System and method for third-party assisted peer-to-peer communication

ABSTRACT

Techniques are provided for third-party assisted peer-to-peer (P2P) communication. For example, there is provided a method, operable by a network entity, that may involve receiving first information from a first mobile entity, the first information comprising a first message for a second mobile entity. The method may involve receiving second information from the second mobile entity, the second information comprising a second message for the first mobile entity. The method may further involve coding third information based at least in part on the first information and the second information, and sending the third information to the first and second mobile entities. The method may also involve transmitting a control signal that includes processing information for decoding the coded third information to extract the first message or the second message.

CROSS-REFERENCE TO RELATED APPLICATION

The present Application for Patent claims priority to ProvisionalApplication No. 61/445,405, filed Feb. 22, 2011, entitled “SYSTEM ANDMETHOD FOR THIRD-PARTY ASSISTED PEER-TO-PEER COMMUNICATION”, and isassigned to the assignee hereof, and is hereby expressly incorporated inits entirety by reference herein.

BACKGROUND

1. Field

The present application relates generally to wireless communications,and more specifically to network coding for peer-to-peer communicationof wireless devices.

2. Background

The 3rd Generation Partnership Project (3GPP) Long Term Evolution (LTE)represents a major advance in cellular technology and is the next stepforward in cellular 3G services as a natural evolution of Global Systemfor Mobile communications (GSM) and Universal Mobile TelecommunicationsSystem (UMTS). The LTE physical layer (PHY) is a highly efficient meansof conveying both data and control information between an evolved NodeB(eNB) and mobile entities, such as, for example, access terminals (ATs)or user equipment (UE). The LTE PHY employs some advanced technologiesthat are new to cellular applications. These include OrthogonalFrequency Division Multiplexing (OFDM) and Multiple Input MultipleOutput (MIMO) data transmission. In addition, the LTE PHY usesOrthogonal Frequency Division Multiple Access (OFDMA) on the downlink(DL) and Single-Carrier Frequency Division Multiple Access (SC-FDMA) onthe uplink (UL). OFDMA allows data to be directed to or from multipleusers on a subcarrier-by-subcarrier basis for a specified number ofsymbol periods.

Examples of older wireless communication systems widely deployed toprovide various types of communication content such as voice and datainclude Code Division Multiple Access (CDMA) systems, includingCDMA2000, Wideband CDMA, Global System for Mobile communications (GSM),and Universal Mobile Telecommunication System (UMTS). These wirelesscommunication systems and LTE systems generally use different radioaccess technologies (RATs) and communication protocols, operate atdifferent frequency bands, provide different quality of service (QoS),and offer different types of services and applications to the systemusers.

In a direct wireless connection, a first mobile entity transmits awireless signal directly to a second mobile entity, which receives andprocesses the wireless signal. Examples of direct wireless connectionsinclude connections from a mobile entity to eNB(s) in LTE or otherwireless communications protocols, or peer-to-peer (P2P) connectionsbetween mobile entities as used in non-cellular protocols such as WiFiDirect or Bluetooth. Cellular wireless communications systems do nottypically include direct connections between mobile entities. Rather,the mobile entities typically communicate indirectly with one anotherthrough one or more NodeBs and associated network infrastructure. Inthis context, there is a need for efficiently implementing networkcoding to manage third-party assisted P2P communications.

SUMMARY

The following presents a simplified summary of one or more embodimentsin order to provide a basic understanding of such embodiments. Thissummary is not an extensive overview of all contemplated embodiments,and is intended to neither identify key or critical elements of allembodiments nor delineate the scope of any or all embodiments. Its solepurpose is to present some concepts of one or more embodiments in asimplified form as a prelude to the more detailed description that ispresented later.

In accordance with one or more aspects of the embodiments describedherein, there is provided a method for third-party assisted peer-to-peer(P2P) communication by a third-party entity (e.g., a network entity,such as an evolved NodeB (eNB) or the like). The method may involvereceiving first information from a first mobile entity, the firstinformation comprising a first message for a second mobile entity. Themethod may also involve receiving second information from the secondmobile entity, the second information comprising a second message forthe first mobile entity. The method may further involve coding thirdinformation based at least in part on the first information and thesecond information, and sending the third information to the first andsecond mobile entities. The method may also involve transmitting acontrol signal that includes processing information for decoding thecoded third information to extract the first message or the secondmessage. In related aspects, an electronic device (e.g., an eNB orcomponent(s) thereof) may be configured to execute the above-describedmethodology. In further related aspects, third-party entity may be athird mobile entity, instead of a network entity.

In accordance with one or more aspects of the embodiments describedherein, a method is provided for third-party assisted P2P communicationby a mobile entity (e.g., a user equipment (UE) or the like). The methodmay involve sending first information to a third-party entity, the firstinformation comprising a first message for a peer mobile entity inoperative communication with the third-party entity. The method may alsoinvolve receiving coded information from the third-party entity, thecode information comprising a message portion. The method may furtherinvolve receiving control signaling from the third-party entity, thecontrol signaling including processing information for decoding thecoded information. The method may also involve extracting a secondmessage from the message portion of the coded information based at leastin part on the first information and the processing information. Inrelated aspects, an electronic device (e.g., a UE or component(s)thereof) may be configured to execute the above-described methodology.

To the accomplishment of the foregoing and related ends, the one or moreembodiments include the features hereinafter fully described andparticularly pointed out in the claims. The following description andthe annexed drawings set forth in detail certain illustrative aspects ofthe one or more embodiments. These aspects are indicative, however, ofbut a few of the various ways in which the principles of variousembodiments may be employed and the described embodiments are intendedto include all such aspects and their equivalents.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a multiple access wireless communication system.

FIG. 2 illustrates a block diagram of a communication system.

FIG. 3 illustrates a wireless communication system configured to supporta number of users.

FIG. 4 illustrates mobile entities in communication via a radio accessnetwork and via direct wireless connections.

FIG. 5 shows a wireless communication network that supports both WANcommunication and P2P communication.

FIG. 6 shows a methodology for third-party assisted P2P communication bya third-party entity.

FIG. 7 shows further aspects of the methodology of FIG. 6.

FIG. 8A shows a methodology for third-party assisted P2P communicationby a mobile entity.

FIG. 8B shows further aspects of the methodology of FIG. 8A.

FIG. 9 shows an apparatus for third-party assisted P2P communication, inaccordance with the methodology of FIGS. 6-7.

FIG. 10 shows an apparatus for third-party assisted P2P communication,in accordance with the methodology of FIGS. 8A-B.

DESCRIPTION

Various embodiments are now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of one or more embodiments. It may be evident, however,that such embodiment(s) can be practiced without these specific details.In other instances, well-known structures and devices are shown in blockdiagram form in order to facilitate describing one or more embodiments.

The techniques described herein may be used for various wirelesscommunication networks such as Code Division Multiple Access (CDMA)networks, Time Division Multiple Access (TDMA) networks, FrequencyDivision Multiple Access (FDMA) networks, Orthogonal FDMA (OFDMA)networks, Single-Carrier FDMA networks, etc. The terms “networks” and“systems” are often used interchangeably. A CDMA network may implement aradio technology such as Universal Terrestrial Radio Access (UTRA),CDMA2000, etc. UTRA includes Wideband-CDMA (W-CDMA) and Low Chip Rate(LCR). CDMA2000 covers IS-2000, IS-95 and IS-856 standards. A TDMAnetwork may implement a radio technology such as Global System forMobile Communications (GSM). An OFDMA network may implement a radiotechnology such as Evolved UTRA (E-UTRA), IEEE 802.11, IEEE 802.16, IEEE802.20, Flash-OFDM®, etc. UTRA, E-UTRA, and GSM are part of UniversalMobile Telecommunication System (UMTS). Long Term Evolution (LTE) is arelease of UMTS that uses E-UTRA. UTRA, E-UTRA, GSM, UMTS and LTE aredescribed in documents from an organization named “3rd GenerationPartnership Project” (3GPP). CDMA2000 is described in documents from anorganization named “3rd Generation Partnership Project 2” (3GPP2). Thesevarious radio technologies and standards are known in the art. In thefollowing description, for reasons of conciseness and clarity,terminology associated with W-CDMA and LTE standards, as promulgatedunder the 3GPP standards by the International Telecommunication Union(ITU), is used. It should be emphasized that the techniques describedherein are applicable to other technologies, such as the technologiesand standards mentioned above.

Single-Carrier Frequency Division Multiple Access (SC-FDMA), whichutilizes single carrier modulation and frequency domain equalization,has similar performance and essentially the same overall complexity asthose of OFDMA systems. An SC-FDMA signal has lower peak-to-averagepower ratio (PAPR) because of its inherent single carrier structure.SC-FDMA has drawn great attention, especially in the uplinkcommunications where lower PAPR greatly benefits the mobile terminal interms of transmit power efficiency. SC-FDMA is used for uplink multipleaccess in 3GPP LTE, or Evolved UTRA.

Referring to FIG. 1, a multiple access wireless communication systemaccording to one embodiment is illustrated. An access point 100 (e.g.,base station, evolved NodeB (eNB), or the like) includes multipleantenna groups, one including 104 and 106, another including 108 and110, and an additional one including 112 and 114. In FIG. 1, twoantennas are shown for each antenna group, however, more or fewerantennas may be utilized for each antenna group. A mobile entity 116 isin communication with the antennas 112 and 114, where the antennas 112and 114 transmit information to the mobile entity 116 over a forwardlink 120 and receive information from the mobile entity 116 over areverse link 118. A mobile entity 122 is in communication with theantennas 104 and 106, where the antennas 104 and 106 transmitinformation to the mobile entity 122 over a forward link 126 and receiveinformation from the mobile entity 122 over a reverse link 124. In aFrequency Division Duplex (FDD) system, the communication links 118,120, 124 and 126 may use different frequencies for communication. Forexample, the forward link 120 may use a different frequency than thatused by the reverse link 118.

Each group of antennas and/or the area in which they are designed tocommunicate is often referred to as a sector of the access point. Incertain embodiments, antenna groups each are designed to communicatewith mobile entities in a sector, of the areas covered by the accesspoint 100.

In communication over the forward links 120 and 126, the transmittingantennas of the access point 100 may utilize beamforming in order toimprove the signal-to-noise ratio of forward links for the differentmobile entities 116 and 122. Also, an access point using beamforming totransmit to mobile entities scattered randomly through its coveragecauses less interference to mobile entities in neighboring cells than anaccess point transmitting through a single antenna to all its mobileentities.

An access point may be a fixed station used for communicating with theterminals and may also be referred to as an access point, a NodeB, aneNB, or some other terminology. A mobile entity may also be referred toas an access terminal (AT), a user equipment (UE), a mobile station, awireless communication device, terminal, or the like.

FIG. 2 is a block diagram of an embodiment of a transmitter system 210(also known as an access point) and a receiver system 250 (also known asa mobile entity) in a MIMO system 200. At the transmitter system 210,traffic data for a number of data streams is provided from a data source212 to a transmit (TX) data processor 214.

In an embodiment, each data stream is transmitted over a respectivetransmit antenna. The TX data processor 214 formats, codes, andinterleaves the traffic data for each data stream based on a particularcoding scheme selected for that data stream to provide coded data.

The coded data for each data stream may be multiplexed with pilot datausing OFDM techniques. The pilot data is typically a known data patternthat is processed in a known manner and may be used at the receiversystem to estimate the channel response. The multiplexed pilot and codeddata for each data stream is then modulated (i.e., symbol mapped) basedon a particular modulation scheme (e.g., Binary Phase Shift Keying(BPSK), Quadrature Phase Shift Keying (QSPK), M-ary Phase-Shift Keying(M-PSK), or Multi-Level Quadrature Amplitude Modulation (M-QAM))selected for that data stream to provide modulation symbols. The datarate, coding, and modulation for each data stream may be determined byinstructions performed by a processor 230, which may be in operativecommunication with a memory 232.

The modulation symbols for the data streams are then provided to a TXMIMO processor 220, which may further process the modulation symbols(e.g., for OFDM). The TX MIMO processor 220 then provides N_(T)modulation symbol streams to N_(T) transmitters (TMTR) 222 a through 222t. In certain embodiments, the TX MIMO processor 220 applies beamformingweights to the symbols of the data streams and to the antenna from whichthe symbol is being transmitted.

Each transmitter 222 receives and processes a respective symbol streamto provide one or more analog signals, and further conditions (e.g.,amplifies, filters, and upconverts) the analog signals to provide amodulated signal suitable for transmission over the MIMO channel. N_(T)modulated signals from the transmitters 222 a through 222 t are thentransmitted from N_(T) antennas 224 a through 224 t, respectively.

At the receiver system 250, the transmitted modulated signals arereceived by N_(R) antennas 252 a through 252 r and the received signalfrom each antenna 252 is provided to a respective receiver (RCVR) 254 athrough 254 r. Each receiver 254 conditions (e.g., filters, amplifies,and downconverts) a respective received signal, digitizes theconditioned signal to provide samples, and further processes the samplesto provide a corresponding “received” symbol stream.

A RX data processor 260 then receives and processes the N_(R) receivedsymbol streams from the N_(R) receivers 254 based on a particularreceiver processing technique to provide N_(T) “detected” symbolstreams. The RX data processor 260 then demodulates, deinterleaves, anddecodes each detected symbol stream to recover the traffic data for thedata stream. The processing by the RX data processor 260 iscomplementary to that performed by the TX MIMO processor 220 and the TXdata processor 214 at the transmitter system 210.

A processor 270 periodically determines which pre-coding matrix to use.The processor 270 formulates a reverse link message comprising a matrixindex portion and a rank value portion, and may be in operativecommunication with a memory 272.

The reverse link message may comprise various types of informationregarding the communication link and/or the received data stream. Thereverse link message is then processed by a TX data processor 238, whichalso receives traffic data for a number of data streams from a datasource 236, modulated by a modulator 280, conditioned by thetransmitters 254 a through 254 r, and transmitted back to thetransmitter system 210.

At the transmitter system 210, the modulated signals from the receiversystem 250 are received by the antennas 224, conditioned by thereceivers 222, demodulated by a demodulator 240, and processed by a RXdata processor 242 to extract the reserve link message transmitted bythe receiver system 250. The processor 230 then determines whichpre-coding matrix to use for determining the beamforming weights thenprocesses the extracted message.

FIG. 3 illustrates a wireless communication system 300, configured tosupport a number of users, in which the teachings herein may beimplemented. The system 300 provides communication for multiple cells302, such as, for example, macro cells 302 a-302 g, with each cell beingserviced by a corresponding access node 304 (e.g., access nodes 304a-304 g). As shown in FIG. 3, mobile entities 306 (e.g., mobile entities306 a-306 l) may be dispersed at various locations throughout the systemover time. Each mobile entity 306 may communicate with one or moreaccess nodes 304 on a forward link (“FL”) and/or a reverse link (“RL) ata given moment, depending upon whether the mobile entity 306 is activeand whether it is in soft handoff (if applicable), for example. Thewireless communication system 300 may provide service over a largegeographic region. For example, macro cells 302 a-302 g may cover a fewblocks in an urban or suburban neighborhood or a few square miles in arural environment.

In accordance with aspects of the subject of this disclosure, there isprovided a wireless network (e.g., a 3GPP network) having a feature forusing a spectrum provider (e.g., an LTE network provider) forpeer-to-peer (P2P) communication. In this context, P2P communication isa direct communication between two mobile entities without the need fortransportation of communicated data through an access node or a corenetwork node.

FIG. 4 shows an embodiment of a communication system 400 comprisingmobile entities 406, 408, 410 in communication via eNBs 402, 404 of aradio access network (RAN) and via direct wireless connections. Thedepicted example illustrates peer discovery for (1) UEs 408, 410 campedat a cell on the same eNB 404 and (2) UEs 406, 410 camped at cells forrespective different eNBs 402, 404. Peer discovery is a procedurewhereby UEs detect the availability of other services advertised at UEswithin radio frequency (RF) proximity, and may generally involve peeradvertisement and peer detection.

Peer mobile entities may perform detection, wherein authorized mobileentities may receive information to be able to perform detection (e.g.,security keys or the like). Also, the peer mobile entities may performadvertising, wherein authorized mobile entities may receive informationto be able to advertise a discovery identifier (e.g., security keys).Each mobile entity refrains from advertising a discovery identifier forwhich it has not been authorized. Further, the peer mobile entities mayperform direct communication, wherein each mobile entity refrains fromestablishing direct communication with a peer advertising a discoveryidentifier for which it has not been authorized.

It is noted that a network or spectrum provider may authorize a mobileentity to use the network's spectrum to perform the above described P2Pcommunication procedures. It is also noted that the mobile entity maynot be provisioned with P2P parameters and may be expected to requestauthorization for each procedure or set of procedures. For example, themobile entity may request authorization for detection, detection andadvertising, and/or direct communication. Authorization based on thetechniques described herein could be: (a) per tracking area for trackingarea update (TAU) procedures; (b) while attached for attach procedures;and/or (c) based on a lifetime of reserved bearers for evolved packetsystem (EPS) session management (ESM) procedures.

FIG. 5 shows a wide area network (WAN) 500, which may be a LTE networkor some other type of WAN. WAN 500 may include a number of base stationsand other network entities. For simplicity, only three base stations 510a, 510 b and 510 c and one network controller 530 are shown in FIG. 5. Abase station may be an entity that communicates with the UEs and mayalso be referred to as a NodeB, an eNB, an access point, etc. Each basestation may provide communication coverage for a particular geographicarea and may support communication for the UEs located within thecoverage area. In 3GPP, the term “cell” can refer to a coverage area ofa base station and/or a base station subsystem serving this coveragearea, depending on the context in which the term is used. In 3GPP2, theterm “sector” or “cell-sector” can refer to a coverage area of a basestation and/or a base station subsystem serving this coverage area. Forclarity, 3GPP concept of “cell” is used in the description herein.

A base station may provide communication coverage for a macro cell, apico cell, a femto cell, and/or other types of cells. A macro cell maycover a relatively large geographic area (e.g., several kilometers inradius) and may allow unrestricted access by UEs with servicesubscription. A pico cell may cover a relatively small geographic areaand may allow unrestricted access by UEs with service subscription. Afemto cell may cover a relatively small geographic area (e.g., a home)and may allow restricted access by UEs having association with the femtocell (e.g., UEs in a closed subscriber group). In the example shown inFIG. 5, WAN 500 includes macro base stations 510 a, 510 b and 510 c formacro cells. WAN 500 may also include pico base stations for pico cellsand/or femto/home base stations for femto cells (not shown in FIG. 5).

Network controller 530 may couple to a set of base stations and mayprovide coordination and control for these base stations. Networkcontroller 530 may communicate with the base stations via a backhaul.The base stations may also communicate with one another via thebackhaul. A geolocation database server 540 may couple to networkcontroller 530 and/or other network entities. Server 540 may support useof an unlicensed spectrum, as described below.

In the description herein, a WAN communication may refer to acommunication between a UE and a base station, e.g., for a call with aremote station such as another UE. An access link may refer to acommunication link between a UE and a base station. A P2P communicationmay refer to a direct communication between two or more UEs, withoutgoing through a base station. Also, a P2P communication may refer to athird-party entity assisted communication between two or more UEs,wherein the third party entity may be a base station, another UE, etc. AP2P link may refer to a communication link between two or more UEsengaged in P2P communication. A P2P group may refer to a group of two ormore UEs engaged in P2P communication. In one design, one UE in a P2Pgroup may be designated as a P2P server, and each remaining UE in theP2P group may be designated as a P2P client. The P2P server may performcertain management functions such as exchanging signaling with a WAN,coordinating data transmission between the P2P server and the P2Pclient(s), etc.

In the example shown in FIG. 5, UEs 520 a and 520 b are under thecoverage of base station 510 a and are engaged in P2P communication. UEs520 c and 520 d are under the coverage of base station 510 b and areengaged in P2P communication. UEs 520 e and 520 f are under the coverageof different base stations 510 b and 510 c and are engaged in P2Pcommunication. UEs 520 g, 520 h and 520 i are under the coverage of thesame base station 510 c and are engaged in P2P communication. The otherUEs 120 in FIG. 5 are engaged in WAN communication.

WAN 500 may operate on one or more frequency channels that are licensedto a network operator. WAN 500 may support both WAN communication andP2P communication on the licensed frequency channel(s). In this case,some resources on the licensed frequency channel(s) may be reserved forP2P communication and the remaining resources may be used for WANcommunication. The term “spectrum” generally refers to a range offrequencies such as a frequency band, or a frequency channel, etc.

In accordance with one or more aspects of the embodiments describedherein, there are provided techniques for network coding and itsapplication to P2P communication. In a P2P communication system, theusers of mobile entities may communicate with each other directly. Inaddition, or in the alternative, they can also communicate with eachother through a third party entity, such as, for example, a base station(e.g., eNB) or another mobile entity. For example, a first user may sendfirst information A to the third party, and the third party may thensend the first information A to a second user. Similarly, the seconduser may send second information B to the third party, and the thirdparty may then send the second information B to the first user.

In a nominal communication system, the first information A may beencoded (e.g., by using turbo codes, convolution codes, and/or othercoding schemes), modulated, and transmitted. Such an encoding process isindependent of the encoding process of the second information B. Forexample: first information A+cyclic redundancy check (CRC)→Turboencoded→scrambling→modulation→RF transmission.

A third party (e.g., a third user) may combine the first information Aand the second information B as third/coded information C, and may sendthe third information C to the first and second users at the same time.The first user and the second user may utilize the existing information(e.g., first information A or second information B) along with thethird/coded/combined information C to decode the packet. For example,the first user may use the first information A (i.e., the informationthat the first user wants to send to the second user), whereas thesecond user may use the second information B (i.e., the information thatthe second user wants to send to the first user).

There are numerous approaches to combining the first information A andthe second information B as the third information C. In one approach, anXOR operation or the like may be performed on information bits of thefirst A and/or second B information before encoding. In anotherapproach, an XOR operation or the like may be performed on encoded bitsof the first A and/or second B information before modulation. In yetanother approach, a linear type operation may be performed on the firstA and/or second B information to produce the third/coded information C.

In related aspects, the third-party entity should signal or provide tothe first and second mobile entities information regarding how the firstand second mobile entities should decode/utilize the third/codedinformation C, as well as on which packet(s) the third-party entity hasapplied this additional processing. This way the first and second mobileentities will know what additional processing to implement to recoverthe second information B and the first information A, respectively.

In one embodiment of a P2P communication system, two peers may use athird-party entity to transfer data or signaling between them. Forexample, the first and second users or mobile entities may be arenominal LTE UEs. The third user or third-party entity may be an eNB orother network entity. The first and second users may communicate withthe third-party entity to exchange data/information. For example, theeNB may use a downlink control signal (e.g., physical downlink controlchannel (PDCCH)) or layer 3 signaling to carry additional informationwhen it sends a packet which has been performed by one or more offollowing processing: (a) XOR of information bits targeted for the firstand second users before encoding (when the number of information bitsare the same for first and second users, the XOR operation may beperformed on each bit; when the number differs, the XOR operation or thelike may be performed on a subset of the bits); (b) XOR operation on ofencoding bits for the first and second users before modulation; or (c)other processing such that the resulting packet is a function ofinformation bits for the first and second users.

In related aspects, the resulting third/coded information C may includea key for extracting the first information A and/or the secondinformation B from the third/coded information C. For layer 3 signaling(radio resource control (RRC) signaling or broadcast), the first andsecond users may use a key relating to known system information todetermine which packet(s) were subject to the above-describedprocessing/coding by the eNB. For example, the key may comprise a headerof the third information C.

For layer 1 signaling by the PDCCH, a PDCCH payload portion, a CRC mask,and/or given/defined bit pattern in the PDCCH may include or indicatewhether the PDSCH with respect to the PDCCH grant has been subject tothe above-described processing/coding by the eNB. The key may alsoinclude information about the size of the first A and second Binformation, such as, for example, when the respective sizes of theinformation may differ. For example, the size of information A and/or Bmay comprise transport block size (TBS) in LTE.

From a UE perspective, once the UE receives signaling that PDSCH hasbeen performed by one or more of the above-described processing/coding,the UE may utilize the information it transmitted earlier and thecurrent received PDSCH to recover the information that the other UEintends to send to it via the eNB. For example, a first mobile entity ofthe first user may utilize (a) the first information A it sent earlierand (b) the current received PDSCH or third/coded information C torecover the second information B sent by the second mobile entity viathe eNB.

In further related aspects, signaling may also be performed through amedium access control (MAC) protocol data unit (PDU) control unit inPDSCH. A transmitter may also signal which uplink MAC PDU should be usedto decode the current downlink MAC PDU. The signaling may be embedded ina payload of the downlink MAC PDU header or the like. Theabove-described processing/coding does not apply to the MAC PDU header.The transmitter may pair users such that the TBSs from those users arematched when performing the processing/coding (e.g., XOR operation,etc.). In the alternative, if the TBSs are different, the shortertransport block may be padded to match the respective TBSs of both thefirst information A and the second information B.

In view of exemplary systems shown and described herein, methodologiesthat may be implemented in accordance with the disclosed subject matter,will be better appreciated with reference to various flow charts. While,for purposes of simplicity of explanation, methodologies are shown anddescribed as a series of acts/blocks, it is to be understood andappreciated that the claimed subject matter is not limited by the numberor order of blocks, as some blocks may occur in different orders and/orat substantially the same time with other blocks from what is depictedand described herein. Moreover, not all illustrated blocks may berequired to implement methodologies described herein. It is to beappreciated that functionality associated with blocks may be implementedby software, hardware, a combination thereof or any other suitable means(e.g., device, system, process, or component). Additionally, it shouldbe further appreciated that methodologies disclosed throughout thisspecification are capable of being stored on an article of manufactureto facilitate transporting and transferring such methodologies tovarious devices. Those skilled in the art will understand and appreciatethat a methodology could alternatively be represented as a series ofinterrelated states or events, such as in a state diagram.

In accordance with one or more aspects of the subject of thisdisclosure, there are provided methods for third-party assisted P2Pcommunication. With reference to FIG. 6, illustrated is a methodology600 that may be performed at a third-party entity, such as a networkentity (e.g., a base station) or a mobile entity (e.g., a UE). Themethod 600 may involve, at 610, receiving first information from a firstmobile entity, the first information comprising a first message for asecond mobile entity. The method 600 may involve, at 620, receivingsecond information from the second mobile entity, the second informationcomprising a second message for the first mobile entity. The method 600may involve, at 630, coding third information based at least in part onthe first information and the second information. The method 600 mayinvolve, at 640, sending the third information to the first and secondmobile entities. The method 600 may involve, at 650, transmitting acontrol signal that includes processing information for decoding thecoded third information to extract the first message or the secondmessage. In related aspects, the control signal may be a downlinkcontrol signal, a radio resource control (RRC) signal, or the like.

With reference to FIG. 7, coding may involve, at 660, performing an XORoperation or the like on information bits of the first and secondmessages before encoding. In the alternative, coding may involve, at665, performing an XOR operation or the like on encoded bits of thefirst and second messages before modulation.

In related aspects, the third information may include a key tofacilitate extracting the first message or the second message (block670). The key may include information regarding respective sizes of thefirst and second messages. The respective sizes may be the respectiveTBSs of the first and second messages. In response to determining therespective TBSs of the first and second messages are different, themethod 600 may involve, at 680, identifying a given message of the firstand second messages with a smaller TBS, and, at 685, padding a giventransport bock of the identified given message to match the respectiveTBSs of the first and second messages.

In further aspects, the key may include information regarding at leastone operation performed on bits of the first and second messages (block690). For example, the key may include a header of the thirdinformation, in the context of RRC signaling. The header may be a MACPDU header. In another example, the key may include one of a PDCCHpayload portion, a CRC mask, and a defined bit pattern, in the contextof PDCCH signaling.

In accordance with one or more aspects of the subject of thisdisclosure, FIG. 8A illustrates a methodology 800 for third-partyassisted P2P communication that may be performed by a mobile entity(e.g., a UE). The method 800 may involve, at 810, sending firstinformation to a third-party entity (e.g., a network entity or anothermobile entity), the first information comprising a first message for apeer mobile entity in operative communication with the third-partyentity. The method 800 may involve, at 820, receiving coded informationfrom the third-party entity, the code information comprising a messageportion. The method 800 may involve, at 830, receiving control signalingfrom the third-party entity, the control signaling including processinginformation for decoding the coded information. The method 800 mayinvolve, at 840, extracting a second message from the message portion ofthe coded information based at least in part on the first informationand the processing information.

With reference to FIG. 8B, the control signaling may include a downlinkcontrol signal or an RRC signal (block 850). The coded information mayinclude a key to facilitate extracting the first message or the secondmessage (block 860). The key may include a header of the codedinformation, in the context of RRC signaling (block 870). For example,the header may be a MAC PDU header (block 880). The key may include aPDCCH payload portion, a CRC mask, and/or a defined bit pattern, in thecontext of PDCCH signaling (block 890).

In accordance with one or more aspects of the embodiments describedherein, there are provided devices and apparatuses for third-partyassisted P2P communications, as described above with reference to FIGS.6-7. With reference to FIG. 9, there is provided an exemplary mobileapparatus 900 that may be configured as a third-party entity, such as anetwork entity (e.g., an eNB) or another mobile entity (e.g., a UE) in awireless network, or as a processor or similar device for use within thenetwork or mobile entity. The apparatus 900 may include functionalblocks that can represent functions implemented by a processor,software, or combination thereof (e.g., firmware).

For example, the apparatus 900 of FIG. 9 may comprise an electricalcomponent or module 902 for receiving first information from a firstmobile entity, the first information comprising a first message for asecond mobile entity. For example, the electrical component 902 mayinclude at least one receiver coupled to a processor and/or a memory.The electrical component 902 may be, or may include, a means forreceiving first information from a first mobile entity, the firstinformation comprising a first message for a second mobile entity. Saidmeans may be or may include the at least one receiver (e.g., thereceiver(s) 222 a-t, the demodulator 240, and/or RX data processor 242of FIG. 2, or the transceiver 914 of FIG. 9).

The apparatus 900 may comprise an electrical component 904 for receivingsecond information from the second mobile entity, the second informationcomprising a second message for the first mobile entity. For example,the electrical component 904 may include at least one receiver coupledto a processor and/or a memory. The electrical component 904 may be, ormay include, a means for receiving second information from the secondmobile entity, the second information comprising a second message forthe first mobile entity. Said means may be or may include the at leastone receiver (e.g., the receiver(s) 222 a-t, the demodulator 240, and/orRX data processor 242 of FIG. 2, or the transceiver 914 of FIG. 9).

The apparatus 900 may comprise an electrical component 906 for codingthird information based at least in part on the first information andthe second information. For example, the electrical component 906 mayinclude at least one processor coupled to a receiver, transmitter,and/or a memory. The electrical component 906 may be, or may include, ameans for coding third information based at least in part on the firstinformation and the second information. Said means may be or may includethe at least one control processor (e.g., the processor 230 of FIG. 2,or processor 910 of FIG. 9).

The apparatus 900 may comprise an electrical component 908 for sendingthe third information to the first and second mobile entities. Forexample, the electrical component 908 may include at least onetransmitter coupled to a processor and/or a memory. The electricalcomponent 908 may be, or may include, a means for sending the thirdinformation to the first and second mobile entities. Said means may beor may include the at least one transmitter (e.g., the transmitter(s)222 a-t, the TX MIMO processor 220, and/or TX data processor 214 of FIG.2, or the transceiver 914 of FIG. 9).

The apparatus 900 may comprise an electrical component 909 fortransmitting a control signal that includes processing information fordecoding the coded third information to extract the first message or thesecond message. For example, the electrical component 909 may include atleast one transmitter coupled to a processor and/or a memory. Theelectrical component 908 may be, or may include, a means for sending thethird information to the first and second mobile entities. Said meansmay be or may include the at least one transmitter (e.g., thetransmitter(s) 222 a-t, the TX MIMO processor 220, and/or TX dataprocessor 214 of FIG. 2, or the transceiver 914 of FIG. 9).

In related aspects, the apparatus 900 may optionally include a processorcomponent 910 having at least one processor, in the case of theapparatus 900 configured as a network entity, rather than as aprocessor. The processor 910, in such case, may be in operativecommunication with the components 902-909 via a bus 912 or similarcommunication coupling. The processor 910 may effect initiation andscheduling of the processes or functions performed by electricalcomponents 902-909.

In further related aspects, the apparatus 900 may include a radiotransceiver component 914. A stand alone receiver and/or stand alonetransmitter may be used in lieu of or in conjunction with thetransceiver 914. The apparatus 900 may optionally include a componentfor storing information, such as, for example, a memory device/component916. The computer readable medium or the memory component 916 may beoperatively coupled to the other components of the apparatus 900 via thebus 912 or the like. The memory component 916 may be adapted to storecomputer readable instructions and data for effecting the processes andbehavior of the components 902-909, and subcomponents thereof, or theprocessor 910, or the methods disclosed herein. The memory component 916may retain instructions for executing functions associated with thecomponents 902-909. While shown as being external to the memory 916, itis to be understood that the components 902-909 can exist within thememory 916.

In accordance with one or more aspects of the embodiments describedherein, there are provided devices and apparatuses (e.g., mobileentities) for third-party assisted P2P communication, as described abovewith reference to FIGS. 8A-B. With reference to FIG. 10, the apparatus1000 may comprise an electrical component or module 1002 for sendingfirst information to a third-party entity, the first informationcomprising a first message for a peer mobile entity in operativecommunication with the third-party entity. For example, the electricalcomponent 1002 may include at least one transmitter coupled to aprocessor and/or a memory. The electrical component 1002 may be, or mayinclude, a means for sending first information to a third-party entity,the first information comprising a first message for a peer mobileentity in operative communication with the third-party entity. Saidmeans may be or may include the at least one transmitter (e.g., thetransmitter(s) 254 a-r, the modulator 280, and/or the TX data processor238 of FIG. 2, or the transceiver 1014 of FIG. 10).

The apparatus 1000 may comprise an electrical component 1004 forreceiving coded information from the third-party entity, the codeinformation comprising a message portion. For example, the electricalcomponent 1004 may include at least one receiver coupled to a processorand/or a memory. The electrical component 1004 may be, or may include, ameans for receiving coded information from the third-party entity, thecode information comprising a message portion. Said means may be or mayinclude the at least one receiver (e.g., the receivers(s) 254 a-r and/orthe RX data processor 260 of FIG. 2, or the transceiver 1014 of FIG.10).

The apparatus 1000 may comprise an electrical component 1006 forreceiving control signaling from the third-party entity, the controlsignaling including processing information for decoding the codedinformation. For example, the electrical component 1006 may include atleast one receiver coupled to a processor and/or a memory. Theelectrical component 1006 may be, or may include, a means for receivingcontrol signaling from the third-party entity, the control signalingincluding processing information for decoding the coded information.Said means may be or may include the at least one receiver (e.g., thereceivers(s) 254 a-r and/or the RX data processor 260 of FIG. 2, or thetransceiver 1014 of FIG. 10).

The apparatus 1000 may comprise an electrical component 1008 forextracting a second message from the message portion of the codedinformation based at least in part on the first information and theprocessing information. For example, the electrical component 1008 mayinclude at least one processor coupled to a receiver, transmitter,and/or a memory. The electrical component 1008 may be, or may include, ameans for extracting a second message from the message portion of thecoded information based at least in part on the first information andthe processing information. Said means may be or may include the atleast one control processor (e.g., the processor 270 of FIG. 2, orprocessor 1010 of FIG. 10).

For the sake of conciseness, the rest of the details regarding apparatus1000 are not further elaborated on; however, it is to be understood thatthe remaining features and aspects of the apparatus 1000 aresubstantially similar to those described above with respect to apparatus900 of FIG. 9.

Those of skill in the art would understand that information and signalsmay be represented using any of a variety of different technologies andtechniques. For example, data, instructions, commands, information,signals, bits, symbols, and chips that may be referenced throughout theabove description may be represented by voltages, currents,electromagnetic waves, magnetic fields or particles, optical fields orparticles, or any combination thereof.

Those of skill would further appreciate that the various illustrativelogical blocks, modules, circuits, and algorithm steps described inconnection with the disclosure herein may be implemented as electronichardware, computer software, or combinations of both. To clearlyillustrate this interchangeability of hardware and software, variousillustrative components, blocks, modules, circuits, and steps have beendescribed above generally in terms of their functionality. Whether suchfunctionality is implemented as hardware or software depends upon theparticular application and design constraints imposed on the overallsystem. Skilled artisans may implement the described functionality invarying ways for each particular application, but such implementationdecisions should not be interpreted as causing a departure from thescope of the present disclosure.

The various illustrative logical blocks, modules, and circuits describedin connection with the disclosure herein may be implemented or performedwith a general-purpose processor, a digital signal processor (DSP), anapplication specific integrated circuit (ASIC), a field programmablegate array (FPGA) or other programmable logic device, discrete gate ortransistor logic, discrete hardware components, or any combinationthereof designed to perform the functions described herein. Ageneral-purpose processor may be a microprocessor, but in thealternative, the processor may be any conventional processor,controller, microcontroller, or state machine. A processor may also beimplemented as a combination of computing devices, e.g., a combinationof a DSP and a microprocessor, a plurality of microprocessors, one ormore microprocessors in conjunction with a DSP core, or any other suchconfiguration.

The steps of a method or algorithm described in connection with thedisclosure herein may be embodied directly in hardware, in a softwaremodule executed by a processor, or in a combination of the two. Asoftware module may reside in RAM memory, flash memory, ROM memory,EPROM memory, EEPROM memory, registers, hard disk, a removable disk, aCD-ROM, or any other form of storage medium known in the art. Anexemplary storage medium is coupled to the processor such that theprocessor can read information from, and write information to, thestorage medium. In the alternative, the storage medium may be integralto the processor. The processor and the storage medium may reside in anASIC. The ASIC may reside in a user terminal. In the alternative, theprocessor and the storage medium may reside as discrete components in auser terminal.

In one or more exemplary designs, the functions described may beimplemented in hardware, software, firmware, or any combination thereof.If implemented in software, the functions may be stored on ortransmitted over as one or more instructions or code on acomputer-readable medium. Computer-readable media includes both computerstorage media and communication media including any medium thatfacilitates transfer of a computer program from one place to another. Astorage media may be any available media that can be accessed by ageneral purpose or special purpose computer. By way of example, and notlimitation, such computer-readable media can comprise RAM, ROM, EEPROM,CD-ROM or other optical disk storage, magnetic disk storage or othermagnetic storage devices, or any other medium that can be used to carryor store desired program code means in the form of instructions or datastructures and that can be accessed by a general-purpose orspecial-purpose computer, or a general-purpose or special-purposeprocessor. Also, any connection is properly termed a computer-readablemedium. For example, if the software is transmitted from a website,server, or other remote source using a coaxial cable, fiber optic cable,twisted pair, digital subscriber line (DSL), or non-transitory wirelesstechnologies, then the coaxial cable, fiber optic cable, twisted pair,DSL, or the non-transitory wireless technologies are included in thedefinition of medium. Disk and disc, as used herein, includes compactdisc (CD), laser disc, optical disc, digital versatile disc (DVD),floppy disk and blu-ray disc where disks usually reproduce datamagnetically, while discs reproduce data optically with lasers.Combinations of the above should also be included within the scope ofcomputer-readable media.

The previous description of the disclosure is provided to enable anyperson skilled in the art to make or use the disclosure. Variousmodifications to the disclosure will be readily apparent to thoseskilled in the art, and the generic principles defined herein may beapplied to other variations without departing from the spirit or scopeof the disclosure. Thus, the disclosure is not intended to be limited tothe examples and designs described herein but is to be accorded thewidest scope consistent with the principles and novel features disclosedherein.

What is claimed is:
 1. A method for third-party assisted peer-to-peer(P2P) communication by a third-party entity, comprising: receiving firstinformation from a first mobile entity, the first information comprisinga first message for a second mobile entity; receiving second informationfrom the second mobile entity, the second information comprising asecond message for the first mobile entity; coding third informationbased at least in part on a subset of information bits of the firstinformation and the second information, the third information comprisinga key regarding at least one operation performed on bits of the first orsecond message, wherein the key comprises information regardingrespective sizes of the first and second messages, the respective sizescomprising respective transport block sizes (TBSs) of the first andsecond messages, further comprising, in response to determining therespective TBSs of the first and second messages are different:identifying a given message of the first and second messages with asmaller TBS; and defining the subset of information bits according tothe size of the identified given message to match the respective TBSs ofthe first and second messages; sending the third information to thefirst and second mobile entities; and transmitting a control signal thatincludes processing information for decoding the coded third informationto extract the first message or the second message.
 2. The method ofclaim 1, wherein coding the third information comprises performing anXOR operation on the subset of information bits of the first and secondmessages before encoding.
 3. The method of claim 1, wherein coding thethird information comprises performing an XOR operation on encoded bitsof the first and second messages before modulation.
 4. The method ofclaim 1, wherein the control signal comprises a downlink control signalor a radio resource control (RRC) signal.
 5. The method of claim 1,wherein the third information comprises the key to facilitate extractingthe first message or the second message.
 6. The method of claim 5,wherein the key comprises a header of the third information, in thecontext of radio resource control (RRC) signaling.
 7. The method ofclaim 6, wherein the header comprises a medium access control (MAC)protocol data unit (PDU) header.
 8. The method of claim 5, wherein thekey comprises one of a physical downlink control channel (PDCCH) payloadportion, a cyclic redundancy check (CRC) mask, and a defined bitpattern, in the context of PDCCH signaling.
 9. The method of claim 1,wherein the third-party entity comprises a network entity or a thirdmobile entity.
 10. The method of claim 9, wherein the network entitycomprises an eNB.
 11. An apparatus for third-party assisted peer-to-peer(P2P) communication by a third-party entity, comprising: at least oneprocessor configured to: receive first information from a first mobileentity, the first information comprising a first message for a secondmobile entity; receive second information from the second mobile entity,the second information comprising a second message for the first mobileentity; code third information based at least in part on a subset ofinformation bits of the first information and the second information,the third information comprising a key regarding at least one operationperformed on bits of the first or second message, wherein the keycomprises information regarding respective sizes of the first and secondmessages, the respective sizes comprising respective transport blocksizes (TBSs) of the first and second messages, further comprising, inresponse to determining the respective TBSs of the first and secondmessages are different: identifying a given message of the first andsecond messages with a smaller TBS; and defining the subset ofinformation bits according to the size of the identified given messageto match the respective TBSs of the first and second messages; send thethird information to the first and second mobile entities; and transmita control signal that includes processing information for decoding thecoded third information to extract the first message or the secondmessage; and a memory coupled to the at least one processor for storingdata.
 12. An apparatus, comprising: means for receiving firstinformation from a first mobile entity, the first information comprisinga first message for a second mobile entity; means for receiving secondinformation from the second mobile entity, the second informationcomprising a second message for the first mobile entity; means forcoding third information based at least in part on a subset ofinformation bits of the first information and the second information,the third information comprising a key regarding at least one operationperformed on bits of the first or second message, wherein the keycomprises information regarding respective sizes of the first and secondmessages, the respective sizes comprising respective transport blocksizes (TBSs) of the first and second messages, further comprising, inresponse to determining the respective TBSs of the first and secondmessages are different: identifying a given message of the first andsecond messages with a smaller TBS; and defining the subset ofinformation bits according to the size of the identified given messageto match the respective TBSs of the first and second messages; means forsending the third information to the first and second mobile entities;and means for transmitting a control signal that includes processinginformation for decoding the coded third information to extract thefirst message or the second message.
 13. The apparatus of claim 12,wherein the control signal comprises a downlink control signal or aradio resource control (RRC) signal.
 14. The apparatus of claim 12,wherein the third information comprises the key to facilitate extractingthe first message or the second message.
 15. A computer program product,comprising: a non-transitory computer-readable medium comprising codefor causing a computer to: receive first information from a first mobileentity, the first information comprising a first message for a secondmobile entity; receive second information from the second mobile entity,the second information comprising a second message for the first mobileentity; code third information based at least in part on a subset ofinformation bits of the first information and the second information,the third information comprising a key regarding at least one operationperformed on bits of the first or second message, wherein the keycomprises information regarding respective sizes of the first and secondmessages, the respective sizes comprising respective transport blocksizes (TBSs) of the first and second messages, further comprising, inresponse to determining the respective TBSs of the first and secondmessages are different: identifying a given message of the first andsecond messages with a smaller TBS; and defining the subset ofinformation bits according to the size of the identified given messageto match the respective TBSs of the first and second messages; send thethird information to the first and second mobile entities; and transmita control signal that includes processing information for decoding thecoded third information to extract the first message or the secondmessage.
 16. A method for third-party assisted peer-to-peer (P2P)communication by a mobile entity, comprising: sending first informationto a third-party entity, the first information comprising a firstmessage for a peer mobile entity in operative communication with thethird-party entity; receiving coded information from the third-partyentity, the code information comprising a message portion coded from asubset of information bits of the first information and a secondinformation from another mobile entity, and a key regarding at least oneoperation performed on bits of the first message or a second messagefrom the other mobile entity; wherein the key comprises informationregarding respective sizes of the first and second messages, therespective sizes comprising respective transport block sizes (TBSs) ofthe first and second messages, further comprising, in response todetermining the respective TBSs of the first and second messages aredifferent: identifying a given message of the first and second messageswith a smaller TBS; and defining the subset of information bitsaccording to the size of the identified given message to match therespective TBSs of the first and second messages; receiving controlsignaling from the third-party entity, the control signaling includingprocessing information for decoding the coded information; andextracting the second message from the message portion of the codedinformation based at least in part on the key and the processinginformation.
 17. The method of claim 16, wherein the control signalingcomprises a downlink control signal or a radio resource control (RRC)signal.
 18. The method of claim 16, wherein the coded informationcomprises the key to facilitate extracting the first message or thesecond message.
 19. The method of claim 18, wherein the key comprises aheader of the coded information, in the context of radio resourcecontrol (RRC) signaling.
 20. The method of claim 19, wherein the headercomprises a medium access control (MAC) protocol data unit (PDU) header.21. The method of claim 18, wherein the key comprises one of a physicaldownlink control channel (PDCCH) payload portion, a cyclic redundancycheck (CRC) mask, and a defined bit pattern, in the context of PDCCHsignaling.
 22. An apparatus for third-party assisted peer-to-peer (P2P)communication by a mobile entity, comprising: at least one processorconfigured to: send first information to a third-party entity, the firstinformation comprising a first message for a peer mobile entity inoperative communication with the third-party entity; receive codedinformation from the third-party entity, the code information comprisinga message portion coded from a subset of information bits of the firstinformation and a second information from another mobile entity, and akey regarding at least one operation performed on bits of the firstmessage or a second message from the other mobile entity; wherein thekey comprises information regarding respective sizes of the first andsecond messages, the respective sizes comprising respective transportblock sizes (TBSs) of the first and second messages, further comprising,in response to determining the respective TBSs of the first and secondmessages are different: identifying a given message of the first andsecond messages with a smaller TBS; and defining the subset ofinformation bits according to the size of the identified given messageto match the respective TBSs of the first and second messages; receivecontrol signaling from the third-party entity, the control signalingincluding processing information for decoding the coded information; andextract the second message from the message portion of the codedinformation based at least in part on the key and the processinginformation; and a memory coupled to the at least one processor forstoring data.
 23. An apparatus, comprising: means for sending firstinformation to a third-party entity, the first information comprising afirst message for a peer mobile entity in operative communication withthe third-party entity; means for receiving coded information from thethird-party entity, the code information comprising a message portioncoded from a subset of information bits of the first information and asecond information from another mobile entity and a key regarding atleast one operation performed on bits of the first message or a secondmessage from the other mobile entity; wherein the key comprisesinformation regarding respective sizes of the first and second messages,the respective sizes comprising respective transport block sizes (TBSs)of the first and second messages, further comprising, in response todetermining the respective TBSs of the first and second messages aredifferent: identifying a given message of the first and second messageswith a smaller TBS; and defining the subset of information bitsaccording to the size of the identified given message to match therespective TBSs of the first and second messages; means for receivingcontrol signaling from the third-party entity, the control signalingincluding processing information for decoding the coded information; andmeans for extracting the second message from the message portion of thecoded information based at least in part on the key and the processinginformation.
 24. The apparatus of claim 23, wherein the controlsignaling comprises a downlink control signal or a radio resourcecontrol (RRC) signal.
 25. The apparatus of claim 23, wherein the codedinformation comprises the key to facilitate extracting the first messageor the second message.
 26. A computer program product, comprising: anon-transitory computer-readable medium comprising code for causing acomputer to: send first information to a third-party entity, the firstinformation comprising a first message for a peer mobile entity inoperative communication with the third-party entity; receive codedinformation from the third-party entity, the code information comprisinga message portion coded from a subset of information bits of the firstinformation and a second information from another mobile entity, and akey regarding at least one operation performed on bits of the firstmessage or a second message from the other mobile entity; wherein thekey comprises information regarding respective sizes of the first andsecond messages, the respective sizes comprising respective transportblock sizes (TBSs) of the first and second messages, further comprising,in response to determining the respective TBSs of the first and secondmessages are different: identifying a given message of the first andsecond messages with a smaller TBS; and defining the subset ofinformation bits according to the size of the identified given messageto match the respective TBSs of the first and second messages; receivecontrol signaling from the third-party entity, the control signalingincluding processing information for decoding the coded information; andextract the second message from the message portion of the codedinformation based at least in part on the key and the processinginformation.