Systems and/or methods of wireless communications
First Claim
1. A system comprising a mobile device that is configured to communicate with a base station and with an access point that is installed in a residence/office;
- the mobile device comprising a processor that is configured to control the mobile device to perform operations comprising;
communicating with the access point and with the base station in order to provide a make before break connection in handing-over from the base station to the access point or from the access point to the base station; and
preferentially communicating with the access point when proximate thereto and refrain from communicating with the base station when proximate to the access point even though the mobile device is able to communicate with the base station when proximate to the access point, wherein the operations further comprise;
preferentially communicating with a first access point responsive to an identity of the mobile device;
and refraining from communicating with a second access point responsive to the identity of the mobile device.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure and the plurality of mobile devices communicating therewith to increase privacy and undetectability of transmitted signals. The increased level of privacy and undetectability of signals is provided via pseudo-randomly generated signaling alphabets that are used by the mobile devices and by the system infrastructure to provide the communications. This represents a level of encryption/scrambling that is over and above the conventional encryption and/or scrambling at the bit level. Accordingly, systems, methods and/or devices providing a concatenated level of encryption/scrambling are provided.
-
Citations
9 Claims
-
1. A system comprising a mobile device that is configured to communicate with a base station and with an access point that is installed in a residence/office;
- the mobile device comprising a processor that is configured to control the mobile device to perform operations comprising;
communicating with the access point and with the base station in order to provide a make before break connection in handing-over from the base station to the access point or from the access point to the base station; and preferentially communicating with the access point when proximate thereto and refrain from communicating with the base station when proximate to the access point even though the mobile device is able to communicate with the base station when proximate to the access point, wherein the operations further comprise;
preferentially communicating with a first access point responsive to an identity of the mobile device;and refraining from communicating with a second access point responsive to the identity of the mobile device. - View Dependent Claims (2, 3, 4)
- the mobile device comprising a processor that is configured to control the mobile device to perform operations comprising;
-
5. A method of communicating between a mobile device and a base station and between the mobile device and an access point that is installed in a residence/office;
- the method comprising;
communicating by the mobile device with the access point and with the base station in order to provide a make before break connection prior to handing-over communications from the base station to the access point or from the access point to the base station; preferentially communicating by the mobile device with the access point when proximate thereto and refraining from communicating with the base station when the mobile device is proximate to the access point even though the mobile device is able to communicate with the base station when proximate to the access point; preferentially communicating by the mobile device with a first access point responsive to an identity of the mobile device; and refraining from communicating by the mobile device with a second access point responsive to the identity of the mobile device. - View Dependent Claims (6, 7, 8, 9)
- the method comprising;
Specification