CN1253680A

5G,4G,3G,2G

Title

Mobile communication method and mobile communication system

Application Number:

CN1998804482

Publication Date:

17-05-2000

Family ID:

Application Date:

24-04-1998

Declaring Company:

Publication Country:

US

Priority Date:

24-04-1997

Title

Mobile communication method and mobile communication system

Application Number:

CN1998804482

Family ID:

Publication Country:

US

Publication Date:

17-05-2000

Application Date:

24-04-1998

Priority Date:

24-04-1997

Declaring Company:

Abstract  Abstract

When a network performs paging by using a temporary mobile user identifier (TMUI) the corresponding mobile station (MS) sends a response. After this the network performs authentication by using an authentication key corresponding to the TMUI and random numbers. When the use is proved to the unauthorized as a result of the authentication the network sends a request that the user should send an individual mobile user identifier (IMUI). Then the network performs authentication by using an authentication key corresponding to the IMUI and random numbers (S8-S10). When the user is identified as an authorized user the TMUI is allocated again. By negotiation between the MS and the network side the object to be hidden and the hiding method for controlling the hiding start timing included in the information to be transmitted are determined. When a call occurs a diversity handover is started. When a branch switching is needed at an MS the branch is switched over to a branch through which diversity handover is possible. When another call takes place at an MS that can deal with a plurality of calls simultaneously the branch configurations and communication frequency bands are made the same for all the calls. When another call occurs at an MS that can deal with a plurality of calls simultaneously branch configurations and communication frequency bands for which all of the calls are maintained are selected and transition to them is performed. Thus a mobile communication system can be built which is suited for transmitting various kinds of data thereby being adapted to multimedia communication.

When a network performs paging by using a temporary mobile user identifier (TMUI) the corresponding mobile station (MS) sends a response. After this the network performs authentication by using an authentication key corresponding to the TMUI and random numbers. When the use is proved to the unauthorized as a result of the authentication the network sends a request that the user should send an individual mobile user identifier (IMUI). Then the network performs authentication by using an authentication key corresponding to the IMUI and random numbers (S8-S10). When the user is identified as an authorized user the TMUI is allocated again. By negotiation between the MS and the network side the object to be hidden and the hiding method for controlling the hiding start timing included in the information to be transmitted are determined. When a call occurs a diversity handover is started. When a branch switching is needed at an MS the branch is switched over to a branch through which diversity handover is possible. When another call takes place at an MS that can deal with a plurality of calls simultaneously the branch configurations and communication frequency bands are made the same for all the calls. When another call occurs at an MS that can deal with a plurality of calls simultaneously branch configurations and communication frequency bands for which all of the calls are maintained are selected and transition to them is performed. Thus a mobile communication system can be built which is suited for transmitting various kinds of data thereby being adapted to multimedia communication.

When network through performs paging using temporary mobile user identifier (TMUI) the corresponding mobile station (MS) sends a response. Thereafter network by using the authentication key corresponding to the TMUI and random number for authentication. When the user is proved as illegal by authentication the network sends a request that the user should send single mobile user recognition identifier (IMUI). Then the network performs authentication (authentication key S8-S10) to the IMUI and random number by using a corresponding. when the user is identified as a legal user re-distribute TMUI. by the MS and the negotiation between the network side determining the hidden target and for controlling comprises start time of hiding method of hidden in the message to be sent. When calling happens start diversity skip zone switch. when the MS needs branch exchange the branch is switched to is possible to diversity handover branches. When another call occurs at the can simultaneously process the MS of a plurality of call for all the callings the branch collection and the communication band are made the same. When another call occurs at the can simultaneously process the MS of a plurality of call selected such that all of the call can be kept for the branch collection and the communication band and performs the transfer to these branch configurations and communication frequency band. In this way the mobile communication system can be constructed to be suitable for transmitting various types of data therefore is suitable for multimedia communication.

Note:

The information in blue was extracted from the third parties (Standard Setting Organisation, Espacenet)

The information in grey was provided by the patent holder

The information in purple was extracted from the FrandAvenue

Explicitly disclosed patent:openly and comprehensibly describes all details of the invention in the patent document.

Implicitly disclosed patent:does not explicitly state certain aspects of the invention, but still allows for these to be inferred from the information provided.

Basis patent:The core patent in a family, outlining the fundamental invention from which related patents or applications originate.

Family member:related patents or applications that share a common priority or original filing.