Automatic wireless service activation in a private local wireless system
First Claim
1. A secondary wireless communication system overlapped by a dominant wireless communication system, and including radio access for activation and authentication of a wireless telephone in the secondary wireless communication system, comprising:
- an automated private service activation (APSA) port for accepting access requests of a wireless telephone seeking activation in the secondary wireless communication system;
the APSA port providing an access control channel radiating signals at a level exceeding a signal level of the access control channel only within limited spatial constraints; and
a providing space for receiving wireless telephone for activation in the secondary wireless communication system.
1 Assignment
0 Petitions
Accused Products
Abstract
Automatic activation (i.e., first time access) of digital wireless/cellular mobile telephones with a private/localized wireless/cellular system (i.e. a secondary system) occurs within an area having an overlapping macrocellular primary wireless communication system (i.e., a dominant system). Operation of the secondary access procedure is achieved by shielding/masking an access and authentication process for the secondary system from interference from the control signal levels of the dominant wireless communication system. During the first time access, the secondary system is supplied with the SID and MIN and ESN numbers for authentication and resultant access.
-
Citations
19 Claims
-
1. A secondary wireless communication system overlapped by a dominant wireless communication system, and including radio access for activation and authentication of a wireless telephone in the secondary wireless communication system, comprising:
-
an automated private service activation (APSA) port for accepting access requests of a wireless telephone seeking activation in the secondary wireless communication system;
the APSA port providing an access control channel radiating signals at a level exceeding a signal level of the access control channel only within limited spatial constraints; and
a providing space for receiving wireless telephone for activation in the secondary wireless communication system. - View Dependent Claims (2, 3, 4, 5, 6)
the APSA port being part of a cellular base station having both analog communication channels and digital communication channels which operate under the TIA/EIA-136 standard.
-
-
3. The secondary wireless communication system of claim 2, further comprising:
the APSA port includes a surface covering an antenna for abutting a wireless telephone against and communicating a control channel to the wireless telephone at a signal level sufficient to achieve access and authentication and exceeding at that abutting space a control channel signal level of the overlapping dominant wireless communication system.
-
4. The secondary wireless communication system of claim 2, further comprising:
the APSA port further including an antenna accessible to a wireless telephone seeking access and authentication and including shielding for blocking a control channel signal level of the overlapping dominant wireless communication system.
-
5. The secondary wireless communication system of claim 1, further comprising:
a system controller for providing digital switching and service features connected to the APSA port via a standard line interface.
-
6. The secondary wireless communication system of claim 5, further comprising:
the controller further including a Network Service Platform (NSP) for providing specific service and management functions.
-
7. A method of accessing and achieving authentication from a secondary wireless communication system in a region overlapped by a dominant wireless communication system, comprising the steps of:
-
creating access signal space in which radiated access control signal levels of the secondary wireless communication system within the signal space exceed access control signal levels of the dominant wireless communication system;
positioning a wireless telephone seeking access within the access signal space and powering up the wireless telephone;
searching by the wireless telephone for the strongest control channel;
selecting the control channel of the secondary wireless communication system by reason of positioning of the wireless telephone within the access space; and
authorizing and authenticating the wireless telephone for operation within the secondary wireless communication system. - View Dependent Claims (8, 9, 10, 11, 12)
enabling the secondary wireless communication system to interwork with the dominant wireless communication system; and
authorizing and authenticating performed in accordance with TDMA standards recognized under TIA/EIA-136.
-
-
9. The method of claim 7, further comprising the steps of:
-
enabling the secondary wireless communication system to interwork with the dominant wireless communication system; and
authorizing and authenticating performed in accordance with analog standards.
-
-
10. The method of claim 7, further comprising the step of:
authorizing and authenticating based on information retrieved from a database of the dominant wireless communication system to enable billing of service through subscription to that system.
-
11. The method of claim 7, further comprising the step of:
authorizing and authenticating structured to use a Subscriber IDentification (SID) code, wherein the SID code is inserted into the wireless telephone at initial authorization and authentication, and wherein the SID code is unique to the secondary wireless systems so that post initial authorization and authentication the wireless telephone preferentially locks on to the secondary wireless communication system.
-
12. The method of claim 11, further comprising the step of:
operating the wireless telephone in the secondary wireless system in substitution for the dominant wireless communication system.
-
13. A method of activating and authenticating a wireless telephone of a new user in a secondary wireless communication system in a region overlapped by a dominant wireless communication system, comprising the steps of:
-
enabling the activating and authenticating within a limited sub-region of the region overlapped by a dominant wireless communication system and within that sub-region including the steps of;
providing a mobile identification number (MIN) and an electronic serial number (ESN) from an Automatic Private Service Activation (APSA) unit of the secondary system; and
interact with a secondary system database to provide a record and enable service to the new user. - View Dependent Claims (14, 15, 16)
installing a private system identification number (PSID) into a number assignment Module (NAM).
-
-
15. The method of claim 13, further comprising the step of:
installing by an over the air Activation system (OATS) process.
-
16. The method of claim 13, further comprising:
locking onto a Digital Control Channel (DCCH) of the secondary wireless system.
-
17. A secondary wireless communication system overlapped by a dominant wireless communication system, and including radio access for activation and authentication of a wireless telephone in the secondary wireless communication system, comprising:
-
an internet/intranet-connected database including user lists and user features and characteristics and accessible to individuals requesting service in the secondary wireless communication system and allowing the individuals to insert information concerning mobile station number and access information in advance of implementing access requests;
an automated private service activation (APSA) port for accepting the access requests of a wireless telephone seeking activation in the secondary wireless communication system. - View Dependent Claims (18)
the APSA port providing an access control channel radiating signals at a level exceeding a signal level of the access control channel only within limited spatial constraints; and
a providing space for receiving wireless telephones for activation in the secondary wireless communication system.
-
-
19. In a wireless centrex environment, a secondary wireless communication system overlapped by a dominant wireless communication system, and including radio access for activation and authentication of a wireless telephone in the secondary wireless communication system, comprising:
-
a plurality of voice access ports (VAP) connected to a local digital switch associated with a public switched telephone network (PSTN); and
an automated private service activation (APSA) port for accepting the access requests of a wireless telephone seeking activation in the secondary wireless communication system;
wherein the APSA port is connected to a local digital switch associated with a PSTN; and
wherein the APSA port provides an access control channel radiating signals at a level exceeding a signal level of the access control channel only within limited spatial constraints.
-
Specification