Method and device for implementing radio frequency coexistence management strategy in wireless devices
First Claim
Patent Images
1. A method for implementing a radio frequency (RF) co-existence management strategy on a wireless device between an aggressor communication activity (“
- aggressor”
) and a victim communication activity (“
victim”
), comprising;
determining whether an RF interference event is detected;
creating an RF co-existence management strategy in response to determining that the RF interference event is detected;
determining whether to implement robust receive (Rx) processing as part of the RF co-existence management strategy;
configuring the victim for implementation of the robust Rx processing in response to determining to implement the robust Rx processing, comprising;
determining whether de-sense is persistent by determining whether a number of aggressor hopping frequencies that result in de-sense exceeds a minimum percentage; and
implementing the robust Rx processing on the victim in response to determining to implement the robust Rx processing as part of the RF co-existence management strategy.
1 Assignment
0 Petitions
Accused Products
Abstract
The various embodiments include a dual-SIM-dual-active (DSDA) device and methods for implementing robust receive (Rx) processing to resolve radio frequency coexistence interference between two subscriptions operating on the DSDA device. The DSDA device may detect when a subscription (the “aggressor”) de-senses the other subscription (the “victim”) as a result of the aggressor'"'"'s transmissions, and in response, implement robust Rx processing to mitigate the effects of de-sense on the victim while causing minimal impact to the aggressor.
-
Citations
40 Claims
-
1. A method for implementing a radio frequency (RF) co-existence management strategy on a wireless device between an aggressor communication activity (“
- aggressor”
) and a victim communication activity (“
victim”
), comprising;determining whether an RF interference event is detected; creating an RF co-existence management strategy in response to determining that the RF interference event is detected; determining whether to implement robust receive (Rx) processing as part of the RF co-existence management strategy; configuring the victim for implementation of the robust Rx processing in response to determining to implement the robust Rx processing, comprising; determining whether de-sense is persistent by determining whether a number of aggressor hopping frequencies that result in de-sense exceeds a minimum percentage; and implementing the robust Rx processing on the victim in response to determining to implement the robust Rx processing as part of the RF co-existence management strategy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
- aggressor”
-
11. A wireless device, comprising:
-
a plurality of radio frequency (RF) resources; and a processor coupled to the plurality of RF resources, wherein the processor is configured with processor-executable instructions to; determine whether an RF interference event between an aggressor communication activity (“
aggressor”
) and a victim communication activity (“
victim”
) is detected;create an RF co-existence management strategy in response to determining that the RF interference event is detected; determine whether to implement robust receive (Rx) processing as part of the RF co-existence management strategy; configure the victim for implementation of the robust Rx processing in response to determining to implement the robust Rx processing by; determining whether de-sense is persistent by determining whether a number of aggressor hopping frequencies that result in de-sense exceeds a minimum percentage; and implement robust Rx processing on the victim in response to determining to implement the robust Rx processing as part of the RF co-existence management strategy. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A wireless device, comprising:
-
means for determining whether a radio frequency (RF) interference event between an aggressor communication activity (“
aggressor”
) and a victim communication activity (“
victim”
) is detected;means for creating an RF co-existence management strategy in response to determining that the RF interference event is detected; means for determining whether to implement robust receive (Rx) processing as part of the RF co-existence management strategy; means for configuring the victim for implementation of the robust Rx processing in response to determining to implement the robust Rx processing, comprising; means for determining whether de-sense is persistent further comprising means for determining whether a number of aggressor hopping frequencies that result in de-sense exceeds a minimum percentage; and means for implementing the robust Rx processing on the victim in response to determining to implement the robust Rx processing as part of the RF co-existence management strategy. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A non-transitory processor-readable storage medium having stored thereon processor-executable software instructions configured to cause a processor of a wireless device to perform operations comprising:
-
determining whether a radio frequency (RF) interference event between an aggressor communication activity (“
aggressor”
) and a victim communication activity (“
victim”
) is detected;creating an RF co-existence management strategy in response to determining that the RF interference event is detected;
determining whether to implement robust receive (Rx) processing as part of the RF co-existence management strategy;configuring the victim for implementation of the robust Rx processing in response to determining to implement the robust Rx processing, comprising; determining whether de-sense is persistent by determining whether a number of aggressor hopping frequencies that result in de-sense exceeds a minimum percentage; and implementing robust Rx processing on the victim in response to determining to implement the robust Rx processing as part of the RF co-existence management strategy. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification