Automatic wireless service activation in a private local wireless system
First Claim
1. A method of activating and authenticating a wireless device in a secondary wireless communication system co-located with a primary wireless communication system, the method comprising:
- masking the control and activation signal strength associated with the primary wireless communication system, wherein masking only occurs during the authentication process; and
coupling control and activation signals of the secondary wireless communication system to the wireless device during the masking.
0 Assignments
0 Petitions
Accused Products
Abstract
Automatic activation of a wireless device with a first wireless communication system occurs within an area having an overlapping second wireless communication system. Operation of the first communication system access procedure is achieved by masking an access and authentication process for the second communication system from interference from the control signal levels of the second wireless communication system. During the first time access, the first communication system is supplied with the SID and MIN and ESN numbers for authentication and access.
-
Citations
20 Claims
-
1. A method of activating and authenticating a wireless device in a secondary wireless communication system co-located with a primary wireless communication system, the method comprising:
-
masking the control and activation signal strength associated with the primary wireless communication system, wherein masking only occurs during the authentication process; and coupling control and activation signals of the secondary wireless communication system to the wireless device during the masking. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secondary wireless communication system overlapped by a primary wireless communication system, and including radio access for activation and authentication of a wireless device in the secondary wireless communication system, the secondary wireless communication system comprising:
- an automated private service activation (APSA) port for accepting access requests of a wireless device seeking activation in the secondary wireless communication system, the APSA port radiating access control channel signals within limited spatial constraints, wherein the access control channel signals are radiated only occurs during the authentication process; and
a localized space for operating the secondary wireless communication system for wireless devices activated by the APSA port. - View Dependent Claims (12, 13, 14, 15, 16)
- an automated private service activation (APSA) port for accepting access requests of a wireless device seeking activation in the secondary wireless communication system, the APSA port radiating access control channel signals within limited spatial constraints, wherein the access control channel signals are radiated only occurs during the authentication process; and
-
17. A method of accessing and achieving authentication from a secondary wireless communication system in a region overlapped by a dominant wireless communication system, the method comprising:
- creating an access signal space in which radiated access control signal levels of the secondary wireless communication system within the access signal space exceed access control signal levels of the dominant wireless communication system only during the authentication process;
receiving a wireless device seeking access to the secondary wireless communication system within the access signal space;
receiving a search from the wireless device for a strongest control channel;
selecting the control channel of the secondary wireless communication system by reason of the proximity of the wireless device within the access space; and
authorizing and authenticating the wireless device for operation within the secondary wireless communication system. - View Dependent Claims (18, 19, 20)
- creating an access signal space in which radiated access control signal levels of the secondary wireless communication system within the access signal space exceed access control signal levels of the dominant wireless communication system only during the authentication process;
Specification