8
`modulation technique effectively resolves that ambigu
`24-bit orthogonal codewords. Decoding an orthogonal
`ity simply by removing signal 2 from the composite
`codeword involves correlation with all members of the
`signal.
`set of N=2M codewords. The binary index of the code
`A general CDMA system will now be described in
`word giving the highest correlation yields the desired
`conjunction with FIG. 6. An information source such as
`information. For example, if a correlation of sixteen
`speech is converted from analog format to digital for
`16-bit codewords numbered 0-15 produces the highest
`mat in a conventional source coder 20. The digital bit
`correlation on the tenth 16-bit codeword, the underly
`stream generated by the transmitter source coder 20
`ing information signal is the 4-bit binary codeword 1010
`may be further processed in a transmitter error correc
`(which is the integer 10 in decimal notation, hence, the
`tion coder 22 that adds redundancy which increases the
`index of 10). Such a code is also termed a 16,4 orthog
`bandwidth orbitrate of the transmission. In response to
`onal block code and has a spreading ratio R= 16/4=4.
`a spreading code selection signal from a suitable control
`By inverting all of the bits of the codewords, one fur
`mechanism such as a programmable microprocessor
`ther bit of information may be conveyed per codeword.
`(not shown), a particular spreading code is generated by
`This type of coding is known as bi-orthogonal block
`coding.
`a transmit spreading code generator 24, which as de
`15
`scribed above may be a pseudorandom number genera
`A significant feature of such coding is that simulta
`tor. The selected spreading code is summed in a modu
`neous correlation with all the orthogonal block code
`lo-2 adder 26 with the coded information signal from
`words in a set may be performed efficiently by means of
`the error correction coder 22. It will be appreciated that
`a Fast Walsh

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket