Systems and/or methods of increased privacy wireless communications

ABSTRACT

Systems, methods and/or mobile devices are provided that enable a level of privacy/security in wireless communications to be increased responsive to a content of the wireless communications, biometric data and/or a position from which the wireless communications takes place. A plurality of communications modes is used by the system infrastructure and the plurality of mobile devices communicating therewith to increase privacy and undetectability of transmitted signals. The increased level of privacy and undetectability of signals is provided via pseudo-randomly generated signaling alphabets that are used by the mobile devices and by the system infrastructure to provide the communications. This represents a level of encryption/scrambling that is over and above the conventional encryption and/or scrambling at the bit level. Accordingly, systems, methods and/or devices providing a concatenated level of encryption/scrambling are provided.

CLAIM FOR PRIORITY

This application is a continuation-in-part of U.S. patent applicationSer. No. 12/372,354, filed Feb. 17, 2009, now U.S. Pat. No. 7,876,845entitled Wireless Communications Systems and/or Methods Providing LowInterference, High Privacy and/or Cognitive Flexibility, which itselfclaims priority to U.S. Provisional Application No. 61/033,114, filedMar. 3, 2008, entitled Next Generation (XG) Chipless Spread-SpectrumCommunications (CSSC), and is a continuation-in-part (CIP) of U.S.application Ser. No. 11/720,115, filed May 24, 2007, now U.S. Pat. No.8,050,337 entitled Systems, Methods, Devices and/or Computer ProgramProducts For Providing Communications Devoid of CyclostationaryFeatures, which is a 35 U.S.C. §371 national stage application of PCTApplication No. PCT/US2006/020417, filed on May 25, 2006, which claimspriority to U.S. Provisional Patent Application No. 60/692,932, filedJun. 22, 2005, entitled Communications Systems, Methods, Devices andComputer Program Products for Low Probability of Intercept (LPI), LowProbability of Detection (LPD) and/or Low Probability of Exploitation(LPE) of Communications Information, and also claims priority to U.S.Provisional Patent Application No. 60/698,247, filed Jul. 11, 2005,entitled Additional Communications Systems, Methods, Devices andComputer Program Products for Low Probability of Intercept (LPI), LowProbability of Detection (LPD) and/or Low Probability of Exploitation(LPE) of Communications Information and/or Minimum InterferenceCommunications, the entirety of all of which are incorporated herein byreference. The above-referenced PCT International Application waspublished in the English language as International Publication No. WO2007/001707.

FIELD OF THE INVENTION

This invention relates to low interference, high privacy, featurelesscovert communications systems and/or methods that may also comprisecognitive capability. More specifically, the invention relates towireless communications systems and/or methods (that may comprisewireless spread-spectrum communications systems and/or methods), thatcan provide low interference, high privacy, high covertness, featurelessand/or cognitive capability. The invention also relates to LowProbability of Intercept (LPI), Low Probability of Detection (LPD), LowProbability of Exploitation (LPE) and/or Minimum InterferenceCommunications (MIC) systems, methods, devices and/or computer programproducts that may also be used to provide low interference, white spacespectrum communications commercially.

BACKGROUND

In wireless communications, access to sufficient spectrum is becomingincreasingly difficult owing to an ever-increasing desire of users forfaster multi-media broadband services. Known systems and/or methods ofLPI/LPD/LPE and/or Jam Resistant (JR) communications and/or BurstCommunications (BURSTCOMM) may combine, in general, hybridspread-spectrum waveforms comprising Frequency-Hopping (FH), DirectSequence Pseudo-Noise (DSPN) spreading and/or Time-Hopping (TH) toincrease covertness and/or resistance to jamming. Transmitting a FH/DSPNspread-spectrum waveform in pseudo-random short bursts using, forexample, a TH technique, may, for example, reduce an interceptor'sability to integrate sufficient energy to trigger a detectabilitythreshold associated with a radiometer that the interceptor may be usingas a means of signal detection/identification. It is known that aradiometric approach to signal detection/identification may yield asuboptimum and/or unsatisfactory performance measure when attempting todetect/identify/exploit a FH/DSPN/TH spread-spectrum communicationssignal in a changing noise and/or interference environment. This may bedue to a background, noise/interference level and/or a signal energyreaching the interceptor's receiver being insufficient over theinterceptor's radiometric integration time.

SUMMARY

A wireless communications system configured for Low Probability ofIntercept (LPI), Low Probability of Detection (LPD) and/or LowProbability of Exploitation (LPE) communications may use waveformssubstantially devoid of a cyclostationary signature to improve aLPI/LPD/LPE property. A set of M independent “seed” waveforms thatsatisfy a time-bandwidth constraint may be used via a Gram-SchmidtOrthogonalization (GSO) procedure to generate M orthonormal functions.In accordance with exemplary embodiments of the present invention, the Mseed waveforms may, for example, be chosen from a band-limitedGaussian-distributed process (such as, for example, Gaussian-distributedpseudo-random noise) and may be used to generate, via anorthogonalization operation, such as, for example, a GSO, acorresponding set of M Gaussian-distributed orthonormal functionssubstantially devoid of a cyclostationary property.

The set of M Gaussian-distributed orthonormal functions may be used in acommunications system to define a signaling alphabet of a transmitter ofthe communications system (and a corresponding matched filter bank of areceiver of the communications system) to thereby reduce or eliminate acyclostationary signature of a transmitted communications waveform andthus increase a covertness measure and/or a privacy measure of thecommunications system.

The set of M Gaussian-distributed orthonormal functions may be updated,modified and/or changed as often as necessary to further increase and/ormaximize a covertness/privacy measure of the communications system.

A receiver of the communications system may be equipped withsubstantially the same algorithm(s) that are used by the transmitter ofthe communications system and the receiver may be substantiallysynchronized with the transmitter to thereby re-create and use at thereceiver the M Gaussian-distributed orthonormal functions for detectionof communications information.

The set of M orthonormal functions may, in some embodiments, be a set oforthogonal but not necessarily orthonormal functions. In furtherembodiments, the set of M orthonormal functions may be non-Gaussiandistributed and may be, for example, uniformly distributed, Rayleighdistributed and/or distributed in accordance with any other known(continuous and/or discrete) and/or arbitrary distribution. In stillfurther embodiments of the invention, different functions/elements of anM-ary orthonormal and/or orthogonal signaling alphabet may bedifferently distributed.

Embodiments of the invention provide a transmitter comprising a systemfor communicating information based upon a waveform that issubstantially devoid of a cyclostationary property. The transmitter maycomprise at least one waveform alphabet including a plurality ofelements, wherein the waveform that is substantially devoid of acyclostationary property may include at least one element of theplurality of elements of the at least one waveform alphabet. The atleast one waveform alphabet may be generated based upon at least onestatistical distribution responsive to a key and/or Time-of-Day (TOD)value.

In some embodiments, communicating information comprises associating ameasure of information with at least one element of the at least onewaveform alphabet wherein the measure of information may be a messageand/or a symbol comprising at least one bit.

In some embodiments, at least first and second elements of the pluralityof elements are substantially orthogonal therebetween and/orsubstantially orthonormal therebetween. The at least one statisticaldistribution may comprise a Normal/Gaussian, Bernoulli, Geometric,Pascal/Negative Binomial, Exponential, Erlang, Weibull, Chi-Squared, F,Student's t, Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta,Laplace, Cauchy, Rayleigh, Maxwell and/or any other distribution.According to some embodiments, the at least one statistical distributionis truncated.

In further embodiments, the key comprises a bit sequence and in someembodiments, the bit sequence comprises a TRANsmissions SECurity(TRANSEC) and/or a COMMunications SECurity (COMMSEC) bit sequence. TheTime-of-Day (TOD) value may be based upon GPS. Generating the at leastone waveform alphabet may comprise using a predetermined algorithmand/or look-up table.

In some embodiments, an element of the plurality of elements is basedupon a plurality of time-domain and/or frequency-domain values, whereina time-domain and/or frequency-domain value of the plurality oftime-domain and/or frequency-domain values may be real, imaginary and/orcomplex.

The transmitter may further comprise a direct waveform synthesis devoidof a frequency translation, wherein the direct waveform synthesis isused to generate the at least one waveform alphabet. In someembodiments, the direct waveform synthesis comprises at least onepseudo-random generator, filter, Analog-to-Digital (A/D) converter,Digital-to-Analog (D/A) converter, Fourier transform, inverse Fouriertransform and/or orthogonalizer, wherein the Fourier transform may be aDiscrete Fourier Transform (DFT) and/or a Fast Fourier Transform (FFT)and the inverse Fourier transform may be an Inverse Discrete FourierTransform (IDFT) and/or an Inverse Fast Fourier Transform (IFFT).

In further embodiments, the orthogonalizer may be a Gram-Schmidtorthogonalizer. In still further embodiments, the at least one waveformalphabet may comprise at least two waveform alphabets. The at least onewaveform alphabet may be used over a first time interval and not usedover a second time interval, wherein the first time interval may beassociated with a Time-of-Day (TOD) value, message, symbol and/or bit.The at least one second waveform alphabet may be used over the secondtime interval and the at least one waveform alphabet and the at leastone second waveform alphabet may be different therebetween, whereindifferent comprises a difference in a time-domain and/orfrequency-domain characteristic.

In some embodiments, the transmitter may further be configured totransmit at least one second waveform during a time interval that is notassociated with communicating information, wherein the at least onesecond waveform may be devoid of a cyclostationary property and maycomprise a frequency content that is substantially the same as afrequency content of the waveform. The frequency content may be a powerspectral density.

In some embodiments, the transmitter is fixed, mobile, portable,transportable, installed in a vehicle and/or installed in a space-basedcomponent such as a satellite. The vehicle may be a land-mobile vehicle,a maritime vehicle, an aeronautical vehicle and/or an unmanned vehicle.

In further embodiments, the transmitter being devoid of acyclostationary property comprises being devoid of a chipping rate. Thetransmitter may further include Forward Error Correction (FEC) encoding,bit repetition, bit interleaving, bit-to-symbol conversion, symbolrepetition, symbol interleaving, symbol-to-waveform mapping, waveformrepetition and/or waveform interleaving and, according to someembodiments, the transmitter may include communicating informationwirelessly and/or communicating spread-spectrum information.

In some embodiments, the waveform comprises a first plurality offrequencies over a first time interval and a second plurality offrequencies over a second time interval, wherein the first plurality offrequencies differ from the second plurality of frequencies in at leastone frequency. In further embodiments, at least some frequencies of thefirst and/or second plurality of frequencies are also used by a secondtransmitter, wherein the second transmitter may be a transmitterassociated with a commercial and/or military communications system.

The at least one waveform alphabet may be used deterministically and/orpseudo-randomly, wherein used deterministically and/or pseudo-randomlymay comprise usage of the at least one waveform alphabet responsive to aTime-of-Day (TOD) value, a pseudo-random selection and/or a usage of oneor more waveform alphabets other than the at least one waveformalphabet. In some embodiments, usage comprises usage of at least oneelement of the plurality of elements of the at least one waveformalphabet.

In some embodiments, the transmitter comprises a synthesis associatedwith the waveform that is substantially devoid of a frequencytranslation. The synthesis may include a plurality of operations thatare used to form the waveform, the plurality of operations not includinga frequency translation and the transmitter communicating informationbased upon the waveform without subjecting the waveform to a frequencytranslation.

According to some embodiments of the invention, the plurality ofoperations include generating values pseudo-randomly, a Fouriertransform, a Discrete Fourier Transform (DFT), a Fast Fourier Transform(FFT), an inverse Fourier transform, an Inverse Discrete FourierTransform (IDFT), an Inverse Fast Fourier Transform (IFFT), ForwardError Correction (FEC) encoding, bit interleaving, bit-to-symbolconversion, symbol interleaving, symbol-to-waveform mapping, waveformrepetition, filtering, amplification and/or waveform interleaving. Insome embodiments, generating values pseudo-randomly comprises generatingat least one value responsive to a Time-of-Day (TOD) value and/or a keyinput.

In further embodiments, generating at least one value pseudo-randomlycomprises generating at least one value based upon at least onestatistical distribution, wherein the at least one statisticaldistribution may comprise a Normal/Gaussian, Bernoulli, Geometric,Pascal/Negative Binomial, Exponential, Erlang, Weibull, Chi-Squared, F,Student's t, Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta,Laplace, Cauchy, Rayleigh, Maxwell and/or any other distribution and theat least one statistical distribution may be truncated. The at least onevalue may be a time-domain and/or frequency-domain value and the atleast one value may be real, imaginary and/or complex. The at least onevalue may be based upon at least one statistical distribution.

Embodiments of the invention provide a transmitter comprising asynthesis block and a transmission block, wherein the synthesis block isconfigured to synthesize at least one alphabet based upon at least onestatistical distribution and the transmission block is configured totransmit a waveform based upon the at least one alphabet. In someembodiments the waveform may be devoid of a cyclostationary property andthe at least one alphabet may comprise a plurality of elements and eachelement of the plurality of elements may be devoid of a cyclostationaryproperty. The synthesis block may be a direct synthesis block that doesnot include a frequency translation function and the transmission blockmay not include a frequency translation function.

In some embodiments, the at least one statistical distribution comprisesa Normal/Gaussian, Bernoulli, Geometric, Pascal/Negative Binomial,Exponential, Erlang, Weibull, Chi-Squared, F, Student's t, Rise, Pareto,Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy, Rayleigh,Maxwell and/or any other distribution and the at least one statisticaldistribution may be truncated.

In further embodiments, the at least one alphabet comprises a pluralityof elements and at least a first and second element of the plurality ofelements are substantially orthogonal therebetween. In still furtherembodiments, substantially orthogonal comprises substantiallyorthonormal. The at least one alphabet may be generated based upon theat least one statistical distribution responsive to a key and/orTime-of-Day (TOD) value and may be used by the transmitter forcommunicating information. In some embodiments, communicatinginformation comprises associating a measure of information with at leastone element of the at least one alphabet, wherein the measure ofinformation may be a message and/or symbol comprising at least one bit.The key may comprise a bit sequence and the bit sequence may comprise aTRANsmissions SECurity (TRANSEC) and/or a COMMunications SECurity(COMMSEC) bit sequence. The Time-of-Day (TOD) value may be based uponGPS.

In some embodiments, generating the at least one alphabet comprisesusing a predetermined algorithm and/or a look-up table. In furtherembodiments, an element of the plurality of elements is based upon aplurality of time-domain and/or frequency-domain values, wherein atime-domain and/or frequency-domain value of the plurality oftime-domain and/or frequency-domain values may be real, imaginary and/orcomplex.

In still other embodiments, the synthesis block comprises a directwaveform synthesis devoid of a frequency translation, wherein the directwaveform synthesis is used to generate the at least one alphabet. Thedirect waveform synthesis may comprise at least one pseudo-randomgenerator, filter, Analog-to-Digital (A/D) converter, Digital-to-Analog(D/A) converter, Fourier transform, inverse Fourier transform and/ororthogonalizer. The Fourier transform may be a Discrete FourierTransform (DFT) and/or a Fast Fourier Transform (FFT) and the inverseFourier transform may be an Inverse Discrete Fourier Transform (IDFT)and/or an Inverse Fast Fourier Transform (IFFT). The orthogonalizer maybe a Gram-Schmidt orthogonalizer.

In further embodiments, the at least one alphabet comprises at least twoalphabets. The at least one alphabet may be used over a first timeinterval and not used over a second time interval, wherein the firsttime interval may be associated with a Time-of-Day (TOD) value, message,symbol and/or bit. At least one second alphabet may be used over thesecond time interval. The at least one alphabet and the at least onesecond alphabet may be different therebetween, wherein different maycomprise a difference in a time-domain and/or frequency-domaincharacteristic.

In still further embodiments, at least one second waveform istransmitted during a time interval that is not associated withcommunicating information, wherein the at least one second waveform maybe devoid of a cyclostationary property and may comprise a frequencycontent that is substantially the same as a frequency content of thewaveform. The frequency content may be a power spectral density.

According to some embodiments, the transmitter is fixed, mobile,portable, transportable, installed in a vehicle and/or installed in asatellite. The vehicle may be a land-mobile vehicle, a maritime vehicle,an aeronautical vehicle and/or an unmanned vehicle. In furtherembodiments, devoid of a cyclostationary property comprises devoid of achipping rate.

In accordance with some embodiments, the transmitter further comprisesForward Error Correction (FEC) encoding, bit repetition, bitinterleaving, bit-to-symbol conversion, symbol repetition, symbolinterleaving, symbol-to-waveform mapping, waveform repetition and/orwaveform interleaving. In accordance with other embodiments,communicating information comprises communicating informationwirelessly. In further embodiments, communicating information comprisescommunicating spread-spectrum information. According to furtherembodiments, the waveform comprises a first plurality of frequenciesover a first time interval and a second plurality of frequencies over asecond time interval, wherein the first plurality of frequencies differfrom the second plurality of frequencies in at least one frequency.

In some embodiments, at least some frequencies of the first and/orsecond plurality of frequencies are also used by a second transmitter.The second transmitter may be a transmitter of a commercial and/or amilitary communications system. In other embodiments, the at least onealphabet is used deterministically and/or pseudo-randomly, wherein useddeterministically and/or pseudo-randomly may comprise usage of the atleast one alphabet responsive to a Time-of-Day (TOD) value, apseudo-random selection and/or a usage of one or more alphabets otherthan the at least one alphabet. In further embodiments, usage comprisesusage of at least one element of the plurality of elements of the atleast one alphabet.

In still further embodiments of the invention, a synthesis associatedwith the waveform is substantially devoid of a frequency translation.The synthesis may include a plurality of operations that may be used toform the waveform, the plurality of operations may not include afrequency translation and the transmitter may transmit the waveformwithout subjecting the waveform to a frequency translation. Theplurality of operations may include generating values pseudo-randomly, aFourier transform, a Discrete Fourier Transform (DFT), a Fast FourierTransform (FFT), an inverse Fourier transform, an Inverse DiscreteFourier Transform (IDFT), an Inverse Fast Fourier Transform (IFFT),Forward Error Correction (FEC) encoding, bit interleaving, bit-to-symbolconversion, symbol interleaving, symbol-to-waveform mapping, waveformrepetition, filtering, amplification and/or waveform interleaving.

In accordance with some embodiments, generating values pseudo-randomlycomprises generating at least one value responsive to a Time-of-Day(TOD) value and/or a key input. In further embodiments, generating atleast one value pseudo-randomly comprises generating at least one valuebased upon at least one statistical distribution, the at least onestatistical distribution comprising a Normal/Gaussian, Bernoulli,Geometric, Pascal/Negative Binomial, Exponential, Erlang, Weibull,Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial, Uniform,Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or any otherdistribution. In some embodiments, the at least one statisticaldistribution may be truncated. In further embodiments, the at least onevalue is a time-domain and/or frequency-domain value.

In still further embodiments of the invention, the at least one value isreal, imaginary and/or complex. The at least one value may be based uponat least one statistical distribution, wherein the at least onestatistical distribution comprises a Normal/Gaussian, Bernoulli,Geometric, Pascal/Negative Binomial, Exponential, Erlang, Weibull,Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial, Uniform,Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or any otherdistribution. The at least one statistical distribution may be atruncated distribution.

Embodiments of the invention provide a transmitter comprising a systemfor communicating information based upon a spread-spectrum waveform thatis substantially devoid of a chipping rate.

Other embodiments of the invention provide a receiver comprising asystem for receiving information from a transmitter, wherein theinformation is based upon a spread-spectrum waveform that issubstantially devoid of a chipping rate.

Further embodiments of the invention provide a transmitter comprising asystem for communicating information based upon a waveform that issubstantially Gaussian distributed.

Still further embodiments of the invention provide a receiver comprisinga system for receiving information from a transmitter, wherein theinformation is based upon a waveform that is substantially Gaussiandistributed.

Additional embodiments provide a transmitter comprising a system forcommunicating information based upon a waveform that does not include acyclostationary signature.

Some embodiments provide a receiver comprising a system for receivinginformation from a transmitter, wherein the information is based upon awaveform that does not include a cyclostationary signature.

Other embodiments provide a transmitter comprising a system for mappingan information sequence onto a waveform sequence that is substantiallydevoid of a cyclostationary signature.

Further embodiments provide a receiver comprising a system for mapping awaveform sequence that is substantially devoid of a cyclostationarysignature onto an information sequence.

Still further embodiments provide a receiver comprising a system forproviding information based upon processing a waveform that issubstantially devoid of a cyclostationary property.

Additional embodiments provide a receiver comprising a system forreceiving information comprising at least one alphabet based upon atleast one statistical distribution.

Embodiments of the invention further provide a transmitter comprising asystem for transmitting a waveform, wherein the waveform is based uponat least one alphabet that is based upon at least one statisticaldistribution. The at least one statistical distribution comprises aNormal/Gaussian, Bernoulli, Geometric, Pascal/Negative Binomial,Exponential, Erlang, Weibull, Chi-Squared, F, Student's t, Rise, Pareto,Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy, Rayleigh,Maxwell and/or any other distribution, wherein the at least onestatistical distribution may be truncated.

In some embodiments, the at least one alphabet comprises a plurality ofelements and at least a first and second element of the plurality ofelements are substantially orthogonal therebetween. In some embodiments,substantially orthogonal comprises substantially orthonormal.

Embodiments of the invention provide a receiver comprising a system forreceiving a waveform, wherein the waveform is based upon at least onealphabet that is based upon at least one statistical distribution. Theat least one statistical distribution comprises a Normal/Gaussian,Bernoulli, Geometric, Pascal/Negative Binomial, Exponential, Erlang,Weibull, Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial,Uniform, Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or anyother distribution, wherein the at least one statistical distributionmay be truncated. The at least one alphabet may comprise a plurality ofelements and at least a first and second element of the plurality ofelements may be substantially orthogonal therebetween. In someembodiments, substantially orthogonal comprises substantiallyorthonormal.

In accordance with some embodiments of the present invention, a methodof communicating information is provided, the method comprisingtransmitting and/or receiving a waveform that is substantially devoid ofa cyclostationary property. The method optionally further comprisesusing at least one waveform alphabet including a plurality of elements,wherein the waveform that is substantially devoid of a cyclostationaryproperty includes at least one element of the plurality of elements ofthe at least one waveform alphabet. In accordance with the method, theat least one waveform alphabet is optionally generated based upon atleast one statistical distribution responsive to a key and/orTime-of-Day (TOD) value. Further in accordance with the method,communicating information optionally comprises associating a measure ofinformation with at least one element of the at least one waveformalphabet. The measure of information may be a message and/or symbolcomprising at least one bit.

In accordance with the method, at least first and second elements of theplurality of elements may be substantially orthogonal therebetween,wherein substantially orthogonal may comprise substantially orthonormal.

Further in accordance with the method, the at least one statisticaldistribution optionally comprises a Normal/Gaussian, Bernoulli,Geometric, Pascal/Negative Binomial, Exponential, Erlang, Weibull,Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial, Uniform,Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or any otherdistribution, wherein the at least one statistical distribution may betruncated.

In some embodiments according to the method, the key comprises a bitsequence, wherein the bit sequence may comprise a TRANsmissions SECurity(TRANSEC) and/or a COMMunications SECurity (COMMSEC) bit sequence.

In further embodiments, the Time-of-Day (TOD) value is based upon GPS.In still further embodiments, generating the at least one waveformalphabet comprises using a predetermined algorithm and/or look-up table.In some embodiments, an element of the plurality of elements is basedupon a plurality of time-domain and/or frequency-domain values, whereina time-domain and/or frequency-domain value of the plurality oftime-domain and/or frequency-domain values may be real, imaginary and/orcomplex.

According to some embodiments according to the method, the methodfurther comprises a direct waveform synthesis devoid of a frequencytranslation, wherein the direct waveform synthesis is used to generatethe at least one waveform alphabet, wherein the direct waveformsynthesis may comprise at least one pseudo-random generator, filter,Analog-to-Digital (A/D) converter, Digital-to-Analog (D/A) converter,Fourier transform, inverse Fourier transform and/or orthogonalizer. Insome embodiments, the Fourier transform is a Discrete Fourier Transform(DFT) and/or a Fast Fourier Transform (FFT) and the inverse Fouriertransform is an Inverse Discrete Fourier Transform (IDFT) and/or anInverse Fast Fourier Transform (IFFT). In further embodiments, theorthogonalizer is a Gram-Schmidt orthogonalizer.

In accordance with other embodiments of the invention, the at least onewaveform alphabet comprises at least two waveform alphabets. Inaccordance with some embodiments, the at least one waveform alphabet isused over a first time interval and not used over a second timeinterval, wherein the first time interval may be associated with aTime-of-Day (TOD) value, message, symbol and/or bit.

In accordance with further embodiments of the invention, at least onesecond waveform alphabet is used over the second time interval, whereinthe at least one waveform alphabet and the at least one second waveformalphabet may be different therebetween. In some embodiments, differentcomprises a difference in a time-domain and/or frequency-domaincharacteristic.

In still other embodiments of the invention, the method comprisestransmitting at least one second waveform during a time interval that isnot associated with communicating information, wherein the at least onesecond waveform may be devoid of a cyclostationary property and maycomprise a frequency content that is substantially the same as afrequency content of the waveform. The frequency content may be a powerspectral density. In further embodiments of the invention, the methodcomprises using a transmitter that is fixed, mobile, portable,transportable, installed in a vehicle and/or installed in a satellite.The vehicle may be a land-mobile vehicle, a maritime vehicle, anaeronautical vehicle and/or an unmanned vehicle.

In some embodiments in accordance with the method, devoid of acyclostationary property comprises devoid of a chipping rate. The methodoptionally further comprises using Forward Error Correction (FEC)encoding, bit repetition, bit interleaving, bit-to-symbol conversion,symbol repetition, symbol interleaving, symbol-to-waveform mapping,waveform repetition and/or waveform interleaving. In some embodimentsaccording to the method, communicating information comprisescommunicating information wirelessly. In other embodiments according tothe method, communicating information comprises communicatingspread-spectrum information.

In further embodiments in accordance with the method, the waveformcomprises a first plurality of frequencies over a first time intervaland a second plurality of frequencies over a second time interval,wherein the first plurality of frequencies differ from the secondplurality of frequencies in at least one frequency. In some embodimentsin accordance with the method, at least some frequencies of the firstand/or second plurality of frequencies are also used by a secondtransmitter, wherein the second transmitter may be a transmitter of acommercial communications system.

In accordance with the method, the at least one waveform alphabet isoptionally used deterministically and/or pseudo-randomly, wherein useddeterministically and/or pseudo-randomly optionally comprises usage ofthe at least one waveform alphabet responsive to a Time-of-Day (TOD)value, a pseudo-random selection and/or a usage of one or more waveformalphabets other than the at least one waveform alphabet. In accordancewith the method, usage optionally comprises usage of at least oneelement of the plurality of elements of the at least one waveformalphabet.

The method optionally further comprises a synthesis associated with thewaveform that may be substantially devoid of a frequency translation. Inaccordance with the method, the synthesis optionally includes aplurality of operations that are used to form the waveform, theplurality of operations not including a frequency translation andwherein the transmitter communicates information based upon the waveformwithout subjecting the waveform to a frequency translation. Theplurality of operations may include generating values pseudo-randomly, aFourier transform, a Discrete Fourier Transform (DFT), a Fast FourierTransform (FFT), an inverse Fourier transform, an Inverse DiscreteFourier Transform (IDFT), an Inverse Fast Fourier Transform (IFFT),Forward Error Correction (FEC) encoding, bit interleaving, bit-to-symbolconversion, symbol interleaving, symbol-to-waveform mapping, waveformrepetition, filtering, amplification and/or waveform interleaving.

Generating values pseudo-randomly may comprise generating at least onevalue responsive to a Time-of-Day (TOD) value and/or a key input.Generating at least one value may comprise generating at least one valuebased upon at least one statistical distribution. The at least onestatistical distribution may comprise a Normal/Gaussian, Bernoulli,Geometric, Pascal/Negative Binomial, Exponential, Erlang, Weibull,Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial, Uniform,Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or any otherdistribution. In accordance with the method, the at least onestatistical distribution may be truncated.

Further in accordance with the method, the at least one value may be atime-domain and/or frequency-domain value. The at least one value may bereal, imaginary and/or complex and the at least one value may be basedupon at least one statistical distribution.

According to embodiments of the present invention, a method oftransmitting a signal is provided, the method comprising synthesizing atleast one alphabet based upon at least one statistical distribution andtransmitting a waveform based upon the at least one alphabet, whereinthe waveform may be devoid of a cyclostationary property and the atleast one alphabet may comprise a plurality of elements, each element ofthe plurality of elements may be devoid of a cyclostationary property.The synthesizing may be a direct synthesis that does not include afrequency translation function. Further according to the method, thetransmitting may not include a frequency translation function.

The at least one statistical distribution may comprise aNormal/Gaussian, Bernoulli, Geometric, Pascal/Negative Binomial,Exponential, Erlang, Weibull, Chi-Squared, F, Student's t, Rise, Pareto,Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy, Rayleigh,Maxwell and/or any other distribution, wherein the at least onestatistical distribution may be truncated.

In accordance with the method, the at least one alphabet may comprise aplurality of elements and at least a first and second element of theplurality of elements may be substantially orthogonal therebetween.Substantially orthogonal may comprise substantially orthonormal.According to further embodiments of the present invention, the at leastone alphabet may be generated based upon the at least one statisticaldistribution responsive to a key and/or Time-of-Day (TOD) value and maybe used by a transmitter for communicating information. Communicatinginformation may comprise associating a measure of information with atleast one element of the at least one alphabet. The measure ofinformation may be a message and/or symbol comprising at least one bit.The key may comprise a bit sequence and the bit sequence may comprise aTRANsmissions SECurity (TRANSEC) and/or a COMMunications SECurity(COMMSEC) bit sequence.

According to still more embodiments of the present invention, theTime-of-Day (TOD) value may be based upon GPS. Generating the at leastone alphabet may comprise using a predetermined algorithm and/or look-uptable.

According to yet more embodiments of the present invention, an elementof the plurality of elements may be based upon a plurality oftime-domain and/or frequency-domain values, wherein a time-domain and/orfrequency-domain value of the plurality of time-domain and/orfrequency-domain values may be real, imaginary and/or complex.

According to further embodiments of the present invention, thesynthesizing may comprise synthesizing a direct waveform devoid of afrequency translation, wherein the direct waveform synthesizing may beused to generate the at least one alphabet. The direct waveformsynthesis may comprise at least one pseudo-random generator, filter,Analog-to-Digital (A/D) converter, Digital-to-Analog (D/A) converter,Fourier transform, inverse Fourier transform and/or orthogonalizer. TheFourier transform may be a Discrete Fourier Transform (DFT) and/or aFast Fourier Transform (FFT) and the inverse Fourier transform may be anInverse Discrete Fourier Transform (IDFT) and/or an Inverse Fast FourierTransform (IFFT). The orthogonalizer may be a Gram-Schmidtorthogonalizer.

According to still further embodiments of the present invention, the atleast one alphabet may comprise at least two alphabets. The at least onealphabet may be used over a first time interval and not used over asecond time interval. The first time interval may be associated with aTime-of-Day (TOD) value, message, symbol and/or bit. According to themethod, at least one second alphabet may be used over the second timeinterval. Further according to the method, the at least one alphabet andthe at least one second alphabet may be different therebetween, whereindifferent may comprise a difference in a time-domain and/orfrequency-domain characteristic.

According to embodiments of the present invention, the method furthercomprises transmitting at least one second waveform during a timeinterval that is not associated with communicating information, whereinthe at least one second waveform may be devoid of a cyclostationaryproperty and may comprise a frequency content that is substantially thesame as a frequency content of the waveform. The frequency content maybe a power spectral density.

According to the method, transmitting may be performed by a transmitterthat is fixed, mobile, portable, transportable, installed in a vehicleand/or installed in a satellite. The vehicle may be a land-mobilevehicle, a maritime vehicle, an aeronautical vehicle and/or an unmannedvehicle. Further according to the method, devoid of a cyclostationaryproperty may comprise devoid of a chipping rate. The method may furthercomprise use of Forward Error Correction (FEC) encoding, bit repetition,bit interleaving, bit-to-symbol conversion, symbol repetition, symbolinterleaving, symbol-to-waveform mapping, waveform repetition and/orwaveform interleaving and communicating information according to themethod may comprise communicating information wirelessly. In someembodiments, communicating information comprises communicatingspread-spectrum information.

Still further according to the method, the waveform may comprise a firstplurality of frequencies over a first time interval and a secondplurality of frequencies over a second time interval, wherein the firstplurality of frequencies differ from the second plurality of frequenciesin at least one frequency. At least some frequencies of the first and/orsecond plurality of frequencies may also used by a second transmitter.The second transmitter may be a transmitter of a commercialcommunications system.

According to embodiments of the present invention, the at least onealphabet may be used deterministically and/or pseudo-randomly, whereinused deterministically and/or pseudo-randomly may comprise usage of theat least one alphabet responsive to a Time-of-Day (TOD) value, apseudo-random selection and/or a usage of one or more alphabets otherthan the at least one alphabet. According to some embodiments of thepresent invention, usage comprises usage of at least one element of theplurality of elements of the at least one alphabet. According to otherembodiments of the present invention, a synthesis associated with thewaveform is substantially devoid of a frequency translation.

In some embodiments, the synthesis includes a plurality of operationsthat are used to form the waveform, the plurality of operations notincluding a frequency translation and wherein the transmitter transmitsthe waveform without subjecting the waveform to a frequency translation.In some embodiments, the plurality of operations may include generatingvalues pseudo-randomly, a Fourier transform, a Discrete FourierTransform (DFT), a Fast Fourier Transform (FFT), an inverse Fouriertransform, an Inverse Discrete Fourier Transform (IDFT), an Inverse FastFourier Transform (IFFT), Forward Error Correction (FEC) encoding, bitinterleaving, bit-to-symbol conversion, symbol interleaving,symbol-to-waveform mapping, waveform repetition, filtering,amplification and/or waveform interleaving. Generating valuespseudo-randomly may comprise generating at least one value responsive toa Time-of-Day (TOD) value and/or a key input.

In further embodiments according to the method, generating at least onevalue pseudo-randomly comprises generating at least one value based uponat least one statistical distribution. The at least one statisticaldistribution may comprise a Normal/Gaussian, Bernoulli, Geometric,Pascal/Negative Binomial, Exponential, Erlang, Weibull, Chi-Squared, F,Student's t, Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta,Laplace, Cauchy, Rayleigh, Maxwell and/or any other distribution. The atleast one statistical distribution may be truncated. The at least onevalue may be a time-domain and/or frequency-domain value. The at leastone value may be real, imaginary and/or complex and, according to someembodiments of the invention, the at least one value is based upon atleast one statistical distribution.

According to the method, the at least one statistical distribution maycomprise a Normal/Gaussian, Bernoulli, Geometric, Pascal/NegativeBinomial, Exponential, Erlang, Weibull, Chi-Squared, F, Student's t,Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy,Rayleigh, Maxwell and/or any other distribution. The at least onestatistical distribution may be truncated.

According to embodiments of the invention, a method of communicatinginformation may comprise transmitting and/or receiving a spread-spectrumwaveform that is substantially devoid of a chipping rate.

According to some other embodiments of the invention, a method ofreceiving information may comprise receiving a measure of aspread-spectrum waveform that is substantially devoid of a chippingrate.

According to some more embodiments of the invention, a method ofcommunicating information is provided, the method comprisingtransmitting and/or receiving a waveform that is substantially Gaussiandistributed.

According to some additional embodiments of the present invention, amethod of receiving information is provided, the method comprisingreceiving a measure of a waveform that is substantially Gaussiandistributed.

According to still more embodiments of the present invention, a methodof communicating information is provided, the method comprisingtransmitting a waveform that does not include a cyclostationarysignature.

According to yet more embodiments of the present invention, a method ofreceiving information from a transmitter is provided, the methodcomprising receiving a measure of a waveform that does not include acyclostationary signature, wherein the waveform that does not include acyclostationary signature has been transmitted by the transmitter.

According to further embodiments of the present invention, a method oftransmitting information is provided, the method comprising mapping aninformation sequence onto a waveform sequence, wherein the waveformsequence is substantially devoid of a cyclostationary signature.

According to still further embodiments, a method of receivinginformation is provided, the method comprising mapping a waveformsequence that is substantially devoid of a cyclostationary signatureonto an information sequence.

According to some embodiments of the present invention, a method ofproviding information is provided, the method comprising processing awaveform that is substantially devoid of a cyclostationary property.

According to some more embodiments of the present invention, a method ofreceiving information from a transmitter is provided, the methodcomprising receiving a measure of a signal that is based upon at leastone statistical distribution, wherein the transmitter synthesizes atleast one alphabet based upon the at least one statistical distributionand transmits the signal based upon the at least one alphabet.

According to some other embodiments of the present invention, a methodof transmitting a signal is provided, the method comprising wirelesslytransmitting a signal that is based upon at least one alphabet, whereinthe at least one alphabet is based upon at least one statisticaldistribution. The at least one statistical distribution may comprise aNormal/Gaussian, Bernoulli, Geometric, Pascal/Negative Binomial,Exponential, Erlang, Weibull, Chi-Squared, F, Student's t, Rise, Pareto,Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy, Rayleigh,Maxwell and/or any other distribution. The at least one statisticaldistribution may be truncated. The at least one alphabet may comprise aplurality of elements and at least a first and second element of theplurality of elements may be substantially orthogonal therebetween,wherein substantially orthogonal may comprise substantially orthonormal.

According to embodiments of the invention, a method of processing awaveform may comprise transmitting and/or receiving the waveform,wherein the waveform is based upon at least one alphabet, the at leastone alphabet is based upon at least one statistical distribution and thewaveform and/or the at least one alphabet is/are substantially devoid ofa cyclostationary signature and/or chipping rate. The at least onestatistical distribution may comprise a Normal/Gaussian, Bernoulli,Geometric, Pascal/Negative Binomial, Exponential, Erlang, Weibull,Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial, Uniform,Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or any otherdistribution. In some embodiments, the at least one statisticaldistribution may be truncated.

According to some other embodiments of the present invention, the atleast one alphabet may comprise a plurality of elements and at least afirst and second element of the plurality of elements may besubstantially orthogonal therebetween, wherein substantially orthogonalmay comprise substantially orthonormal. The processing may include aplurality of operations and may be substantially devoid of a frequencytranslation. According to still more embodiments of the presentinvention, the plurality of operations may include generating valuespseudo-randomly, a Fourier transform, a Discrete Fourier Transform(DFT), a Fast Fourier Transform (FFT), an inverse Fourier transform, anInverse Discrete Fourier Transform (IDFT), an Inverse Fast FourierTransform (IFFT), Forward Error Correction (FEC) encoding, bitinterleaving, bit-to-symbol conversion, symbol interleaving,symbol-to-waveform mapping, waveform repetition, filtering,amplification and/or waveform interleaving.

According to yet more embodiments of the present invention, generatingvalues pseudo-randomly may comprise generating at least one valueresponsive to a Time-of-Day (TOD) value and/or a key input, whereingenerating at least one value may comprise generating at least one valuebased upon at least one statistical distribution. In some embodiments,the at least one statistical distribution comprises a Normal/Gaussian,Bernoulli, Geometric, Pascal/Negative Binomial, Exponential, Erlang,Weibull, Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial,Uniform, Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or anyother distribution. According to further embodiments of the presentinvention, the at least one statistical distribution may be truncated.

According to still further embodiments of the present invention, the atleast one value may be a time-domain and/or frequency-domain value,wherein the at least one value may be real, imaginary and/or complex.The at least one value may be based upon at least one statisticaldistribution.

Transmitting and/or receiving may comprise wirelessly transmittingand/or receiving. According to some embodiments of the presentinvention, transmitting and/or receiving may comprise transmittingand/or receiving at a space-based component, at a land-mobile vehicle,at a maritime vehicle, at an aeronautical vehicle, at an un-mannedvehicle and/or at a user device, wherein the user device may be fixed,mobile, portable, transportable and/or installed in a vehicle.

Wirelessly transmitting and/or receiving may be based upon frequenciesthat are used by a plurality of transmitters, wherein first and secondtransmitters of the plurality of transmitters may respectively beassociated with first and second systems. In some embodiments, at leastone system of the first and second systems is a commercial system usingfrequencies that are authorized for use by one or more commercialsystems and/or a military system using frequencies that are reserved foruse by one or more military systems.

Embodiments according to the invention can provide methods and/ortransmitters for communicating information based upon a waveform that issubstantially devoid of a cyclostationary property. Pursuant to theseembodiments, a method/transmitter can be provided comprising at leastone waveform alphabet including a plurality of elements, wherein thewaveform that is substantially devoid of a cyclostationary propertyincludes at least one element of the plurality of elements of the atleast one waveform alphabet.

In some embodiments according to the invention, the at least onewaveform alphabet is generated based upon at least one statisticaldistribution responsive to a key and/or Time-of-Day (TOD) value.

In some embodiments according to the invention, communicatinginformation comprises associating a measure of information with at leastone element of the at least one waveform alphabet. In some embodimentsaccording to the invention, the measure of information is a messageand/or symbol comprising at least one bit.

In some embodiments according to the invention, at least first andsecond elements of the plurality of elements are substantiallyorthogonal therebetween, wherein substantially orthogonal may, in someembodiments, comprise substantially orthonormal.

In some embodiments according to the invention, the at least onestatistical distribution comprises a Normal/Gaussian, Bernoulli,Geometric, Pascal/Negative Binomial, Exponential, Erlang, Weibull,Chi-Squared, F, Student's t, Rise, Pareto, Poisson, Binomial, Uniform,Gamma, Beta, Laplace, Cauchy, Rayleigh, Maxwell and/or any otherdistribution. In further embodiments, the at least one statisticaldistribution is truncated.

In some embodiments according to the invention, a method and/ortransmitter can be provided comprising a synthesis component and atransmission component, wherein the synthesis component synthesizes atleast one alphabet based upon at least one statistical distribution andthe transmission component transmits a waveform based upon the at leastone alphabet. In some embodiments, the waveform is devoid of acyclostationary property. In other embodiments, the at least onealphabet comprises a plurality of elements, with each element of theplurality of elements being devoid of a cyclostationary property. Instill other embodiments, the synthesis component is a direct synthesiscomponent that does not include a frequency translation function and/orthe transmission component does not include a frequency translationfunction.

Embodiments of the present invention have been described above in termsof systems, methods, devices and/or computer program products thatprovide communications devoid of cyclostationary features. However,other embodiments of the present invention may selectively providecommunications devoid of cyclostationary features. For example, ifLPI/LPD/LPE and/or minimum interference communications are desired, thennon-cyclostationary waveforms may be transmitted. However, whenLPI/LPD/LPE and/or minimum interference communications need not betransmitted, cyclostationary waveforms may be used. An indicator may beprovided to allow a receiver/transmitter to determine whethercyclostationary or non-cyclostationary waveforms are being transmittedor may be transmitted. Accordingly, a given system, method, deviceand/or computer program can operate in one of two modes, depending uponwhether LPI/LPD/LPE and/or minimum interference communications aredesired, and/or based on other parameters and/or properties of thecommunications environment.

Various other embodiments described herein can provide systems and/ormethods of increased privacy wireless communications. A system that isconfigured to communicate information, according to some of theseembodiments, comprises a first communications mode and a secondcommunications mode that comprises an increased level of privacycompared to the first communications mode. The system is configured topreferentially use the second communications mode to communicate theinformation and refrain from using the first communications mode tocommunicate the information responsive to a privacy level of theinformation being at or above a threshold. Moreover, the system isfurther configured to preferentially use the first communications modeto communicate the information and refrain from using the secondcommunications mode to communicate the information responsive to theprivacy level of the information being below the threshold.

In some embodiments, the privacy level of the information is set by anelement of the system, by a person who desires to communicate theinformation, responsive to a value of time, responsive a value ofposition, responsive to biometric data, responsive to a distance overwhich the information is to be communicated and/or responsive to asignal strength. In some of these embodiments, the increased level ofprivacy of the second communications mode prevents an unintendedreceiver from detecting the information that is communicated with thesecond communications mode, and the unintended receiver is capable ofdetecting if the information is communicated via the firstcommunications mode.

In other embodiments, the system is further configured to preferentiallyuse the second communications mode to communicate the information andrefrain from using the first communications mode to communicate theinformation responsive to a value of time, a value of position,biometric data, a distance over which the information is to becommunicated and/or a signal strength. Moreover, in any of theseembodiments, the system may be at least part of a computer, transceiver,radioterminal, satellite, satellite gateway, airborne platform, basestation, access point and/or femtocell.

In some embodiments, the first communications mode is based uponTDM/TDMA, CDM/CDMA, FDM/FDMA, OFDM/OFDMA, GSM, WiMAX and/or LTE andcomprises a first level of cyclostationarity. Moreover, the secondcommunications mode comprises a signaling alphabet that ispseudo-randomly generated responsive to a key, statistical distributionand orthogonalization procedure. The second communications modecomprises a second level of cyclostationarity that is less than thefirst level of cyclostationarity of the first communications mode.

In some embodiments, the key is a user defined key and/or a networkdefined key. The user defined key is determined by a user of the systemand/or by a device of the user of the system, is unique to the user ofthe system and differs for different users of the system. The networkdefined key is determined by an element of a network which includes thesystem and/or provides communications to the system. Moreover, thenetwork defined key is commonly used by a plurality of users of thesystem and/or network.

In other embodiments, the system is a mobile device that is configuredto communicate with a base station and with an access point. The mobiledevice is further configured to preferentially communicate with theaccess point when proximate thereto and to refrain from communicatingwith the base station when proximate to the access point even though themobile device is able to communicate with the base station whenproximate to the access point. The mobile device is also configured topreferentially communicate with the access point when proximate theretoand to preferentially use the second communications mode to communicatetherewith. Finally, the second communications mode is based upon theuser defined key and is also based upon said signaling alphabet that ispseudo-randomly generated. In some of these embodiments, the userdefined key is unique to the mobile device, is used only for thecommunications of the mobile device and can be changed only by a user ofthe mobile device and/or by the mobile device by using an identificationcode, a user name and/or a password. In other embodiments, the userdefined key is provided to the access point and/or to the base stationby accessing a web site and providing to the web site said user definedkey, wherein the web site is connected to the access point and/or to thebase station. Moreover, in some of these embodiments, the secondcommunications mode is based upon the user defined key over a first timeinterval and is based upon the network defined key over a second timeinterval, and the mobile device is further configured to hand-overcommunications from communications that are based upon the user definedkey to communications that are based upon the network defined key and/orfrom communications that are based upon the network defined key tocommunications that are based upon the user defined key.

Moreover, in some of these mobile device embodiments, the mobile deviceis configured to preferentially communicate with the access point usingfrequencies of an unlicensed and/or licensed band of frequencies. Inother embodiments, the mobile device is configured to preferentiallycommunicate with the access point using optical band frequencies, ultraviolet frequencies and/or infrared frequencies. In still otherembodiments, the mobile device is further configured to communicate withthe access point and/or base station using the second communicationsmode and the user defined key responsive to a first orientation of themobile device relative to another device that is also communicating withthe access point and/or base station concurrently and co-frequency withsaid mobile device, and the mobile device is further configured tocommunicate with the access point and/or base station using the secondcommunications mode and the network defined key responsive to a secondorientation of the mobile device relative to said another device that isalso communicating with the access point and/or base stationconcurrently and co-frequency with said mobile device.

In still other mobile device embodiments, the mobile device isconfigured to communicate with the base station using the secondcommunications mode, the network defined key and said signaling alphabetthat is pseudo-randomly generated. The base station also uses saidsignaling alphabet to communicate with the mobile device and to alsocommunicate with at least one other device concurrently and co-frequencywith the mobile device. The mobile device is further configured to use afirst element of said signaling alphabet and to refrain from using asecond element of said signaling alphabet that is being used by the atleast one other device responsive to a first orientation of the mobiledevice relative to the at least one other device. The mobile device isfurther configured to use the first element and the second element ofsaid signaling alphabet while said first element and said second elementare also being used by the at least one other device responsive to asecond orientation of the mobile device relative to the at least oneother device.

In some of these mobile device embodiments, the mobile device is furtherconfigured to communicate with the access point and/or base stationusing the second communications mode based upon the user defined key.The user defined key is provided to the access point and/or base stationby accessing a web site and providing to the web site said user definedkey. The web site is connected to the access point and/or to the basestation. Moreover, in some of these embodiments, the secondcommunications mode is based upon the user defined key over a first timeinterval and is based upon the network defined key over a second timeinterval, and the mobile device is further configured to hand-overcommunications from communications that are based upon the user definedkey to communications that are based upon the network defined key and/orfrom communications that are based upon the network defined key tocommunications that are based upon the user defined key.

In still other mobile device embodiments, the mobile device is furtherconfigured to communicate with the base station using the secondcommunications mode, the network defined key and said signaling alphabetthat is pseudo-randomly generated, responsive to a first orientationbetween the mobile device and another device. Moreover, the mobiledevice is further configured to communicate with the base station usingthe second communications mode, the user defined key and said signalingalphabet that is pseudo-randomly generated, responsive to a secondorientation between the mobile device and said another device. In someof these mobile device embodiments, the user defined key is provided tothe access point and/or base station by accessing a web site andproviding to the web site said user defined key. The web site isconnected to the access point and to the base station. Moreover, in someof these mobile device embodiments, the second communications mode isbased upon the user defined key over a first time interval and is basedupon the network defined key over a second time interval, and the mobiledevice is further configured to hand-over communications fromcommunications that are based upon the user defined key tocommunications that are based upon the network defined key and/or fromcommunications that are based upon the network defined key tocommunications that are based upon the user defined key.

In still other embodiments, the system is a base station that isconfigured to communicate with a first device and with a second deviceconcurrently and co-frequency. In these base station embodiments, thebase station is configured communicate with the first device and withthe second device using the second communications mode, the networkdefined key and said signaling alphabet that is pseudo-randomlygenerated. The base station is further configured to use a first elementof the signaling alphabet to communicate with the first device and torefrain from using a second element of the signaling alphabet tocommunicate with the first device while said second element is beingused by the base station to communicate with the second device,responsive to a first orientation of the first device relative to thesecond device. The base station is further configured to use the firstelement and the second element of the signaling alphabet to communicatewith said first device while said first element and said second elementare also being used by the base station to communicate with said seconddevice, responsive to a second orientation of the first device relativeto the second device.

In these base station embodiments, the second orientation between thefirst device and the second device allows an antenna of the basestation, comprising a plurality of elements, to form a first antennapattern and use the first antenna pattern to communicate with the firstdevice and to also form a second antenna pattern and use the secondantenna pattern to communicate with the second device. Moreover, a gainof the first antenna pattern in a direction associated with the firstdevice is greater than a gain of the first antenna pattern in adirection associated with the second device. Finally, a gain of thesecond antenna pattern in a direction associated with the second deviceis greater than a gain of the second antenna pattern in a directionassociated with the first device.

Moreover, in some of these base station embodiments, the plurality ofelements comprises a first plurality of vertically disposed elementsand/or a second plurality of horizontally disposed elements. Responsiveto said second orientation the system uses antenna patterndiscrimination between the first and second antenna patterns to reduceinterference between the communications of the first and second devices.Moreover, responsive to said first orientation the system uses elementdiscrimination between different elements of the signaling alphabet toreduce interference between the communications of the first and seconddevices.

In other base station embodiments, the base station is configured tocommunicate with a first device using the second communications mode andto communicate with a second device also using the second communicationsmode. In these embodiments, the base station is further configured tocommunicate with the first device and with the second deviceconcurrently and co-frequency. The base station is also configured tocommunicate with the first device and with the second device using thenetwork defined key and said signaling alphabet that is pseudo-randomlygenerated, responsive to a first orientation between the first deviceand the second device. The base station is further configured tocommunicate with the first device using a first user defined key and afirst signaling alphabet that is pseudo-randomly generated based uponthe first user defined key and a statistical distribution and to,communicate with the second device using a second user defined key and asecond signaling alphabet that is pseudo-randomly generated based uponthe second user defined key and a statistical distribution, responsiveto a second orientation between the first device and the second device.

In some of these base station embodiments, the second orientationbetween the first device and the second device allows an antenna of thebase station, comprising a plurality of elements, to form a firstantenna pattern and use the first antenna pattern to communicate withthe first device and to also form a second antenna pattern and use thesecond antenna pattern to communicate with the second device. A gain ofthe first antenna pattern in a direction associated with the firstdevice is greater than a gain of the first antenna pattern in adirection associated with the second device. Finally, a gain of thesecond antenna pattern in a direction associated with the second deviceis greater than a gain of the second antenna pattern in a directionassociated with the first device.

Moreover, in some of these base station embodiments, the plurality ofelements comprises a first plurality of vertically disposed elementsand/or a second plurality of horizontally disposed elements. Responsiveto said second orientation the system uses antenna patterndiscrimination between the first and second antenna patterns to reduceinterference between the communications of the first and second devices.Moreover, responsive to said first orientation the system uses elementdiscrimination between different elements of the signaling alphabet toreduce interference between the communications of the first and seconddevices.

In still other embodiments, the system is an access point that isconfigured to preferentially communicate with a first device and isfurther configured to preferentially use the second communications modeto communicate with the first device responsive to an identity of thefirst device even though said first device is within a service area of abase station and is capable of communicating with the base station. Theaccess point is further configured to deny service to a second deviceresponsive to an identity of the second device.

In some of these access point embodiments, the access point isconfigured to communicate with the first device by using only the secondcommunications mode. Moreover, the identity of the first device isspecified to the access point by accessing a web site and providing tothe web site an indication of the identity of the first device andwherein the web site is connected to the access point. Moreover, thesecond communications mode may be based upon the user defined key,wherein the user defined key is specified to the access point byaccessing a web site and providing to the web site said user defined keyand wherein the web site is connected to the access point. Finally, thesecond communications mode may be based upon the user defined key over afirst time interval and is based upon the network defined key over asecond time interval, and the access point is further configured tohand-over communications from communications that are based upon theuser defined key to communications that are based upon the networkdefined key and/or from communications that are based upon the networkdefined key to communications that are based upon the user defined key.

Methods of increased privacy wireless communication may also be providedaccording to other embodiments described herein. According to somemethod embodiments, a first communications mode and a secondcommunications mode comprising an increased level of privacy relative tothe first communications mode are configured. These methods alsocomprise using the second communications mode to communicate theinformation and refraining from using the first communications mode tocommunicate the information responsive to a privacy level of theinformation being at or above a threshold, and using the firstcommunications mode to communicate the information and refraining fromusing the second communications mode to communicate the informationresponsive to the privacy level of the information being below thethreshold.

In some of these method embodiments, the privacy level of theinformation is set by a device that is communicating the information, bya person who desires to communicate the information, responsive to avalue of time, responsive to a value of position, responsive tobiometric data, responsive to a distance over which the information isto be communicated and/or responsive to a signal strength. The increasedlevel of privacy of the second communications mode prevents anunintended receiver from detecting the information that is communicatedvia the second communications mode, and the unintended receiver iscapable of detecting the information if the information is communicatedvia the first communications mode.

In still other embodiments, these methods also include preferentiallyusing the second communications mode to communicate the information andrefraining from using the first communications mode to communicate theinformation responsive to a value of time, a value of position,biometric data, a distance over which the information is to becommunicated and/or a signal strength. Moreover, said communicatinginformation may be performed by a computer, transceiver, radioterminal,satellite, satellite gateway, airborne platform, base station, accesspoint and/or femtocell.

In some method embodiments, the first communications mode is based uponTDM/TDMA, CDM/CDMA, FDM/FDMA, OFDM/OFDMA, GSM, WiMAX and/or LTE andcomprises a first level of cyclostationarity. In these embodiments, thesecond communications mode comprises a signaling alphabet that ispseudo-randomly generated responsive to a key, statistical distributionand orthogonalization procedure. Moreover, the second communicationsmode comprises a second level of cyclostationarity that is less than thefirst level of cyclostationarity of the first communications mode.

In some of these method embodiments, the key is a user defined keyand/or a network defined key. The user defined key is determined by auser of a device that is involved in said communicating information, isunique to the user of the device and differs for different users ofdifferent devices. The network defined key is determined by an elementof a network which includes the device and/or provides communications tothe device. Moreover, the network defined key is commonly used by aplurality of users of a respective plurality of devices.

In some method embodiments, the device is a mobile device that isconfigured to communicate with a base station and with an access point.These mobile device methods can further comprise preferentiallycommunicating between the mobile device and the access point when themobile device is proximate to the access point and refraining fromcommunicating between the mobile device and the base station when themobile device is proximate to the access point even thought the mobiledevice is able to communicate with the base station when proximate tothe access point. The second communications mode is preferentially usedduring said preferentially communicating. The second communications modeis based upon the user defined key and is also based upon said signalingalphabet that is pseudo-randomly generated.

In some of these mobile device methods, the user defined key is uniqueto the mobile device, is used only for the communications of the mobiledevice and can be changed only by a user of the mobile device who isaware of an identification code, a user name and/or a password.Moreover, these mobile device methods may further comprise providing theuser defined key to the access point and/or to the base station byaccessing a web site and providing to the web site said user definedkey, and connecting the web site to the access point and/or to the basestation. These mobile device methods may also comprise basing the secondcommunications mode upon the user defined key over a first time intervaland basing the second communications mode upon the network defined keyover a second time interval, and configuring the mobile device tohand-over communications from communications that are based upon theuser defined key to communications that are based upon the networkdefined key and/or from communications that are based upon the networkdefined key to communications that are based upon the user defined key.These mobile device methods may further comprise preferentiallycommunicating between the mobile device and the access point usingfrequencies of an unlicensed and/or licensed band of frequencies. Thesemobile device methods may further comprise preferentially communicatingbetween the mobile device and the access point using optical bandfrequencies, ultra violet frequencies and/or infrared frequencies.

These mobile device methods may further comprise communicating betweenthe mobile device and the access point and/or base station using thesecond communications mode and the user defined key responsive to afirst orientation of the mobile device relative to another device thatis also communicating with the access point and/or base stationconcurrently and co-frequency with said mobile device, and communicatingbetween the mobile device and the access point and/or base station usingthe second communications mode and the network defined key responsive toa second orientation of the mobile device relative to said anotherdevice that is also communicating with the access point and/or basestation concurrently and co-frequency with said mobile device.

Other mobile device methods may also be used by a mobile device that isconfigured to communicate with a base station and with an access node.In these methods, the mobile device is configured to communicate withthe base station using the second communications mode, the networkdefined key and said signaling alphabet that is pseudo-randomlygenerated. The base station also uses said signaling alphabet tocommunicate with the mobile device and to also communicate with at leastone other device concurrently and co-frequency with the mobile device.These mobile device methods may further comprise using by the mobiledevice a first element of said signaling alphabet and refraining fromusing by the mobile device a second element of said signaling alphabetthat is being used by the at least one other device, responsive to afirst orientation of the mobile device relative to the at least oneother device. These methods may further comprise using by the mobiledevice the first element and the second element of said signalingalphabet while said first element and said second element are also beingused by the at least one other device responsive to a second orientationof the mobile device relative to the at least one other device.

In these mobile device methods, the mobile device may be furtherconfigured to communicate with the access point and/or base stationusing the second communications mode based upon the user defined key.These methods may further comprise providing to the access point and/orbase station the user defined key by accessing a web site and providingto the web site said user defined key, and connecting the web site tothe access point and/or to the base station.

Other mobile device methods may also comprise basing the secondcommunications mode upon the user defined key over a first time intervaland basing the second communications mode on the network defined keyover a second time interval, and configuring the mobile device tohand-over communications from communications that are based upon theuser defined key to communications that are based upon the networkdefined key and/or from communications that are based upon the networkdefined key to communications that are based upon the user defined key.

Yet other mobile device methods may comprise configuring the mobiledevice to communicate with the base station using the secondcommunications mode, the network defined key and said signaling alphabetthat is pseudo-randomly generated, responsive to a first orientationbetween the mobile device and another device, and configuring the mobiledevice to communicate with the base station using the secondcommunications mode, the user defined key and said signaling alphabetthat is pseudo-randomly generated, responsive to a second orientationbetween the mobile device and said another device. These methods mayalso comprise providing the user defined key providing the user definedkey to the access point and/or base station by accessing a web site andproviding to the web site said user defined key, and connecting the website to the access point and/or to the base station. These methods mayfurther comprise basing the second communications mode upon the userdefined key over a first time interval and basing the secondcommunications mode upon the network defined key over a second timeinterval, and configuring the mobile device to hand-over communicationsfrom communications that are based upon the user defined key tocommunications that are based upon the network defined key and/or fromcommunications that are based upon the network defined key tocommunications that are based upon the user defined key.

In other method embodiments, the device is a base station that isconfigured to communicate with a first transceiver and with a secondtransceiver concurrently and co-frequency. These base station methodsmay further comprise configuring the base station to communicate withthe first transceiver and with the second transceiver using the secondcommunications mode, the network defined key and said signaling alphabetthat is pseudo-randomly generated. These methods may further compriseconfiguring the base station to use a first element of the signalingalphabet to communicate with the first transceiver and to refrain fromusing a second element of the signaling alphabet to communicate with thefirst transceiver while said second element is being used by the basestation to communicate with the second transceiver, responsive to afirst orientation of the first transceiver relative to the secondtransceiver. These methods may also comprise configuring the basestation to use the first element and the second element of the signalingalphabet to communicate with said first transceiver while said firstelement and said second element are also being used by the base stationto communicate with said second transceiver, responsive to a secondorientation of the first transceiver relative to the second transceiver.

In some of these base station method embodiments, the second orientationbetween the first transceiver and the second transceiver allows anantenna of the base station, comprising a plurality of elements, to forma first antenna pattern and use the first antenna pattern to communicatewith the first transceiver and to also form a second antenna pattern anduse the second antenna pattern to communicate with the secondtransceiver. A gain of the first antenna pattern in a directionassociated with the first transceiver is greater than a gain of thefirst antenna pattern in a direction associated with the secondtransceiver. Moreover, a gain of the second antenna pattern in adirection associated with the second transceiver is greater than a gainof the second antenna pattern in a direction associated with the firsttransceiver.

In other of these base station method embodiments, the plurality ofelements comprises a first plurality of vertically disposed elementsand/or a second plurality of horizontally disposed elements. The methodsfurther comprise using antenna pattern discrimination between the firstand second antenna patterns to reduce interference between thecommunications of the first and second transceivers responsive to saidsecond orientation, and using element discrimination between differentelements of the signaling alphabet to reduce interference between thecommunications of the first and second transceivers responsive to saidfirst orientation.

Other base station method embodiments provide a base station that isconfigured to communicate with a first transceiver using the secondcommunications mode and to communicate with a second transceiver alsousing the second communications mode. These base station methods furthercomprise configuring the base station to communicate with the firsttransceiver and with the second transceiver concurrently andco-frequency, configuring the base station to communicate with the firsttransceiver and with the second transceiver using the network definedkey and said signaling alphabet that is pseudo-randomly generated,responsive to a first orientation between the first transceiver and thesecond transceiver, and configuring the base station to communicate withthe first transceiver using a first user defined key and a firstsignaling alphabet that is pseudo-randomly generated based upon thefirst user defined key and a statistical distribution and to communicatewith the second transceiver using a second user defined key and a secondsignaling alphabet that is pseudo-randomly generated based upon thesecond user defined key and a statistical distribution, responsive to asecond orientation between the first transceiver and the secondtransceiver.

In some of these other base station methods, the second orientationbetween the first transceiver and the second transceiver allows anantenna of the base station, comprising a plurality of elements, to forma first antenna pattern and use the first antenna pattern to communicatewith the first transceiver and to also form a second antenna pattern anduse the second antenna pattern to communicate with the secondtransceiver. A gain of the first antenna pattern in a directionassociated with the first transceiver is greater than a gain of thefirst antenna pattern in a direction associated with the secondtransceiver. Moreover, a gain of the second antenna pattern in adirection associated with the second transceiver is greater than a gainof the second antenna pattern in a direction associated with the firsttransceiver.

Moreover, in some of these base station communications embodiments, theplurality of elements comprises a first plurality of vertically disposedelements and/or a second plurality of horizontally disposed elements.These methods may further comprise using antenna pattern discriminationbetween the first and second antenna patterns to reduce interferencebetween the communications of the first and second transceiversresponsive to said second orientation, and using element discriminationbetween different elements of the signaling alphabet to reduceinterference between the communications of the first and secondtransceivers responsive to said first orientation.

In other method embodiments, the device is an access point, and thesemethods further comprise configuring the access point to preferentiallycommunicate with a first transceiver by preferentially using the secondcommunications mode, responsive to an identity of the first transceivereven though said first transceiver is within a service area of a basestation and is capable of communicating with the base station; andconfiguring the access point to deny service to a second transceiverresponsive to an identity of the second transceiver. These access pointmethods further comprise configuring the access point to communicatewith the first transceiver by using only the second communications mode.These access point methods further comprise specifying an indication ofthe identity of the first transceiver to the access point by accessing aweb site and providing to the web site the indication of the identity ofthe first transceiver, and connecting the web site to the access point.In some embodiments, the second communications mode is based upon theuser defined key, and these methods further comprise specifying the userdefined key to the access point by accessing a web site and providing tothe web site said user defined key, and connecting the web site to theaccess point.

Finally, these access point methods may further comprise basing thesecond communications mode upon the user defined key over a first timeinterval and basing the second communications mode upon the networkdefined key over a second time interval. These access point methods mayfurther comprise configuring the access point to hand-overcommunications from communications that are based upon the user definedkey to communications that are based upon the network defined key and/orfrom communications that are based upon the network defined key tocommunications that are based upon the user defined key.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic illustration of functions of a transmitteraccording to embodiments of the present invention.

FIG. 2 is a schematic illustration of further functions of a transmitteraccording to further embodiments of the present invention.

FIG. 3 is a schematic illustration of waveform generation according toadditional embodiments of the present invention.

FIG. 4 is a schematic illustration of further functions of a transmitteraccording to further embodiments of the present invention.

FIG. 5 is a schematic illustration of additional functions of atransmitter according to additional embodiments of the presentinvention.

FIG. 6 is a schematic illustration of functions of a receiver accordingto embodiments of the present invention.

FIG. 7 is a schematic illustration of further functions of a transmitteraccording to further embodiments of the present invention.

FIG. 8 is a schematic illustration of spectrum used by a transmitteraccording to embodiments of the present invention.

FIG. 9 is a schematic illustration of further functions of a receiveraccording to further embodiments of the present invention.

FIG. 10 is a schematic illustration of a communications system basedupon one or more transmitters and one or more receivers according tofurther embodiments of the present invention.

FIGS. 11 through 14 illustrate functions of a receiver according tofurther embodiments of the present invention.

FIG. 15 is a schematic illustration of further functions of atransmitter and receiver according to further embodiments of the presentinvention.

FIG. 16 is a flowchart of operations that may be performed according tosome embodiments of the present invention.

FIG. 17 is a block diagram of a XG-CSSC system transmitter architectureaccording to various embodiments of the present invention.

FIG. 18 is a block diagram of a XG-CS SC system receiver architectureaccording to various embodiments of the present invention.

FIGS. 19( a)-19(c) illustrate a power spectral density of a XG-CSSCwaveform (a) in an interference-free environment, (b) in interferenceavoidance mode illustrating a cognitive property, and (c) following asquare-law detector illustrating featureless (cyclostationary-free)nature, according to various embodiments.

FIG. 20 illustrates a power spectral density of a conventional QPSKwaveform and a cyclostationary feature thereof.

FIG. 21 illustrates a constellation of a XG-CSSC waveform according tovarious embodiments.

FIG. 22 illustrates a histogram of transmitted symbols of a XG-CSSCwaveform corresponding to the constellation of FIG. 21 according tovarious embodiments of the invention.

FIG. 23 graphically illustrates BER vs. E_(s)/N₀ for 16-ary XG-CS SC and16-QAM spread spectrum according to various embodiments of theinvention.

FIG. 24 graphically illustrates BER vs. E_(s)/N₀ for 16-ary XG-CSSC and16-QAM Spread Spectrum subject to Co-Channel (“CC”) interferenceaccording to various embodiments of the invention. The CC interferenceconsidered is of two types: Wide-Band (“WB”) spanning the entire desiredsignal spectrum, and Band-Pass (“BP”) spanning only 20% of the desiredsignal spectrum. Interference and desired signal are assumed to haveidentical power.

FIG. 25 graphically illustrates BER vs. E_(s)/N₀ for 16-ary XG-CSSC and16-QAM Spread Spectrum subject to Band-Pass (“BP”) Co-Channelinterference according to various embodiments of the invention. The BPinterference spans 20% of the desired signal spectrum. The term“Adaptive XG-CSSC” in the legend refers to the cognitive feature ofXG-CSSC in sensing and avoiding the interference. Interference anddesired signal are assumed to have identical power.

FIG. 26 is a block diagram of systems and/or methods of increasedprivacy wireless communications according to various embodiments of thepresent invention.

FIG. 27 is a block diagram of additional systems and/or methods ofincreased privacy wireless communications according to variousembodiments of the present invention.

DESCRIPTION OF EMBODIMENTS ACCORDING TO THE INVENTION

Specific exemplary embodiments of the invention now will be describedwith reference to the accompanying drawings. This invention may,however, be embodied in many different forms and should not be construedas limited to the embodiments set forth herein. Rather, theseembodiments are provided so that this disclosure will be thorough andcomplete, and will fully convey the scope of the invention to thoseskilled in the art. It will be understood that two or more embodimentsof the present invention as presented herein may be combined in whole orin part to form one or more additional embodiments.

It will be understood that when an element is referred to as being“connected” or “coupled” to another element, it can be directlyconnected or coupled to the other element or intervening elements may bepresent. Furthermore, “connected” or “coupled” as used herein mayinclude wirelessly connected or coupled.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless expressly stated otherwise. Itwill be further understood that the terms “includes,” “comprises,”“including” and/or “comprising,” when used in this specification,specify the presence of stated features, integers, steps, operations,elements, and/or components, but do not preclude the presence oraddition of one or more other features, integers, steps, operations,elements, components, and/or groups thereof.

Unless otherwise defined, all terms (including technical and scientificterms) used herein have the same meaning as commonly understood by oneof ordinary skill in the art to which this invention belongs. It will befurther understood that terms, such as those defined in commonly useddictionaries, should be interpreted as having a meaning that isconsistent with their meaning in the context of the relevant art and thepresent disclosure, and will not be interpreted in an idealized oroverly formal sense unless expressly so defined herein.

It will be understood that although terms such as first and second areused herein to describe various elements, these elements should not belimited by these terms. These terms are only used to distinguish oneelement from another element. Thus, a first element below could betermed a second element, and similarly, a second element may be termed afirst element without departing from the teachings of the presentinvention. As used herein, the term “and/or” includes any and allcombinations of one or more of the associated listed items. The symbol“/” is also used as a shorthand notation for “and/or”.

Moreover, as used herein the term “substantially the same” means thattwo or more entities that are being compared have commonfeatures/characteristics (e.g., are based upon a common kernel) but maynot be identical. For example, substantially the same bands offrequencies, means that two or more bands of frequencies being comparedsubstantially overlap, but that there may be some areas of non-overlap,for example at a band end. As another example, substantially the sameair interfaces means that two or more air interfaces being compared aresimilar but need not be identical. Some differences may exist in one airinterface (e.g., a satellite air interface) relative to another (e.g., aterrestrial air interface) to account for one or more differentcharacteristics that may exist between the terrestrial and satellitecommunications environments. For example, a different vocoder rate maybe used for satellite communications compared to the vocoder rate thatmay be used for terrestrial communications (i.e., for terrestrialcommunications, voice may be compressed (“vocoded”) to approximately 9to 13 kbps, whereas for satellite communications a vocoder rate ofapproximately 2 to 4 kbps, for example, may be used); a differentforward error correction coding, different interleaving depth, and/ordifferent spread-spectrum codes may also be used, for example, forsatellite communications compared to the coding, interleaving depth,and/or spread spectrum codes (i.e., Walsh codes, long codes, and/orfrequency hopping codes) that may be used for terrestrialcommunications.

The term “truncated” as used herein to describe a statisticaldistribution means that a random variable associated with thestatistical distribution is precluded from taking-on values over one ormore ranges. For example, a Normal/Gaussian distribution that is nottruncated, allows an associated random variable to take-on valuesranging from negative infinity to positive infinity with a frequency(i.e., a probability) as determined by the Normal/Gaussian probabilitydensity function. In contrast, a truncated Normal/Gaussian distributionmay allow an associated random variable to take-on values ranging from,for example, V₁ to V₂ (−∞<V₁, V₂<∞) in accordance with a Normal/Gaussiandistribution, and preclude the random variable from taking-on valuesoutside the range from V₁ to V₂. Furthermore, a truncated distributionmay allow an associated random variable to take-on values over aplurality of ranges (that may be a plurality of non-contiguous ranges)and preclude the random variable from taking-on values outside of theplurality of ranges.

As used herein, the term “transmitter” and/or “receiver” include(s)transmitters/receivers of cellular and/or satellite terminals with orwithout a multi-line display; Personal Communications System (PCS)terminals that may include data processing, facsimile and/or datacommunications capabilities; Personal Digital Assistants (PDA) that caninclude a radio frequency transceiver and/or a pager, Internet/Intranetaccess, Web browser, organizer, calendar and/or a Global PositioningSystem (GPS) receiver; and/or conventional laptop and/or palmtopcomputers or other appliances, which include a radio frequencytransceiver. As used herein, the term “transmitter” and/or “receiver”also include(s) any other radiating device, equipment and/or source thatmay have time-varying and/or fixed geographic coordinates and/or may beportable, transportable, installed in a vehicle (aeronautical, maritime,or land-based) and/or situated/configured to operate locally and/or in adistributed fashion at any location(s) on earth, vehicles (land-mobile,maritime and/or aeronautical) and/or in space. A transmitter and/orreceiver also may be referred to herein as a “terminal”. As used herein,the term “space-based” component and/or “space-based” system include(s)one or more satellites and/or one or more other objects and/or platforms(such as airplanes, balloons, unmanned vehicles, space crafts, missiles,etc.) that have a trajectory above the earth at any altitude.

Some embodiments of the present invention may arise from recognitionthat it may be desirable to communicate information based upon awaveform that is substantially devoid of a cyclostationary property. Asused herein to describe a waveform, the term “cyclostationary” meansthat the waveform comprises at least one signature/pattern that may be arepeating signature/pattern. Examples of a repeating signature/patternare a bit rate, a symbol rate, a chipping rate and/or a pulse shape(e.g., a Nyquist pulse shape) that may be associated with abit/symbol/chip. For example, each of the well known terrestrialcellular air interfaces of GSM and CDMA (cdma2000 or W-CDMA) comprises abit rate, a symbol rate, a chipping rate and/or a predetermined andinvariant pulse shape that is associated with the bit/symbol/chip and,therefore, comprise a cyclostationary property/signature. In contrast, awaveform that represents a random (or pseudo-random) noise process doesnot comprise a bit rate, a symbol rate, a chipping rate and/or apredetermined and invariant pulse shape and is, therefore, substantiallydevoid of a cyclostationary property/signature. According to someembodiments of the present invention, non-cyclostationary waveforms maybe used, particularly in those situations where LPI, LPD, LPE, private,secure and/or minimum interference communications are desirable.

Conventional communications systems use waveforms that are substantiallycyclostationary. This is primarily due to a methodology of transmittinginformation wherein a unit of information (i.e., a specific bit sequencecomprising one or more bits) is mapped into (i.e., is associated with) aspecific waveform shape (i.e., a pulse) and the pulse is transmitted bya transmitter in order to convey to a receiver the unit of information.Since there is typically a need to transmit a plurality of units ofinformation in succession, a corresponding plurality of pulses aretransmitted in succession. Any two pulses of the plurality of pulses maydiffer therebetween in sign, phase and/or magnitude, but a waveformshape that is associated with any one pulse of the plurality of pulsesremains substantially invariant from pulse to pulse and a rate of pulsetransmission also remains substantially invariant (at least over a timeinterval). The methodology of transmitting (digital) information asdescribed above has its origins in, and is motivated by, the way Morsecode evolved and was used to transmit information. Furthermore, themethodology yields relatively simple transmitter/receiverimplementations and has thus been adopted widely by many communicationssystems. However, the methodology suffers from generatingcyclostationary features/signatures that are undesirable if LPE/LPI/LPDand/or minimum interference communications are desirable. Embodiments ofthe present invention arise from recognition that communications systemsmay be based on a different methodology that is substantially devoid oftransmitting a modulated carrier, a sequence of substantially invariantpulse shapes and/or a chipping rate and that even spread-spectrumcommunications systems may be configured to transmit/receivespread-spectrum information using waveforms that are devoid of achipping rate.

A publication by W. A. Gardner, entitled “Signal Interception: AUnifying Theoretical Framework for Feature Detection,” IEEE Transactionson Communications, Vol. 36, No. 8, August 1988, notes in the Abstractthereof that the unifying framework of the spectral correlation theoryof cyclostationary signals is used to present a broad treatment of weakrandom signal detection for interception purposes. The relationshipsamong a variety of previously proposed ad hoc detectors, optimumdetectors, and newly proposed detectors are established. Thespectral-correlation-plane approach to the interception problem is putforth as especially promising for detection, classification, andestimation in particularly difficult environments involving unknown andchanging noise levels and interference activity. A fundamental drawbackof the popular radiometric methods in such environments is explained.According to some embodiments of the invention, it may be desirable tobe able to communicate information using waveforms that do notsubstantially include a cyclostationary feature/signature in order tofurther reduce the probability of intercept/detection/exploitation of acommunications system/waveform that is intended for LPI/LPD/LPEcommunications.

There are at least two potential advantages associated with signaldetection, identification, interception and/or exploitation based oncyclic spectral analysis compared with the energy detection(radiometric) method: (1) A cyclic signal feature (i.e., chip rateand/or symbol rate) may be discretely distributed even if a signal hascontinuous distribution in a power spectrum. This implies that signalsthat may have overlapping and/or interfering features in a powerspectrum may have a non-overlapping and distinguishable feature in termsof a cyclic characteristic. (2) A cyclic signal feature associated witha signal's cyclostationary property, may be identified via a “cyclicperiodogram.” The cyclic periodogram of a signal is a quantity that maybe evaluated from time-domain samples of the signal, a frequency-domainmapping such as, for example, a Fast Fourier Transform (FFT), and/ordiscrete autocorrelation operations. Since very large point FFTs and/orautocorrelation operations may be implemented using Very Large ScaleIntegration (VLSI) technologies, Digital Signal Processors (DSPs) and/orother modern technologies, a receiver of an interceptor may beconfigured to perform signal Detection, Identification, Interceptionand/or Exploitation (D/I/I/E) based on cyclic feature detectionprocessing.

Given the potential limitation(s) of the radiometric approach and thepotential advantage(s) of cyclic feature detection technique(s) it isreasonable to expect that a sophisticated interceptor may be equippedwith a receiver based on cyclic feature detection processing. It is,therefore, of potential interest and potential importance to developcommunications systems capable of communicating information devoid ofcyclostationary properties/signatures to thereby render cyclic featuredetection processing by an interceptor substantially ineffective.

FIG. 1 illustrates embodiments of generating a communications alphabetcomprising M distinct pseudo-random, non-cyclostationary, orthogonaland/or orthonormal waveforms. As illustrated in FIG. 1, responsive to a“key” input (such as, for example, a TRANsmissions SECurity (TRANSEC)key input, a COMMunications SECurity (COMMSEC) key input and/or anyother key input), a Pseudo-Random Waveform Generator (PRWG) may be usedto generate a set of M distinct pseudo-random waveforms, which may,according to some embodiments of the invention, represent M ensembleelements of a Gaussian-distributed random (or pseudo-random) process.The M distinct pseudo-random waveforms (i.e., the M ensemble elements)may be denoted as {S(t)}={S₁(t), S₂(t), . . . , S_(M)(t)}; 0≦t≦τ. Theset of waveforms {S(t)} may be a band-limited set of waveforms having aone-sided bandwidth less than or equal to B Hz. As such, a number ofdistinct orthogonal and/or orthonormal waveforms that may be generatedfrom the set {S(t)} may, in accordance with established Theorems, beupper-bounded by CτB, where C≧2 (see, for example, P. M. Dollard, “Onthe time-bandwidth concentration of signal functions forming givengeometric vector configurations,” IEEE Transactions on InformationTheory, IT-10, pp. 328-338, October 1964; also see H. J. Landau and H.O. Pollak, “Prolate spheroidal wave functions, Fourier analysis anduncertainty—III: The dimension of the space of essentially time-andband-limited signals,” Bell System Technical Journal, 41, pp. 1295-1336,July 1962). It will be understood that in some embodiments of thepresent invention, the key input may not be used and/or may not exist.In such embodiments, one or more Time-of-Day (TOD) values may be usedinstead of the key input. In other embodiments, a key input and one ormore TOD values may be used. In still other embodiments, yet othervalues may be used.

In accordance with some embodiments of the present invention, the j^(th)element of the set of waveforms {S(t)}, S_(j)(t); j=1, 2, . . . , M; maybe generated by a respective j^(th) PRWG in response to a respectivej^(th) key input and/or TOD value, as illustrated in FIG. 2. In someembodiments according to FIG. 2, each of the PRWG is the same PRWG andeach key differs relative to each other key. In other embodiments, eachkey is the same key and each PRWG differs relative to each other PRWG.In further embodiments of FIG. 2, each key differs relative to eachother key and each PRWG also differs relative to each other PRWG. Othercombinations and sub-combinations of these embodiments may be provided.In still other embodiments, a single PRWG and a single key may be usedto generate a “long” waveform S_(L)(t) which may be segmented into Moverlapping and/or non-overlapping components to form a set of waveforms{S(t)}, as illustrated in FIG. 3. Note that any τ-sec. segment ofS_(L)(t) may be used to define S₁(t). Similarly, any τ-sec. segment ofS_(L)(t) may be used to define S₂(t), with possibly the exception of thesegment used-to define S₁(t), etc. The choices may be predeterminedand/or based on a key input.

In some embodiments of the invention, a new set of waveforms {S(t)} maybe formed periodically, non-periodically, periodically over a first timeinterval and non-periodically over a second time interval and/orperiodically but with a jitter imposed on a periodicity interval,responsive one or more TOD values that may, for example, be derived fromprocessing of Global Positioning System (GPS) signals, and/or responsiveto a transmission of a measure of at least one of the elements of{S(t)}. In some embodiments, a processor may be operatively configuredas a background operation, generating new sets of waveforms {S(t)}, andstoring the new sets of waveforms {S(t)} in memory to be accessed andused as needed. In further embodiments, a used set of waveforms {S(t)}may be discarded and not used again, whereas in other embodiments, aused set of waveforms {S(t)} may be placed in memory to be used again ata later time. In some embodiments, some sets of waveforms {S(t)} areused once and then discarded, other sets of waveforms {S(t)} are notused at all, and still other sets of waveforms {S(t)} are used more thanonce. Finally, in some embodiments, the waveform duration τ and/or thewaveform bandwidth B may vary between different sets of waveforms,transmission intervals and/or elements of a given set of waveforms.

Still referring to FIG. 1, the set of substantially continuous-timewaveforms {S(t)}={S₁(t), S₂(t), . . . , S_(M)(t)}; 0≦t≦τ; may, accordingto some embodiments of the present invention, be transformed from asubstantially continuous-time representation to a substantiallydiscrete-time representation using, for example, one or moreAnalog-to-Digital (A/D) converters and/or one or more Sample-and-Hold(S/H) circuits, to generate a corresponding substantially discrete-timeset of waveforms {S(nT)}={S₁(nT), S₂(nT), . . . , S_(M)(nT)}; n=1, 2, .. . , N; nT≦τ. A Gram-Schmidt orthogonalizer and/or orthonormalizerand/or any other orthogonalizer and/or orthonormalizer, may then beused, as illustrated in FIG. 1, to generate a set of waveforms{U(nT)}={U₁(nT), U₂(nT), . . . , U_(M)(nT)}; n=1, 2, . . . , N; nT≦τthat are orthogonal and/or orthonormal therebetween. The GSO and/orother orthogonalization and/or orthonormalization procedure(s) are knownto those skilled in the art and need not be described further herein(see, for example, Simon Haykin, “Adaptive Filter Theory,” at 173, 301,497; 1986 by Prentice-Hall; and Bernard Widrow and Samuel D. Stearns“Adaptive Signal Processing,” at 183; 1985 by Prentice-Hall, Inc.).

It will be understood that the sampling interval T may be chosen inaccordance with Nyquist sampling theory to thereby preserve by thediscrete-time waveforms {S(nT)} all, or substantially all, of theinformation contained in the continuous-time waveforms {S(t)}. It willalso be understood that, in some embodiments of the invention, thesampling interval T may be allowed to vary over the waveform duration τ,between different waveforms of a given set of waveforms and/or betweendifferent sets of waveforms. Furthermore, the waveform duration τ may beallowed to vary, in some embodiments, between different waveforms of agiven set of waveforms and/or between different sets of waveforms. Insome embodiments of the present invention, {S(nT)}={S₁(nT), S₂(nT), . .. , S_(M)(nT)}; n=1, 2, . . . , N; nT≦τ may be generated directly in adiscrete-time domain by configuring one or more Pseudo-Random NumberGenerators (PRNG) to generate S_(j)(nT); n=1, 2, . . . , N; nT≦τ foreach value of j (j=1, 2, . . . , M). The one or more PRNG may beconfigured to generate S_(j)(nT); n=1, 2, . . . , N; j=1, 2, . . . , M,based upon at least one statistical distribution. In some embodimentsaccording to the present invention, the at least one statisticaldistribution comprises a Normal/Gaussian, Bernoulli, Geometric,Pascal/Negative Binomial, Exponential, Erlang, Weibull, Chi-Squared, F,Student's t, Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta,Laplace, Cauchy, Rayleigh, Maxwell and/or any other distribution. Infurther embodiments, the at least one statistical distribution istruncated. In still further embodiments, the at least one statisticaldistribution depends upon a value of the index j and/or n (i.e., the atleast one statistical distribution is a function of (j, n)).

In still further embodiments of the present invention, {S(nT)} may begenerated by configuring one or more PRNG to generate real, imaginaryand/or complex values that are then subjected to a linear and/ornon-linear transformation to generate S_(j)(nT); n=1, 2, . . . , N; j=1,2, . . . , M. In some embodiments of the present invention, thetransformation comprises a Fourier transformation. In furtherembodiments, the transformation comprises an inverse Fouriertransformation. In still further embodiments, the transformationcomprises an Inverse Fast Fourier Transformation (IFFT). The real,imaginary and/or complex values may be based upon at least onestatistical distribution. The at least one statistical distribution maycomprise a Normal/Gaussian, Bernoulli, Geometric, Pascal/NegativeBinomial, Exponential, Erlang, Weibull, Chi-Squared, F, Student's t,Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy,Rayleigh, Maxwell and/or any other distribution and the at least onestatistical distribution may be truncated. In still further embodiments,the at least one statistical distribution depends upon a value of theindex j and/or n (i.e., the at least one statistical distribution is afunction of (j, n)).

The set {U(nT)}={U₁(nT), U₂(nT), . . . , U_(M)(nT)}; n=1, 2, . . . , N;NT≦τ, may be used, in some embodiments of the present invention, todefine an M-ary pseudo-random and non-cyclostationary alphabet. Asillustrated in FIG. 4, an information symbol I_(k), occurring at adiscrete time k (for example, at t=kτ or, more generally, if thediscrete time epochs/intervals are variable, at t=τ_(k)), and having oneof M possible information values, {I₁, I₂, . . . , I_(M)}, may be mappedonto one of the M waveforms of the alphabet {U₁(nT), U₂(nT), . . . ,U_(M)(nT)}; n=1, 2, . . . , N; NT≦τ. For example, in some embodiments,if I_(k)=I₂, then during the k^(th) signaling interval the waveformU₂(nT) may be transmitted; n=1, 2, . . . , N; NT≦τ. It will beunderstood that transmitting the waveform U₂(nT) comprises transmittingsubstantially all of the elements (samples) of the waveform U₂(nT)wherein substantially all of the elements (samples) of the waveformU₂(nT) means transmitting U₂(T), U₂(2T), . . . , and U₂(NT).Furthermore, it will be understood that any unambiguous mapping betweenthe M possible information values of I_(k) and the M distinct waveformsof the M-ary alphabet, {U₁(nT), U₂(nT), . . . , U_(M)(nT)}, may be usedto communicate information to a receiver (destination) provided that thereceiver also has knowledge of the mapping. It will also be appreciatedthat the ordering or indexing of the alphabet elements and theunambiguous mapping between the M possible information values of I_(k)and the M distinct waveforms of the M-ary alphabet may be arbitrary, aslong as both transmitter (source) and receiver (destination) haveknowledge of the ordering and mapping.

In some embodiments of the invention, the information symbol I_(k), maybe constrained to only two possible values (binary system). In suchembodiments of the invention, the M-ary alphabet may be a binary (M=2)alphabet comprising only two elements, such as, for example, {U₁(nT),U₂(nT)}. In other embodiments of the invention, while an informationsymbol, I_(k), is allowed to take on one of M distinct values (M≧2) thealphabet comprises more than M distinct waveforms, that may, accordingto embodiments of the invention be orthogonal/orthonormal waveforms,{U₁(nT), U₂(nT), . . . , U_(L)(nT)}; L>M, to thereby increase a distancebetween a set of M alphabet elements that are chosen and used tocommunicate information and thus allow an improvement of acommunications performance measure such as, for example, an error rate,a propagations distance and/or a transmitted power level. It will beunderstood that in some embodiments, the number of distinct values thatmay be made available to an information symbol to thereby allow theinformation symbol to communicate one or more bits of information, maybe reduced or increased responsive to a channel state such as, forexample an attenuation, a propagation distance and/or an interferencelevel. In further embodiments, a number of distinct elements comprisingan alphabet may also change responsive to a channel state. In someembodiments, as a number of information symbol states (values) decreasesa number of distinct elements comprising an alphabet increases, tothereby provide further communications benefit(s) such as, for example,a lower bit error rate, a longer propagation distance, reducedtransmitted power, etc.

It will be understood that at least some conventional transmitterfunctions comprising, for example, Forward Error Correction (FEC)encoding, interleaving, data repetition, filtering, amplification,modulation, frequency translation, scrambling, frequency hopping, etc.,although not shown in FIGS. 1 through 4, may also be used in someembodiments of the present invention to configure an overall transmitterchain. At least some of these conventional transmitter functions may beused, in some embodiments, in combination with at least some of thesignal processing functions of FIG. 1 through FIG. 4, to specify anoverall transmitter signal processing chain. For example, an informationbit sequence may be FEC encoded using, for example, a convolutionalencoder, interleaved and/or bit-to-symbol converted to define a sequenceof information symbols, {I_(k)}. The sequence of information symbols,{I_(k)}, may then be mapped onto a waveform sequence {U_(k)}, asillustrated in FIG. 4. At least some, and in some embodiments all, ofthe elements of the waveform sequence {U_(k)} may then be repeated, atleast once, to increase a redundancy measure, interleaved, filtered,frequency translated, amplified and/or frequency-hopped, for example,(not necessarily in that order) prior to being radiated by an antenna ofthe transmitter. An exemplary embodiment of a transmitter comprisingconventional signal functions in combination with at least some of thesignal processing functions of FIG. 1 through FIG. 4 is illustrated inFIG. 5.

A receiver (destination) that is configured to receive communicationsinformation from a transmitter (source) comprising functions of FIG. 1through FIG. 4, may be equipped with sufficient information to generatea matched filter bank responsive to the M-ary alphabet {U₁(nT), U₂(nT),. . . , U_(M)(nT)} of FIG. 4. Such a receiver may be substantiallysynchronized with one or more transmitters using, for example,GPS-derived timing information. Substantial relative synchronism betweena receiver and at least one transmitter may be necessary to reliablygenerate/update at the receiver the M-ary alphabet functions {U₁(nT),U₂(nT), . . . , U_(M)(nT)} and/or the matched filter bank to therebyprovide the receiver with substantial optimum reception capability.

In some embodiments of the invention, all transmitters and receivers aresubstantially synchronized using GPS-derived timing information. It willbe understood that a receiver may be provided with the appropriate keysequence(s) and the appropriate signal processing algorithms to therebyresponsively form and/or update the M-ary alphabet functions and/or thematched filter bank. It will also be understood that a receiver may alsobe configured with an inverse of conventional transmitter functions thatmay be used by a transmitter. For example, if, in some embodiments, atransmitter is configured with scrambling, interleaving of data andfrequency hopping, then a receiver may be configured with the inverseoperations of de-scrambling, de-interleaving of data and frequencyde-hopping. An exemplary embodiment of a receiver, which may correspondto the exemplary transmitter embodiment of FIG. 5, is illustrated inFIG. 6.

FIG. 7 illustrates elements of a communications transmitter according tofurther embodiments of the invention. As shown in FIG. 7, followingconventional operations of Forward Error Correction (FEC) encoding, bitinterleaving and bit-to-symbol conversion (performed on an input bitsequence {b} to thereby form an information symbol sequence {I_(k)}),the information symbol sequence {I_(k)} is mapped onto anon-cyclostationary waveform sequence {U_(k)(nT)} using a first M-arynon-cyclostationary orthonormal alphabet (Alphabet 1). An element of{U_(k)(nT)} may then be repeated (at least once), as illustrated in FIG.7, using a second M-ary non-cyclostationary orthonormal alphabet(Alphabet 2), interleaved, transformed to a continuous-time domainrepresentation, filtered, amplified (not necessarily in that order) andtransmitted. The repeat of an element of {U_(k)(nT)} may be performedusing a different alphabet (Alphabet 2) in order to reduce or eliminatea cyclostationary feature/signature in the transmitted waveform. For atleast the same reason, the at least two alphabets of FIG. 7 may bereplaced by new alphabets following the transmission of a predeterminednumber of waveform symbols. In some embodiments, the predeterminednumber of waveform symbols is one. As stated earlier, a large reservoirof alphabets may be available and new alphabet choices may be madefollowing the transmission of the predetermined number of waveformsymbols and/or at predetermined TOD values.

According to some embodiments of the invention, the M-arynon-cyclostationary orthonormal alphabet waveforms may be broadbandwaveforms as illustrated in FIG. 8. FIG. 8 illustrates a power spectraldensity of a broadband waveform defining the M-ary non-cyclostationaryorthonormal alphabet (such as, for example, waveform S_(L)(t) of FIG.3), over frequencies of, for example, an L-band (e.g., from about 1525MHz to about 1660.5 MHz). However, FIG. 8 is for illustrative purposesonly and the power spectral density of S_(L)(t) and/or any other set ofwaveforms used to define the M-ary non-cyclostationary orthonormalalphabet may be chosen to exist over any other frequency range and/orinterval(s). In some embodiments, different alphabets may be definedover different frequency ranges/intervals (this feature may provideintrinsic frequency hopping capability). As is further illustrated inFIG. 8 (second trace), certain frequency intervals that warrantprotection (or additional protection) from interference, such as, forexample, a GPS frequency interval, may be substantially excluded fromproviding frequency content for the generation of the M-arynon-cyclostationary orthonormal alphabets. It will be appreciated thatthe transmitter embodiment of FIG. 7 illustrates a “direct synthesis”transmitter in that the transmitter directly synthesizes a waveform thatis to be transmitted, without resorting to up-conversion, frequencytranslation and/or carrier modulation functions. This aspect may furtherenhance the LPI/LPD/LPE feature(s) of a communications system.

In embodiments of the invention where a bandwidth of a signal to betransmitted by a transmitter (such as the transmitter illustrated inFIG. 7) exceeds a bandwidth limit associated with an antenna and/orother element of the transmitter, the signal may bedecomposed/segmented/divided into a plurality of components, eachcomponent of the plurality of components having a bandwidth that issmaller than the bandwidth of the signal. Accordingly, a transmitter maybe configured with a corresponding plurality of antennas and/or acorresponding plurality of other elements to transmit the plurality ofcomponents. Analogous operations for reception may be included in areceiver.

In some embodiments of the invention, a receiver (destination) that isconfigured to receive communications information from a transmitter(source) comprising the functionality of FIG. 7, may be provided withsufficient information to generate a matched filter bank correspondingto the transmitter waveform set of the M-ary alphabet {U₁(nT), U₂(nT), .. . , U_(M)(nT)}. Such a receiver may be substantially synchronized withthe transmitter using GPS-derived timing information (i.e., TOD). FIG. 9illustrates elements of such a receiver, according to exemplaryembodiments of the present invention. As illustrated in FIG. 9,following front-end filtering, amplification and Analog-to-Digital (A/D)and/or discrete-time conversion of a received waveform, a matched-filterbank, comprising matched filters reflecting the TOD-dependent waveformalphabets used by the transmitter, is used for detection of information.The receiver may have information regarding what waveform alphabet thetransmitter may have used as a function of TOD. As such, the receiver,operating in substantial TOD synchronism with the transmitter, may knowto configure the matched-filter bank with the appropriate(TOD-dependent) matched filter components to thereby achieve optimum ornear optimum signal detection. Following matched-filter detection,symbol de-interleaving and symbol repeat combination, soft decisions ofa received symbol sequence may be made, followed by bit de-interleavingand bit decoding, to thereby generate an estimate of a transmittedinformation bit sequence.

In accordance with some embodiments of the invention, a receiverarchitecture, such as, for example, the receiver architectureillustrated in FIG. 9, may further configure a matched filter bank toinclude a “rake” matched filter architecture, to thereby resolvemultipath components and increase or maximize a desired received signalenergy subject to multipath fading channels. Owing to the broadbandnature of the communications alphabets, in accordance with someembodiments of the invention, a significant number of multipathcomponents may be resolvable. Rake matched filter architectures areknown to those skilled in the art and need not be described furtherherein (see, for example, John G. Proakis, “Digital Communications,”McGraw-Hill, 1983, section 7.5 starting at 479; also see R. Price and P.E. Green Jr. “A Communication Technique for Multipath Channels,” Proc.IRE, Vol. 46, pp. 555-570, March 1958).

FIG. 10 illustrates an operational scenario relating to a communicationssystem that may be a covert communications system, in accordance withsome embodiments of the present invention, wherein air-to-ground,air-to-air, air-to-satellite and/or satellite-to-ground communicationsmay be conducted. Ground-to-ground communications (not illustrated inFIG. 10) may also be conducted. Modes of communications may be, forexample, point-to-point and/or point-to-multipoint. A network topologythat is predetermined and/or configured in an ad hoc fashion, inaccordance with principles known to those skilled in the art, may beused to establish communications in accordance with any of theembodiments of the invention and/or combinations (or sub-combinations)thereof.

FIGS. 11 through 14 illustrate elements relating to a matched filterand/or a matched filter bank in accordance with exemplary embodiments ofthe invention, as will be appreciated by those skilled in the art. FIG.15 further illustrates elements of a transmitter/receiver combination inaccordance with further embodiments of the invention. The design andoperation of blocks that are illustrated in the block diagrams hereinand not described in detail are well known to those having skill in theart.

Embodiments of the present invention have been described above in termsof systems, methods, devices and/or computer program products thatprovide communications devoid of cyclostationary features. However,other embodiments of the present invention may selectively provide thesecommunications devoid of cyclostationary features. For example, as shownin FIG. 16, if LPI/LPD/LPE and/or minimum interference communicationsare desired, then non-cyclostationary waveforms may be transmitted.However, when LPI/LPD/LPE and/or minimum interference communicationsneed not be transmitted, cyclostationary waveforms may be used. Anindicator may be provided to allow a receiver/transmitter to determinewhether cyclostationary or non-cyclostationary waveforms are beingtransmitted or need to be transmitted. Accordingly, a given system,method, device and/or computer program can operate in one of two modes,depending upon whether LPI/LPD/LPE and/or minimum interferencecommunications are desired, and/or based on other parameters and/orproperties of the communications environment.

In still further embodiments of the present invention, a transmitter maybe configured to selectively radiate a pseudo-random noise waveform thatmay be substantially devoid of information and is distributed inaccordance with at least one statistical distribution such as, forexample, Normal/Gaussian, Bernoulli, Geometric, Pascal/NegativeBinomial, Exponential, Erlang, Weibull, Chi-Squared, F, Student's t,Rise, Pareto, Poisson, Binomial, Uniform, Gamma, Beta, Laplace, Cauchy,Rayleigh, Maxwell and/or any other distribution. The at least onestatistical distribution may be truncated and the pseudo-random noisewaveform may occupy a bandwidth that is substantially the same as abandwidth occupied by a communications waveform. The transmitter may beconfigured to selectively radiate the pseudo-random noise waveformduring periods of time during which no communications information isbeing transmitted. This may be used, in some embodiments, to create asubstantially constant/invariant ambient/background noise floor, that issubstantially independent of whether or not communications informationis being transmitted, to thereby further mask an onset of communicationsinformation transmission.

It will be understood by those skilled in the art that thecommunications systems, waveforms, methods, computer program productsand/or principles described herein may also find applications inenvironments wherein covertness may not be a primary concern.Communications systems, waveforms, methods, computer program productsand/or principles described herein may, for example, be used to provideshort-range wireless communications (that may, in accordance with someembodiments, be broadband short-range wireless communications) in, forexample, a home, office, conference and/or business environment whilereducing and/or minimizing a level of interference to one or more othercommunications services and/or systems that may be using the same,substantially the same and/or near-by frequencies as the short-rangecommunications system.

Other applications of the communications systems, waveforms, methods,computer program products and/or principles described herein will alsooccur to those skilled in the art, including, for example, radarapplications and/or cellular telecommunications applications.

In a cellular telecommunications application, for example, a cellulartelecommunications system, in accordance with communications waveformprinciples described herein, may be configured, for example, as anoverlay to one or more conventional cellular/PCS systems and/or one ormore other systems, using the frequencies of one or more licensed and/orunlicensed bands (that may also be used by the one or more conventionalcellular/PCS systems and/or the one or more other systems) tocommunicate with user equipment using broadband and/or Ultra Wide-Band(UWB) waveforms. The broadband and/or UWB waveforms may benon-cyclostationary and Gaussian-distributed, for example, in accordancewith the teachings of the present invention, to thereby reduce and/orminimize a level of interference to the one or more conventionalcellular/PCS systems and/or to the one or more other systems by theoverlay cellular telecommunications system and thereby allow the overlaycellular telecommunications system to reuse the available spectrum(which is also used by the one or more conventional cellular/PCS systemsand/or the one or more other systems) to provide communications servicesto users.

According to some embodiments of the present invention, a cellulartelecommunications system that is configured to communicate with userdevices using communications waveforms in accordance with thetransmitter, receiver and/or waveform principles described herein, is anoverlay to one or more conventional cellular/PCS systems and/or to oneor more other systems and is using the frequencies of one or morelicensed and/or unlicensed bands (also being used by the one or moreconventional cellular/PCS systems and/or the one or more other systems).The cellular telecommunications system may be further configured toprovide communications preferentially using frequencies of the one ormore licensed and/or unlicensed bands that are locally not usedsubstantially and/or are locally used substantially as guardbands and/ortransition bands by the one or more conventional cellular/PCS systemsand/or the one or more other systems, to thereby further reduce a levelof interference between the cellular telecommunications system and theone or more conventional cellular/PCS systems and/or the one or moreother systems.

As used herein, the terms “locally not used substantially” and/or“locally used substantially as guardbands and/or transition bands” referto a local service area of a base station and/or group of base stationsand/or access point(s) of the cellular telecommunications system. Insuch a service area, the cellular telecommunications system may, forexample, be configured to identify frequencies that are “locally notused substantially” and/or frequencies that are “locally usedsubstantially as guardbands and/or transition bands” by the one or moreconventional cellular/PCS systems and/or the one or more other systemsand preferentially use the identified frequencies to communicatebidirectionally and/or unidirectionally with user equipment therebyfurther reducing or minimizing a measure of interference. While thepresent invention has been described in detail by way of illustrationand example of preferred embodiments, numerous modifications,substitutions and/or alterations are possible without departing from thescope of the invention as described herein. Numerous combinations,sub-combinations, modifications, alterations and/or substitutions ofembodiments described herein will become apparent to those skilled inthe art. Such combinations, sub-combinations, modifications, alterationsand/or substitutions of the embodiments described herein may be used toform one or more additional embodiments without departing from the scopeof the present invention.

Embodiments of the present invention have been described above in termsof systems, methods, devices and/or computer program products thatprovide communication devoid of cyclostationary features. However, otherembodiments of the present invention may selectively providecommunications devoid of cyclostationary features. For example, as shownin FIG. 16, if LPI/LPD/LPE communications are desired, thennon-cyclostationary waveforms may be transmitted. In contrast, whenLPI/LPD/LPE communications need not be transmitted, cyclostationarywaveforms may be used. An indicator may be provided to allow a receiverto determine whether cyclostationary or non-cyclostationary waveformsare being transmitted. Accordingly, a given system, method, deviceand/or computer program can operate in one of two modes, depending uponwhether LPI/LPD/LPE communications are desired.

The present invention has been described with reference to blockdiagrams and/or flowchart illustrations of methods, apparatus (systems)and/or computer program products according to embodiments of theinvention. It is understood that a block of the block diagrams and/orflowchart illustrations, and combinations of blocks in the blockdiagrams and/or flowchart illustrations, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, and/or other programmable data processing apparatus to producea machine, such that the instructions, which execute via the processorof the computer and/or other programmable data processing apparatus,create means (functionality) and/or structure for implementing thefunctions/acts specified in the block diagrams and/or flowchart block orblocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instructions whichimplement the function/act specified in the block diagrams and/orflowchart block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer-implemented process such that theinstructions which execute on the computer or other programmableapparatus provide steps for implementing the functions/acts specified inthe block diagrams and/or flowchart block or blocks.

Accordingly, the present invention may be embodied in hardware and/or insoftware (including firmware, resident software, micro-code, etc.).Furthermore, the present invention may take the form of a computerprogram product on a computer-usable or computer-readable storage mediumhaving computer-usable or computer-readable program code embodied in themedium for use by or in connection with an instruction execution system.In the context of this document, a computer-usable or computer-readablemedium may be any medium that can contain, store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device.

It should also be noted that in some alternate implementations, thefunctions/acts noted in the blocks of the block diagrams/flowcharts mayoccur out of the order noted in the block diagram/flowcharts. Forexample, two blocks shown in succession may in fact be executedsubstantially concurrently or the blocks may sometimes be executed inthe reverse order, depending upon the functionality/acts involved.Moreover, the functionality of a given block of the flowcharts/blockdiagrams may be separated into multiple blocks and/or the functionalityof two or more blocks of the flowcharts/block diagrams may be at leastpartially integrated.

Next Generation (XG) Chipless Spread-Spectrum Communications (CSSC)

INTRODUCTION & EXECUTIVE SUMMARY: According to some embodiments of aneXt Generation (XG) Chipless Spread-Spectrum Communications (CSSC)system, described further hereinbelow and referred to as “XG-CSSC,”XG-CSSC provides extreme privacy, cognitive radio capability, robustnessto fading and interference, communications performance associated withM-ary orthonormal signaling and high multiple-access capacity. XG-CSSCuses spread-spectrum waveforms that are devoid of chipping and devoid ofany cyclostationary signature, statistically indistinguishable fromthermal noise and able to cognitively fit within any available frequencyspace (narrow-band, broad-band, contiguous, non-contiguous).

According to some embodiments, XG-CSSC maintains some or all desirablefeatures of classical direct-sequence spread-spectrum communicationswhile providing new dimensions that are important to military andcommercial systems. For military communications, XG-CSSC combines M-aryorthonormal signaling with chipless spread-spectrum waveforms to provideextreme covertness and privacy. Military wireless networks whose missionis to gather and disseminate intelligence stealthily, in accordance withLow Probability of Intercept (LPI), Low Probability of Detection (LPD)and Low Probability of Exploitation (LPE) doctrine, may use XG-CSSCterrestrially and/or via satellite. In situations where aimed forcesface difficult spectrum access issues, XG-CSSC may be used tocognitively and covertly utilize spectrum resources at minimal impact toincumbent users.

Commercially, XG-CSSC may be used to provide opportunisticcommunications using spectrum that is detected unused. As spectrum usagecontinues to increase, it may become important to equip networks anduser devices with agility to use opportunistically any portion (orportions) of a broad range of frequencies that is/are detected as unusedor lightly used. A regime is envisioned wherein primary usage ofspectrum and secondary (opportunistic) usage of the same spectrumco-exist on a non-interference, or substantially non-interference,basis.

XG-CSSC FUNDAMENTALS: In accordance with XG-CSSC, a Gram-SchmidtOrthonormalization (GSO) procedure, or any other orthonormalization ororthogonalization procedure, may be applied to a set of “seed”functions, to generate an orthonormal/orthogonal set of waveforms.According to some embodiments, the seed functions may be discrete-timefunctions, may be constructed pseudo-randomly in accordance with, forexample, Gaussian statistics (that may be truncated Gaussian statistics)and in accordance with any desired power spectral density characteristicthat may be predetermined and/or adaptively formed based on cognitiveradio principles. The GSO operation performed on the seed functionsyields a set of Gaussian-distributed orthonormal waveforms. The set ofGaussian-distributed orthonormal waveforms may be used to define asignaling alphabet that may be used to map an information sequence intospread-spectrum waveforms without resorting to chipping of theinformation sequence.

Referring to FIG. 17, a Power Spectrum Estimator (PSE) may be used toidentify frequency content being radiated by other transmitters. Thismay be accomplished by, for example, subjecting a band of frequencies,over which it is desired to transmit information, to a Fast FourierTransform (FFT). Responsive to the output of the PSE, a “Water-FillingSpectrum Shape” (WFSS) may be formed in the FFT domain. Each element(bin) of the WFSS FFT may be assigned a pseudo-random phase value thatmay be chosen from (0, 2π). An Inverse Fast Fourier Transform (IFFT) maybe applied to the WFSS FFT, as illustrated in FIG. 17, to generate acorresponding Gaussian-distributed discrete-time function. (Thetechnique is not limited to Gaussian distributions. However, theGaussian distribution is of particular interest since waveforms thathave Gaussian statistics and are devoid of cyclostationary features aresubstantially indistinguishable from thermal noise.) The process may berepeated M times to produce a set of M independent Gaussian-distributeddiscrete-time functions. Still referring to FIG. 17, the output valuesof the IFFT may be limited in amplitude, in accordance with a truncatedGaussian distribution, in order to minimize non-linear distortioneffects in the amplification stages of the radio.

We let the set of M independent Gaussian-distributed discrete-timefunctions be denoted by {S(nT)}={S₁(nT), S₂(nT), . . . , S_(M)(nT)};n=1, 2, . . . , N. We also let a one-sided bandwidth of {S(nT)} belimited to B Hz. As such, a number of orthogonal waveforms that may begenerated from {S(nT)} may, in accordance with established theorems, beupper-bounded by 2.4τB; where τ=NT. (See P. M. Dollard, “On thetime-bandwidth concentration of signal functions forming given geometricvector configurations,” IEEE Transactions on Information Theory, IT-10,pp. 328-338, October 1964; also see H. J. Landau and H. O. Pollak,“Prolate spheroidal wave functions, Fourier analysis anduncertainty—III: The dimension of the space of essentially time-andband-limited signals,” BSTJ, 41, pp. 1295-1336, July 1962) Accordingly,{S(nT)} may be subjected to a GSO in order to generate a set of Morthonormal waveforms {U(nT)}≡{U₁(nT), U₂(nT), . . . , U_(M)(nT)}; n=1,2, . . . , N.

The set of orthonormal waveforms {U₁(nT), U₂(nT), . . . , U_(M)(nT)} maybe used to define an M-ary orthonormal Gaussian-distributed signalingalphabet whose elements may be used to map an M-ary information sequence{I_(k)}; I_(k)ε{I₁, I₂, . . . , I_(M)} into a spread-spectrum waveformsequence {U_(k)(nT)}. (The discrete-time index “k” relates to thesignaling interval whereas the discrete-time index “n” refers to thewaveform sampling interval. A signaling interval includes N waveformsampling intervals.)

Thus, in accordance with M-ary signaling, a block of L bits (2^(L)=M)may be associated with one element of {U₁(nT), U₂(nT), . . . ,U_(M)(nT)}. Alternatively, since the system comprises M orthogonalchannels (as defined by the M orthonormal waveforms) two or more of theorthonormal waveforms may be transmitted simultaneously. In thisconfiguration, each one of the transmitted orthonormal waveforms may bemodulated by either “+1” or “−1”, to reflect a state of an associatedbit, thus conveying one bit of information. The following exampleillustrates a trade off between M-ary orthogonal signaling and binarysignaling.

As stated earlier, a number of orthogonal waveforms that may begenerated from a set of seed waveforms {S(nT)} is upper-bounded by2.4τB. Let us assume that each seed waveform is band-limited to B=500kHz (one-sided bandwidth) and that the signaling interval τ=NT is 1 ms.Thus, M≦2.4τB=2.4*(10⁻³)*(0.5*10⁶)=1200. Assuming that a number of 1024of orthonormal waveforms can be constructed, transmitting oneorthonormal waveform may relay 10 bits of information. Thus, the M-arysignaling approach may yield a data throughput of 10 kbps (since thesignaling interval is 1 ms). Turning now to the binary signalingapproach, each one of a plurality of orthonormal waveforms may bemodulated by either “+1” or “−1” and transmitted, conveying 1 bit ofinformation. If all 1024 orthonormal waveforms are used, the datathroughput may be 1024 bits per τ=10⁻³ seconds or, 1.024 Mbps. It isseen that the two approaches differ in data throughput by 20 dB but theyalso differ in E_(b)/N₀ performance. Since the M-ary signaling schemeconveys 10 bits of information per transmitted waveform, while thebinary signaling approach conveys one bit of information per transmittedwaveform, the M-ary signaling approach enjoys a 10 dB E_(b)/N₀ advantageover the binary signaling approach. (Assuming the probability of errorassociated with a channel symbol is kept the same for the two signalingschemes.) Thus, whereas the binary signaling scheme may be ideallysuited for high-capacity multiple-access military and/or commercialcommunications, the M-ary signaling scheme may be preferred for certainspecial operations situations that require extreme covertness and/orprivacy.

A receiver that is configured to receive information from thetransmitter of FIG. 17, may be equipped with sufficient information togenerate a matched filter bank corresponding to the M-ary signalingalphabet {U₁(nT), U₂(nT), . . . , U_(M)(nT)}. FIG. 18 illustrates keyfunctions of such a receiver. The receiver may further be optimized forfading channels by using “rake” principles. In some embodiments, thereceiver may be configured to detect lightly used or unused frequenciesand instruct one or more transmitters, via a control channel message, totransmit information over the detected lightly used or unusedfrequencies. This may be accomplished, in some embodiments of theinvention, by configuring the receiver to instruct the one or moretransmitters by transmitting frequency-occupancy information, via thecontrol channel, over a predetermined, known to the one or moretransmitters, frequency interval, that may contain interference. Thepredetermined frequency interval may, according to some embodiments, bechanging with time responsive to, for example, a Time-of-Day (ToD) valueand/or any other input. The frequency-occupancy information may be ofrelatively low data rate and the predetermined frequency interval may berelatively large in bandwidth so as to provide sufficient processinggain to overcome the interference. In further embodiments of theinvention, one or more elements of the M-ary signaling alphabet may beprecluded from being used for wireless transmission and this may be usedto provide a receiver with error detection and/or error correctioncapability, as will be appreciated by those skilled in the art.

PRELIMINARY COMPUTER SIMULATIONS: Transmission and reception ofinformation based on XG-CSSC waveforms has been simulated using 16-aryGaussian-distributed orthonormal alphabets that were constructed inaccordance with the principles described herein. FIG. 19( a) is a PowerSpectral Density (“PSD”) of a transmitted XG-CSSC carrier in aninterference-free environment (or in the presence of interference butwithout the cognitive function having been activated). In contrast, FIG.19( b) shows the impact of a radio's cognitive function. As seen fromFIG. 19( b), responsive to a detection of interference (indicated inFIG. 19( b) by the red or lighter trace), the PSD of a XG-CSSC carrieris “molded” around the interference. That is, the radio's cognitivefunction senses the power spectrum distribution of interference andforms a 16-ary signaling alphabet with spectral content that avoids theinterference. FIG. 19( c) shows the PSD of the XG-CSSC carrier (of FIG.19( a) or 19(b)) following square-law detection, illustrating afeatureless (non-cyclostationary) nature thereof. By comparison, thefirst and second traces of FIG. 20 show a PSD of conventional QPSK and aPSD of conventional QPSK following square-law detection, illustrating acyclostationary signature of conventional QPSK.

FIG. 21 shows a constellation associated with transmission of 20,00016-ary symbols of the XG-CSSC carrier (of FIG. 19( a) or 19(b)) and FIG.22 represents a histogram thereof. It is seen from FIGS. 19, 21 and 22that XG-CSSC transmissions may be substantially featureless andsubstantially indistinguishable from thermal noise.

Communications performance has also been evaluated. FIG. 23 shows a BitError Rate (“BER”) vs. a Symbol Energy to Noise Power Spectral Density(“E_(s)/N₀”) for uncoded 16-ary XG-CSSC and uncoded spread-spectrum16-QAM. (See Donald L. Schilling et al. “Optimization of the ProcessingGain of an M-ary Direct Sequence Spread Spectrum Communication System,”IEEE Transactions on Communications, Vol. Com-28, No. 8, August 1980.)Spread-spectrum 16-QAM was chosen for this comparison in order to keep anumber of transmitted bits per symbol invariant between the twotransmission formats. The E_(s)/N₀ advantage of XG-CSSC is apparent,owing to its orthonormal signaling alphabet. It is seen that at 10⁻²BER, XG-CSSC enjoys almost a 5 dB advantage over 16-QAM.

FIG. 24 shows BER performance subject to Co-Channel (“CC”) interference.The two systems (16-ary XG-CSSC and spread-spectrum 16-QAM) remainuncoded as in FIG. 23. Two types of CC interference are considered:Wide-Band (“WB”) and Band-Pass (“BP”). The WB interference is modeled aswideband complex Gaussian noise and its PSD spans the entire desiredsignal spectrum. The BP interference is modeled as band-pass complexGaussian noise and its PSD spans only 20% of the desired signalspectrum. The power of interference (whether WB or BP) is made equal tothe power of the desired signal. In FIG. 24, the cognitive aspect ofXG-CSSC is not activated. As a consequence, the interference spectrumand the XG-CSSC spectrum remain co-channel impairing BER performance.

FIG. 25 focuses on the impact of BP interference and displays XG-CSSCsystem performance with and without cognition. The two systems remainuncoded, as above, and the power of interference remains equal to thepower of the desired signal. In the legend of FIG. 25, the term“Adaptive XG-CSSC” indicates that the associated curve representsXG-CSSC with the cognitive feature active. It can be observed thatperformance of XG-CSSC subject to the cognitive feature (interferenceavoidance) is indistinguishable from the interference-free case (theblue [square points] and green [star points] curves are on top of eachother).

Embodiments of the present invention have been described above in termsof systems, methods, devices and/or computer program products thatprovide communication devoid of cyclostationary features. However, otherembodiments of the present invention may selectively providecommunications devoid of cyclostationary features. For example, as shownin FIG. 16 if LPI/LPD/LPE communications are desired, thennon-cyclostationary waveforms may be transmitted. In contrast, whenLPI/LPD/LPE communications need not be transmitted, cyclostationarywaveforms may be used. An indicator may be provided to allow a receiverto determine whether cyclostationary or non-cyclostationary waveformsare being transmitted. Accordingly, a given system, method, deviceand/or computer program can operate in one of two modes, depending uponwhether LPI/LPD/LPE communications are desired.

Privacy and security are paramount concerns for military/governmentcommunications systems. Privacy and security are also important concernsfor civilian/commercial systems owing to the proliferation of e-commerceand other sensitive information of a personal and/orcorporate/business/financial nature. Theft of sensitive and/orproprietary information, for example, by interception of signals, is onthe rise and can be very costly to businesses and/or individuals. Peopleoften discuss sensitive information over wireless networks providingopportunities for illegal interception and theft of secrets.Accordingly, wireless communications systems/methods/devices thatincrease privacy and security of information and reduce or eliminate thepossibility of unauthorized interception thereof would be valuable tocorporations/businesses, government/military, and civilians who desireadded privacy and security.

Additional embodiments of systems/methods/devices that increase privacy,security, covertness and/or undetectability of signals, such as wirelesssignals, will now be presented. At least some of the additionalembodiments are based upon a realization that a XG-CSSC technology(i.e., a XG-CSSC-based communications system, method and/or airinterface/protocol), as described hereinabove, or one or more variationsthereof, may be used alone, or in combination with one or more otherconventional technologies (conventional communications systems, methodsand/or air interfaces/protocols), to provide the added privacy,security, covertness and/or undetectability of signals, that may be,according to embodiments of the invention, wireless signals. The XG-CSSCtechnology is described in U.S. application Ser. No. 12/372,354, filedFeb. 17, 2009, entitled Wireless Communications Systems and/or MethodsProviding Low Interference, High Privacy and/or Cognitive Flexibility,and in the U.S. and International Applications cited and incorporatedtherein by reference and assigned to the Assignee of the presentApplication (EICES Research, Inc.) as well as in the ProvisionalApplications cited and incorporated therein by reference and assigned tothe Assignee of the present Application, all of which are incorporatedherein by reference in their entirety as if set forth fully herein.

Further, the XG-CSSC technology may include aspects/embodiments, in partor in whole, as described in U.S. application Ser. No. 12/748,931, filedMar. 29, 2010, entitled Increased Capacity Communications for OFDM-BasedWireless Communications Systems/Methods/Devices, and in the U.S. andInternational Applications cited and incorporated therein by referenceand assigned to the Assignee of the present Application (EICES Research,Inc.) as well as in the Provisional Applications cited and incorporatedtherein by reference and assigned to the Assignee of the presentApplication, all of which are incorporated herein by reference in theirentirety as if set forth fully herein. It will be understood that theterm “XG-CSSC technology” as used herein refers to any type ofcommunications (wireless or otherwise) using a waveform, system, method,air interface and/or protocol that is based upon and/or uses apseudo-randomly generated signaling alphabet and wherein thecommunications can comprise a reduced cyclostationary signature, areduced detectability feature and/or increasedprivacy/security/covertness compared to conventionalwaveforms/technologies of, for example, TDM/TDMA, CDM/CDMA, FDM/FDMA,OFDM/OFDMA, GSM, WiMAX and/or LTE. Further, it will be understood thatthe term “conventional waveforms/technologies” as used herein refers tocommunications using a waveform, system, method, air interface and/orprotocol that is not based upon and/or does not use a pseudo-randomlygenerated signaling alphabet.

Accordingly, a user device may be configured to include a XG-CSSC mode,comprising a XG-CSSC technology/air interface, and at least oneadditional mode (technology/air interface), such as, for example, a LTE(Long Term Evolution)-based technology/air interface. A user of such adevice who desires the added privacy, security, covertness and/orundetectability of signals may elect to activate/use the XG-CS SC modeof the device by providing, for example, a key-pad command and/or avoice command to the device. In some embodiments, instead of the aboveor in combination with the above, the XG-CSSC mode of the device may beactivated responsive to at least a time value, position value, proximitystate, velocity, acceleration, a biometric value (that may be abiometric value associated with the user of the device and/or some otherentity) and/or signal strength value (as may be sensed by the deviceand/or other device, such as, for example, an access point). Followingactivation of the XG-CSSC mode, the user device may be configured toestablish communications with a base station and/or access point usingthe XG-CSSC mode, while refraining from using, at least for someelements/portions of the communications, the at least one additionaltechnology and/or air interface.

It will be understood that the base station and/or access point (which,in some embodiments may be a femtocell) is/are also configured toinclude a XG-CSSC mode. Also, it will be understood that establishingcommunications between the user device and the base station and/oraccess point using a XG-CSSC mode may be more expensive to the user(i.e., may be offered by a service provider at a premium) compared toestablishing communications between the user device and the base stationand/or access point using the at least one additional technology and/orair interface. It will further be understood that the service providermay not charge a premium for XG-CSSC mode communications between anaccess point (e.g., femtocell) and a user device, thus encouragingaccess point deployments and usage, for example, to relieve capacitybottlenecks within conventional wireless infrastructure of the serviceprovider.

Accordingly, in some embodiments, the user device may be configured topreferentially use the XG-CSSC mode responsive to aclassification/sensitivity and/or a privacy level of information to becommunicated being above a predetermined threshold and/or responsive toa first time value, a first position, a first proximity state, a firstvelocity, a first acceleration, a first biometric measurement and/or afirst signal strength and to preferentially use the at least oneadditional technology or air interface responsive to theclassification/sensitivity and/or privacy level of information to becommunicated being equal to or below the predetermined threshold and/orresponsive to a second time value, a second position, a second proximitystate, a second velocity, a second acceleration, a second biometricmeasurement and/or a second signal strength. In multimediacommunications, for example, wherein sensitive as well as non-sensitiveinformation may need to be communicated simultaneously and/orsequentially, the user device may be configured to communicate thesensitive information using the XG-CSSC mode and to use the at least oneadditional technology and/or air interface (simultaneously with usingthe XG-CSSC mode and/or at different times) to communicate thenon-sensitive information. It will be understood that the term “XG-CSSCmode” as used herein refers to communications using a waveform, system,method, air interface and/or protocol that is based upon and/or uses apseudo-randomly generated signaling alphabet and wherein thecommunications can comprise a reduced cyclostationary signature, areduced detectability feature and/or increasedprivacy/security/covertness compared to conventional waveforms, systemsand/or methods of, for example, TDM/TDMA, CDM/CDMA, FDM/FDMA,OFDM/OFDMA, GSM, WiMAX and/or LTE.

As has been stated earlier, a signaling alphabet that may be associatedwith the XG-CSSC mode (i.e., an M-ary signaling alphabet comprising atleast two elements that are pseudo-randomly generated and may beorthogonal therebetween) may be determined pseudo-randomly responsive toa statistical distribution based upon a key (seed) and/or a Time-of-Day(“ToD”) value. In some embodiments, the key may be a network defined key(e.g., defined/determined by an element/unit of the service provider)and may be used by one or more base stations of the network and by aplurality of user devices associated therewith. In other embodiments,instead of the above, or in combination with the above, a key that isassociated with a user device may be defined (or determined) by a userof the user device and/or by the user device. In further embodiments, auser device may include a network defined key and a user defined key.

In order for the user (and/or the user device) to define the userdefined key, the user (and/or the user device) may access a web site,that may be associated with the service provider, and access anindividual account associated with the user (and/or the user device) byproviding, for example, an on-line ID, a user name and/or a password.Following authentication of the user (and/or user device) by the website, the user (and/or the user device) may define the user defined keyby specifying, for example, a sequence of letters, numbers and/or othercharacters. The web site may be connected (wirelessly or otherwise) to anetwork element thus providing the user defined key to one or moreaccess points and/or one or more base stations of the network. Also, theuser may have to provide the same user defined key to the user device.Accordingly, the network and the user device may, responsive to the samekey, derive the same signaling alphabet and may thus be able tocommunicate via the XG-CSSC mode (i.e., the same XG-CSSC mode). In someembodiments, the signaling alphabet may only/solely be based upon theuser defined key. In other embodiments, the signaling alphabet may bebased upon a combination of the user defined key and the network definedkey. In further embodiments, the signaling alphabet may only/solely bebased upon the network defined key. The user defined key may be changedby the user and/or by the user device (that is, may be re-defined by theuser and/or by the user device) as often as the user desires thusproviding additional security and privacy to the user. In someembodiments, upon accessing said web site and upon accessing saidindividual account associated with the user/user device, the web sitemay be configured to offer a key (i.e., a new unique key) to be used bythe user/user device as a new “user defined” key. The user/user devicemay accept the offer or decline it, and, in the event the offer isdeclined, the user/user device may proceed to define the user definedkey as described earlier. In the event the offer is accepted, the usermay have to insert/activate the new “user defined” key provided by theweb site into the user device.

In some embodiments, a forward link, from an access point and/or a basestation to the user device, may be based upon the network defined keywhile a return link, from the user device to an access point and/or abase station, may be based upon the user defined key. In furtherembodiments, a system element (e.g., an access point and/or a basestation) may relay to a first user device a user defined key that isassociated with a second user device and may require/instruct the firstuser device to initiate communications using the user defined key of thesecond user device or to hand-over communications from communicationsthat are based upon a first key being used by the first user device tocommunications that are based upon the user defined key of the seconduser device. In some embodiments, said relay to a first user device auser defined key that is associated with a second user device may occurresponsive to an orientation and/or distance of the first devicerelative to the second device. In further embodiments, the second userdevice, whose user defined key is relayed to the first user device, isselectively and/or preferentially chosen from a group of user devicesthat are authorized to communicate with an access point that the firstuser device may also be authorized to communicate with. Said relay to afirst user device a user defined key that is associated with a seconduser device may take place using communications that are based upon thefirst key that is being used by the first user device (the first keybeing a network defined key and/or a user defined key of the firstdevice).

It will be understood that any of the principles/embodiments (in wholeor in part) described above regarding network defined and/or userdefined keys may relate to an XG-CSSC mode and/or to one or more otherconventional waveforms/modes such as, for example, TDM/TDMA, CDM/CDMA,FDM/FDMA, OFDM/OFDMA, GSM, WiMAX and/or LTE, in order to provide userdefined and/or network defined encryption and/or data scrambling thereinand increase a privacy/security level thereof. Further, it will beunderstood that an XG-CSSC mode may comprise the user defined key and/orthe network defined key, as already described, for forming the signalingalphabet, and may also comprise a “special” user defined key and/or a“special” network defined key, that differs from the user defined keyand/or network defined key already discussed above, forencryption/scrambling of data prior to transmission thereof. The specialuser/network defined key may be defined by the user/network and/or userdevice along the same lines as discussed earlier for the user/networkdefined key but, wherein the user/network defined key may be shared by aplurality of devices, as already discussed above, the specialuser/network defined key may not be shared. Accordingly, in someembodiments of the present invention first and second devices may becommunicating with a given base station and/or a given access point(e.g., femtocell) using the same user/network defined key forconstructing/generating the signaling alphabets thereof and may becommunicating with the given base station and/or given access pointusing respective first and second different special user/network definedkeys for encryption and/or scrambling of data.

FIGS. 26 and 27 illustrate additional embodiments of the presentinvention. As is illustrated in FIG. 26, a wireless network may comprisea plurality of base stations, only one of which is illustrated in FIG.26, and a plurality of access points, installed in homes, offices andin/at any other place, as deemed necessary/desirable, to provideadditional privacy/security while off-loading capacity from one or morenear-by base stations (only one access point of the plurality of accesspoints is illustrated in FIG. 26). A user device (e.g., a radioterminal;first user device of FIG. 26) may be configured to detect proximity toan access point, such as the access point illustrated in FIG. 26, andestablish communications preferentially with the access point whilerefraining from communicating with a base station even though the userdevice is within a service region of the base station (such as the basestation illustrated in FIG. 26) and can communicate with that basestation. The first user device illustrated in FIG. 26 may further beconfigured, according to embodiments of the invention, to establishcommunications preferentially with the access point and topreferentially use the XG-CSSC mode to communicate with the accesspoint. In some embodiments, the first user device is configured to usethe network defined key and/or the user defined key corresponding to thefirst user device. In other embodiments, the first user device isprovided (by the wireless network via the access point and/or the basestation) a user defined key of another user device that may be alreadyengaged in communications with an access point and/or a base station oris getting ready to engage in communications with an access point and/orbase station. A user device (e.g., a radioterminal) may be configured todetect proximity to an access point by, for example, detecting a signalbeing radiated by the access point and/or by detecting a position thatthe user device has reached. It will be understood that in the eventthat communicating preferentially with the access point is not possible,due to a network malfunction and/or other reason, then the user devicemay be configured to communicate with the base station.

FIG. 26 also illustrates a second user device that is not proximate tothe access point and/or is not allowed to communicate with the accesspoint (e.g., the access point is privately owned and has not providedaccess to the second user device). Accordingly, the second user deviceis configured to communicate with the base station and may do so byusing one of the conventional air interface standards/protocols (such asan LTE mode, as is illustrated in FIG. 26) if the information that isbeing communicated has not been deemed sensitive, and to communicatewith the base station using the XG-CS SC mode if the information that isbeing communicated has been deemed sensitive and needs a higher level ofprotection and/or privacy. In some embodiments, a first portion of theinformation to be communicated may be deemed sensitive, requiring extraprotection, while a second portion of the information to be communicatedmay not be deemed sensitive. Accordingly, in some embodiments, the firstportion of the information is communicated using the XG-CSSC mode whilethe second portion of the information is communicated, concurrently withthe first portion or otherwise, using a mode other than XG-CSSC (e.g.,LTE, WiMAX, GSM, etc.). Providing access of a user device to an accesspoint comprises, according to some embodiments, providing to the accesspoint an identity of the user device. The identity of the user devicemay be provided to the access point manually by interacting directlywith the access point and/or remotely by providing the identity of theuser device to a web site (e.g., along the lines discussed earlier inconnection with providing the user defined key) and then having the website, which is connected to the access point, provide the identity ofthe user device to the access point. Similarly, a user device may bedeleted from having access to an access point by either manuallyinteracting with the access point and deleting/erasing the identity ofthe user device from a memory of the access point and/or by doing soremotely via the web site that is connected to the access point.

Whether a user device is communicating with the access point and/or withthe base station (wherein the “and” part of the immediately preceding“and/or” may be occurring in order to provide diversity, addedcommunications link robustness and/or a “make before break” connectionin handing-over communications from the access point to the base stationor vice versa) the user device, the base station and/or the access pointmay be configured to initiate and implement a hand-over fromcommunications that are based upon the XG-CSSC mode and a first key tocommunications that are based upon the XG-CSSC mode and a second key,wherein the first key is at least one of: a user defined key relating tothe user device, a user defined key relating to another user device anda network defined key; and wherein the second key differs from the firstkey.

Referring now to FIG. 27, additional embodiments of the presentinvention will be described. FIG. 27 illustrates four user devicescommunicating with a base station. The user devices are labeled “1,”“2,” “3” and “4,” respectively, wherein user devices 1 and 2 (indicatedas “group 1” in FIG. 27) are proximate therebetween and user devices 3and 4 (indicated as group 2 in FIG. 27) are proximate therebetween butare not proximate to user devices 1 and 2. Accordingly, responsive to adistance between group 1 and group 2 approaching and/or exceeding apredetermined value, the base station may be configured, according tosome embodiments, to communicate with group 1 using a first antennapattern and to communicate with group 2 using a second antenna patternthat is substantially different than the first antenna pattern, asillustrated in FIG. 27. Antenna pattern discrimination may thus beprovided to group 1 and to group 2, reducing a level of interferencetherebetween and allowing reuse of resources (frequencies, keys,alphabet elements) between the two groups. It will be understood thatthe number of groups being served by a base station (or a base stationsector) may be more than two and a number of user devices per group mayexceed two or be less than two (i.e., one). The antenna patterns thatare illustrated in FIG. 27 may be formed by the base station using anyone of the principles/teachings/embodiments (in whole or in part) ofU.S. patent application Ser. No. 12/748,931, filed Mar. 29, 2010,entitled Increased Capacity Communications for OFDM-Based WirelessCommunications Systems/Methods/Devices, which is hereby incorporatedherein by reference in its entirety as if set forth fully herein,including all references and definitions cited therein.

Still referring to FIG. 27, user device 1, communicating with the basestation via link 1, and user and user device 2, communicating with thebase station via link 2, may be communicating with the base stationconcurrently and co-frequency therebetween while relying on alphabetelement discrimination (e.g., code discrimination) to maintain a levelof interference therebetween at or below an acceptable level. Each oneof the wireless communications links that are established and served bythe first antenna pattern, link 1 and link 2, may be using (may havebeen allocated) different, substantially orthogonal, alphabet elementsof a XG-CSSC mode, wherein the XG-CSSC mode may be based upon a networkdefined key and/or a user defined key (as described earlier).Accordingly, a signaling alphabet of the XG-CSSC mode, based upon anetwork/user defined key and a statistical distribution, comprising aplurality of orthogonal waveform elements, may be distributed by thebase station over a plurality of links (e.g., link 1 and link 2) thatare being served by a common antenna pattern and do not/cannot rely uponantenna pattern discrimination for acceptable performance. That is, thebase station may allocate at least a first element of the plurality oforthogonal waveform elements of the signaling alphabet to, for example,link 1 while allocating at least a second element of the plurality oforthogonal waveform elements to link 2. Similar arguments hold relativeto the user devices of group 2 communicating with the base station vialinks 3 and 4 of the second antenna pattern, as is illustrated in FIG.27.

The base station(s), access point(s) and/or mobile device(s) that havebeen discussed/illustrated herein and/or in the references providedherein may be configured, according to embodiments of the presentinvention, to execute a handover during a communications session betweena first signaling alphabet that is associated with a first key and asecond signaling alphabet of a second key, responsive to a physicalorientation between at least two mobile devices and/or responsive to alevel of interference. We stress that by using pseudo-randomly generatedsignaling alphabets to provide communications (wireless and/orwireline), an extra level of encryption/scrambling is provided that isover and above the conventional encryption/scrambling that is providedat the bit level. Accordingly, embodiments of the present inventionprovide what may be termed “concatenated” encryption/scrambling, at thebit level and at the signaling alphabet level. Each one of these twoencryption/scrambling components may be based upon a user defined keyand/or a network defined key.

In additional embodiments of the present invention, a system/method suchas that illustrated in FIG. 17 (or a variation thereof), that maycomprise performing a FFT and a IFFT in order to generate an M-arysignaling alphabet, may be combined (in whole or in part) with asystem/method such as that illustrated in FIG. 5 (or a variationthereof). It will be appreciated by those skilled in the art that the“I” and/or “Q” output signals of the block labeled “Symbol to WaveformMapping” of FIG. 17 may correspond to the output signal of the blocklabeled “Bit-to-Symbol Conversion” of FIG. 5 and/or to the input signalof the block labeled “Symbol Repeat” of FIG. 5. It will be understoodthat the blocks of FIG. 5 that are labeled “Symbol Repeat” and/or“Symbol Interleaver” may be bypassed in some embodiments. Accordingly,in some embodiments, said “I” and/or “Q” output signals (or a variantthereof) may be used as an input to the “MODULATOR” of FIG. 5. In someembodiments, the “I” and/or “Q” output signals (or a variant thereof)may be subjected to a FFT (or a IFFT) before being presented to the“MODULATOR” of FIG. 5, whereby a frequency-domain representation thereofis used by the “MODULATOR” of FIG. 5. This may reduce a peak-to-averageratio of a signal to be amplified and transmitted.

It will be understood that generating pseudo-randomly a communicationsalphabet, as has been discussed hereinabove, may also be applied to asystem/method wherein the communications alphabet comprises aconstellation of points and not a set of functions (time-domain and/orfrequency-domain functions).

Finally, those skilled in the art will appreciate that by leaving someelements and/or dimensions of a communications alphabet un-utilized fortransmission of data, thus giving-up capacity, BER performance may beimproved by increasing a size of a decision space that may be associatedwith a correct decision at a receiver. For example, in QPSK, if theconstellation points of the second and fourth quadrants, were to be leftun-utilized for transmission of data, the decision space for a correctdecision at a receiver would grow from one fourth of the two-dimensionalplane to one half of the two-dimensional plane.

The present invention has been described with reference to blockdiagrams and/or flowchart illustrations of methods, apparatus (systems)and/or computer program products according to embodiments of theinvention. It is understood that a block of the block diagrams and/orflowchart illustrations, and combinations of blocks in the blockdiagrams and/or flowchart illustrations, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, and/or other programmable data processing apparatus to producea machine, such that the instructions, which execute via the processorof the computer and/or other programmable data processing apparatus,create means (functionality) and/or structure for implementing thefunctions/acts specified in the block diagrams and/or flowchart block orblocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instructions whichimplement the function/act specified in the block diagrams and/orflowchart block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer-implemented process such that theinstructions which execute on the computer or other programmableapparatus provide steps for implementing the functions/acts specified inthe block diagrams and/or flowchart block or blocks.

Accordingly, the present invention may be embodied in hardware and/or insoftware (including firmware, resident software, micro-code, etc.).Furthermore, the present invention may take the form of a computerprogram product on a computer-usable or computer-readable storage mediumhaving computer-usable or computer-readable program code embodied in themedium for use by or in connection with an instruction execution system.In the context of this document, a computer-usable or computer-readablemedium may be any medium that can contain, store, communicate,propagate, or transport the program for use by or in connection with theinstruction execution system, apparatus, or device.

It should also be noted that in some alternate implementations, thefunctions/acts noted in the blocks of the block diagrams/flowcharts mayoccur out of the order noted in the block diagram/flowcharts. Forexample, two blocks shown in succession may in fact be executedsubstantially concurrently or the blocks may sometimes be executed inthe reverse order, depending upon the functionality/acts involved.Moreover, the functionality of a given block of the flowcharts/blockdiagrams may be separated into multiple blocks and/or the functionalityof two or more blocks of the flowcharts/block diagrams may be at leastpartially integrated.

In the specification and the Figures thereof, there have been disclosedembodiments of the invention and, although specific terms are employed,they are used in a generic and descriptive sense only and not forpurposes of limitation; the scope of the invention being set forth inthe following claims.

What is claimed is:
 1. A system that is configured to communicateinformation, the system comprising: a first communications modecomprising a wireless communications link that is based upon radiofrequency emissions; and a second communications mode comprising awireless communications link that is based upon radio frequencyemissions and an increased level of privacy compared to the firstcommunications mode; wherein the system is configured to preferentiallyuse the second communications mode to communicate the information andrefrain from using the first communications mode to communicate theinformation responsive to a privacy level of the information being abovea threshold; wherein the system is further configured to preferentiallyuse the first communications mode to communicate the information andrefrain from using the second communications mode to communicate theinformation responsive to the privacy level of the information beingbelow the threshold; wherein the system further comprises a signalingalphabet comprising a plurality of waveforms that are orthogonaltherebetween; and wherein the second communications mode is based uponthe signaling alphabet that comprises the plurality of waveforms thatare orthogonal therebetween.
 2. The system according to claim 1, whereinthe first communications mode comprises a first level ofcyclostationarity; and wherein the second communications mode comprisesa second level of cyclostationarity that is less than the first level ofcyclostationarity of the first communications mode.
 3. The systemaccording to claim 1, wherein the system comprises a mobile device thatis configured to communicate with a base station and with an accesspoint; wherein the mobile device is further configured to preferentiallycommunicate with the access point when proximate thereto and to refrainfrom communicating with the base station when proximate to the accesspoint even though the mobile device is able to communicate with the basestation when proximate to the access point; and wherein the mobiledevice is configured to preferentially communicate with the access pointwhen proximate thereto and to preferentially use the secondcommunications mode to communicate therewith.
 4. The system according toclaim 3, wherein the second communications mode is based upon a userdefined key and/or a network defined key; wherein the user defined keyis determined by a user of the mobile device and/or by the mobile deviceand differs for different mobile devices; wherein the network definedkey is determined by an element of a network that is associated with themobile device and/or provides communications to the mobile device;wherein the network defined key is used by a plurality of mobiledevices; and wherein the user defined key is unique to the mobiledevice, is used only for the communications of the mobile device and canbe changed only by a user of the mobile device and/or by the mobiledevice by using an identification code, a user name and/or a password.5. The system according to claim 4, wherein the user defined key isprovided to the access point and/or to the base station by accessing aweb site and providing to the web site said user defined key; andwherein the web site is connected to the access point and/or to the basestation.
 6. The system according to claim 4, wherein the secondcommunications mode is based upon the user defined key over a first timeinterval and is based upon the network defined key over a second timeinterval; and wherein the mobile device is further configured tohand-over communications from communications that are based upon theuser defined key to communications that are based upon the networkdefined key and/or from communications that are based upon the networkdefined key to communications that are based upon the user defined key.7. The system according to claim 4, wherein the mobile device is furtherconfigured to communicate with the access point and/or base stationusing the second communications mode and the user defined key responsiveto a first orientation of the mobile device relative to another devicethat is also communicating with the access point and/or base stationconcurrently and co-frequency with said mobile device; and wherein themobile device is further configured to communicate with the access pointand/or base station using the second communications mode and the networkdefined key responsive to a second orientation of the mobile devicerelative to said another device that is also communicating with theaccess point and/or base station concurrently and co-frequency with saidmobile device.
 8. The system according to claim 1, wherein the systemcomprises a mobile device wherein the mobile device is configured to usea first element of a signaling alphabet to communicate with the basestation and to refrain from using a second element of said signalingalphabet that is being used by at least one other device to communicatewith the base station, responsive to a first orientation of the mobiledevice relative to the at least one other device; and wherein the mobiledevice is further configured to use the first element and the secondelement of said signaling alphabet to communicate with the base stationwhile said first element and said second element are also being used bythe at least one other device to communicate with the base station,responsive to a second orientation of the mobile device relative to theat least one other device.
 9. The system according to claim 8, whereinthe mobile device is further configured to communicate with the accesspoint and/or base station using the second communications mode basedupon a user defined key; wherein the user defined key is provided to theaccess point and/or base station by accessing a web site and providingto the web site said user defined key; and wherein the web site isconnected to the access point and/or to the base station.
 10. The systemaccording to claim 8, wherein the second communications mode is basedupon a user defined key over a first time interval and is based upon anetwork defined key over a second time interval; and wherein the mobiledevice is further configured to hand-over communications fromcommunications that are based upon the user defined key tocommunications that are based upon the network defined key and/or fromcommunications that are based upon the network defined key tocommunications that are based upon the user defined key.
 11. The systemaccording to claim 1, wherein the system comprises a mobile device thatis configured to communicate with a base station and with an accesspoint; wherein the mobile device is configured to communicate with thebase station using the second communications mode and a network definedkey responsive to a first orientation between the mobile device andanother device; and wherein the mobile device is further configured tocommunicate with the base station using the second communications modeand a user defined key responsive to a second orientation between themobile device and said another device.
 12. The system according to claim11, wherein the user defined key is provided to the access point and/orbase station by accessing a web site and providing to the web site saiduser defined key; and wherein the web site is connected to the accesspoint and to the base station.
 13. The system according to claim 11,wherein the second communications mode is based upon the user definedkey over a first time interval and is based upon the network defined keyover a second time interval; and wherein the mobile device is furtherconfigured to hand-over communications from communications that arebased upon the user defined key to communications that are based uponthe network defined key and/or from communications that are based uponthe network defined key to communications that are based upon the userdefined key.
 14. The system according to claim 1, wherein the systemcomprises a base station that is configured to communicate with a firstdevice and with a second device concurrently and co-frequencytherebetween; wherein the base station is configured to use a firstelement of a signaling alphabet to communicate with the first device andto refrain from using a second element of the signaling alphabet tocommunicate with the first device while said second element is beingused by the base station to communicate with the second device,responsive to a first orientation of the first device relative to thesecond device; and wherein the base station is further configured to usethe first element and the second element of the signaling alphabet tocommunicate with said first device while said first element and saidsecond element are also being used by the base station to communicatewith said second device, responsive to a second orientation of the firstdevice relative to the second device.
 15. The system according to claim14, wherein the second orientation between the first device and thesecond device allows an antenna of the base station, comprising aplurality of elements, to form a first antenna pattern and use the firstantenna pattern to communicate with the first device and to also form asecond antenna pattern and use the second antenna pattern to communicatewith the second device; wherein a gain of the first antenna pattern in adirection associated with the first device is greater than a gain of thefirst antenna pattern in a direction associated with the second device;and wherein a gain of the second antenna pattern in a directionassociated with the second device is greater than a gain of the secondantenna pattern in a direction associated with the first device.
 16. Thesystem according to claim 15, wherein the plurality of elementscomprises a first plurality of vertically disposed elements and/or asecond plurality of horizontally disposed elements and whereinresponsive to said second orientation the system uses antenna patterndiscrimination between the first and second antenna patterns to reduceinterference between the communications of the first and second devices;and wherein responsive to said first orientation the system uses elementdiscrimination between different elements of the signaling alphabet toreduce interference between the communications of the first and seconddevices.
 17. The system according to claim 1, wherein the systemcomprises a base station that is configured to communicate with a firstdevice using the second communications mode and to communicate with asecond device also using the second communications mode; wherein thebase station is further configured to communicate with the first deviceand with the second device concurrently and co-frequency therebetween;wherein the base station is configured to communicate with the firstdevice and with the second device using a network defined key responsiveto a first orientation between the first device and the second device;and wherein the base station is further configured to communicate withthe first device using a first user defined key and to communicate withthe second device using a second user defined key responsive to a secondorientation between the first device and the second device.
 18. Thesystem according to claim 17, wherein the second orientation between thefirst device and the second device allows an antenna of the basestation, comprising a plurality of elements, to form a first antennapattern and use the first antenna pattern to communicate with the firstdevice and to also form a second antenna pattern and use the secondantenna pattern to communicate with the second device; wherein a gain ofthe first antenna pattern in a direction associated with the firstdevice is greater than a gain of the first antenna pattern in adirection associated with the second device; and wherein a gain of thesecond antenna pattern in a direction associated with the second deviceis greater than a gain of the second antenna pattern in a directionassociated with the first device.
 19. The system according to claim 18,wherein the plurality of elements comprises a first plurality ofvertically disposed elements and/or a second plurality of horizontallydisposed elements; wherein responsive to said second orientation thesystem uses antenna pattern discrimination between the first and secondantenna patterns to reduce interference between the communications ofthe first and second devices; and wherein responsive to said firstorientation the system uses element discrimination between differentelements of the signaling alphabet to reduce interference between thecommunications of the first and second devices.
 20. The system accordingto claim 1, wherein the system comprises an access point that isconfigured to preferentially communicate with a first device and isfurther configured to preferentially use the second communications modeto communicate with the first device responsive to an identity of thefirst device even though said first device is within a service area of abase station and is capable of communicating with the base station; andwherein the access point is further configured to deny service to asecond device responsive to an identity of the second device.
 21. Thesystem according to claim 20, wherein the access point is configured tocommunicate with the first device by using only the secondcommunications mode.
 22. The system according to claim 20, wherein saididentity of the first device is specified to the access point byaccessing a web site and providing to the web site an indication of theidentity of the first device and wherein the web site is connected tothe access point.
 23. The system according to claim 20, wherein thesecond communications mode is based upon a user defined key and whereinthe user defined key is specified to the access point by accessing a website and providing to the web site said user defined key and wherein theweb site is connected to the access point.
 24. The system according toclaim 20, wherein the second communications mode is based upon a userdefined key over a first time interval and is based upon a networkdefined key over a second time interval; and wherein the access point isfurther configured to hand-over communications from communications thatare based upon the user defined key to communications that are basedupon the network defined key and/or from communications that are basedupon the network defined key to communications that are based upon theuser defined key.
 25. The system according to claim 1, wherein thesystem is further configured to: receive an identity from a device;authenticate the device responsive to the received identity; receive akey from the device following the reception of the identity andfollowing the authentication; and establish communications with thedevice using the second communications mode responsive to havingreceived the key from the device; wherein the system is configured toprovide the key responsive to having received the identity from thedevice and having authenticated the device.
 26. The system according toclaim 1, wherein the system is further configured to: receive anidentity from a device; authenticate the device responsive to thereceived identity; transmit a notification; and establish communicationswith the device using the second communications mode responsive tohaving received the identity from the device, having authenticated thedevice and having transmitted the notification.
 27. The system accordingto claim 1, wherein the second communications mode is used responsive toa velocity, acceleration and/or biometric data.
 28. The system accordingto claim 1, wherein the system is further configured to use the firstcommunications mode and to use the second communications modesimultaneously therebetween to communicate the information responsive tothe information comprising first and second components that areassociated with respective first and second privacy levels that areabove and below the threshold, respectively.
 29. A method ofcommunicating information, the method comprising: configuring a firstcommunications mode comprising a wireless communications link that isbased upon radio frequency emissions; configuring a secondcommunications mode comprising a wireless communications link that isbased upon radio frequency emissions and an increased level of privacyrelative to the first communications mode; using the secondcommunications mode to communicate the information and refraining fromusing the first communications mode to communicate the informationresponsive to a privacy level of the information being above athreshold; using the first communications mode to communicate theinformation and refraining from using the second communications mode tocommunicate the information responsive to the privacy level of theinformation being below the threshold; and using a signaling alphabetcomprising a plurality of waveforms that are orthogonal therebetween tocommunicate information via the second communications mode.
 30. Themethod according to claim 29, wherein the first communications modecomprises a first level of cyclostationarity; and wherein the secondcommunications mode comprises a second level of cyclostationarity thatis less than the first level of cyclostationarity of the firstcommunications mode.
 31. The method according to claim 29, furthercomprising: preferentially communicating between a mobile device and anaccess point when the mobile device is proximate to the access point andrefraining from communicating between the mobile device and a basestation when the mobile device is proximate to the access point eventhough the mobile device is able to communicate with the base stationwhen proximate to the access point; and preferentially using the secondcommunications mode during said preferentially communicating.
 32. Themethod according to claim 31, wherein a user defined key is unique tothe mobile device, is used only for the communications of the mobiledevice and can be changed only by a user of the mobile device, and/or bythe mobile device, who is aware of an identification code, a user nameand/or a password.
 33. The method according to claim 32, furthercomprising: providing the user defined key to the access point and/or tothe base station by accessing a web site and providing to the web sitesaid user defined key; and connecting the web site to the access pointand/or to the base station.
 34. The method according to claim 32,further comprising: basing the second communications mode upon the userdefined key over a first time interval and basing the secondcommunications mode upon a network defined key over a second timeinterval; and configuring the mobile device to hand-over communicationsfrom communications that are based upon the user defined key tocommunications that are based upon the network defined key and/or fromcommunications that are based upon the network defined key tocommunications that are based upon the user defined key.
 35. The methodaccording to claim 31, further comprising: communicating between themobile device and the access point and/or communicating between themobile device and the base station using the second communications modeand a user defined key responsive to a first orientation of the mobiledevice relative to another device that is also communicating with theaccess point and/or base station concurrently and co-frequency with saidmobile device; and communicating between the mobile device and theaccess point and/or communicating between the mobile device and the basestation using the second communications mode and a network defined keyresponsive to a second orientation of the mobile device relative to saidanother device that is also communicating with the access point and/orbase station concurrently and co-frequency with said mobile device. 36.The method according to claim 29, wherein a mobile device is configuredto communicate with a base station and with an access point the methodfurther comprising; using by the mobile device a first element of asignaling alphabet to communicate with the base station and refrainingfrom using a second element of said signaling alphabet that is beingused by at least one other device to communicate with the base station,responsive to a first orientation of the mobile device relative to theat least one other device; and using by the mobile device the firstelement and the second element of said signaling alphabet to communicatewith the base station while said first element and said second elementare also being used by the at least one other device to communicate withthe base station, responsive to a second orientation of the mobiledevice relative to the at least one other device.
 37. The methodaccording to claim 36, wherein the mobile device is further configuredto communicate with the access point and/or base station using thesecond communications mode based upon a user defined key, the methodfurther comprising: providing to the access point and/or base stationthe user defined key by accessing a web site and providing to the website said user defined key; and connecting the web site to the accesspoint and/or to the base station.
 38. The method according to claim 36,further comprising: basing the second communications mode upon a userdefined key over a first time interval and basing the secondcommunications mode upon a network defined key over a second timeinterval; and configuring the mobile device to hand-over communicationsfrom communications that are based upon the user defined key tocommunications that are based upon the network defined key and/or fromcommunications that are based upon the network defined key tocommunications that are based upon the user defined key.
 39. The methodaccording to claim 29, wherein a mobile device is configured tocommunicate with a base station and with an access point, the methodfurther comprising: configuring the mobile device to communicate withthe base station using the second communications mode and a networkdefined key responsive to a first orientation between the mobile deviceand another device; and configuring the mobile device to communicatewith the base station using the second communications mode and a userdefined key responsive to a second orientation between the mobile deviceand said another device.
 40. The method according to claim 39, furthercomprising: providing the user defined key to the access point and/orbase station by accessing a web site and providing to the web site saiduser defined key; and connecting the web site to the access point and/orto the base station.
 41. The method according to claim 39, furthercomprising: basing the second communications mode upon the user definedkey over a first time interval and basing the second communications modeupon the network defined key over a second time interval; andconfiguring the mobile device to hand-over communications fromcommunications that are based upon the user defined key tocommunications that are based upon the network defined key and/or fromcommunications that are based upon the network defined key tocommunications that are based upon the user defined key.
 42. The methodaccording to claim 29, wherein a base station is configured tocommunicate with a first transceiver and with a second transceiverconcurrently and co-frequency therebetween; the method furthercomprising: configuring the base station to use a first element of asignaling alphabet to communicate with the first transceiver and torefrain from using a second element of the signaling alphabet tocommunicate with the first transceiver while said second element isbeing used by the base station to communicate with the secondtransceiver, responsive to a first orientation of the first transceiverrelative to the second transceiver; and configuring the base station touse the first element and the second element of the signaling alphabetto communicate with said first transceiver while said first element andsaid second element are also being used by the base station tocommunicate with said second transceiver, responsive to a secondorientation of the first transceiver relative to the second transceiver.43. The method according to claim 42, wherein the second orientationbetween the first transceiver and the second transceiver allows anantenna of the base station, comprising a plurality of elements, to forma first antenna pattern and use the first antenna pattern to communicatewith the first transceiver and to also form a second antenna pattern anduse the second antenna pattern to communicate with the secondtransceiver; wherein a gain of the first antenna pattern in a directionassociated with the first transceiver is greater than a gain of thefirst antenna pattern in a direction associated with the secondtransceiver; and wherein a gain of the second antenna pattern in adirection associated with the second transceiver is greater than a gainof the second antenna pattern in a direction associated with the firsttransceiver.
 44. The method according to claim 43, wherein the pluralityof elements comprises a first plurality of vertically disposed elementsand/or a second plurality of horizontally disposed elements, the methodfurther comprising: using antenna pattern discrimination between thefirst and second antenna patterns to reduce interference between thecommunications of the first and second transceivers responsive to saidsecond orientation; and using element discrimination between differentelements of the signaling alphabet to reduce interference between thecommunications of the first and second transceivers responsive to saidfirst orientation.
 45. The method according to claim 29, wherein a basestation is configured to communicate with a first transceiver using thesecond communications mode and to communicate with a second transceiveralso using the second communications mode; the method furthercomprising: configuring the base station to communicate with the firsttransceiver and with the second transceiver concurrently andco-frequency therebetween; configuring the base station to communicatewith the first transceiver and with the second transceiver using anetwork defined key responsive to a first orientation between the firsttransceiver and the second transceiver; and configuring the base stationto communicate with the first transceiver using a first user defined keyand to communicate with the second transceiver using a second userdefined key responsive to a second orientation between the firsttransceiver and the second transceiver.
 46. The method according toclaim 45, wherein the second orientation between the first transceiverand the second transceiver allows an antenna of the base station,comprising a plurality of elements, to form a first antenna pattern anduse the first antenna pattern to communicate with the first transceiverand to also form a second antenna pattern and use the second antennapattern to communicate with the second transceiver; wherein a gain ofthe first antenna pattern in a direction associated with the firsttransceiver is greater than a gain of the first antenna pattern in adirection associated with the second transceiver; and wherein a gain ofthe second antenna pattern in a direction associated with the secondtransceiver is greater than a gain of the second antenna pattern in adirection associated with the first transceiver.
 47. The methodaccording to claim 46, wherein the plurality of elements comprises afirst plurality of vertically disposed elements and/or a secondplurality of horizontally disposed elements, the method furthercomprising: using antenna pattern discrimination between the first andsecond antenna patterns to reduce interference between thecommunications of the first and second transceivers responsive to saidsecond orientation; and using element discrimination between differentelements of a signaling alphabet to reduce interference between thecommunications of the first and second transceivers responsive to saidfirst orientation.
 48. The method according to claim 29, wherein themethod further comprising: configuring an access point to preferentiallycommunicate with a first transceiver by preferentially using the secondcommunications mode, responsive to an identity of the first transceivereven though said first transceiver is within a service area of a basestation and is capable of communicating with the base station; andconfiguring the access point to deny service to a second transceiverresponsive to an identity of the second transceiver.
 49. The methodaccording to claim 48, further comprising: configuring the access pointto communicate with the first transceiver by using only the secondcommunications mode.
 50. The method according to claim 48, furthercomprising: specifying an indication of the identity of the firsttransceiver to the access point by accessing a web site and providing tothe web site the indication of the identity of the first transceiver;and connecting the web site to the access point.
 51. The methodaccording to claim 48, wherein the second communications mode is basedupon a user defined key, the method further comprising: specifying theuser defined key to the access point by accessing a web site andproviding to the web site said user defined key; and connecting the website to the access point.
 52. The method according to claim 48, furthercomprising: basing the second communications mode upon a user definedkey over a first time interval and basing the second communications modeupon a network defined key over a second time interval; and configuringthe access point to hand-over communications from communications thatare based upon the user defined key to communications that are basedupon the network defined key and/or from communications that are basedupon the network defined key to communications that are based upon theuser defined key.
 53. The method according to claim 29, furthercomprising: receiving an identity from a device; authenticating thedevice responsive to the received identity; receiving a key from thedevice following the reception of the identity and following theauthentication; and establishing communications with the device usingthe second communications mode responsive to having received the keyfrom the device; wherein prior to said receiving a key, the methodfurther comprises: providing the key responsive to having received theidentity from the device and having authenticated the device.
 54. Themethod according to claim 29, further comprising: receiving an identityfrom a device; authenticating the device responsive to the receivedidentity; transmitting a notification; and establishing communicationswith the device using the second communications mode responsive tohaving received the identity from the device, having authenticated thedevice and having transmitted the notification.
 55. The method accordingto claim 29, further comprising: communicating information over aforward link using a network defined key; and communicating informationover a return link using a user defined key.
 56. The method according toclaim 29, further comprising: using the second communications moderesponsive to a velocity, acceleration and/or biometric data.
 57. Themethod according to claim 29, further comprising: using the firstcommunications mode and using the second communications modesimultaneously therebetween to communicate data responsive to the datacomprising first and second components that are associated withrespective first and second privacy levels that are above and below thethreshold, respectively.